SlideShare a Scribd company logo
1 of 16
1
Use of
Telecommunications
&
Network
2
SCHOOL DISTRICT OF CLAY COUNTY
TELECOMMUNICATIONS NETWORK
OVERVIEW
1. SDCC provides opportunity for students to expand
learning.
2. Opportunity =
3. Goal of school Internet
a. Resource sharing
b. Accessing outside information
c. Research
d. Encouraging technological innovation
e. Worldwide communication
•Question: Compared to other schools around the country and
the world, what do you think our school would be like if we did
not have access to the Internet?
3
INTERNET RESOURCES
4. Students will have access to:
a. Worldwide electronic mail
communication.
b. Global information and news.
c. Public domain and shareware computer
software.
d. Educational discussion groups.
e. Access to many university libraries and
other libraries.
4
INTERNET WARNING
5. Some materials on the Internet are not of educational value
while at school.
6. This material may not be suitable for students.
7. The instructor will monitor student use of the Internet to
prevent students from accessing unsuitable material.
5
USER GUIDELINES
8. Internet access is through an association of government,
regional & state networks.
9. School district wants the network to be used in a ,
efficient, ethical and legal manner.
10. Operation of Internet relies on proper conduct of the users.
6
USER GUIDELINES Continued
11. If you violate, your account will be terminated.
12. Serious violations may result in school disciplinary action or
legal action.
13. A signature indicates that the user has read and understands.
7
Acceptable Use
14. Internet use must support education and research.
15. Users are encouraged to take advantage of the network’s
functions:
a. electronic mail
b. conferences
c. bulletin boards
d. databases
e. access to the Internet
8
Privileges
16. Use of Internet = privilege
17. Inappropriate use = no privilege
Question: Why do you think using the Internet at school is a
privilege?
9
“Netiquette”
18. Abide by the rules of network etiquette.
19. Be polite.
20. Do not use vulgar or obscene language.
21. Do not reveal your address or phone number or those of
others.
22. Electronic mail is not guaranteed to be private.
23. Do not disrupt the network, the data, or other users.
10
24. Unacceptable Uses of Network
a. Violating student or staff rights to privacy.
b. Using the Internet without application of common sense.
c. Using profanity, obscenity, or other language which may be
offensive to another user.
d. Sending or accessing pornographic text and/or graphics.
e. Unauthorized games.
f. Sending or receiving copyrighted materials.
g. Reporting personal communications without the author’s prior
consent.
Question: What could happen to a person, whose private
information such as a name, address and phone number,
given out over the Internet without their permission?
11
Unacceptable Uses of Network Continued
h. Using for commercial activities, product advertisement, or
financial gain.
i. Knowingly transmitting viruses.
j. Spam.
k. Chain letters.
l. Unauthorized solicitations for goods and services.
m. Posting personal views .
n. Unauthorized streaming video or music – this ties up the
bandwidth & slows down the network.
Question: What would happen to the school Internet if a virus was sent
in to infect the system?
12
Warranties
25. SDCC makes no warranties.
26. SDCC will not be responsible for damages or loss of data.
27. SDCC will not be responsible for the accuracy or quality of
information obtain on network.
28. Inappropriate Internet sites should be reported to teacher
immediately.
13
Security
29. Security is a high priority.
30. Do not show or identify the problem to others.
31. Do not use another individual’s account.
32. Attempts to log on as another user will result in cancellation of
your privileges.
33. Security risk users will be denied network access.
14
Vandalism
34. Vandalism = privileges cancellation and/or disciplinary action.
35. Vandalism is a malicious attempt to harm or destroy data of
another user, Internet, or other networks.
36. Includes creation or uploading computer viruses on the
Internet or host site.
37. Degrading or disrupting system performance is a crime under
state and federal law.
15
Sponsors
38. Teachers are to make sure students:
a. Know how to use the Internet correctly &
b. Know what happens if they don’t!
16
The End

More Related Content

What's hot

Chapter9 presentation
Chapter9 presentationChapter9 presentation
Chapter9 presentationangelicausa13
 
Chapter9 presentation
Chapter9 presentationChapter9 presentation
Chapter9 presentationangelicausa13
 
Chapter9 presentation
Chapter9 presentationChapter9 presentation
Chapter9 presentationangelicausa13
 
labComputer lab rules and ethics concept outline
labComputer lab rules and ethics concept outlinelabComputer lab rules and ethics concept outline
labComputer lab rules and ethics concept outlineSwapnil Sawale
 
