Ignition Discussion Questions
|
|
- Christian Clark
- 7 years ago
- Views:
Transcription
1 Ignition Discussion Questions Module 1: Choosing a Computer 1. Why is it important to compare features of a computer before making a purchase? What are the different features of a computer that people should consider before making their selection? 2. What is cloud computing, and what does it enable us to do? 3. What are some of the ways computers change and evolve over time? What do you predict computers will be like 20 years from now? Module 2: Wireless Communication 1. Is owning a cell phone a big responsibility? How can people be more responsible with using or paying for their phones? 2. What are the dangers of using a cell phone while driving? 3. What can people do either as passengers or drivers to prevent texting while driving? Module 3: The Viral World 1. What kinds of risks can come with using technology? How can people reduce those risks, especially when it comes to protecting their privacy and online identities? 2. Is it possible to spend too much time with technology? What signs might indicate that someone is overusing technology? 3. How can people keep their technology use in check? Module 4: Internet Resources and Credibility 1. What does it mean to plagiarize, and what are some ways that people can make sure they are NOT plagiarizing? 2. What are the consequences of plagiarism? 3. How do we use technology in our schoolwork? When does technology use cause a problem in school? Module 5: Creating Multimedia Products 1. How can technology help people to be creative or to express themselves and their ideas? 2. Why do people need to be careful about what they post or share online?
2 3. What is the purpose of copyright? What are some examples of copyright infringement? Module 6: Digital Relationships and Respect 1. What is cyberbullying? 2. Is cyberbullying different than regular bullying? How is it different? 3. What should a person do if he or she is cyberbullied? What can you do as a friend if you see someone being cyberbullied? 4. How can people your age help put an end to cyberbullying? Module 7: The Future of Technology and You 1. What are some ways that technology has changed various professions and careers? 2. What is STEM? What are STEM careers, and why are they important? 2. What are some new jobs that have been created by of technology? 3. How can people your age start planning for a career in technology now?
3 Ignition Discussion Questions - Teacher Answer Key Module 1: Choosing a Computer 1. Why is it important to compare features of a computer before making a purchase? What are the different features of a computer that people should consider before making their selection? It s important to choose a computer that matches your wants and needs (today and at least a few years down the road). Features to consider: cost, monitor size, portability, memory capacity (or RAM), wireless capabilities, performance speed (how well it works with many programs running at once), hard drive space (how much data will be stored), and graphics and sound capabilities (how well you ll edit and experience multimedia). 2. What is cloud computing, and what does it enable us to do? Cloud computing allows people to use applications without having to install them on their hard drive. With cloud computing, people can access their personal files at any computer with internet access because it removes the need to have them stored on their computers. Some examples include social networking sites and photo sharing sites. 3. What are some of the ways computers change and evolve over time? What do you predict computers will be like 20 years from now? It is estimated that computing power and memory capacity double roughly every two years, which means that every few years, computer manufacturers release products that have even better, faster processors, larger hard drives, and improved software to go along with it. Some people predict that computers will continue to get smaller and faster over time, though we can t know for sure. Module 2: Wireless Communication 1. Is owning a cell phone a big responsibility? How can people be more responsible with using or paying for their phones? People can be responsible with their phones by choosing a cell phone plan they can afford and by sticking to that plan (e.g., not going over their minutes). People can also be responsible with their phones by choosing not to text while driving, not to share
4 inappropriate or hurtful messages with others, and not to use phones in disruptive or disrespectful ways in class. 2. What are the dangers of using a cell phone while driving? Using a phone while driving is especially dangerous because it distracts people in three different ways. By looking at your phone, using your phone to text or dial, and thinking about what you re texting or saying, your hands, mind, and eyes are taken off the road. Research shows that texting while driving increases your chances of getting into an accident, and that s why it s against the law in many states. 3. What can people do either as passengers or drivers to prevent texting while driving? As a passenger, it s important to speak up and tell the driver about the dangers of texting while driving. You can also remind the driver that there can be legal consequences of texting while driving and offer to be a designated texter. As a driver, you can discuss ahead of time with friends and family that you won t return texts or calls while driving, make a pact not to text while driving with your friends, put your phone out of sight and out of reach before starting to drive, or simply turn your phone off and take advantage of the quiet time in the car. Module 3: The Viral World 1. What kinds of risks can come with using technology? How can people reduce those risks, especially when it comes to protecting their privacy and online identities? Some risks that come with using technology include computer viruses, identity theft, threats to personal privacy and security, and technology overuse. People can protect their privacy and online identities by limiting the amount of personal information they share online, creating strong passwords and changing them every two months, never accepting friend requests from people they don t know, and never opening attachments or downloading applications from sources they don t trust.
