Join us as we host iPad Academy for the Beginner! Integrating iPads into your curriculum is easier than ever - it's just about knowing where to start and how to find the good stuff! In our sessions, we will start with the basics, then move on to how it can improve your productivity and effectively improve student learning. Each session will focus on one particular area: Getting to Know Your iPad & Productivity Tools; Communication & Collaboration Tools; and Curation & Creation Tools. You'll be shown how to use the apps in practical ways at a pace that is right for you! You can feel comfortable knowing that when you walk away from this academy, you will be armed with a toolbox of resources and skills to help foster creativity and increase student learning. Look forward to an Advanced iPad Academy in Spring 2015!
Join us as we host iPad Academy for the Beginner! Integrating iPads into your curriculum is easier than ever - it's just about knowing where to start and how to find the good stuff! In our sessions, we will start with the basics, then move on to how it can improve your productivity and effectively improve student learning. Each session will focus on one particular area: Getting to Know Your iPad & Productivity Tools; Communication & Collaboration Tools; and Curation & Creation Tools. You'll be shown how to use the apps in practical ways at a pace that is right for you! You can feel comfortable knowing that when you walk away from this academy, you will be armed with a toolbox of resources and skills to help foster creativity and increase student learning. Look forward to an Advanced iPad Academy in Spring 2015!
3 Ways to Protect the Data in Your Apple AccountLookout
Chances are you have some photos living in the cloud. In light of recent celebrity photo leaks, how do you make sure your private photos stay private? Here's 3 steps to make it easy.
TradeinTechforCash was designed to sell your electronics as easy as possible with more options to get more cash for your smartphones and other electronics.
For More Details You Can Visit : http://tradeintechforcash.com/
How to Set up a Personal Hotspot on iPhoneHowtonia
With a smartphone, you can do more than stay connected — you can stay entertained, informed, and even productive. If you’re on the go, you may not have a Wi-Fi connection available for your laptop or tablet. Connecting to a wireless network, whether it’s in a coffee shop, hotel or airport is convenient, but it can also get costly.
When experiencing a lack of Wi-Fi connectivity, it is possible to boost a connection through the use of a hotspot. This can be done through the use of Wi-Fi or USB cables. If the hotspot is set up on a phone, other devices such as laptops, tablets, or other phones can be given the opportunity to get online.
Cyber Security is not a nice to have, it's essential to protect your business, its clients and assets. Don't take risks. At Penntech IT Solutions, an IT Service Company in London, we can provide security services to keep your business safe proactively.
HOW TO LOCATE YOUR IPHONE WHEN IT GOES MISSINGMegan Llyod
Find my iPhone is an incredible service offered by Apple as a region of iCloud victimization that you'll be able to track your iPhone, mackintosh or iPad if it ever gets taken or lost.
JahiaOne 2015 - Jahia on your Wrist (The Apple Watch Integration example) by ...Jahia Solutions Group
In this presentation we will study in detail the case of integrating Jahia directly with the Apple Watch and the iPhone, the technologies used, the challenges encountered and of course we will demonstrate the end result. We will leverage for this Jahia's REST API as well as custom actions and the power of OSGi modules, and the iOS Swift language on the front-end part.
Home fires, dangerous driving conditions, and food borne illnesses are threatening the happiest time of the year. Here are our top 25 tips to keep you, your family, and friends safe this year.
Summary of Findings for KID's After Recall: Dangerous Products Remain in HomesKids In Danger (KID)
This a summary of some of the key findings that Kids In Danger (KID) uncovered in their 13th annual recall report. This year's report, After Recall: Dangerous Products Remain in Homes, focused on recall report data from 2013 children's product recalls and 2012 monthly reports on 2012 children's product recalls to determine recall trends and effectiveness. All data was either acquired through the CPSC or collected by KID. All analysis was done by KID.
This paper examines the relationship between contemporary parenthood, childhood, child safety and consumer culture. It draws primarily on ethnographic research conducted in two consumer events in the UK: The Baby Show and Mothercare World. We point out that parenthood is embedded in consumer culture and argue that the commercial events investigated generate commercial communities of parenthood that operate as information conduits on parenting moralities and practices.
3 Ways to Protect the Data in Your Apple AccountLookout
Chances are you have some photos living in the cloud. In light of recent celebrity photo leaks, how do you make sure your private photos stay private? Here's 3 steps to make it easy.
