Download presentation
Presentation is loading. Please wait.
Published byThomas Curtis Modified over 9 years ago
1
Objective Day 1 The student will analyze computer ethics in relations to computer use and occupational use. (plagiarism)
2
Bell Work Day Monday What is Computer Safety and Computer Ethic? (Use the Internet Google search)
3
Monday Daily Agenda Do Pre-Bell for Monday- get handout from table and discuss orally Do Computer Safety Test & turn in scantrom, if not done Friday. Introduce Computer Ethics-complete Computer Ethic Pre-test—Online-Get link from teacher website Do Ethic in Computer/classroom Handout & discuss answers orally and Computer Ethics PowerPoint. Write 10 COMMANDMENTS OF COMPUTER ETHICS in your notebook and do Copyright activity, if time. Homework for the week-Get Handout –Computer Ethics Closure: Wrap up with a review question learned today
4
GO TO http://www.proprofs.com/quiz- school/story.php?title=computer- ethics-quiz Pre-test-computer ethics http://www.proprofs.com/quiz- school/story.php?title=computer- ethics-quiz
5
What is Plagiarism? Plagiarism is using words or ideas of another as one's own words. How to avoid plagiarism? Every direct quotation must be identified by quotation marks and must be properly cited (Give the Source)
6
Is it Plagiarism? You read: "Students are studying about one-third as much as faculty say they ought to, to do well," said George D. Kuh, director of the survey and a professor of higher education at Indiana University at Bloomington. From: Young, Jeffrey R. Homework? What Homework? Chronicle of Higher Education, 49 (15).12/6/2002 You write: Most students spend about one-third as much time studying as faculty say they should. Yes! You must credit your source if you paraphrase text.
7
Is it Plagiarism? You read: “Nineteen percent of full-time freshmen say they spend only 1 to 5 hours per week preparing for classes…” From: Young, Jeffrey R. Homework? What Homework? Chronicle of Higher Education, 49 (15).12/6/2002. You write: Nineteen percent of full-time freshmen say they spend only 1 to 5 hours per week preparing for classes. YES! You need to use quotes and to cite your source
8
Is it Plagiarism? You read : "Students are studying about one-third as much as faculty say they ought to, to do well," said George D. Kuh, director of the survey and a professor of higher education at Indiana University at Bloomington. From: Young, Jeffrey R. Homework? What Homework? Chronicle of Higher Education, 49 (15).12/6/2002 You write : According to George D. Kuh, Indiana University at Bloomington, students study about one-third of the time that is expected by faculty. (Young, 2002) No. As long as you have included the Young article in your reference list, you have properly cited your source.
9
Is it Plagiarism? You read : “The tip given most consistently by professors and college officials is that students should simply do their homework. The most commonly prescribed amount is at least two hours of class preparation for every hour spent in the classroom…” From: Young, Jeffrey R. Homework? What Homework? Chronicle of Higher Education, 49 (15).12/6/2002 You write : College students should do their homework. No. Commonly known facts or ideas do not have to be cited. (Can you find this information in at least five sources?)
10
Is it Plagiarism? Yes! You need to credit the source of images and other media as well as text. Gray wolf (Canis lupus). © Jeff Lepore/Photo Researchers Wolf. Encyclopædia Britannica. Retrieved March 31, 2004, from Encyclopædia Britannica Online. http://search.eb.com/eb/article?eu=79400 Should we or shouldn’t we protect the gray wolf? By Ima Lamb Eng 110 Apr. 1, 2004 You find : Your title page :
11
Is it Plagiarism? When in doubt, cite it!
12
10 COMMANDMENTS OF COMPUTER ETHICS THOU SHALT NOT USE A COMPUTER TO HARM OTHER PEOPLETHOU SHALT NOT USE A COMPUTER TO HARM OTHER PEOPLE THOU SHALT NOT INTERFERE WITH OTHER PEOPLE COMPUTER WORKTHOU SHALT NOT INTERFERE WITH OTHER PEOPLE COMPUTER WORK THOU SHALT NOT SNOOP AROUND IN OTHER PEOPLE’S FILES.THOU SHALT NOT SNOOP AROUND IN OTHER PEOPLE’S FILES. THOU SHALT NOT USE A COMPUTER TO STEAL.THOU SHALT NOT USE A COMPUTER TO STEAL. THOU SHALT NOT USE A COMPUTER TO BEAR FALSE WITNESS.THOU SHALT NOT USE A COMPUTER TO BEAR FALSE WITNESS.
13
10 COMMANDMENTS OF COMPUTER ETHICS THOU SHALL NOT USE OR COPY SOFTWARE FOR WHICH YOU HAVE NOT PAID. 6. THOU SHALL NOT USE OR COPY SOFTWARE FOR WHICH YOU HAVE NOT PAID. 7. THOU SHALT NOT USE OTHER PEOPLE ‘S COMPUTER RESOURCES WITHOUT AUTHORIZATION. 8. THOU SHALT NOT APPROPRIATE OTHER PEOPLE’S INTELLECTUAL OUTPUT. 9. THOU SHALT THINK ABOUT THE SOCIAL CONSEQUENCES OF THE PROGRAM YOU WRITE. 10. THOU SHALT USE A COMPUTER IN WAYS THAT SHOW CONSIDERATION AND RESPECT.