5 2. Is it possible to spend too much time with technology? What signs might indicate that someone is overusing technology? The consequences of overusing technology can lead to academic problems, being less connected to friends or family, health issues, or missing out on other opportunities, like extracurricular activities or social outings. 3. How can people keep their technology use in check? People can keep their technology use un check by setting goals for how much time to spend with technology each day, keeping track of their time spent on the computer or phone, turning off their phone when it might be distracting (like while driving, doing homework, or eating dinner with family), and finding other things to do with their time that don t involve technology. Module 4: Internet Resources and Credibility 1. What does it mean to plagiarize, and what are some ways that people can make sure they are NOT plagiarizing? Plagiarizing is when you try to pass off other people s work, including printed or online materials, images or media, as your own. People can avoid plagiarizing by always giving credit to the source, using quotation marks, checking their work against the original text, and asking their teacher if they are ever unsure of when or how to cite a source. 2. What are the consequences of plagiarism? The consequences of plagiarizing vary by school, but may include suspension or expulsion as well as getting a failing grade on an assignment. 3. How do we use technology in our schoolwork? When does technology use cause a problem in school? Some positive uses of technology for schoolwork include using tools, like presentation software, for projects, or finding credible online sources for research projects. Some negative uses would include using devices in disruptive or disrespectful ways, like texting in class or sharing answers to an assignment or quiz. Ask your teacher when and how it s appropriate to use technology for school work.
6 Module 5: Creating Multimedia Products 1. How can technology help people to be creative or to express themselves and their ideas? Technology allows people to be creators and producers of media. People may use tools like graphic or video editing software to create their own videos, and many people are creating their own personal websites (e.g., blogs, social networking profiles). Tools, like presentation software, can also be used creatively for school projects. 2. Why do people need to be careful about what they post or share online? Creating or producing online media comes with responsibility. People cannot always control their audience, so should make sure that they don t post anything online that would embarrass or jeopardize the reputation of themselves or others. What you post online can also spread rapidly and be impossible to delete or remove, so people should think before publishing something that they might later regret. 3. What is the purpose of copyright? What are some examples of copyright infringement? A copyright is something a person purchases in order to have exclusive legal rights to reproduce, publish, sell, or distribute something. Others must ask permission to reproduce, publish, sell or distribute anything that is copyrighted. Examples of copyright infringement include: Illegally downloading or sharing media, posting a copyrighted movie on your blog, or using a company s logo on your website without that company s permission. Module 6: Digital Relationships and Respect 1. What is cyberbullying? Cyberbullying is the act of using technology in a repeated way to target a person or group of people in a way that could embarrass, hurt, or make the recipient feel threatened or unsafe. Cyberbullying comes in many forms, but may include sending an angry or threatening text message, posting a mean rumor online, or creating a fake profile in someone s name to embarrass or humiliate that person.
