Thursday, March 20, 2014

Friday, March 21st- 8th Grade- Begin NSA Glog

 Bellringer:
1. Open your Typing file and on page 50 type lines 9 and 10.            

    Use your left LITTLE finger for the SHIFT  key.

    Use your right LITTLE finger for the : colon  key .

2. If your expedia.com worksheet is not finished, finish it
3. If you do not have the Career WORKSHEET finished Click on http://www.careeroutlook.us/table.php?state=NC&cluster=sci&interest=all
4. If your name is on the board pull up your Career PowerPoint
5. ALL Students will enter their vacation information into a vacation database.
    

What are we learning?Understand the basics of databases.
How is database information used, organized, and managed in business?
Bring back signed Interim Reports today for 85. No reward time until returned.
Guided Lesson: 
Intelligence gathering has occurred throughout history. 
The NSA uses "queries" (A database query is a piece of code (a query) 
that is sent to a database in order to get information back from 

the database. ) to meet its objectives of counterterrorism, counterproliferation and cyber security. However, many people
question if gathering huge amounts of metadata without a 

warrant violates our 4th Amendment rights. (The right of the people to be 
secure in their persons, houses, papers, and effects, against unreasonable 
searches and seizures)

Review NSA Database Project Rubric
:


A visual look at how the NSA works https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3kwqiZTH2k3EGcDmSQPJ3_MWfoPtivy-1kGMdNpZXU9b4nLUTnj5-koertbf3kR2aHrbOAukY_uUN181z7IkuiJ0AqbmIIMNxfXlA6fC8eG-HLGmvqllduMx587aqZpUWGGBm91C2Vc_u/s1600/Google.png


A sample of a finished project http://misswitkowski.edu.glogster.com/nsa-miss-w-6753 
 


NSA Glogster Rubric Criteria
Items that need to be on Glogster

Points

Grade

Your Name

5

 

Spelling and Grammar

15

 

Design Principles followed contrast, alignment, repetition, 
white space, proximity, and balance

10

 

NSA National Security Agency definition

10

 

Definition of either Counterterrorism OR counterproliferation
OR cybersecurity

10

 

5 different items that NSA can track you by. You  must have picture and item’s name.

50

 

Final Grade
 
 
 
 
Independent Activity: 
Go to 
http://edu.glogster.com/ 
 

In the upper right corner click the PINK log in box.

8th grade LOG-INSstudents first initial and last name followed by atms14.  

PASSWORDS: student birthdays in the mddyyyy format.


EXAMPLE:  uid:  tmoseratms14  pw:  1011999 for a birthday of Jan 1, 1999
 
 
When you are finished (Make sure your LAST NAME is NOT on Glog)you will post your NSA Glog web address to edmodo.
and write one positive thing about the NSA and one area of concern.
  

Exit Activities: Database Test Questions
The first database test will be on these questions.
 
http://www.quia.com/rr/956502.html
There are some questions we covered today.
To put data in a particular order is to sort.
Ascending is small to large, A-Z order.
Descending is large to small, Z-A order.
Two examples of connector words are OR and AND.
A feature that displays records that meet one or more specific 
criteria or condition is called a filter or query.
 


 
CIA code breaking
Code 5 or 6 your choice

No comments:

Post a Comment