TradeinTechforCash was designed to sell your electronics as easy as possible with more options to get more cash for your smartphones and other electronics.
For More Details You Can Visit : http://tradeintechforcash.com/
How to Set up a Personal Hotspot on iPhoneHowtonia
With a smartphone, you can do more than stay connected — you can stay entertained, informed, and even productive. If you’re on the go, you may not have a Wi-Fi connection available for your laptop or tablet. Connecting to a wireless network, whether it’s in a coffee shop, hotel or airport is convenient, but it can also get costly.
When experiencing a lack of Wi-Fi connectivity, it is possible to boost a connection through the use of a hotspot. This can be done through the use of Wi-Fi or USB cables. If the hotspot is set up on a phone, other devices such as laptops, tablets, or other phones can be given the opportunity to get online.
Cyber Security is not a nice to have, it's essential to protect your business, its clients and assets. Don't take risks. At Penntech IT Solutions, an IT Service Company in London, we can provide security services to keep your business safe proactively.
HOW TO LOCATE YOUR IPHONE WHEN IT GOES MISSINGMegan Llyod
Find my iPhone is an incredible service offered by Apple as a region of iCloud victimization that you'll be able to track your iPhone, mackintosh or iPad if it ever gets taken or lost.
JahiaOne 2015 - Jahia on your Wrist (The Apple Watch Integration example) by ...Jahia Solutions Group
In this presentation we will study in detail the case of integrating Jahia directly with the Apple Watch and the iPhone, the technologies used, the challenges encountered and of course we will demonstrate the end result. We will leverage for this Jahia's REST API as well as custom actions and the power of OSGi modules, and the iOS Swift language on the front-end part.
Home fires, dangerous driving conditions, and food borne illnesses are threatening the happiest time of the year. Here are our top 25 tips to keep you, your family, and friends safe this year.
Summary of Findings for KID's After Recall: Dangerous Products Remain in HomesKids In Danger (KID)
This a summary of some of the key findings that Kids In Danger (KID) uncovered in their 13th annual recall report. This year's report, After Recall: Dangerous Products Remain in Homes, focused on recall report data from 2013 children's product recalls and 2012 monthly reports on 2012 children's product recalls to determine recall trends and effectiveness. All data was either acquired through the CPSC or collected by KID. All analysis was done by KID.
This paper examines the relationship between contemporary parenthood, childhood, child safety and consumer culture. It draws primarily on ethnographic research conducted in two consumer events in the UK: The Baby Show and Mothercare World. We point out that parenthood is embedded in consumer culture and argue that the commercial events investigated generate commercial communities of parenthood that operate as information conduits on parenting moralities and practices.
How to prevent Road Accidents, Road Safety tips, Road Safety Seminar, Road Sa...Road Safety
Steps to be taken to prevent Road Accidents, How to prevent Road Accidents, Road Accident Preventions Tips, Steps to be taken by Government to reduce road accidents. Traffic safety awareness, How to avoid accidents, How to reduce road accidents, Safety habits, Parenting, Action by Public Works, Home ministr, State governments, Union Goverment, Police etc.
american highway safety, indian road safety, taffic safety, aashto, nchrp, nhtsa, school safety, general safety, aaa traffic safety, ADTSEA, road safety foundation, road safety organisation ,national road safety, nhtsa, national safety, american highway, indian highway, auto safety, automobile safety ,parents, children, road accident prevention tips, road safety, accident control, child, helmet, india, indian government ,slide share, powerpoint .
Internet Safety tips for Parents of Christian Childrennickswebtsv
The internet has evolved into a enormous beast that has revolutionized the computer and communications world like nothing before. But with this revolution comes safety concerns for children whose parents wish to keep a watchful eye on their child's browsing habits.
This presentation covers family safety tools that empower parents to easily manage their child's exposure to explicit websites. Such as gambling, social media and online dating websites which can be used for the wrong reasons by pedophiles and the like.
The solutions available to parents range from device based security to software or host ran applications like NetNanny.
A presentation given by librarians at the University of Rochester Medical Center's Miner library.
Provides a basic introduction to using the iPhone including settings, navigation, email, network access and using Safari.
What to do if you "forgot iPhone passcode"? How to remove the password from iPhone?
Here we will introduce 4 methods to help you unlock your iPhone password. You can choose one of them to have a try!
