Students will create usernames & passwords that are user friendly and safe.
Step 1: Please review these short videos: Video 1
Video 2
Step 2: In the google doc, please type in a username and password that you think is acceptable to use.
Step 3: In a NEW google doc (added to your cet folder-labeled as Usernames&Passwords) please answer: How do you store non electric devices to protect your possessions from being stolen? What are examples of how you use passwords when you use electronic devices? What do you think could happen if someone got hold of your password?
Note: Passwords help protect your online accounts from being stolen or used by others. The older you get, the more important password security will become to you. Choosing good passwords will help protect your social networking profiles when they are in high school, keep your grades private when you are in college, and protect your bank accounts and online store accounts when you are an adult.
Step 4: Go over this article.
Step 5: If you need to change the username and password in the google doc that you put in earlier- please do so now.
Video 2
Step 2: In the google doc, please type in a username and password that you think is acceptable to use.
Step 3: In a NEW google doc (added to your cet folder-labeled as Usernames&Passwords) please answer: How do you store non electric devices to protect your possessions from being stolen? What are examples of how you use passwords when you use electronic devices? What do you think could happen if someone got hold of your password?
Note: Passwords help protect your online accounts from being stolen or used by others. The older you get, the more important password security will become to you. Choosing good passwords will help protect your social networking profiles when they are in high school, keep your grades private when you are in college, and protect your bank accounts and online store accounts when you are an adult.
Step 4: Go over this article.
Step 5: If you need to change the username and password in the google doc that you put in earlier- please do so now.
In a google doc, please answering the following questions. Make sure you put the doc into your CET Period 9 folder.
1. How can you foster safe, legal and ethical behaviors using technology?
2. How can I model appropriate and responsible behavior using technology in relation to cyber safety, cyber bullying, cyber security, and cyber ethics?
3. Why is it necessary for each individual, as a member of the global community, to practice cyber safety, cyber security, and cyber ethics when using existing and emerging technologies?
4. How can you use technology effectively to be prepared to live and work in our complex, information-rich world?
5. How can I use technology to present and publish information through the use of various applications?
6. What was the hardest part about this project?
7. What was your favorite part about this project?
1. How can you foster safe, legal and ethical behaviors using technology?
2. How can I model appropriate and responsible behavior using technology in relation to cyber safety, cyber bullying, cyber security, and cyber ethics?
3. Why is it necessary for each individual, as a member of the global community, to practice cyber safety, cyber security, and cyber ethics when using existing and emerging technologies?
4. How can you use technology effectively to be prepared to live and work in our complex, information-rich world?
5. How can I use technology to present and publish information through the use of various applications?
6. What was the hardest part about this project?
7. What was your favorite part about this project?
Create an infographic using Easely or Piktochart to tell us what makes a good username and password and how you can practice cyber safety?