SlideShare a Scribd company logo
Please read & follow:

• You need a pen/pencil today – anything
  except red or Sharpie.
• Put all of your things away.
• Please sit quietly in your seat. 




                                           1
Use of
Telecommunications
         &
      Network




                     2
SCHOOL DISTRICT OF CLAY COUNTY
       TELECOMMUNICATIONS NETWORK
                OVERVIEW
   1. SDCC provides opportunity for students to expand
      learning.
   2. Opportunity =
   3. Goal of school Internet
       a. Resource sharing
       b. Accessing outside information
       c. Research
       d. Encouraging technological innovation
       e. Worldwide communication


•Question: Compared to other schools around the country and
the world, what do you think our school would be like if we did
not have access to the Internet?



                                                                  3
INTERNET RESOURCES

4. Students will have access to:
   a. Worldwide electronic mail
      communication.
   b. Global information and news.
   c. Public domain and shareware computer
      software.
   d. Educational discussion groups.
   e. Access to many university libraries and
      other libraries.


                                                4
INTERNET WARNING
5.   Some materials on the Internet are not of educational value
     while at school.
6.   This material may not be suitable for students.
7.   The instructor will monitor student use of the Internet to
     prevent students from accessing unsuitable material.




                                                                   5
USER GUIDELINES
8.  Internet access is through an association of government,
    regional & state networks.
9. School district wants the network to be used in a             ,
    efficient, ethical and legal manner.
10. Operation of Internet relies on proper conduct of the users.




                                                                     6
USER GUIDELINES Continued
11. If you violate, your account will be terminated.
12. Serious violations may result in school disciplinary action or
    legal action.
13. A signature indicates that the user has read and understands.




                                                                     7
Acceptable Use
14. Internet use must support education and research.
15. Users are encouraged to take advantage of the network’s
    functions:
   a. electronic mail
   b. conferences
   c. bulletin boards
   d. databases
   e. access to the Internet




                                                              8
Privileges
16. Use of Internet = privilege
17. Inappropriate use = no privilege




   Question: Why do you think using the Internet at school is a
   privilege?




                                                                  9
“Netiquette”
18. Abide by the rules of network etiquette.
19. Be polite.
20. Do not use vulgar or obscene language.
21. Do not reveal your address or phone number or those of
    others.
22. Electronic mail is not guaranteed to be private.
23. Do not disrupt the network, the data, or other users.




                                                             10
24. Unacceptable Uses of Network
a.   Violating student or staff rights to privacy.
b.   Using the Internet without application of common sense.
c.   Using profanity, obscenity, or other language which may be
     offensive to another user.
d.   Sending or accessing pornographic text and/or graphics.
e.   Unauthorized games.
f.   Sending or receiving copyrighted materials.
g.   Reporting personal communications without the author’s prior
     consent.




 Question: What could happen to a person, whose private
 information such as a name, address and phone number,              11
 given out over the Internet without their permission?
Unacceptable Uses of Network Continued
h.   Using for commercial activities, product advertisement, or
     financial gain.
i.   Knowingly transmitting viruses.
j.   Spam.
k.   Chain letters.
l.   Unauthorized solicitations for goods and services.
m.   Posting personal views .
n.   Unauthorized streaming video or music – this ties up the
     bandwidth & slows down the network.




 Question: What would happen to the school Internet if a virus was sent
 in to infect the system?                                                 12
Warranties
25. SDCC makes no warranties.
26. SDCC will not be responsible for damages or loss of data.
27. SDCC will not be responsible for the accuracy or quality of
    information obtain on network.
28. Inappropriate Internet sites should be reported to teacher
    immediately.




                                                                  13
Security
29. Security is a high priority.
30. Do not show or identify the problem to others.
31. Do not use another individual’s account.
32. Attempts to log on as another user will result in cancellation of
    your privileges.
33. Security risk users will be denied network access.




                                                                    14
Vandalism
34. Vandalism = privileges cancellation and/or disciplinary action.
35. Vandalism is a malicious attempt to harm or destroy data of
    another user, Internet, or other networks.
36. Includes creation or uploading computer viruses on the
    Internet or host site.
37. Degrading or disrupting system performance is a crime under
    state and federal law.




                                                                      15
Sponsors
38. Teachers are to make sure students:
   a. Know how to use the Internet correctly &
   b. Know what happens if they don’t!




                                                 16
Let’s Review
What is the main purpose and goal of having a school
Internet?
Why are there so many rules and guidelines for using the
school Internet?

What are some benefits of having Internet and network rules?
Why do you have your own personal user account when you
log onto the school Internet?

What are some benefits of having your own user account for
logging onto the school Internet?

What happens to the school Internet when you down load
unauthorized streaming videos and music?


