SlideShare a Scribd company logo
1 of 17
Please read & follow:

• You need a pen/pencil today – anything
  except red or Sharpie.
• Put all of your things away.
• Please sit quietly in your seat. 




                                           1
Use of
Telecommunications
         &
      Network




                     2
SCHOOL DISTRICT OF CLAY COUNTY
       TELECOMMUNICATIONS NETWORK
                OVERVIEW
   1. SDCC provides opportunity for students to expand
      learning.
   2. Opportunity =
   3. Goal of school Internet
       a. Resource sharing
       b. Accessing outside information
       c. Research
       d. Encouraging technological innovation
       e. Worldwide communication


•Question: Compared to other schools around the country and
the world, what do you think our school would be like if we did
not have access to the Internet?



                                                                  3
INTERNET RESOURCES

4. Students will have access to:
   a. Worldwide electronic mail
      communication.
   b. Global information and news.
   c. Public domain and shareware computer
      software.
   d. Educational discussion groups.
   e. Access to many university libraries and
      other libraries.


                                                4
INTERNET WARNING
5.   Some materials on the Internet are not of educational value
     while at school.
6.   This material may not be suitable for students.
7.   The instructor will monitor student use of the Internet to
     prevent students from accessing unsuitable material.




                                                                   5
USER GUIDELINES
8.  Internet access is through an association of
    government, regional & state networks.
9. School district wants the network to be used in a
       , efficient, ethical and legal manner.
10. Operation of Internet relies on proper conduct of the users.




                                                                   6
USER GUIDELINES Continued
11. If you violate, your account will be terminated.
12. Serious violations may result in school disciplinary action or
    legal action.
13. A signature indicates that the user has read and understands.




                                                                     7
Acceptable Use
14. Internet use must support education and research.
15. Users are encouraged to take advantage of the network’s
    functions:
   a. electronic mail
   b. conferences
   c. bulletin boards
   d. databases
   e. access to the Internet




                                                              8
Privileges
16. Use of Internet = privilege
17. Inappropriate use = no privilege




   Question: Why do you think using the Internet at school is a
   privilege?




                                                                  9
“Netiquette”
18. Abide by the rules of network etiquette.
19. Be polite.
20. Do not use vulgar or obscene language.
21. Do not reveal your address or phone number or those of
    others.
22. Electronic mail is not guaranteed to be private.
23. Do not disrupt the network, the data, or other users.




                                                             10
24. Unacceptable Uses of Network
a.   Violating student or staff rights to privacy.
b.   Using the Internet without application of common sense.
c.   Using profanity, obscenity, or other language which may be
     offensive to another user.
d.   Sending or accessing pornographic text and/or graphics.
e.   Unauthorized games.
f.   Sending or receiving copyrighted materials.
g.   Reporting personal communications without the author’s prior
     consent.




 Question: What could happen to a person, whose private
 information such as a name, address and phone                      11
 number, given out over the Internet without their
Unacceptable Uses of Network Continued
h.   Using for commercial activities, product advertisement, or
     financial gain.
i.   Knowingly transmitting viruses.
j.   Spam.
k.   Chain letters.
l.   Unauthorized solicitations for goods and services.
m.   Posting personal views .
n.   Unauthorized streaming video or music – this ties up the
     bandwidth & slows down the network.




 Question: What would happen to the school Internet if a virus was sent
 in to infect the system?                                                 12
Warranties
25. SDCC makes no warranties.
26. SDCC will not be responsible for damages or loss of data.
27. SDCC will not be responsible for the accuracy or quality of
    information obtain on network.
28. Inappropriate Internet sites should be reported to teacher
    immediately.




                                                                  13
Security
29. Security is a high priority.
30. Do not show or identify the problem to others.
31. Do not use another individual’s account.
32. Attempts to log on as another user will result in cancellation of
    your privileges.
33. Security risk users will be denied network access.




