If you did NOT finish your brochure
1. Click on this link http://www.microsoft.com/about/corporatecitizenship/citizenship/giving/programs/up/digitalliteracy/eng/curriculum3.mspx
2. Go to the Computer Security and Privacy section
and click launch e-Learning
3. FIND YOUR TOPIC
4. Open up your computer security brochure
If you did finish your brochure play the Frog typing game at least once
highest score gets candy
Frog Typing Game
turn off sound BEFORE game
http://www.freetypinggame.net/play3.asp
CHOOSE the BEGINNING level
CHOOSE test 13 "all keys"
Warning: if you click off game it stops
Wednesday, December 19, 2012
Tuesday, December 18, 2012
Wednesday, Dec 19- Reviewing Brochure and Typing Contest
Bellringer: 1. Turn to page 234 and finish typing paragraph 1,
and paragraph 2 .
Follow the formatting instructions, center, bold, and double space.
You do NOT need to do the MARGIN formatting now,
we will be formatting during class.
2. Get your orange paper and a pen or pencil Click here to hear bellringer message.
3. If you did NOT finish your brochure Click on this link http://www.microsoft.com/about/corporatecitizenship/citizenship/giving/programs/up/digitalliteracy/eng/curriculum3.mspx
4. Go to the Computer Security and Privacy section
and click launch e-Learning
5. FIND YOUR TOPIC
6. Open up your computer security brochure
What are we learning:
2.1 Word Processing- Apply formatting and editing features and operational keys appropriately.
3.5 Publisher-Format Brochure
1.4 Computer Security and Privacy
Watch the following videos:
What is a firewall 2minutes http://www.youtube.com/watch?v=0_EVfWpL6L4
Firewalls and antivirus software 3 min http://www.youtube.com/watch?v=woOY1EDI6xE
Guided Lesson:
When we return we will format the 1.5 inch left margin and the 1 inch right margin of the typing assignment so make sure you SAVE this lesson.
We will review Project Rubric (citations, quotations, 3D shape, spelling, grammar, number of sentences etc.)
Make sure you have 10 sentences on the back of your gold worksheet
and your name is on all papers.
It is YOUR responsibility to check to see if you have everything correct!Miss W only checked to see if you were working on your brochure NOT that it was correct!
Do NOT print until Miss W tells you to
Independent Activity:
Yesterday’s Lesson- Complete 2nd page panel 6. You must use a frame and write 3 to 5 sentences about what you have learned about computer security and privacy in YOUR own word. These sentences must not already be on your brochure. This is worth 25 points so spend time on it and make sure you spell and grammar check it.
Today’s Activities: BROCHURE PROJECT MUST BE COMPLETED BEFORE PLAYING
December Typing Contest
http://www.freetypinggame.net/play4.asp?lesson=26&time=1&AGo1=Start+Test
You need to CORRECT your mistakes for the candy contest
Click the Start button
When your time pops up raise your hand and WAIT
Show Miss W your time and then write your time on and write name on board for possible candy prize.
Frog Typing Game
turn off sound BEFORE game
http://www.freetypinggame.net/play3.asp
CHOOSE the BEGINNING level
CHOOSE test 13 "all keys"
Warning: if you click off game it stops
and paragraph 2 .
Follow the formatting instructions, center, bold, and double space.
You do NOT need to do the MARGIN formatting now,
we will be formatting during class.
2. Get your orange paper and a pen or pencil Click here to hear bellringer message.
3. If you did NOT finish your brochure Click on this link http://www.microsoft.com/about/corporatecitizenship/citizenship/giving/programs/up/digitalliteracy/eng/curriculum3.mspx
4. Go to the Computer Security and Privacy section
and click launch e-Learning
5. FIND YOUR TOPIC
6. Open up your computer security brochure
What are we learning:
2.1 Word Processing- Apply formatting and editing features and operational keys appropriately.
3.5 Publisher-Format Brochure
1.4 Computer Security and Privacy
Watch the following videos:
What is a firewall 2minutes http://www.youtube.com/watch?v=0_EVfWpL6L4
Firewalls and antivirus software 3 min http://www.youtube.com/watch?v=woOY1EDI6xE
Guided Lesson:
When we return we will format the 1.5 inch left margin and the 1 inch right margin of the typing assignment so make sure you SAVE this lesson.
We will review Project Rubric (citations, quotations, 3D shape, spelling, grammar, number of sentences etc.)