Today, the Internet has become a big part of our day-to-day lives. It offers us lots of useful information, but it can also be associated with a certain amount of danger
Forgot restrictions passcode - How to Reset Restrictions Passcode on iPhonemoli he
Follow this tutorial to recover or remove the forgotten restrictions passcode without on iPhone/iPad without losing data. We'll show you 2 simple ways to reset restrictions for iPhone/iPad in iOS 13/12/11.
iPad and Android tablet basics. Includes an overview, how to connect to wifi, info on apps, settings,email, ebooks, photo albums. Prepared by Mary Schooneveldt for sessions at Wonthaggi U3A,
It is wise to take comprehensive preventive measures when it comes to securing and protecting your device. Have a look at these ways to protect your information and improve your chances of recovering your phone when it’s stolen or lost.
If you don't already have a security training program, this presentation is a great tool for a new hire orientation or company-wide meeting. It includes all of our top 10 tips, plus examples of relevant news stories to drive home the point. You can customize it to include your own tips or insert individual slides in other presentations.
Download a customizable PPT here: www.sophos.com/staysafe
Your Smartphone CAN help you work smarter in your busines.Bryna Lee Jacobson
From presentation to ITA Feb 2015. Learn ways to secure your phone and its data and use apps in ways you may not have thought of doing. Add to your peace of mind, feeling of being in control and make it fun! My Tech Tutor helps you get to, "I Can Do It!" It's easy when you know how. Beginners of all ages are welcome.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
2. • With
its
great
mulBmedia,
gaming,
and
Internet
features,
the
iPad,
iPod
and
iPhone
are
loved
by
kids
and
teens
the
world
over-‐-‐and
many
ask
for
it
as
a
present
for
holidays
or
birthdays.
• Parents
want
to
oblige
but
may
also
have
some
concerns
about
giving
their
kids
unsupervised
access
to
the
Internet.
If
you're
in
that
situaBon,
this
arBcle
offers
the
steps
to
take
before
giving
your
child
an
iPod
touch
or
iPhone.
• WHEN
GIVING
YOUR
CHILD
AN
IPHONE,
IPAD
OR
SO,
YOU
SHOULD
MAKE
SURE
YOUR
KID
IS
SAFE
AND
FOLLOWS
THIS
RULES
• First
you
will
have
to
configure
your
iphone
to
be
child
safety,
if
you
don’t
worried
to
do
so,
don’t
read
any
more,
you
are
an
irresponsible
parent,
but,
if
you
really
want
to
protect
your
kid,
this
is
the
first
thing
to
do.
3. IPHONE
AND
IPAD
SAFETY
1.
Create
an
Apple
ID
for
Kid
•
The
iPod
touch
and
iPhone
require
an
Apple
ID
(aka
an
iTunes
account)
for
set
up
and
to
allow
the
user
to
download
music,
movies,
apps,
or
other
content
from
the
iTunes
Store.
The
Apple
ID
is
also
used
for
features
like
iMessage,
FaceTime,
and
Find
My
iPhone.
You'll
probably
want
your
child
to
have
their
own
account
to
ensure
that
purchases
don't
get
billed
to
your
account.
•
If
your
child
has
their
own
computer,
you
can
set
the
account
up
there
and
leave
them
logged
in.
If
your
family
shares
one
computer,
you
can
set
it
up
there,
too.
Just
remember
that
each
person
should
log
out
of
their
Apple
ID
when
they're
done.
2.
Set
Up
iPod
touch
or
iPhone
•
With
the
iTunes
account
created,
you'll
want
to
set
up
the
device.
•
If
you're
seZng
the
device
up
on
a
shared
family
computer,
there
are
a
few
seZngs
to
take
note
of.
In
the
Info
tab,
you'll
want
to
make
sure
to
only
sync
an
address
book
specific
to
your
child
(rather
than,
say,
all
of
your
business
contacts),
a
calendar
specific
to
your
child,
and
be
sure
not
to
sync
your
email
accounts
to
the
device
to
prevent
them
from
reading
or
replying
to
your
email.
•
If
your
child
has
their
own
email
account,
you
can
sync
it
(or
create
one
for
them
to
sync).
4. IPHONE
AND
IPAD
SAFETY
3.
Set
Passcode
A
passcode
is
a
great
way
to
protect
an
iPod
touch
or
iPhone.
