Objective Day 1 The student will recognize computer safety rules and analyze computer ethics in relations to computer use and occupational use. (plagiarism)

Slides:



Advertisements
Similar presentations
Music, like writing, can be plagiarized. G-Dragon was accused of illegally copying from American artist Flo-Rida You Decide.
Advertisements

Documenting Sources Defining & preventing plagiarism Using Direct Quotes Paraphrasing.
Ten Commandments of Cyber Ethics. I. Thou shalt not use a computer to harm people Be polite when you are sending messages to people. Treat other people.
Internet Etiquette Shenita D. Ballard Misty Monreal Sandra Monroe
Plagiarism Friday, May 15, 2015 MJISMAIL1. What is plagiarism anyway ? PLEASE WATCH 5eFeJMplA MJISMAIL2.
Is it Plagiarism? You read: “Nineteen percent of full-time freshmen say they spend only 1 to 5 hours per week preparing for classes…” From: Young, Jeffrey.
Objective Day 1 The student will analyze ethics in relations to computer use and occupational use. (plagiarism)
Cyber Crime. Statistics  The 2000 Computer Security Institute/FBI Computer Crime and Security Survey  Ninety percent of the study's 585 respondents.
CDS Fall, 2011 Computing for Scientists Ethics (Dec. 06, 2011) Jie Zhang Copyright ©
CDS Fall, 2010 Computing for Scientists Ethics (Nov. 30, 2010) Jie Zhang Copyright ©
Internet Etiquette or Netiquette BY: Jennifer Rudd Nov
What Is Computer Ethics?
THE WONDERFUL HISTORY OF COMPUTERS FROM THE BEGINNING HARDWARE, SOFTWARE,SAFTEY, AND COMPUTER ETHICS.
Possible WebQuest type links  
Describe ethical considerations resulting from technological advances.
Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage.
A Guide to Digital Citizenship
Computer Ethics.
TUES. DAY 2 OBJECTIVE & PREBELL QUESTION  OBJECTIVE: The student will analyze the appropriate netiquettes.  Pre Bell Question: Choose One: 1)Explain.
Roman Legacy Project. Quick Guidelines Slide 1 Introductory Page Slides 2-5Answer the guiding questions Slide 6Work Cited.
Computer Ethics for Computer Users
Objective Day 1 The student will analyze computer ethics in relations to computer use and occupational use. (plagiarism)
Computer Ethics Christina McCorkle.
What is it? How do I avoid it?
COMPUTER ETHICS Do you know the difference between right and wrong?
Chapter 1 Introduction to Computers. Prebell Day 1 –Week and Objective LABOR DAY –NO SCHOOL TODAY.
A Middle School Guide to Becoming a Better Digital Citizen Digital Citizenship, Copyright and Fair Use Guidelines Jackson Heights Middle School Created.
Chapter 7: IT Ethcs Courtney Littlejohn CSCI 101 Thursday 3:30.
OBJECTIVE-Day 1 THE STUDENT WILL RECOGNIZE Telecommunication Terms.
Ethics, Privacy, & Safety. Source: Ethics in ComputingEthics in Computing.
Digital Citizenship By: Amanda Thurber. Netiquette on Social Media Sites According to networketiquette.net, netiquette is the social code of the internet.
BY: CHASIDY TUCKER Digital Citizenship Project. Plagiarism Pass off ideas of others without crediting the source.
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
Day 1-Monday Week 6 OBJ. & BELLWORK Sept. 16th OBJECTIVE(S)-TSW ICT13.c. Review "appropriate use" policies related to telecommunications ICTI3.1 - Explain.
Business Ethics Why should business ethics concern you?
