Tag: Cybersmart

How to Write a Blog Post (Information and Explanation)

Soon you will know how to write a information and explaination report.

Materials:

  • netbook/paper
  • pen/pencil

Steps (information report):

  1. First think a topic.
  2. Write a title, Introduction should tell people what you are telling about in order.
  3. Write three specific detail about the topic in paragraph.
  4. Write why the topic is important.

Steps: (explanation report)

  1. Find a topic that is a technology.
  2. Write an introduction for the topic.
  3. Explain the parts from the topic.
  4. Write a small summary about the topic.

Blog Comment

I learnt about blog comment.

First I needed to write a comment using a greeting, a postive comment, helpful, thoughtful, make a connection, add more information and asking questions.

Next my partner wrote a reply to me replying the question asked which was: have you ever measured something that is 20m?

I enjoyed this because I learnt about blog comment. I did well on greetings, helpful comment, and asking questions.

 

Responsibilities

Kawa of Care is an agreement between students, parents and schools to ensure the best care and responsibility is exercised with Chromebooks.

School login only – Children must log in using their school accounts. It is the only legal Google account they can use.

Guest login – Parents can use the Guest Browser to use netbook.

Monitoring use (including email) – The school monitors student blogs and emails for inappropriate communications including between students.

Responsibilities is taking care of something or someone, Kawa of Care responsibilities are taking care of your netbook.

Kawa of Care

Kawa of Care is an agreement between students, parents and schools to ensure the best care and responsibility is exercised with Chromebooks.

Keep food and drink away from the netbook. Wash and dry hands after eating, before using the netbook.

Work on a hard table with plenty of airflow around the netbook to stop overheating and damage.

Always close the netbook before moving around with it. Always use the netbook case for transporting the netbook.

Kawa of Care helps teachparents and kids to keep our chromebooks safe for learning.

Cybersmart

Minimum age requirement are important because there might be inappropriate content, swear words in games, and hackers. 

There are minimum age restriction because it keeps kids safe from things on the app. Example of apps restriction are: fornite – 7+, tik tok – 13+, and roblox – all ages.

Minimum age restriction are important because people can steal information from you.

Cybersmart

This is how to attribute an image.

  1. Pick a photo
  2. Find the photo licence
  3. Find the owner’s name.
  4. Find the website you used to get the photo.
  5. Link it to the photo.

It is polite to attribute even if the owner says not to.

Cybersmart

I learnt about smart searching.

First we need to search up spider flower and flower spider to see what differences it makes.

Next we search up who and cars with “a” and “the” and took a screenshot. What makes the differences is: the order of words, and small words. What doesn’t makes the differences is: the questions marks, capital and lower case letter, misspelling,

Lastly we answer the question like: Misspell your school’s name in the google search bar. What does google do to your search? Google auto corrects the spelling.

I enjoyed this task because I learnt about smart searching. I did well on searching the differences. I need to improve on taking screenshots.

Keywords

Keywords are important words about a topic. They can be used to search for information about a topic. 

Keywords are words that are important about a topic. An example of a key word is: beast, animal.

Keywords are use to research an important word or phase.

How to Attribute an Image

Soon you will know how to attribute an image.

You will need an image.

  1. Find an image and check if the image is not copyright.
  2. You need to find the image name, author, source, and license.
  3. Connect the image to the image name, author, source, and license.

 

 

 

3 Different Dangerous Situations

There are lots of different dangerous situations. Some were: Cyber bullying, malware, and phishing.

Cyber bullying is bully your peers online. For example: “You are a useless pig, Brooklyn. You smell. I hope you die. I hope you enjoyed your bath in the toilet today. We enjoyed making you get in it.”

Malware is making someone download a solware. For example: You accidentally clicked on an ad for a game you have never seen before.

Phishing is when people send clickbait messages making you join a scam or download dangerous software. For example: “You have won $1 000 000! Click here to get your money.”

These are some of the dangerous situations around the world.