7 2. Is cyberbullying different than regular bullying? How is it different? Cyberbullying often happens behind closed doors which can make it more difficult to initially identify. Unlike traditional bullying, cyberbullies often say or do things that they wouldn t necessarily do face- to face because they don t have to deal with seeing the person s reaction on the other side of the screen. At the same time, victims don t always report cyberbullying, which often lets the bullying continue and escalate. Finally, because of the viral nature of the internet, acts of cyberbullying can spread more rapidly and be even more devastating for victims. 3. What should a person do if he or she is cyberbullied? What can you do as a friend if you see someone being cyberbullied? Victims of cyberbullying should always save the evidence of the cyberbullying and share it with a trusted adult. They should also avoid responding or cyberbullying back and may consider blocking the cyberbully. If your friend is being cyberbullied, you should remind your friend of these steps and assure your friend that what happened is not his or her fault. 4. How can people your age help put an end to cyberbullying? People can help put an end to cyberbullying by always stepping up and intervening when they see it going on. People should always report any incidents of cyberbullying to a trusted adult. Consider starting a pledge at your school for students to commit to stepping up and stopping cyberbullying in its tracks. Module 7: The Future of Technology and You 1. What are some ways that technology has changed various professions and careers? Technology has changed a number of careers and fields, including medicine, engineering, business, and education, to name a few. For example, teachers today have new tools to integrate into the classroom, like slideshows and interactive diagrams to illustrate discussions and feedback. With technology, many businesses expand their markets online, making their products available to people all over the world via online purchases or downloads.
8 2. What is STEM? What are STEM careers, and why are they important? STEM stands for "science, technology, engineering and mathematics. A STEM career is any career that uses any of these disciplines. Doctors, forensic scientists, biochemists, marine biologists, and architects are a few examples of STEM careers. People with STEM careers are working to improve the world we live in. From developing advanced medical treatments to protecting our aquatic life from pollution, they're working to improve technologies so that society can grow and thrive. 3. What are some new jobs that have been created by of technology? Some jobs created by technology include graphic design, digital marketing, software engineering, web design, and programming. 4. How can people your age start planning for a career in technology now? People can start planning for a career in technology now by taking relevant classes, like math and computer science, throughout high school, and participate in relevant activities to gain experience in their field of interest. Students can also talk to their guidance or college counselor about what kinds of college or university programs to pursue based on their interests.
Course Overview and Outline
Course Overview and Outline The My Digital Life curriculum is comprised of seven modules that cover key concepts for building digital literacy. Each module contains between three and nine brief activities
More informationFAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:
FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful
More informationPortmarnock Community School ICT and Social Media Expected Use Policy. June 2013
Portmarnock Community School ICT and Social Media Expected Use Policy June 2013 1.0 Introduction Portmarnock Community School recognizes that access to Information and Communication Technology (ICT) gives
More informationBullying 101: Guide for Middle and High School Students
Bullying 101: Guide for Middle and High School Students A guide to the basics of bullying, what it is and isn t, the role of students, and tips on what you can do. 952.838.9000 PACERTeensAgainstBullying.org
More informationA bigger family, a better future.
A bigger family, a better future. Child sponsorship is changing for the better Sponsors like you are a vital part of our big, supportive family. Like us, you want the very best for your sponsored child.
More informationEanes Independent School District Responsible Use Guidelines for Technology
Eanes Independent School District Responsible Use Guidelines for Technology My student and I are committed to the Responsible Use Guidelines. By signing this, we commit to discussing and reviewing the
More informationCyberbullyNOT Student Guide to Cyberbullying
CyberbullyNOT Student Guide to Cyberbullying WHAT IS CYBERBULLYING? Cyberbullies use the Internet or cell phones to send hurtful messages or post information to damage people s reputation and friendships.
More informationSONOMA CHARTER SCHOOL STUDENT USE OF TECHNOLOGY POLICY
SONOMA CHARTER SCHOOL STUDENT USE OF TECHNOLOGY POLICY Date Approved: 4/16/2015 New technologies are modifying the way in which information may be accessed, communicated and transferred. Those changes
More informationTechnology Acceptable Use Policy
Technology Acceptable Use Policy Introduction San Gabriel Christian School recognizes that access to technology in school gives students greater opportunities to learn, engage, communicate, and develop
More informationOnly talk with people online that you know in person Time does not equal trust It doesn t mean you really know the person Be suspicious; ANY person worth having as a friend wouldn t ask you to put yourself
More informationGET CONNECTED, GET IN THE KNOW
GET CONNECTED, GET IN THE KNOW Online Respect and Responsibility Email the Internet cell phones BlackBerr ys instant messaging MP3 players Chances are you used at least one of these technologies today.
