SlideShare a Scribd company logo
Safe and Ethical Use
Computer Safety
• Update software frequently.
• Install and update anti-virus and anti-spyware often.
• Don’t click on questionable pop-ups – they may have a virus.
• Don’t put an unfamiliar flash drive into your computer.
• Never include personal information in emails.
• Any passwords created should include different kinds of characters and be rated
strongly.
• Store passwords in a hidden place.
• Close down your computer regularly so that updates can install.
Social Networking Do’s & Don’ts
• Do be careful who you accept as a friend on a social website.
• Do know that information put on social websites is forever.
• Do understand that a message from a friend may be an
imposter or hacker.
• Don’t use social networking websites at work.
• Don’t give out personal information over social websites.
Ethical Use of Video or Audio Materials
• OK – to use 10% or 3 minutes, whichever is less, of a video or DVD in
multimedia presentations, with proper citation
• OK - use 30 seconds or 10% of a song or composition in multimedia
presentations, with proper citation
• Not OK - to sell or duplicate video or audio materials included in a
multimedia presentation
• Not OK – to include video or photographic information without written
permission from all persons represented in video/picture
Copyright Guidelines
• Up to 10% of music or video may be used in a multimedia presentation, as
long as the material was lawfully acquired.
• Music or video for multimedia presentation must have educational
purpose, not entertainment purpose.
• Copyright information must be visible on printed materials.
• Images from the internet may be downloaded for student presentations.
• Links may be posted but material may not be posted on another website.
Checking for Plagiarism
Plagiarism may have occurred if you see:
• An unusual amount of professional language included in a research paper from a
student
• When the body of a research paper is much more technical than the intro or
conclusion
• When the material turned in closely resembles other student’s work
• Ideas are much more advanced than that of a student starting out
• When resources such as turnitin.com yield a high probability of plagiarism
Proper Citation Methods
• For material on websites, cite the author, title of webpage, full URL, and
date you retrieved material.
• For videos, include producer’s name, director’s name, year of release, title
of the video, country of origin, and production company.
• For music, include composer’s name, performer’s name, copyright date,
album title, record label’s company name.
References
Information taken from:
• microsoft.com
• turnitin.com
• apaguidelines.com

More Related Content

What's hot

Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
summasecundario
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & Teachers
Mark White
 
CYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESHCYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESH
Yogesh Prajapati
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
PantegoChristian
 
Internet safety power_point
Internet safety power_pointInternet safety power_point
Internet safety power_point
Amit Pal Singh
 
Digital citizenship.pptx
Digital citizenship.pptxDigital citizenship.pptx
Digital citizenship.pptx
KnepperE
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
Aayushi Singh
 
A Parent's Guide to Keeping Kids Safe Online
A Parent's Guide to Keeping Kids Safe OnlineA Parent's Guide to Keeping Kids Safe Online
A Parent's Guide to Keeping Kids Safe Online
Corinne Weisgerber
 
Cyber security for kids
Cyber security for kidsCyber security for kids
Cyber security for kids
Chris Burrows
 
Privacy Primer
Privacy PrimerPrivacy Primer
Privacy Primer
ConnectSafely
 
Safe and ethical use
Safe and ethical useSafe and ethical use
Safe and ethical use
Totowanelson
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
Stephen Thomas, CISSP
 
Internet safety
Internet safetyInternet safety
Internet safety
dsansford
 
Untangling the Web: Keeping Your Family Safe Online
Untangling the Web: Keeping Your Family Safe OnlineUntangling the Web: Keeping Your Family Safe Online
Untangling the Web: Keeping Your Family Safe Online
Todd Stanfield
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
lcash
 

What's hot (15)

Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & Teachers
 
CYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESHCYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESH
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
Internet safety power_point
Internet safety power_pointInternet safety power_point
Internet safety power_point
 
Digital citizenship.pptx
Digital citizenship.pptxDigital citizenship.pptx
Digital citizenship.pptx
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
A Parent's Guide to Keeping Kids Safe Online
A Parent's Guide to Keeping Kids Safe OnlineA Parent's Guide to Keeping Kids Safe Online
A Parent's Guide to Keeping Kids Safe Online
 
Cyber security for kids
Cyber security for kidsCyber security for kids
Cyber security for kids
 
Privacy Primer
Privacy PrimerPrivacy Primer
Privacy Primer
 
Safe and ethical use
Safe and ethical useSafe and ethical use
Safe and ethical use
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Untangling the Web: Keeping Your Family Safe Online
Untangling the Web: Keeping Your Family Safe OnlineUntangling the Web: Keeping Your Family Safe Online
Untangling the Web: Keeping Your Family Safe Online
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 

Viewers also liked

Computer Lessons for Kids: Keyboard Shortcuts
Computer Lessons for Kids: Keyboard ShortcutsComputer Lessons for Kids: Keyboard Shortcuts
Computer Lessons for Kids: Keyboard Shortcuts
RobinAge: Weekly Children's Newspaper
 
Elementary School Computer Class
Elementary School Computer ClassElementary School Computer Class
Elementary School Computer Class
City Vision University
 