It's
a
security
code
that
you
or
your
child
will
have
to
enter
every
Bme
you
want
to
use
the
device.
You'll
want
one
of
these
in
place
in
case
your
kid
loses
the
device-‐-‐you
wouldn't
want
a
stranger
to
get
access
to
any
family
informaBon
(more
on
dealing
with
a
lost
or
stolen
device
in
the
next
step).
Make
sure
to
use
a
passcode
that
both
you
and
your
child
can
remember.
It's
possible
to
reset
an
iPod
touch
with
a
lost
passcode,
but
why
put
yourself
in
a
situaBon
to
need
to
do
that?
5. IPHONE
AND
IPAD
SAFETY
4.
Configure
Find
My
iPhone
If
your
child
loses
their
iPod
touch
or
iPhone,
or
has
it
stolen,
you're
not
necessarily
going
to
be
forced
to
buy
a
new
one-‐-‐not
if
you've
got
Find
My
iPhone,
that
is.
Find
My
iPhone
(which
also
works
for
the
iPod
touch
and
iPad)
is
a
web-‐based
service
from
Apple
that
uses
the
built-‐in
LocaBon
Services
features
of
the
devices
to
help
you
track
the
lost
device.
You
can
also
lock
the
device
remotely
or
delete
all
its
data
over
the
Internet.
6. IPHONE
AND
IPAD
SAFETY
5.
Set
Content
RestricEons
Apple
has
built
tools
into
the
iOS-‐-‐the
operaBng
system
to
let
parents
control
content
and
apps
their
children
can
access.
Use
the
Content
RestricBons
to
protect
your
kids
from
inappropriate
content
and
from
doing
things
like
having
video
chats
(innocent
enough
with
friends,
but
certainly
not
with
strangers)
If
your
child
has
their
own
computer,
you
may
also
want
to
consider
using
the
Parental
Controls
built
into
iTunes
also
to
prevent
them
from
accessing
mature
material
at
the
iTunes
Store.
If
the
family
shares
one
computer,
check
out
this
arBcle
for
Bps
on
how
to
have
mulBple
Parental
Control
seZngs
on
the
same
computer.
To
set
up
RestricEons,
open
the
SeHngs
app
and
navigate
to
General
>
RestricEons.
Enable
RestricEons
and
you’ll
be
prompted
to
create
a
PIN
that
you’ll
need
whenever
you
change
your
RestricEons
seHngs.
.
Be
sure
to
use
a
different
passcode
than
the
one
used
in
step
3.
Disable:
Safari
and
Installing
Apps.
This
will
prevent
your
kid
to
see
stuff
you
don’t
allow
him
to
or
to
have
access
to
search
engines
that
can
put
him
in
danger.
You
can
let
your
kid
do
some
Internet
search,
but
ONLY
with
a
supervise
adult.
So
is
be_er
to
have
the
family
computer
on
a
specific
transit
space
of
your
home.
7. IPHONE
AND
IPAD
SAFETY
From
here,
you
can
scroll
down
through
the
list
and
customize
the
types
of
apps,
content,
and
seZngs
you
want
your
kids
to
have
access
to.
For
example,
to
enforce
content
raBngs,
scroll
down
to
the
Allowed
Content
secBon.
Tap
the
Apps
secBon
and
you
can
choose
which
types
of
apps
your
kids
can
install.
For
example,
you
could
prevent
them
from
installing
apps
with
the
“17+”
age
raBng.
8. IPHONE
AND
IPAD
SAFETY
Be
sure
to
select
each
one
of
the
opBons
you
will
like
to
have
control
over
your
kid
informaBon
and
locaBon.
9. IPHONE
AND
IPAD
SAFETY
Don’t
allowed
any
applicaBon
that
is
not
control
by
you
to
have
access
to
your
kid
locaBon.
10. IPHONE
AND
IPAD
SAFETY
Other
seZngs
allow
you
to
lock
certain
privacy
and
system
seZngs,
prevenBng
them
from
being
changed.
For
example,
you
could
prevent
your
kids
from
changing
the
Mail
and
Calendar
accounts
on
the
device.
Near
the
bo_om,
you’ll
also
find
opBons
for
Game
Center
—
you
can
prevent
your
kids
from
playing
mulBplayer
games
or
adding
friends
in
Apple’s
Game
Center
app.
