{"id":17084,"date":"2019-03-19T23:39:05","date_gmt":"2019-03-20T03:39:05","guid":{"rendered":"http:\/\/iblog.dearbornschools.org\/farhoud\/?p=17084"},"modified":"2019-03-20T00:33:21","modified_gmt":"2019-03-20T04:33:21","slug":"accounting-3-20-19","status":"publish","type":"post","link":"https:\/\/iblog.dearbornschools.org\/farhoud\/2019\/03\/19\/accounting-3-20-19\/","title":{"rendered":"Accounting &#8211; 3\/20\/19"},"content":{"rendered":"<p><b>I.\u00a0 \u00a0Bellwork<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Research and Summarize a current event <\/span><span style=\"font-weight: 400;\">news<\/span><span style=\"font-weight: 400;\"> article on a computer virus, spyware, or type of malware. \u00a0Provide the name and explain how it works\/what it does to the computer. 4-6 sentences<\/span><\/p>\n<p><b>II Objectives<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Understand the damaging effects of computer viruses and how to protect one\u2019s computer from them.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Recognize the dangers and consequences of not protecting one\u2019s identity online; recall tips and strategies for preventing identity theft.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Recognize the dangers and consequences of sharing too much personal information on social networks; understand how to set up a secure online profile, including customizing privacy settings and creating strong passwords.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Develop awareness of digital addiction and identify signs and consequences of overusing technology.<\/span><\/li>\n<\/ul>\n<p><b>III. \u00a0Classwork<\/b><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li><b>EverFi Ignition:\u00a0 Module 3: The Viral World<\/b><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I.\u00a0 \u00a0Bellwork Research and Summarize a current event news article on a computer virus, spyware, or type of malware. \u00a0Provide the name and explain how it works\/what it does to the computer. 4-6 sentences II Objectives Understand the damaging effects of computer viruses and how to protect one\u2019s computer from them. Recognize the dangers and [&hellip;]<\/p>\n","protected":false},"author":176,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[92],"tags":[],"class_list":["post-17084","post","type-post","status-publish","format-standard","hentry","category-accounting-w2019"],"_links":{"self":[{"href":"https:\/\/iblog.dearbornschools.org\/farhoud\/wp-json\/wp\/v2\/posts\/17084","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/iblog.dearbornschools.org\/farhoud\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/iblog.dearbornschools.org\/farhoud\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/iblog.dearbornschools.org\/farhoud\/wp-json\/wp\/v2\/users\/176"}],"replies":[{"embeddable":true,"href":"https:\/\/iblog.dearbornschools.org\/farhoud\/wp-json\/wp\/v2\/comments?post=17084"}],"version-history":[{"count":1,"href":"https:\/\/iblog.dearbornschools.org\/farhoud\/wp-json\/wp\/v2\/posts\/17084\/revisions"}],"predecessor-version":[{"id":17085,"href":"https:\/\/iblog.dearbornschools.org\/farhoud\/wp-json\/wp\/v2\/posts\/17084\/revisions\/17085"}],"wp:attachment":[{"href":"https:\/\/iblog.dearbornschools.org\/farhoud\/wp-json\/wp\/v2\/media?parent=17084"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/iblog.dearbornschools.org\/farhoud\/wp-json\/wp\/v2\/categories?post=17084"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/iblog.dearbornschools.org\/farhoud\/wp-json\/wp\/v2\/tags?post=17084"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}