Teacher Rooming Equipment Rules / Expectations Login / Passwords Technical Issues Homework Printing.

Slides:



Advertisements
Similar presentations
Login The process of identifying oneself on a computer,usually by entering ones username or password.
Advertisements

E-books and E-journals Off-campus This presentation will show you how to log in and access Oxford Brookes Library e-books and e-journals when youre off.
Hart District Acceptable Use Policy Acceptable Use Policy.
Baltic High School Classroom Connections Presentation.
ACCEPTABLE USE POLICIES.  Use network resources for school work only  Always Log-on/Log-off  AUP/RUP training and signature pages are required  Always.
With great power…comes great responsibility
Washburn High School Student “Responsible Use” Guidelines for Electronic Technologies.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
Responsible Use Policy Technical Applications Mr. Hibbs, Mrs. Brau, & Coach Merkle Granbury Middle School.
Riverside Community School District
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
VISD Acceptable Use Policy
INTERNET SAFETY FOR STUDENTS
Grade 5 Student Assistants
Internet Ethics. Internet Ethics Cyberspace Cyberspace is like a big city. There are libraries, universities, museums, places to have fun, and plenty.
When ing me, please be specific in the title of your and if attaching documents, please have the document specifically.
LPISD Acceptable Use Guidelines La Porte ISD students are fortunate to have access to a wide variety of technology to help make learning more.
Barren County Schools Student Technology Appropriate Use Policy (AUP) “ ”
Mrs. Dennis South Media Specialist Mrs. Bakanas North & South Media Specialist Mrs. Martinez North Media Specialist Mrs. Kelley Media Assistant Miss VanArtsdalen.
E-Safety Challenge College. Learning Objectives Understanding the definition of ‘cyber’ bullying and the affect it can have on the victim.
Welcome to Technology Class
Reliability & Desirability of Data
Welcome to the Beach Middle School Library Media Center.
Internet Driver’s License è Training è Test è Signed Internet Use Agreement.
Employee Guidelines for Acceptable Use of Technology Resources.
Mastery Objective: To: Answer questions on the worksheet about the media center policies and resources in order to perform basic tasks and searches in.
Computer Assisted Learning (CAL) Tutorials Special needs pupils; Spelling programs which have an interactive component testing student with games, quizzes.
Mr. Crane  “Last Chance” Take advantage of it  You have been placed here for a reason  You have a choice  Ottumwa High School cares about.
Keeping Safe While Using the Internet. We live in a community. What are some safety rules we have in our community? Cyberspace is also a community. What.
Cyberspace Rules for Mrs. Johnson’s Kindergarten Class These are the rules we will use to learn, play, and have fun on the internet.
THS Print Media Mrs. Brocious Room 63, ext. 215
Mrs. Stern Computer Applications II. What is Computer Crime?  Criminals Can Operate Anonymously Over the Computer Networks.  Be careful about talking.
Year 7 Lesson 1 – File Management and introduction to school network Objectives Know: How to log onto the system Understand: Why there are certain.
INTERNET SAFETY RULES. TECHNOLOGY Technology has become an important part of today’s classroom as well as the world. Students need to be able to use and.
ACPS Acceptable Use Policy Grades 3-5. A Good Technology User: Uses the computer and other technology with good intentions and for educational purposes.
Technology Lab Rules, Procedures, Acceptable Use Policy Review Kindergarten-Second Grade This PowerPoint is meant to be used as a quick review! Students.
Mrs.. Taylor Cedar High School Business Web Page Design.
Student Technology Code of Ethics
Mrs. Molina’s Fourth Grade Gifted. Online in our Class Weekly spelling/vocabulary lists posted Students can take pre-tests and tests in class use games.
Beginning of Class Silence at the bell Look at the teacher Listen to Mrs. W.
Computer Tech Mrs. Taylor Top Ten Careers in Technology Mind2it.com 1. Software Engineer 1. Software Engineer 5. Computer Systems Analyst 5. Computer.
PROGRAMMING JAVA Mrs. Taylor Top Ten Best Careers for College Students Mind2it.com 1. Software Engineer 1. Software Engineer 5. Computer Systems.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
Mastery Objective: To: Answer questions on the worksheet about the media center policies and resources in order to perform basic tasks in the media center.
Teacher Rooming Equipment Rules / Expectations Login / Passwords Technical Issues Homework Printing.
Barren County Schools Student Technology Appropriate Use Policy (AUP) “ ”
TECHNOLOGY USE AGREEMENT FOR STUDENTS GRADES 3-8 This presentation was created to help students understand the district’s Technology Use Agreement before.
Come on in, feel welcome. Please have a seat any where you would like If you would like, take a notecard from my blue desk and tell me something special.
ICT Mr Farmer. Ground Rules Listening This is an important skill. You need to listen to me and to each other. Help I am here to TEACH you. Not to do it.
Welcome To ICT at Wirral School Name. Adapted from ICTforALL.
EMINTS Teachers are trained intensively in how to improve their teaching. Lots of tax-payer money is used to buy technological equipment to help students.
Computer Use Guidelines Business Lab. Computers are Important Tools! Internet Research Learning Software Word Processing Multimedia Presentations.
1.Read a book, magazine or the newspaper in paper or Internet format. 2.Do your homework. 3.Do research for assigned projects. 4.Work on PowerPoint and.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
A CCEPTABLE U SE P OLICY Adrienne Ochs EDU D EFINITION Set of rules enforced by one who runs a network, website or a large computer system that.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Chichester School District is providing students access to the district’s electronic network. This network includes Internet access, computer services,
FLHS TECHNOLOGY SURVIVAL GUIDE A QUICK GUIDE FOR STUDENTS.
 Atwood-Hammond High School.  You are given access to the school’s computer network as a privilege, not a right.  Any work done using your school account.
School Accounts Presented by: Mrs. Mazzola.
Passwords & E-safety! Starter  You need to use a secure password for your school account.  The 2 most important things about your password are: 1. You.
DIGITAL CITIZENSHIP TRAINING BEING A SAFE AND SUCCESSFUL USER OF ICT.
Technology Guidelines for Students
Year 7 ICT Introduction By the end of this lesson you will be able to explain/define the following: Who your teacher is What are the classroom expectations.
Uppingham Community College
Technology Guidelines for Students
Responsible Use Policy
Uppingham Community College
Uppingham Community College
Kyrene Student Acceptable Use Policy Technology Guidelines
Presentation transcript:

Teacher Rooming Equipment Rules / Expectations Login / Passwords Technical Issues Homework Printing

Computing Department Mr Knight – Technical Director Mrs Hirst – Computing / Business Studies Mr Jones – Computing / Maths Mr English – Computing / Maths Mrs Jordan – Curriculum Support / Computing Mrs Warne – Computing Teaching Assistant Mr Chambers – Head Of Computing

Student guidelines for Internet use General  The UCC Network and internet access is provided to help you learn more effectively, access is a privilege, not a right. You are responsible for your online behaviour.  Please read and click to show that you agree to comply with these simple rules Guidelines: 1. I will not send or display any messages or pictures that others would find offensive. 2. I will not abuse or threaten others in my messages. 3. I will be careful not to damage the computer equipment, software systems or the network. 4. I will respect the intellectual property of others and uphold the copyright laws. 5. I will keep my password secure and not attempt to use others' passwords. 6. I will not attempt to access others' folders, work or files. 7. I will not waste network resources, by streaming media files or using social networking sites. I understand and will abide by these guidelines and I am aware that any violation of the rules may cause my access privileges to be removed, it may also result in further disciplinary action and I may be asked to pay for any damage caused. Remember that your online access is logged by the system and that your parents will be informed of any problems you may cause. I Agree

You have 75mb of space in “My Documents” to save your work. Please save all other work on a memory stick. All lessons and resources will be found on year7ucc.weebly.com year7ucc.weebly.com

Please check your desk at the beginning of the lesson. Is there anything wrong with your machine? Report it to the teacher. Problems with your password? Report it to your teacher. Problems with printing? Check your print credits and report it to your teacher Issues with software? Check with your teacher

You have 2 lessons a week. The amount of homework varies depending on the topic being covered. You will usually get at least a weekend to do your homework.

The type of homework will vary: – Watching videos – making notes – Coming up with questions to challenge the teacher – Vocabulary – Understanding the meaning of keywords – Writing a blog entry

You are given new credits each week Has your printing failed to come out? What should be do? Should we press print again? Always use print preview

If another person gains access to your account they might damage your work or even do something illegal! Security of your passwords is your top priority. Do not record it in a way that can be found easily by others. Do not use anything other might guess. Eg your name WARNING If your computer account is used in anyway to abuse others or commit any crime YOU will be held responsible and the college will co-operate with Government authorities in tracing online offences. COMPUTER MISUSE ACT!

Teacher Lead Discussion / Activity

Username = 1-first 4 letters of surname followed by first 2 letters of first name Eg John Smith = 1-smitjo Password = Year7 To change your password Press Ctrl-Alt-Del

Which subjects do we have? How do we organise our work? How do we use a mouse? Task 1 – Can you create a folder for every subject you are going to do this year

MrChambersICTLessonsYear7 Ooiasjfoijsadfjo Year 7 ICT Computing

Teacher Lead Activity E-Safety

Feedback from Teacher Lead Activity

Task 1 : - Produce a poster which warns people about the dangers of internet safety. What is our success criteria?

What should there be evidence of 1Show that you’re aware of who to report all incidents to 2Explain different types of dangers available 3Show that you’re able to save files in folder’s with correct filenames 4Show that you understand how responsible you should be online 5Produce an organised layout which uses video tutorials available 6Personal success criteria * you can pick this * Use the video tutorials to teach yourself the basics of using publisher