Summer Fun 2014 - Computer Science for Kids and Teens
Summer Fun 2014 - Computer Science for Kids and TeensSummer Fun 2014 - Computer Science for Kids and Teens
Summer Fun 2014 - Computer Science for Kids and Teens
MyPal Online School
 
WTDWTK 100 Lessons Kids Should Learn
WTDWTK 100 Lessons Kids Should LearnWTDWTK 100 Lessons Kids Should Learn
WTDWTK 100 Lessons Kids Should Learn
Brian Presley
 
Kids on Computers
Kids on ComputersKids on Computers
Kids on Computers
Avni Khatri
 
Computer for kids
Computer for kidsComputer for kids
Computer for kids
priyanka jayapathma
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
Department of Defense
 
Computer basic for kids
Computer basic for kidsComputer basic for kids
Computer basic for kids
Paul Gonzales
 
Keeping kids safe online
Keeping kids safe onlineKeeping kids safe online
Keeping kids safe online
tcald1991
 

Viewers also liked (9)

Computer Lessons for Kids: Keyboard Shortcuts
Computer Lessons for Kids: Keyboard ShortcutsComputer Lessons for Kids: Keyboard Shortcuts
Computer Lessons for Kids: Keyboard Shortcuts
 
Elementary School Computer Class
Elementary School Computer ClassElementary School Computer Class
Elementary School Computer Class
 
Summer Fun 2014 - Computer Science for Kids and Teens
Summer Fun 2014 - Computer Science for Kids and TeensSummer Fun 2014 - Computer Science for Kids and Teens
Summer Fun 2014 - Computer Science for Kids and Teens
 
WTDWTK 100 Lessons Kids Should Learn
WTDWTK 100 Lessons Kids Should LearnWTDWTK 100 Lessons Kids Should Learn
WTDWTK 100 Lessons Kids Should Learn
 
Kids on Computers
Kids on ComputersKids on Computers
Kids on Computers
 
Computer for kids
Computer for kidsComputer for kids
Computer for kids
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
 
Computer basic for kids
Computer basic for kidsComputer basic for kids
Computer basic for kids
 
Keeping kids safe online
Keeping kids safe onlineKeeping kids safe online
Keeping kids safe online
 

Similar to Safe and ethical use

Streaming wifi bp
Streaming wifi bpStreaming wifi bp
Streaming wifi bp
Ernest Staats
 
Nad streaming best p
Nad streaming best pNad streaming best p
Nad streaming best p
Ernest Staats
 
Safe and ethical use
Safe and ethical useSafe and ethical use
Safe and ethical use
jenniferbrister
 
Safe and ethical use of technology
Safe and ethical use of technologySafe and ethical use of technology
Safe and ethical use of technology
Allison Loyd
 
Internet safety
Internet safetyInternet safety
Internet safety
martdale
 
Legal and social impacts on ICT
Legal and social impacts on ICTLegal and social impacts on ICT
Legal and social impacts on ICT
Middle East International School
 
Internet Safety - Parents
Internet Safety - ParentsInternet Safety - Parents
Internet Safety - Parents
- Mark - Fullbright
 
Pitch of my promotional video
Pitch of my promotional videoPitch of my promotional video
Pitch of my promotional video
Alex_Gormley
 
ACESnWS cyber security tips
ACESnWS cyber security tipsACESnWS cyber security tips
ACESnWS cyber security tips
ACE Software n Web Solutions
 
ICT in Education
ICT in EducationICT in Education
ICT in Education
Vijayalakshmi Murugesan
 
Online ethics
Online ethicsOnline ethics
Technology and youth ywc conf
Technology and youth  ywc confTechnology and youth  ywc conf
Technology and youth ywc conf
guest007cc5e6
 
Web2.0 Class Guidelines
Web2.0 Class Guidelines Web2.0 Class Guidelines
Web2.0 Class Guidelines
Web Success Coaching
 
Educational Technology 1
Educational Technology 1Educational Technology 1
Educational Technology 1
Angelica Vargas
 
Computer Science – societal impact.pptx
Computer Science – societal impact.pptxComputer Science – societal impact.pptx
Computer Science – societal impact.pptx
Nano894860
 
Exemplary MOLE TELFest 2015
Exemplary MOLE TELFest 2015Exemplary MOLE TELFest 2015
Exemplary MOLE TELFest 2015
telshef
 
Cyber Crime and how to prevent it?
Cyber Crime and how to prevent it?Cyber Crime and how to prevent it?
Cyber Crime and how to prevent it?
Mujeeb Riaz
 
Safely Traveling the Web 2015
Safely Traveling the Web 2015Safely Traveling the Web 2015
Safely Traveling the Web 2015
Staci Trekles
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
Nicholas Davis
 
Edtc 6340-66 copyright crash course alberto tudon 2nd ed
Edtc 6340-66 copyright crash course  alberto tudon 2nd edEdtc 6340-66 copyright crash course  alberto tudon 2nd ed
Edtc 6340-66 copyright crash course alberto tudon 2nd ed
albertotudon
 

Similar to Safe and ethical use (20)

