Download presentation
Presentation is loading. Please wait.
Published bySybil Powers Modified over 9 years ago
1
Safe and Ethical Use of Computer and Internet
2
Computer Safety Computer should be on flat surface Cords tied away neatly Laptop should be secured to desk Never eat or drink around your Computer Password Backup
3
On-Line Safety Cyber-bullying Personal information Do not talk to stranger E-mails Cookies
4
Social Media Do’s “Pause before you Post” Password Privacy https://cuit.columbia.edu/cuit/it-security-resources/social-networking-dos-donts
5
Social Media Don’ts Never accept strangers Password Information https://cuit.columbia.edu/cuit/it-security-resources/social-networking-dos-donts
6
Ethical Use of Internet Material Ethical action Credit Music Videos http://depts.washington.edu/uwcopy/Using_Copyright/Compilations,_Music,_Images/Music.php
7
Copyright Guidelines The copies may be used for only one course at the school Same author copies may not exceed more than one article or two excerpts, or more than three from a collection of works. Multiple copies for one course is limited to a maximum of nine instances during the term Copying may not be used to substitute for collections of work You may not copy “consumable” materials such as work books. Students may not be charged for the copied material, other than photocopying costs. (Morrison & Lowther, 2010, Chapter 6: Exploring the worldwide web in the classroom. Copyright issues.)
8
Plagiarism “Cut and Paste” Grammarly Paraphrase Citation
9
Citation Methods APA Style Contributors' names (Last edited date). Title of resource. Retrieved from http://Web address for OWL resource Example – Angeli, E., Wagner, J., Lawrick, E., Moore, K., Anderson, M., Soderlund, L., & Brizee, A. (2010, May 5). General format. Retrieved from http://owl.english.purdue.edu/owl/resource/560/01 http://owl.english.purdue.edu/owl/resource/560/01 – https://owl.english.purdue.edu/owl/resource/560/01/ https://owl.english.purdue.edu/owl/resource/560/01/
10
References Colombia University. (n.d). Colombia University. Social Network Do’s and Don’ts. Retrieved June 21, 2014, from https://cuit.columbia.edu/cuit/it- security-resources/social-networking-dos-dontshttps://cuit.columbia.edu/cuit/it- security-resources/social- Johnson, D. (2012). The Classroom Teachers Technology Survival Guide. Commonsense Practices for Safe and Ethical Technology Use. Received from the University of Phoenix eBook Collection Database Morrison, G.R., & Lowther, D.L. (2010). Intergrading Computer Technology into the classroom. Skills for the 21 Century. Received from the University of Phoenix eBook Collection Database. Purdue University. (2014) Online Writing Lab. Retrieved June 23, 2014, from https://owl.english.purdue.edu/owl/resource/560/01/ University of Washington. (2014). Copyright Connections. Retrieved June 21,2014, fromhttp://depts.washington.edu/uwcopy/Using_Copyright/Compilations,_ Music,_Images/Music.php
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.