Pick activities to play today.
Learn how to sign out of the computers. Look for white box, white circle and then sign out.
sign out
MITECS
1A-NI-04 Explain what passwords are and why we use them, and use strong passwords to protect devices and information from unauthorized access. Subconcept: Cybersecurity; Practice 7.3
1A-IC-18 Keep login information private, and log off of devices appropriately. Subconcept: Safety Law & Ethics; Practice 7.3
1A-NI-04 Explain what passwords are and why we use them, and use strong passwords to protect devices and information from unauthorized access. Subconcept: Cybersecurity; Practice 7.3
1A-IC-18 Keep login information private, and log off of devices appropriately. Subconcept: Safety Law & Ethics; Practice 7.3