                                                               17

More Related Content

PPTX
Aup lesson for cbs students
PPTX
Aup lesson for cbs students
PPTX
Acceptable Use Policy
PPTX
Law 483 cyberethics
PDF
Module 2 lesson 2
PDF
Expectations as an e-Learner EPS
DOCX
Internet ethics and rules
Aup lesson for cbs students
Aup lesson for cbs students
Acceptable Use Policy
Law 483 cyberethics
Module 2 lesson 2
Expectations as an e-Learner EPS
Internet ethics and rules

What's hot (20)

PPTX
Safe and Responsible Use of ICT
PPT
Top Ten Internet Uses In Teaching And Learning 2
PDF
Internet Publication
PDF
Camouflage and Safety in the Virtual World
PDF
Inappropriate use of the network ppt
PPSX
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
DOC
benefits of the internet on education
PPTX
computer ethics for educators
PPT
Teaching Ethical and Legal use of Technology in the Classroom
PPTX
Internet Safety
PDF
Using the Internet for Learning
PDF
Internet Safety
PPTX
Why Web 20
PPT
Technology acceptable use policy for students 08202011[1]
PDF
Draft Computer Acceptable Use Policy
PPTX
Legal and ethical issues for using technology in the classroom
PPTX
Top ten internet uses in teaching and learning
PPTX
Internet Ethics
PDF
A Study of the Adverse Effects of IoT on Student's Life
PPT
Tech savvy
Safe and Responsible Use of ICT
Top Ten Internet Uses In Teaching And Learning 2
Internet Publication
Camouflage and Safety in the Virtual World
Inappropriate use of the network ppt
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
benefits of the internet on education
computer ethics for educators
Teaching Ethical and Legal use of Technology in the Classroom
Internet Safety
Using the Internet for Learning
Internet Safety
Why Web 20
Technology acceptable use policy for students 08202011[1]
Draft Computer Acceptable Use Policy
Legal and ethical issues for using technology in the classroom
Top ten internet uses in teaching and learning
Internet Ethics
A Study of the Adverse Effects of IoT on Student's Life
Tech savvy
Ad

Viewers also liked (6)

PPTX
Questionnaire analysis
PPT
Mariah weeks
PDF
Seed Valuation Primer
PPTX
Ppt Cap 6
PPTX
Welcome to cva cbs gjh
PPTX
Acbsi orientation ppt
Questionnaire analysis
Mariah weeks
Seed Valuation Primer
Ppt Cap 6
Welcome to cva cbs gjh
Acbsi orientation ppt
Ad

Similar to Aup lesson for cbs students (20)

PPTX
Aup lesson for vll students
PDF
Ethics in using computer
PDF
Ethics in using computer
PPTX
SOCIAL-AND-ETHICAL.pptx
PPTX
SM INTERNET.pptx
PPTX
INTERNET.pptx
PPT
Digital Citizenship
PPT
Your e image presentation
PPT
Chapter 6
PPT
Chapter6
PPTX
Digital_Cyber-Literacy-Group-2 Reporting.pptx
DOC
Internet policy[1]
PPT
Your e image presentation 2
PPTX
Naughty or nice: Ethical concerns for technology
PPTX
Naughty or nice: Ethical concerns with technology
PPTX
report_ThhhhhhhhhhhhhhhhhhhhhTL TTL.pptx
PPTX
PCK-6-MODULE-9.pptx Digital/ Cyber Literacy
PPTX
Introduction to Information and Communication Technologies and Rules of Neti...
PPTX
Security
PPTX
Module-9. DIGITAL.CYBER-LITERACY.pptx
Aup lesson for vll students
Ethics in using computer
Ethics in using computer
SOCIAL-AND-ETHICAL.pptx
SM INTERNET.pptx
INTERNET.pptx
Digital Citizenship
Your e image presentation
Chapter 6
Chapter6
Digital_Cyber-Literacy-Group-2 Reporting.pptx
Internet policy[1]
Your e image presentation 2
Naughty or nice: Ethical concerns for technology
Naughty or nice: Ethical concerns with technology
report_ThhhhhhhhhhhhhhhhhhhhhTL TTL.pptx
PCK-6-MODULE-9.pptx Digital/ Cyber Literacy
Introduction to Information and Communication Technologies and Rules of Neti...
Security
Module-9. DIGITAL.CYBER-LITERACY.pptx

Recently uploaded (20)

PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Approach and Philosophy of On baking technology
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Encapsulation theory and applications.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PPTX
Chapter 5: Probability Theory and Statistics
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Approach and Philosophy of On baking technology
Group 1 Presentation -Planning and Decision Making .pptx
DP Operators-handbook-extract for the Mautical Institute
A novel scalable deep ensemble learning framework for big data classification...
NewMind AI Weekly Chronicles - August'25-Week II
A comparative analysis of optical character recognition models for extracting...
WOOl fibre morphology and structure.pdf for textiles
Building Integrated photovoltaic BIPV_UPV.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
SOPHOS-XG Firewall Administrator PPT.pptx
OMC Textile Division Presentation 2021.pptx
Web App vs Mobile App What Should You Build First.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Unlocking AI with Model Context Protocol (MCP)
Encapsulation theory and applications.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Chapter 5: Probability Theory and Statistics