The
seZngs
you
choose
will
always
be
enforced
unBl
you
enter
the
RestricBons
screen
in
the
seZngs,
tap
the
Disable
RestricBons
opBon,
and
provide
the
PIN
you
created.
Facebook
and
other
apps
can
have
access
to
your
personal
info,
so
check
out
what
opBons
works
best
for
you.
11. IPHONE
AND
IPAD
SAFETY
It´s
be_er
if
you
don’t
let
your
kid
to
have
access
to
the
mulBplayers
centers
opBon
because
you
never
know
who
can
reach
him.
12. IPHONE
AND
IPAD
SAFETY
Guided
Access
Guided
Access
allows
you
to
lock
your
device
to
a
single
app.
For
example,
you
could
lock
your
device
to
only
run
a
specific
educaBonal
app
or
game
and
then
hand
it
to
your
kid.
They’d
only
be
able
to
use
that
specific
app.
When
they’re
done,
you
can
unlock
the
device
with
a
PIN
you
set,
allowing
you
to
use
it
normally.
To
set
up
Guided
Access,
open
the
SeHngs
app
and
navigate
to
General
>
Accessibility
>
Guided
Access.
From
here,
you
can
ensure
guided
access
is
enabled
and
set
a
passcode.
13. IPHONE
AND
IPAD
SAFETY
•
To
enable
Guided
Access,
open
the
app
you
want
to
lock
the
device
to
—
for
example,
whatever
educaBonal
app
or
game
you
want
your
kid
to
use.
Quickly
press
the
Home
bu_on
three
Bmes
and
the
Guided
Access
screen
will
appear.
•
From
here,
you
can
further
lock
down
the
app.
For
example,
you
could
disable
touch
events
completely,
disable
touch
in
certain
areas
of
the
app,
disable
moBon,
or
disable
hardware
bu_ons.
•
You
don’t
have
to
configure
any
of
these
seZngs,
however.
To
start
a
Guided
Access
session,
just
tap
the
Start
opBon
at
the
top-‐right
corner
of
the
screen.
14. IPHONE
AND
IPAD
SAFETY
If
you
try
to
tap
the
Home
bu_on
to
leave
the
app,
you’ll
see
a
“Guided
Access
is
enabled”
message
at
the
top
of
the
screen.
Press
the
Home
bu_on
three
Bmes
again
and
you’ll
see
a
PIN
prompt.
Enter
the
PIN
you
provided
earlier
to
leave
Guided
Access
mode.
That’s
it
—
whenever
you
want
to
enable
Guided
Access,
just
open
the
app
you
want
to
lock
the
device
to
and
“triple-‐click”
the
Home
bu_on.
15. IPHONE
AND
IPAD
SAFETY
6.
Set
Up
iTunes
Allowance
Want
your
child
to
be
able
to
buy
music,
apps,
and
movies
from
iTunes
without
breaking
your
budget?
Create
an
iTunes
Allowance
for
them.
This
lets
you
give
them
a
pre-‐defined
amount
of
money
(from
US$10
to
$50)
every
month
to
spend
at
the
iTunes
Store.
This
way,
they
can
enjoy
new
music,
apps,
and
other
entertainment,
while
you
can
plan
for
the
cost.
Create
an
Apple
ID
for
them
to
make
sure
they
only
spend
the
amount
of
the
allowance.
16. SMARTPHONE
GOLDEN
RULES
WHEN
GIVING
YOUR
CHILD
AN
SMATPHONE,
YOU
SHOULD
MAKE
SURE
YOUR
KID
FOLLOW
THIS
RULES
1.
It
is
my
phone.
I
bought
it.
I
pay
for
it.
I
am
loaning
it
to
you.
2.
3.
4.
5.
6.
I
will
always,
always,
know
the
password.
If
it
rings,
answer
it.
It
is
a
phone.
Say”
hello”,
use
your
manners.
Do
not
ever
ignore
a
phone
call
if
the
screen
reads
"Mom"
or
"Dad".
Not
ever.
Don’t
waste
baGery
chaHng
or
playing
games,
this
phone
is
for
emergencies,
is
for
me
to
reach
you,
if
you
can
not
deal
with
that
I
will
take
it
back.
Hand
the
phone
to
one
of
your
parents
or
put
it
some
place
where
I
can
see
it
promptly
at
7:30
p.m.
every
school
night
&
every
weekend
night
at
9:00pm.