                                                                    14
Vandalism
34. Vandalism = privileges cancellation and/or disciplinary action.
35. Vandalism is a malicious attempt to harm or destroy data of
    another user, Internet, or other networks.
36. Includes creation or uploading computer viruses on the
    Internet or host site.
37. Degrading or disrupting system performance is a crime under
    state and federal law.




                                                                      15
Sponsors
38. Teachers are to make sure students:
   a. Know how to use the Internet correctly &
   b. Know what happens if they don’t!




                                                 16
Let’s Review
What is the main purpose and goal of having a school
Internet?
Why are there so many rules and guidelines for using the
school Internet?

What are some benefits of having Internet and network rules?
Why do you have your own personal user account when you
log onto the school Internet?

What are some benefits of having your own user account for
logging onto the school Internet?

What happens to the school Internet when you down load
unauthorized streaming videos and music?


                                                               17

More Related Content

What's hot

Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rulesMazni Salleh
 
Top Ten Internet Uses In Teaching And Learning 2
Top Ten Internet Uses In Teaching And Learning   2Top Ten Internet Uses In Teaching And Learning   2
Top Ten Internet Uses In Teaching And Learning 2rogerja
 
Safe and Responsible Use of ICT
Safe and Responsible Use of ICTSafe and Responsible Use of ICT
Safe and Responsible Use of ICTRolly Franco
 
Camouflage and Safety in the Virtual World
Camouflage and Safety in the Virtual WorldCamouflage and Safety in the Virtual World
Camouflage and Safety in the Virtual WorldInterMediaKT
 
computer ethics for educators
computer ethics for educatorscomputer ethics for educators
computer ethics for educatorsjessa_delingon
 
Internet Publication
Internet PublicationInternet Publication
Internet PublicationDrĂŠ Davis
 
Internet Safety
Internet SafetyInternet Safety
Internet SafetyInterMediaKT
 
benefits of the internet on education
benefits of the internet on educationbenefits of the internet on education
benefits of the internet on educationlinda kerry
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...mulingoh
 
Inappropriate use of the network ppt
Inappropriate use of the network pptInappropriate use of the network ppt
Inappropriate use of the network pptKristi DeRoche
 
Teaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the ClassroomTeaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the ClassroomMrs.Faust
 
Draft Computer Acceptable Use Policy
Draft Computer Acceptable Use PolicyDraft Computer Acceptable Use Policy
Draft Computer Acceptable Use PolicyWellesley Public School
 
Technology acceptable use policy for students 08202011[1]
Technology acceptable use policy for students 08202011[1]Technology acceptable use policy for students 08202011[1]
Technology acceptable use policy for students 08202011[1]ajdredla
 
Legal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroomLegal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroomjlknight
 
Why Web 20
Why Web 20Why Web 20
Why Web 20Tim Dedeaux
 
Top ten internet uses in teaching and learning
Top ten internet uses in teaching and learningTop ten internet uses in teaching and learning
Top ten internet uses in teaching and learningjhender1428
 

What's hot (20)

Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rules
 
The Benefits of Internet Education
The Benefits of Internet EducationThe Benefits of Internet Education
The Benefits of Internet Education
 
Top Ten Internet Uses In Teaching And Learning 2
Top Ten Internet Uses In Teaching And Learning   2Top Ten Internet Uses In Teaching And Learning   2
Top Ten Internet Uses In Teaching And Learning 2
 
Safe and Responsible Use of ICT
Safe and Responsible Use of ICTSafe and Responsible Use of ICT
Safe and Responsible Use of ICT
 
Camouflage and Safety in the Virtual World
Camouflage and Safety in the Virtual WorldCamouflage and Safety in the Virtual World
Camouflage and Safety in the Virtual World
 
computer ethics for educators
computer ethics for educatorscomputer ethics for educators
computer ethics for educators
 
Internet Publication
Internet PublicationInternet Publication
Internet Publication
 
