Presentation is loading. Please wait.

Presentation is loading. Please wait.

Objective Day 1 The student will recognize computer safety rules and analyze computer ethics in relations to computer use and occupational use. (plagiarism)

Similar presentations


Presentation on theme: "Objective Day 1 The student will recognize computer safety rules and analyze computer ethics in relations to computer use and occupational use. (plagiarism)"— Presentation transcript:

1 Objective Day 1 The student will recognize computer safety rules and analyze computer ethics in relations to computer use and occupational use. (plagiarism)

2 Bell Work Day Monday What is Computer Safety and Computer Ethic? (Use the Internet Google search)

3 Monday Daily Agenda Do Pre-Bell for Monday- get handout from table and discuss orally Do Computer Safety Test & turn in scantrom. Introduce Computer Ethics-complete ethic Pre-test Do Ethic in Computer/classroom Handout & discuss answers orally and Computer Ethics PowerPoint. Write 10 COMMANDMENTS OF COMPUTER ETHICS in your notebook and do Copyright activity, if time. Homework for the week-Get Handout –Computer Ethics

4 What is Plagiarism? Plagiarism is using words or ideas of another as one's own words. How to avoid plagiarism? Every direct quotation must be identified by quotation marks and must be properly cited (Give the Source)

5 GO TO school/story.php?title=computer- ethics-quiz Pre-test-computer ethics school/story.php?title=computer- ethics-quiz

6 Is it Plagiarism? You read: "Students are studying about one-third as much as faculty say they ought to, to do well," said George D. Kuh, director of the survey and a professor of higher education at Indiana University at Bloomington. From: Young, Jeffrey R. Homework? What Homework? Chronicle of Higher Education, 49 (15).12/6/2002 You write: Most students spend about one-third as much time studying as faculty say they should. Yes! You must credit your source if you paraphrase text.

7 Is it Plagiarism? You read: “Nineteen percent of full-time freshmen say they spend only 1 to 5 hours per week preparing for classes…” From: Young, Jeffrey R. Homework? What Homework? Chronicle of Higher Education, 49 (15).12/6/2002. You write: Nineteen percent of full-time freshmen say they spend only 1 to 5 hours per week preparing for classes. YES! You need to use quotes and to cite your source

8 Is it Plagiarism? You read : "Students are studying about one-third as much as faculty say they ought to, to do well," said George D. Kuh, director of the survey and a professor of higher education at Indiana University at Bloomington. From: Young, Jeffrey R. Homework? What Homework? Chronicle of Higher Education, 49 (15).12/6/2002 You write : According to George D. Kuh, Indiana University at Bloomington, students study about one-third of the time that is expected by faculty. (Young, 2002) No. As long as you have included the Young article in your reference list, you have properly cited your source.

9 Is it Plagiarism? You read : “The tip given most consistently by professors and college officials is that students should simply do their homework. The most commonly prescribed amount is at least two hours of class preparation for every hour spent in the classroom…” From: Young, Jeffrey R. Homework? What Homework? Chronicle of Higher Education, 49 (15).12/6/2002 You write : College students should do their homework. No. Commonly known facts or ideas do not have to be cited. (Can you find this information in at least five sources?)

10 Is it Plagiarism? Yes! You need to credit the source of images and other media as well as text. Gray wolf (Canis lupus). © Jeff Lepore/Photo Researchers Wolf. Encyclopædia Britannica. Retrieved March 31, 2004, from Encyclopædia Britannica Online. Should we or shouldn’t we protect the gray wolf? By Ima Lamb Eng 110 Apr. 1, 2004 You find : Your title page :

11 Is it Plagiarism? When in doubt, cite it!

12 10 COMMANDMENTS OF COMPUTER ETHICS THOU SHALT NOT USE A COMPUTER TO HARM OTHER PEOPLETHOU SHALT NOT USE A COMPUTER TO HARM OTHER PEOPLE THOU SHALT NOT INTERFERE WITH OTHER PEOPLE COMPUTER WORKTHOU SHALT NOT INTERFERE WITH OTHER PEOPLE COMPUTER WORK THOU SHALT NOT SNOOP AROUND IN OTHER PEOPLE’S FILES.THOU SHALT NOT SNOOP AROUND IN OTHER PEOPLE’S FILES. THOU SHALT NOT USE A COMPUTER TO STEAL.THOU SHALT NOT USE A COMPUTER TO STEAL. THOU SHALT NOT USE A COMPUTER TO BEAR FALSE WITNESS.THOU SHALT NOT USE A COMPUTER TO BEAR FALSE WITNESS.