Acceptable Use Policy
Acceptable Use PolicyAcceptable Use Policy
Acceptable Use Policyguest5431f2
 
Cybersafety rules 2010 years 3 to 6
Cybersafety rules 2010 years 3 to 6Cybersafety rules 2010 years 3 to 6
Cybersafety rules 2010 years 3 to 6RochelleStansfield
 
Issue with Internet in college (Computer Security and Cyber Law)
Issue with Internet in college (Computer Security and Cyber Law)Issue with Internet in college (Computer Security and Cyber Law)
Issue with Internet in college (Computer Security and Cyber Law)Govinda Aryal
 
Top 10 uses of the internet in teaching
Top 10 uses of the internet in teachingTop 10 uses of the internet in teaching
Top 10 uses of the internet in teachingTroy University
 
Copyrightvictorialopezrevisedforch1&2
Copyrightvictorialopezrevisedforch1&2Copyrightvictorialopezrevisedforch1&2
Copyrightvictorialopezrevisedforch1&2secretsvicky
 
Chapter 12 ppt for module 5
Chapter 12 ppt for module 5Chapter 12 ppt for module 5
Chapter 12 ppt for module 5sragasa
 
Aralanet Iteach V1
Aralanet Iteach V1Aralanet Iteach V1
Aralanet Iteach V1John Macasio
 
Ms. Fanelli's US History Class
Ms. Fanelli's US History ClassMs. Fanelli's US History Class
Ms. Fanelli's US History ClassBrittany
 
Wicked Good Resource Youre Probably Not Using
Wicked Good Resource Youre Probably Not UsingWicked Good Resource Youre Probably Not Using
Wicked Good Resource Youre Probably Not UsingPatty Ball
 

What's hot (18)

AUP
AUPAUP
AUP
 
Chapter9 presentation
Chapter9 presentationChapter9 presentation
Chapter9 presentation
 
Chapter9 presentation
Chapter9 presentationChapter9 presentation
Chapter9 presentation
 
Chapter9 presentation
Chapter9 presentationChapter9 presentation
Chapter9 presentation
 
labComputer lab rules and ethics concept outline
labComputer lab rules and ethics concept outlinelabComputer lab rules and ethics concept outline
labComputer lab rules and ethics concept outline
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Acceptable Use Policy
Acceptable Use PolicyAcceptable Use Policy
Acceptable Use Policy
 
Cybersafety rules 2010 years 3 to 6
Cybersafety rules 2010 years 3 to 6Cybersafety rules 2010 years 3 to 6
Cybersafety rules 2010 years 3 to 6
 
AUP
AUPAUP
AUP
 
Issue with Internet in college (Computer Security and Cyber Law)
Issue with Internet in college (Computer Security and Cyber Law)Issue with Internet in college (Computer Security and Cyber Law)
Issue with Internet in college (Computer Security and Cyber Law)
 
Top 10 uses of the internet in teaching
Top 10 uses of the internet in teachingTop 10 uses of the internet in teaching
Top 10 uses of the internet in teaching
 
Copyrightvictorialopezrevisedforch1&2
Copyrightvictorialopezrevisedforch1&2Copyrightvictorialopezrevisedforch1&2
Copyrightvictorialopezrevisedforch1&2
 
Chapter 12 ppt for module 5
Chapter 12 ppt for module 5Chapter 12 ppt for module 5
Chapter 12 ppt for module 5
 
Laptop Orientation Year 10 St Mary's Wollongong
Laptop Orientation Year 10 St Mary's WollongongLaptop Orientation Year 10 St Mary's Wollongong
Laptop Orientation Year 10 St Mary's Wollongong
 
Aralanet Iteach V1
Aralanet Iteach V1Aralanet Iteach V1
Aralanet Iteach V1
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Ms. Fanelli's US History Class
Ms. Fanelli's US History ClassMs. Fanelli's US History Class
Ms. Fanelli's US History Class
 
Wicked Good Resource Youre Probably Not Using
Wicked Good Resource Youre Probably Not UsingWicked Good Resource Youre Probably Not Using
Wicked Good Resource Youre Probably Not Using
 

Viewers also liked

Viewers also liked (8)

Conclusión
ConclusiónConclusión
Conclusión
 
Print
PrintPrint
Print
 
The Interactive Charter
The Interactive CharterThe Interactive Charter
The Interactive Charter
 
