Haverhill Cooperative Middle School
       Roll Out Presentation

            September 2008
Step 1. Introduction
In this session we will
• Outline Security and Care procedures
• Check appropriate serial numbers
• E...
•   The iBook user is responsible for reporting any problems with the machine to your teacher.
•   If there is a problem r...
to pull on it. To eject that same CD or DVD simply press the F12 key on the keyboard. Headphones are an option and can be ...
•   Laptop Rollout Contract with password written in appropriate box
•   Review the Acceptable Use Policy – attached as Ap...
   The laptops should never be left unattended. The laptops should be in the possession of each student or secured in a l...
Upcoming SlideShare
Loading in...5



Published on

Published in: Technology, Business
  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide


  1. 1. Haverhill Cooperative Middle School Roll Out Presentation September 2008
  2. 2. Step 1. Introduction In this session we will • Outline Security and Care procedures • Check appropriate serial numbers • Explain all the parts of the iBook • Open and start the notebook • Close the notebook • Collect all forms related to iBook use Step 2. Security and Care Dialogue – Laptops are to remain in the cart until step 4!!! Laptop Security Your iBook serial numbers are to be written on the agreement that you will sign that indicates you received your laptop. Haverhill Cooperative Middle School will keep this document in a safe place for easy referral in case something happens to the laptop. The mobile laptop has become a portable asset with a high street value making it an attractive target for theft. These systems also have the capacity to hold large amounts of data, making them a target for individuals seeking proprietary or personal information. The guidelines below should assist you in protecting your iBook and its data. • During the school day, Students must have laptops with them, or the laptops must be locked in the rolling cabinet in their homeroom. • Laptops must never be left unattended. There will be discipline measures for laptops found unattended or left improperly stored. • Leaving the laptop carrying case unattended makes the laptop easy to spot and a prime target for theft. Laptops can be stolen from virtually any public place. • In the school environment, laptops should be secured in a locked place when not in use. Even leaving it unattended for 10 seconds is enough time for it to be stolen. • If the laptop is stolen while travelling, promptly contact appropriate security personnel (e.g. teachers, or another responsible adult) for assistance. It is very important that the theft be reported as soon as possible. • Laptops must be kept in the approved laptop case you were issued today, with your laptop. They may not be kept in regular book bags. • Students may not lend their laptops to friends. • Laptop is to be shut off when not in use. Leaving the laptop on in the cart or while transporting between classes damages the laptop. Common Sense and the iBook • Do not eat or drink near the laptop. • Do not leave the laptop in an area where it may get wet. If the laptop does get liquid spilled onto it, do not turn on the laptop take it to your teacher immediately. If no one is readily available, turn the laptop upside down with the screen open to let the liquid run out and dry without damaging the laptop’s sensitive parts. Take out the battery when upside down, if possible. Just don’t turn the laptop on until you are told to do so by your teacher. • If at all possible use a power bar with power-spike or power surge protection. • Laptops can be damaged by large magnetic fields. Avoid placing them on speaker systems, electric motors, Televisions, etc. • Laptops are sensitive to extreme temperatures. Do not operate in extreme cold or heat. When moving from the cold, allow the laptop to reach room temperature before operating. Laptops will form condensation when changing temperature, which can damage the laptop if it is turned on and the condensation has not evaporated from the inside components. • CDs (music or CD-ROM) can also form condensation, so let them warm up before using them in the laptop. • Do not place the laptop where it may fall, such as on a stack of books or the edge of a table. Also be aware of the cords. It would be very easy to trip on the power cord and send your laptop flying. • Avoid areas with a lot of dust or smoke. They can damage the laptop. • The iBook display needs to be at room temperature to function properly. • Clean the display with a soft dry cloth. Do not use harsh detergents such as Windex, alcohol, or ammonia. • Try not to move the laptop when it is turned on. Excessive jarring may damage the hard drive. • Unplug the modem from the wall when a storm is approaching. Lightning can surge your phone line and render your modem (and possibly the laptop) non-functional. It is also important to unplug your laptop from the electrical socket, even if you are using a power bar. • Always close the lid and shut the unit off before transporting the iBook. Step 3. Where to go if there is a problem with laptops. 2
