Internet safety and ethical uses of technology in the classroom are vital to a student's academic success. Internet security ensures that the technologies used in the classroom remain operational without problems and protects students from Internet predators. Ethical guidelines ensure fair and appropriate use of technology that does not violate school rules or laws put in place by federal and state governments. There are several reasons why Internet safety is vital to the classroom. The most important reason is to maintain a fully functional operating system free of problems such as slow-running computer programs and hard drive damage caused by computer program viruses. Students often unknowingly download these viruses because every executable file found on the Internet potentially hides a harmful computer virus that can be downloaded onto the classroom computer system. Some viruses come in simple forms that copy themselves to every computer file on the hard drive every time a student uses an infected program, then there are email viruses that are capable of downloading the computer's email address books and messages of unwanted (sometimes unwanted) mass email. -ethical) to all those who appear in these lists, the most devastating virus is known as a Trojan horse which causes the greatest damage because it is capable of deleting files and programs as well as completely erasing the hard disk, and then there are worms which copy themselves to all computer networks they can access slowing down the speed of computer network operations (Brain, 2000). The only way to combat this problem is to run a reputable antivirus program, such as Norton AntiVirus made by Symantec Corporation, which is reliable and can protect the whole… half the paper… irus. HowStuffWorks, Inc. Retrieved September 4, 2011, from: http://computer.howstuffworks.com/virus.htmStarr, L. (2003). Tools for teaching computer ethics. World of education. Retrieved September 4, 2011, from: http://www.educationworld.com/a_tech/tech/tech055.shtmlStop Child Predators. (2010). Press Release: Stop Child Predators supports legislation that limits access to child pornography on government computers. Stop Internet predators. Retrieved September 4, 2011, from: http://www.stopinternetpredators.org/press-release-stop-child-predators-supports-legislation-restricting-access-to-child-pornography-on-government-computers/Tonarely, K . (n.d.). Effective classroom management strategies for technology. eHow. Retrieved September 4, 2011, from: http://www.ehow.com/list_6618516_effective-classroom-management-strategies-technology.html
tags