SlideShare une entreprise Scribd logo
1  sur  20
Welcome to Fayetteville Computer Lab
Computer Lab Rules and Technology Ethics
The Computer Lab is a valuable tool for learning at Fayetteville High School. ,[object Object],[object Object],[object Object],[object Object]
Section 1  Rules of the Classroom
Store your bookbags and personal items at the back of the lab as you come into the lab. There is not enough space next to the computers for these materials.
No food or drink is allowed in the computer lab.
[object Object],[object Object],[object Object],[object Object],[object Object]
The Computer Lab is a classroom.  You are here to work on your assignment. You are not here to “play”. If you use the computer for any purpose other than your assignment, it will be considered  computer misuse .
Students are not permitted to ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Discipline Policy 1st  Offense:  Student is given a warning. 2nd Offense:  Student is removed from computer for the rest of the class period and parent contact is made.  3rd Offense: Student is sent to the office with a discipline referral.  It is the classroom teacher’s decision to allow the student to make up missed work. Students are responsible for repair or replacement of deliberately damaged equipment.
HACKING Unauthorized use of hardware or software can be considered to be “hacking.” Talladega County Schools Discipline Policy: Class 2 Offense (In or Out of School Suspension):   When hacking does not cause damage to equipment and/or data. Class 3 Offense (Out of School Suspension or Expulsion):   When hacking causes damage to equipment and/or data.
Section 2  Technology Ethics
Etiquette Use good manners. Be polite. Have respect for the property of others. Be honest – do your own work.
Copyright ©  Merriam-Webster Dictionary  http://www.m-w.com/cgi-bin/dictionary Almost everything created after March 1, 1989 is protected by copyright.  It does not have to have a copyright notice on it. the exclusive legal right to reproduce, publish, sell, or distribute the matter and form of something (as a literary, musical, or artistic work)
Music and software are copyrighted.   You buy the right to use the disc, but you do not own the product. It is illegal to copy CDs if you have not purchased the license to do so.
Information, pictures, and music acquired from the Internet is copyrighted. Students must cite the source of reference information and images used in multimedia presentations. Pictures must have copyright information next to the image:
When information is acquired from a website, the website author and Internet address of the site must be “cited” in a bibliography, works cited slide, etc. Example: "Mickey Mouse."  Britannica Student Encyclopedia . 2003.  Encyclopædia Britannica Online. 17 June 2003.  http://search.eb.com/ebi/article?eu=354813 .
Section 3  Internet Safety
Stay Safe While you Surf… ,[object Object],[object Object],[object Object],[object Object],[object Object]
Computer Lab attendance is a privilege you should not take for granted.  Following the guidelines presented today will help you have a successful experience.

Contenu connexe

Tendances

Smart Phones & Tablets as a Research Tools - Arbutus Middle School
Smart Phones & Tablets as a Research Tools - Arbutus Middle School Smart Phones & Tablets as a Research Tools - Arbutus Middle School
Smart Phones & Tablets as a Research Tools - Arbutus Middle School Rich McCue
 
Smart Phones & Tablets: Distractions or Homework Tools for Students?
Smart Phones & Tablets: Distractions or Homework Tools for Students?Smart Phones & Tablets: Distractions or Homework Tools for Students?
Smart Phones & Tablets: Distractions or Homework Tools for Students?Rich McCue
 
Computer lab rules
Computer lab rulesComputer lab rules
Computer lab rulesSCA
 
IDEA Culture Camp COW procedures
IDEA Culture Camp COW proceduresIDEA Culture Camp COW procedures
IDEA Culture Camp COW proceduressylviahinojosa
 
Technology internet rules 08202011[1]
Technology internet rules 08202011[1]Technology internet rules 08202011[1]
Technology internet rules 08202011[1]ajdredla
 
Netiquette and code of conduct in communication
Netiquette and code of conduct in communicationNetiquette and code of conduct in communication
Netiquette and code of conduct in communicationfloresnewcastleeduau
 
The essential rules of netiquette by Halina
The essential rules of netiquette by HalinaThe essential rules of netiquette by Halina
The essential rules of netiquette by HalinaSelf-employed
 
Netiquette - Basic Guidelines
Netiquette - Basic GuidelinesNetiquette - Basic Guidelines
Netiquette - Basic Guidelinesjosbor61
 
Arlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use PolicyArlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use PolicyKoolteechatechnology
 