The Ten Commandments of Computer Ethics. The 1st Commandment Thou shalt not use a computer to harm Thou shalt not use a computer to harm other people.
8/16/08Computer Ethics Institute Mae Thomas The Ten Commandments of Computer Ethics by the Computer Ethics Institute.
The Ten Commandments of Computer Ethics Written by the Computer Ethics Institute A project of the Brookings Institution
ED 505: Magen Anthony. Netiquette on Social Media site is the etiquette or guideline for posting on social media or other online sites. This helps individuals.
Ethics Business Law Sunny Hills High School Mrs. Larsen.
Cassidy Culligan Digital Citizenship Project ED 505.
Computer Ethics. Ten Commandments of Computer Ethics Copyright: Computer Ethics Institute Author: Dr. Ramon C. Barquin.
BELL ACTIVITY DAY 1 WEEK 8 OBJECTIVE DAY 1---ICTI--1.4.bDescribe the different services available on the Internet. The students will demonstrate keyboarding.
Plagiarism English 9 September 3, 2015 Mr. Pettine.
Nov. 9 Mon-Objective & Bell Work Day 1 Day 1 Ojectives ICT1The student will: ICTI1. - Utilize technology to locate, evaluate, and collect information from.
Digital Citizenship. What is Netiquette? Netiquette is known as the “social code of the internet.” Netiquette comes from the words “network” and “etiquette.”
Mon, Nov. 2nd -Objective & Bell Work Day 1 Mon, Nov. 2 nd -Objective & Bell Work Day 1 Day 1- The student will: Recognize that people’s online information.
Objective & Bell Work –Day 1 THE STUDENT WILL: ICTI3. - The student will recognize facts about Web Publishing by using a Web Quest.  ICT14.a. Demonstrate.
By: Mr. Jamie Ferguson. Before we begin using our computers for internet use this semester, we will be learning the rules for the classroom. You will.
What is the safeguards when we want to reveal secret info? What things can people keep to them selves and not being cracked? Who is responsible for.
DAY 1 MON. OCT. 19 TH OBJECTIVES & PREBELL QUESTIONS Objective(s): The student will identify terminology. The student will perform keyboard application.
The History of Computers Hardware, Software, Programs, Computers Safety Tips, and Computer Ethics.
Week 8 Objective & Bell Work & Exit Question –Day 1 Monday Objectives: The student will: Performing touch typing by keying words, numbers, sentences and.
Things Every Computer User Should Know… Jessica Johnsey ED 505- Technology and Education.
Computer Ethics. Ethics The rules and standards governing the conduct of an individual with others.
1. Is it Plagiarism? You read: “Nineteen percent of full-time freshmen say they spend only 1 to 5 hours per week preparing for classes…” From: Young, Jeffrey.
Daily Agenda- Unit 7 Social Media- Week 5 April 18-22, 2016 ICT 1 Classes J. Leverette, ICT1 Teacher.
Mrs. Leverette, Teacher 4th Nine weeks Skills-- Questions.
A guide to avoiding plagiarism and creating bibliographies Cite your Stuff Originally developed by Gayle Bushell for the WCDSB Resource Centre, October.
Part 1 WHAT SHOULD HAVE BEEN COVERED DAY ONE Ms. T. N. Jones1.
Week 1 October By Mrs. J. Leverette
Is it Plagiarism? You write: You read:
Internet Etiquette or Netiquette
You Are the Author.
Is it Plagiarism? You write: You read:
Plagiarism It’s a crime!.
PLAGIARISM AND COPYRIGHT
Is it Plagiarism? You write: You read:
Week 2 Oct , 2016 By Mrs. J. Leverette--
Presentation transcript:

Objective Day 1 The student will recognize computer safety rules and analyze computer ethics in relations to computer use and occupational use. (plagiarism)

Bell Work Day Monday What is Computer Safety and Computer Ethic? (Use the Internet Google search)

Monday Daily Agenda Do Pre-Bell for Monday- get handout from table and discuss orally Do Computer Safety Test & turn in scantrom. Introduce Computer Ethics-complete ethic Pre-test Do Ethic in Computer/classroom Handout & discuss answers orally and Computer Ethics PowerPoint. Write 10 COMMANDMENTS OF COMPUTER ETHICS in your notebook and do Copyright activity, if time. Homework for the week-Get Handout –Computer Ethics

What is Plagiarism? Plagiarism is using words or ideas of another as one's own words. How to avoid plagiarism? Every direct quotation must be identified by quotation marks and must be properly cited (Give the Source)

GO TO school/story.php?title=computer- ethics-quiz Pre-test-computer ethics school/story.php?title=computer- ethics-quiz

Is it Plagiarism? You read: "Students are studying about one-third as much as faculty say they ought to, to do well," said George D. Kuh, director of the survey and a professor of higher education at Indiana University at Bloomington. From: Young, Jeffrey R. Homework? What Homework? Chronicle of Higher Education, 49 (15).12/6/2002 You write: Most students spend about one-third as much time studying as faculty say they should. Yes! You must credit your source if you paraphrase text.

Is it Plagiarism? You read: “Nineteen percent of full-time freshmen say they spend only 1 to 5 hours per week preparing for classes…” From: Young, Jeffrey R. Homework? What Homework? Chronicle of Higher Education, 49 (15).12/6/2002. You write: Nineteen percent of full-time freshmen say they spend only 1 to 5 hours per week preparing for classes. YES! You need to use quotes and to cite your source

Is it Plagiarism? You read : "Students are studying about one-third as much as faculty say they ought to, to do well," said George D. Kuh, director of the survey and a professor of higher education at Indiana University at Bloomington. From: Young, Jeffrey R. Homework? What Homework? Chronicle of Higher Education, 49 (15).12/6/2002 You write : According to George D. Kuh, Indiana University at Bloomington, students study about one-third of the time that is expected by faculty. (Young, 2002) No. As long as you have included the Young article in your reference list, you have properly cited your source.

Is it Plagiarism? You read : “The tip given most consistently by professors and college officials is that students should simply do their homework. The most commonly prescribed amount is at least two hours of class preparation for every hour spent in the classroom…” From: Young, Jeffrey R. Homework? What Homework? Chronicle of Higher Education, 49 (15).12/6/2002 You write : College students should do their homework. No. Commonly known facts or ideas do not have to be cited. (Can you find this information in at least five sources?)

Is it Plagiarism? Yes! You need to credit the source of images and other media as well as text. Gray wolf (Canis lupus). © Jeff Lepore/Photo Researchers Wolf. Encyclopædia Britannica. Retrieved March 31, 2004, from Encyclopædia Britannica Online. Should we or shouldn’t we protect the gray wolf? By Ima Lamb Eng 110 Apr. 1, 2004 You find : Your title page :

Is it Plagiarism? When in doubt, cite it!

10 COMMANDMENTS OF COMPUTER ETHICS THOU SHALT NOT USE A COMPUTER TO HARM OTHER PEOPLETHOU SHALT NOT USE A COMPUTER TO HARM OTHER PEOPLE THOU SHALT NOT INTERFERE WITH OTHER PEOPLE COMPUTER WORKTHOU SHALT NOT INTERFERE WITH OTHER PEOPLE COMPUTER WORK THOU SHALT NOT SNOOP AROUND IN OTHER PEOPLE’S FILES.THOU SHALT NOT SNOOP AROUND IN OTHER PEOPLE’S FILES. THOU SHALT NOT USE A COMPUTER TO STEAL.THOU SHALT NOT USE A COMPUTER TO STEAL. THOU SHALT NOT USE A COMPUTER TO BEAR FALSE WITNESS.THOU SHALT NOT USE A COMPUTER TO BEAR FALSE WITNESS.