Make sure you have 10 sentences on the back of your gold worksheet
and your name is on all papers.
It is YOUR responsibility to check to see if you have everything correct!Miss W only checked to see if you were working on your brochure NOT that it was correct!
Do NOT print until Miss W tells you to
EVEN if you think you are finished!!!!
Independent Activity:
Yesterday’s Lesson- Complete 2nd page panel 6. You must use a frame and write 3 to 5 sentences about what you have learned about computer security and privacy in YOUR own word. These sentences must not already be on your brochure. This is worth 25 points so spend time on it and make sure you spell and grammar check it.
Today’s Activities: BROCHURE PROJECT MUST BE COMPLETED BEFORE PLAYING
December Typing Contest
http://www.freetypinggame.net/play4.asp?lesson=26&time=1&AGo1=Start+Test
You need to CORRECT your mistakes for the candy contest
Click the Start button
When your time pops up raise your hand and WAIT
Show Miss W your time and then write your time on and write name on board for possible candy prize.
Frog Typing Game
turn off sound BEFORE game
http://www.freetypinggame.net/play3.asp
CHOOSE the BEGINNING level
CHOOSE test 13 "all keys"
Warning: if you click off game it stops
Monday, December 17, 2012
Tuesday, Dec 18- Completing the brochure
Bellringer:
1. Turn to page 233 and look for the yellow box at the bottom of the page.
Type the Star-Spangled Banner title, author and paragraph.
It is very important to hit “enter” at the end of each line.
2.Click on this link http://www.microsoft.com/about/corporatecitizenship/citizenship/giving/programs/up/digitalliteracy/eng/curriculum3.mspx
3. Go to the Computer Security and Privacy section
and click launch e-Learning
4. Go to a NEW area and find items you do NOT know
5. Open up your computer security brochure
6. Get your orange paper and a pen or pencil
Click here to hear bellringer message.
What are we learning:
2.1 Word Processing- Apply formatting and editing features and operational keys appropriately.
3.5 Publisher-Format Brochure
1.4 Computer Security and Privacy
Guided Lesson:
Review the rubric (citations, quotations, 3D shape, spelling, grammar, number of sentences etc.)
Make sure you have 10 sentences on the back of your gold worksheet
and your name is on all papers.
Watch the following videos:
Internet Safety 1 minute refresher http://www.youtube.com/watch?v=opDkzuLHMs8
Facebook and privacy 3 minutes http://www.youtube.com/watch?v=-e98hxHZiTg
Don’t click on popups 1 min http://www.youtube.com/watch?v=_KecjG6HnNc
Explain independent activity and exit activity.
Independent Activity:
Complete 2nd page panel 6.
You must use a frame (on insert tab, insert borders and accents, scroll to frames and click.
Then draw textbox in the frame)
Write 3 to 5 sentences about what you have learned about computer security and privacy
in YOUR own word. These sentences must not already be on your brochure.
This is worth 25 points so spend time on it,
Make sure you spell and grammar check the entire brochure.
Make sure you have "quotations" around the quotes you copied from e-learning.
Make sure you have 10 sentences written on your gold paper.
Exit Activity:
Formative assessment game
http://www.onguardonline.gov/media/game-0013-case-cyber-criminal
If you have no items left in spy suitcase questions write name on board for possible candy prize.
1. Turn to page 233 and look for the yellow box at the bottom of the page.
Type the Star-Spangled Banner title, author and paragraph.
It is very important to hit “enter” at the end of each line.
2.Click on this link http://www.microsoft.com/about/corporatecitizenship/citizenship/giving/programs/up/digitalliteracy/eng/curriculum3.mspx
3. Go to the Computer Security and Privacy section
and click launch e-Learning
4. Go to a NEW area and find items you do NOT know
5. Open up your computer security brochure
6. Get your orange paper and a pen or pencil
Click here to hear bellringer message.
What are we learning:
2.1 Word Processing- Apply formatting and editing features and operational keys appropriately.
3.5 Publisher-Format Brochure
1.4 Computer Security and Privacy
Guided Lesson:
Review the rubric (citations, quotations, 3D shape, spelling, grammar, number of sentences etc.)
Make sure you have 10 sentences on the back of your gold worksheet
and your name is on all papers.
