Welcome!

This Blog is Awesome!!!!

Wednesday, August 31, 2011

Computer

Haider, Ali. "Laptop Computer Free Photo." Stockvault.net - Free Stock Photos and Free Images. Curly Eskimo Communities, 19 Dec. 2009. Web. 31 Aug. 2011. <http://www.stockvault.net/photo/112447/laptop-computer>.

CD's

"Cd Free Photo." Stockvault.net - Free Stock Photos and Free Images. Curly Eskimo Communities, 18 Apr. 2011. Web. 31 Aug. 2011. <http://www.stockvault.net/photo/122236/cd->.


Monday, August 29, 2011

Test review 3


Multiple Choice
Choose the best answer
___ 1. Which of the following is not a Level III offense? a) Damaging and/or destroying and/or altering school computer hardware and/or
software by any method including, but not limited to, the use of computer
software viruses or other electronic means. b) Improper use of telecommunications devices, authorized or not. c) Inappropriately using instructional materials including computers, computer
systems, and other technology. d) Tampering with, changing, or altering records or documents of the District by any
method, including, but not limited to, computer access or other electronic means.
___ 2. What level offense is the answer to question #1? a) Level I
b) Level II. c) Level IV. d) Level V.
___ 3. Students should not use class time to play online games because of which district guideline? a) Agree to abide by all Internet safety guidelines that are provided by the school and to complete all
assignments related to Internet safety. b) Students will use technology resources productively and responsibly for school-related purposes. c) Students will not attempt to bypass, or circumvent, District security settings or Internet filters. d) Electronic communication may be monitored at any time by designated District staff to ensure appropriate
use for educational or administrative purposes.
___ 4. Students should not use proxies because of which district guideline? a) Agree to abide by all Internet safety guidelines that are provided by the school and to complete all
assignments related to Internet safety. b) Students will use technology resources productively and responsibly for school-related purposes. c) Students will not attempt to bypass, or circumvent, District security settings or Internet filters. d) Electronic communication may be monitored at any time by designated District staff to ensure appropriate
use for educational or administrative purposes.
___ 5. Students should be careful how they present themselves on all social media because of which guideline? a) Agree to abide by all Internet safety guidelines that are provided by the school and to complete all
assignments related to Internet safety. b) Students will avoid using any technology in such a way that would disrupt the activities of others. c) Students will be held responsible for how they represent themselves and their schools and District in all
online activities, including on social network sites such as Facebook or MySpace. d) Electronic communication may be monitored at any time by designated District staff to ensure appropriate
use for educational or administrative purposes.
___ 6. Students should not let others use their computer accounts because a) Students are to avoid using technology in a way that is disruptive of others. b) Students should abide by all internet safety guidelines. c) Students will be held responsible for inappropriate use of their account, even if it is by someone else. d) Electronic communication may be monitored at any time by designated District staff to ensure appropriate
use for educational or administrative purposes.
___ 7. Students should not post their full name or location online, or information or images that may reveal this information online, because:
a) It may be disruptive of others. b) It goes against internet safety guidelines. c) It may be interpreted as an attempt to bypass district security settings or filters. d) It may be monitored at any time by designated District staff.

Thursday, August 25, 2011

Test Review 2


Matching
Match the numbers on the right to the level of misconduct, and consequence on the left. More than one question may be at the same level.
a) Level I Detention, student teacher conference
b) Level II Detention, Parent Notification, and/or Suspension
c) Level III Suspension, ISS, or DAEP
True or False
1. Inappropriately using instructional materials including computers, computer systems, and other technology.
2. Damaging and/or destroying and/or altering school computer hardware and/or software by any method including, but not limited to, the use of computer software viruses or other electronic means.
3. Tampering with, changing, or altering records or documents of the District by any method, including, but not limited to, computer access or other electronic means
___ 4. Vandalism is prohibited. This includes but is not limited to modifying or destroying equipment, programs, files, or settings on any computer or other technology resource.
___ 5. Refrain from the use of or access of files, software, or other resources owned by others without the owner’s permission.
___ 6. All internet sources are factual; and that the school is responsible for any inaccurate information obtained from the Internet.
___ 7. Understand that District administrators will deem what conduct is inappropriate use if such conduct is not specified in this agreement.
___ 8. Agree to abide by all Internet safety guidelines that are provided by the school and to complete all assignments related to Internet safety.
___ 9. Students have the responsibility for the care and return of textbooks, library books, technology, and materials and may be charged for replacement or damage of these books and/or materials.
___ 10. Follow all guidelines set forth by the District and/or their teachers when publishing schoolwork online (e.g. to a website, blog, wiki, discussion board, podcasting, or video server).
___ 11. District guidelines apply only to stand-alone computers connected to the network/Internet.
___ 12. The District makes no warranties of any kind, whether expressed or implied, for the services it is providing and is not responsible for any damages suffered by users.
___ 13. The District will cooperate fully with local, state, or federal officials in any investigation concerning or relating to misuse of the District’s electronic communications system.

Tuesday, August 23, 2011

Test Review


Matching
Students will use computers in conformity with laws of the United States and the State of Texas. Violations include, but are not limited to, the following:
1- Criminal Acts
2- Libel Laws
3- Copyright Violations
True or False
a) Publicly defaming people through either published (or the publishing of) material on the Internet, email, etc.
b) Copying, selling, or distributing copyrighted material without the express written permission of the author or publisher (users should assume that all materials available on the Internet are protected by copyright); engaging in plagiarism (using others’ words or ideas as your own).
c) “hacking” or attempting to access computer systems without authorization, harassing email, cyber bullying, cyber stalking, child pornography, vandalism, and/or unauthorized tampering with computer systems.
___ 4. Email and other electronic communication by students is confidential.
___ 5. Electronic communication may be monitored at any time by designated District staff to ensure appropriate use for educational or administrative purposes.
___ 6. Students may allow others to use their account names and passwords or use those of others. ___ 7. Be polite and use appropriate language in email messages, online postings, and other digital communications.
___ 8. Not use computers, handheld computers, cell phones, personal digital devices, or the Internet to post or send hate or harassing mail, pornography; make discriminatory or derogatory remarks about others; or engage in bullying, harassment, or other antisocial behaviors either at school or at home.
___ 9. Students will be held responsible for how they represent themselves and their schools and District in all online activities, including on social network sites such as Facebook or MySpace.
___ 10. Students are encouraged to pretend to be someone else when online to protect their own information. ___ 11. Students will avoid using any technology in such a way that would disrupt the activities of others. ___ 12. Students will use technology resources productively and responsibly for school-related purposes. ___ 13. Students will not attempt to bypass, or circumvent, District security settings or Internet filters.
___ 14. As long as it is for educational purposes only, students are exempt from copyright laws. ___ 15. Inappropriate use of technology and computer systems can result in ISS and other consequences.