SlideShare ist ein Scribd-Unternehmen logo
1 von 64
The Normal Stuff
General Use                 Personal Security

Personal Responsibility     Copyright

Lab Use                      Repairs
      A Couple Frequently asked Questions
                 Consequences

Please click on each title to learn more.
General Use

The network exists primarily for email and
  internet research.
General Use



It is not intended to be used for non academic
   purposes.
General Use




Network bandwidth is limited so teachers
 should not waste or allow students to waste
 this resource.
General Use
The network exists primarily for email and
   internet research.
It is not intended to be used for non academic
   purposes.
Network bandwidth is limited so teachers
   should not waste or allow students to waste
   this resource.


                                     Return to contents
Personal Responsibility
1. Use of network supports student learning (not a toy).
2.
3.
4.
5.
6.
7.




                                                 Return to contents
Personal Responsibility
1.
2. Do not break any laws or use network to make money.
3.
4.
5.
6.
7.




                                              Return to contents
Personal Responsibility
1.
2.
3. Do not use network to promote a political campaign.
4.
5.
6.
7.




                                                Return to contents
Personal Responsibility
1.
2.
3.
4. Do nothing to harm hardware, software, or the network.
5.
6.
7.




                                               Return to contents
Personal Responsibility
1.
2.
3.
4.
5. Using the network to develop malicious programs is
   prohibited.
6.
7.




                                               Return to contents
Personal Responsibility
1.
2.
3.
4.
5.
6. Users are responsible for what they publish via the network.
   Harassment/Hate mail are prohibited. (remember whatever
   you write is a public document.)
7.




                                                 Return to contents
Personal Responsibility
1.
2.
3.
4.
5.
6.
7. The use of the network to access, store, or distribute
   unauthorized material (i.e. pornography) is strictly
   prohibited.




                                                  Return to contents
Personal Responsibility
1. Use of network supports student learning (not a toy).
2. Do not break any laws or use network to make money.
3. Do not use network to promote a political campaign.
4. Do nothing to harm hardware, software, or the network.
5. Using the network to develop malicious programs is
   prohibited.
6. Users are responsible for what they publish via the network.
   Harassment/Hate mail are prohibited. (remember whatever
   you write is a public document.)
7. The use of the network to access, store, or distribute
   unauthorized material (i.e. pornography) is strictly
   prohibited.

                                                 Return to contents
Lab Use




Return to contents
Lab Use
Please follow through on the following elements of lab use:

1)   Sit in your assigned seat.
2)   No food or drink near computers.
3)   Report any computer problems as soon as you notice them.
4)   Do not use a Proxy Server or bring in unauthorized programs.
5)   Do not store or stream music /video on the district computers.
6)   Make certain that the lab is cleaned up prior to the end of each
     period. (Leave at least 5 minutes for clean up).
7)   Make certain that you know what you are going to be doing so
     that you make the best use of your time.
8)   Provide positive peer pressure… Help classmates make wise
     choices about how they are using the computers

                                                         Return to contents
Lab Use
Please follow through on the following elements of lab use:

1)   Sit in your assigned seat.
2)
3)
4)
5)
6)
7)
8)




                                               Return to contents
Lab Use
Please follow through on the following elements of lab use:

1)
2)   No food or drink near computers.
3)
4)
5)
6)
7)
8)




                                               Return to contents
Lab Use
Please follow through on the following elements of lab use:

1)
2)
3)   Report any computer problems as soon as you notice them.
4)
5)
6)
7)
8)




                                                     Return to contents
Lab Use
Please follow through on the following elements of lab use:

1)
2)
3)
4)   Do not use a Proxy Server or bring in unauthorized programs.
5)
6)
7)
8)




                                                        Return to contents
Lab Use
Please follow through on the following elements of lab use:

1)
2)
3)
4)
5)   Do not store or stream music /video on the district computers.
6)
7)
8)




                                                        Return to contents
Lab Use
Please follow through on the following elements of lab use:

1)
2)
3)
4)
5)
6)   Make certain that the lab is cleaned up prior to the end of each
     period. (Leave at least 5 minutes for clean up).
7)
8)



                                                         Return to contents
Lab Use
Please follow through on the following elements of lab use:

1)
2)
3)
4)
5)
6)
7)   Make certain that you know what you are going to be doing so
     that you make the best use of your time.
8)



                                                      Return to contents
Lab Use
Please follow through on the following elements of lab use:

1)
2)
3)
4)
5)
6)
7)
8)   Provide positive peer pressure… Help classmates make wise
     choices about how they are using the computers



                                                      Return to contents
Lab Use
Please follow through on the following elements of lab use:

1)   Sit in your assigned seat.
2)   No food or drink near computers.
3)   Report any computer problems as soon as you notice them.
4)   Do not use a Proxy Server or bring in unauthorized programs.
5)   Do not store or stream music /video on the district computers.
6)   Make certain that the lab is cleaned up prior to the end of each
     period. (Leave at least 5 minutes for clean up).
7)   Make certain that you know what you are going to be doing so
     that you make the best use of your time.
8)   Provide positive peer pressure… Help classmates make wise
     choices about how they are using the computers

                                                         Return to contents
Personal Security




                    Return to contents
Personal Security

 Do not share your passwords or account
   privileges with anyone else.