Using the Internet for Learning
Using the Internet for LearningUsing the Internet for Learning
Using the Internet for Learning
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
benefits of the internet on education
benefits of the internet on educationbenefits of the internet on education
benefits of the internet on education
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
 
Inappropriate use of the network ppt
Inappropriate use of the network pptInappropriate use of the network ppt
Inappropriate use of the network ppt
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
ICT introduction
ICT introductionICT introduction
ICT introduction
 
Teaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the ClassroomTeaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the Classroom
 
Draft Computer Acceptable Use Policy
Draft Computer Acceptable Use PolicyDraft Computer Acceptable Use Policy
Draft Computer Acceptable Use Policy
 
Technology acceptable use policy for students 08202011[1]
Technology acceptable use policy for students 08202011[1]Technology acceptable use policy for students 08202011[1]
Technology acceptable use policy for students 08202011[1]
 
Legal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroomLegal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroom
 
Why Web 20
Why Web 20Why Web 20
Why Web 20
 
Top ten internet uses in teaching and learning
Top ten internet uses in teaching and learningTop ten internet uses in teaching and learning
Top ten internet uses in teaching and learning
 

Similar to Aup lesson for cbs students

Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computerFatin Izzaty
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computeribrahimtbl3147
 
SOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptxSOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptxHanelynDZAmudio
 
SM INTERNET.pptx
SM INTERNET.pptxSM INTERNET.pptx
SM INTERNET.pptxMadhumatiPujar
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipegschool
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentationlahill16
 
Internet policy[1]
Internet policy[1]Internet policy[1]
Internet policy[1]leslieannpt
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technologyJohan Koren
 
Your e image presentation 2
Your e image presentation 2Your e image presentation 2
Your e image presentation 2opiedog1
 
report_ThhhhhhhhhhhhhhhhhhhhhTL TTL.pptx
report_ThhhhhhhhhhhhhhhhhhhhhTL TTL.pptxreport_ThhhhhhhhhhhhhhhhhhhhhTL TTL.pptx
report_ThhhhhhhhhhhhhhhhhhhhhTL TTL.pptxprincesskatemannag14
 
Naughty or nice: Ethical concerns with technology
Naughty or nice:  Ethical concerns with technologyNaughty or nice:  Ethical concerns with technology
Naughty or nice: Ethical concerns with technologyJohan Koren
 
Security
SecuritySecurity
SecurityNabatah
 
Surviving a BYOD Implementation - TCEA 2016
Surviving a BYOD Implementation - TCEA 2016Surviving a BYOD Implementation - TCEA 2016
Surviving a BYOD Implementation - TCEA 2016Diana Benner
 
Netiquette
NetiquetteNetiquette
NetiquetteGlory
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and SystemParam Nanavati
 
Concept need and importance of internet in Education.pptx
Concept need and importance of internet in Education.pptxConcept need and importance of internet in Education.pptx
Concept need and importance of internet in Education.pptxMDNAFAYAFZAL
 

Similar to Aup lesson for cbs students (20)

Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
SOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptxSOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptx
 
INTERNET.pptx
 INTERNET.pptx INTERNET.pptx
INTERNET.pptx
 
SM INTERNET.pptx
SM INTERNET.pptxSM INTERNET.pptx
SM INTERNET.pptx
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentation
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Chapter6
Chapter6Chapter6
Chapter6
 
Internet policy[1]
Internet policy[1]Internet policy[1]
Internet policy[1]
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technology
 
Your e image presentation 2
Your e image presentation 2Your e image presentation 2
Your e image presentation 2
 
report_ThhhhhhhhhhhhhhhhhhhhhTL TTL.pptx
report_ThhhhhhhhhhhhhhhhhhhhhTL TTL.pptxreport_ThhhhhhhhhhhhhhhhhhhhhTL TTL.pptx
report_ThhhhhhhhhhhhhhhhhhhhhTL TTL.pptx
 
