Educators' Guide Intel Security Digital Safety Program: Think Before You Link Module 1: Cybersafety

Size: px
Start display at page:

Download "Educators' Guide Intel Security Digital Safety Program: Think Before You Link Module 1: Cybersafety"

Transcription

1 Educators' Guide Intel Security Digital Safety Program: Think Before You Link Module 1: Cybersafety The Intel Security Digital Safety Program: Think Before You Link is an interactive digital-safety program designed to help students learn how to be safe and responsible online. The first year of the program will present three self-paced interactive modules geared towards students in grades 3-5. The modules focus on the following topics: I. Cybersafety: Protect Yourself II. Cybersecurity: Protect Your Stuff III. Cyberethics: Protect Your Reputation Complementary parent modules provide advice and tips for developing online safety practices at home. Each module also includes an educators guide that supports teachers and media specialists with practical information and ideas for presenting the material in a school setting. Each student interactive module is designed to take approximately 15 minutes to complete.

2 Overview The first module in the Intel Security Digital Safety Program focuses on cybersafety. It is taught as a self-paced module with interactive features that enhance the experience for visual, auditory, and kinesthetic learners. The content is divided into three topics: 1. Protect Your Personal Information 2. Stranger Danger 3. Settings and Privacy Students can view the module using a web browser on a workstation, laptop, or tablet computer. Content is presented as screens that the student navigates using the intuitive interface. Interactive animated text and graphics are included throughout. The text animations and graphics are accompanied by audio narration that reinforces the lesson and supports learners at different reading levels. At the end of each section, students complete engaging formative assessments to reinforce what they have learned. At the end of the entire module, they complete a summative assessment that includes a series of multiple-choice questions. Students can then download a Certificate of Completion, go on to other modules in the Think Before You Link series, or explore related links on the program website. Instant Expert The online world has changed all our lives, especially our children s. Being online offers opportunities for children to learn and connect with others. Unfortunately, it also opens up potential risks of sharing the wrong information or connecting with the wrong people. For young people, it also opens up potential risks to their digital reputations. We all have an opportunity and a responsibility to help children navigate this online world safely and responsibly. The first module of the Intel Security Digital Safety Program concentrates on helping students learn to keep themselves safe online. The module is divided into three topics.

3 Personal Information The first topic of the module teaches students what personal information is and why they should not share it with people they do not know. While most people on the Internet are who they say they are, children learn that there are some cybercriminals who want to steal their personal information to get access to bank accounts, steal their identity, put harmful malware on their computers, send cyberbullying messages from their accounts, or even do harm to them personally. Students learn that they should never reveal their age, their home or school addresses, where or when their parents or guardians work, their phone number, or any passwords for computers or websites they use. They learn to ask themselves the 3 W s before sending personal information. Students should also know how to avoid or disable software that could reveal their location and, when in doubt, to always ask an adult whom they trust. Stranger Danger Students may instinctively understand that it is dangerous to talk to a stranger in a public place but, because online situations may feel less threatening and more anonymous, students could be more apt to interact with strangers. The second topic guides students to any online communication with strangers. They learn that some people are not who or what they say they are online. To avoid stranger danger, students learn to ignore any communications from those they do not know, and to report messages that make them uncomfortable to a parent or other trusted adult. In addition to telling a trusted adult about messages from strangers, students also learn to save those messages in case they are needed to find or prosecute the sender. Privacy and Settings The final topic of the module shows students how to use the privacy features of their computers and the websites they visit to make their online lives safer. Students learn to enable the highest level of privacy settings in the preferences of social and gaming websites they visit only allowing communication from those they know and trust. Students should also know that websites may share some of their private information without their knowledge if they do not have these settings in place. Students should learn to set preferences for websites, their devices, and any software they use to reveal as little as possible about themselves.

4 Though the Internet provides a wonderful academic, entertainment, and social resource for young people, it can potentially leave them open to dangers like information theft, predators, malware, and the potential for over-sharing of personal data.

5 Getting Started Objectives Students will learn: that the Internet is a great place to learn and share information but that it s important to stay safe. that they have to follow certain rules to keep them safe online. that they must never share personal information online with anyone they do not know. how to handle situations or online behavior that may make them feel uncomfortable. why we have passwords and how to develop a strong one. why it s important to create privacy settings. strategies for keeping themselves safe while online. Materials To help students navigate the module, you will need: a computer or other device with Internet access and web browser. a projection device to display the web page. copies of the downloadable Certificate of Completion. Procedure This module is designed to be used by individual students in a self-paced setting or, if technology is limited, in a one-to-many environment. If using the module as a presentation in a one-to-many environment, the instructor can use the navigation features of the module to present the content to students and to set the pace of the lesson. By eliciting group responses, the instructor can facilitate interactive learning about students experiences and ideas, and initiate small group discussions. In an ideal setting, the instructor will be able to easily control the Internet browser used to display the module while also interacting with the students. In the slide-by-slide procedure below, suggested modifications for instructors making a classroom presentation are given. If students are individually navigating the course, the instructor can find extensions and suggestions for follow-up after the Procedure section.