                                          Return to contents
Personal Security



 You are responsible for any use of your
   account…




                                           Return to contents
Personal Security




 Do not give out personal information or
   agree to meet strangers via the district
   network.




                                              Return to contents
Personal Security




 Have back ups of your school files… Just in
   case your account ever gets damaged



                                               Return to contents
Personal Security

 Do not share your passwords or account
   privileges with anyone else.
 You are responsible for any use of your
   account…
 Do not give out personal information or
   agree to meet strangers via the district
   network.
 Have back ups of your school files… Just in
   case your account ever gets damaged




                                               Return to contents
Copyright




   Return to contents
                        Image by Stephen Downes
The unauthorized…
Copyright               -installation -use -storage
                        -or distribution of copyrighted
                           material or software on district
                           computers is prohibited.




   Return to contents
                                             Image by Stephen Downes
Copyright



Helpful hint… unless the district owns
the item or it is specifically marked as
being able to be used in educational
settings, it is copyrighted and you need
the creator’s permission.




           Return to contents
                                           Image by Stephen Downes
Copyright




This includes anything you get from the
internet as well.

           Return to contents
                                          Image by Stephen Downes
The unauthorized…
   Copyright                    -installation -use -storage
                                -or distribution of copyrighted
                                   material or software on district
                                   computers is prohibited.

Helpful hint… unless the district owns
the item or it is specifically marked as
being able to be used in educational
settings, it is copyrighted and you need
the creator’s permission.

This includes anything you get from the
internet as well.

           Return to contents
                                                     Image by Stephen Downes
Repairs




Return to contents
Repairs
Turn everything off and back on (90% of problems may be
   solved by a simple reboot.)




                                          Return to contents
Repairs


If it is a gray tower, we need to take extra care because IT
     will no longer work on them… BE EXTRA NICE to these
     ones.




                                              Return to contents
Repairs




Do not attempt any repairs. Tell your teacher and they
   will get it taken care of.




                                            Return to contents
Repairs




REMEMBER… Computer use is a privilege… Please do
  your best to keep this resource available for everyone.

                                            Return to contents
Repairs
Turn everything off and back on (90% of problems may be
   solved by a simple reboot.)

If it is a gray tower, we need to take extra care because IT
     will no longer work on them… BE EXTRA NICE to these
     ones.

Do not attempt any repairs. Tell your teacher and they
   will get it taken care of.

REMEMBER… Computer use is a privilege… Please do
  your best to keep this resource available for everyone.

                                              Return to contents
FAQs
Please click on questions to see the response:

Why can’t I stream video/music or play online games?

What’s wrong with using a proxy? I’m just trying to get to my
 stuff…

Why are some good sites blocked? What can I do?

Why won’t my thumbdrive load onto the computer?




                                                  Return to contents
Why can’t I stream video/music or play
               online games?
• There is a limit to how much information
  move through the network… If everyone was
  streaming content, the network would no
  longer work.
•




                                 Return to the list
Why can’t I stream video/music or play
               online games?
•
• The network is a resource that you have the
  privilege to use for school related work. Tax
  payers are not investing their money for you
  to play.




                                     Return to the list
Why can’t I stream video/music or play
               online games?
• There is a limit to how much information
  move through the network… If everyone was
  streaming content, the network would no
  longer work.
• The network is a resource that you have the
  privilege to use for school related work. Tax
  payers are not investing their money for you
  to play.

                                    Return to the list
What’s wrong with using a proxy? I’m
   just trying to get to my stuff…
To be clear… a proxy is a site that allows a user to
   bypass the district firewall to access blocked content.
There are two problems with using a proxy server:
1.
2.




                                            Return to the list
What’s wrong with using a proxy? I’m
   just trying to get to my stuff…
To be clear… a proxy is a site that allows a user to
   bypass the district firewall to access blocked content.
There are two problems with using a proxy server:
1. Bypassing the district firewall is willfully breaking
    the rules.
2.