  3. 3. • The iBook user is responsible for reporting any problems with the machine to your teacher. • If there is a problem requiring the iBook to be sent for an extended repair, every effort will be made to provide a temporary laptop to the user. Step 4. Using the iBook Storage Cart Gather students appropriately around the laptop storage cart. Indicate when laptops are not in use they will be locked in the cart. Open the doors of the cart and show the students their laptops appropriately stored in the cart. Point out how the laptops are plugged in charging for their next use. Ensure students are aware where the electrical plugs in the unit are and what their power cord actually looks like. Step 5. Distribution of iBook’s – Have students remove an iBook from the cart in an orderly fashion. Step 6. A First Look Have them place the laptop flat on the desk. Have the students carefully turn the notebook over and read the asset tag on the bottom of the unit. Have the students write the serial number on the rollout contract. Ensure each student has a carrying case in front of them. Explain how the laptop is not to be moved without it being in the carrying case. Demonstrate how to properly insert the iBook into the carrying case. The laptop is to remain closed. Step 6. Getting Started The students can now open the iBook by first opening the machine by unlocking the silver button on the front of the iBook. The students are to lift the screen to a near-90 degree position. Have the students locate the power switch on the top right corner of the keyboard. There is only one button; it is white with a silver outline and a circle in the centre. Tell the students to turn on the power, hold down the power button for 3 seconds, the iBook will wait about 2 seconds and make the “Apple Sound”. Tell your students that proper use is to remain patient at all times with the laptop. After a memory test, Mac OS ten will start to load. The External Tour At the top of the keyboard are the two stereo speakers with a microphone at the top right corner of the screen. On the left side of the keyboard (starting from where the screen meets the keyboard and working down the keyboard) are the locking post for an optional laptop lock, modem jack for dialing up to the internet, network connection for directly connecting to the internet at school via a high speed connection, fire wire connector for connecting your iBook to a digital camera and digital video camera, two USB connectors for connecting various peripheral devices such as a mouse or a printer to your iBook, external display connector to connect you to a TV or the HCMS LCD projectors, and the headphone jack. Explain to your students to safely and slowly insert and remove cords and connectors from each jack. On the right side of the keyboard (starting from where the screen meets the keyboard and working down the keyboard) are the AC adapter connection and the DVD / CD Writer combo drive. Logging in to the iBook the first time Point out the logon screen that should be visible on every student’s iBook. Have your student’s type in their user name into the user name field and their password into the password field. Get the students to logon to their iBook. The first logon might take up to 5 minutes as the iBook needs to communicate with the server and setup a profile on the iBook, this should not be an issue on the second and subsequent logins. Each student’s username and password is exactly the same as their Powerschool credentials and is listed on the username and password file you were provided prior to the rollout. Once all of the students have logged in point out that their background is blue. In previous years students were not able to change their desktop wallpaper, but students can change the image to personalize their desktop only with permission of the homeroom teacher. All images must be acceptable to all members of the HCMS community. The Touch Pad The pad beneath the space bar is called a Touch Pad. The Touch Pad is your mouse. It can be moved by light finger pressure applied by your index finger, it is NOT called a press pad. You will notice that it takes a very small amount of pressure to move the mouse pointer around the screen (Have the students try the touch pad). At the bottom of the keyboard is a rectangular button, conveniently usable by your thumb. This is the mouse button. Most students will be used to a two button mouse, but iBook only uses what they might remember as a left mouse button. The left button is used to select an object on the desktop once your mouse pointer is over it with either a single or double click. Most of the icons on the Mac OS desktop will require a double click on the mouse button to open. If students prefer to have the occasional use of the shortcut menu that in Windows is generated by the right-click of the mouse, that same menu can be initiated by pressing the ctrl key on the keyboard at the same time as clicking the mouse button. CD-RW / DVD Combo Drive On the right side of the keyboard of the IBook facing you, there is a rectangular slot. Unlike a PC, there are no moving parts on the iBook and thus no tray that “pops” out of the iBook. To insert a CD or DVD simply put it inside the slot and gently push it until the iBook starts 3
  4. 4. to pull on it. To eject that same CD or DVD simply press the F12 key on the keyboard. Headphones are an option and can be used in quiet areas such as the library with your supervising staff member’s permission. They also provide a slightly higher quality than does the built- in speaker. The Keyboard The keyboard should be very familiar to most users. Due to the size of the iBook there are several “hot keys” to improve the ease of use of the iBook. The keyboard has 7 Hotkeys, which are keyboard shortcuts that enable you to access frequently used features no matter what program you are using. The hotkeys generally require the use of the function key, which is located on the bottom left corner of the laptop. FN+F1 – Decreases the display brightness. FN+F2 – Increases the display brightness. FN+F3 – Mutes the sound. FN+F4 – Lowers the sound volume. FN+F5 – Raises the sound volume. F9 (no FN key required) toggles the iBook into Mosaic mode, allowing your teacher to see every window you have open. F12 (no FN key required) ejects a CD or DVD that is inserted into the iBook. Also remind the students to insert a CD or DVD into the iBook is a matter of gently placing it into the CD/DVD drive on the right side of the iBook and pushing