13 10 COMMANDMENTS OF COMPUTER ETHICS THOU SHALL NOT USE OR COPY SOFTWARE FOR WHICH YOU HAVE NOT PAID. 6.  THOU SHALL NOT USE OR COPY SOFTWARE FOR WHICH YOU HAVE NOT PAID.  7. THOU SHALT NOT USE OTHER PEOPLE ‘S COMPUTER RESOURCES WITHOUT AUTHORIZATION.  8. THOU SHALT NOT APPROPRIATE OTHER PEOPLE’S INTELLECTUAL OUTPUT.  9. THOU SHALT THINK ABOUT THE SOCIAL CONSEQUENCES OF THE PROGRAM YOU WRITE.  10. THOU SHALT USE A COMPUTER IN WAYS THAT SHOW CONSIDERATION AND RESPECT.

14 OBJECTIVE: The student will identify computer ethics rules and terminology. PREBELL DAY 2 EXPLAIN THIS COMPUTER ETHIC “Thou shall not use a computer to harm other people”

15 Tues. Daily Agenda COMPLETE PRE BELL ACTIVITY REVIEW PREVIOUS LESSON-DAY 1 COMPLETE NOTES ON 1O COMMANDMENTS OF COMPUTER ETHICS, if not completed on Mon. BEGIN HANDOUT-COMPUTER ETHICS TERMS GO TO TO LOOK UP COMPUTER TERMSwww.techterms.com DISCUSS COMPUTER TERMS AND IF TIME, DO COPYRIGHT ACTIVITY FROM MON. REVIEW TODAY LESSON—REMIND ABOUT HOMEWORK-DUE THURSDAY

16 Day 3-OBJECTIVE: The student will identify ways to safeguard against viruses PREBELL-DAY 3 EXPLAIN THE PURPOSE OF USING THE INTERNET

17 DAILY AGENDA-DAY 3 COMPLETE PRE BELL ACTIVITY REVIEW PREVIOUS LESSON-DAY 2-TECHTERMS COMPLETE NOTES ON PROTECTING YOUR COMPUTER FROM POWERPOINT BEGIN HANDOUT-PROTECTING YOUR COMPUTER AND YOURSELF see link on handout GO TO LOG IN: username: lsd password: grade search for cyberbullying to look for cyberbullying video REVIEW TODAY LESSON—REMIND ABOUT HOMEWORK-DUE THURSDAY

18 Way to safeguard your computer from viruses, etc. 1. Do not open that you don't know 2. Do not open Advertisements 3. Do Not open Face Book Ads 4. Downloading free games, movies, free music—Internet abuse

19 DAY 4 OBJECTIVE: THE STUDENT WILL IDENTIFY HOW TO USE THE INTERNET SAFELY PREBELL QUESTION-DAY 4 DESCRIBE TWO PRECAUTIONS WHEN USING THE INTERNET SAFELY. DOK2-PLD-PROF.

20 DAILY AGENDA –DAY 4 REVIEW DAY 1. COMPLETE DAY 4 PREBELL ACTIVITY & Collect Homework Today. 2 REVIEW DAY 1, 2, & 3 LESSON –Plagiarism, Computer Ethics, 10 Commandments of Computer Ethics, 10 Computer Ethics Terms, And Protecting Your Computer Handout 3. Complete Pretest Again for Review on Computer Ethic-See Teacher Website 4. Complete Handouts From Wed. Protecting Your Computer –See Website 5. GO TO LOG IN: username: lsd password: grade search for cyberbullying to look for cyberbullying video HOMEWORK-STUDY ALL COMPUTER ETHICS NOTES, HANDOUTS AND 10 Terms –Computer Ethics Test Friday

21 DAY 5 OBJECTIVE: The student will demonstrate their strengths & weaknesses on Computer Ethics DOK 2- PLD-P Friday Pre Bell Questions— Explain Plagiarism—Give an example of plagiarism. Turn in Pre-Bell Today

22 REVIEW WORDS FOR TEST CREATE A SENTENCE 1.PLAGIARISM 2.COPYRIGHT 3.CYBERCRIME 4.HACKER 5.VIRUS 6. WORM 7. ANTIVIRUS 8.ENCRYPTION 9.PHISHING 10 COMPUTER ETHICS


Download ppt "Objective Day 1 The student will recognize computer safety rules and analyze computer ethics in relations to computer use and occupational use. (plagiarism)"

Similar presentations


Ads by Google