                                            Return to the list
What’s wrong with using a proxy? I’m
   just trying to get to my stuff…
To be clear… a proxy is a site that allows a user to
   bypass the district firewall to access blocked content.
There are two problems with using a proxy server:
1.
2. Just as students look for proxies to get out of school
    firewalls, some people use proxies to break in.
    Using a proxy is like opening a door to them.



                                            Return to the list
Why are some good sites blocked?
         What can I do?
The district uses an automated filter to block unwanted content.
Unfortunately, sometimes school relevant material gets blocked
  as well.




                                                 Return to the list
Why are some good sites blocked?
         What can I do?


Please bear in mind that there is only one filter so some things
   may be appropriate for high school but they are blocked
   because they are not okay for younger students.




                                                  Return to the list
Why are some good sites blocked?
         What can I do?




If you feel that a site should be unblocked, write a letter
    explaining what the site is and why you need it for school.
Then, send it in an email to your teacher to submit for you.


                                                   Return to the list
Why are some good sites blocked?
         What can I do?
The district uses an automated filter to block unwanted content.
Unfortunately, sometimes school relevant material gets blocked
    as well.
Please bear in mind that there is only one filter so some things
    may be appropriate for high school but they are blocked
    because they are not okay for younger students.
If you feel that a site should be unblocked, write a letter
    explaining what the site is and why you need it for school.
Then, send it in an email to your teacher to submit for you.



                                                 Return to the list
Why won’t my thumbdrive load
       onto the computer?
Your thumbdrive may have an operating system that is set to
  automatically load when plugged in.




                                                Return to the list
Why won’t my thumbdrive load
       onto the computer?
Your thumbdrive may have an operating system that is set to
  automatically load when plugged in.
Unfortunately, this looks like a virus attack and the system is set
  to protect itself from viruses.




                                                    Return to the list
Why won’t my thumbdrive load
       onto the computer?



You will still be able to access your documents by choosing to
  open your “my documents” folder and then going up to the
  thumbdrive.




                                                 Return to the list
Why won’t my thumbdrive load
       onto the computer?




A better option is to disable your thumbdrive’s operating system
   at home prior to bringing it to school. This will greatly speed
   up access.

                                                  Return to the list
Why won’t my thumbdrive load
       onto the computer?
Your thumbdrive may have an operating system that is set to
   automatically load when plugged in.
Unfortunately, this looks like a virus attack and the system is set
   to protect itself from viruses.
You will still be able to access your documents by choosing to
   open your “my documents” folder and then going up to the
   thumbdrive.
A better option is to disable your thumbdrive’s operating system
   at home prior to bringing it to school. This will greatly speed
   up access.


                                                   Return to the list
Consequences




               Return to contents
Consequences
• For security and administrative purposes the district retains
  the right for authorized personnel to review network system
  use and file content.

•

•

•




                                                  Return to contents
Consequences
•

• The district reserves the right to remove a user account to
  prevent further unauthorized activity.

•

•




                                                  Return to contents
Consequences
•

•

• The District’s service provider reserves the right to disconnect
  the district to prevent further unauthorized activity.

•




                                                   Return to contents
Consequences
•

•

•

• Violation of any of the conditions of use may be cause for loss
  of network privileges and/or disciplinary action up to and
  including expulsion from the Marysville school district.




                                                   Return to contents
Consequences
• For security and administrative purposes the district retains
  the right for authorized personnel to review network system
  use and file content.

• The district reserves the right to remove a user account to
  prevent further unauthorized activity.

• The District’s service provider reserves the right to disconnect
  the district to prevent further unauthorized activity.

• Violation of any of the conditions of use may be cause for loss
  of network privileges and/or disciplinary action up to and
  including expulsion from the Marysville school district.

                                                   Return to contents

Weitere ähnliche Inhalte

Ähnlich wie Student Aup

Applying principles of chaos engineering to serverless (O'Reilly Software Arc...
Applying principles of chaos engineering to serverless (O'Reilly Software Arc...Applying principles of chaos engineering to serverless (O'Reilly Software Arc...
Applying principles of chaos engineering to serverless (O'Reilly Software Arc...Yan Cui
 
Alexey Ostapov: Distributed Video Management and Security Systems: Tips and T...
Alexey Ostapov: Distributed Video Management and Security Systems: Tips and T...Alexey Ostapov: Distributed Video Management and Security Systems: Tips and T...
Alexey Ostapov: Distributed Video Management and Security Systems: Tips and T...Andriy Krayniy
 
Basic Computer Skills.pptx
Basic Computer Skills.pptxBasic Computer Skills.pptx
Basic Computer Skills.pptxChandniK7
 
