Ch. 9&10 RAP SarahBeth Walker. Ergonomics  The study of and development of furniture, tools, & systems that promote productivity in a safe & hearlthy.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Let’s Talk About Cyber Security
THE INTERNET: NAVIGATING THE WORLD WIDE WEB SAFELY AND RESPONSIBLY Student Orientation.
Security Issues and Ethics in Education
Riverside Community School District
By Connie Lopez. Main Points 1. Computer Technology Arises Concerns 2. Computer Ethics & Guidelines that Govern the morally acceptable use of Computers.
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
VISD Acceptable Use Policy
Copyright Infringement
Security Issues and Ethics in Education
Issues Raised by ICT.
Internet safety By Lydia Snowden.
Security for Seniors SeniorNet Help Desk
A Guide to Digital Citizenship
D IGITAL C ITIZENSHIP. Definition: The informal rules of behavior to be followed when using the Internet N ETIQUETTE.
Digital Citizenship By: Miranda Scorver.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Employee Guidelines for Acceptable Use of Technology Resources.
OBJECTIVE 3 ELECTRONIC COMMUNICATIONS. USES OF COMPUTING Pros Made tasks such as clerical work and computing easier and faster Buying, banking, and paying.
Security Issues and Ethics in Education
Security Issues, Ethics, & Emerging Technologies in Education
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
Digital Citizenship Created By: Kelli Stinson June 2011.
BY: CHASIDY TUCKER Digital Citizenship Project. Plagiarism Pass off ideas of others without crediting the source.
EAST HARDIN MIDDLE SCHOOL MR. ERVIN Internet Safety Policy and Acceptable Use Procedures.
BY CONTESSA RUSHING ED 505 TECHNOLOGY AND EDUCATION.
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
I SSUES AND E THICS Erika Gentry EDUC 318 March 3, 2008.
ED 505: Magen Anthony. Netiquette on Social Media site is the etiquette or guideline for posting on social media or other online sites. This helps individuals.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans.
Cassidy Culligan Digital Citizenship Project ED 505.
By. Sierra Gillette. Acceptable Use  Abiding by the policies and procedures of other networks that are accessed  Being polite and using appropriate.
By Tori Gordon.  Protecting Students and Technology Resources  Outlets  Dust  Air circulation  Wireless technologies  Smaller, lighter, more portable.
Digital Citizenship By Lori Gray.
Computer Skills and Applications Computer Security.
The Properly Designed Workspace
Internet safety By Suman Nazir
Digital Citizen Project By: Frances Murphey Technology and Education.
Chapter 8 Security Issues and Ethics in Education By: Nick, Bryan, Randa, Austin.
KEYBOARDING Competency Organization Organization refers to keeping things in a predictable place or arranging things in an orderly manner It is.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
 Ergonomics – is the study of and development of furniture, tools, and systems that promote productivity in a safe and healthy way.  Use Ergonomic Checklist.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
A CCEPTABLE U SE P OLICY Adrienne Ochs EDU D EFINITION Set of rules enforced by one who runs a network, website or a large computer system that.
Security and Ethics Safeguards and Codes of Conduct.
Chapter 10 Studycast Marilee Betz.  is NOT private or confidential.  Created by committees.  Vary  GAME PLAN  Common elements  Glossary of.
 Be aware of the load on your electrical circuits  Dust is the enemy of the computer  Air circulation is important.  For laptops use a cart to move.
Any criminal action perpetrated primarily through the use of a computer.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
Security Issues & Ethics in Education By Maud Mushayamunda.
Safety.
Managing Windows Security
DIGITAL CITIZENSHIP What You Should Know!.
IT Security  .
Information Technology
Digital Citizenship by Jeremy Head.
Malware, Phishing and Network Policies
Computer Programming I
King Saud University- College OF Applied Studies
King Saud University- College OF Applied Studies
Student User Agreement and Policy 2022
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Presentation transcript:

Ch. 9&10 RAP SarahBeth Walker

Ergonomics  The study of and development of furniture, tools, & systems that promote productivity in a safe & hearlthy way.

Ergonomic Checklist  Monitor Placement  Chair Adjustment  Desk Height  Keyboard and Mouse Placement

Repetitive Strain Injuries  Occur during computer use  Tendonitis – the inflammation, irritation, or swelling of the tendons.  Carpal Tunnel Syndrome – the median nerve of the hand becomes compressed at about the location of the wrist, causing numbness, tingling, and pain in the thumb and side of the hand.

Resolution  Clarity of an image or letter related to the number of dots per square inch

Computer vision syndrome  Occurs due to the inability of your eyes to maintain focus on items on the screen.

Acceptable Use Policies (AUPs)  A document that clearly outlines what is and is not acceptable behavior, as well as the consequences of unacceptable behaviors.  Often created by a committee of school board personnel, administrators, teachers, parents, students, etc.  Common elements: overview, glossary, purpose of technology use, rights and responsibilities of the district, examples of acceptable/unacceptable use, consequences.

Fair Use  The part of the U.S. copyright law that allows limited use of copyrighted material without requiring permission from the copyright holder. Criteria:  The purpose and character of the use, including whether it is of a commercial or nonprofit educational nature/purpose.  The nature of the copyrighted work.  The amount and substantiality of the portion used in relation to the copyrighted work as a whole.  The effect of the use upon the potential market for, or value of, the copyrighted work.

Public Domain  Materials which may be freely used and distributed.

Academic Integrity  Plagiarism  Cheating  Keeping Data secure  Directory Information – information which is contained in an education record that generally would not be considered harmful, or an invasion of privacy.  Password Security

Phishing  Malevolent spam seeking to steal your identity, access bank accounts, or attempt face-to-face contact.

Malware  Malicious software contained in spam which can cause significant harm to one or more computers.  Virus – software program which can attach itself to another program, replicate itself, and cause damage to software or data on the computer.  Worm – does not need to be attached to another software program, but can replicate themselves and spread across a network and install a “backdoor”  Trojan horse – doesn’t replicate; can cause severe damage to a single computer by deleting all the data stored there or causing the computer to turn itself off immediately after booting up.  Steganography- hidden in text files or pictures.

Firewalls  installed to help protect an entire network or single computer.

Proxy servers  Software applications that perform several functions, including filtering and storing Internet content.

Portable Web Pages  A classroom-based option that allows teachers and students to visit websites and store them on a local computer for future use.