Presentation md
Presentation mdPresentation md
Presentation md
 
Ready for a challenge
Ready for a challengeReady for a challenge
Ready for a challenge
 
Detecting Signals from Real-time Social Web
Detecting Signals from Real-time Social Web Detecting Signals from Real-time Social Web
Detecting Signals from Real-time Social Web
 
Fried Images
Fried ImagesFried Images
Fried Images
 
конспект уроку
конспект урокуконспект уроку
конспект уроку
 

Similar to Aup lesson for vll students

Aup lesson for cbs students
Aup lesson for cbs studentsAup lesson for cbs students
Aup lesson for cbs studentsvlbrown
 
Aup lesson for cbs students
Aup lesson for cbs studentsAup lesson for cbs students
Aup lesson for cbs studentsdlwadsworth
 
Aup lesson for cbs students
Aup lesson for cbs studentsAup lesson for cbs students
Aup lesson for cbs studentsvlbrown
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computerFatin Izzaty
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computeribrahimtbl3147
 
computer ethics for educators
computer ethics for educatorscomputer ethics for educators
computer ethics for educatorsjessa_delingon
 
Internet policy[1]
Internet policy[1]Internet policy[1]
Internet policy[1]leslieannpt
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipegschool
 
Security
SecuritySecurity
SecurityNabatah
 
Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriersJohn Oxley
 

Similar to Aup lesson for vll students (20)

Aup lesson for cbs students
Aup lesson for cbs studentsAup lesson for cbs students
Aup lesson for cbs students
 
Aup lesson for cbs students
Aup lesson for cbs studentsAup lesson for cbs students
Aup lesson for cbs students
 
Aup lesson for cbs students
Aup lesson for cbs studentsAup lesson for cbs students
Aup lesson for cbs students
 
Acceptable Use Policy
Acceptable Use PolicyAcceptable Use Policy
Acceptable Use Policy
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
computer ethics for educators
computer ethics for educatorscomputer ethics for educators
computer ethics for educators
 
Law 483 cyberethics
Law 483 cyberethicsLaw 483 cyberethics
Law 483 cyberethics
 
CMS Technology acceptable use policy
CMS Technology acceptable use policyCMS Technology acceptable use policy
CMS Technology acceptable use policy
 
SOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptxSOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptx
 
Draft Computer Acceptable Use Policy
Draft Computer Acceptable Use PolicyDraft Computer Acceptable Use Policy
Draft Computer Acceptable Use Policy
 
Internet policy[1]
Internet policy[1]Internet policy[1]
Internet policy[1]
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Chapter6
Chapter6Chapter6
Chapter6
 
INTERNET.pptx
 INTERNET.pptx INTERNET.pptx
INTERNET.pptx
 
SM INTERNET.pptx
SM INTERNET.pptxSM INTERNET.pptx
SM INTERNET.pptx
 
Security
SecuritySecurity
Security
 
Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriers
 
Cybersafety yr0 3
Cybersafety yr0 3Cybersafety yr0 3
Cybersafety yr0 3
 

More from dlwadsworth

Ymca presentation
Ymca presentationYmca presentation
Ymca presentationdlwadsworth
 
It 2nd segment pace chart
It 2nd segment   pace chartIt 2nd segment   pace chart
It 2nd segment pace chartdlwadsworth
 
IT 1st segment Traditional pace chart
IT 1st segment  Traditional pace chartIT 1st segment  Traditional pace chart
IT 1st segment Traditional pace chartdlwadsworth
 
Acbsi pacing chart 2nd semester -14-15
Acbsi pacing chart   2nd semester -14-15Acbsi pacing chart   2nd semester -14-15
Acbsi pacing chart 2nd semester -14-15dlwadsworth
 
Segment 1 exam review ppt
Segment 1   exam review pptSegment 1   exam review ppt
Segment 1 exam review pptdlwadsworth
 
Pace chart 1st segment - traditional - ccc
Pace chart   1st segment - traditional - cccPace chart   1st segment - traditional - ccc
Pace chart 1st segment - traditional - cccdlwadsworth
 
Pace chart 2nd segment - computing for college and careers
Pace chart   2nd segment - computing for college and careersPace chart   2nd segment - computing for college and careers
Pace chart 2nd segment - computing for college and careersdlwadsworth
 
Acbsi orientation ppt
Acbsi   orientation pptAcbsi   orientation ppt
Acbsi orientation pptdlwadsworth
 
