Computer Access

  • Length: 1682 words (4.8 double-spaced pages)
  • Rating: Excellent
Open Document

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Text Preview

More ↓

Continue reading...

Open Document

Computer Access

My experience with access to computers has been a roller coaster ride this year at school. At the end of the last year’s school year, when I had to face the scary fact that I would be in charge of producing a 240 page yearbook, I knew that I needed to start planning right then and there. Since I knew the adviser I was taking over for had a TTI laptop on loan from the school and would have to give it back, I wrote the principal a note inquiring how I could get my hands on that precious piece of technology. I knew having an instrument that I could carry with me back and forth to school would make the nightmare of being a yearbook adviser a little bit easier, since I knew I would be devoting a lot of time after school to this second job. Excited about this prospect, I felt like I had been literally punched in the stomach when I got a note back that read "Contact Media Services". After contacting Media Services and asking if I could trade in my TTI IMAC for a laptop, I was told that the TTI contracts were for three years and I couldn’t make a "trade". I already had my own desktop computer at home, so the IMAC sat next to my computer, only to go unused. What I waste, I thought to myself. But what could I do? I travel to three different classrooms throughout my school day, so I don’t even have anywhere that I can store the IMAC for easy access. Discouraged, one of my fellow English colleagues offered up her TTI laptop, since she had other "access". Excited, I eagerly accepted. I was instantly able to download Adobe PageMaker 7.0 and all of the other yearbook software I would need.

Pumped, I still needed to follow up on a proposal that was submitted for an $8,000 technology grant for yearbook computers. I contacted the appropriate person to find out that the grant was approved. Once the check was received at school I contacted a Media Services Specialist from the district who happily helped me pick out computers that would get the yearbook job done. I ended up with four Dell desktops, one of which we call the "Mother Ship" because it has a zip drive, the most memory, and some other bells and whistles.

Need Writing Help?

Get feedback on grammar, clarity, concision and logic instantly.

Check your paper »