More informationAcceptable Use Policy Holy Spirit Catholic School
Acceptable Use Policy Holy Spirit Catholic School For the use of Computers, Mobile Devices, Internet Access, Google Apps for Education Suite, and Internet Applications Definitions User includes anyone,
More informationHEADS up. stop think connect
HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more
More informationthink before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney
think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! A Message from the District Attorney The use and capabilities
More informationToday s teens use technology more than ever. Most have
Today s teens use technology more than ever. Most have high-speed Internet access, which they use to send instant messages to their friends, create blogs and online videos, keep personal profiles on social
More informationCYBERBULLYING TEACHER S GUIDE:
TEACHER S GUIDE: CYBERBULLYING LEARNING OBJECTIVES Students will understand the meaning of cyberbully. Students will learn to recognize different forms of cyberbullying. Students will learn different strategies
More informationOnline Safety for Middle and High School
Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET
More informationAppropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness
Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Gordon Cooper Technology Center 2012 From http://onguardonline.gov/ Think Before You Share What you post could have a bigger
More informationPasswords Students should not share their assigned password, or attempt to discover the school Apple Id.
Alta Loma Christian School Acceptable Use Policy 1:1 ipad Program Revised January 20, 2014 Alta Loma Christian (ALCS) recognizes that access to technology in school gives students greater opportunities
More informationParent / Guardian Consent for Technology Use in Schools
Parent / Guardian Consent for Technology Use in Schools Our school uses computers and other mobile devices in the classroom to help increase student motivation and achievement. We will use laptop sets,
More informationJOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT
JOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT Dear Student and Parent/Caregiver, John Paul College s Intranet and elearning Resources (e.g.
More informationFront Range Christian School ipad Acceptable Use Policy
Introduction Front Range Christian School ipad Acceptable Use Policy Front Range Christian School recognizes that access to technology in school gives students greater opportunities to learn, engage, communicate,
More informationWakefield Public Schools Technology Acceptable Use Policy
Wakefield Public Schools Technology Acceptable Use Policy Vision (per Technology Strategic Plan 2013-2016) Wakefield Public Schools considers classroom technology to be an essential, imperative part of
More informationSchool Policy Regarding Computer Use, Technology and Internet Access
School Policy Regarding Computer Use, Technology and Internet Access Please read the following carefully, as it provides information about the responsibilities and expectations regarding use of school
More informationA Publication of the GCPS Information Management Division
GCPS A Publication of the GCPS Information Management Division Gwinnett County Public Schools is committed to providing information related to student technology use in a manner that is clear, concise,
More informationStudents Acceptable Use Policy for Electronic Resources Rules Summary
Students Acceptable Use Policy for Electronic Resources Rules Summary This document summarizes the rules for acceptable use of CAG electronic resources (known collectively as CAGNet). All students must
More informationDigital Citizenship Lesson Plan
Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship
More informationISD. What is BYOD? Hooks Independent School District
ISD What is BYOD? BYOD stands for Bring Your Own Device. BYOD is an initiative that will allow students who have personal technology devices to bring them to school to use them for educational purposes
More informationGrade 5 Unit. Lesson 2. Learning Goals. Facility. Materials. Cyberbullying and Lesson 2 of 4
Cyberbullying and Harrassment 30 Minutes* Curriculum Expectations Health and Physical Education - 1.3, C2.2, C3.2 Language: Media - 1.5 Lesson 2 Learning Goals By the end of this lesson, students will
More informationAuthorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy
Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS BYOD Bring Your Own Device AUP Authorized Use Policy User includes anyone, including employees, students, and guests, using
More informationParent Survey Question Bank
State Model for Educator Evaluation 1. Adults at this school challenge my child to do better. 2. Adults at this school treat students with respect. 3. Bullying is a problem at my child s school. 4. Classroom