Develop System Integrity ChecksAs part of the overall proposal, .docx
Develop System Integrity ChecksAs part of the overall proposal, .docxDevelop System Integrity ChecksAs part of the overall proposal, .docx
Develop System Integrity ChecksAs part of the overall proposal, .docxhcheryl1
 
Delivering information to students 24/7 with Camtasia.
Delivering information to students 24/7 with Camtasia.Delivering information to students 24/7 with Camtasia.
Delivering information to students 24/7 with Camtasia.Kathleen Carlson
 
Derby con 2014
Derby con 2014Derby con 2014
Derby con 2014TonikJDK
 
ITE v5.0 - Chapter 12
ITE v5.0 - Chapter 12ITE v5.0 - Chapter 12
ITE v5.0 - Chapter 12Irsandi Hasan
 
How to Make a Video Abstract for a Journal Article
How to Make a Video Abstract for a Journal ArticleHow to Make a Video Abstract for a Journal Article
How to Make a Video Abstract for a Journal Articlethescientistvideographer
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application SecurityNicholas Davis
 
English Class: ielts presentation about topic f you
English Class: ielts presentation about topic f youEnglish Class: ielts presentation about topic f you
English Class: ielts presentation about topic f youtranduykhanhmastermi
 
Internet PC Security by Khalil Jubran Mindspring Networks
Internet PC Security  by Khalil Jubran  Mindspring Networks  Internet PC Security  by Khalil Jubran  Mindspring Networks
Internet PC Security by Khalil Jubran Mindspring Networks Khalil Jubran
 
Operating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptxOperating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptxDondonGoles
 
ITE - Chapter 4
ITE - Chapter 4ITE - Chapter 4
ITE - Chapter 4Irsandi Hasan
 
Enabling technologyvirtualisationproject
Enabling technologyvirtualisationprojectEnabling technologyvirtualisationproject
Enabling technologyvirtualisationprojectJisc
 
Windows 10 Module 1.pdf
Windows 10 Module 1.pdfWindows 10 Module 1.pdf
Windows 10 Module 1.pdfssuser536c36
 
Windows 10 module 2 ppt presentation
Windows 10 module 2 ppt presentationWindows 10 module 2 ppt presentation
Windows 10 module 2 ppt presentationdgdotson
 
Introduction to Basic IT Knowledge.pptx
Introduction to Basic IT  Knowledge.pptxIntroduction to Basic IT  Knowledge.pptx
Introduction to Basic IT Knowledge.pptxsboral2
 
Empowerment_Q2_module1.docx
Empowerment_Q2_module1.docxEmpowerment_Q2_module1.docx
Empowerment_Q2_module1.docxMichael Montarde
 
Edu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crsEdu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crssapphirecrs
 
Jonathan bright - collecting social media data with the python programming la...
Jonathan bright - collecting social media data with the python programming la...Jonathan bright - collecting social media data with the python programming la...
Jonathan bright - collecting social media data with the python programming la...oiisdp
 

Ähnlich wie Student Aup (20)

Applying principles of chaos engineering to serverless (O'Reilly Software Arc...
Applying principles of chaos engineering to serverless (O'Reilly Software Arc...Applying principles of chaos engineering to serverless (O'Reilly Software Arc...
Applying principles of chaos engineering to serverless (O'Reilly Software Arc...
 
Alexey Ostapov: Distributed Video Management and Security Systems: Tips and T...
Alexey Ostapov: Distributed Video Management and Security Systems: Tips and T...Alexey Ostapov: Distributed Video Management and Security Systems: Tips and T...
Alexey Ostapov: Distributed Video Management and Security Systems: Tips and T...
 
Basic Computer Skills.pptx
Basic Computer Skills.pptxBasic Computer Skills.pptx
Basic Computer Skills.pptx
 
Develop System Integrity ChecksAs part of the overall proposal, .docx
Develop System Integrity ChecksAs part of the overall proposal, .docxDevelop System Integrity ChecksAs part of the overall proposal, .docx
Develop System Integrity ChecksAs part of the overall proposal, .docx
 
Delivering information to students 24/7 with Camtasia.
Delivering information to students 24/7 with Camtasia.Delivering information to students 24/7 with Camtasia.
Delivering information to students 24/7 with Camtasia.
 
