Why is it important?
|
|
- Martha Moore
- 7 years ago
- Views:
Transcription
1 Keeping safe online
2 Why is it important? The obvious reason avoid danger or unhappiness now. But ALSO Protect your future. Ever want to get a job? Or go to college? Or apply for a scholarship? Everyone will look at your digital footprint, that is, what you have done online. If you leave a mess, it will be available to view from now on.
3 What is Digital Safety? Play Video
4 What is a Digital Citizen? What is digital citizenship? "A digital citizen understands the rights and responsibilities of inhabiting cyberspace." is a confident and capable user of ICT uses technologies to participate in educational, cultural, and economic activities uses and develops critical thinking skills in cyberspace is literate in the language, symbols, and texts of digital technologies is aware of ICT challenges and can manage them effectively uses ICT to relate to others in positive, meaningful ways demonstrates honesty and integrity and ethical behaviour in their use of ICT respects the concepts of privacy and freedom of speech in a digital world contributes and actively promotes the values of digital citizenship.
5 Passwords Don t share your passwords with anyone. If you forget your password go to the school office to have it reset. Make them secure: Should have at least 8 characters Should include capital and lower case letters Should include at least one number and one special character DON T use the same password for everything Change your passwords from time to time
6 Don t share devices Your device is your own property. If you allow someone use your device, you are potentially giving them free access to your privacy. A lot of people have passwords saved automatically and when you allow someone to use your device, they may get into your facebook or s without your knowing. It is very easy for someone to pretend to be you online so avoid this by keeping your device to yourself. If you do allow someone use your device, make sure you are watching what they are doing. If you feel someone is pressuring you into sharing your device, please let a teacher or your parents know.
7 Social media Websites like Facebook, Instagram, Tumblr, etc Typing words and posting them to these kinds of sites is like talking in public Posting photographs on these sites is like appearing in public. Make sure your personal settings on these sites are safe settings for someone your age Once something is out there you can t get it back.
8 You can t be sure of a person s real identity online. That cool person you re chatting with who says he or she is fifteen and hot might actually look like this: Never give out your address or agree to meet someone you don t know in real life. Do not tell someone your do not know where you go to school or where you go after school. There are some creepy people out there don t be tricked by them!
9 If someone is being rude or mean block them. If you encounter someone online who is cruel or insulting to you BLOCK that person DO NOT chat or text with that person!!!
10 If you do get bullied Save the evidence. The only good news about digital bullying is that the harassing messages can usually be captured, saved, and shown to someone who can help. You need to do this even if it s minor stuff, in case things escalate.
11 If things get really bad talk to someone Talk to an adult who cares: Mom or Dad Teacher Uncle or Aunt Counselor or Principal Minister or religious leader Coach or mentor OR ask a close friend to recommend a trustworthy adult
12 Be careful about what you share If you share a picture of yourself doing something stupid that picture could be seen by your parents, teachers or others. If you engage in name-calling or being mean to others, it can come back and hurt you later. If you share personal information or embarrassing stories, be aware that those things will get around, eventually, to someone you wish did not know. If you text, chat or post something, it can be shared with others that you did not intend to share it with.
13 If someone is doing something wrong online, tell a trusted adult If you know about a friend who is doing dangerous things on the internet, it s better to tell a trusted adult. If someone on the internet seems like they are acting creepy or inappropriate, tell a trusted adult. Don t endanger yourself by engaging in mean behavior online. If you do mean things, you open yourself up to the same thing happening to you. Don t encourage others to be mean or do dangerous things online. Report it if you witness someone being mistreated online. Bullying is never cool.
14 Device use in SHC The following are the usage guidelines for the digital devices you will be using in class. Any questions, please ask. 1. No pictures or videos to be taken. 2. When not in use, the device has to be on airplane mode, and face down on the table. 3. Devices are to be brought to school fully charged. No charging at school. 4. You are responsible for your own device.
15 Getting SHC Your school address is your username@sacredheartcollege.school.nz Teachers s are surname first initial@sacredheartcollege.school.nz Its easy to connect to the BYOD wireless at SHC Turn on your WiFi and select SHC_BYOD Password; You need to enter the SHC password into your device once. If you do not know what this password is ask your form teacher or the office. Please follow the next slide to log into the WiFi each day.