6 Screen 1 Introduction: This screen introduces the title of the course. Tell students this is an online course that they can review on their own after the presentation. Connect to the website at Ask students to share different ways that they use online tools, apps, and games. Reinforce that the Internet is a great tool but that it s always important to be safe and responsible online. Ask students what they think it means to be safe and responsible online and why this is so important. Record responses to be used later as a review after completing this segment. Continue to Screen 2. Screen 2 Overview: This screen shows students the three main sections covered in the program cybersafety, cybersecurity, cyberethics.

7 Follow the on-screen prompts, and allow your students time to view the text and listen to the audio content as the screen opens. Point out to students that this lesson will help them avoid the dangers they learned about in Screen 1. Review the list of student responses, and identify the ones they will learn more about in this module (protecting personal information; avoiding strangers; using privacy settings). Emphasize that today we are going to focus on rules they can follow to keep themselves safe while they are online. Continue to Screen 3. Screen 3 Gallery: This screen presents students with a real-life scenario in the form of a click-through gallery. In the scenario, a peer named Chris makes several mistakes related to his cybersafety. Ask the students how many play online games and if those games have chat features that allow them to talk with other players. Poll students to see how many use those features. Encourage them to share their experiences and make note of them for use later. Follow the prompts to navigate through the gallery. In the course of the scenario, Chris divulges personal information that could put him at risk. You may want to walk through the gallery several times asking the students to think about Chris s actions and why they open him up to potential dangers. As they click through the gallery, they will learn the answers. Continue to Screen 4.

8 Screen 4 Protecting Personal Information: This screen teaches students basic information about what personal information is and why they should not reveal it online. Have students choose one of the topics in the column on the left. Navigate through the interactive text until they have seen information about each topic. The flyout information for the five topics can be done in any order. What is personal information? o Ask students What is personal information? o Expand the screen and ask the students to look at the list. Discuss any items they did not include in their lists. Invite them to add the missing items to their list for review later. Ask students to summarize what would make certain information personal? Ask, Why is it important to protect personal information? Review the reasons listed in the interactive text and audio. Why protect personal information? o Ask students, Why should you protect your personal information? o Invite student responses. Then, expand the screen and read each reason aloud. o You may need to explain what a cyber criminal is. Share or invite examples from the students for each of the bulleted answers. This is an important screen on which to focus because students may not realize what a cyber criminal could do with their personal information and how it could be harmful to them, their family, or their devices.

9 Ask yourself the 3 W s. o Ask students to predict what three questions they might want to ask themselves before sharing personal information online. Share the hint that all three start with the letter W! o Review the three questions listed on the screen, and ask students if they ask themselves these questions before sharing their own personal information. If unsure, ask a trusted adult. o Ask students what adults they could potentially ask if they are unsure about whether or not to share personal information. Encourage them to create a list of adults they trust. The list could include parents, grandparents, guardians, teachers, and media specialists. Limit the information you share. o Remind students that only people they know and trust should be allowed to know their personal information. When the students have viewed all five topics, ask them what Chris could have done differently during his online game to help keep himself safe. If necessary, use the left arrow to navigate back to the gallery viewing on screen 3 and have students point out the errors that Chris made. Before beginning the next screen, let students know they will be applying what they learned in the next few screens. Ask them if they have any questions before moving on. Continue to Screen 5. Screen 5 Formative Assessment: Protecting Personal Information: This screen provides the students with a formative assessment related to what they ve learned. Students are presented with a series of situations and are asked to choose what they would do in response to each.

10 As each of the three items in the quiz appears, poll your students or ask a student to select the correct answer. Allow students to hear the feedback for their answer. For each example, try to elicit an explanation of why the answer was right or wrong. Example 1: Correct answer: Show your parents. Example 2: Chat Correct answer: Don't reply to the chat. Example 3: Passwords Correct answer: Don't share your password. Screen 6 Introducing Stranger Danger: This screen introduces students to the topic of stranger danger, the idea that communicating with any strangers online opens them up to potential risks. Ask students if they would start a conversation with a stranger at a park or bus stop, or speak to a stranger when their parents were not around. Ask, Why not? Reinforce why it can be potentially dangerous to talk with people they do not know. Ask students how they think these dangers translate online. Allow the students to explore each of the cards on the screen and read the information listed under each one. Before the students have viewed the topics, ask them what they think each means. Have them share how they think these relate to being safe online.

11 The cards will flip over upon click, revealing additional information for each topic. They can be viewed in any order. Invite students to share their experiences as they reveal each one. Screen 7 Formative Assessment: Stranger Danger: This screen invites students to apply what they ve learned about Stranger Danger. They view several imaginary s and complete a drag-and-drop interactions to determine if they believe the message is from a friend or a stranger. Explain to the students that they will be asked to choose whether the online message is from a stranger or a friend. As you introduce each example, poll students on their answers. Drag the appropriate tag to the drop area to see if it is correct. For each example, elicit an explanation from the students as to why the answer was either right or wrong. Example 1: Post to your social media account o Correct Answer: Stranger. (Certainly, this could also be from a friend, but the takeaway should be that just because someone says they are the student s age, it doesn t mean that they are.) Example 2: An instant message o Correct Answer: Stranger. Example 3: An o Correct Answer: Friend. (In this case, it is a relative.) Ask students if they have any questions. Review the three parts of protecting yourself from online strangers. o You don t always know who is online. o You should never talk to unknown people online. o Block strangers who do contact you.