More informationBYOD Bring Your Own Device
BYOD Bring Your Own Device STUDENT PRESENTATION Introduction Hillsborough County Public Schools is committed to developing a technology relevant and engaging learning environment for all students by providing
More informationEADS up. stop think connect
EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,
More informationBaldwin County Public Schools. Acceptable Use Policy
Introduction Baldwin County Public Schools Acceptable Use Policy Baldwin County Public Schools (BCPS) recognizes that access to technology in school gives students greater opportunities to learn, engage,
More informationAdministrative Procedures Memorandum A1300
Page 1 of 8 Date of Issue October 2013 Original Date of Issue June 2012 Subject INFORMATION AND COMPUTING TECHNOLOGY - APPROPRIATE USE GUIDELINES FOR STUDENTS References This APM replaces A1160 Computing
More informationRutherford County Schools Bring Your Own Device
Rutherford County Schools Bring Your Own Device Why BYOD (Bring Your Own Device) Rutherford County Schools is committed to ensuring students are provided an environment which maximizes the integration
More informationDiocese of Orlando / Office of Catholic Schools Student Technology Responsible Use Policy 2015-2016
Diocese of Orlando / Office of Catholic Schools Student Technology Responsible Use Policy 2015-2016 1.0 Introduction St. Thomas Aquinas Catholic School recognizes that access to technology in school gives
More informationInstructional Design Final Paper. TeaM 3J: Melissa Ferry, Terri Golden, Jaclyn Hawkins, Jennifer Lanza, Jenna Ward. University of Akron
TeaM 3J 1 Running head: INSTRUCTIONAL DESIGN FINAL PAPER Instructional Design Final Paper TeaM 3J: Melissa Ferry, Terri Golden, Jaclyn Hawkins, Jennifer Lanza, Jenna Ward University of Akron INSTRUCTIONAL
More informationHow To Deal With Social Media At Larks Hill J & I School
LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers
More informationEASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY. Inspire and Achieve
EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY Inspire and Achieve Introduction This document sets out the guidance on social networking and aims to: Set clear expectations of behaviour
More informationVentura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety
Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Student Policy--SP004 Ventura Charter School of Arts and Global Education ("School") recognizes the
More informationCode of Virginia, 1950, as amended, Sections 18.2 372, 18.2 374.1:1, 18.2 390, 22.1 70.2, and 22.1 78
Book Section Title Number Status SCS Policy Manual I INSTRUCTION Acceptable Use of Electronic Network Resources and Internet Safety IIBEA * R Active Legal 18 U.S.C. Sections 1460 and 2256 47 U.S.C. Section
More informationCyberbullying: What Parents Can Do to Protect Their Children
Cyberbullying: What Parents Can Do to Protect Their Children Sponsored by: 2013, PACER Center, Inc. As Technology Evolves, So Do the Ways to Bully Imagine the note, a piece of paper ripped from a notebook,
More informationStudent use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.
OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance
More informationMaking personal safety choices in the. Grade 1. Website basics: searching an online dictionary. stories and in the real world
DIGITAL CITIZENSHIP: a K-5 Library Curriculum, Concord Public Schools We ARE Digital Citizens: using technology in an Appropriate, Responsible and Effective Way of personal safety and in the context of
More informationTHE TRUTH ABOUT BULLIES
THE TRUTH ABOUT BULLIES OVERVIEW: The goal of this activity is to inform and educate students about bullying. The lesson plan asks students to consider a list of statements about bullies and to decide
More informationGeorgia Performance Standards. Health Education
FIRST GRADE Students in first grade learn about their body s systems and various health topics. They begin to understand how their decisions can impact their health and well-being now and in the future.
More informationSalisbury Township School District Guidelines for Guiding Staff, Students and Parents in Use of Social Media
What is social media? Social media is defined as any form of online publication or presence that allows end users to engage in multidirectional conversations in or around the content on the website. (Online
More informationTechnology Acceptable Use Policy. Introduction
Technology Acceptable Use Policy Introduction Shiloh Christian School recognizes that access to technology in school gives students greater opportunities to learn, engage, communicate, and develop skills
More informationREPUTATION MANAGEMENT SURVIVAL GUIDE. A BEGINNER S GUIDE for managing your online reputation to promote your local business.