Derby con 2014
Derby con 2014Derby con 2014
Derby con 2014
 
ITE v5.0 - Chapter 12
ITE v5.0 - Chapter 12ITE v5.0 - Chapter 12
ITE v5.0 - Chapter 12
 
How to Make a Video Abstract for a Journal Article
How to Make a Video Abstract for a Journal ArticleHow to Make a Video Abstract for a Journal Article
How to Make a Video Abstract for a Journal Article
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application Security
 
English Class: ielts presentation about topic f you
English Class: ielts presentation about topic f youEnglish Class: ielts presentation about topic f you
English Class: ielts presentation about topic f you
 
Internet PC Security by Khalil Jubran Mindspring Networks
Internet PC Security  by Khalil Jubran  Mindspring Networks  Internet PC Security  by Khalil Jubran  Mindspring Networks
Internet PC Security by Khalil Jubran Mindspring Networks
 
Operating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptxOperating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptx
 
ITE - Chapter 4
ITE - Chapter 4ITE - Chapter 4
ITE - Chapter 4
 
Enabling technologyvirtualisationproject
Enabling technologyvirtualisationprojectEnabling technologyvirtualisationproject
Enabling technologyvirtualisationproject
 
Windows 10 Module 1.pdf
Windows 10 Module 1.pdfWindows 10 Module 1.pdf
Windows 10 Module 1.pdf
 
Windows 10 module 2 ppt presentation
Windows 10 module 2 ppt presentationWindows 10 module 2 ppt presentation
Windows 10 module 2 ppt presentation
 
Introduction to Basic IT Knowledge.pptx
Introduction to Basic IT  Knowledge.pptxIntroduction to Basic IT  Knowledge.pptx
Introduction to Basic IT Knowledge.pptx
 
Empowerment_Q2_module1.docx
Empowerment_Q2_module1.docxEmpowerment_Q2_module1.docx
Empowerment_Q2_module1.docx
 
Edu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crsEdu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crs
 
Jonathan bright - collecting social media data with the python programming la...
Jonathan bright - collecting social media data with the python programming la...Jonathan bright - collecting social media data with the python programming la...
Jonathan bright - collecting social media data with the python programming la...
 

Mehr von lagrange

Simple steps to incorporating you tube videos in powerpoint
Simple steps to incorporating you tube videos in powerpointSimple steps to incorporating you tube videos in powerpoint
Simple steps to incorporating you tube videos in powerpointlagrange
 
Gimp Vs Photoshop
Gimp Vs PhotoshopGimp Vs Photoshop
Gimp Vs Photoshoplagrange
 
Creating stuff on Firstclass
Creating stuff on FirstclassCreating stuff on Firstclass
Creating stuff on Firstclasslagrange
 
Can You Blog In A Wiki
Can You Blog In A WikiCan You Blog In A Wiki
Can You Blog In A Wikilagrange
 
Chapt 10 2 Qz Review
Chapt 10 2 Qz ReviewChapt 10 2 Qz Review
Chapt 10 2 Qz Reviewlagrange
 
Temps Et Sport
Temps Et SportTemps Et Sport
Temps Et Sportlagrange
 
Je Peux Te Parler
Je Peux Te ParlerJe Peux Te Parler
Je Peux Te Parlerlagrange
 
Je Peux Te Parler
Je Peux Te ParlerJe Peux Te Parler
Je Peux Te Parlerlagrange
 
Weather1
Weather1Weather1
Weather1lagrange
 

Mehr von lagrange (9)

Simple steps to incorporating you tube videos in powerpoint
Simple steps to incorporating you tube videos in powerpointSimple steps to incorporating you tube videos in powerpoint
Simple steps to incorporating you tube videos in powerpoint
 
Gimp Vs Photoshop
Gimp Vs PhotoshopGimp Vs Photoshop
Gimp Vs Photoshop
 
Creating stuff on Firstclass
Creating stuff on FirstclassCreating stuff on Firstclass
Creating stuff on Firstclass
 
Can You Blog In A Wiki
Can You Blog In A WikiCan You Blog In A Wiki
Can You Blog In A Wiki
 
Chapt 10 2 Qz Review
Chapt 10 2 Qz ReviewChapt 10 2 Qz Review
Chapt 10 2 Qz Review
 
Temps Et Sport
Temps Et SportTemps Et Sport
Temps Et Sport
 
Je Peux Te Parler
Je Peux Te ParlerJe Peux Te Parler
Je Peux Te Parler
 
Je Peux Te Parler
Je Peux Te ParlerJe Peux Te Parler
Je Peux Te Parler
 
Weather1
Weather1Weather1
Weather1
 

KĂźrzlich hochgeladen

2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docxkfjstone13
 
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)Delhi Call girls
 
Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!Krish109503
 
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...AlexisTorres963861
 
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s LeadershipTDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadershipanjanibaddipudi1
 
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docxkfjstone13
 
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost LoverPsychicRuben LoveSpells
 
29042024_First India Newspaper Jaipur.pdf
29042024_First India Newspaper Jaipur.pdf29042024_First India Newspaper Jaipur.pdf
29042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
30042024_First India Newspaper Jaipur.pdf
30042024_First India Newspaper Jaipur.pdf30042024_First India Newspaper Jaipur.pdf
30042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
How Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdfHow Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdfLorenzo Lemes
 