16 Signing in to the school network You will need you SHC address and the password that you have been provided with/ changed it to in Year 9. This screen will come up once everyday to sign into the school Wi-Fi. The school monitors all devices connected to the Wi-Fi. You are allowed a maximum of two devices connected to the Wi-Fi at a time. If you are not sure of any of these details please go to the main office to get the details reset.
17 Installing Office 2013 and Accessing Mission Point on Windows 8 and Windows 10 Devices This can only be done after you have logged into school for the first time. For year 9 students you will have time in a computer room to do this at the start of the year. When your class is timetabled to do this please also bring your own device if you have one. Step 1: Go to Step 2: Then click student resources
18 Step 3: Then click Microsoft Online Services This takes you to the following screen
19 Step 4: Enter your student address in full. This is your KAMAR number and first initial of your christian name followed by first initial of your surname as shown below followed No Password is required. Step 5: This takes you to the Sacred Heart College log in page where you enter your user name (KAMAR ID and first initial of your christian name and first initial of your surname). The password is whatever you are using as your network login password.
20 Step 6: Then you will be taken to this screen. Before you begin the install process it is important that you do not click buttons or turn the laptop off during the install process. Step 7: If you leave the ticks in the boxes you will have 'Bing' as the search engine and 'MSN' will be your home page so we recommend that these are not ticked. Click on the install now button to install the apps above.
21
22 Step 8: After install now has been completed. This screen will appear click run.
23 Step 9: You will need to click accept in the box above. It is important that you do not click buttons or turn the laptop off during the install process.
24 Step 10: Once this is completed you can click on the 'sites' button (see Step 7 diagram) to explore Mission Point there is a page there for each subject that you take. You are also encouraged to make use of One Drive and the other features that Microsoft offers. If you are not sure how to use them see Mrs Free in Fourviere and sign up for some of the Microsoft free training that the school has available.
25 Finding Mission Point on an IPAD Go to the school website and log into your school . Click on the boxes at the bottom of the screen
26 This should take you to this screen
27 Click on the three dots. Click on the word sites If you are in the correct view it will take you to Mission Point. If not continue on with the next instruction.
28 If you are following sites and are already in PC view you will see your sites here. If not continue on with these instructions.
29 If you are following sites they will appear here. If not continue with these instructions. Switch to PC view
30 Choose your subject site. If it is not displayed scroll for more sites by clicking the three dots.
31
THE LITTLE BIG BOOK OF BADNESS
THE LITTLE BIG BOOK OF BADNESS How to stay safe on the Internet a guidebook for students and parents USE THIS BOOK TO FIND OUT HOW YOU AND YOUR COMPUTER CAN STAY AWAY FROM BAD THINGS 2 CONTENTS Why you
More informationEADS up. stop think connect
EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,
More informationOnline Safety for Middle and High School
Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET
More informationInternet basics 2.2 Staying safe online. Beginner s guide to. Basics
Basics Beginner s guide to Internet basics 2.2 Staying safe online Use this document with the glossary A helper should take you through this guide This activity will help you register safely online and
More informationCyberbullyNOT Student Guide to Cyberbullying
CyberbullyNOT Student Guide to Cyberbullying WHAT IS CYBERBULLYING? Cyberbullies use the Internet or cell phones to send hurtful messages or post information to damage people s reputation and friendships.
More informationONLINE SAFETY TEACHER S GUIDE:
TEACHER S GUIDE: ONLINE SAFETY LEARNING OBJECTIVES Students will learn how to use the Internet safely and effectively. Students will understand that people online are not always who they say they are.
More informationUNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET
UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET SPEAKING NOTES FOR GRADES 4 TO 6 PRESENTATION SLIDE (1) Title Slide SLIDE (2) Key Points It can be really
More informationHEADS up. stop think connect
HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more
More informationThis document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet.
