Sunday, March 23, 2014

Monday, March 24th- 8th Grade- Finish NSA blog

Bellringer:1. Open your Typing file and on page 56 type lines 6 and 7.            
    Use your left LITTLE finger for the SHIFT  key.

    Use your right LITTLE finger for the ?  key .

2. If your expedia.com worksheet is not finished, finish it
3. If you do not have the Career WORKSHEET finished Click on http://www.careeroutlook.us/table.php?state=NC&cluster=sci&interest=all
4. TEST ON FRIDAY- you can practice exit activity at home
.
    

What are we learning?Understand the basics of databases.
How is database information used, organized, and managed in business?

Bring back signed Interim Reports today for 85. No reward time until returned.

Guided Lesson: 
Intelligence gathering has occurred throughout history. 

The NSA uses "queries" (A database query is a piece of code (a query) 
that is sent to a database in order to get information back from 

the database. ) to meet its objectives of counterterrorism, 
counterproliferation and cyber security. However, many people
question if gathering huge amounts of metadata without a 

warrant violates our 4th Amendment rights. (The right of the people to be 
secure in their persons, houses, papers, and effects, against unreasonable 
searches and seizures)


A feature that displays records that meet one or more specific 
criteria or condition is called a filter or query.
 

When you what to find more than one criteria you use connector words.


Two examples of connector words are OR and AND.

Student exercise using OR and And connectors.
And- will give you a smaller search.
Or- will give you a larger search.

Review NSA Database Project Rubric:


A visual look at how the NSA works https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3kwqiZTH2k3EGcDmSQPJ3_MWfoPtivy-1kGMdNpZXU9b4nLUTnj5-koertbf3kR2aHrbOAukY_uUN181z7IkuiJ0AqbmIIMNxfXlA6fC8eG-HLGmvqllduMx587aqZpUWGGBm91C2Vc_u/s1600/Google.png


A sample of a finished project http://misswitkowski.edu.glogster.com/nsa-miss-w-6753 

NSA Glogster Rubric Criteria
Items that need to be on Glogster

Points


Grade


Your Name

5


 


Spelling and Grammar

15


 


Design Principles followed contrast, alignment, repetition, 
white space, proximity, and balance

10


 


NSA National Security Agency definition

10


 


Definition of either Counterterrorism OR counterproliferation
OR cybersecurity

10


 


5 different items that NSA can track you by. You  must have picture and item’s name.

50


 


Final Grade
 
Independent Activity: 
Go to 
http://edu.glogster.com/ 
 

In the upper right corner click the PINK log in box.

8th grade LOG-INSstudents first initial and last name followed by atms14.  

PASSWORDS: student birthdays in the mddyyyy format.


 
 

When you are finished (Make sure your LAST NAME is NOT on Glog)

you will copy your NSA Glog web address link to edmodo.
and write one positive thing about the NSA (See Qs 5, 6, or 7)
and one area of concern (negative thing) about the NSA.(See Qs 2, 3, or 4)
 


Exit Activities: Database Test Questions
The first database test will be on these questions.
 
http://www.quia.com/rr/956502.html
There are some questions we covered today.
To put data in a particular order is to sort.
Ascending is small to large, A-Z order.
Descending is large to small, Z-A order.
Two examples of connector words are OR and AND.
A feature that displays records that meet one or more specific 
criteria or condition is called a filter or query.
 

CIA code breaking
Code 5 or 6 your choice

No comments:

Post a Comment