Charging of Computers Sample Clauses

Charging of Computers. It is the student's responsibility to have their computers charged each day when they come to school. During a normal school day a typical computer fully charged through a normal electrical outlet can be used the entire day for classes with no additional charging required. Students must be responsible and charge their computers before coming to school. If a student comes to class with a computer that is not charged, consequences may occur for the student. • Establish a routine at home for the charging of the computer so that it can charge overnight. The charging time of the computer and responsibility is very similar to the charging of a cell phone. • It is the student's responsibility to maintain the charger. The student/parent will be charged for lost or damaged chargers. It is recommended that students not use the prongs on the charger to wrap the cord, as over time, this has proven to damage the cord.
AutoNDA by SimpleDocs
Charging of Computers. It is the student's responsibility to have their computers charged each day when they come to school. During a normal school day, a typical computer fully charged through a normal electrical outlet can be used the entire day for classes with no additional charging required. Students must be responsible and charge their computers before coming to school. • It may be helpful to establish a routine at home for the charging of the computer so that it can charge overnight. The charging time of the computer and responsibility is very similar to the charging of a cell phone. • It is the student's responsibility to maintain the charger. Therefore the student/parent will be required to replace lost or damaged chargers.
Charging of Computers. It is the student’s responsibility to have their computers charged each day when they come to school. During a normal school day a typical computer fully charged (through a normal electrical outlet) can be used the entire day for classes with no additional charging required. Students must be responsible and charge their computers before coming to school. Establish a routine at home for the charging of the computer so that it can charge overnight. The charging time of the computer and responsibility is very similar to the charging of a cell phone. Only the Technology Department members can download programs to the student computers. All students will be able to personalize their computer through the legal downloading of music from iTunes, ripping CD’s, and other similar methods, although some specific sites such as “limewire” and other music sites will not be accessible to students. In addition, screen savers, wallpaper and other pictures may be placed on the computer. All items must be appropriate and not violate any school policies. Stickers and other markings on the outside of the computer will not be allowed. Each computer and bag is easily identified by a specific numbering system (“Asset Tag”) that is placed on the computer. Students will save all of their schoolwork on the school server or in the cloud through Google, Dropbox, etc. Students are responsible for maintaining their own files. Students will have access to print to the printer in the media center. It is hoped that less material will need to be printed as a result of the opportunities to communicate directly to the teacher by sending assignments and other materials to them through their computer.

Related to Charging of Computers

  • Recording of Conversations Each party (i) consents to the recording of telephone conversations between the trading, marketing and other relevant personnel of the parties in connection with this Agreement or any potential Transaction, (ii) agrees to obtain any necessary consent of, and give any necessary notice of such recording to, its relevant personnel and (iii) agrees, to the extent permitted by applicable law, that recordings may be submitted in evidence in any Proceedings.

  • Computers All computers, hardware, software, computer upgrades and maintenance in connection therewith shall be at Owner's expense.

  • Electronic Record Search The Reporting Estonian Financial Institution must review electronically searchable data maintained by the Reporting Estonian Financial Institution for any of the following U.S. indicia: a) Identification of the Account Holder as a U.S. citizen or resident; b) Unambiguous indication of a U.S. place of birth; c) Current U.S. mailing or residence address (including a U.S. post office box); d) Current U.S. telephone number; e) Standing instructions to transfer funds to an account maintained in the United States; f) Currently effective power of attorney or signatory authority granted to a person with a U.S. address; or g) An “in-care-of” or “hold mail” address that is the sole address the Reporting Estonian Financial Institution has on file for the Account Holder. In the case of a Preexisting Individual Account that is a Lower Value Account, an “in-care-of” address outside the United States or “hold mail” address shall not be treated as U.S. indicia.

  • Message Screening 7.4.4.4.1 BellSouth shall set message screening parameters so as to accept valid messages from CCI local or tandem switching systems destined to any signaling point within BellSouth’s SS7 network where the CCI switching system has a valid signaling relationship. 7.4.4.4.2 BellSouth shall set message screening parameters so as to pass valid messages from CCI local or tandem switching systems destined to any signaling point or network accessed through BellSouth’s SS7 network where the CCI switching system has a valid signaling relationship. 7.4.4.4.3 BellSouth shall set message screening parameters so as to accept and pass/send valid messages destined to and from CCI from any signaling point or network interconnected through BellSouth’s SS7 network where the CCI SCP has a valid signaling relationship.

  • Services and Information for Persons with Limited English Proficiency A. Grantee shall take reasonable steps to provide services and information both orally and in writing, in appropriate languages other than English, to ensure that persons with limited English proficiency are effectively informed and can have meaningful access to programs, benefits and activities. Meaningful access may entail providing language assistance services, including oral interpretation and written translation, if necessary. More information can be found at xxxxx://xxx.xxx.xxx/. B. Grantee shall identify and document on the client records the primary language/dialect of a client who has limited English proficiency and the need for translation or interpretation services and shall not require a client to provide or pay for the services of a translator or interpreter. C. Grantee shall make every effort to avoid use of any persons under the age of 18 or any family member or friend of the client as an interpreter for essential communications with a client with limited English proficiency, unless the client has requested that person and using the person would not compromise the effectiveness of services or violate the client’s confidentiality and the client is advised that a free interpreter is available.

  • Electronic Road Show The Company has made available a Bona Fide Electronic Road Show in compliance with Rule 433(d)(8)(ii) of the Securities Act Regulations such that no filing of any “road show” (as defined in Rule 433(h) of the Securities Act Regulations) is required in connection with the Offering.

  • Line Information Database (LIDB 9.1 BellSouth will store in its Line Information Database (LIDB) records relating to service only in the BellSouth region. The LIDB Storage Agreement is included in this Attachment as Exhibit C. 9.2 BellSouth will provide LIDB Storage upon written request to <<customer_name>>’s Account Manager stating a requested activation date.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Information About You and Your Visits to the Website All information we collect on this Website is subject to our Privacy Policy. By using the Website, you consent to all actions taken by us with respect to your information in compliance with the Privacy Policy.

  • Telephone Monitoring/Recording From time to time we may monitor and/or record telephone calls between you and us to assure the quality of our customer service or as required by applicable law.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!