7. Autumn Term:
Resources:
You will be told what documents to open:
COMPUTING rulesSorry to start with rules but it's important that you understand how they will help you:
We will show respect by… Never indulging in vandalism, hacking, wasting resources and spreading computer viruses. Never deliberately access educationally inappropriate materials or show others how to do so. (e.g.: obscene and pornographic materials, sites promoting hate groups or violence. Etc) Observing and upholding Privacy Laws (No photographing, filming or recording without permission) Observing and upholding copyright laws regarding copies of software, music, media, text or graphics should be followed. Never participating in hate mail, ‘flaming’, harassment, discriminatory remarks and other anti-social behaviour. Remembering that use of another user's login password or allowing another user to use one's login password is strictly prohibited. Remembering that computer gaming is not allowed during school hours, unless the games are part of the teaching programme and the student has been given appropriate authorisation. Accessing and using instant messaging, chat rooms and social networking sites (eg Facebook) is not allowed unless directed to do so by a member of staff. Remembering that all students shall practice courtesy and respect for the rights of other users. Be kind, understanding and polite! Remembering that users of the Holsworthy College’s computer network can and may be monitored and observed by the system administrator and staff. Remembering that questions regarding appropriate use should ask a teacher or the system administrator before accessing materials. Remembering that use of mobile phones is strictly forbidden within school hours unless authorised by a member of teaching or support staff. The use of the Holsworthy Community College’s computer network is a privilege, which may be revoked at any time for abusive conduct as outlined herein, as defined by school discipline policy, or as determined by the staff, system administrator or administration. Should a student user commit any violation, or engage in activities judged by system or school administrators to be inappropriate usage, access privileges may be revoked, school disciplinary action may occur and/or appropriate legal action may be taken. |
Starters / PlenaryAt the start or end of the lesson you will be asked to carry out a short activity, many of these will be found here:
Learning Objectives:
Introduction tasks:
Baseline Assessment 1. Computer Science 2. Information Technology 3. Digital Literacy Main Lessons -
Silver Quizlet: https://quizlet.com/_41t0zf Bronze Quizle thttps://quizlet.com/_41t3ib
...Merry Christmas! |