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书Fi L
 
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover BackVerified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover BackPsychicRuben LoveSpells
 
Pakistan PMLN Election Manifesto 2024.pdf
Pakistan PMLN Election Manifesto 2024.pdfPakistan PMLN Election Manifesto 2024.pdf
Pakistan PMLN Election Manifesto 2024.pdfFahimUddin61
 
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's DevelopmentNara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Developmentnarsireddynannuri1
 
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...Diya Sharma
 
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptxLorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptxlorenzodemidio01
 
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreie
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreieGujarat-SEBCs.pdf pfpkoopapriorjfperjreie
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreiebhavenpr
 
Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort ServiceDelhi Call girls
 

KĂźrzlich hochgeladen (20)

2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
 
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
 
Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!
 
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
 
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s LeadershipTDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
 
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
 
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
 
29042024_First India Newspaper Jaipur.pdf
29042024_First India Newspaper Jaipur.pdf29042024_First India Newspaper Jaipur.pdf
29042024_First India Newspaper Jaipur.pdf
 
30042024_First India Newspaper Jaipur.pdf
30042024_First India Newspaper Jaipur.pdf30042024_First India Newspaper Jaipur.pdf
30042024_First India Newspaper Jaipur.pdf
 
How Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdfHow Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdf
 
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
 
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover BackVerified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
 
Pakistan PMLN Election Manifesto 2024.pdf
Pakistan PMLN Election Manifesto 2024.pdfPakistan PMLN Election Manifesto 2024.pdf
Pakistan PMLN Election Manifesto 2024.pdf
 
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's DevelopmentNara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
 
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
 
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
 
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
 
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptxLorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
 
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreie
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreieGujarat-SEBCs.pdf pfpkoopapriorjfperjreie
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreie
 
Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort Service
 

Student Aup

  • 1.
  • 2. The Normal Stuff General Use Personal Security Personal Responsibility Copyright Lab Use Repairs A Couple Frequently asked Questions Consequences Please click on each title to learn more.
  • 3. General Use The network exists primarily for email and internet research.
  • 4. General Use It is not intended to be used for non academic purposes.
  • 5. General Use Network bandwidth is limited so teachers should not waste or allow students to waste this resource.
  • 6. General Use The network exists primarily for email and internet research. It is not intended to be used for non academic purposes. Network bandwidth is limited so teachers should not waste or allow students to waste this resource. Return to contents
  • 7. Personal Responsibility 1. Use of network supports student learning (not a toy). 2. 3. 4. 5. 6. 7. Return to contents
  • 8. Personal Responsibility 1. 2. Do not break any laws or use network to make money. 3. 4. 5. 6. 7. Return to contents
  • 9. Personal Responsibility 1. 2. 3. Do not use network to promote a political campaign. 4. 5. 6. 7. Return to contents
  • 10. Personal Responsibility 1. 2. 3. 4. Do nothing to harm hardware, software, or the network. 5. 6. 7. Return to contents
  • 11. Personal Responsibility 1. 2. 3. 4. 5. Using the network to develop malicious programs is prohibited. 6. 7. Return to contents
  • 12. Personal Responsibility 1. 2. 3. 4. 5. 6. Users are responsible for what they publish via the network. Harassment/Hate mail are prohibited. (remember whatever you write is a public document.) 7. Return to contents
  • 13. Personal Responsibility 1. 2. 3. 4. 5. 6. 7. The use of the network to access, store, or distribute unauthorized material (i.e. pornography) is strictly prohibited. Return to contents
  • 14. Personal Responsibility 1. Use of network supports student learning (not a toy). 2. Do not break any laws or use network to make money. 3. Do not use network to promote a political campaign. 4. Do nothing to harm hardware, software, or the network. 5. Using the network to develop malicious programs is prohibited. 6. Users are responsible for what they publish via the network. Harassment/Hate mail are prohibited. (remember whatever you write is a public document.) 7. The use of the network to access, store, or distribute unauthorized material (i.e. pornography) is strictly prohibited. Return to contents
  • 15. Lab Use Return to contents
  • 16. Lab Use Please follow through on the following elements of lab use: 1) Sit in your assigned seat. 2) No food or drink near computers. 3) Report any computer problems as soon as you notice them. 4) Do not use a Proxy Server or bring in unauthorized programs. 5) Do not store or stream music /video on the district computers. 6) Make certain that the lab is cleaned up prior to the end of each period. (Leave at least 5 minutes for clean up). 7) Make certain that you know what you are going to be doing so that you make the best use of your time. 8) Provide positive peer pressure… Help classmates make wise choices about how they are using the computers Return to contents
  • 17. Lab Use Please follow through on the following elements of lab use: 1) Sit in your assigned seat. 2) 3) 4) 5) 6) 7) 8) Return to contents
  • 18. Lab Use Please follow through on the following elements of lab use: 1) 2) No food or drink near computers. 3) 4) 5) 6) 7) 8) Return to contents
  • 19. Lab Use Please follow through on the following elements of lab use: 1) 2) 3) Report any computer problems as soon as you notice them. 4) 5) 6) 7) 8) Return to contents
  • 20. Lab Use Please follow through on the following elements of lab use: 1) 2) 3) 4) Do not use a Proxy Server or bring in unauthorized programs. 5) 6) 7) 8) Return to contents
  • 21. Lab Use Please follow through on the following elements of lab use: 1) 2) 3) 4) 5) Do not store or stream music /video on the district computers. 6) 7) 8) Return to contents
  • 22. Lab Use Please follow through on the following elements of lab use: 1) 2) 3) 4) 5) 6) Make certain that the lab is cleaned up prior to the end of each period. (Leave at least 5 minutes for clean up). 7) 8) Return to contents
  • 23. Lab Use Please follow through on the following elements of lab use: 1) 2) 3) 4) 5) 6) 7) Make certain that you know what you are going to be doing so that you make the best use of your time. 8) Return to contents
  • 24. Lab Use Please follow through on the following elements of lab use: 1) 2) 3) 4) 5) 6) 7) 8) Provide positive peer pressure… Help classmates make wise choices about how they are using the computers Return to contents
  • 25. Lab Use Please follow through on the following elements of lab use: 1) Sit in your assigned seat. 2) No food or drink near computers. 3) Report any computer problems as soon as you notice them. 4) Do not use a Proxy Server or bring in unauthorized programs. 5) Do not store or stream music /video on the district computers. 6) Make certain that the lab is cleaned up prior to the end of each period. (Leave at least 5 minutes for clean up). 7) Make certain that you know what you are going to be doing so that you make the best use of your time. 8) Provide positive peer pressure… Help classmates make wise choices about how they are using the computers Return to contents
  • 26. Personal Security Return to contents
  • 27. Personal Security Do not share your passwords or account privileges with anyone else. Return to contents
  • 28. Personal Security You are responsible for any use of your account… Return to contents
  • 29. Personal Security Do not give out personal information or agree to meet strangers via the district network. Return to contents
  • 30. Personal Security Have back ups of your school files… Just in case your account ever gets damaged Return to contents
  • 31. Personal Security Do not share your passwords or account privileges with anyone else. You are responsible for any use of your account… Do not give out personal information or agree to meet strangers via the district network. Have back ups of your school files… Just in case your account ever gets damaged Return to contents
  • 32. Copyright Return to contents Image by Stephen Downes
  • 33. The unauthorized… Copyright -installation -use -storage -or distribution of copyrighted material or software on district computers is prohibited. Return to contents Image by Stephen Downes
  • 34. Copyright Helpful hint… unless the district owns the item or it is specifically marked as being able to be used in educational settings, it is copyrighted and you need the creator’s permission. Return to contents Image by Stephen Downes
  • 35. Copyright This includes anything you get from the internet as well. Return to contents Image by Stephen Downes
  • 36. The unauthorized… Copyright -installation -use -storage -or distribution of copyrighted material or software on district computers is prohibited. Helpful hint… unless the district owns the item or it is specifically marked as being able to be used in educational settings, it is copyrighted and you need the creator’s permission. This includes anything you get from the internet as well. Return to contents Image by Stephen Downes