Safety in cyberspace
Safety in cyberspaceSafety in cyberspace
Safety in cyberspaceJanealW
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetydpl
 
Intermediate Introduction to Computers overview
Intermediate Introduction to Computers overviewIntermediate Introduction to Computers overview
Intermediate Introduction to Computers overviewLynne Reed
 
Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02Velma
 
September anncts
September annctsSeptember anncts
September annctsbonierin
 

Tendances (20)

Smart Phones & Tablets as a Research Tools - Arbutus Middle School
Smart Phones & Tablets as a Research Tools - Arbutus Middle School Smart Phones & Tablets as a Research Tools - Arbutus Middle School
Smart Phones & Tablets as a Research Tools - Arbutus Middle School
 
AUP
AUPAUP
AUP
 
Smart Phones & Tablets: Distractions or Homework Tools for Students?
Smart Phones & Tablets: Distractions or Homework Tools for Students?Smart Phones & Tablets: Distractions or Homework Tools for Students?
Smart Phones & Tablets: Distractions or Homework Tools for Students?
 
Computer lab rules
Computer lab rulesComputer lab rules
Computer lab rules
 
IDEA Culture Camp COW procedures
IDEA Culture Camp COW proceduresIDEA Culture Camp COW procedures
IDEA Culture Camp COW procedures
 
Technology internet rules 08202011[1]
Technology internet rules 08202011[1]Technology internet rules 08202011[1]
Technology internet rules 08202011[1]
 
Netiquette and code of conduct in communication
Netiquette and code of conduct in communicationNetiquette and code of conduct in communication
Netiquette and code of conduct in communication
 
The essential rules of netiquette by Halina
The essential rules of netiquette by HalinaThe essential rules of netiquette by Halina
The essential rules of netiquette by Halina
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Netiquette - Basic Guidelines
Netiquette - Basic GuidelinesNetiquette - Basic Guidelines
Netiquette - Basic Guidelines
 
Netiquette
NetiquetteNetiquette
Netiquette
 
SWC Lab Orientation 5-20-09
SWC Lab Orientation 5-20-09SWC Lab Orientation 5-20-09
SWC Lab Orientation 5-20-09
 
Arlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use PolicyArlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use Policy
 
Safety in cyberspace
Safety in cyberspaceSafety in cyberspace
Safety in cyberspace
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Intermediate Introduction to Computers overview
Intermediate Introduction to Computers overviewIntermediate Introduction to Computers overview
Intermediate Introduction to Computers overview
 
Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02
 
September anncts
September annctsSeptember anncts
September anncts
 

En vedette

Computer lab rules and regulations
Computer lab rules and  regulationsComputer lab rules and  regulations
Computer lab rules and regulationsShanmugam Thiagoo
 
Computer Lab Management and Ethics in Using Computer
Computer Lab Management and Ethics in Using ComputerComputer Lab Management and Ethics in Using Computer
Computer Lab Management and Ethics in Using ComputerNur Azlina
 
Computer Lab Rules & Procedures
Computer Lab Rules & ProceduresComputer Lab Rules & Procedures
Computer Lab Rules & Proceduresmrscoggin
 
Internetsafety08
Internetsafety08Internetsafety08
Internetsafety08morag
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computerFatin Izzaty
 
ICT:Classroom rules and expectations
ICT:Classroom rules and expectationsICT:Classroom rules and expectations
ICT:Classroom rules and expectationsDayleen Hijosa
 
Technology Lab - Ms Gardner
Technology Lab - Ms GardnerTechnology Lab - Ms Gardner
Technology Lab - Ms GardneriSURF
 
Computer lab rules and procedures illustrated 2010
Computer lab rules and procedures illustrated 2010Computer lab rules and procedures illustrated 2010
Computer lab rules and procedures illustrated 2010Alice Mercer
 
Computer Lab Rules and Procedures
Computer Lab Rules and ProceduresComputer Lab Rules and Procedures
Computer Lab Rules and Procedurescdmacke
 
PPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer EthicsPPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer EthicsScøtt Lıgøckı
 
Techniques, Tips & Tools for Managing a Computer Lab
Techniques, Tips & Tools for Managing a Computer LabTechniques, Tips & Tools for Managing a Computer Lab
Techniques, Tips & Tools for Managing a Computer LabChristopher Casal
 
Rules Intermediate
Rules IntermediateRules Intermediate
Rules IntermediateAlice Mercer
 
Classroom Management in the Computer Lab
Classroom Management in the Computer LabClassroom Management in the Computer Lab
Classroom Management in the Computer Labhamptonk
 