This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet. Hft Safeguarding Group commissioned a member of Hft National
More informationBYOD Policy 2016 Bring Your Own Device Acceptable Use Policy
BYOD Policy 2016 Bring Your Own Device Acceptable Use Policy Approved by Leadership Team 27 th April 2016 Approved by the Governing Body: 18 th May 2016 Review Due: May 2017 Rationale The Beaconsfield
More information6th Grade ipad Setup. APS Personalized Learning Devices
6th Grade ipad Setup APS Personalized Learning Devices Please Listen and Wait for Instructions We realize that many of you may have your own ipad, but this ipad will be set up differently Don t be a show
More informationAppropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness
Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Gordon Cooper Technology Center 2012 From http://onguardonline.gov/ Think Before You Share What you post could have a bigger
More informationDigital Citizenship Lesson Plan
Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship
More informationA Parents Guide to. 2015 ConnectSafely.org saferinternet.org.uk
A Parents Guide to 2015 ConnectSafely.org saferinternet.org.uk At the UK Safer Internet Centre, one of our key objectives is to develop new educational and awareness-raising resources for parents in the
More informationA Parents Guide to. 2014 ConnectSafely.org
A Parents Guide to 2014 ConnectSafely.org Parenting in the age of social media can be tricky. Australians are amongst the highest users of social media in the world, averaging 22 hours per week per person.
More informationPeachtree Ridge High School Bring Your Own Device Training for Students
Peachtree Ridge High School Bring Your Own Device Training for Students What is BYOD? Access to the Internet at school. BYOD awards the same set of permissions as if the student is on a school computer.
More informationPolicies & Procedures. Moat Community College E-Safety Policy
Moat Community College E-Safety Policy Vision Statement Moat Community College embraces the positive impact and educational benefits that can be achieved through appropriate use of the Internet and associated
More informationCYBERBULLYING TEACHER S GUIDE:
TEACHER S GUIDE: CYBERBULLYING LEARNING OBJECTIVES Students will understand the meaning of cyberbully. Students will learn to recognize different forms of cyberbullying. Students will learn different strategies
More informationDigital Citizenship: Etiquette. My Online code & Breaking Down Hate Speech Grades 9-12
Digital Citizenship: Etiquette My Online code & Breaking Down Hate Speech Grades 9-12 Essential Question: What does it mean to do the right thing online? How can you create a community culture in which
More informationConducting Virtual Meetings
Page 1 oovoo Chat & Video Conferencing Information gathered by, International Faculty 2013 Faculty Training General Information What can I do with oovoo? oovoo offers free high quality video chat and instant
More informationthink before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney
think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! A Message from the District Attorney The use and capabilities
More informationUPDATE Appendix H: How to set Facebook s privacy settings to increase security
UPDATE Appendix H: How to set Facebook s privacy settings to increase security (October 2012) Please note that in order to protect yourself you should also change your Security Settings and all the options
More informationSTOP. THINK. CONNECT. Online Safety Quiz
STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.
More informationBring Your Own Device (BYOD) Years 5 and 6. Sunnyhills School
Bring Your Own Device (BYOD) Years 5 and 6 Sunnyhills School Please note that BYOD is NOT a compulsory venture. This information is designed to inform you on things to consider if you choose to. Note there
More informatione-safety for Parents
e-safety for Parents Helenswood Academy Published June 2014 1 Contents Introduction 4 The Web 5 Children online 6 Friends of your child 7 Information about your child 8 Ownership of your child s technology
More informationClass 2: Manage Your Digital Footprint. Student Handbook
Class 2: Manage Your Digital Footprint Student Handbook I Know/I Want to Know/I learned I know I want to know I learned How to keep personal information private online. Give Examples: How to keep personal
More informationA Parents' Guide to. 2014 ConnectSafely.org
A Parents' Guide to 2014 ConnectSafely.org Top 5 Questions Parents Have About Instagram 1. Why do kids love Instagram? Because they love media, sharing it and socializing with it on their phones, and Instagram
More informationParent / Guardian Consent for Technology Use in Schools
Parent / Guardian Consent for Technology Use in Schools Our school uses computers and other mobile devices in the classroom to help increase student motivation and achievement. We will use laptop sets,
More information2011-2012. Frisco ISD
2011-2012 Frisco ISD Table of Contents Table of Contents Table of Contents... 2 Purpose... 3 Google Apps for Students... 3 Responsible Use Policy... 4 Wireless Information... 5 Frequently Asked Questions...
