Course Syllabus

This course is designed to cover key strategies for wealth building as students learn to evaluate businesses for investment opportunities while incorporating current headlines and trends, financial resources, and stock market simulation. Also students will develop techniques to enhance personal wealth building for a secure financial future. Current technology will be used to acquire information and to complete activities. Throughout the course, students are presented ethical dilemmas and problem-solving situations for which they must apply academic, team-building and critical-thinking skills. 

 

SUPPLIES 

3 Ring Binder

Highlighter

 

DAILY ASSIGNMENTS

Daily assignments will be displayed in your Canvas account daily.

 

GRADING 

Students will receive frequent feedback and progress reports (check school website for dates). All assignments are due on the posted due date. Missed assignments should be made up immediately but no later than three (3) days upon return to school after an excused absence.  If you need to speak to the teacher about missed work, please do so after school.

CLASSWORK/NOTEBOOK 25%

QUIZZES/PROJECTS 35%

UNIT TESTS 40%

FINAL 20% of final grade

 

CLASSROOM RULES/EXPECTATIONS

All policies and procedures from the ABSS, Graham High School Student Handbook and classroom rules and expectations will be followed in this classroom.

Be in your seat and ready to work BEFORE the tardy bell rings. The tardy policy will be enforced. If you are tardy for class, please enter quietly, sign in, take your seat and begin work. If you have a pass, I will collect it from you before you leave class. Please do not interrupt teaching and learning.

Take bathroom breaks between classes or during your lunch. We will follow the school policy.

No gum, food or drinks are allowed in this class.

Electronic devices (iPods, cell phones, tablets etc.) are not to be used in this classroom unless it is required for your assigned activity. 

Remain in your seat throughout the class period unless you are instructed to get out of your seat.

There is absolutely no talking when the Mr. Taylor is speaking.

 

CTE Phone Policy

No phones will be allowed in CTE classes.

If a teacher sees a phone they will abide by the following steps:

Step 1 - Give a verbal warning and have the student put the phone or earbuds away.

Step 2 - If the phone or earbuds re-appear during that class time, the phone will be taken  until the end of class and the student will be written up as a minor incident.   

Step 3 – If the student does not comply with the teacher’s directive the administration will be contacted immediately.

Three write ups in one week becomes a Major Incident and will be referred to Ms. Rogers.

 

 

ACCEPTABLE USE OF TECHNOLOGY RESOURCES

Career and Technical Education curricula and 21st Century Skills require students to use many technologies, including the Internet.  All students are expected to know, understand and apply the policy.  Students who violate the school’s Internet policy will be held accountable for their actions and face appropriate consequences deemed necessary in accordance with the school’s policies. 

Students are reminded that they do not have privacy on the ABSS computer system.  The system is monitored and anything that is sent or received may be viewed by employees of ABSS. 

 

LOCAL INTERNET POLICIES

Privileges – The use of the Internet is not a right, but a privilege, and inappropriate or irresponsible use may result in cancellation of that privilege. 

Security – Security is a high priority.  If you should identify a security problem, you must notify an administrator immediately.  Do not show or identify the problem to others.  Do not use another individual’s account.  Attempts to log on as another user will result in cancellation of privileges.  Any user identified as a security risk or having a history of problems with other computer systems may be denied access.

Vandalism – Vandalism may result in cancellation of privileges.  Vandalism is defined as the malicious attempt to harm or destroy the data of another user, the Internet, or other networks.  This includes the creation of, or the uploading of, computer viruses on the Internet or the host site or disruption of data flow.

Course Summary:

Course Summary
Date Details Due