Acbsi ppt - project 1 sample
Acbsi   ppt - project 1 sampleAcbsi   ppt - project 1 sample
Acbsi ppt - project 1 sampledlwadsworth
 
Html assignment 2 template
Html assignment 2 templateHtml assignment 2 template
Html assignment 2 templatedlwadsworth
 
ACBSI Syllabus - Sheridan
ACBSI Syllabus - SheridanACBSI Syllabus - Sheridan
ACBSI Syllabus - Sheridandlwadsworth
 
Acbsi syllabus - Wadsworth
Acbsi syllabus - WadsworthAcbsi syllabus - Wadsworth
Acbsi syllabus - Wadsworthdlwadsworth
 
Odysseyware Orientation - Wadsworth
Odysseyware Orientation   - WadsworthOdysseyware Orientation   - Wadsworth
Odysseyware Orientation - Wadsworthdlwadsworth
 
Unit 12 sec 2-programming design
Unit 12 sec 2-programming designUnit 12 sec 2-programming design
Unit 12 sec 2-programming designdlwadsworth
 
Unit 12 section 1 - computer programming
Unit 12   section 1 - computer programmingUnit 12   section 1 - computer programming
Unit 12 section 1 - computer programmingdlwadsworth
 
Sam2010 getting started ppt
Sam2010 getting started pptSam2010 getting started ppt
Sam2010 getting started pptdlwadsworth
 
Cbs welcome to week 1 ppt
Cbs   welcome to week 1 pptCbs   welcome to week 1 ppt
Cbs welcome to week 1 pptdlwadsworth
 
Aup study guide for ppt pdf
Aup study guide for ppt  pdfAup study guide for ppt  pdf
Aup study guide for ppt pdfdlwadsworth
 
Aceptable use policy user guidelines
Aceptable use policy   user guidelinesAceptable use policy   user guidelines
Aceptable use policy user guidelinesdlwadsworth
 

More from dlwadsworth (20)

Ymca presentation
Ymca presentationYmca presentation
Ymca presentation
 
It 2nd segment pace chart
It 2nd segment   pace chartIt 2nd segment   pace chart
It 2nd segment pace chart
 
IT 1st segment Traditional pace chart
IT 1st segment  Traditional pace chartIT 1st segment  Traditional pace chart
IT 1st segment Traditional pace chart
 
Acbsi pacing chart 2nd semester -14-15
Acbsi pacing chart   2nd semester -14-15Acbsi pacing chart   2nd semester -14-15
Acbsi pacing chart 2nd semester -14-15
 
Segment 1 exam review ppt
Segment 1   exam review pptSegment 1   exam review ppt
Segment 1 exam review ppt
 
Pace chart 1st segment - traditional - ccc
Pace chart   1st segment - traditional - cccPace chart   1st segment - traditional - ccc
Pace chart 1st segment - traditional - ccc
 
Pace chart 2nd segment - computing for college and careers
Pace chart   2nd segment - computing for college and careersPace chart   2nd segment - computing for college and careers
Pace chart 2nd segment - computing for college and careers
 
Acbsi orientation ppt
Acbsi   orientation pptAcbsi   orientation ppt
Acbsi orientation ppt
 
Acbsi ppt - project 1 sample
Acbsi   ppt - project 1 sampleAcbsi   ppt - project 1 sample
Acbsi ppt - project 1 sample
 
Html assignment 2 template
Html assignment 2 templateHtml assignment 2 template
Html assignment 2 template
 
ACBSI Syllabus - Sheridan
ACBSI Syllabus - SheridanACBSI Syllabus - Sheridan
ACBSI Syllabus - Sheridan
 
Acbsi syllabus - Wadsworth
Acbsi syllabus - WadsworthAcbsi syllabus - Wadsworth
Acbsi syllabus - Wadsworth
 
What is a will
What is a willWhat is a will
What is a will
 
Odysseyware Orientation - Wadsworth
Odysseyware Orientation   - WadsworthOdysseyware Orientation   - Wadsworth
Odysseyware Orientation - Wadsworth
 
Unit 12 sec 2-programming design
Unit 12 sec 2-programming designUnit 12 sec 2-programming design
Unit 12 sec 2-programming design
 
Unit 12 section 1 - computer programming
Unit 12   section 1 - computer programmingUnit 12   section 1 - computer programming
Unit 12 section 1 - computer programming
 
Sam2010 getting started ppt
Sam2010 getting started pptSam2010 getting started ppt
Sam2010 getting started ppt
 