More informationBYOD QUESTIONS & ANSWERS
BYOD QUESTIONS & ANSWERS Bring Your Own Device Year 9 and 10-2016 We introduced a BYOD programme to Year 9 students in 2015, and are pleased to report that the implementation has been very positive. Students
More informationHow to register and use our Chat System
How to register and use our Chat System Why this document? We have a very good chat system and easy to use when you are set up, but getting registered and into the system can be a bit complicated. If you
More informationLesson Plan for Senior Secondary
Lesson Plan for Senior Secondary Introduction Purpose Introduce the National Day of Action against Bullying and Violence (NDA) campaign Explore the role of bystanders to bullying Investigate the theme
More informationBYOD and Digital Citizenship at Trumbull High School
BYOD and Digital Citizenship at Trumbull High School Providing students and staff with a 21st century digital learning environment is part of the Trumbull High School core values. THS now allows high school
More informationRIDICULOUSLY EASY GUIDE TO SOCIAL MEDIA TWITTER
RIDICULOUSLY EASY GUIDE TO SOCIAL MEDIA Alberta s a big place and while you could run round the province telling everyone you see about Change Day AB, it s probably not the best use of your time and could
More informationBring Your Own Device (BYOD) Acceptable Use Agreement 2015
Monivae College Bring Your Own Device (BYOD) Acceptable Use Agreement 2015 This agreement is applicable to all: 1. students in Years 7, 8, 9, 10 and 11 using their own device to access the College network
More informationRutherford County Schools Bring Your Own Device
Rutherford County Schools Bring Your Own Device Why BYOD (Bring Your Own Device) Rutherford County Schools is committed to ensuring students are provided an environment which maximizes the integration
More informationNorton Family Product Manual
Norton TM Family Product Manual Care for our Environment; It's the right thing to do. Symantec has removed the cover from this manual to reduce the Environmental Footprint of our products. This manual
More informationCitrix Single Sign-On Self-Service Password Reset
Citrix Single Sign-On Self-Service Password Reset Citrix Single Sign-On (SSO) Self-Service tools enable you to take control when you forget your password. Using the three security questions you established
More informationCelly FAQ. inbox cells people help. celly help. Common Support Questions. celly company. General. celly @ school. policies. About Cells.
Celly FAQ Common Support Questions inbox cells people help How do I change my username? How do I change the phone number on my Celly account? How do I set my password/reset my password? How can I mass
More information2010 Middle School Internet Safety Survey Results
When you are online, people can say whatever they want. ~ 8th Grader A friend pressured me to tell her my password. ~ 5th Grader Plainview Old Bethpage Central School District 21 Middle School Internet
More informationYPS Technology, Internet, and Learning Management Systems (LMS) Acceptable Use Agreement (AUP)
YUKON PUBLIC SCHOOLS: DISTRICT POLICY BJ-R1 YPS Technology, Internet, and Learning Management Systems (LMS) Acceptable Use Agreement (AUP) To ensure that our students and employees become proficient in
More informationHow To Use Your Cell Phone At Renaissance Academy Charter School
Renaissance Academy Charter School Bring Your Own Device (BYOD) Board Policy PURPOSE The Renaissance Academy School Board values technology and seeks to increase student access and use when it will enhance
More informationFAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:
FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful
More informationMaypearl ISD. Bring Your Own Device (B.Y.O.D.)
Maypearl ISD Bring Your Own Device (B.Y.O.D.) 1 Purpose Providing students and staff with a 21 st century digital learning environment is part of the Maypearl ISD core values. Maypearl Independent School
More informationBring Your Own Device (BYOD) Guidelines Gettys Middle School
Bring Your Own Device (BYOD) Guidelines Gettys Middle School BYOD At Gettys As we work to prepare students for the 21 st century, we must challenge students with increased rigor and personalized academic
More informationSetting up a basic database in Access 2003
Setting up a basic database in Access 2003 1. Open Access 2. Choose either File new or Blank database 3. Save it to a folder called customer mailing list. Click create 4. Double click on create table in
More informationOUTLOOK WEB ACCESS. User Guide
OUTLOOK WEB ACCESS User Guide V3 2 August 2013 Not protectively marked GETTING STARTED Outlook Web Access (OWA) provides a useful means to remotely access Council email from outside of the council access.