Streaming wifi bp
Streaming wifi bpStreaming wifi bp
Streaming wifi bp
 
Nad streaming best p
Nad streaming best pNad streaming best p
Nad streaming best p
 
Safe and ethical use
Safe and ethical useSafe and ethical use
Safe and ethical use
 
Safe and ethical use of technology
Safe and ethical use of technologySafe and ethical use of technology
Safe and ethical use of technology
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Legal and social impacts on ICT
Legal and social impacts on ICTLegal and social impacts on ICT
Legal and social impacts on ICT
 
Internet Safety - Parents
Internet Safety - ParentsInternet Safety - Parents
Internet Safety - Parents
 
Pitch of my promotional video
Pitch of my promotional videoPitch of my promotional video
Pitch of my promotional video
 
ACESnWS cyber security tips
ACESnWS cyber security tipsACESnWS cyber security tips
ACESnWS cyber security tips
 
ICT in Education
ICT in EducationICT in Education
ICT in Education
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Technology and youth ywc conf
Technology and youth  ywc confTechnology and youth  ywc conf
Technology and youth ywc conf
 
Web2.0 Class Guidelines
Web2.0 Class Guidelines Web2.0 Class Guidelines
Web2.0 Class Guidelines
 
Educational Technology 1
Educational Technology 1Educational Technology 1
Educational Technology 1
 
Computer Science – societal impact.pptx
Computer Science – societal impact.pptxComputer Science – societal impact.pptx
Computer Science – societal impact.pptx
 
Exemplary MOLE TELFest 2015
Exemplary MOLE TELFest 2015Exemplary MOLE TELFest 2015
Exemplary MOLE TELFest 2015
 
Cyber Crime and how to prevent it?
Cyber Crime and how to prevent it?Cyber Crime and how to prevent it?
Cyber Crime and how to prevent it?
 
Safely Traveling the Web 2015
Safely Traveling the Web 2015Safely Traveling the Web 2015
Safely Traveling the Web 2015
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
Edtc 6340-66 copyright crash course alberto tudon 2nd ed
Edtc 6340-66 copyright crash course  alberto tudon 2nd edEdtc 6340-66 copyright crash course  alberto tudon 2nd ed
Edtc 6340-66 copyright crash course alberto tudon 2nd ed
 

Recently uploaded

Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
indexPub
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
zuzanka
 
Juneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School DistrictJuneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School District
David Douglas School District
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
danielkiash986
 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
nitinpv4ai
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
deepaannamalai16
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 
skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
Mohammad Al-Dhahabi
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
Steve Thomason
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
RidwanHassanYusuf
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
MysoreMuleSoftMeetup
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
deepaannamalai16
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
Skimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S EliotSkimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S Eliot
nitinpv4ai
 
How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17
Celine George
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
Krassimira Luka
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
سمير بسيوني
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
 

Recently uploaded (20)

Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
 
Juneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School DistrictJuneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School District
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 
skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
Skimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S EliotSkimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S Eliot
 
How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
 

Safe and ethical use

  • 2. Computer Safety • Update software frequently. • Install and update anti-virus and anti-spyware often. • Don’t click on questionable pop-ups – they may have a virus. • Don’t put an unfamiliar flash drive into your computer. • Never include personal information in emails. • Any passwords created should include different kinds of characters and be rated strongly. • Store passwords in a hidden place. • Close down your computer regularly so that updates can install.
  • 3. Social Networking Do’s & Don’ts • Do be careful who you accept as a friend on a social website. • Do know that information put on social websites is forever. • Do understand that a message from a friend may be an imposter or hacker. • Don’t use social networking websites at work. • Don’t give out personal information over social websites.
  • 4. Ethical Use of Video or Audio Materials • OK – to use 10% or 3 minutes, whichever is less, of a video or DVD in multimedia presentations, with proper citation • OK - use 30 seconds or 10% of a song or composition in multimedia presentations, with proper citation • Not OK - to sell or duplicate video or audio materials included in a multimedia presentation • Not OK – to include video or photographic information without written permission from all persons represented in video/picture
  • 5. Copyright Guidelines • Up to 10% of music or video may be used in a multimedia presentation, as long as the material was lawfully acquired. • Music or video for multimedia presentation must have educational purpose, not entertainment purpose. • Copyright information must be visible on printed materials. • Images from the internet may be downloaded for student presentations. • Links may be posted but material may not be posted on another website.
  • 6. Checking for Plagiarism Plagiarism may have occurred if you see: • An unusual amount of professional language included in a research paper from a student • When the body of a research paper is much more technical than the intro or conclusion • When the material turned in closely resembles other student’s work • Ideas are much more advanced than that of a student starting out • When resources such as turnitin.com yield a high probability of plagiarism
  • 7. Proper Citation Methods • For material on websites, cite the author, title of webpage, full URL, and date you retrieved material. • For videos, include producer’s name, director’s name, year of release, title of the video, country of origin, and production company. • For music, include composer’s name, performer’s name, copyright date, album title, record label’s company name.
  • 8. References Information taken from: • microsoft.com • turnitin.com • apaguidelines.com