12 Screen 8 Introduction to Profiles and Settings: This screen introduces students to the final topic: profiles and settings. Throughout this topic, students are reminded of the importance of using privacy settings and passwords to help protect them from potential online risks. Ask students if they have ever had to adjust any of the settings for their computers or the websites they visit. Ask, Why does the [website/computer] have these settings? Elicit the idea that computer settings help users personalize their online experience and can be used for protection. Remind students that their parents/caregivers can help them set up their computers to help keep them safe online. Have students read the three topic sections. Ask them to share how they think these topics are related to keeping them safe online. Use highest privacy settings o Ask, What does the word privacy mean? Why would privacy be important online? Discuss how they can use the computer settings to help keep their personal information private. Limit sharing information o Ask students if they know what GPS is or if they have ever used a program that can provide a map for directions. Ask them how the device knows where they are. Explain that this feature can be beneficial for some purposes but it could also be used by a stranger to know where they are. Ask, Why could be this unsafe? o Remind them they should not share where they are or where they live with anyone online and they should make sure that any location or geolocation setting is turned off.

13 Use screen names o To protect yourself online, it is always better to use made-up names. Remind students that screen names should NOT include the following information: full name, age, gender, or address. o Invite students to share ideas on how to create a safe screen name. During the discussion, remind them to NOT share their actual screen names. Some ideas might include using a movie or storybook characters, their favorite colors or foods, made-up nonsense names, etc. Let students know they will apply what they have just learned in the next section by making selections on a drop-down menu for an imaginary gaming profile page. Screen 9 Formative Assessment on Profiles and Settings: This screen allows students to apply what they have learned about profiles and settings by choosing the actual settings for an imaginary gaming site profile. Poll students about their answers for each scenario as they make their selections. Invite students to justify their answers. The feedback is designed to provide positive feedback for 5 of 7 responses. If students get fewer than 5 correct, encourage them to try again. Which name do I use? (Screen Name/Real Name) Show my scores? (Yes/No) Who can see my posts? (Anyone/Friends Only) Who can send me messages? (Anyone/Friends Only) Who can ask me to play a game? (Anyone/Friends Only) Who can send me ? (Anyone/Friends Only/No One) Who can get my phone number? (Anyone/Friends Only/No One)

14 Screen 10 Review: This screen reviews the lesson on cybersafety. Students both hear and see the key points of the lesson in the review. Before beginning the review, invite students to summarize what they have learned. Then go through each of the review screens to reinforce the important concepts. Screen 11 Assessment: This screen concludes the content presentation. The students will now take a brief summative assessment to check their understanding of the lesson on cybersafety. Before students do the final assessment, review any questions they may have. Remind them that being on the Internet is fun! They can connect with people through , games, apps, and websites. But it s really important that, when they re on the Internet, they stop and think before they link. It s also important to follow rules that keep them safe and their personal information protected.

15 Poll the students, or ask individual students to answer each question. After each item, click the button to continue. Once the online assessment is completed, students will be able to print out a Certificate of Completion. If students get any answers incorrect, encourage them to review the previous pages. Screen 12 Recognition: This screen allows students to print a certificate that recognizes that they have completed this module of the Intel Security Digital Safety Program: Think Before You Link. Congratulate students on all they have learned about keeping themselves safe online! Have copies of the certificate ready to distribute to the class. You many want to sign them before distributing. Students can write their name directly on the print copy. Screen 13 Closing Title: This screen ends the module and thanks the students for taking the course. The screen has links for students to visit the Intel Security Digital Safety Program website for additional information.

16 Remind the children that the most important part of today's lesson is to be sure to discuss what they have learned with a trusted adult, and to be sure to tell a trusted adult if they are ever uncomfortable with any online communication. Extensions In addition to this module on Internet safety, remind students that there are two additional modules that cover Internet security (protect your stuff) and Internet ethics (protect your reputation).

17 Curriculum Connections The Intel Digital Security Program: Think Before You Link content can easily connect to several curricular areas. Below are a few activity ideas to help teachers and media specialists integrate the content into English Language Arts, Reading, and Technology lessons. My Point Is Ask students to explain the difference between facts and opinions. Invite them to identify three facts and three opinions related to cybersafety. They can use information from the module as well as additional resources. Invite students to pair up and share the facts and opinions they ve identified, and invite each pair to present examples to the class. Explain to students that opinions can be supported by facts. Select one of the opinions that students presented, and brainstorm the types of facts that could help to support it. Challenge students to develop and record an opinion (or point of view) related to a topic that they learned about in the module. Then, challenge them to identify at least three reasons, based on information and facts, that support their points of view. These reasons can come from the module as well as additional research. Invite younger students to develop a paragraph that includes their opinion/point of view and the supporting information. Older or more advanced students can be challenged to organize their points of view and supporting reasons/evidence in the form of a letter to another student or family member. Their letter should clearly state their opinion and the organizational structure of the letter should support their opinion with facts, information, and details. Decisions Decisions! The cybersafety module has been designed to include authentic situations that students in grades 3-5 could face related to cybersafety. Talk with students about the situations presented in the module, and ask two or three volunteers to share examples of real-life situations they have faced related to personal information, stranger danger, or profiles and settings. If comfortable, invite students to share what they did to resolve the situation and what, if anything, they might do differently after going through the module. After reviewing a few examples, ask students to draw conclusions about how we can all learn from real-life decisions.