Watch the following videos:
Internet Safety 1 minute refresher http://www.youtube.com/watch?v=opDkzuLHMs8
Facebook and privacy 3 minutes http://www.youtube.com/watch?v=-e98hxHZiTg
Don’t click on popups 1 min http://www.youtube.com/watch?v=_KecjG6HnNc
Explain independent activity and exit activity.
Independent Activity:
Complete 2nd page panel 6.
You must use a frame (on insert tab, insert borders and accents, scroll to frames and click.
Then draw textbox in the frame)
Write 3 to 5 sentences about what you have learned about computer security and privacy
in YOUR own word. These sentences must not already be on your brochure.
This is worth 25 points so spend time on it,
Make sure you spell and grammar check the entire brochure.
Make sure you have "quotations" around the quotes you copied from e-learning.
Make sure you have 10 sentences written on your gold paper.
Exit Activity:
Formative assessment game
http://www.onguardonline.gov/media/game-0013-case-cyber-criminal
If you have no items left in spy suitcase questions write name on board for possible candy prize.
Sunday, December 16, 2012
Monday, Dec 17- Start 2nd page of computer security brochure
Bellringer:
1. Please Turn to page 233 and type lines 1, 2, 3 and 4
2.Click on this link http://www.microsoft.com/about/corporatecitizenship/citizenship/giving/programs/up/digitalliteracy/eng/curriculum3.mspx
3. Go to the Computer Security and Privacy section
and click launch e-Learning
4. FIND YOUR TOPIC
5. Open up your computer security brochure
6. Get your orange paper and a pen or pencil
Click here to hear bellringer message.1. Please Turn to page 233 and type lines 1, 2, 3 and 4
2.Click on this link http://www.microsoft.com/about/corporatecitizenship/citizenship/giving/programs/up/digitalliteracy/eng/curriculum3.mspx
3. Go to the Computer Security and Privacy section
and click launch e-Learning
4. FIND YOUR TOPIC
5. Open up your computer security brochure
6. Get your orange paper and a pen or pencil
What are we learning:
2.1 Word Processing- Apply formatting and editing features and operational keys appropriately.
3.5 Publisher-Format Brochure
1.4 Computer Security and Privacy
Guided
Lesson:
Watch
the following video: Worms,
Viruses, Bots 5 minuteshttp://www.youtube.com/watch?NR=1&v=c34QwtYI40g&feature=endscreen
Rule 1 install antivirus software
Rule 2 do not open email attachments if you
are not sure who they are from
Rule 3 do not download free music or free games
unless they are from a reputable site (.edu, .gov, etc.)
Rule 4 do not go to sites that participate in
free illegal downloads of music & games or click on popup ads
Explain how to get to NEW security and privacy topic
Explain exit activity. Write time on board for possible
candy prize.
Independent
Activity:
Complete 2nd page of brochure panels 4 and 5
Exit
Activity:
On the E-learning site in the Computer Security and Privacy section,
Go to the "Introduction to Computer Security and Privacy" section
Click on "Computer Threats and Measures for Protections" Go to the "Introduction to Computer Security and Privacy" section
play the game and show Miss W your time.
Thursday, December 13, 2012
Friday, Dec 14- Encryption and SSL
Bellringer:
1.Get your orange paper out of the crate.
2.You need paper and a pencil or pen.
3.Turn to page 231 and type the 1st paragraph
then find and replace all occurrences of “New York”
with “New York City” using the find and replace command.
4.Click on this link http://www.microsoft.com/about/corporatecitizenship/citizenship/giving/programs/up/digitalliteracy/eng/curriculum3.mspx
5. Go to the Computer Security and Privacy section and
click launch e-Learning
Click here to hear bellringer message.
7. FIND YOUR TOPIC
8. Open up your computer security brochure
What are we learning?
2.1 Word Processing- Apply formatting and editing features and operational keys appropriately.
3.5 Publisher-Format Brochure
1.4 Computer Security and Privacy
Guided Lesson:
Security-
SSL https://www.youtube.com/watch?v=SJJmoDZ3il8
Why encrypt data? https://www.youtube.com/watch?v=JMNzbxgr3y8
Publisher-
Miss W will help students continue on the Computer Security and Privacy Brochure Project.
Independent Exercise:
Students will continue their Computer Security and Privacy Brochure Project.
The goal is to complete the 1st page (3 panels) of their Publisher project.
Exit Activity
Publisher symbols http://www.quia.com/mc/320506.html
1.Get your orange paper out of the crate.
