1. List your personal understanding, ideas or hunches.
Now that you are familiar with Internet Safety you will write everything you know about Internet Safety. Describe your thoughts or ideas about how to solve the problem. There are not incorrect answers in this step, just feel free to brainstorm your ideas.
2. List what is known.
With your team use all the information available in the scenario to list everything that you know about Internet Safety. You do not have to conduct any research yet. Just use the information given and write the facts that you already know about Internet Safety.
3. List what is unknown.
With your team, make a list about what you do not know and would like to learn. List all the questions you will need to answer to solve the problem.
5. List what needs to be done. "What should we do?" List actions to be taken, e.g., question an expert, conduct research, go to a board meeting about topic. List possible actions.
6. Develop a problem statement.
You will be responsible for thinking and choosing one of the questions to solve the problem. A problem statement should come from your analysis of what you know. In one or two sentences, you should be able to describe what it is that your group is trying to solve, produce, respond to, or find out. The problem statement may have to be revised as new information is discovered and brought to bear on the situation.
7. Gather information
Use all the resources available (Internet, library, etc) to research about Internet Safety and find a solution.
8. Present Findings
You will need to present your findings using a multimedia presentation using a new Web 2.0 tool ex. Prezi, SpicyNode, Slideshare, etc.
|
ยง126.22. Computer Science I
(3) Foundations. The student complies with the laws and examines the issues regarding the use of technology in society. The student is expected to:
(A) discuss copyright laws/issues and model ethical acquisition and use of digital information, citing sources using established methods;
(B) demonstrate proper etiquette and knowledge of acceptable use policies when using networks, especially resources on the Internet and intranet;
(C) investigate measures, such as passwords or virus detection/prevention, to protect computer systems and databases from unauthorized use and tampering; and
(D) discuss the impact of computer programming on the World Wide Web (WWW) community.
|
Comments (0)
You don't have permission to comment on this page.