{"id":2813,"date":"2009-11-06T00:40:02","date_gmt":"2009-11-06T04:40:02","guid":{"rendered":"http:\/\/blog.dearbornschools.org\/farhoua\/?p=2813"},"modified":"2009-11-06T00:40:02","modified_gmt":"2009-11-06T04:40:02","slug":"computer-applications-110609","status":"publish","type":"post","link":"https:\/\/iblog.dearbornschools.org\/farhoud\/2009\/11\/06\/computer-applications-110609\/","title":{"rendered":"Computer Applications &#8211; 11\/06\/09"},"content":{"rendered":"<p><big><strong>I.\u00a0 Bellwork<\/strong><br \/>\nA.\u00a0 Take the Digital Protection and Safety Survey on <a href=\"https:\/\/ilearn.dearbornschools.org\/course\/view.php?id=886&amp;hide=4&amp;sesskey=vhaWERu06Y#section-4\" target=\"_blank\">iLearn<\/a><br \/>\n1.\u00a0 Summarize the class results for the survey.<br \/>\n2.\u00a0 Reply using the blog.<\/big><\/p>\n<p><big><strong>II.\u00a0 Objectives:<\/strong><br \/>\n\u2022\u00a0\u00a0\u00a0 Evaluate personal password security practices.<br \/>\n\u2022\u00a0\u00a0\u00a0 Research and examine the characteristics of strong passwords.<br \/>\n\u2022\u00a0\u00a0\u00a0 Identify sources of security threats to home and public computers.<br \/>\n\u2022\u00a0\u00a0\u00a0 Research strategies to keep personal information safe.<\/big><big><\/big><\/p>\n<p><big><strong>III.\u00a0<span style=\"text-decoration: line-through\"> <\/span>Classwork:<\/strong><br \/>\nA. <\/big><a href=\"https:\/\/ilearn.dearbornschools.org\/course\/view.php?id=886&amp;hide=4&amp;sesskey=vhaWERu06Y#section-4\" target=\"_blank\"><big>Digital Protection and Safety Lesson on iLearn<\/big><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>I.\u00a0 Bellwork A.\u00a0 Take the Digital Protection and Safety Survey on iLearn 1.\u00a0 Summarize the class results for the survey. 2.\u00a0 Reply using the blog. II.\u00a0 Objectives: \u2022\u00a0\u00a0\u00a0 Evaluate personal password security practices. \u2022\u00a0\u00a0\u00a0 Research and examine the characteristics of strong passwords. \u2022\u00a0\u00a0\u00a0 Identify sources of security threats to home and public computers. \u2022\u00a0\u00a0\u00a0 Research [&hellip;]<\/p>\n","protected":false},"author":176,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17],"tags":[],"class_list":["post-2813","post","type-post","status-publish","format-standard","hentry","category-2009f-computer-applications"],"_links":{"self":[{"href":"https:\/\/iblog.dearbornschools.org\/farhoud\/wp-json\/wp\/v2\/posts\/2813","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/iblog.dearbornschools.org\/farhoud\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/iblog.dearbornschools.org\/farhoud\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/iblog.dearbornschools.org\/farhoud\/wp-json\/wp\/v2\/users\/176"}],"replies":[{"embeddable":true,"href":"https:\/\/iblog.dearbornschools.org\/farhoud\/wp-json\/wp\/v2\/comments?post=2813"}],"version-history":[{"count":0,"href":"https:\/\/iblog.dearbornschools.org\/farhoud\/wp-json\/wp\/v2\/posts\/2813\/revisions"}],"wp:attachment":[{"href":"https:\/\/iblog.dearbornschools.org\/farhoud\/wp-json\/wp\/v2\/media?parent=2813"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/iblog.dearbornschools.org\/farhoud\/wp-json\/wp\/v2\/categories?post=2813"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/iblog.dearbornschools.org\/farhoud\/wp-json\/wp\/v2\/tags?post=2813"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}