It
will
be
shut
off
for
the
night
and
turned
on
again
in
the
morning,
I
want
you
to
have
a
good
night
sleep.
(
Consider
having
a
centralized
resTng
place
for
the
phones
to
charge
up
while
family
members
are
sleeping.
There
are
lots
of
reasons
why
phones
shouldn’t
be
used
or
sending
out
audible
alerts
aVer
bedTme.
Just
because
your
phone
may
also
be
an
alarm
clock
doesn’t
mean
it
necessarily
should
be
siHng
on
your
or
your
kids’
nightstand.)
7.
Show
your
phone
manners,
No
phone
calls
to
anyone
leGer
than
9:00
p.m.
or
earlier
than
9:00
am.
8.
You
can
not
use
your
phone
at
school.
17. SMARTPHONE
GOLDEN
RULES
9.
10.
11.
Do
not
use
this
technology
to
lie,
fool,
or
deceive
another
human
being.
Do
not
involve
yourself
in
conversaTons
that
are
hur[ul
to
others.
Be
a
good
friend
first
or
stay
the
hell
out
of
the
crossfire.
Do
not
text,
email,
or
say
anything
through
this
device
you
would
not
say
in
person.
Do
not
text,
email,
or
say
anything
to
someone
that
you
would
not
say
out
loud
with
their
parents
in
the
room.
Censor
yourself.
12.
Do
not
send
or
receive
pictures
of
your
private
parts
or
anyone
else's
private
parts.
Don't
laugh.
Someday
you
will
be
tempted
to
do
this
despite
your
high
intelligence.
It
is
risky
and
could
ruin
your
teenage/college/adult
life.
It
is
always
a
bad
idea.
Cyberspace
is
vast
and
more
powerful
than
you.
And
it
is
hard
to
make
anything
of
this
magnitude
disappear
—
including
a
bad
reputaTon.
13.
Be
careful
about
any
apps
you
download
and
install.
While
most
apps
are
fine,
there
are
some
that
pose
security
and
privacy
risks.
Read
the
reviews
and
make
sure
that
the
app
is
from
a
legiBmate
source.
14.
No
porn.
Search
the
web
for
informaTon
you
would
openly
share
with
me.
If
you
have
a
quesTon
about
anything,
ask
a
person
preferably
me
or
your
father.
All
searching
engines
lake
Google
or
Safari
keep
a
track
of
your
search,
so,
if
you
open
this
door,
pedophiles
and
all
kinds
of
dangerous
people
can
reach
you.
18. SMARTPHONE
GOLDEN
RULES
15.
Turn
it
off,
silence
it
or
put
it
away
in
public
areas.
Especially
in
a
restaurant,
at
the
movies,
or
while
speaking
with
another
human
being.
You
are
not
a
rude
person;
do
not
allow
the
iPhone
to
change
that.
16.
Do
not
yell
when
speaking,
no
one
around
you
cares
about
your
conversaTon.
17.
Don't
take
a
zillion
pictures
and
videos.
There
is
no
need
to
document
everything.
Live
your
experiences.
They
will
be
stored
in
your
memory
for
eternity.
I
don’t
want
you
to
be
aGach
to
the
phone,
at
home,
leave
your
phone
at
the
desk.
Learn
to
live
without
it.
Be
bigger
and
more
powerful
than
fear
of
missing
out.
Never
text,
send
email,
use
apps
or
configure
the
phone’s
GPS
while
driving,
riding
a
bicycle
or
on
a
skateboard.
There
have
even
been
“texBng
while
walking”
accidents,
so
be
sure
that
you
don’t
hurt
yourself
and
others.
18.
19.
20.
Phone
charges
are
expensive,
That
includes
any
charges
for
calls,
text
and
data
as
well
as
the
purchasing
and
use
of
apps
and
in-‐app
purchases.
So,
you
can
not
use
all
your
credit
on
friends
calls,
remember,
this
phone
is
for
your
safety
and
for
me
to
reach
you
or
vice
versa.
21.
If
it
falls
into
the
toilet,
smashes
on
the
ground,
or
vanishes
into
thin
air,
you
are
responsible
for
the
replacement
costs
or
repairs.
22.
You
will
mess
up.
I
will
take
away
your
phone.
We
will
sit
down
and
talk
about
it.
We
will
start
over
again.
You
&
I,
we
are
always
learning.
I
am
on
your
team.
We
are
in
this
together.