How to Cite this Page

MLA Citation:
"Computer Access." 23 Jun 2018
Title Length Color Rating  
Computer Access Essay - Computer Access My current situation finds me teaching 7th grade block (language arts and geography) at Beach Middle School in Chelsea, Michigan. Chelsea, as a community, is fairly well-off financially. Technology is a priority for its citizens and for its schools. I am currently typing this on my school-issued laptop that is less than a year old. I am sitting on my couch and my cat is sleeping on my left arm. My classroom contains a brand new PC for my students to use and a new HP DeskJet color printer....   [tags: Technology Personal Narrative Teacher] 1638 words
(4.7 pages)
Strong Essays [preview]
Remote Access Attacks Essay - Introduction Remote access can be clearly defined as one’s ability to gain computer or network access from a remote location. Today many business people who travel often need to have remote access to their corporation's network. There is however vulnerabilities that all types of remote access have common, and it doesn’t matter what method used, the endpoint machine is vulnerable like all other systems that have access to the Internet. Whenever a system is accessible via the internet, that system is exposed to danger....   [tags: Computer, Network Access, Remote Location]
:: 1 Works Cited
1331 words
(3.8 pages)
Strong Essays [preview]
Essay on The Art of Hacking - ... Hackers like the ones in the Target issue, do stuff for malicious reasons. Gray Hacking Another issue that has occurred recently in the world of hackers was not exactly malicious but was seen as so. David Helkowski a white-hat hacker, which is consider the good kind of hackers, worked for Canton Group, a Baltimore-based software consulting firm on a project for the University of Maryland (UMD)( Gallagher, 2014). Mr. Helkowski had found malware in the Universities system but even though he tried to tell them they didn’t really believe him nor did anything about it....   [tags: unauthorized access to computer systems]
:: 8 Works Cited
1008 words
(2.9 pages)
Better Essays [preview]
Essay on The Use of Hacking to Identify Weaknesses in Computer Security - Introduction The use of hacking to identify weaknesses in computer security has become an increasingly controversial issue in recent years. Awareness of this issue is important, because our ever increasing reliance on technology means that breaches in computer security have the potential to have wide-ranging and devastating consequences to society, worldwide. This essay will begin by clearly defining the term ‘hacking’ and will examine the type of people who hack and for what reasons. There will then follow a discussion of the moral argument on hacking before examining a few brief examples....   [tags: hack, unauthorized access, white hats]
:: 10 Works Cited
1406 words
(4 pages)
Powerful Essays [preview]
Essay on Network Policy Server and Remote Access - The nature of our business requires us to have a flexible sales force. Because of that detail we need to be receptive to the needs of our mobile workforce. The most critical tool involved in their success is the ability to reliably connect and access our company networks. These connections can be from employees using company issued laptops or personal computers used from home or on the road. For the most part we have addresses the needs of our sales force on a case by case basis but going forward we really need to ensure we have a defined policy to streamline remote access....   [tags: windows server, network access]
:: 1 Works Cited
1136 words
(3.2 pages)
Strong Essays [preview]
Remote Access: Virtual Private Network Essay - Introduction Micro Widgets, Incorporated is a dynamic organization constantly looking to expand its customer base. To do so, the company utilizes the skills of a mobile sales force. Being mobile, the sales force requires access to the corporate network from time to time while on the road. The Chief Information Officer (CIO) issued a mandate that all employees of the organization have remote access to the corporate network. This enables the sales force to do their job. It also affords the company the ability to offer the benefit of working from home to the employees of the organization....   [tags: micro widgets, access from a distance]
:: 6 Works Cited
1289 words
(3.7 pages)
Strong Essays [preview]
Iceland: Europe’s Highest Computer and Internet Usage Essay - Europe’s highest computer and internet usage takes place in Iceland. According to the World Economic Forum, Iceland has one of the highest rates of social media and internet use in the world. Iceland has some of the newest technology and is a very social country. Digital media and the internet in general is a necessity in Iceland. The Icelandic parliament, in 2010, started a new media enterprise that protects free speech. Their goal was to make Iceland a safe haven for the presses, reporters, journalists and informers....   [tags: social media, internet access]
:: 3 Works Cited
738 words
(2.1 pages)
Good Essays [preview]
History of the Computer Essay - History of the Computer The first devices that resemble modern computers date to the mid-20th century (around 1940 - 1945), although the computer concept and various machines similar to computers existed earlier. Early electronic computers were the size of a large room, consuming as much power as several hundred modern personal computers.[1] Modern computers are based on tiny integrated circuits and are millions to billions of times more capable while occupying a fraction of the space.[2] Today, simple computers may be made small enough to fit into a wristwatch and be powered from a watch battery....   [tags: Technology Innovation Computer History] 1231 words
(3.5 pages)
Strong Essays [preview]
Functioning of a Computer Essay - Input Data is factual information and it needs to be accurately captured in order to be processed. There are many methods to input data and each situation warrants a different method. There can be several different ways to input the information and it can be done in an automatic fashion, as with a computer, or it can be done manually, as with a human writing the information down. For instance, printed questionnaires would best use a special scanning device called an optical data reader that uses optical mark recognition (OMR); when people complete the OMR form using pencils to fill in boxes on OMR paper an optical mark reader (OMR) can convert the pencil marks into digital data....   [tags: Technology Computer Components] 1169 words
(3.3 pages)
Strong Essays [preview]
Essay about Computer Viruses - What is a computer virus. A computer virus is a piece of malicious code that is capable of copying itself and typically has a detrimental effect such as corrupting a system or destroying data. Computer viruses are written with the sole intention of stealing data or crippling a system. The term computer virus is derived from and is in some sense analogous to a biological virus. The word virus itself is Latin for poison. Simplistically, biological viral infections are spread by the virus (a small shell containing genetic material) injecting its contents into a far larger organism’s cell....   [tags: pc, cyberspace, virus, computer system]
:: 6 Works Cited
1715 words
(4.9 pages)
Powerful Essays [preview]

Related Searches

These four computers were placed in an office that adjoined the classroom, which posed other problems I will eventually get to. With the money, I was also able to get a laptop that is strictly for yearbook use. It will never have to be "given back" to anyone.

Oh, one of the most important things that I overlooked was that throughout this whole process I was responsible for meeting my first yearbook deadline of 48 pages by the beginning of November. I had only one computer. So my diligent students slaved away, taking turns typing on one computer. The representative from the publishing company also helped us out a great deal by working on some of the pages on her laptop. Thank goodness for small favors (and the fact that she would do as much as she could to keep the account).