2.You need paper and a pencil or pen.
3.Turn to page 231 and type the 1st paragraph
then find and replace all occurrences of “New York”
with “New York City” using the find and replace command.
4.Click on this link http://www.microsoft.com/about/corporatecitizenship/citizenship/giving/programs/up/digitalliteracy/eng/curriculum3.mspx
5. Go to the Computer Security and Privacy section and
click launch e-Learning
Click here to hear bellringer message.
7. FIND YOUR TOPIC
8. Open up your computer security brochure
What are we learning?
2.1 Word Processing- Apply formatting and editing features and operational keys appropriately.
3.5 Publisher-Format Brochure
1.4 Computer Security and Privacy
Guided Lesson:
Security-
SSL https://www.youtube.com/watch?v=SJJmoDZ3il8
Why encrypt data? https://www.youtube.com/watch?v=JMNzbxgr3y8
Publisher-
Miss W will help students continue on the Computer Security and Privacy Brochure Project.
Independent Exercise:
Students will continue their Computer Security and Privacy Brochure Project.
The goal is to complete the 1st page (3 panels) of their Publisher project.
Exit Activity
Publisher symbols http://www.quia.com/mc/320506.html
Wednesday, December 12, 2012
Thursday, Dec 13th – Continue Computer Security and Creating a Brochure
Bellringer:
1.Get your orange paper out of the crate.
2.You need paper and a pencil or pen.
3.Open the page 230 typing from yesterday.
4.Using the Find command find the girl's name Lotta
and change to Lottie.
Open your computer security brochure.
5.Click on this link http://www.microsoft.com/about/corporatecitizenship/citizenship/giving/programs/up/digitalliteracy/eng/curriculum3.mspx
6.Go to the Computer Security and Privacy section and
click launch e-LearningClick here to hear bellringer message.
7. FIND YOUR TOPIC
8. Open up your computer security brochure
What are we learning? 2.1 Word Processing- Apply formatting and editing features and operational keys appropriately.
3.5 Publisher-Format Brochure1.4 Computer Security and Privacy
Guided Lesson:Publisher-
Don't forget to put a citation on your brochure's cover:
From Microsoft e-Learning: Computer Security and Privacy- http://www.microsoft.com/about/corporatecitizenship/citizenship/giving/programs/up/digitalliteracy/eng/curriculum3.mspx
Miss W will go over rubric with students. Click here to see rubric and then scroll to bottom of page
She will explain about choosing an appropriate Computer Security or Privacy topic
She will help students get started on the Computer Security and Privacy Brochure Project.
Independent Exercise:
Students will continue their Computer Security and Privacy Brochure Project.
The goal is to complete the 1st page (3 panels) of their Publisher project.
Exit Activity
Publisher symbols http://www.quia.com/mc/320506.html
1.Get your orange paper out of the crate.
2.You need paper and a pencil or pen.
3.Open the page 230 typing from yesterday.
4.Using the Find command find the girl's name Lotta
and change to Lottie.
Open your computer security brochure.
5.Click on this link http://www.microsoft.com/about/corporatecitizenship/citizenship/giving/programs/up/digitalliteracy/eng/curriculum3.mspx
6.Go to the Computer Security and Privacy section and
click launch e-LearningClick here to hear bellringer message.
7. FIND YOUR TOPIC
8. Open up your computer security brochure
What are we learning? 2.1 Word Processing- Apply formatting and editing features and operational keys appropriately.
3.5 Publisher-Format Brochure1.4 Computer Security and Privacy
Guided Lesson:Publisher-
Don't forget to put a citation on your brochure's cover:
From Microsoft e-Learning: Computer Security and Privacy- http://www.microsoft.com/about/corporatecitizenship/citizenship/giving/programs/up/digitalliteracy/eng/curriculum3.mspx
Miss W will go over rubric with students. Click here to see rubric and then scroll to bottom of page
She will explain about choosing an appropriate Computer Security or Privacy topic
She will help students get started on the Computer Security and Privacy Brochure Project.
Independent Exercise:
Students will continue their Computer Security and Privacy Brochure Project.
The goal is to complete the 1st page (3 panels) of their Publisher project.
Exit Activity
Publisher symbols http://www.quia.com/mc/320506.html
Tuesday, December 11, 2012
Wednesday, Dec 12- Begin Computer Security and Start Brochure Project
Bellringer:
Turn to page 230 and type the 2nd paragraph.