More information1. Starting With Windows Live Essentials
17 1. Starting With Windows Live Essentials You probably already know a little about Windows Live Hotmail and you may also be familiar with the Windows Live Messenger program. This program used to be called
More informationHector s World Lesson Plan Episode: Cyberbullying You re Not Alone Upper primary
Hector s World Lesson Plan Episode: Cyberbullying You re Not Alone Upper primary BACKGROUND Cyberbullying is an increasing problem for children and schools. This lesson addresses the inappropriateness
More informationA Publication of the GCPS Information Management Division
GCPS A Publication of the GCPS Information Management Division Gwinnett County Public Schools is committed to providing information related to student technology use in a manner that is clear, concise,
More informationPART A School support for the safe and responsible use of digital technologies
Western Port Secondary College Internet and Digital Technologies Acceptable Use Agreement for Students and Families Western Port Secondary College uses the Internet as a teaching and learning tool. We
More informationSTEP 5: Giving Feedback
STEP 5: Giving Feedback Introduction You are now aware of the responsibilities of workplace mentoring, the six step approach to teaching skills, the importance of identifying the point of the lesson, and
More informationMobile Device Management AirWatch Enrolment ios Devices (ipad, iphone, ipod) Documentation - End User
Mobile Device Management AirWatch Enrolment ios Devices (ipad, iphone, ipod) Documentation - End User Version 1.0 Contents Definitions... 1 Expected Time Taken to complete... 1 What do I need or need to
More informationHow to switch Wi-Fi on and off at your router and connected devices
How to switch Wi-Fi on and off at your router and connected devices www.safespace.net.nz 1. Firstly you need to know the IP address of your router. This is often 192.168.1.254 but can be another address.
More informationBullying 101: Guide for Middle and High School Students
Bullying 101: Guide for Middle and High School Students A guide to the basics of bullying, what it is and isn t, the role of students, and tips on what you can do. 952.838.9000 PACERTeensAgainstBullying.org
More informationA Parents' Guide to. Snapchat. 2013 ConnectSafely.org
A Parents' Guide to Snapchat 2013 ConnectSafely.org Top 5 Questions Parents Have About Snapchat 1. Why do kids love Snapchat? They love the spontaneity of it. It s been (rightfully) drummed into their
More informationClass 3: Identify Tricks and Scams Online
Class 3: Identify Tricks and Scams Online Identify Tricks and Scams Online Instructor s Overview DESCRIPTION: In this lesson, students will learn how to avoid online tricks and scams, and learn best practices
More informationZoom Instructions and Information
Zoom Instructions and Information 1. Get Zoom set up Everyone call get a free Zoom account, go to http://zoom.us Put in your Andrews University email account and click Sign Up Free Click Sign Up A box
More informationBring Your Own Device (BYOD)
Bring Your Own Device (BYOD) Purpose As a teacher, I want to move students forward into the 21 st century learning environment. Many students already use technology to access information 24/7 and we are
More informationParker School s ipad Reference Manual
Parker School s ipad Reference Manual Introduction Contents Acceptable Use Policy Overview Parker School s Network Guidelines Introduction User Requirements ipad and ipad Accessory Requirements How to
More informationConnecting to the University Wireless Network
Connecting to the University Wireless Network Wifi is available to staff and registered students of University in certain areas of the three campuses of the University. This area of coverage will be expanded
More informationColumbia Public Schools Student, Teacher and Parent Guide to Bring Your Own Device (BYOD)
Columbia Public Schools Student, Teacher and Parent Guide to Bring Your Own Device (BYOD) Contents PURPOSE AND PLAN... 3 FREQUENTLY ASKED QUESTIONS... 4 STUDENTS... 4 STAFF... 5 PARENTS... 6 POLICY REFERENCES
More informationInternet basics 2.3 Protecting your computer
Basics Use this document with the glossary Beginner s guide to Internet basics 2.3 Protecting your computer How can I protect my computer? This activity will show you how to protect your computer from
More informationUSEFUL HINTS & TIPS ALCATEL ONE TOUCH 993. better BUSINESS
USEFUL HINTS & TIPS ALCATEL ONE TOUCH 993 We really value your feedback on this useful hints & tips guide. If you feel anything is missing, or anything could be made clearer, please send your feedback
More informationSubject: Computer Network and Internet Use Agreement Guidelines
February 4, 2013 Dear Parents/Guardian, Subject: Computer Network and Internet Use Agreement Guidelines Every student will receive a permission form that must be co-signed by parents/guardians and returned
More informationActivity Guide for Teachers of Secondary School Students Module: Social Media
Activity Guide for Teachers of Secondary School Students Module: Social Media Table of Contents About this Module...3 Level 8 AusVELS Standards...6 Scenario: Alex - It s Just a Remix...7 Scenario: Beth
More informationSocial Networking Sites like Facebook, MSN
Most people, young and old, can use a computer and mobile phone these days. Using computers, mobile phones, Tablets (like the ipad) and the internet can be fun and let you keep in touch with friends and
More informationStudents are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage.