Online computer lab management system
Online computer lab management systemOnline computer lab management system
Online computer lab management systemPranyta Karhe
 
Welcome To Your Computer Lab Ppt
Welcome To Your Computer Lab PptWelcome To Your Computer Lab Ppt
Welcome To Your Computer Lab PptDot Rutherford
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyRachel Farnese
 

En vedette (20)

Computer lab rules and regulations
Computer lab rules and  regulationsComputer lab rules and  regulations
Computer lab rules and regulations
 
Computer Lab Management and Ethics in Using Computer
Computer Lab Management and Ethics in Using ComputerComputer Lab Management and Ethics in Using Computer
Computer Lab Management and Ethics in Using Computer
 
Computer Lab Rules & Procedures
Computer Lab Rules & ProceduresComputer Lab Rules & Procedures
Computer Lab Rules & Procedures
 
Internetsafety08
Internetsafety08Internetsafety08
Internetsafety08
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Computer lab etiquette 2012
Computer lab etiquette 2012Computer lab etiquette 2012
Computer lab etiquette 2012
 
ICT:Classroom rules and expectations
ICT:Classroom rules and expectationsICT:Classroom rules and expectations
ICT:Classroom rules and expectations
 
Technology Lab - Ms Gardner
Technology Lab - Ms GardnerTechnology Lab - Ms Gardner
Technology Lab - Ms Gardner
 
Computer lab rules and procedures illustrated 2010
Computer lab rules and procedures illustrated 2010Computer lab rules and procedures illustrated 2010
Computer lab rules and procedures illustrated 2010
 
Computer Lab Rules and Procedures
Computer Lab Rules and ProceduresComputer Lab Rules and Procedures
Computer Lab Rules and Procedures
 
Computer lab rules asma
Computer lab rules asmaComputer lab rules asma
Computer lab rules asma
 
PPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer EthicsPPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer Ethics
 
Techniques, Tips & Tools for Managing a Computer Lab
Techniques, Tips & Tools for Managing a Computer LabTechniques, Tips & Tools for Managing a Computer Lab
Techniques, Tips & Tools for Managing a Computer Lab
 
Rules Intermediate
Rules IntermediateRules Intermediate
Rules Intermediate
 
Classroom Management in the Computer Lab
Classroom Management in the Computer LabClassroom Management in the Computer Lab
Classroom Management in the Computer Lab
 
Online computer lab management system
Online computer lab management systemOnline computer lab management system
Online computer lab management system
 
Welcome To Your Computer Lab Ppt
Welcome To Your Computer Lab PptWelcome To Your Computer Lab Ppt
Welcome To Your Computer Lab Ppt
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in Technology
 

Similaire à Computer Rules

Computer use slideshow 3 5 final 2008
Computer use slideshow 3 5 final 2008Computer use slideshow 3 5 final 2008
Computer use slideshow 3 5 final 2008JulieRen141
 
Digital citizenship ss
Digital citizenship ssDigital citizenship ss
Digital citizenship ssLenva Shearing
 
Back to school night 2016 slideshare
Back to school night 2016 slideshareBack to school night 2016 slideshare
Back to school night 2016 slideshareccantlie
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policymaryjasperse
 
Mark Jastine Pertez Chapter 8
Mark Jastine Pertez Chapter 8 Mark Jastine Pertez Chapter 8
Mark Jastine Pertez Chapter 8 Jaypee Tan
 
Internet Publication
Internet PublicationInternet Publication
Internet PublicationDré Davis
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guidemjtheman
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policyjsmarr11
 
Digial Citizenship Intro
Digial Citizenship IntroDigial Citizenship Intro
Digial Citizenship Introtechmunoz
 
E behaviour code brochure english
E behaviour code brochure englishE behaviour code brochure english
E behaviour code brochure englishThinkB4UClick
 
Student RUP Agreement explained
Student RUP Agreement explainedStudent RUP Agreement explained
Student RUP Agreement explainedShawn Wyble
 

Similaire à Computer Rules (20)

Safety Presentation
Safety PresentationSafety Presentation
Safety Presentation
 
Computer use slideshow 3 5 final 2008
Computer use slideshow 3 5 final 2008Computer use slideshow 3 5 final 2008
Computer use slideshow 3 5 final 2008
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 
Digital citizenship ss
Digital citizenship ssDigital citizenship ss
Digital citizenship ss
 
