Download presentation
Published byBrice Rice Modified over 9 years ago
1
Welcome to Week 3 in the Mrs. DeRita’s computer lab!
Let’s get started!
4
Make sure you NEVER use spaces!
Logging On For the first week or two ONLY use this user name and password. Your user name and password is posted at the top of you computer monitor. ges-lab01 12345 Make sure you NEVER use spaces! Each computer is different: ges-lab02 mcb-lab01 ges-lab03 mcb-lab02 ges-lab04 mcb-lab03 mcb-lab01 12345
5
We are still learning our beginning/entry routine?
Come in quietly and have a seat at your assigned computer with good posture. Log in! (last week) Put up your name tag. Garin: Click on Google Chrome- web browser. MCB: Click on your student grade level folder
6
Garin: Let’s Continue to step 6:
Come in quietly and have a seat at your assigned computer with good posture. Log in! Let’s learn how to do that now! Put up your name tag. Click on Google Chrome- web browser. Go to the Digital Classroom at
7
MCB: Let’s Continue to step 6:
Come in quietly and have a seat at your assigned computer with good posture. Log in! Let’s learn how to do that now! Put up your name tag. Click on your grade level folder on the desktop. Click on the Digital Classroom
9
How do you create a positive online community?
Last week we talked about what Digital Citizenship means and how now we know we are part of a new “online” community when we are online. How do you create a positive online community?
10
Today we are going to talk about 5 responsibilities you have as being Digital Citizens:
Digital Security – keeping passwords private Social Media – positive self image (digital footprint) Netiquette – online manners Cyberbullying – how to stop it Rules & online laws- plagiarism
11
Digital security: Password Tips
Don’t give passwords to others Never give out your password in an , even if someone asks for it Not when you’re at school but all other times create a password make sure it has: At least one capital letter At least one number No one should ask for your personal information in an , if they do show an adult you trust right away
12
Keeping a Positive Self Image Online There are SO many ways to communicate digitally. Some people use texting, instant message, , social media, and skype:
13
It is important to check the bylaws on some of the programs/sources we choose to use online, because there are often rules and regulations in place to help control and protect those who use them. Did you know that most social media sites have age requirements? Many Social Medias require you to be the age of 13 to participate. Do you know why these types of laws are in place? Children's Online Privacy Protection Rule ("COPPA")
15
3) Etiquette : the rules for the proper way to behave.
I often refer to how we behave online as “netiquette”. There is a certain way we should act face-to-face as well as on-line! It is just as important to be kind and polite online if not more! Make sure you always follow these guidelines and rules when communicating online—so that you have good netiquette! Social Media Do not tag people in posts or pictures without permission THINK before you post any comments Do not use ALL CAPS ALL THE TIME, it’s like YELLING! Write a short description in the subject line Start with a greeting, it’s like a letter End the with your name Don’t use ALL CAPS
16
Examples of cyberbullying Why Cyberbullying is Different
What is Cyberbullying Cyberbullying is bullying that takes place using electronic technology Electronic technology includes devices and equipment such as cell phones, computers, and tablets as well as communication tools including social media sites, text messages, chat, and websites. Examples of cyberbullying This includes mean text messages or s, rumors sent by or posted on social networking sites, and embarrassing pictures, videos, websites, or fake profiles. Why Cyberbullying is Different Kids who are being cyberbullied are often bullied in person as well. Additionally, kids who are cyberbullied have a harder time getting away from the behavior. Cyberbullying can happen 24 hours a day, 7 days a week, and reach a kid even when he or she is alone. It can happen any time of the day or night. Cyberbullying messages and images can be posted anonymously and distributed quickly to a very wide audience. It can be difficult and sometimes impossible to trace the source. Deleting inappropriate or harassing messages, texts, and pictures is extremely difficult after they have been posted or sent.
17
Plagiarism What is plagiarism: the act of plagiarizing; taking someone''s words or ideas as if they were your own. It is a piece of writing that has been copied from someone else and is presented as being your own work. How to avoid plagiarism Plagiarism happens when you take someone else’s ideas without their permission and pretend that they’re yours. Just as stealing someone’s bike or school bag isn’t allowed at school, neither is plagiarism. It’s a good idea to not do it outside of school as well, because plagiarism breaches a person’s copyright (their ‘ownership’ of their information), which is against the law. So, how do you avoid doing it?
18
To access BrainPop’s Online Safety interactive video!
Now go into “Todays Lesson” and ready/listen to the plagiarism article. When you are finished, click on button To access BrainPop’s Online Safety interactive video!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.