slowly on it until the iBook “swallows it”. Please note that the Hotkeys only work with the IBook Keyboard only and would not work with any external keyboard a student may try to attach to the iBook. Suspend Used to pause the laptop between uses. This feature is great for moving from a preparatory area to the classroom without having to shut the laptop off and back on again. This feature saves your place in an application you were using when suspend was initiated. Suspend is initiated by simply closing the laptop and can be exited by opening the iBook. The user knows that Suspend has been initiated if the lighted Apple logo on the top cover of the iBook display goes dark. If the battery is critically low (< 5%) suspend cannot be exited unless it is connected to an external power source. Shutting Down Shutting down the iBook is a very simple task. Simply press the power button on the upper right corner of the keyboard. A screen will appear asking you what you want to do: Restart, Sleep, Cancel, or Shut Down. This menu can also be accessed by clicking the Apple icon on the top left corner of the desktop and selecting Sleep, Restart, Shut Down, or Log Off. Students are expected to shut down their iBooks whenever they are not in use. The Battery The battery status bar is located on the top right corner of the desktop. The status bar will display the battery life like a graph. You can also click on the battery, go to Show, and select time. This will also show you the approximate amount of time remaining on the battery. The iBook is designed to work very well on battery power with approximately a four hour life on a single charge. It is recommended that you only charge the iBook when it needs to be charged and not to run it connected to an electric power source for battery conservation reasons. Your teachers will ensure the iBook receives enough time to recharge to get you through your academic day. Backup procedures Each student has been assigned a place on the Haverhill Cooperative School District Network that they can backup their files. Due to the inherent limitations of using a wireless network, students are to use their network storage for backup purposes only. It is suggested that students always save their work on the iBook. Every iBook has a “mounted” drive with the student’s user name on it; this is their network folder. It is important that students backup important files into this folder for the purpose, as they will be held accountable for their work in the event of an iBook failure. It is also recommended that students purchase a 1gigabyte USB storage key for further data protection. As the year moves forward you will learn and use the various folders that are inside your user folder. Step 9. A Little Housekeeping We need students to complete a task before we continue. I would like them to rename their iBook. To rename the iBook refer to the attached documentation or read aloud the following steps. 1. System Preferences, Sharing 2. The top box says “Computer Name”, so have the students change the computer name to their first initial and last name as one word. Also tell students that changing the name to anything else is a “punch-able” offense and their iBooks will be audited on a random basis for what name is in use. Step 10. Collection of Forms Please call Students alphabetically for attendance purposes and to make sure they have all proper forms. 4
  5. 5. • Laptop Rollout Contract with password written in appropriate box • Review the Acceptable Use Policy – attached as Appendix A Step 11. Personally labeling each iBook space in the Cart Each student will be assigned a space on the laptop charging cart. Students are expected to always use the same space when charging their iBook. Each space will be labeled with the corresponding student name. Students are to NEVER touch another iBook other than their own. Step 12. Answer Questions Step 13. Closure Tell students that each laptop will be periodically audited and to ensure everything they put on their iBook adheres to the HCMS Acceptable Use Policy. Remind Students to write down any further questions and remember there are no silly questions. TIME TO HAVE SOME FUN!!! Please remove all extra iBooks and power adapters from your cart as there is a greater number of students at HCMS this year. Please return all contracts to Mr. Walker. Appendix A – HCMS Acceptable Use Policy School Policy Governing Computer Use Use of the Internet is to pursue intellectual activities. Any user must adhere to the same code of ethics that governs all other aspects of life within the bounds of our learning community. Any actions performed or initiated through the network must reflect integrity, honesty, and compliance with the school's rules of conduct. Policies protecting the privacy of a student's work on the network are built from the premise that an unlocked computer does not give an outsider legitimate access to an individual's files just as an unlocked door does not give an outsider legitimate access to the personal belongings contained within a room. The following policies exist to ensure the ethical use of the network at Haverhill Cooperative School District: 1. Using the network is a privilege. Students can lose the privilege if they break any of the network access rules. 2. Accessing the accounts and files of others is prohibited. This rule protects all users on the network, not just the District community. Taking advantage of a student who inadvertently leaves a computer without logging out is no different than entering an unlocked room and stealing, reading a personal letter, or destroying someone's personal property. 3. Attempting to subvert network security, to impair functionality of the network, to bypass restrictions set by the administrators, or to disrupt the operation of the computers is prohibited. Assisting others in violating these rules by sharing information or passwords is also considered unacceptable behavior. 