10 COMMANDMENTS OF COMPUTER ETHICS THOU SHALL NOT USE OR COPY SOFTWARE FOR WHICH YOU HAVE NOT PAID. 6.  THOU SHALL NOT USE OR COPY SOFTWARE FOR WHICH YOU HAVE NOT PAID.  7. THOU SHALT NOT USE OTHER PEOPLE ‘S COMPUTER RESOURCES WITHOUT AUTHORIZATION.  8. THOU SHALT NOT APPROPRIATE OTHER PEOPLE’S INTELLECTUAL OUTPUT.  9. THOU SHALT THINK ABOUT THE SOCIAL CONSEQUENCES OF THE PROGRAM YOU WRITE.  10. THOU SHALT USE A COMPUTER IN WAYS THAT SHOW CONSIDERATION AND RESPECT.

OBJECTIVE: The student will identify computer ethics rules and terminology. PREBELL DAY 2 EXPLAIN THIS COMPUTER ETHIC “Thou shall not use a computer to harm other people”

Tues. Daily Agenda COMPLETE PRE BELL ACTIVITY REVIEW PREVIOUS LESSON-DAY 1 COMPLETE NOTES ON 1O COMMANDMENTS OF COMPUTER ETHICS, if not completed on Mon. BEGIN HANDOUT-COMPUTER ETHICS TERMS GO TO TO LOOK UP COMPUTER TERMSwww.techterms.com DISCUSS COMPUTER TERMS AND IF TIME, DO COPYRIGHT ACTIVITY FROM MON. REVIEW TODAY LESSON—REMIND ABOUT HOMEWORK-DUE THURSDAY

Day 3-OBJECTIVE: The student will identify ways to safeguard against viruses PREBELL-DAY 3 EXPLAIN THE PURPOSE OF USING THE INTERNET

DAILY AGENDA-DAY 3 COMPLETE PRE BELL ACTIVITY REVIEW PREVIOUS LESSON-DAY 2-TECHTERMS COMPLETE NOTES ON PROTECTING YOUR COMPUTER FROM POWERPOINT BEGIN HANDOUT-PROTECTING YOUR COMPUTER AND YOURSELF see link on handout GO TO LOG IN: username: lsd password: grade search for cyberbullying to look for cyberbullying video REVIEW TODAY LESSON—REMIND ABOUT HOMEWORK-DUE THURSDAY

Way to safeguard your computer from viruses, etc. 1. Do not open that you don't know 2. Do not open Advertisements 3. Do Not open Face Book Ads 4. Downloading free games, movies, free music—Internet abuse

DAY 4 OBJECTIVE: THE STUDENT WILL IDENTIFY HOW TO USE THE INTERNET SAFELY PREBELL QUESTION-DAY 4 DESCRIBE TWO PRECAUTIONS WHEN USING THE INTERNET SAFELY. DOK2-PLD-PROF.

DAILY AGENDA –DAY 4 REVIEW DAY 1. COMPLETE DAY 4 PREBELL ACTIVITY & Collect Homework Today. 2 REVIEW DAY 1, 2, & 3 LESSON –Plagiarism, Computer Ethics, 10 Commandments of Computer Ethics, 10 Computer Ethics Terms, And Protecting Your Computer Handout 3. Complete Pretest Again for Review on Computer Ethic-See Teacher Website 4. Complete Handouts From Wed. Protecting Your Computer –See Website 5. GO TO LOG IN: username: lsd password: grade search for cyberbullying to look for cyberbullying video HOMEWORK-STUDY ALL COMPUTER ETHICS NOTES, HANDOUTS AND 10 Terms –Computer Ethics Test Friday

DAY 5 OBJECTIVE: The student will demonstrate their strengths & weaknesses on Computer Ethics DOK 2- PLD-P Friday Pre Bell Questions— Explain Plagiarism—Give an example of plagiarism. Turn in Pre-Bell Today

REVIEW WORDS FOR TEST CREATE A SENTENCE 1.PLAGIARISM 2.COPYRIGHT 3.CYBERCRIME 4.HACKER 5.VIRUS 6. WORM 7. ANTIVIRUS 8.ENCRYPTION 9.PHISHING 10 COMPUTER ETHICS