  • 38. Repairs Turn everything off and back on (90% of problems may be solved by a simple reboot.) Return to contents
  • 39. Repairs If it is a gray tower, we need to take extra care because IT will no longer work on them… BE EXTRA NICE to these ones. Return to contents
  • 40. Repairs Do not attempt any repairs. Tell your teacher and they will get it taken care of. Return to contents
  • 41. Repairs REMEMBER… Computer use is a privilege… Please do your best to keep this resource available for everyone. Return to contents
  • 42. Repairs Turn everything off and back on (90% of problems may be solved by a simple reboot.) If it is a gray tower, we need to take extra care because IT will no longer work on them… BE EXTRA NICE to these ones. Do not attempt any repairs. Tell your teacher and they will get it taken care of. REMEMBER… Computer use is a privilege… Please do your best to keep this resource available for everyone. Return to contents
  • 43. FAQs Please click on questions to see the response: Why can’t I stream video/music or play online games? What’s wrong with using a proxy? I’m just trying to get to my stuff… Why are some good sites blocked? What can I do? Why won’t my thumbdrive load onto the computer? Return to contents
  • 44. Why can’t I stream video/music or play online games? • There is a limit to how much information move through the network… If everyone was streaming content, the network would no longer work. • Return to the list
  • 45. Why can’t I stream video/music or play online games? • • The network is a resource that you have the privilege to use for school related work. Tax payers are not investing their money for you to play. Return to the list
  • 46. Why can’t I stream video/music or play online games? • There is a limit to how much information move through the network… If everyone was streaming content, the network would no longer work. • The network is a resource that you have the privilege to use for school related work. Tax payers are not investing their money for you to play. Return to the list
  • 47. What’s wrong with using a proxy? I’m just trying to get to my stuff… To be clear… a proxy is a site that allows a user to bypass the district firewall to access blocked content. There are two problems with using a proxy server: 1. 2. Return to the list
  • 48. What’s wrong with using a proxy? I’m just trying to get to my stuff… To be clear… a proxy is a site that allows a user to bypass the district firewall to access blocked content. There are two problems with using a proxy server: 1. Bypassing the district firewall is willfully breaking the rules. 2. Return to the list
  • 49. What’s wrong with using a proxy? I’m just trying to get to my stuff… To be clear… a proxy is a site that allows a user to bypass the district firewall to access blocked content. There are two problems with using a proxy server: 1. 2. Just as students look for proxies to get out of school firewalls, some people use proxies to break in. Using a proxy is like opening a door to them. Return to the list
  • 50. Why are some good sites blocked? What can I do? The district uses an automated filter to block unwanted content. Unfortunately, sometimes school relevant material gets blocked as well. Return to the list
  • 51. Why are some good sites blocked? What can I do? Please bear in mind that there is only one filter so some things may be appropriate for high school but they are blocked because they are not okay for younger students. Return to the list
  • 52. Why are some good sites blocked? What can I do? If you feel that a site should be unblocked, write a letter explaining what the site is and why you need it for school. Then, send it in an email to your teacher to submit for you. Return to the list
  • 53. Why are some good sites blocked? What can I do? The district uses an automated filter to block unwanted content. Unfortunately, sometimes school relevant material gets blocked as well. Please bear in mind that there is only one filter so some things may be appropriate for high school but they are blocked because they are not okay for younger students. If you feel that a site should be unblocked, write a letter explaining what the site is and why you need it for school. Then, send it in an email to your teacher to submit for you. Return to the list
  • 54. Why won’t my thumbdrive load onto the computer? Your thumbdrive may have an operating system that is set to automatically load when plugged in. Return to the list
  • 55. Why won’t my thumbdrive load onto the computer? Your thumbdrive may have an operating system that is set to automatically load when plugged in. Unfortunately, this looks like a virus attack and the system is set to protect itself from viruses. Return to the list
  • 56. Why won’t my thumbdrive load onto the computer? You will still be able to access your documents by choosing to open your “my documents” folder and then going up to the thumbdrive. Return to the list
  • 57. Why won’t my thumbdrive load onto the computer? A better option is to disable your thumbdrive’s operating system at home prior to bringing it to school. This will greatly speed up access. Return to the list
  • 58. Why won’t my thumbdrive load onto the computer? Your thumbdrive may have an operating system that is set to automatically load when plugged in. Unfortunately, this looks like a virus attack and the system is set to protect itself from viruses. You will still be able to access your documents by choosing to open your “my documents” folder and then going up to the thumbdrive. A better option is to disable your thumbdrive’s operating system at home prior to bringing it to school. This will greatly speed up access. Return to the list
  • 59. Consequences Return to contents
  • 60. Consequences • For security and administrative purposes the district retains the right for authorized personnel to review network system use and file content. • • • Return to contents
  • 61. Consequences • • The district reserves the right to remove a user account to prevent further unauthorized activity. • • Return to contents
  • 62. Consequences • • • The District’s service provider reserves the right to disconnect the district to prevent further unauthorized activity. • Return to contents
  • 63. Consequences • • • • Violation of any of the conditions of use may be cause for loss of network privileges and/or disciplinary action up to and including expulsion from the Marysville school district. Return to contents
  • 64. Consequences • For security and administrative purposes the district retains the right for authorized personnel to review network system use and file content. • The district reserves the right to remove a user account to prevent further unauthorized activity. • The District’s service provider reserves the right to disconnect the district to prevent further unauthorized activity. • Violation of any of the conditions of use may be cause for loss of network privileges and/or disciplinary action up to and including expulsion from the Marysville school district. Return to contents