Follow all of the red formatting instructions.
Click on this link http://www.microsoft.com/about/corporatecitizenship/citizenship/giving/programs/up/digitalliteracy/eng/curriculum3.mspx
Go to the Computer Security and Privacy section and click launch e-Learning
Click here to hear bellringer message.
Pull out your interim reports. If you turn it in today, you will make a 80.
If they are turned in on Thursday you will make a 75.
What are we learning:
2.1 Word Processing- Apply formatting and editing features and operational keys appropriately.
3.5 Publisher-Format Brochure
1.5 Digital Lifestyles- Video Conferencing (Skype)
An example of VoIP is Skype. This YouTube video explains what Skype is. http://www.youtube.com/watch?v=m1mflr-kQlk
Guided Lesson:
Publisher-
Don't forget to put a citation on your brochure's cover:
From Microsoft e-Learning: Computer Security and Privacy- http://www.microsoft.com/about/corporatecitizenship/citizenship/giving/programs/up/digitalliteracy/eng/curriculum3.mspx
Miss W will go over rubric with students. Click here to see rubric and then scroll to bottom of page
She will explain about choosing an appropriate Computer Security or Privacy topic
She will help students get started on the Computer Security and Privacy Brochure Project.
Independent Exercise:
Students will choose a topic by going to My computer then Student Docs then Witkowski then Publisher then open the Publisher Computer Security and Privacy sections file
Students will begin their Computer Security and Privacy Brochure Project.
Exit Activity
Publisher symbols http://www.quia.com/mc/320506.html
Turn to page 230 and type the 2nd paragraph.
Follow all of the red formatting instructions.
Click on this link http://www.microsoft.com/about/corporatecitizenship/citizenship/giving/programs/up/digitalliteracy/eng/curriculum3.mspx
Go to the Computer Security and Privacy section and click launch e-Learning
Click here to hear bellringer message.
Pull out your interim reports. If you turn it in today, you will make a 80.
If they are turned in on Thursday you will make a 75.
What are we learning:
2.1 Word Processing- Apply formatting and editing features and operational keys appropriately.
3.5 Publisher-Format Brochure
1.5 Digital Lifestyles- Video Conferencing (Skype)
An example of VoIP is Skype. This YouTube video explains what Skype is. http://www.youtube.com/watch?v=m1mflr-kQlk
Guided Lesson:
Publisher-
Don't forget to put a citation on your brochure's cover:
From Microsoft e-Learning: Computer Security and Privacy- http://www.microsoft.com/about/corporatecitizenship/citizenship/giving/programs/up/digitalliteracy/eng/curriculum3.mspx
Miss W will go over rubric with students. Click here to see rubric and then scroll to bottom of page
She will explain about choosing an appropriate Computer Security or Privacy topic
She will help students get started on the Computer Security and Privacy Brochure Project.
Independent Exercise:
Students will choose a topic by going to My computer then Student Docs then Witkowski then Publisher then open the Publisher Computer Security and Privacy sections file
Students will begin their Computer Security and Privacy Brochure Project.
Exit Activity
Publisher symbols http://www.quia.com/mc/320506.html
Monday, December 10, 2012
Tuesday, Dec 11- Learning MS Publisher
Bellringer:
Turn to page 230 and type the title, author and 1st paragraph.
Don’t worry about formatting.
Open your Publisher Web practice brochure.
To hear this message click here.
Pull out your interim reports. If you turn it in today, you will make a 85.
If they are turned in on Wednesday you will make a 80.
We are having technical difficulty getting the Alice animations to play on Edmodo.
We are checking on why they have stopped playing.
When we solve the problem, we will show any videos that were not shown the first time.
Publisher- Miss W will demonstrate various formatting choices and explain the different computer security and privacy choices for the Students Brochure Project.
Decide which Security and Privacy topic you want to do for you brochure
Publisher symbols http://www.quia.com/mc/320506.html
If time go over the project rubric
Turn to page 230 and type the title, author and 1st paragraph.
Don’t worry about formatting.
Open your Publisher Web practice brochure.
To hear this message click here.
Pull out your interim reports. If you turn it in today, you will make a 85.
If they are turned in on Wednesday you will make a 80.
We are having technical difficulty getting the Alice animations to play on Edmodo.
We are checking on why they have stopped playing.
When we solve the problem, we will show any videos that were not shown the first time.
