Explore BrainMass
Share

Technology in class and security

This content was STOLEN from BrainMass.com - View the original, and get the already-completed solution here!

1. Discuss Internet security and how you would use it in your classroom to protect the students from Internet predators and inappropriate material.

2. Explain proper copyright and student use agreements that could be used in any K-12 classroom.

3. Discuss three ethical practices of technology uses and explain their importance in a K-12 classroom.

© BrainMass Inc. brainmass.com October 17, 2018, 4:44 am ad1c9bdddf
https://brainmass.com/education/technology-in-the-classroom/technology-in-class-and-security-476128

Solution Preview

This writer has seen both extremes. After Columbine and other issues in the modern day, schools need to be vigilant about what goes on in and around the school. This educational expert has been in a setting where there were cameras in every classroom and the secretary would call every day and say she saw a neighbor do something to her son and discuss the matter, even during teacher-lead instructional time.

Then there was another school in another state where after exiting a vehicle outside a high school within seconds an unmarked car drove up. An officer came over to discuss a potential violation. It was very invasive.

For a teacher to have the ability to get into a classroom anytime he or she wants to without having to go through a big hassle to get into the building is also critical. After working a long day, having a break and the ability to get back in to do more preparation for the next day is really valuable. Going in on a week end day ...

Solution Summary

Rules, security, internet and technology in schools is discussed.

$2.19
Similar Posting

Request for Proposal (Computer Gaming Technologies)

>> Please see full details for the Case attached as "CaseA Part 2.doc"<<

All answers can be short descriptions.

Page 3 (towards the bottom) shows the assignment -- prepare a proposal in response to the following Request for Proposal that CGT issues to your consulting firm (which is defined on that page). (All figures are were uploaded separately due to size limits)

Use the Proposal Format defined on page 5. For this Request For Proposal you can disregard sections1, 2, and 3. Please submit this in ONE document.

NOTE: Although you need to address each area, you do not need to "write a book". Short descriptions are fine.

For example: In Section I. Estimate of Costs. You assess what you think might be the cost based on the number of rooms and employees and the level of security and your answer could be something like this:
F. Estimate cost. The cost of this project would be around 400k which could be depreciated in next couple year by providing reliable service and less outage.

View Full Posting Details