Naughty or nice: Ethical concerns with technology
Naughty or nice:  Ethical concerns with technologyNaughty or nice:  Ethical concerns with technology
Naughty or nice: Ethical concerns with technology
 
Security
SecuritySecurity
Security
 
Surviving a BYOD Implementation - TCEA 2016
Surviving a BYOD Implementation - TCEA 2016Surviving a BYOD Implementation - TCEA 2016
Surviving a BYOD Implementation - TCEA 2016
 
Netiquette
NetiquetteNetiquette
Netiquette
 
MIL_WEEK-3.pptx
MIL_WEEK-3.pptxMIL_WEEK-3.pptx
MIL_WEEK-3.pptx
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and System
 
Concept need and importance of internet in Education.pptx
Concept need and importance of internet in Education.pptxConcept need and importance of internet in Education.pptx
Concept need and importance of internet in Education.pptx
 

More from dlwadsworth

Ymca presentation
Ymca presentationYmca presentation
Ymca presentationdlwadsworth
 
It 2nd segment pace chart
It 2nd segment   pace chartIt 2nd segment   pace chart
It 2nd segment pace chartdlwadsworth
 
IT 1st segment Traditional pace chart
IT 1st segment  Traditional pace chartIT 1st segment  Traditional pace chart
IT 1st segment Traditional pace chartdlwadsworth
 
Acbsi pacing chart 2nd semester -14-15
Acbsi pacing chart   2nd semester -14-15Acbsi pacing chart   2nd semester -14-15
Acbsi pacing chart 2nd semester -14-15dlwadsworth
 
Segment 1 exam review ppt
Segment 1   exam review pptSegment 1   exam review ppt
Segment 1 exam review pptdlwadsworth
 
Pace chart 1st segment - traditional - ccc
Pace chart   1st segment - traditional - cccPace chart   1st segment - traditional - ccc
Pace chart 1st segment - traditional - cccdlwadsworth
 
Pace chart 2nd segment - computing for college and careers
Pace chart   2nd segment - computing for college and careersPace chart   2nd segment - computing for college and careers
Pace chart 2nd segment - computing for college and careersdlwadsworth
 
Acbsi orientation ppt
Acbsi   orientation pptAcbsi   orientation ppt
Acbsi orientation pptdlwadsworth
 
Acbsi ppt - project 1 sample
Acbsi   ppt - project 1 sampleAcbsi   ppt - project 1 sample
Acbsi ppt - project 1 sampledlwadsworth
 
Html assignment 2 template
Html assignment 2 templateHtml assignment 2 template
Html assignment 2 templatedlwadsworth
 
ACBSI Syllabus - Sheridan
ACBSI Syllabus - SheridanACBSI Syllabus - Sheridan
ACBSI Syllabus - Sheridandlwadsworth
 
Acbsi syllabus - Wadsworth
Acbsi syllabus - WadsworthAcbsi syllabus - Wadsworth
Acbsi syllabus - Wadsworthdlwadsworth
 
What is a will
What is a willWhat is a will
What is a willdlwadsworth
 
Odysseyware Orientation - Wadsworth
Odysseyware Orientation   - WadsworthOdysseyware Orientation   - Wadsworth
Odysseyware Orientation - Wadsworthdlwadsworth
 
Unit 12 sec 2-programming design
Unit 12 sec 2-programming designUnit 12 sec 2-programming design
Unit 12 sec 2-programming designdlwadsworth
 
Unit 12 section 1 - computer programming
Unit 12   section 1 - computer programmingUnit 12   section 1 - computer programming
Unit 12 section 1 - computer programmingdlwadsworth
 
Sam2010 getting started ppt
Sam2010 getting started pptSam2010 getting started ppt
Sam2010 getting started pptdlwadsworth
 
Cbs welcome to week 1 ppt
Cbs   welcome to week 1 pptCbs   welcome to week 1 ppt
Cbs welcome to week 1 pptdlwadsworth
 
