Presentation is loading. Please wait.

Presentation is loading. Please wait.

Sixth Grade Computer Orientation AUGUST 12, 2015.

Similar presentations


Presentation on theme: "Sixth Grade Computer Orientation AUGUST 12, 2015."— Presentation transcript:

1 Sixth Grade Computer Orientation AUGUST 12, 2015

2 AGENDA  Welcome  Computer Assignment  How to Care for your Computer  Authorization of Electronic Access  Internet Safety  Insurance  Log-ins, Intranet, Student Webpages, Saving Work

3 Computer Assignment  Computers will be assigned within the first week of school.  When computers are assigned:  Check to make sure your name, computer number and serial number match your computer.

4 Proper Care of Computers  Computers must be used on a desk or hard surface at all times.  Computers are used by the assigned users ONLY! (Do not share your computer with your friends.)

5 Proper Care  Use two hands when transporting the computer.  Use hand sanitizer or wash your hands before and after computer use.  Keep food and drink away from the computers & out of computer bags.  Open the laptop slowly & carefully. Never bend the screen all the way back.

6 Proper Care  Power your computer down at the end of the day. Do not leave it running all the time.  Always plug your computer in the cart at the end of the day.  Do not pick at or slam keys on the keyboard.

7 Raise your hand if you can name one way to properly use a computer!

8 Authorization for Electronic Access Each staff member must sign this Authorization as a condition for using the Springfield Ball Charter and the District’s Electronic Network connection. Each student AND his or her parent(s)/guardian(s) must sign the Authorization before being granted unsupervised access. Please read this document carefully before signing.

9 Authorization for Electronic Access All use of the Internet shall be consistent with Springfield Ball Charter and the District’s goal of promoting educational excellence by facilitating resource sharing, innovation, and communication. This Authorization does not attempt to state all required or proscribed behavior by users. However, some specific examples are provided.

10 Terms and Conditions  Acceptable Uses  Privileges  Unacceptable Uses  Network Etiquette  No Warranties  Idemnification  Security

11 Terms and Conditions  Vandalism  Telephone Charges  Copyright Web Publishing Rules  Use of Electronic Mail  Internet Safety

12 Authorization for Electronic Access The failure of any user to follow the terms of the Authorization for Electronic Network Access will result in the loss of privileges, disciplinary action, and/or appropriate legal action.

13 Technology Violations  Computer use is a privilege, not a right  If your computer privileges are revoked, you will be provided with alternate resources in order to complete the assignment  Tech violations are recorded as referrals in our information system.  Classroom rules also apply to computer usage. Any violation of a classroom rule involving the use of a computer can lead to a tech violation! Classroom teachers, administration, and tech support reserve the right to determine what constitutes a tech violation.

14 “Suggested” Disciplinary Measures for Tech Violations ViolationConsequence First1 week revocation of computer privileges Second2 weeks revocation of computer privileges ThirdLoss of computer privileges for remainder of the quarter (9 weeks); Computer Check in-Check out SubsequentYou don’t want to know.

15 Authorization for Electronic Access The signatures at the end of this document are legally binding and indicate the parties who signed have read the terms and conditions carefully and understand their significance.

16

17

18 Internet Safety

19

20 Digital Discipline  Remain the primary influence in your kids’ lives.  “Digital Dialog”: Talk to your student about internet safety & set boundaries for all media tools they use  Require your child to protect their information by having limited & “protected” profiles, where they can only add friends they know  Set the example—protect your information, use parent passwords & settings on programs when available  Report any concerns of cyber bullying to Ball Charter administration

21 Resources  For more information:  http://www.WiredSafety.org http://www.WiredSafety.org  http://www.stopcyberbullying.org http://www.stopcyberbullying.org  References:  Reprinted with permission from “Parry Aftab’s Guide to Keeping Your Kids Safe Online,  MySpace, Facebook and Xanga, Oh! My!” Parry Aftab, Esq., www.aftab.com. www.aftab.com.

22 Insurance  Cost  Insurance Application  Online Application

23 Tools  Logging In  Username/Password  Internet/Intranet  Student Webpages  Saving Documents

24 Thank you for your time. Have a Great Year!


Download ppt "Sixth Grade Computer Orientation AUGUST 12, 2015."

Similar presentations


Ads by Google