Penrice Academy Acceptable Use Policy for Mobile Digital Devices including ipads September 2014 Date of Review: May 2015 Introduction Penrice Academy ( The Academy ) may grant a licence to use ipads or
More informationMobile Broadband Manager Guide Huawei E8278
Mobile Broadband Manager Guide Huawei E8278 What s mobile broadband? Mobile broadband means you can surf the internet when you re out and about. 4G mobile broadband is the same but using our glorious 4G
More informationTWITTER AND YOUR CHILD, A PARENT S GUIDE TO PRIVACY AND SAFETY
TWITTER AND YOUR CHILD, A PARENT S GUIDE TO PRIVACY AND SAFETY What is Twitter? Twitter is one of the leading tools for connecting users with bite-sized pieces of information and status updates. Each message
More informationTRAINING GUIDE. TRAVEL AND EXPENSE CARD US Bank Access OnLine
TRAINING GUIDE TRAVEL AND EXPENSE CARD US Bank Access OnLine Prepared by: Procurement Services October 2015 Table of Contents Introduction... 2 Logging on to Access Online... 2 Menus Available for Cardholders...
More informationHow to wipe personal data and email from a lost or stolen mobile device
IS Doc no 858 How to wipe personal data and email from a lost or stolen mobile device This document explains what to do if your mobile device (iphone, ipod Touch, ipad, mobile phone etc.) is stolen or
More informationGuideline on Windows 7 Parental Controls
CMSGu2012-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Windows 7 Parental Controls National Computer Board Mauritius
More informationPolicy for Staff and Post 16 Student BYOD (Bring Your Own Device)
Policy for Staff and Post 16 Student BYOD (Bring Your Own Device) Date approved: 7 th May 2015 Review Schedule: Annual Reviewed: Next review: 1 Context Aims of this Policy Definitions CONTENTS 1. OVERVIEW...
More informationMost laptops allow you to plug in a second monitor, which can be a TV screen or Projector I will refer to a monitor in this document.
Introduction This is a guide to setting up / using a laptop with a TV screen or projector. IT IS STRONGLY RECOMMENDED THAT YOU TRY THIS OUT SOME TIME AHEAD OF YOUR PRESENTATION. PowerPoint If using PowerPoint
More informationANZ DES TOOLKIT. What you need to know before applying to ANZ
ANZ DES TOOLKIT What you need to know before applying to ANZ 1. Introduction 2. How to apply 3. Typical roles at ANZ 4. How to write a winning resume 5. Tips for impressing at interview 6. How to answer
More informationGrade 5 Unit. Lesson 2. Learning Goals. Facility. Materials. Cyberbullying and Lesson 2 of 4
Cyberbullying and Harrassment 30 Minutes* Curriculum Expectations Health and Physical Education - 1.3, C2.2, C3.2 Language: Media - 1.5 Lesson 2 Learning Goals By the end of this lesson, students will
More informationPredators will use information obtained from children to gain trust and friendship
1 We will be discussing several topics during this presentation, including online relationships, the importance of keeping personal information private, protecting your reputation, cyber bullying, and
More informationINFORMATION SERVICES SOCIAL MEDIA GUIDE FOR STAFF
INFORMATION SERVICES SOCIAL MEDIA GUIDE FOR STAFF go.qub.ac.uk/socialmedia WHY ARE SOCIAL MEDIA TOOLS IMPORTANT TO QUEEN S UNIVERSITY? The term social media is used to describe a range of communication
More informationAcceptable Use of ICT Policy. Learner School Policy
Acceptable Use of ICT Policy Learner School Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 3 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 4 5. MONITORING 5 6. SOCIAL NETWORKING 5 7. LEGAL
More informationUser s Manual For Chambers
Table of Contents Introduction and Overview... 3 The Mobile Marketplace... 3 What is an App?... 3 How Does MyChamberApp work?... 3 How To Download MyChamberApp... 4 Getting Started... 5 MCA Agreement...
More informationGoogle 2 factor authentication User Guide
Information Technology Services Centre Google 2 factor authentication User Guide Description: This guide describes how to setup Two factor authentication for your Google account. Version: 1.0 Link: Effective
More informationCompanion Animals Amphibians & Reptiles Cats Dogs Horses Veterinary Science
Making the Character Connection with Companion Animals Amphibians & Reptiles Cats Dogs Horses Veterinary Science Being a person of good character means you follow the Six Pillars of Character SM everyday.