Aup lesson for cbs students

  • 1. Please read & follow: • You need a pen/pencil today – anything except red or Sharpie. • Put all of your things away. • Please sit quietly in your seat.  1
  • 3. SCHOOL DISTRICT OF CLAY COUNTY TELECOMMUNICATIONS NETWORK OVERVIEW 1. SDCC provides opportunity for students to expand learning. 2. Opportunity = 3. Goal of school Internet a. Resource sharing b. Accessing outside information c. Research d. Encouraging technological innovation e. Worldwide communication •Question: Compared to other schools around the country and the world, what do you think our school would be like if we did not have access to the Internet? 3
  • 4. INTERNET RESOURCES 4. Students will have access to: a. Worldwide electronic mail communication. b. Global information and news. c. Public domain and shareware computer software. d. Educational discussion groups. e. Access to many university libraries and other libraries. 4
  • 5. INTERNET WARNING 5. Some materials on the Internet are not of educational value while at school. 6. This material may not be suitable for students. 7. The instructor will monitor student use of the Internet to prevent students from accessing unsuitable material. 5
  • 6. USER GUIDELINES 8. Internet access is through an association of government, regional & state networks. 9. School district wants the network to be used in a , efficient, ethical and legal manner. 10. Operation of Internet relies on proper conduct of the users. 6
  • 7. USER GUIDELINES Continued 11. If you violate, your account will be terminated. 12. Serious violations may result in school disciplinary action or legal action. 13. A signature indicates that the user has read and understands. 7
  • 8. Acceptable Use 14. Internet use must support education and research. 15. Users are encouraged to take advantage of the network’s functions: a. electronic mail b. conferences c. bulletin boards d. databases e. access to the Internet 8
  • 9. Privileges 16. Use of Internet = privilege 17. Inappropriate use = no privilege Question: Why do you think using the Internet at school is a privilege? 9
  • 10. “Netiquette” 18. Abide by the rules of network etiquette. 19. Be polite. 20. Do not use vulgar or obscene language. 21. Do not reveal your address or phone number or those of others. 22. Electronic mail is not guaranteed to be private. 23. Do not disrupt the network, the data, or other users. 10
  • 11. 24. Unacceptable Uses of Network a. Violating student or staff rights to privacy. b. Using the Internet without application of common sense. c. Using profanity, obscenity, or other language which may be offensive to another user. d. Sending or accessing pornographic text and/or graphics. e. Unauthorized games. f. Sending or receiving copyrighted materials. g. Reporting personal communications without the author’s prior consent. Question: What could happen to a person, whose private information such as a name, address and phone number, 11 given out over the Internet without their permission?
  • 12. Unacceptable Uses of Network Continued h. Using for commercial activities, product advertisement, or financial gain. i. Knowingly transmitting viruses. j. Spam. k. Chain letters. l. Unauthorized solicitations for goods and services. m. Posting personal views . n. Unauthorized streaming video or music – this ties up the bandwidth & slows down the network. Question: What would happen to the school Internet if a virus was sent in to infect the system? 12
  • 13. Warranties 25. SDCC makes no warranties. 26. SDCC will not be responsible for damages or loss of data. 27. SDCC will not be responsible for the accuracy or quality of information obtain on network. 28. Inappropriate Internet sites should be reported to teacher immediately. 13
  • 14. Security 29. Security is a high priority. 30. Do not show or identify the problem to others. 31. Do not use another individual’s account. 32. Attempts to log on as another user will result in cancellation of your privileges. 33. Security risk users will be denied network access. 14
  • 15. Vandalism 34. Vandalism = privileges cancellation and/or disciplinary action. 35. Vandalism is a malicious attempt to harm or destroy data of another user, Internet, or other networks. 36. Includes creation or uploading computer viruses on the Internet or host site. 37. Degrading or disrupting system performance is a crime under state and federal law. 15
  • 16. Sponsors 38. Teachers are to make sure students: a. Know how to use the Internet correctly & b. Know what happens if they don’t! 16
  • 17. Let’s Review What is the main purpose and goal of having a school Internet? Why are there so many rules and guidelines for using the school Internet? What are some benefits of having Internet and network rules? Why do you have your own personal user account when you log onto the school Internet? What are some benefits of having your own user account for logging onto the school Internet? What happens to the school Internet when you down load unauthorized streaming videos and music? 17