What are we learning:
1.4 Computer Security and Privacy
2.1 Word Processing- Apply formatting and editing features and operational keys appropriately.
3.5 Publisher-Format Brochure
Guided Lesson:1.4 Computer Security and Privacy
2.1 Word Processing- Apply formatting and editing features and operational keys appropriately.
3.5 Publisher-Format Brochure
Publisher- Miss W will demonstrate various formatting choices and explain the different computer security and privacy choices for the Students Brochure Project.
Independent Exercise:
Students will complete the Publisher formatting steps after Miss W demonstrates them.
Exit ActivityStudents will complete the Publisher formatting steps after Miss W demonstrates them.
Decide which Security and Privacy topic you want to do for you brochure
Publisher symbols http://www.quia.com/mc/320506.html
If time go over the project rubric
Picture with citation
|
“Information”
With clip art
|
Title
(See Word document for choices)
Your Name
MS Citation (see Word document)
Clip Art
|
“Information”
Picture with citation
|
“Information”
With clip art
|
In Your Own Words the most important item you learned from this topic. Write a paragraph that has 3 to 5 sentences.
Picture with citation
|
Points
|
Item
| |
5
|
Correct Computer Security and Privacy Topic
| |
5
|
Used the information from MS e-Learning WITH QUOTATION MARKS
(either write the notes or go back and forth between screens) | |
10
|
Must have MS citation on 3rd panel (see above)
| |
5
|
Any 3D shape (Home- Shapes- 3D)
| |
10
|
Frame with words inside (Insert- Borders & Accents- Frames then draw a text box in it)
| |
5
|
Creative Design
(the pictures/clip art are sized correctly, the font can be easily read, good use of color) | |
5
|
No Spelling or Grammar mistakes
| |
25
|
In your own words the most important item you learned from this topic.
Write one paragraph of 3 to 5 sentences. | |
5
|
Panel 1 has information and picture or clip art (see information below)
| |
5
|
Panel 2 has information and picture or clip art (see information below)
| |
5
|
Panel 3 has information and picture or clip art (see information below)
| |
5
|
Panel 4 has information and picture or clip art (see information below)
| |
5
|
Panel 5 has information and picture or clip art (see information below)
| |
5
|
Panel 6 has information and picture or clip art (see information below)
| |
100
|
Final Grade
|
Sunday, December 9, 2012
Monday, Dec 10- Video Conferencing and Introduction to MS Publisher
Bellringer:
Turn to page 229 and type the 2 paragraphs at the bottom of the page in the gray box.
You may ignore the red editing marks.
Pull out your interim reports. If you turn it in today, you will make a 90.
If they are turned in on Tuesday you will make a 85.
If you did not finish the Internet Search Engine worksheet finish it.
To hear this message click here.
Computer Security- Students will be asked which wireless security they have at home
WPA2, WEP or unsecured (none)
Word Processing- Miss W will demonstrate the find and replace feature.
Publisher- Miss W will demonstrate how to open the Video Conferencing material
and how to begin a Publisher Brochure
Independent Exercise:
Students will complete the Publisher formatting steps after Miss W demonstrates them.
Exit activity
Publisher symbols http://www.quia.com/mc/320506.html
Turn to page 229 and type the 2 paragraphs at the bottom of the page in the gray box.
You may ignore the red editing marks.
Pull out your interim reports. If you turn it in today, you will make a 90.
If they are turned in on Tuesday you will make a 85.
If you did not finish the Internet Search Engine worksheet finish it.
To hear this message click here.
What
are we learning?
1.5 Digital Lifestyles- Video Conferencing (Skype)
2.1 Word Processing- Apply formatting and editing features and operational keys appropriately.
3.5 Publisher-Format Brochure
Guided
Lesson:1.5 Digital Lifestyles- Video Conferencing (Skype)
2.1 Word Processing- Apply formatting and editing features and operational keys appropriately.
3.5 Publisher-Format Brochure
Computer Security- Students will be asked which wireless security they have at home
WPA2, WEP or unsecured (none)
Word Processing- Miss W will demonstrate the find and replace feature.
Publisher- Miss W will demonstrate how to open the Video Conferencing material
and how to begin a Publisher Brochure
Independent Exercise:
Students will complete the Publisher formatting steps after Miss W demonstrates them.