18 Remind students that being online opens us up to many different situations where we are faced with important decisions. We can all learn from the decisions we make, even if we would do things differently next time. Challenge students to write a story about a difficult decision they have had to make related to cybersafety. If they cannot think of an example, invite them to create an imaginary situation based on something that could happen in real life. Their story should explain what they were doing when faced with the decision, what led up to the decision, what decision they made and why, and what happened as a result of their decision. They can also include anything they learned along the way. Encourage students to include vivid descriptions of their actions, thoughts, and feelings during and after the decision they faced. Teach Me How! In the third section of the module, students learn tips and strategies for creating profiles and settings to help them stay safe online. Ask students to summarize what they learned in the module. Then, ask students to imagine that they have been asked by a game, website or app developer to create a list of written instructions that would clearly explain to users their age how to set their profiles and settings for the highest level of privacy. Ask student pairs to select a real website, game, or application they frequently visit. Challenge them to create a list of step-by-step instructions that would help a new user learn to create his or her profile or settings using tips they learned from the module. Their instructions should be clear and detailed. If helpful, they can also include illustrations as part of their instructions. Once students are finished with their instructions, invite them to switch papers with a partner. Each partner should read the instructions and, if possible, apply them on the actual site. If access is not available, invite students to determine if their partner s instructions are clear and if they would be able to follow them. If applicable, invite students to revise their list of instructions, based on partner feedback. This activity can be extended by inviting students to create a class book of all sets of instructions that can be reproduced and sent home.

19 Blog It! Creating a class blog is a great way to improve students writing skills, celebrate their voices, introduce them to online publishing, promote collaboration, and share information within the class and to those at home. It s also a great way for them to share and reflect upon their experiences, learnings, and ideas related to online safety and digital responsibility. Talk with students about what a blog is, and how they could create a class blog related to digital responsibility. Discuss rules and guidelines for the blog and some cybersafety topics that they would like to address. Visit several different blogs as a class, and identify what you like about each one. Choose a blogging site, and create a name for your class blog! Then, sign up, log in, and begin blogging! You may want to review with students important writing tips for effective blogging. These include considering the audience, grabbing the reader s attention, organizing and writing the content, and delivering a strong ending. Spread the Word Cybersafety and digital responsibility impact everyone! Now that your students have completed this module, they have important information and knowledge that they can share with others in the school and community, and even those at home. Invite student groups to create a multimedia presentation that educates others in the school or community about important information, strategies, and tips they have learned about cybersafety. They can include online slides, videos, photographs, audio, and even animations! Their presentation could also include school-wide announcements that summarize what they ve learned. Additional Resources Think Before You Link Cable Impacts Foundation InCtrl Program Common Sense Media: Privacy and Internet Safety Connect Safely Kids.Gov Online Safety (Grades K-5) McAfee Online Safety for Kids vacy-and-internet-safety bered/

20 McAfee Digital Deception Study 2013: Exploring the Online Disconnect between Parents and Pre-teens, Teens and Young Adults: National Cyber Security Alliance NetSmartz Workshop from the Center for Missing and Exploited Children orts/rp-digital-deception-survey.pdf

21 Education Standards Materials and Resources are designed to align to the following education standards: Common Core State Standards English Language Arts Reading (Anchor Standards) A.R.2 Determine central ideas or themes of a text and analyze their development; summarize the key supporting details and ideas. A.R.4 Interpret words and phrases as they are used in a text, including determining technical, connotative, and figurative meanings, and analyze how specific word choices shape meaning or tone. A.R.7 Integrate and evaluate content presented in diverse media and formats, including visually and quantitatively, as well as in words. Writing (Anchor Standards) A.W.1 Write arguments to support claims in an analysis of substantive topics or texts using valid reasoning and relevant and sufficient evidence. A.W.2 Write informative/explanatory texts to examine and convey complex ideas and information clearly and accurately through the effective selection, organization, and analysis of content. A.W.3 Write narratives to develop real or imagined experiences or events using effective technique, well-chosen details and well-structured event sequences. A.W.7 Conduct short as well as more sustained research projects based on focused questions, demonstrating understanding of the subject under investigation. A.W.8 Gather relevant information from multiple print and digital sources, assess the credibility and accuracy of each source, and integrate the information while avoiding plagiarism. Speaking and Listening (Anchor Standards) A.SL.2 Integrate and evaluate information presented in diverse media and formats, including visually, quantitatively, and orally.

