Download presentation
Presentation is loading. Please wait.
Published byAshley Esmond Murphy Modified over 9 years ago
1
Objective Day 1 The student will analyze ethics in relations to computer use and occupational use. (plagiarism)
2
GO TO http://www.proprofs.com/quiz- school/story.php?title=computer- ethics-quiz
3
Bell Work Day Monday What is Computer Ethic? (Use the Internet Google search)
4
Monday Vocabulary CREATE SENTENCE epigram—A witty saying MCT2 Word Evaluate—to judge
5
Is it Plagiarism? You read: "Students are studying about one-third as much as faculty say they ought to, to do well," said George D. Kuh, director of the survey and a professor of higher education at Indiana University at Bloomington. From: Young, Jeffrey R. Homework? What Homework? Chronicle of Higher Education, 49 (15).12/6/2002 You write: Most students spend about one-third as much time studying as faculty say they should. Yes! You must credit your source if you paraphrase text.
6
What is Plagiarism? Plagiarism is using words or ideas of another as one's own words. How to avoid plagiarism? Every direct quotation must be identified by quotation marks and must be properly cited (Give the Source)
7
Is it Plagiarism? You read: “Nineteen percent of full-time freshmen say they spend only 1 to 5 hours per week preparing for classes…” From: Young, Jeffrey R. Homework? What Homework? Chronicle of Higher Education, 49 (15).12/6/2002. You write: Nineteen percent of full- time freshmen say they spend only 1 to 5 hours per week preparing for classes. YES! You need to use quotes and to cite your source
8
Is it Plagiarism? You read : "Students are studying about one- third as much as faculty say they ought to, to do well," said George D. Kuh, director of the survey and a professor of higher education at Indiana University at Bloomington. From: Young, Jeffrey R. Homework? What Homework? Chronicle of Higher Education, 49 (15).12/6/2002 You write : According to George D. Kuh, Indiana University at Bloomington, students study about one-third of the time that is expected by faculty. (Young, 2002) No. As long as you have included the Young article in your reference list, you have properly cited your source.
9
Is it Plagiarism? You read : “The tip given most consistently by professors and college officials is that students should simply do their homework. The most commonly prescribed amount is at least two hours of class preparation for every hour spent in the classroom…” From: Young, Jeffrey R. Homework? What Homework? Chronicle of Higher Education, 49 (15).12/6/2002 You write : College students should do their homework. No. Commonly known facts or ideas do not have to be cited. (Can you find this information in at least five sources?)
10
Is it Plagiarism? Yes! You need to credit the source of images and other media as well as text. Gray wolf (Canis lupus). © Jeff Lepore/Photo Researchers Wolf. Encyclopædia Britannica. Retrieved March 31, 2004, from Encyclopædia Britannica Online. http://search.eb.com/eb/article?eu=79400 Should we or shouldn’t we protect the gray wolf? By Ima Lamb Eng 110 Apr. 1, 2004 You find : Your title page :
11
Is it Plagiarism? When in doubt, cite it!
12
10 COMMANDMENTS OF COMPUTER ETHICS THOU SHALT NOT USE A COMPUTER TO HARM OTHER PEOPLETHOU SHALT NOT USE A COMPUTER TO HARM OTHER PEOPLE THOU SHALT NOT INTERFERE WITH OTHER PEOPLE COMPUTER WORKTHOU SHALT NOT INTERFERE WITH OTHER PEOPLE COMPUTER WORK THOU SHALT NOT SNOOP AROUND IN OTHER PEOPLE’S FILES.THOU SHALT NOT SNOOP AROUND IN OTHER PEOPLE’S FILES. THOU SHALT NOT USE A COMPUTER TO STEAL.THOU SHALT NOT USE A COMPUTER TO STEAL. THOU SHALT NOT USE A COMPUTER TO BEAR FALSE WITNESS.THOU SHALT NOT USE A COMPUTER TO BEAR FALSE WITNESS.
13
10 COMMANDMENTS OF COMPUTER ETHICS THOU SHALL NOT USE OR COPY SOFTWARE FOR WHICH YOU HAVE NOT PAID. 6. THOU SHALL NOT USE OR COPY SOFTWARE FOR WHICH YOU HAVE NOT PAID. 7. THOU SHALT NOT USE OTHER PEOPLE ‘S COMPUTER RESOURCES WITHOUT AUTHORIZATION. 8. THOU SHALT NOT APPROPRIATE OTHER PEOPLE’S INTELLECTUAL OUTPUT. 9. THOU SHALT THINK ABOUT THE SOCIAL CONSEQUENCES OF THE PROGRAM YOU WRITE. 10. THOU SHALT USE A COMPUTER IN WAYS THAT SHOW CONSIDERATION AND RESPECT.
14
OBJECTIVE: The student will identify ways to safeguard against viruses. PREBELL DAY 2 EXPLAIN THIS COMPUTER ETHIC “Thou shall not use a computer to harm other people”
15
Vocabulary Words Create a Sentence with each word Homage- respectful deference MCT2 Word— formulate- Create
16
Day 3-OBJECTIVE: The student will identify ways to safeguard against viruses PREBELL-DAY 3 EXPLAIN THE PURPOSE OF USING THE INTERNET
17
Vocabulary Words Day 3 Create sentence with each word nimble —moving quickly and lightly “as nimble as a deer” or “nimble fingers” MCT2 Word Describe —tell all about it
18
Way to safeguard your computer from viruses, etc. 1. Do not open e-mail that you don't know 2. Do not open Advertisements 3. Do Not open Face Book Ads 4. Downloading free games, movies, free music—Internet abuse
19
DAY 4 OBJECTIVE: THE STUDENT WILL IDENTIFY HOW TO USE THE INTERNET SAFELY PREBELL QUESTION-DAY 4 DESCRIBE TWO PRECAUTIONS WHEN USING THE INTERNET SAFELY. DOK2-PLD-PROF. CREATE SENTENCES: VOC. WORDS-SUSIDE: TO WEAR OFF OR DIE DOWN. MCT2 WORD-INFER READ BETWEEN THE LINES
20
DAY 5 OBJECTIVE: The student will demonstrate their strengths & weaknesses on Computer Ethics DOK 2-PLD-P Friday Pre Bell Questions—What is the difference between uploading information and downloading information to your computer
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.