{"id":14835,"date":"2017-11-21T01:04:23","date_gmt":"2017-11-21T06:04:23","guid":{"rendered":"http:\/\/iblog.dearbornschools.org\/farhoud\/?p=14835"},"modified":"2017-11-21T01:07:53","modified_gmt":"2017-11-21T06:07:53","slug":"marketing-112117","status":"publish","type":"post","link":"https:\/\/iblog.dearbornschools.org\/farhoud\/2017\/11\/21\/marketing-112117\/","title":{"rendered":"Marketing &#8211; 11\/21\/17"},"content":{"rendered":"<p><strong>I.\u00a0 Bellwork: Q&amp;A<\/strong><\/p>\n<p><strong>Financial Responsibility Sheet:\u00a0 <a href=\"https:\/\/iblog.dearbornschools.org\/farhoud\/wp-content\/uploads\/sites\/151\/2017\/11\/Financial-Responsibility.pdf\">Financial Responsibility<\/a><br \/>\n<\/strong><\/p>\n<ol>\n<li>Why should social security numbers never be given over the telephone?<\/li>\n<li>What are the alternatives to using public Wi-Fi when accessing sensitive information?<\/li>\n<li>What is the appropriate response for receiving an email phishing for personal information?<\/li>\n<\/ol>\n<p><strong>II.\u00a0 Objectives<\/strong><\/p>\n<ul>\n<li>Identify and discuss situations that may cause security risks of personal and financial information and examine ways to avoid these risks.<\/li>\n<li>Interpret financial information and record transactions while monitoring budgetary constraints.<\/li>\n<\/ul>\n<p><strong>III.\u00a0 Turn in Notebooks before you leave<\/strong><\/p>\n<p><strong>IV.\u00a0 <\/strong><strong>Classwork<\/strong><\/p>\n<p>A.\u00a0 H &amp;R Block Budget Challenge<\/p>\n<ul>\n<li>Record payments and deposits<\/li>\n<li>Take Quiz<\/li>\n<\/ul>\n<p>B.\u00a0 Marketing Quiz on iLearn<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I.\u00a0 Bellwork: Q&amp;A Financial Responsibility Sheet:\u00a0 Financial Responsibility Why should social security numbers never be given over the telephone? What are the alternatives to using public Wi-Fi when accessing sensitive information? What is the appropriate response for receiving an email phishing for personal information? II.\u00a0 Objectives Identify and discuss situations that may cause security risks [&hellip;]<\/p>\n","protected":false},"author":176,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[85],"tags":[],"class_list":["post-14835","post","type-post","status-publish","format-standard","hentry","category-mbcc-marketing-1-f2017"],"_links":{"self":[{"href":"https:\/\/iblog.dearbornschools.org\/farhoud\/wp-json\/wp\/v2\/posts\/14835","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/iblog.dearbornschools.org\/farhoud\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/iblog.dearbornschools.org\/farhoud\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/iblog.dearbornschools.org\/farhoud\/wp-json\/wp\/v2\/users\/176"}],"replies":[{"embeddable":true,"href":"https:\/\/iblog.dearbornschools.org\/farhoud\/wp-json\/wp\/v2\/comments?post=14835"}],"version-history":[{"count":0,"href":"https:\/\/iblog.dearbornschools.org\/farhoud\/wp-json\/wp\/v2\/posts\/14835\/revisions"}],"wp:attachment":[{"href":"https:\/\/iblog.dearbornschools.org\/farhoud\/wp-json\/wp\/v2\/media?parent=14835"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/iblog.dearbornschools.org\/farhoud\/wp-json\/wp\/v2\/categories?post=14835"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/iblog.dearbornschools.org\/farhoud\/wp-json\/wp\/v2\/tags?post=14835"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}