Back to school night 2016 slideshare
Back to school night 2016 slideshareBack to school night 2016 slideshare
Back to school night 2016 slideshare
 
Laptop Orientation Year 10 St Mary's Wollongong
Laptop Orientation Year 10 St Mary's WollongongLaptop Orientation Year 10 St Mary's Wollongong
Laptop Orientation Year 10 St Mary's Wollongong
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
CyberSafety
CyberSafetyCyberSafety
CyberSafety
 
Mark Jastine Pertez Chapter 8
Mark Jastine Pertez Chapter 8 Mark Jastine Pertez Chapter 8
Mark Jastine Pertez Chapter 8
 
CMS Technology acceptable use policy
CMS Technology acceptable use policyCMS Technology acceptable use policy
CMS Technology acceptable use policy
 
Technology acceptable use policy gr 7 day 1
Technology acceptable use policy   gr 7 day 1Technology acceptable use policy   gr 7 day 1
Technology acceptable use policy gr 7 day 1
 
Internet Publication
Internet PublicationInternet Publication
Internet Publication
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
 
Introduction to wikispaces
Introduction to wikispacesIntroduction to wikispaces
Introduction to wikispaces
 
Legalissues
LegalissuesLegalissues
Legalissues
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
Digial Citizenship Intro
Digial Citizenship IntroDigial Citizenship Intro
Digial Citizenship Intro
 
E behaviour code brochure english
E behaviour code brochure englishE behaviour code brochure english
E behaviour code brochure english
 
Student RUP Agreement explained
Student RUP Agreement explainedStudent RUP Agreement explained
Student RUP Agreement explained
 
Draft Computer Acceptable Use Policy
Draft Computer Acceptable Use PolicyDraft Computer Acceptable Use Policy
Draft Computer Acceptable Use Policy
 

Dernier

HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfOnline Income Engine
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 

Dernier (20)

HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdf
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 

Computer Rules

  • 1. Welcome to Fayetteville Computer Lab
  • 2. Computer Lab Rules and Technology Ethics
  • 3.
  • 4. Section 1 Rules of the Classroom
  • 5. Store your bookbags and personal items at the back of the lab as you come into the lab. There is not enough space next to the computers for these materials.
  • 6. No food or drink is allowed in the computer lab.
  • 7.
  • 8. The Computer Lab is a classroom. You are here to work on your assignment. You are not here to “play”. If you use the computer for any purpose other than your assignment, it will be considered computer misuse .
  • 9.
  • 10. Discipline Policy 1st Offense: Student is given a warning. 2nd Offense: Student is removed from computer for the rest of the class period and parent contact is made. 3rd Offense: Student is sent to the office with a discipline referral. It is the classroom teacher’s decision to allow the student to make up missed work. Students are responsible for repair or replacement of deliberately damaged equipment.
  • 11. HACKING Unauthorized use of hardware or software can be considered to be “hacking.” Talladega County Schools Discipline Policy: Class 2 Offense (In or Out of School Suspension): When hacking does not cause damage to equipment and/or data. Class 3 Offense (Out of School Suspension or Expulsion): When hacking causes damage to equipment and/or data.
  • 12. Section 2 Technology Ethics
  • 13. Etiquette Use good manners. Be polite. Have respect for the property of others. Be honest – do your own work.
  • 14. Copyright © Merriam-Webster Dictionary http://www.m-w.com/cgi-bin/dictionary Almost everything created after March 1, 1989 is protected by copyright. It does not have to have a copyright notice on it. the exclusive legal right to reproduce, publish, sell, or distribute the matter and form of something (as a literary, musical, or artistic work)
  • 15. Music and software are copyrighted. You buy the right to use the disc, but you do not own the product. It is illegal to copy CDs if you have not purchased the license to do so.
  • 16. Information, pictures, and music acquired from the Internet is copyrighted. Students must cite the source of reference information and images used in multimedia presentations. Pictures must have copyright information next to the image:
  • 17. When information is acquired from a website, the website author and Internet address of the site must be “cited” in a bibliography, works cited slide, etc. Example: "Mickey Mouse."  Britannica Student Encyclopedia . 2003.  Encyclopædia Britannica Online. 17 June 2003.  http://search.eb.com/ebi/article?eu=354813 .
  • 18. Section 3 Internet Safety
  • 19.
  • 20. Computer Lab attendance is a privilege you should not take for granted. Following the guidelines presented today will help you have a successful experience.