22 ISTE Standards for Students Standard 3: Research and information fluency: Students apply digital tools to gather, evaluate and use information. Standard 4: Critical thinking, problem solving, and decision making: Students use critical thinking skills to plan and conduct research, manage projects, solve problems, and make informed decisions using appropriate digital tools and resources. Standard 5: Digital citizenship: Students understand human, cultural, and societal issues related to technology and practice legal and ethical behavior. American Association of School Librarians: Standards for the 21st Century Learner 1. Inquire, think critically, and gain knowledge : Follow an inquiry-based process in seeking knowledge in curricular subjects, and make the real-world connection for using this process in their own life : Evaluate information found in selected sources on the basis of accuracy, validity, appropriateness for needs, importance, and social and cultural context : Read, view, and listen for information presented in any format (e.g., textual, visual, media, digital) in order to make inferences and gather meaning :Make sense of information gathered from diverse sources by identifying misconceptions, main and supporting ideas, conflicting information, and point of view or bias : Respect copyright/intellectual property rights of creators and producers : Follow ethical and legal guidelines in gathering and using information : Use information technology responsibly. 2. Draw conclusions, make informed decisions, apply knowledge to new situations, and create new knowledge : Use strategies to draw conclusions from information and apply knowledge to curricular areas, real-world situation, and further investigation : Use technology and other information tools to analyze and organize information : Connect understanding to the real world : Use valid information and reasoned conclusions to make ethical decisions : Determine how to act on information (accept, reject, modify). 3. Share knowledge and participate ethically and productively as members of our democratic society.

23 3.1.2: Participate and collaborate as members of a social and intellectual network of learners : Use information and technology ethically and responsibly : Respect the principles of intellectual freedom. 4. Pursue personal and aesthetic growth : Recognize that resources are created for a variety of purposes : Practice safe and ethical behaviors in personal electronic communication and interactions.

EADS up. stop think connect

EADS up. stop think connect EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,

More information

Private Today, Public Tomorrow

Private Today, Public Tomorrow Estimated time: 45 minutes Essential Question: How can you respect the privacy of others online? Learning Overview and Objectives Overview: Students reflect on their responsibility to protect the privacy

More information

HEADS up. stop think connect

HEADS up. stop think connect HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more

More information

Integrating the Common Core Standards into the Music Curriculum

Integrating the Common Core Standards into the Music Curriculum Place Photo Here, Otherwise Delete Box Integrating the Common Core Standards into the Music Curriculum Tom L. Foust January 24 th, 2013 Illinois Music Educators Conference Peoria, Illinois What is the

More information

STOP. THINK. CONNECT. Online Safety Quiz

STOP. THINK. CONNECT. Online Safety Quiz STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.

More information

National Cybersecurity Awareness Campaign. Kids Presentation

National Cybersecurity Awareness Campaign. Kids Presentation National Cybersecurity Awareness Campaign Kids Presentation About Stop.Think.Connect. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help

More information

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY: FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful

More information

STRATEGIC PLAN. For implementing safety training within communities of Symantec employees. All Rights Reserved

STRATEGIC PLAN. For implementing safety training within communities of Symantec employees. All Rights Reserved STRATEGIC PLAN For implementing safety training within communities of Symantec employees Executive Summary Identifying additional ways to reach and teach consumers about online safety, security, privacy

More information

Internet Safety/CIPA Lesson Plan

Internet Safety/CIPA Lesson Plan Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,

More information

2 nd - Watch My Online Neighborhood Video: https://www.commonsensemedia.org/videos/my- online- neighborhood

2 nd - Watch My Online Neighborhood Video: https://www.commonsensemedia.org/videos/my- online- neighborhood K- Going Places Safely Essential Question: How do I go places safely on the computer? Students will: discover the Internet can be used to visit far- away places and learn new things; compare how staying

More information

Private Today, Public Tomorrow

Private Today, Public Tomorrow Estimated time: 40 minutes Essential Question: How can you respect the privacy of others online? Learning Overview and Objectives Overview: Students reflect on their responsibility to protect the privacy

More information

Guideline on Windows 7 Parental Controls

Guideline on Windows 7 Parental Controls CMSGu2012-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Windows 7 Parental Controls National Computer Board Mauritius

More information

School-Based Health Education Standards:

School-Based Health Education Standards: School-Based Health Education Standards: Accessing Valid Health Information (A.V.I.) Interpersonal Communication (I.C.) California Healthy Kids Resource Center (C.H.K.R.C.) Hello. This is the third module

More information

Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability

Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability The i-safe comprehensive curriculum provides a unique approach to Internet safety education, by meaningfully integrating

More information

DIGITAL WELLNESS ONLINE CHALLENGE

DIGITAL WELLNESS ONLINE CHALLENGE DIGITAL WELLNESS ONLINE CHALLENGE 1 st July - 8 th July 2015 Information Manual With Support From Table of Contents Introduction 1 Objectives of the Digital Wellness Online Challenge 2 Brief Overview 3

More information

YOUR PRESENTERS TODAY S WORLD. Maryly Skallos Technology Coordinator St. Thomas the Apostle School mskallos@stthomasgr.org

