Wednesday, January 16, 2008

Final Business Project - Blocks 1 & 4


The Final Project says:
  • WebLog (Blog)
    • Set up a new Blog to collect feedback, opinions, input, ... from your employees or customers. Use your existing Blogger account. Create an entirely new Blog within your account. Add a link to your new Blog as a comment under the Final Business Project Post of my Blog for your class. (10)
Comment to this Post in the format shown below in my example:
Blog Post URL: http://www.turton-enterprises.blogspot.com
Company Name: Turton Enterprises
Your Code Name: Mr. T.
Blog Post Topic: Improved Employee Efficiency via Sharper Computer Skills

Tuesday, October 23, 2007

Create a Blog and Show Us All - Block 4

Comment to this Post and include:

Name:
First name and last initial
Blog Title: The title or topic of their Blog
Blog URL: the URL or web address of your Blog

BLOG Rubric
On your Blog you will be graded as follows:

  • above info in a comment below (20) - list all 3 things.
  • unique formatting (30) - fits your skill level. Spelling and grammar matter.
  • at least 3 Posts (30) - each should be a different and interesting topic.
  • at least 10 comments from others (20) - you may want to encourage others to visit your blog. It helps to have an interesting title and Posts.
Example:
Name: Mr. Turton
BLOG Topic: Old Computer Applications
URL: http://turtoncompapps.blogspot.com/

  1. After a while visit this site again check the comments with links, and go to someone else's Blog.
  2. Comment to their Post.
  3. Go to the Favorite Blog Post of my Blog and comment to tell us which one is your favorite Blog.

Example:

My favorite Blog is Mr. Turton's for his Engineering Design and Development course. His students share some cool ideas and projects they are working on. The URL is: http://turtonedd.blogspot.com/.

Create a Blog and Show Us All - Block 1

Comment to this Post and include:

Name:
First name and last initial
Blog Title: The title or topic of their Blog
Blog URL: the URL or web address of your Blog

BLOG Rubric
On your Blog you will be graded as follows:

  • above info in a comment below (20) - list all 3 things.
  • unique formatting (30) - fits your skill level. Spelling and grammar matter.
  • at least 3 Posts (30) - each should be a different and interesting topic.
  • at least 10 comments from others (20) - you may want to encourage others to visit your blog. It helps to have an interesting title and Posts.
Example:
Name: Mr. Turton
BLOG Topic: Old Computer Applications
URL: http://turtoncompapps.blogspot.com/

  1. After a while visit this site again check the comments with links, and go to someone else's Blog.
  2. Comment to their Post.
  3. Go to the Favorite Blog Post of my Blog and comment to tell us which one is your favorite Blog.

Example:

My favorite Blog is Mr. Turton's for his Engineering Design and Development course. His students share some cool ideas and projects they are working on. The URL is: http://turtonedd.blogspot.com/.

Friday, October 12, 2007

Internet Dangers - Block 4

The purpose of this post is to advise other students about a specific internet danger that you have researched and are familiar with. For full credit include the types of information shown in the example below. You could even copy and paste the example, then replace my info with your own.
Read the other comments and make your's original.

EXAMPLE
Danger: Criminals use computer technology to obtain large amounts of personal data such as passwords or even banking information.
Prevention: Do NOT respond to "spam" ­ unsolicited E-mail ­ that promises them some benefit but requests identifying data, without realizing that in many cases, the requester has no intention of keeping his promise.
Source: Dept of Justice Website. URL is:
http://www.usdoj.gov/criminal/fraud/idtheft.html#What%20Are%20The%20Most%20Common%20Ways%20To%20Commit%20Identity

Internet Dangers - Block 1

The purpose of this post is to advise other students about a specific internet danger that you have researched and are familiar with. For full credit include the types of information shown in the example below. You could even copy and paste the example, then replace my info with your own.
Read the other comments and make your's original.

EXAMPLE
Danger:
Criminals use computer technology to obtain large amounts of personal data such as passwords or even banking information.
Prevention: Do NOT
respond to "spam" ­ unsolicited E-mail ­ that promises them some benefit but requests identifying data, without realizing that in many cases, the requester has no intention of keeping his promise.
Source: Dept of Justice Website. URL is:
http://www.usdoj.gov/criminal/fraud/idtheft.html#What%20Are%20The%20Most%20Common%20Ways%20To%20Commit%20Identity