REPUTATION MANAGEMENT SURVIVAL GUIDE A BEGINNER S GUIDE for managing your online reputation to promote your local business. About Main Street Hub: Main Street Hub is the voice for more local businesses
More informationDIGITAL CITIZENSHIP MODULE 1
Digital Etiquette DIGITAL CITIZENSHIP MODULE 1 Email, Texting, Cell Phone Usage, Ringtones, Social Networks, YouTube, Web Browsing, Shared Storage/Usage Space Define and apply the standards of use to daily
More informationACCEPTABLE/ RESPONSIBLE USE POLICY IIBE
ACCEPTABLE/ RESPONSIBLE USE POLICY IIBE The School Board provides technologies, including the internet, to promote educational excellence by facilitating resource sharing, innovation and communication.
More informationDigital Citizenship: Etiquette. My Online code & Breaking Down Hate Speech Grades 9-12
Digital Citizenship: Etiquette My Online code & Breaking Down Hate Speech Grades 9-12 Essential Question: What does it mean to do the right thing online? How can you create a community culture in which
More informationSocial Networking Policy
Feltonfleet School Social Networking Policy Introduction Objectives This policy sets out Feltonfleet School s policy on social networking. New technologies are an integral part of our lives and are powerful
More information1.1 This policy applies to students/staff/volunteers/visitors/parents and student councils, including representatives of the Winnipeg School Division.
PAGE: 1 of 7 1. GENERAL 1.1 This policy applies to students/staff/volunteers/visitors/parents and student councils, including representatives of the Winnipeg School Division. 1.2 The Winnipeg School Division
More informationThe Ideal Classroom Community Member: Establishing Expectations for Classroom Behavior
The Ideal Classroom Community Member: Establishing Expectations for Classroom Behavior Collaborative rule making promotes mutual respect, cooperation, self discipline and personal responsibility while
More informationE-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
More informationBullying Prevention. When Your Child Is the Victim, the Bully, or the Bystander
Bullying Prevention When Your Child Is the Victim, the Bully, or the Bystander What Is Bullying? Bullying is not a conflict or a fight. Bullying is physical, verbal, or emotional abuse that is deliberate,
More informationDallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences
Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying
More informationi-safe America Internet Safety Tips for Parents
i-safe America Internet Safety Tips for Parents Online predators are out there. They can infect your computer with viruses, they want to steal your personal information and possibly your identity, and
More informationSibford School Student Computer Acceptable Use Policy
Introduction Sibford School Student Computer Acceptable Use Policy The use of the latest technology is actively encouraged at Sibford School but with this comes a responsibility to protect both students
More informationRevised: 6-04, 8-09, 1-12 REGULATION #5420
Adopted: 9-03 PORTAGE PUBLIC SCHOOLS Revised: 6-04, 8-09, 1-12 REGULATION #5420 SUBJECT: Electronic Communications, Internet Safety & Acceptable Use Agreement All PPS electronic information resources are
More informationSTOP. THINK. CONNECT. Online Safety Quiz
STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.
More informationWebsites & Copyright. INFORMATION SHEET G057v12 April 2014. info@copyright.org.au www.copyright.org.au
INFORMATION SHEET G057v12 April 2014 Websites & Copyright This information sheet is for web developers, bloggers, website designers, startups, businesses and anyone interested in copyright issues relevant
More informationIowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests
Iowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests The Iowa-Grant School District has invested significantly in technology that offers vast, diverse, and
More informationVail School District Acceptable Use Policy 2015 2016
Vail School District Acceptable Use Policy 2015 2016 You have a wonderful opportunity before you! You have the opportunity to use the school's technology resources for your education. These resources will
More informationUNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET
UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET SPEAKING NOTES FOR GRADES 4 TO 6 PRESENTATION SLIDE (1) Title Slide SLIDE (2) Key Points It can be really
More informationDevice: Refers to any technology that boys bring to use to connect to the school wireless network in the BYOD Program.