14
OBJECTIVE: The student will identify ways to safeguard against computer viruses, worms, etc.; and safeguards against hardware theft and vandalism by using computer ethics rules and terminology. PREBELL DAY 2 EXPLAIN THIS COMPUTER ETHIC “Thou shall not use a computer to harm other people”
15
Tues. Daily Agenda COMPLETE PRE BELL ACTIVITY REVIEW PREVIOUS LESSON-DAY 1 COMPLETE NOTES ON 1O COMMANDMENTS OF COMPUTER ETHICS, if not completed on Mon. BEGIN HANDOUT-COMPUTER ETHICS TERMS GO TO www.techterms.com TO LOOK UP COMPUTER TERMSwww.techterms.com DISCUSS COMPUTER TERMS AND IF TIME, DO COPYRIGHT ACTIVITY FROM MON AND BEGIN WEB QUEST—PROTECTING YOUR COMPUTER -HANDOUT REVIEW TODAY LESSON—REMIND ABOUT HOMEWORK-DUE THURSDAY CLOSURE: WRAP UP WITH A REVIEW QUESTION.
16
Day 3-OBJECTIVE: The student will identify how to use the Internet safely, legally, and responsibly. PREBELL-DAY 3 EXPLAIN THE PURPOSE OF USING THE INTERNET
17
DAILY AGENDA-DAY 3 COMPLETE PRE BELL ACTIVITY REVIEW PREVIOUS LESSON-DAY 2-TECHTERMS COMPLETE NOTES ON PROTECTING YOUR COMPUTER FROM POWERPOINT BEGIN HANDOUT-PROTECTING YOUR COMPUTER AND YOURSELF see link on handout GO TO www.brainpop.comwww.brainpop.com LOG IN: username: lsd password: grade --search for cyberbullying to look for cyberbullying video CLOSURE: REVIEW TODAY LESSON—REMIND ABOUT HOMEWORK-DUE THURSDAY and POST TEST-FRIDAY
18
Way to safeguard your computer from viruses, etc. 1. Do not open e-mail that you don't know 2. Do not open Advertisements 3. Do Not open Face Book Ads 4. Downloading free games, movies, free music—Internet abuse
19
DAY 4 OBJECTIVE:-The student will review and analyze social and ethical issues related to technology in the context of the Law, Public Safety, Corrections and Security career cluster PREBELL QUESTION-DAY 4 DESCRIBE TWO PRECAUTIONS WHEN USING THE INTERNET SAFELY. DOK2-PLD-PROF.
20
DAILY AGENDA –DAY 4 REVIEW & RESEARCH DAY 1. COMPLETE DAY 4 PREBELL ACTIVITY & Collect Homework Today. 2 REVIEW DAY 1, 2, & 3 LESSON –Plagiarism, Computer Ethics, 10 Commandments of Computer Ethics, 10 Computer Ethics Terms, And Protecting Your Computer Handout and Copyright. 3.Research info on Google –about Law & Safety Careers as it relates to Computer Ethics and share report with class 4. Complete Pretest Again for Review on Computer Ethic-See Teacher Website 5. Complete Handouts From Wed. Protecting Your Computer –See Website, if not completed from Wed. Activity. 6. GO TO www.brainpop.com, if not completed from Wed. Activitywww.brainpop.com LOG IN: username: lsd password: grade search for cyberbullying to look for cyberbullying video 7. HOMEWORK-STUDY ALL COMPUTER ETHICS NOTES, HANDOUTS AND 10 Terms – Computer Ethics Test Friday 8. ALSO, COMPUTER SAFETY RULES MASTERY 100% RETEST- DUE FRIDAY—STUDY- WRITE THE RULES DOWN YOU MISSED 9. Closure Activity: Review Question for Today.
21
REVIEW WORDS FOR TEST CREATE A SENTENCE, More Practice 1.PLAGIARISM 2.COPYRIGHT 3.CYBERCRIME 4.HACKER 5.VIRUS 6. WORM 7. ANTIVIRUS 8.ENCRYPTION 9.PHISHING 10 COMPUTER ETHICS
22
DAY 5 OBJECTIVE: The student will demonstrate their strengths & weaknesses on Computer Ethics DOK 2-PLD-P Friday Pre Bell Questions—Explain Plagiarism—Give an example of plagiarism. Turn in Pre-Bell Next Friday
23
FRIDAY DAILY AGENDA 1. COMPLETE DAY 5 PREBELL ACTIVITY –DO NOT TURN IN TODAY – TURN IN NEXT WEEK 2 REVIEW DAY 1, 2, & 3 LESSON –Plagiarism, Computer Ethics, 10 Commandments of Computer Ethics, 10 Computer Ethics Terms, And Protecting Your Computer Handout and Copyright. 3. COMPLETE POST TEST UNIT 1 –COMPUTER ETHICS 4. COMPLETE MASTERY COMPUTER SAFETY TEST 100% - DUE TODAY, ALSO, IF YOU DID NOT MASTER IT WITH 100% 5. COMPLETE ANY ICT1 MAKE UP WORK, AT THIS TIME FOR THIS WEEK 6. STUDENTS CAN PRACTICE ON ACADEMIC GAMES, SUCH AS COOL MATH ONLY. 7. Closure Activity: Review Question for Today.– HOW DID YOU DO ON YOUR POST-TEST –COMPUTER ETHICS AND HOW CAN YOU IMPROVE ON THE NEXT TEST?
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.