Once the other computers were delivered the process ran a bit smoother. However, as I mentioned earlier, these four yearbook computers were in an adjoining office to the classroom. I had nine returning/experienced students who worked in the office while I trained 18 new students. Boy, was this a challenge. Often we would be interrupted with screams of "MRS. RORABACHER! I NEED YOUR HELP ON THE COMPUTER!" Some of the more "polite" students would just come in and stare at me while I lectured, pleading with their eyes for help. This was a problem that could not easily be solved, nor was it ever solved. One idea I had was to have students "job shadow" one another, however, there wasn’t enough space that would allow for the new students to efficiently job shadow the experienced students while on the computer. Although I trusted these experienced students, I felt uneasy about not having them in plain view, especially after teachers found students throwing things out windows from this area of the of school.

The possibility of moving the computer stations into the classroom didn’t appeal to me either. I was only in this classroom for the first hour of the day. I had visions of students in other hours with crazed expressions on their faces deleting our entire index of names that took days to compile. No, I needed these computers to stay in a locked office, I decided.

Although teaching yearbook has been a full time job in and of itself, I am also expected to teach four other classes, one of which is English Literature, the other three Language Arts. The high school I teach at is 75 years old. Just in the last couple years were they able to open what is known as the Writing Lab, located on the second floor of the Media Center. About 27 computers are available for student use, although you have to sign up in advance and when it comes to the end of the year, teachers have to sign up well in advance. Last year, these computers could be used strictly for word processing. The 15 or so computers on the first floor of the Media Center were available for research. This year, the 27 computers now have internet access, however, the lab is not available every class period because there is not a teacher in position to run the lab every hour. So it’s kind of like a catch-22. We have more technological resources, however, they are not fully accessible because the school is understaffed. Needless to say, I used the Media Center much more last year. Last year, since the computers that had internet access were limited, I chose assignments that could be completed with partners. For example, I had students complete a scavenger hunt where they had to go to different sites to answer questions about Shakespeare. While teaching To Kill a Mockingbird I had students visit different postings where discussions had taken place about issues in the novel. They were required to view these postings and pick a statement that was made that they could respond to. One item that is off limits to student use is e-mail. If they are caught using e-mail they get in quite a bit of trouble I hear.

What I observed when I took students to the Writing Lab is that for the most part they were pretty self-sufficient. It was clear that the majority of students had access to computers at home and felt comfortable using them. In some cases, students showed me a thing or two. On the other hand, there has been the occasional student who did not know how to put a floppy disk in the machine the correct way, which I found pretty surprising. But even today, I must admit that if I sit at a computer that I am unfamiliar with and I have to turn it on, I can’t say with 100 percent certainty that I will have success during my first attempt. I too have had trouble inserting a floppy disk into a Dell machine at school because its strange angle.

What I noticed when students were using the internet was that if a site didn’t pop up after typing in the address, they would immediately call me for help even after I stressed to them and wrote on the paper to double check to see if they had typed in the address correctly. Nine out of ten times that would be the problem. But sometimes the school’s server can be slow and it seems that some of these students are used to quicker access.

What is troubling to me is that the Writing Lab does not seem to be of high priority as far as staffing goes. Sports, especially, football, are what my school is known for and that’s what I see as a high priority. One might call me cynical since I’ve recently been laid off due to budget cuts, but the workout equipment that was recently purchased looks awfully expensive. The workout area looks a lot nicer than the gym that I go to, where I pay a membership fee of $45 a month. Of course in the back of my mind I wonder how much money was spent on these new machines. But then again, one could argue how students need more "access" to workout equipment in order to stay healthy since obesity in children and adolescents is on the rise.

As far as I can see, the computers that the teachers are given seem to be just for grading purposes or word processing. Whatever work is done on these needs to be saved on a floppy so that you can take your work somewhere to print it. Since my classroom for fifth, sixth and seventh hours contains a Macintosh, I haven’t used it once this year because I have nowhere to print any documents that were typed on a Mac. I have a student assistant during seventh hour whom I trust and I’ve debated about letting her record grades on the computer. That debate was solved recently when a teacher I share a room with during second hour shared with me his story of catching a student inflating grades while "helping" to record them on the computer.

Finally, in "Access: The A-Word in Technology Studies", Charles Moran describes the fact that access to computers is really not discussed. I think this is because those that have it take it for granted. Why should the "haves" be concerned for the "have nots"? Only when problems arise do teachers, like myself, begin to really question the accessibility issue and that is unfortunate. Other than that, students are content in their e-mail chat rooms and instant messaging worlds, probably without a thought in the world of the technologically deprived.

Return to