YOUR PRESENTERS TODAY S WORLD. Maryly Skallos Technology Coordinator St. Thomas the Apostle School mskallos@stthomasgr.org CYBER SAFETY, CYBER ETHICS, CYBER SECURITY How to teach the kids about these concepts (a primer from staysafeonline.org program that is available free from the website) YOUR PRESENTERS Maryly Skallos Technology

More information

Upper primary unit. Don t be fooled. www.cybersmart.gov.au

Upper primary unit. Don t be fooled. www.cybersmart.gov.au www.cybersmart.gov.au Creative Commons These teaching resources on the Cybersmart website s Schools Gateway are now available to schools under Creative Commons licences. The new licensing conditions are

More information

How to take an ITI Course

How to take an ITI Course How to take an ITI Course To take an ITI Course you must have a subscription to ITI Courses. Go to www.iticourses.com home page. International Training Institute 2009 www.iticourses.com 1 Log into your

More information

Overexposed: Sexting and Relationships & Private Today, Public Tomorrow Grades 9-12

Overexposed: Sexting and Relationships & Private Today, Public Tomorrow Grades 9-12 Overexposed: Sexting and Relationships & Private Today, Public Tomorrow Grades 9-12 Essential Question: What are the risks and responsibilities when you share online in a relationship? How can you respect

More information

INTERNET SAFETY AND RESPONSIBILITY PERSONAL SAFETY & PREDATOR AWARENESS UNIT

INTERNET SAFETY AND RESPONSIBILITY PERSONAL SAFETY & PREDATOR AWARENESS UNIT INTERNET SAFETY AND RESPONSIBILITY PERSONAL SAFETY & PREDATOR AWARENESS UNIT 1. Introduction and essential information 2. Required lesson 3. Optional lessons and activities 4. Additional resources 5. Standards

More information

Steps to Successful Student Book Review Blogging

Steps to Successful Student Book Review Blogging Steps to Successful Student Book Review Blogging Abstract: In order to promote independent reading and scaffold the language arts curriculum, students write and post book recommendations on their school-based

More information

Teacher's Guide to Meeting the Common Core State Standards* with Scott Foresman Reading Street 2008

Teacher's Guide to Meeting the Common Core State Standards* with Scott Foresman Reading Street 2008 Implementing the Common Core State StandArds Teacher's Guide to Meeting the Common Core State Standards* with Scott Foresman Reading Street 2008 Table of Contents Grade 5 Introduction................................................

More information

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Gordon Cooper Technology Center 2012 From http://onguardonline.gov/ Think Before You Share What you post could have a bigger

More information

E/LA Common Core Standards for Writing Grade 5

E/LA Common Core Standards for Writing Grade 5 Text Type and Purposes Anchor Standards 1. Write arguments to support claims in an analysis of substantive topics or texts, using valid reasoning and relevant and sufficient evidence. 2. Write informative/explanatory

More information

Crosswalk of the Common Core Standards and the Standards for the 21st-Century Learner Writing Standards

Crosswalk of the Common Core Standards and the Standards for the 21st-Century Learner Writing Standards Crosswalk of the Common Core Standards and the Standards for the 21st-Century Learner Writing Standards AASL Standards 1. Inquire, think critically, and gain knowledge. 1.1 Skills 1.1.1 Follow an inquiry-based

More information

BC s Digital Literacy Framework (DRAFT)

BC s Digital Literacy Framework (DRAFT) BC s Digital Literacy Framework (DRAFT) Using standards-based techniques, a collaborative teaching environment enriched through creative integration of technology tools takes learning beyond standardized

More information

professional development Training Guide

professional development Training Guide professional development Training Guide u Webinar and training Information u Guided Tour u How To Tips Welcome! Your school now has unlimited access to the award-winning Britannica Online School Edition.

More information

The State of K-12 Cyberethics, Cybersafety and Cybersecurity Curriculum in the United States

The State of K-12 Cyberethics, Cybersafety and Cybersecurity Curriculum in the United States The State of K-12 Cyberethics, Cybersafety and Cybersecurity Curriculum in the United States National Cyber Security Alliance Microsoft Corporation Zogby/463 May 2011 Methodology Zogby/463 surveyed a statistically

More information

Best Practices for Teaching and Presenting Live Virtual Classes and Meetings

Best Practices for Teaching and Presenting Live Virtual Classes and Meetings Best Practices for Teaching and Presenting Live Virtual Classes and Meetings We have compiled a series of best practices for teaching and presenting live virtual classes and meetings drawn from the experiences

More information

National Cybersecurity Awareness Campaign Families Presentation

National Cybersecurity Awareness Campaign Families Presentation National Cybersecurity Awareness Campaign Families Presentation About Stop.Think.Connect. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department of Homeland Security

More information

ONLINE SAFETY TEACHER S GUIDE:

ONLINE SAFETY TEACHER S GUIDE: TEACHER S GUIDE: ONLINE SAFETY LEARNING OBJECTIVES Students will learn how to use the Internet safely and effectively. Students will understand that people online are not always who they say they are.