Lindisfarne College INFORMATION COMMUNICATION TECHNOLOGY (ICT) and BRING YOUR OWN DEVICE (BYOD) User Agreement Terms BYOD: Bring Your Own Device refers to the program whereby boys are permitted to bring
More informationSocial Media Guidelines Resource
Social Media Guidelines Resource ERASE Student Advisory Introduction The purpose of this document is to provide best practice information and guidance to students, parents and teaching staff regarding
More informationTalking to our children about Violence and Terrorism: Living in Anxious times
Talking to our children about Violence and Terrorism: Living in Anxious times Living in Anxious Times: Introductory Remarks Since the September 11 attack America has changed. Children and adults alike
More informationCyberbullying. How common is cyberbullying?
Cyberbullying Bullying is aggressive behavior that is intentional and involves an imbalance of power or strength. Usually, it is repeated over time. Traditionally, bullying has involved actions such as:
More informationMaking a Video Year Six
Making a Video Year Six Unit Overview This children introduces the idea of using photos and videos within a multimedia presentation. Children will cover: - Using a digital camera to take photographs and
More informationINFORMATION SERVICES SOCIAL MEDIA GUIDE FOR STAFF
INFORMATION SERVICES SOCIAL MEDIA GUIDE FOR STAFF go.qub.ac.uk/socialmedia WHY ARE SOCIAL MEDIA TOOLS IMPORTANT TO QUEEN S UNIVERSITY? The term social media is used to describe a range of communication
More informationTraffic Safety Quiz Show. Grade level: 4/5
Traffic Safety Quiz Show Grade level: 4/5 Introduction: In this activity, students play a game that allows them to demonstrate and develop bicycle and pedestrian safety knowledge. The game is based on
More informationClare Middle School. Which should I bring? PLAN
Clare Middle School BYOD Wish you could take notes on your lap top? Need your ipad to help you research? Why can t you use your calculator app on your cell phone in math? Starting September 4, 2012, Clare
More informationCyber-bullying. Cyber-bullying: A Digital Epidemic White Paper
Cyber-bullying Cyber-bullying: A Digital Epidemic White Paper What is Cyber-bullying? The past two decades have witnessed a virtual explosion in new technology that has been eagerly embraced by adolescents
More information2 nd - Watch My Online Neighborhood Video: https://www.commonsensemedia.org/videos/my- online- neighborhood
K- Going Places Safely Essential Question: How do I go places safely on the computer? Students will: discover the Internet can be used to visit far- away places and learn new things; compare how staying
More informationLee County School District
Lee County School District Acceptable Use Policy This Acceptable Use Policy outlines the guidelines and behaviors that users are expected to follow when using school technologies or when using personally-owned
More informationE-Safety Issues and Online Safety. Parents Evening
E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children
More information4. The Importance of Internet Use in the Primary Curriculum
Policy Contents 1. Introduction 2. Disability 3. Writing and Reviewing the e-safety Policy 4. The Importance of Internet Use in the Primary Curriculum 5. The Benefits of Using the Internet in Education
More informationInternet Acceptable Use Policy
1. Overview Quincy College provides Internet access to students, faculty, staff, and administration as part of its educational mission. When the Internet is used appropriately, it can provide a wealth
More informationYPS Technology, Internet, and Learning Management Systems (LMS) Acceptable Use Agreement (AUP)
YUKON PUBLIC SCHOOLS: DISTRICT POLICY BJ-R1 YPS Technology, Internet, and Learning Management Systems (LMS) Acceptable Use Agreement (AUP) To ensure that our students and employees become proficient in
More informationChristian Academy of Knoxville Technology Responsible Use Agreement 2015-2016
Christian Academy of Knoxville Technology Responsible Use Agreement 2015-2016 PURPOSE Christian Academy of Knoxville provides technology resources for the school community with a belief that the educational
More informationArchbishop Beck Catholic Sports College
Archbishop Beck Catholic Sports College E Safety Policy Ratified: May 2014 Ratified by: Governors Staffing Committee Review: May 2017-1 - - 2 - 1. Development/Monitoring/Review of this Policy This e-safety
