BBMS iMac Lab Student Orientation

Slides:



Advertisements
Similar presentations
Developed by Technology Services 1:1 Laptop Initiative
Advertisements

Are you being a safe and successful digital citizen? E-safety
Internet Online Safety How to have FUN and Stay in Control.
Internet Safety James Fuller Internet Rules To Remember When asked by friends or strangers, online or offline, never share Account IDs and Passwords.
Securing Your iPad What can you do to make sure that your iPad is at school every day and is kept safe? Passcode lock Label your accessories.
Washburn High School Student “Responsible Use” Guidelines for Electronic Technologies.
e-safety and cyber bullying
Responsible Use Policy Technical Applications Mr. Hibbs, Mrs. Brau, & Coach Merkle Granbury Middle School.
Are you being a safe and successful digital citizen?
Created by Mr. Hemmert.  Have you ever received a mean or instant message? Have you ever sent one? This is called cyberbullying. A cyberbully uses.
When ing me, please be specific in the title of your and if attaching documents, please have the document specifically.
Using SWHS: The AUP [Acceptable Use Policy]
Logging onto the Computer for the first time And Signing the Acceptable Use Policy (AUP) for Using the Internet.
Mrs. Dennis South Media Specialist Mrs. Bakanas North & South Media Specialist Mrs. Martinez North Media Specialist Mrs. Kelley Media Assistant Miss VanArtsdalen.
Mastery Objective: To: Answer questions on the worksheet about the media center policies and resources in order to perform basic tasks and searches in.
Welcome to Technology Ms. Swartwout.
Tablet Camp 2015 Resource Guide for Students at Klein ISD 1:1 Campuses.
Digital Citizenship Grade Why are we here and what is Digital Citizenship? Part 1: What is Private Online? Part 2: Passwords Part 3: Responsibilities.
Do pictures always give truthful information? Can publishing it be hurtful??
MHMS eMac Lab Student Orientation How to Login, Use, Create, & Save Your Stuff! How to Login, Use, Create, & Save Your Stuff!
How to be Safe Online. Online Access How many of you go online? What are your favorite things to do online? Who accesses the Internet from their smart.
Acceptable Use Policy for RRISD Students. Acceptable Use for Students Using a computer makes school work fun! Just as there are rules in your classroom,
TUA for Primary Students This presentation was created to help students in Preschool – Grade 2 understand our district’s Technology Use Agreement before.
Welcome to Mrs. DeRita’s 4 th & 5 th grade Technology class I AM GLAD THAT YOU ARE HERE.
TECHNOLOGY USE AGREEMENT FOR STUDENTS GRADES 3-8 This presentation was created to help students understand the district’s Technology Use Agreement before.
A Discussion of Student Responsibility and the Upper Merion Area School District’s Acceptable Use Policy.
MY DIGITAL FOOTPRINT. WHAT IS A DIGITAL FOOTPRINT? Each time you log onto social media, you leave a trail behind you, mostly based on what you search.
MHMS eMac Lab Student Orientation How to Login, Use, Create, & Save Your Stuff! How to Login, Use, Create, & Save Your Stuff!
Computer Use Guidelines Business Lab. Computers are Important Tools! Internet Research Learning Software Word Processing Multimedia Presentations.
Welcome to Week 2 in the computer lab Let’s get started!
1.Read a book, magazine or the newspaper in paper or Internet format. 2.Do your homework. 3.Do research for assigned projects. 4.Work on PowerPoint and.
Mrs. Jenkins Review Elective Building Guidelines.
Library Orientation  Before School 1. Library is open by 6:30 AM 2. Do NOT need a pass 3. Will need to sign in 4. Must leave the library to.
FLHS TECHNOLOGY SURVIVAL GUIDE A QUICK GUIDE FOR STUDENTS.
You must study this PowerPoint, play the Rags to Riches game and take and pass the quiz before continuing with class assignments.
1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy.
By Hessahn yousofi.  Internet is a global system of interconnected computer networks, a computer that connects to the internet can access information.
YEAR 6’S GUIDE TO STAYING SAFE ON THE INTERNET. CHATTING When you are chatting to people online, try not to give out any personal information about yourself.
Aristotle, a great thinker, once said: “We are what we repeatedly do.”
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Welcome to Week 2 in the computer lab. Last week you learned step 1 of the morning routine. Today we will learn how to complete the entire routine!
Hondros College Student Mail System
Safer Internet Day.
As modern children, we have a huge number of electronic devices available to us. We might use computers, tablets, mobile phones or games consoles; for.
Keeping Children Safe Online
Gathering Information on your Topic
Technology Guidelines for Students
Welcome to Week 3 in the computer lab
Computer Lab 2012 Teacher: Mrs. Jordan.
Cape Romano Island – Gulf of Mexico after Hurricane Rita – April 2006
Computer Use Guidelines
Welcome to Mrs. DeRita’s 4th & 5th grade Technology class
Collaboration with Google Docs
STOP. THINK. CONNECT. Online Safety Quiz.
Digital Learning in Portree Primary School
CYBER- BULLYING.
Welcome to Technology Mrs. Hitt.
WELCOME TO CLASS!- FIND A SEAT!
Technology Guidelines for Students
Classroom Procedures Because I said so..
Ms. Swartwout SOON to be Mrs. Hitt
Digital Literacy and Internet Safety
How to be SAFE when you use the internet..
Responsible Use Policy
WELCOME TO TECHNOLOGY WITH MR. D
Internet Safety – Social Media
Uppingham Community College
NVOC Single Sign-On (SSO) for Students!
Kyrene Student Acceptable Use Policy Technology Guidelines
Welcome to Computer Science
Presentation transcript:

BBMS iMac Lab Student Orientation How to Login, Create, & Save Your Stuff! BBMS iMac Lab Student Orientation

Welcome to the iMac Lab and BBMS Server! Are you Ready to Login?