More information

Activities for Protecting Your Identity and Computer for Middle and High School Students

Activities for Protecting Your Identity and Computer for Middle and High School Students Activities for Protecting Your Identity and Computer for Middle and High School Students Overview There are three posters about protecting your computer for this grade span. We recommend that these be

More information

Leading Adobe Connect meetings

Leading Adobe Connect meetings Leading Adobe Connect meetings You have created a meeting room, scheduled an online class or meeting, invited participants, and prepared the room for the day of class by testing your computer system and

More information

Modifying Curriculum and Instruction

Modifying Curriculum and Instruction Modifying Curriculum and Instruction Purpose of Modification: The purpose of modification is to enable an individual to compensate for intellectual, behavioral, or physical disabi1ities. Modifications

More information

Usability Test Script

Usability Test Script Usability Test Script Session 1 [date & time] [participant s name and location] [investigator s names] Step 1. Introducing yourself & read instructions Hi, my name is [ ] and I m going to be walking you

More information

Teacher s Guide. Alignment with the Common Core State Standards for Reading... 3. Alignment with the Common Core State Standards for Writing...

Teacher s Guide. Alignment with the Common Core State Standards for Reading... 3. Alignment with the Common Core State Standards for Writing... My Insurance Teacher s Guide Introduction to the Unit... 2 What are the activities? What is the assessment? What are the activity descriptions? How does this unit align with the Common Core State Standards?

More information

Digital Citizenship Lesson Plan

Digital Citizenship Lesson Plan Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship

More information

LDC Template Task Collection 2.0

LDC Template Task Collection 2.0 Literacy Design Collaborative LDC Template Task Collection 2.0 December 2013 The Literacy Design Collaborative is committed to equipping middle and high school students with the literacy skills they need

More information

Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org

Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage

More information

Building Your Business Online EPISODE # 203

Building Your Business Online EPISODE # 203 Building Your Business Online EPISODE # 203 LESSON LEVEL Grades 6-9 KEY TOPICS Entrepreneurship Online business Identity protection LEARNING OBJECTIVES 1. Become familiar with tools to do business online.

More information

UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET

UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET SPEAKING NOTES FOR GRADES 4 TO 6 PRESENTATION SLIDE (1) Title Slide SLIDE (2) Key Points It can be really

More information

Padlet Instruction Manual. Incorporating Junior Cycle Key Skills, School Self-Evaluation and suggestions for use

Padlet Instruction Manual. Incorporating Junior Cycle Key Skills, School Self-Evaluation and suggestions for use Padlet Instruction Manual Incorporating Junior Cycle Key Skills, School Self-Evaluation and suggestions for use 1 Padlet Padlet is a free online tool that is best described as an online notice board. Padlet

More information

UNIT 2: CRITICAL THINKING IN GAME DESIGN

UNIT 2: CRITICAL THINKING IN GAME DESIGN UNIT 2: CRITICAL THINKING IN GAME DESIGN UNIT 2: CRITICAL THINKING IN GAME DESIGN 2.A: Unit Overview 2.B: Instructional Resource Guide 2.C: Learning Activities Guide 2.D: Standards Alignment Guide 2.E:

More information

Certificate of Leadership Program.

Certificate of Leadership Program. Certificate of Leadership Program. An initiative with UBC Peer Programs that engages students in a reflective practice through the use of educational technologies with the aims of developing greater awareness

More information

HCC ONLINE COURSE REVIEW RUBRIC

HCC ONLINE COURSE REVIEW RUBRIC HCC ONLINE COURSE REVIEW RUBRIC Adapted from Maryland Online FIPSE Project and Lake Superior College I. COURSE OVERVIEW AND INTRODUCTION General Review Standard: The overall design of the course, navigational

More information

FOLSOM CORDOVA UNIFIED SCHOOL DISTRICT COMPUTER GAME DESIGN

FOLSOM CORDOVA UNIFIED SCHOOL DISTRICT COMPUTER GAME DESIGN FOLSOM CORDOVA UNIFIED SCHOOL DISTRICT COMPUTER GAME DESIGN Date: January 2016 Proposed Grade Level(s): Grade 6-8 Grading: A-F Prerequisite(s): None Course Length: Year Subject Area: Technology Elective

More information

Penguin Facts. Standards for the 21st-Century Learner. Published on AASL Learning4Life Lesson Plan Database

Penguin Facts. Standards for the 21st-Century Learner. Published on AASL Learning4Life Lesson Plan Database Published on AASL Learning4Life Lesson Plan Database Penguin Facts Created by: Neely Swygert Title/Role: Teacher Librarian Organization/School Name: Gadsden Elementary Location: South Carolina Grade Level:

More information

2012 NCSA / McAfee Online Safety Survey

2012 NCSA / McAfee Online Safety Survey 2012 NCSA / McAfee Online Safety Survey National Cyber Security Alliance McAfee JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National Cyber Security

More information

Teaching Literacy and Meeting Common Core in CTE Classes

Teaching Literacy and Meeting Common Core in CTE Classes Teaching Literacy and Meeting Common Core in CTE Classes Statewide CTE Institute The College of New Jersey May 20, 2014 George Johnson george.johnson@sreb.org And NJ CTE teachers from LDC Cohort 2 Teaching