Exit activity
Publisher symbols http://www.quia.com/mc/320506.html
Thursday, December 6, 2012
Friday, Dec 7- Computer Security
Bellringer:
Open your "All the Chocolate you can eat" file
On page 226 type the 2nd paragraph that begins
"Charlie Bucket is a poor boy..."
We will be doing formatting on page 226 together.
Pull out your interim reports.
If you turn in today, you will make a 95.
If turned they are turned in on Monday you will make a 90.
If you did not finish the Internet
Search Engine worksheet work on it.
Click here to hear this message.
What are we learning?
1.4 Computer Security and Privacy
2.4 Format Memos
Guided Lesson:
Word Formatting:
Miss W will demonstrate the following formatting options:
Center, Bold, Italic, double spacing, changing margins and tabs.
Security
malware video http://www.onguardonline.gov/media/video-0056-protect-your-computer-malware
wireless security video http://www.onguardonline.gov/media/video-0009-wireless-security
We will view 3 levels of wireless security- WPA2, WEP, and none
Your homework is to ask your parents which security level their computer has if it is wireless.
Review: Sharing information http://www.onguardonline.gov/media/video-0022-sharing-information-day-your-life
Review: share with care http://www.onguardonline.gov/media/video-0004-share-care
Review: stand up to cyberbullying http://www.onguardonline.gov/media/video-0005-stand-cyberbullying
Review: stop think click http://www.onguardonline.gov/media/video-0002-heads-stop-think-click
Review: protection connection http://www.onguardonline.gov/media/video-0003-protection-connection
Group activity
Explain best practices for not getting scammed while shopping online http://www.onguardonline.gov/articles/0020-shopping-online
Pick which one is not an online shopping scams
http://www.onguardonline.gov/media/game-0009-online-lineup
Students should choose which one is legitimate.
Formative assessment games
http://www.onguardonline.gov/media/game-0013-case-cyber-criminal
everyone with no items left in the spy suitcase is entered for a candy drawing
Friend finder http://www.onguardonline.gov/media/game-0003-friend-finder
Spyware http://www.onguardonline.gov/media/game-0002-beware-spyware
5 out of 5
Full article of new NC Cyberbully law
http://www.nbcnews.com/technology/technolog/cyberbullying-law-protects-teachers-students-1B6029252
Open your "All the Chocolate you can eat" file
On page 226 type the 2nd paragraph that begins
"Charlie Bucket is a poor boy..."
We will be doing formatting on page 226 together.
Pull out your interim reports.
If you turn in today, you will make a 95.
If turned they are turned in on Monday you will make a 90.
If you did not finish the Internet
Search Engine worksheet work on it.
Click here to hear this message.
What are we learning?
1.4 Computer Security and Privacy
2.4 Format Memos
Guided Lesson:
Word Formatting:
Miss W will demonstrate the following formatting options:
Center, Bold, Italic, double spacing, changing margins and tabs.
Security
malware video http://www.onguardonline.gov/media/video-0056-protect-your-computer-malware
wireless security video http://www.onguardonline.gov/media/video-0009-wireless-security
We will view 3 levels of wireless security- WPA2, WEP, and none
Your homework is to ask your parents which security level their computer has if it is wireless.
Review: Sharing information http://www.onguardonline.gov/media/video-0022-sharing-information-day-your-life
Review: share with care http://www.onguardonline.gov/media/video-0004-share-care
Review: stand up to cyberbullying http://www.onguardonline.gov/media/video-0005-stand-cyberbullying
Review: stop think click http://www.onguardonline.gov/media/video-0002-heads-stop-think-click
Review: protection connection http://www.onguardonline.gov/media/video-0003-protection-connection
Group activity
Explain best practices for not getting scammed while shopping online http://www.onguardonline.gov/articles/0020-shopping-online
Pick which one is not an online shopping scams
http://www.onguardonline.gov/media/game-0009-online-lineup
Students should choose which one is legitimate.
Formative assessment games
http://www.onguardonline.gov/media/game-0013-case-cyber-criminal
everyone with no items left in the spy suitcase is entered for a candy drawing
Friend finder http://www.onguardonline.gov/media/game-0003-friend-finder
Spyware http://www.onguardonline.gov/media/game-0002-beware-spyware
5 out of 5
Full article of new NC Cyberbully law
http://www.nbcnews.com/technology/technolog/cyberbullying-law-protects-teachers-students-1B6029252
Subscribe to:
Posts (Atom)