Cbs welcome to week 1 ppt
Cbs   welcome to week 1 pptCbs   welcome to week 1 ppt
Cbs welcome to week 1 ppt
 
Aup study guide for ppt pdf
Aup study guide for ppt  pdfAup study guide for ppt  pdf
Aup study guide for ppt pdf
 
Aceptable use policy user guidelines
Aceptable use policy   user guidelinesAceptable use policy   user guidelines
Aceptable use policy user guidelines
 

Recently uploaded

4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 

Recently uploaded (20)

4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 

Aup lesson for vll students

  • 2. 2 SCHOOL DISTRICT OF CLAY COUNTY TELECOMMUNICATIONS NETWORK OVERVIEW 1. SDCC provides opportunity for students to expand learning. 2. Opportunity = 3. Goal of school Internet a. Resource sharing b. Accessing outside information c. Research d. Encouraging technological innovation e. Worldwide communication •Question: Compared to other schools around the country and the world, what do you think our school would be like if we did not have access to the Internet?
  • 3. 3 INTERNET RESOURCES 4. Students will have access to: a. Worldwide electronic mail communication. b. Global information and news. c. Public domain and shareware computer software. d. Educational discussion groups. e. Access to many university libraries and other libraries.
  • 4. 4 INTERNET WARNING 5. Some materials on the Internet are not of educational value while at school. 6. This material may not be suitable for students. 7. The instructor will monitor student use of the Internet to prevent students from accessing unsuitable material.
  • 5. 5 USER GUIDELINES 8. Internet access is through an association of government, regional & state networks. 9. School district wants the network to be used in a , efficient, ethical and legal manner. 10. Operation of Internet relies on proper conduct of the users.
  • 6. 6 USER GUIDELINES Continued 11. If you violate, your account will be terminated. 12. Serious violations may result in school disciplinary action or legal action. 13. A signature indicates that the user has read and understands.
  • 7. 7 Acceptable Use 14. Internet use must support education and research. 15. Users are encouraged to take advantage of the network’s functions: a. electronic mail b. conferences c. bulletin boards d. databases e. access to the Internet
  • 8. 8 Privileges 16. Use of Internet = privilege 17. Inappropriate use = no privilege Question: Why do you think using the Internet at school is a privilege?
  • 9. 9 “Netiquette” 18. Abide by the rules of network etiquette. 19. Be polite. 20. Do not use vulgar or obscene language. 21. Do not reveal your address or phone number or those of others. 22. Electronic mail is not guaranteed to be private. 23. Do not disrupt the network, the data, or other users.
  • 10. 10 24. Unacceptable Uses of Network a. Violating student or staff rights to privacy. b. Using the Internet without application of common sense. c. Using profanity, obscenity, or other language which may be offensive to another user. d. Sending or accessing pornographic text and/or graphics. e. Unauthorized games. f. Sending or receiving copyrighted materials. g. Reporting personal communications without the author’s prior consent. Question: What could happen to a person, whose private information such as a name, address and phone number, given out over the Internet without their permission?
  • 11. 11 Unacceptable Uses of Network Continued h. Using for commercial activities, product advertisement, or financial gain. i. Knowingly transmitting viruses. j. Spam. k. Chain letters. l. Unauthorized solicitations for goods and services. m. Posting personal views . n. Unauthorized streaming video or music – this ties up the bandwidth & slows down the network. Question: What would happen to the school Internet if a virus was sent in to infect the system?
  • 12. 12 Warranties 25. SDCC makes no warranties. 26. SDCC will not be responsible for damages or loss of data. 27. SDCC will not be responsible for the accuracy or quality of information obtain on network. 28. Inappropriate Internet sites should be reported to teacher immediately.
  • 13. 13 Security 29. Security is a high priority. 30. Do not show or identify the problem to others. 31. Do not use another individual’s account. 32. Attempts to log on as another user will result in cancellation of your privileges. 33. Security risk users will be denied network access.
  • 14. 14 Vandalism 34. Vandalism = privileges cancellation and/or disciplinary action. 35. Vandalism is a malicious attempt to harm or destroy data of another user, Internet, or other networks. 36. Includes creation or uploading computer viruses on the Internet or host site. 37. Degrading or disrupting system performance is a crime under state and federal law.
  • 15. 15 Sponsors 38. Teachers are to make sure students: a. Know how to use the Internet correctly & b. Know what happens if they don’t!