ATEP Laptop Session September 14, 2007. Why Are We Doing This? ICT outcomes. Higher expectations of technology integration in provincial schools. It’s.

Slides:



Advertisements
Similar presentations
Basic Computer Skills Windows & the Internet.
Advertisements

Computer Care. The Power Cord Dont drop your laptop.
CICT Course Introduction The aim of this course is to provide you with practical ICT skills to help with your studies.
Cyber Time Kindergarten. Personal Information Is ok to share: – Favorite color – Favorite food – Likes and dislikes NOT ok to share – Your FULL name –
By: Rachel Hall and Amy Austin.  Grade: All levels  Price  Host App: $24.99  Student App: free (allows up to 32 students)  Location: App Store 
Internet Safety in Schools
Wireless Networking Thornbury U3A Computer Club Mike Farquhar 2010.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
INTERNET SAFETY FOR STUDENTS
What you don’t know CAN hurt you!
Keeping yourself safe on the Internet at school. What is an inappropriate website? 1. Unapproved games 2. Violence 3. Inappropriate social behaviour and.
Responsible Use Policy Technical Applications Mr. Hibbs, Mrs. Brau, & Coach Merkle Granbury Middle School.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Welcome to Computing in Geoscience! A Brief Introduction to Computing at the University of Leicester. Andrew Myers. Please.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
Using Wireless Laptops August Academy August 2, 2007 Kerry George.
Internet Safety and Kids Ms. Lee’s Classroom Computers are NOT bad Computers can be used to help kids learn and play. They can be used safely, if parents.
Grade 5 Student Assistants
Protect Your Computer from Viruses and Other Threats! 1. Use antivirus software. 2. Run Windows updates. 3. Use a strong password. 4. Only install reputable.
Laptop Survival and Management Help Desk Services Pat Valiquette Mark Miller Campus tools – Fall 2006.
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.Creative Commons Attribution-NonCommercial-ShareAlike.
Rebecca Payton Eastern High School 9-12 Spanish 2
 Hardware is every thing that goes into the computer system like;  The computer chip.  Keyboard.
IT Security for Users By Matthew Moody.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
By: Brett Sauve. What is Cyber-bullying? Being tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen.
Welcome to Causey Computer Lab! Computer Applications Mrs. Clements.
The Simple Side of Computer Security for The Brownies That Like To Read!!
Computer Security Preventing and Detecting Unauthorized Use of Your Computer.
Keeping Safe While Using the Internet. We live in a community. What are some safety rules we have in our community? Cyberspace is also a community. What.
Welcome to the ESL Center and ESL 403. Goals ESL 403 – Spring 2015 Improve your writing Write paragraphs Meet with tutor Practice grammar Do well in your.
Introduction to Windows7
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
Updated Today's talk should help you to understand better  what your responsibilities for this module  how you will be taught  how you.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Computer Security 2 Keeping your computer safe. Computer Security 2 Computer Security 2 includes two lessons:  Lesson 3: Protecting yourself and your.
Network Security Tough Love David Strom Sonicwall Sales Meeting 1/24/08 (new)
ICT Functional Skills Viruses and other malware. What is malware? software which is specifically designed to disrupt or damage a computer system – Viruses,
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
By: Elizabeth Scruggs Digital Citizenship Project.
How Responsible and Respectful are you in the Computer Lab Created for the Students At Donaldson By Mrs. Jones.
Your College Experience 10 th Edition John N. Gardner Betsy O. Barefoot ©2012 Bedford/St. Martin’s ISBN-10: ISBN-13:
Computer Literacy Chapter 7: Taking Control of Windows – Using Control Panel Wisely Computer Literacy.
Computer Safety Sid Holder 8k Viruses Hacking Backing Up.
Network Security for DEC staff. Anti-virus/spyware for home use At work, devices are built and maintained by ITSU staff Symantec is no longer licensed.
Introduction to Windows 10 Windsor Senior Computer Users Group October 12, 2015.
Backups. What is a backup. A backup is when someone copies some data (like you may copy and paste your schoolwork!) and sends it to another workstation.
MLTI WHAT DOES THIS MEAN? MAINE LEARNING TECHNOLOGY INITIATIVE.
INFORMATION TECHNOLOGY. RIGHT METHODS TO DEAL WITH THE COMPUTER  Screen’s brightness and position should be comfortable for your eyes.  Keyboard should.
Digital Citizenship By: William Rickman Digital Citizenship is the knowledge for children and other computer users to know how to appropriately use the.
By: Mr. Jamie Ferguson. Before we begin using our computers for internet use this semester, we will be learning the rules for the classroom. You will.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Research Proposal Presentation. Emmanuel Fon Tata Lecturer Department of ICT Welcome… …
2/11/ Dela Cruz.  Trojan Horses  Worms  Viruses  Piggyback software  Attachments with viruses 2/11/2016 Dela Cruz 2.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Lincoln School Home of the Lions!. 1.7 years in the EVSC 2.7 years at Harrison 3.1 st year as eLearning Coach Miss Stephens.
Safety on the Internet The most important rules to remember.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
What is Digital Citizenship? Using electronic, computerized technology responsibly and knowing how to stay safe.
COMPUTER LITERACY 1 TRANSITION PLUS BASIC COMPUTER USE PART 1.
Basic Computer Skills Windows & the Internet vfu.bg/en/e-Learning/
GUIDE TO INTERNET SAFETY A VISUAL WALKTHROUGH TO SAFE INTERNET BROWSING.
Welcome to Chromebooks! September 1, 2015 Please take a Chromebook from the charging cart and have a seat.
Upgrading to Windows 10 Mike Farquhar January 2016 Thornbury U3A Computer Club.
Crystal Lake Public Library Gadget Group Training August 2016
Computer Use Guidelines
Responsible Use Policy
NAVIGATING THE MINEFIELD
Presentation transcript:

ATEP Laptop Session September 14, 2007

Why Are We Doing This? ICT outcomes. Higher expectations of technology integration in provincial schools. It’s the direction the entire Faculty is going in.

ICT Inventory Survey administered to all undergraduate students in the faculty. Helps us get a better idea of your skills and what tools you have.

Security and Safety Your responsibilities. What happens if something happens to the computer? Using the Kensington lock. Common security guidelines. Always use the case! Anti-virus and anti-spyware.

Release Forms Outlines your legal responsibilities for having these computers. Outlines consequences if something happens to the computer.

Etiquette Ask your instructors what they are okay with in class. Don’t surf and do other things in class… it is VERY distracting to your instructors.

Starting Your Computer Charge the battery fully and let it run out almost fully as much as possible (keeps it healthier longer). Be safe with cords. If you want a mouse you need to buy it yourself. Logging on.

Creating Backup Discs Computers don’t come with discs anymore; you have to make them yourself. Keep the DVDs somewhere safe as you may need them if anything goes wrong with the computer.

Internet Access Home access first! Campus access first! EVDO access only when there’s nothing else. We are charged by how much you use. ion-Data_Optimizedhttp://en.wikipedia.org/wiki/Evolut ion-Data_Optimized

First Steps Symantec update HP update Registering your fingerprints Registering your computer.

Personalizing Vista Gadgets Control panel Issues with security and permissions

Lois Hole Library Resources Bob…

Printing on Campus Bob…

Using the USB Keys Applications Backing up Good practice to make them last

Software Installation Installed Apps USB Apps Web 2.0 Apps

Inspiration Map Install Inspiration Create a map and fill it out as much as you can with the following topic in the middle: Technology in the Classroom When you’re done, it to

Next Week… Installing Microsoft Word. Telus Internet Access Problems you’ve encountered so far and questions you have…

Questions?