4. Improper use or distribution of information is prohibited. This includes copyright violations such as software piracy as well as plagiarism. The network is a valid academic resource, and use thereof is governed by the same rules as library resources. 5. Using the network for commercial purposes or in support of illegal activities is prohibited. The school maintains the network for academic purposes as well as for school related and personal communication. If students are in doubt about the definition of "illegal" activity, they should talk to a faculty member. 6. Students accessing the network are representatives of Haverhill Cooperative School District and are expected to behave accordingly. Students who are unsure of what constitutes appropriate behavior should ask themselves the question: "Will my actions reflect well on the District community?" 7. Students must take full responsibility for their actions. Haverhill Cooperative School District will not be liable for the actions of anyone connecting through this hookup. All users shall assume full liability, legal, financial and otherwise for their actions. 8. Students must be responsible users. Download only needed information. No game playing. Guidelines for Use of your Laptop at HCMS  Haverhill Cooperative Middle School retains control, custody and supervision of all computers, networks and Internet services owned by, leased or loaned to HCMS.  Once the laptop is issued to the student, the student is responsible for it at all times. The normal school rules of showing respect for property apply to the care of the laptop computers. 5
  6. 6.  The laptops should never be left unattended. The laptops should be in the possession of each student or secured in a locked location at all times.  Computers will be assigned and registered in an online database to individual students. Students should never swap computers. Students should not share their passwords with other students.  Each student’s password will be held in confidence by school personnel. This password may be necessary at some times when the laptop needs to be serviced by our technical staff. Parents and guardians are entitled to their children’s passwords.  Any inappropriate or careless use of a laptop or its carrying case needs to be reported immediately. Misuse will result in the laptop being taken away for a period of time that will be determined by the school.  HCMS reserves the right to monitor all computer and Internet activity by students. Students have no expectations of privacy in their use of school computers, including e-mail and stored files.  Any inappropriate use of e-mail or network services will result in e-mail and network privileges being taken away for a period of time.  The laptops should only be used within the classroom setting. They should never be used on the bus, while in transit, in the gym or near athletic competition areas, or on the recess grounds.  The laptops will be cloned and restored to their original state at various points throughout the school year. Downloading any materials should be restricted to educational purposes. The laptops come with an easy-to-use backup utility, and students should remember to back up important work to the server often. After re-cloning, students will be able to retrieve their work.  The laptop must be kept in its storage case when not in use.  Laptops are not to be stored in student lockers or carried in backpacks.  The laptop and its case should be kept clean at all times, free of marks.  The laptop should be protected from the weather and extreme temperatures.  The laptop should be used on a flat, stable surface. If it falls, it may break.  The laptop should not have heavy items placed on it.  Students who fail to abide by these guidelines will have their rights to use the laptops suspended or revoked.  Students who steal, vandalize, or willfully destroy the laptops will be held financially responsible for them.  HCMS reserves the right to periodically spot audit student machines and remove non-academic material and programs.  Students are to be aware that every teacher has the right to monitor their laptop over the network and can do so at any time.  Students are to shut their iBook off when not in use. Guidelines for Use of your Laptop License at HCMS Each student will be issued a Laptop License at the beginning of the school year. Students will receive a punch for every violation of school computer policy and the number of punches will increase depending on the severity of the offense. The following items are “punch- able” offenses for laptop misuse at HCMS: o Changing the Desktop Wallpaper excessively or displaying pictures that are deemed offensive o Defacing the iBook o Leaving the iBook turned on overnight o Loading iPhoto with pictures not related to school work o Loading iTunes with music not related to school work o Using chat programs or web-based email programs o Loaning your iBook to another user o Clearing the Internet Cache and History o Violating Software, Music, Photo, etc. Copyright protections o Installing software onto the iBook that was not included on the iBook on the first day of school o Personal Web surfing during the school day o Plagiarism o Changing the computer name to something other than a student’s first initial and last name as one word o Send messages that threaten or bully others o Gamble o Buy or sell items or services o Download or distributed copyrighted material (movies, music, video, games) o View hate sites, pornography, or other offensive material inappropriate for school o Visit chat rooms o Play games o Delete, modify, or plagiarize some other student’s files. o Transport the iBook without turning the power off. 6
  7. 7. 7