![Page 1: Safe and Ethical Use of Computer and Internet. Computer Safety Computer should be on flat surface Cords tied away neatly Laptop should be secured to desk](https://reader036.vdocuments.us/reader036/viewer/2022082818/56649ef15503460f94c02e07/html5/thumbnails/1.jpg)
Safe and Ethical Use of Computer and Internet
![Page 2: Safe and Ethical Use of Computer and Internet. Computer Safety Computer should be on flat surface Cords tied away neatly Laptop should be secured to desk](https://reader036.vdocuments.us/reader036/viewer/2022082818/56649ef15503460f94c02e07/html5/thumbnails/2.jpg)
Computer Safety
• Computer should be on flat surface• Cords tied away neatly• Laptop should be secured to desk• Never eat or drink around your Computer• Password• Backup
![Page 3: Safe and Ethical Use of Computer and Internet. Computer Safety Computer should be on flat surface Cords tied away neatly Laptop should be secured to desk](https://reader036.vdocuments.us/reader036/viewer/2022082818/56649ef15503460f94c02e07/html5/thumbnails/3.jpg)
On-Line Safety
• Cyber-bullying• Personal information• Do not talk to stranger• E-mails• Cookies
![Page 4: Safe and Ethical Use of Computer and Internet. Computer Safety Computer should be on flat surface Cords tied away neatly Laptop should be secured to desk](https://reader036.vdocuments.us/reader036/viewer/2022082818/56649ef15503460f94c02e07/html5/thumbnails/4.jpg)
Social Media Do’s
• “Pause before you Post”• Password• Privacy
• https://cuit.columbia.edu/cuit/it-security-resources/social-networking-dos-donts
![Page 5: Safe and Ethical Use of Computer and Internet. Computer Safety Computer should be on flat surface Cords tied away neatly Laptop should be secured to desk](https://reader036.vdocuments.us/reader036/viewer/2022082818/56649ef15503460f94c02e07/html5/thumbnails/5.jpg)
Social Media Don’ts
• Never accept strangers• Password• Information
• https://cuit.columbia.edu/cuit/it-security-resources/social-networking-dos-donts
![Page 6: Safe and Ethical Use of Computer and Internet. Computer Safety Computer should be on flat surface Cords tied away neatly Laptop should be secured to desk](https://reader036.vdocuments.us/reader036/viewer/2022082818/56649ef15503460f94c02e07/html5/thumbnails/6.jpg)
Ethical Use of Internet Material
• Ethical action• Credit• Music• Videos
• http://depts.washington.edu/uwcopy/Using_Copyright/Compilations,_Music,_Images/Music.php
![Page 7: Safe and Ethical Use of Computer and Internet. Computer Safety Computer should be on flat surface Cords tied away neatly Laptop should be secured to desk](https://reader036.vdocuments.us/reader036/viewer/2022082818/56649ef15503460f94c02e07/html5/thumbnails/7.jpg)
Copyright Guidelines
• The copies may be used for only one course at the school• Same author copies may not exceed more than one article or
two excerpts, or more than three from a collection of works. • Multiple copies for one course is limited to a maximum of nine
instances during the term• Copying may not be used to substitute for collections of work• You may not copy “consumable” materials such as work books.• Students may not be charged for the copied material, other
than photocopying costs.
(Morrison & Lowther, 2010, Chapter 6: Exploring the worldwide web in the classroom. Copyright issues.)
![Page 8: Safe and Ethical Use of Computer and Internet. Computer Safety Computer should be on flat surface Cords tied away neatly Laptop should be secured to desk](https://reader036.vdocuments.us/reader036/viewer/2022082818/56649ef15503460f94c02e07/html5/thumbnails/8.jpg)
Plagiarism
• “Cut and Paste”• Grammarly• Paraphrase• Citation
![Page 9: Safe and Ethical Use of Computer and Internet. Computer Safety Computer should be on flat surface Cords tied away neatly Laptop should be secured to desk](https://reader036.vdocuments.us/reader036/viewer/2022082818/56649ef15503460f94c02e07/html5/thumbnails/9.jpg)
Citation Methods
• APA Style• Contributors' names (Last edited date). Title of
resource. Retrieved from http://Web address for OWL resource
• Example– Angeli, E., Wagner, J., Lawrick, E., Moore, K., Anderson, M., Soderlund, L., &
Brizee, A. (2010, May 5). General format. Retrieved from http://owl.english.purdue.edu/owl/resource/560/01
– https://owl.english.purdue.edu/owl/resource/560/01/
![Page 10: Safe and Ethical Use of Computer and Internet. Computer Safety Computer should be on flat surface Cords tied away neatly Laptop should be secured to desk](https://reader036.vdocuments.us/reader036/viewer/2022082818/56649ef15503460f94c02e07/html5/thumbnails/10.jpg)
References• Colombia University. (n.d). Colombia University. Social Network Do’s and Don’ts.
Retrieved June 21, 2014, from https://cuit.columbia.edu/cuit/it-security-resources/social-networking-dos-donts
• Johnson, D. (2012). The Classroom Teachers Technology Survival Guide. Commonsense Practices for Safe and Ethical Technology Use. Received from the University of Phoenix eBook Collection Database
• Morrison, G.R., & Lowther, D.L. (2010). Intergrading Computer Technology into the classroom. Skills for the 21 Century. Received from the University of Phoenix eBook Collection Database.
• Purdue University. (2014) Online Writing Lab. Retrieved June 23, 2014, from https://owl.english.purdue.edu/owl/resource/560/01/
• University of Washington. (2014). Copyright Connections. Retrieved June 21,2014, fromhttp://depts.washington.edu/uwcopy/Using_Copyright/Compilations,_Music,_Images/Music.php