1. Open your Typing file and on page 50 type lines 9 and 10.
Use your left LITTLE finger for the SHIFT key.
Use your right LITTLE finger for the : colon key .
2. If your expedia.com worksheet is not finished, finish it
3. If you do not have the Career WORKSHEET finished Click on http://www.careeroutlook.us/table.php?state=NC&cluster=sci&interest=all
4. If your name is on the board pull up your Career PowerPoint5. ALL Students will enter their vacation information into a vacation database.
What are we learning?Understand the basics of databases.
How is database information used, organized, and managed in business?Bring back signed Interim Reports today for 85. No reward time until returned.
Guided Lesson:
Intelligence gathering has occurred throughout history. The NSA uses "queries" (A database query is a piece of code (a query)
that is sent to a database in order to get information back from
the database. ) to meet its objectives of counterterrorism, counterproliferation and cyber security. However, many people
question if gathering huge amounts of metadata without a
warrant violates our 4th Amendment rights. (The right of the people to be
secure in their persons, houses, papers, and effects, against unreasonable
searches and seizures)
Review NSA Database Project Rubric:
A visual look at how the NSA works https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3kwqiZTH2k3EGcDmSQPJ3_MWfoPtivy-1kGMdNpZXU9b4nLUTnj5-koertbf3kR2aHrbOAukY_uUN181z7IkuiJ0AqbmIIMNxfXlA6fC8eG-HLGmvqllduMx587aqZpUWGGBm91C2Vc_u/s1600/Google.png
A sample of a finished project http://misswitkowski.edu.
NSA Glogster Rubric Criteria
Items that need to be on Glogster
|
Points
|
Grade
|
Your Name
|
5
| |
Spelling and Grammar
|
15
| |
Design Principles followed contrast, alignment, repetition,
white space, proximity, and balance |
10
| |
NSA National Security Agency definition
|
10
| |
Definition of either Counterterrorism OR counterproliferation
OR cybersecurity |
10
| |
5 different items that NSA can track you by. You must have picture and item’s name.
|
50
| |
Final Grade
|
Go to http://edu.glogster.com/
In the upper right corner click the PINK log in box.
8th grade LOG-INS: students first initial and last name followed by atms14.
PASSWORDS: student birthdays in the mddyyyy format.
EXAMPLE: uid: tmoseratms14 pw: 1011999 for a birthday of Jan 1, 1999
When you are finished (Make sure your LAST NAME is NOT on Glog)you will post your NSA Glog web address to edmodo.
and write one positive thing about the NSA and one area of concern.
and write one positive thing about the NSA and one area of concern.
Exit Activities: Database Test Questions
The first database test will be on these questions.
http://www.quia.com/rr/
There are some questions we covered today.
Ascending is small to large, A-Z order.
Descending is large to small, Z-A order.
Two examples of connector words are OR and AND.A feature that displays records that meet one or more specific
criteria or condition is called a filter or query.
Descending is large to small, Z-A order.
Two examples of connector words are OR and AND.A feature that displays records that meet one or more specific
criteria or condition is called a filter or query.
CIA code breaking
Code 5 or 6 your choice
No comments:
Post a Comment