Current Content Documents
Meta-Cognitive
Digital Citizenship
- MLD Outline
- Privledges and Responsibilities (DLD) (txt d1) (txt d2)
- Protecting Information (CIA) (txt d2)
- Copyright and File Sharing (txt d1)
Information Literacy
- Navigating the Website (text)(draft ODIN)
- The Information Universe (MLD) (txt d1)
- Effective Searching
- Academic DB (MLD)
- On the Web (DLD)
- Evaluating Sources (DLD) (text d1) (txt d2)
- Academic Integrity (text) (draft ODIN)
Safe/Secure Computing
Tools
- DLD Outline
- Clusters (DLD+)
- File Managment
- File Storage and Sharing
- Andrew Printing (text+) (draft ODIN)
- Bandwidth
- Communication
- SIO
- Blackboard (draft ODIN)
Learning Objective |
Who |
Use electronic resources effectively to support your learning |
Eberly |
Assess your capabilities (in digital citizenship, information literacy, safe computing, and electronic tools) relative to stated objectives |
|
Recognize appropriate study strategies in particular situations |
|
Summarize your privileges and responsibilities as a member of Carnegie Mellon’s computing community. |
Norman |
Predict the impact of specific activities on the confidentiality, integrity and availability of university and personal resources and recommend appropriate actions based on those predictions |
Norman
|
Summarize the aspects of the university copyright policy that relate to common misuses of file sharing |
Norman |
Locate and operate useful tools and resources on the University Libraries website |
Jean |
Distinguish differences in the structure of the web and academic databases, and identify effective ways to use each |
Jean |
Search effectively for information on the web and in academic databases |
Carolyn |
Critically Evaluate Sources |
Carolyn |
Identify reasons, contexts, and formats for appropriately citing sources |
Keri* |
Identify security risks and ways to protect yourself against them (e.g. malware, spyware, viruses, anti-virus, spam practices, checking alerts) |
Wiam |
Appropriately apply tools and security practices to protect personal and university computing assets |
Wiam |
Identify aspects of your online presence that are most susceptible to risk or compromise and characterize appropriate responses to these threats. |
Wiam |
Outline basic steps to administer and maintain your computer? |
NB/April? |
Locate the resources provided by Cluster Services and select appropriate resources in common scenarios |
Connie |
Print to an Andrew print queue from a Cluster machine or personal computer |
Connie |
Demonstrate basic file management principles |
April |
Store and share files using Carnegie Mellon storage resources |
April/Connie |
Summarize appropriate uses of Carnegie Mellon’s wired and wireless networks |
Norm/Randy |
Send and receive information using Carnegie Mellon’s communications tools |
April |
Locate and operate the commonly needed resources provided by Enrollment Services, |
April |
Use Blackboard to complete work for academic courses |
April/Heather |