Objective Day 1 The student will analyze computer ethics in relations to computer use and occupational use. (plagiarism) Bell Work Day Monday What is Computer Safety and Computer Ethic? (Use the Internet Google search) Monday Daily Agenda
Do Pre-Bell for Monday- get handout from table and discuss orally Do Computer Safety Test & turn in scantrom, if not done Friday. Introduce Computer Ethics-complete Computer Ethic Pre-test Online-Get link from teacher website Do Ethic in Computer/classroom Handout & discuss answers orally and Computer Ethics PowerPoint. Write 10 COMMANDMENTS OF COMPUTER ETHICS in your notebook and do Copyright activity, if time. Homework for the week-Get Handout Computer Ethics
Closure: Wrap up with a review question learned today GO TO http://www.proprofs.com/quiz-sch ool/story.php ?title=computer-ethics-quiz Pre-test-computer ethics What is Plagiarism? Plagiarism is using words or ideas of another as one's own words. How to avoid plagiarism? Every direct quotation must be identified by quotation marks and must be properly cited (Give the
Source) Yes! You must Is it Plagiarism? credit your source You read: "Students are studying about one-third as much as faculty say they ought to, to do well," said George D. Kuh, director of the survey and a professor of higher education at Indiana University at Bloomington.
From: Young, Jeffrey R. Homework? What Homework? Chronicle of Higher Education, 49 (15).12/6/2002 if you paraphrase text. You write: Most students spend about one-third as much time studying as faculty say they should. YES! You need to use quotes and to cite your source
Is it Plagiarism? You read: Nineteen percent of full-time freshmen say they spend only 1 to 5 hours per week preparing for classes From: Young, Jeffrey R. Homework? What Homework? Chronicle of Higher Education, 49 (15).12/6/2002. You write: Nineteen percent of full-time freshmen say
they spend only 1 to 5 hours per week preparing for classes. No. As long as you have included the Young article in your reference list, you have properly cited your source. Is it Plagiarism? You read: "Students are studying about one-third as much as faculty say they ought to, to do well," said George D. Kuh, director of the survey and a professor of higher education at Indiana University at Bloomington.
From: Young, Jeffrey R. Homework? What Homework? Chronicle of Higher Education, 49 (15).12/6/2002 You write: According to George D. Kuh, Indiana University at Bloomington, students study about one-third of the time that is expected by faculty. (Young, 2002) Is it Plagiarism? You read: The tip given most consistently by professors and college officials is that students should simply do their homework. The most commonly prescribed amount is at least two hours of class
preparation for every hour spent in the classroom From: Young, Jeffrey R. Homework? What Homework? Chronicle of Higher Education, 49 (15).12/6/2002 No. Commonly known facts or ideas do not have to be cited. (Can you find this information in at least five sources?) You write: College students should do their homework.
Is it Plagiarism? You find: Yes! You need to credit the source of images and other media as well as text. Your title page: Gray wolf (Canis lupus). Jeff Lepore/Photo Researchers Wolf. Encyclopdia Britannica. Retrieved March 31, 2004, from Encyclopdia Britannica Online.
Should we or shouldnt we protect the gray wolf? By Ima Lamb Eng 110 Apr. 1, 2004 Is it Plagiarism? When in doubt, cite it! 10 COMMANDMENTS OF COMPUTER ETHICS
THOU SHALT NOT USE A COMPUTER TO HARM OTHER PEOPLE THOU SHALT NOT INTERFERE WITH OTHER PEOPLE COMPUTER WORK THOU SHALT NOT SNOOP AROUND IN OTHER PEOPLES FILES. THOU SHALT NOT USE A COMPUTER TO STEAL. THOU SHALT NOT USE A COMPUTER TO BEAR FALSE WITNESS. 10 COMMANDMENTS OF
COMPUTER ETHICS 6. THOU SHALL NOT USE OR COPY SOFTWARE FOR WHICH YOU HAVE NOT PAID. 7. THOU SHALT NOT USE OTHER PEOPLE S COMPUTER RESOURCES WITHOUT AUTHORIZATION. 8. THOU SHALT NOT APPROPRIATE OTHER PEOPLES INTELLECTUAL OUTPUT.
9. THOU SHALT THINK ABOUT THE SOCIAL CONSEQUENCES OF THE PROGRAM YOU WRITE. 10. THOU SHALT USE A COMPUTER IN WAYS THAT SHOW CONSIDERATION AND RESPECT. OBJECTIVE: The student will identify ways to safeguard against computer viruses, worms, etc.; and safeguards against hardware theft and vandalism by using computer ethics rules and terminology. PREBELL DAY 2 EXPLAIN THIS COMPUTER ETHIC Thou shall not use a computer to harm other people
Tues. Daily Agenda COMPLETE PRE BELL ACTIVITY REVIEW PREVIOUS LESSON-DAY 1 COMPLETE NOTES ON 1O COMMANDMENTS OF COMPUTER ETHICS, if not completed on Mon. BEGIN HANDOUT-COMPUTER ETHICS TERMS GO TO www.techterms.com TO LOOK UP COMPUTER TERMS DISCUSS COMPUTER TERMS AND IF TIME, DO COPYRIGHT ACTIVITY FROM MON AND BEGIN WEB QUESTPROTECTING YOUR COMPUTER -HANDOUT REVIEW TODAY LESSONREMIND ABOUT HOMEWORK-DUE THURSDAY CLOSURE: WRAP UP WITH A REVIEW QUESTION. Day 3-OBJECTIVE: The student will identify how
to use the Internet safely, legally, and responsibly. PREBELL-DAY 3 EXPLAIN THE PURPOSE OF USING THE INTERNET DAILY AGENDA-DAY 3 COMPLETE PRE BELL ACTIVITY REVIEW PREVIOUS LESSON-DAY 2-TECHTERMS COMPLETE NOTES ON PROTECTING YOUR COMPUTER FROM POWERPOINT BEGIN HANDOUT-PROTECTING YOUR COMPUTER AND YOURSELF see link on handout GO TO www.brainpop.com
LOG IN: username: lsd password: grade --search for cyberbullying to look for cyberbullying video CLOSURE: REVIEW TODAY LESSONREMIND ABOUT HOMEWORK-DUE THURSDAY and POST TEST-FRIDAY Way to safeguard your computer from viruses, etc. 1. Do not open e-mail that you don't know 2. Do not open Advertisements 3. Do Not open Face Book Ads
4. Downloading free games, movies, free musicInternet abuse DAY 4 OBJECTIVE:-The student will review and analyze social and ethical issues related to technology in the context of the Law, Public Safety, Corrections and Security career cluster PREBELL QUESTION-DAY 4 DESCRIBE TWO PRECAUTIONS WHEN USING THE INTERNET SAFELY. DOK2-PLD-PROF.