WAIT! Please Do NOT…do ANYthing until after you watch and listen to these directions.

iMac Lab Rules No food or drinks in the iMac Lab Report problems promptly Always use spell check and print preview, and THEN ask permission before printing. You may not print unless directed by a teacher. Students in lab must be accompanied by a teacher. Leave the room better than you found it. Always Log Out> Apple> logout your name

A Few More Warnings! Yahoo! Gmail, Hotmail, etc. NO EMAIL of any kind may be checked or looked at in this school. That means: Yahoo! Gmail, Hotmail, etc. NO Social Networking: Facebook, Twitter, Plurk, Xanga, Blogger, or MySpace, Friendster, ....EVER! No FREE GOOGLE Web or Image searching -- Use our Databases!

Aww, c’mon…Why No Google? Time + Academic & Appropriate = Not Reliable We don’t have time to look through 30 million hits and they’re not all academic or appropriate.

Our Databases are Faster & more Reliable! (and appropriate) Fewer Hits but Better Hits….All in one place! Reference, Magazine, Academic, & News Articles…AND Multimedia!

Using a Computer in school is a privilege and not a right. Consequences Using a Computer in school is a privilege and not a right. If you violate the HCPSS Acceptable Computer Use Policy and Agreement you will have a meeting with Mrs. Jameson and lose your computer privileges for the ENTIRE SCHOOL year. All work that otherwise would have been done on a computer IN school will have to be done by hand or out of school. Old-School Style!

Sign It, or Else! You MUST sign and return the document that says: Acceptable Use of Technology/ Internet Use Permission Form Turn it into your homeroom teacher…

BIG NETWORK CHANGES!

Your NETWORK FOLDER is BLUE and in the DOCK.

From now on, you will need to MANUALLY save your files to YOUR NETWORK FOLDER

First SAVE your files to the computer’s DESKTOP

At the end of the period, DRAG your new files to your network folder

Your files will NOT SAVE on the network unless you DRAG them to your network folder

If you switch computers, retrieve your files from your network folder

Ok….Got that now? Are you Ready to Login?

NEW! Student Login User Name: same ID k-12 Password: you pick it!

Purpose of Passwords They control who can get information They control who can change information They are used to prove you are who you say you are Purpose of Passwords

Who would want my password? A sibling A friend A criminal A sibling might try to get into your online gaming account. A friend might try to cause trouble for you or just play a “joke” by impersonating you on a social networking site. Career criminals guess or crack passwords for a living. Once criminals gain access to your private identity information, they can sell it to the highest bidder.

Consider This… First and foremost, NEVER give your password to anyone. Make your password something you can remember. Mix letters, numbers and symbols, and use case sensitivity (upper and lower case letters). Do not write it down. If you really, honestly forget your password, we can easily give you a new one. We'd rather set your password once a month because you forgot it than have someone find it written down and gain unauthorized access to your account.

Most Common PWs

On your own Log in and change your password when prompted. Make sure everything in the Dock loads properly (no question marks.) Log out and log back in at least two more times. Go to the BBMS homepage: http://bbms.hcpss.org Silently memorize your password. Repeat it to yourself slowly ten times.

Logging Out Always make sure you log out completely. If you are using the mobile labs, be sure to let the screen go totally black before closing the lid and putting it away. If you do not finish logging out, you may lose data or may not be able to log into another computer in the school. Always make sure to save all of your work before logging out!

Check yr PEEPS Am I using Personal responsibility? Is this appropriate for Everyone? Is it Educational? Do I have Permission? Is it Safe?

Personal responsibility Does my workspace look the same or better than I found it? Did I cite my sources, including pictures found online? Did I remember to back up my files and remove my key drive?

appropriate for Everyone Have I included information that may offend a person or group of people? Could someone interpret my work as bullying? Would this hurt someone’s feelings? Could this cause a disruption in the classroom?

Educational Am I using the computer for something related to school? Have I considered the 5 W’s of this website? Would a teacher approve of what is on my screen during class?

Permission Are the applications I have open approved by the teacher? Am I using approved databases to find information? Is a teacher in the room?

Safe Is my full name, address, phone number, and email kept private? Could what I am doing online cause me to get into trouble? Would my parents approve?

5 Ws of Web Evaluation Who What When Where Why

Who Who wrote the pages and are they an expert? Is a biography of the author included? How can I find out more about the author?

What What does the author say is the purpose of the site? What else might the author have in mind for the site? What makes the site easy to use? What information is included and does this information differ from other sites?

When When was the site created? When was the site last updated?

Where Where does the information come from? Where can I find out more about the sponsor of the site?

Why Why is this information useful for my purpose? Why should I use this information? Why is this page better than another?

Fact or Fiction It’s ok to share your phone number or address on the computer.

Fact or Fiction Students can purchase or stream music from iTunes or other online music sites.

Fact or Fiction I can go to the school’s website to find a teacher’s website or links to the homework helpers.

Fact or Fiction When I’ve finished all of my work, I can browse the net for reviews of Halo 3.