More informationBring Your Own Device (BYOD) Years 5 and 6. Sunnyhills School
Bring Your Own Device (BYOD) Years 5 and 6 Sunnyhills School Please note that BYOD is NOT a compulsory venture. This information is designed to inform you on things to consider if you choose to. Note there
More informationCyber-Safety Keeping Australians Safe Online
Cyber-Safety Keeping Australians Safe Online AIMIA Digital Policy Group DIGITAL POLICY GROUP Contents DIGITAL POLICY GROUP Facebook 2 Google 4 Yahoo!7 8 ebay 10 Summary 12 Key Contacts 12 Millions of people
More informationSupplier Directory: User Guide
Supplier Directory: User Guide Contents: How to search the directory 2 How to register your business 3 How to request a new password 6 How to update your business details 8 How to remove your account and
More informationDistrict 211 Technology. ipad Setup Instructions
District 211 Technology ipad Setup Instructions Turn power on & Start Setup Hold down the power button to turn on your ipad. The power button is located on the top right edge of the ipad. Slide the slider
More informationAcano solution. Acano Clients v1.7 Getting Started Guide. June 2015 76-1047-03-D
Acano solution Acano Clients v1.7 Getting Started Guide June 2015 76-1047-03-D Contents Contents 1 Introduction... 4 1.1 cospaces... 4 1.2 cospace Users... 4 1.3 The Acano Client... 5 2 Overview... 6 2.1
More informationAT&T U-verse App for iphone FAQ s
About AT&T U-verse What is AT&T U-verse for iphone? The AT&T U-verse for iphone is a service that provides all U-verse subscribers with the ability to view their U-verse TV Guide, manage their home DVR,
More informationFrequently Asked Questions About Mobile Banking/Deposit App
Frequently Asked Questions About Mobile Banking/Deposit App What is the myazstcu Mobile App? The myazstcu Mobile App is a service that enables members to access their account information, make deposits,
More informationIowa Park CISD BYOD Policy 2013-2014
Iowa Park CISD BYOD Policy 2013-2014 Table of Contents Table of Contents Table of Contents... 2 Purpose... 3 What is the D in BYOD.... 3 Guidelines... 3 Wireless Information...5 Responsible Use Policy...6
More informationStaying Safe Online. A Practical Guide for Parents and Children.
Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively
More informationGetting to know your ipad For Beginners
Getting to know your ipad For Beginners In this guide you will learn how to: o Switch your device on/off. o Tap, swipe, and pinch to navigate your device. o Secure your device set a password. o Change
More informationSetting up RDP on your ipad
This document will show you how to set up RDP (Remote Desktop Protocol) on your ipad. It will cover the following: Step 1: Creating an itunes account (if necessary) Step 2: Using the App Store Step 3:
More informationSarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service
Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre Genevieve Hupe School Resource Officer Ottawa Police Service From the choices below, which screen name is the worst for
More informationBYOD (ipads) Acceptable Use and Care Policy
BYOD (ipads) Acceptable Use and Care Policy Related Policies Computer Facilities and External Networks (ICT) Policy, including the Student Acceptable Use Agreement Communication Policy Mobile Phone and
More informationSkype for Samsung TV. Getting started with Skype 2. To sign in with an existing account: 3. Creating new account 4.
Getting started with Skype 2 To sign in with an existing account: 3 Creating new account 4 Skype for Samsung TV Screen display 5 Adding a contact 6 To call a contact 7 Receiving 8 History 9 Skype Options
More informationSale Grammar School Remote Desktop Services User Instructions
Sale Grammar School Remote Desktop Services User Instructions Sale Grammar School Remote Desktop Services allows Staff and Students access to a virtual school computer while connected to the internet at
More informationASUS WebStorage Client-based for Windows [Advanced] User Manual
ASUS WebStorage Client-based for Windows [Advanced] User Manual 1 Welcome to ASUS WebStorage, your personal cloud space Our function panel will help you better understand ASUS WebStorage services. The
More informationGet In, Get Unpacked, Get Connected.
Corporate Information & Computing Services. Get In, Get Unpacked, Get Connected. WELCOME to your New Home and to Unlimited Free Internet Welcome to your new university accommodation and to unlimited free
More information