DAILY AGENDA DAY 4 REVIEW & RESEARCH DAY 1. COMPLETE DAY 4 PREBELL ACTIVITY & Collect Homework Today. 2 REVIEW DAY 1, 2, & 3 LESSON Plagiarism, Computer Ethics, 10 Commandments of Computer Ethics, 10 Computer Ethics Terms, And Protecting Your Computer Handout and Copyright. 3.Research info on Google about Law & Safety Careers as it relates to Computer Ethics and share report with class 4. Complete Pretest Again for Review on Computer Ethic-See Teacher Website 5. Complete Handouts From Wed. Protecting Your Computer See Website, if not completed from Wed. Activity. 6. GO TO www.brainpop.com, if not completed from Wed. Activity LOG IN: username: lsd password: grade search for cyberbullying to look for cyberbullying video 7. HOMEWORK-STUDY ALL COMPUTER ETHICS NOTES, HANDOUTS AND 10 Terms Computer Ethics Test Friday 8. ALSO, COMPUTER SAFETY RULES MASTERY 100% RETEST- DUE FRIDAYSTUDY-WRITE THE RULES DOWN YOU MISSED
9. Closure Activity: Review Question for Today. REVIEW WORDS FOR TEST CREATE A SENTENCE, More Practice 1. 2. 3. 4. 5. PLAGIARISM COPYRIGHT CYBERCRIME HACKER VIRUS
6. WORM 7. ANTIVIRUS 8.ENCRYPTION 9.PHISHING 10 COMPUTER ETHICS DAY 5 OBJECTIVE: The student will demonstrate their strengths & weaknesses on Computer Ethics DOK 2-PLD-P Friday Pre Bell Questions
Explain PlagiarismGive an example of plagiarism. Turn in Pre-Bell Next Friday FRIDAY DAILY AGENDA 1. COMPLETE DAY 5 PREBELL ACTIVITY DO NOT TURN IN TODAY TURN IN NEXT WEEK 2 REVIEW DAY 1, 2, & 3 LESSON Plagiarism, Computer Ethics, 10 Commandments of Computer Ethics, 10 Computer Ethics Terms, And Protecting Your Computer Handout and Copyright. 3. COMPLETE POST TEST UNIT 1 COMPUTER ETHICS 4. COMPLETE MASTERY COMPUTER SAFETY TEST 100% - DUE TODAY, ALSO, IF YOU DID NOT MASTER IT WITH 100% 5. COMPLETE ANY ICT1 MAKE UP WORK, AT THIS TIME FOR THIS WEEK
6. STUDENTS CAN PRACTICE ON ACADEMIC GAMES, SUCH AS COOL MATH ONLY. 7. Closure Activity: Review Question for Today. HOW DID YOU DO ON YOUR POST-TEST COMPUTER ETHICS AND HOW CAN YOU IMPROVE ON THE NEXT TEST?
C(s, graphite) + ½ O2(g) → CO(g) Calculating Standard Enthalpy Change for a Reaction Any reaction can be written as the sum of formation reactions (or the reverse of formation reactions) for the reactants and products. The DH° for the...
A surface examination is made to confirm the presence of or to delineate surface or near-surface flaws. It may be conducted by a magnetic particle method, liquid penetrant method, eddy current method or electrical contact method.
The New European Surgical Academy (NESA) An Introduction. August 2017 "Throughout history the authorities and systems were the main obstacles for any medical development." ... Location of the Academy: Unter den Linden 21. 10117 Berlin. Germany. Phone:
p. 125, HW 4-5, #2) Determining Density from slope of mass vs. volume graph. 2) A graph of mass vs volume data is given below for a gummy bear. p. 125, HW 6-1, #2) Determining Density from slope of mass...
Muscular System Muscles are responsible for all types of body movement ... anterior urogenital triangle posterior anal triangle The Appendicular Muscles Figure 11-13a The Appendicular Muscles Figure 11-13b The Appendicular Muscles Position and stabilize pectoral and pelvic girdles Move upper...
[email protected] Legacy System - 30 year old mainframe Completed analysis of best practices and decided to buy a best -of--breed solution Needed a system for the future Lawson Value Customer Pain Points Results UWS can distinguish itself on the basis...
(Process and analysis are more important that correctness) General Terminology and Integumentary System TEST! 56 points Minimal Proficiency is 34 Anatomy Coloring Matilda—review on your own sheet/make up your own questions (20ish) 5 skin Anatomy stations—set up as a lab...
Ready to download the document? Go ahead and hit continue!