More informationUTMB s Guide for Social Media Do s and Don ts
UTMB s Guide for Social Media Do s and Don ts Introduction UTMB understands the role of social media as a way to facilitate communication amongst our university community and the world. Social media use
More informationSpringfield Public Schools
Springfield Public Schools BULLYING POLICY Approved by School Committee May 13, 2010 Amended March 6, 2014 Amended December 5, 2014 SPRINGFIELD PUBLIC SCHOOLS BULLYING PREVENTION POLICY INTRODUCTION Bullying
More informationUniversity Schools Social Media Guidelines for Employees
University Schools Social Media Guidelines for Employees Purpose of Social Media Guidelines All University Schools Laboratory Employees are subject to the Ball State University Social Media Policy available
More informationUnderstand What s Going On
Internet Safety Tips For Dummies In This Book Recognizing how online risks occur Staying safer with technology Taking care with shared photos Understanding how crooks collect information Reporting fraud
More informationSocial Networking Policy
Social Networking Policy Policy Date June 2013 Review Date June 2015 Section 1: Introduction 1.1 Objectives 1.1.1 This policy sets out West Row Primary School s policy on social networking. New technologies
More informationPlagiarism and Cheating: Definitions, Examples and Consequences. Woodgrove High School
Plagiarism and Cheating: Definitions, Examples and Consequences Woodgrove High School What is Plagiarism? According to the Merriam-Webster Online Dictionary, to "plagiarize" means to steal and pass off
More informationBasic lesson time includes activity only. Introductory and Wrap-Up suggestions can be used
U UNPLUGGED Digital Citizenship Lesson time: 30 Minutes to delve deeper when time allows. Basic lesson time includes activity only. Introductory and Wrap-Up suggestions can be used LESSON OVERVIEW In collaboration
More informationReview VIDEO WORKSHEET. Your Digital Identity A Permanent Step #300005. Name: Hour:
#300005 Name: Hour: VIDEO WORKSHEET Review Directions: After watching Digital Footprint: Watch Where You Step, answer the following questions. Your Digital Identity A Permanent Step 1. What is a digital
More informationBring Your Own Device (BYOD) Policy
Bring Your Own Device (BYOD) Policy Purpose is committed to supporting student learning experiences within a highly functioning environment. Our classrooms are reliant on a range of leading-edge technologies
More informationBC s Digital Literacy Framework (DRAFT)
BC s Digital Literacy Framework (DRAFT) Using standards-based techniques, a collaborative teaching environment enriched through creative integration of technology tools takes learning beyond standardized
More informationBUILDING DIGITAL LITERACY PURPOSE DEFINING DIGITAL LITERACY USING THIS GUIDE
BUILDING PURPOSE In today s society, it is critical for students to be able to use the vast amount of technology available to them. Computer literacy will provide students with skills they need to succeed
More informationDracut Public Schools Technology Acceptable Use Policy Revised 2014
1 Dracut Public Schools Technology Acceptable Use Policy Revised 2014 The Dracut Public Schools (DPS) encourages the use of information technology to assist staff and students with academic success, preparation
More informationRelated KidsHealth Links Articles for Kids:
Grades 3 to 5 Personal Health Series KidsHealth.org/classroom Teacher s Guide This guide includes: Standards Related Links Discussion Questions Activities for Students Reproducible Materials Standards
More informationFaculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy
Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy Mountain Home School District is responsible for securing its network and computer systems against unauthorized
More informationE-safety: Protecting your child online. Information for parents
E-safety: Protecting your child online Information for parents Introduction How children use the internet All children use computers at school, at home or in places like libraries and clubs, and schools
More informationHome-School Agreement
Home-School Agreement Why do we have a Home-School Agreement? As a School we aim to provide an outstanding education, both within and beyond the classroom, which enables all our students to realise and
More information