Aup study guide for ppt pdf
Aup study guide for ppt  pdfAup study guide for ppt  pdf
Aup study guide for ppt pdfdlwadsworth
 
Aceptable use policy user guidelines
Aceptable use policy   user guidelinesAceptable use policy   user guidelines
Aceptable use policy user guidelinesdlwadsworth
 

More from dlwadsworth (20)

Ymca presentation
Ymca presentationYmca presentation
Ymca presentation
 
It 2nd segment pace chart
It 2nd segment   pace chartIt 2nd segment   pace chart
It 2nd segment pace chart
 
IT 1st segment Traditional pace chart
IT 1st segment  Traditional pace chartIT 1st segment  Traditional pace chart
IT 1st segment Traditional pace chart
 
Acbsi pacing chart 2nd semester -14-15
Acbsi pacing chart   2nd semester -14-15Acbsi pacing chart   2nd semester -14-15
Acbsi pacing chart 2nd semester -14-15
 
Segment 1 exam review ppt
Segment 1   exam review pptSegment 1   exam review ppt
Segment 1 exam review ppt
 
Pace chart 1st segment - traditional - ccc
Pace chart   1st segment - traditional - cccPace chart   1st segment - traditional - ccc
Pace chart 1st segment - traditional - ccc
 
Pace chart 2nd segment - computing for college and careers
Pace chart   2nd segment - computing for college and careersPace chart   2nd segment - computing for college and careers
Pace chart 2nd segment - computing for college and careers
 
Acbsi orientation ppt
Acbsi   orientation pptAcbsi   orientation ppt
Acbsi orientation ppt
 
Acbsi ppt - project 1 sample
Acbsi   ppt - project 1 sampleAcbsi   ppt - project 1 sample
Acbsi ppt - project 1 sample
 
Html assignment 2 template
Html assignment 2 templateHtml assignment 2 template
Html assignment 2 template
 
ACBSI Syllabus - Sheridan
ACBSI Syllabus - SheridanACBSI Syllabus - Sheridan
ACBSI Syllabus - Sheridan
 
Acbsi syllabus - Wadsworth
Acbsi syllabus - WadsworthAcbsi syllabus - Wadsworth
Acbsi syllabus - Wadsworth
 
What is a will
What is a willWhat is a will
What is a will
 
Odysseyware Orientation - Wadsworth
Odysseyware Orientation   - WadsworthOdysseyware Orientation   - Wadsworth
Odysseyware Orientation - Wadsworth
 
Unit 12 sec 2-programming design
Unit 12 sec 2-programming designUnit 12 sec 2-programming design
Unit 12 sec 2-programming design
 
Unit 12 section 1 - computer programming
Unit 12   section 1 - computer programmingUnit 12   section 1 - computer programming
Unit 12 section 1 - computer programming
 
Sam2010 getting started ppt
Sam2010 getting started pptSam2010 getting started ppt
Sam2010 getting started ppt
 
Cbs welcome to week 1 ppt
Cbs   welcome to week 1 pptCbs   welcome to week 1 ppt
Cbs welcome to week 1 ppt
 
Aup study guide for ppt pdf
Aup study guide for ppt  pdfAup study guide for ppt  pdf
Aup study guide for ppt pdf
 
Aceptable use policy user guidelines
Aceptable use policy   user guidelinesAceptable use policy   user guidelines
Aceptable use policy user guidelines
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Christopher Logan Kennedy
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 

