Home
My Puzzles
FAQ
Report bug
Collected Puzzles
User listed puzzles
Random Puzzle
Log In/Out

School Technology and Internet Use Policy

Mr. Lumpkin

Georgia Performance Standard BCS-CA1-1A - Practice respectful and responsible use of technology through abiding by the school technology and Internet use policy.

Messages The electronic communication network should be used in a responsible, _______________, and lawful manner.
Equipment The consequence for the third offense of breaking the school's computer technology policy is ________________ from school for the semester.
Discontinued Unacceptable use includes utilizing any network resource in an ______________ manner or that violates any State or Federal laws, rules, or regulations.
Copyright Students will NOT vandalize ________________ or systems.
Passwords Students will NOT distribute any ______________ on, or cause to infect, any unit or system or down the server.
Vandalize Unacceptable use includes sending anonymous messages or misrepresenting one's __________________ through the data network.
Monetary Students will NOT remove any technology equipment, _________________, or software from the campus.
Unplugging Access to the electronic communication network, as well as the hardware and software that support access, are the property of the _______________ ________________.
Content If the amount of damage to school technology is in excess of $75.00, violation of this policy may be a Level 1 _______________.
Privileges Any authorized use of the electronic communication network or any failure to comply with the local and system-wide provisions relating to the use of the electronic communication network by a student will be grounds for loss of electronic communication network access and/or other ___________________ and/or legal action.
Virus Students may NOT send __________________ on the network.
Menus Examples of vandalizing software offenses include deleting files, zipping files, hiding or moving files, renaming files, changing files, and deleting ___________.
Reputation Unacceptable use of the ECN includes attempting to gain unauthorized access to a computer resource by using another user's name and/or _______________.
Offense Unacceptable use includes accessing, posting, or communicating materials or messages that are harassing, abusive, threatening, obscene, vulgar, or inappropriate in _________________.
Password The consequence for the ____________ offense of breaking the school's computer technology policy is suspension in school or out of school up to five days.
Personal The consequence for the second offense of breaking the school's computer technology policy is suspension from school for __________ days.
SchoolSystem Students may not attempt to break ________________ on individual units or networks.
Year Unacceptable use includes attempting to disrupt ________________, or break into any computer system resource maintained by the Paulding County School System.
Disciplinary Unacceptable use includes supplying _______________ information such as home address, phone number, and full name while accessing the Internet.
Political Unacceptable use includes utilizing any network resource for personal or ___________________ gain.
Icons Student access to the electronic communication network shall be under the ________________ of a teacher or other appropriate staff member.
Peripherals Use of the Paulding County electronic communication network is a privilege that may be __________________ at any time.
Games Unacceptable use includes accessing, posting, or communicating materials or messages that are slanderous harmful to the _________________ of another.
ID Unacceptable use includes attempting to use any software that would cause ________________ or disruption to any network resource maintained by the Paulding County School District.
DOS Examples of vandalizing equipment or systems offenses include, but not limited to, rearranging keys on the keyboard, removing keys on the keyboard, removing mouse balls, ________________ computer cables, marking on computer equipment, and cutting computer cables.
Student Students should never share ID's or ________________ with anyone else.
Expulsion Students may NOT copy any programs, utilities, or ______________ to any computer on campus.
Supervision A ____________________ is responsible for damage done using his/her ID.
Service Students will remain in the _____________ provided.
Five Students are only authorized to use their own _______ or one assigned by a faculty member.
Grade Unacceptable use includes using any network resource in such a way that does not comply with the __________________ objectives of the Paulding County School System.
Security Students will NOT make changes to teacher grade disks or ___________ records using electronic means.
Improper The consequence for the fourth offense of breaking the school's computer technology policy is expulsion from school for the ___________.
Damage Students will NOT ________________ software.
First Unacceptable use includes utilizing any network resources for _______________ lobbying.
Ethical Unacceptable use includes using any network resource when ______________ have been terminated.
Educational Students may NOT access _________________ on-line information, including the utilization of any improper medium, for example (but not limited to) adult material.
Commercial At no time should a student be found at a _________ prompt (C;/ or any other drive letter), unless authorized and supervised by a faculty member.
Identity Unacceptable use includes utilizing any network resources to obtain any software and/or material against _________________ law.
Illegal Unacceptable use includes engaging in any activity while using a network resource that could result in a ________________ charge to the Paulding County School District.

Use the "Printable HTML" button to get a clean page, in either HTML or PDF, that you can use your browser's print button to print. This page won't have buttons or ads, just your puzzle. The PDF format allows the web site to know how large a printer page is, and the fonts are scaled to fill the page. The PDF takes awhile to generate. Don't panic!




Google
 
Web armoredpenguin.com

Copyright information Privacy information Contact us Blog