Recently uploaded (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

Aup lesson for cbs students

  • 1. Please read & follow: • You need a pen/pencil today – anything except red or Sharpie. • Put all of your things away. • Please sit quietly in your seat.  1
  • 3. SCHOOL DISTRICT OF CLAY COUNTY TELECOMMUNICATIONS NETWORK OVERVIEW 1. SDCC provides opportunity for students to expand learning. 2. Opportunity = 3. Goal of school Internet a. Resource sharing b. Accessing outside information c. Research d. Encouraging technological innovation e. Worldwide communication •Question: Compared to other schools around the country and the world, what do you think our school would be like if we did not have access to the Internet? 3
  • 4. INTERNET RESOURCES 4. Students will have access to: a. Worldwide electronic mail communication. b. Global information and news. c. Public domain and shareware computer software. d. Educational discussion groups. e. Access to many university libraries and other libraries. 4
  • 5. INTERNET WARNING 5. Some materials on the Internet are not of educational value while at school. 6. This material may not be suitable for students. 7. The instructor will monitor student use of the Internet to prevent students from accessing unsuitable material. 5
  • 6. USER GUIDELINES 8. Internet access is through an association of government, regional & state networks. 9. School district wants the network to be used in a , efficient, ethical and legal manner. 10. Operation of Internet relies on proper conduct of the users. 6
  • 7. USER GUIDELINES Continued 11. If you violate, your account will be terminated. 12. Serious violations may result in school disciplinary action or legal action. 13. A signature indicates that the user has read and understands. 7
  • 8. Acceptable Use 14. Internet use must support education and research. 15. Users are encouraged to take advantage of the network’s functions: a. electronic mail b. conferences c. bulletin boards d. databases e. access to the Internet 8
  • 9. Privileges 16. Use of Internet = privilege 17. Inappropriate use = no privilege Question: Why do you think using the Internet at school is a privilege? 9
  • 10. “Netiquette” 18. Abide by the rules of network etiquette. 19. Be polite. 20. Do not use vulgar or obscene language. 21. Do not reveal your address or phone number or those of others. 22. Electronic mail is not guaranteed to be private. 23. Do not disrupt the network, the data, or other users. 10
  • 11. 24. Unacceptable Uses of Network a. Violating student or staff rights to privacy. b. Using the Internet without application of common sense. c. Using profanity, obscenity, or other language which may be offensive to another user. d. Sending or accessing pornographic text and/or graphics. e. Unauthorized games. f. Sending or receiving copyrighted materials. g. Reporting personal communications without the author’s prior consent. Question: What could happen to a person, whose private information such as a name, address and phone 11 number, given out over the Internet without their
  • 12. Unacceptable Uses of Network Continued h. Using for commercial activities, product advertisement, or financial gain. i. Knowingly transmitting viruses. j. Spam. k. Chain letters. l. Unauthorized solicitations for goods and services. m. Posting personal views . n. Unauthorized streaming video or music – this ties up the bandwidth & slows down the network. Question: What would happen to the school Internet if a virus was sent in to infect the system? 12
  • 13. Warranties 25. SDCC makes no warranties. 26. SDCC will not be responsible for damages or loss of data. 27. SDCC will not be responsible for the accuracy or quality of information obtain on network. 28. Inappropriate Internet sites should be reported to teacher immediately. 13
  • 14. Security 29. Security is a high priority. 30. Do not show or identify the problem to others. 31. Do not use another individual’s account. 32. Attempts to log on as another user will result in cancellation of your privileges. 33. Security risk users will be denied network access. 14
  • 15. Vandalism 34. Vandalism = privileges cancellation and/or disciplinary action. 35. Vandalism is a malicious attempt to harm or destroy data of another user, Internet, or other networks. 36. Includes creation or uploading computer viruses on the Internet or host site. 37. Degrading or disrupting system performance is a crime under state and federal law. 15
  • 16. Sponsors 38. Teachers are to make sure students: a. Know how to use the Internet correctly & b. Know what happens if they don’t! 16
  • 17. Let’s Review What is the main purpose and goal of having a school Internet? Why are there so many rules and guidelines for using the school Internet? What are some benefits of having Internet and network rules? Why do you have your own personal user account when you log onto the school Internet? What are some benefits of having your own user account for logging onto the school Internet? What happens to the school Internet when you down load unauthorized streaming videos and music? 17