More information

Course Overview and Outline

Course Overview and Outline Course Overview and Outline The My Digital Life curriculum is comprised of seven modules that cover key concepts for building digital literacy. Each module contains between three and nine brief activities

More information

FAIRFIELD PUBLIC SCHOOLS K-12 Library Media Department DRAFT. Library Media Curriculum Linking Core Curriculum with 21 st Century Skills

FAIRFIELD PUBLIC SCHOOLS K-12 Library Media Department DRAFT. Library Media Curriculum Linking Core Curriculum with 21 st Century Skills FAIRFIELD PUBLIC SCHOOLS K-12 Library Media Department Library Media Curriculum Linking Core Curriculum with 21 st Century Skills DRAFT Draft September, 2014 1 Fairfield Public Schools Library Media Department,

More information

Student Quick Start Guide

Student Quick Start Guide Student Quick Start Guide Copyright 2012, Blackboard Inc. Student Quick Start Guide 1 Part 1: Requesting Enrollment and Accessing the Course 1.1 1.2 1.3 Accepting a Course Invitation and Accessing the

More information

Teaching Digital Citizenship

Teaching Digital Citizenship 32 Government of Newfoundland and Labrador - Education I A School-Wide Approach - Positive Behaviour Supports 2013 Education Teaching Digital Citizenship Digital citizenship can be defined as the norms

More information

General Procedures for Developing an Online Course

General Procedures for Developing an Online Course General Procedures for Developing an Online Course General Procedures for Developing an Online Course Questions to Ask before you Begin Analysis 1. What is your learner audience? Is the course for beginners

More information

Note: Survey responses are based upon the number of individuals that responded to the specific question. Response Responses Responses

Note: Survey responses are based upon the number of individuals that responded to the specific question. Response Responses Responses State: IN Results based on 133 survey(s). Note: Survey responses are based upon the number of individuals that responded to the specific question. What is your current job responsibility? (select one)

More information

English 2 - Journalism Mitch Martin: mmartin@naperville203.org

English 2 - Journalism Mitch Martin: mmartin@naperville203.org Mission English 2 - Journalism Mitch Martin: mmartin@naperville203.org To educate students to be self-directed learners, collaborative workers, complex thinkers, quality producers, and community contributors

More information

Class 3: Identify Tricks and Scams Online

Class 3: Identify Tricks and Scams Online Class 3: Identify Tricks and Scams Online Identify Tricks and Scams Online Instructor s Overview DESCRIPTION: In this lesson, students will learn how to avoid online tricks and scams, and learn best practices

More information

Social Media Curriculum Overview

Social Media Curriculum Overview Lessons in K 2 Social Media Curriculum Overview 1. Going Places Safely ( KINDERGARTEN) https://www.commonsensemedia.org/educators/lesson/going places safely k 2 How do I go places safely on the computer?

More information

Online Safety for Middle and High School

Online Safety for Middle and High School Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET

More information

SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?

SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone? SCRIPT FOR OUTREACH Disconnected and Cyber Predators Introduction Hello! How is everyone doing today? My name is and I am here with some friends of mine from the American Bar Association Young Lawyers

More information

Master the Common Core State Standards for Math!

Master the Common Core State Standards for Math! Program Overview RTI Grades K 5 Master the Common Core State Standards for Math! Aligned to the ommon Core STATE STANDARDS Built on Common Core Topic Progressions Designed to help K 5 students master the

More information

Private Today, Public Tomorrow

Private Today, Public Tomorrow LESSON PLAN Private Today, Public Tomorrow UNIT 4 Essential Question How can you respect the privacy of others online? Lesson Overview Students reflect on their responsibility to protect the privacy of

More information

IT Academy Lesson Plan

IT Academy Lesson Plan 10 IT Academy Lesson Plan Microsoft Sharepoint Turn potential into success Microsoft Office SharePoint 2010: Lesson Plans Introduction Preparing to teach courses on Microsoft SharePoint 2010 for the first

More information

Virtual Classroom Student Guide

Virtual Classroom Student Guide Virtual Classroom Student Guide Table of Contents Overview 3 Grade Weights 3 Finding Help 3 Virtual Classroom Login 4 Virtual Classroom Lobby 5 The Course Map 6 Activities in the Virtual Classroom 7 Vocabulary

More information

Tab 3: STEM Alignment * Identifies connections between recognized STEM Career Cluster standards and NDG Linux Essentials curriculum.

Tab 3: STEM Alignment * Identifies connections between recognized STEM Career Cluster standards and NDG Linux Essentials curriculum. NDG Linux Course: Alignment to Education Standards STEM Career Cluster Knowledge and Skills Topics Common Core Anchor College and Career Readiness Standards 21st Century Science & Engineering Practices

More information

Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives

Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives Estimated time: 45 minutes Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives Overview: Students learn strategies for guarding against

More information

This page intentionally left blank.

This page intentionally left blank. This page intentionally left blank. CreditSmart Module 6: Understanding Credit Scoring Table of Contents Welcome to Freddie Mac s CreditSmart Initiative... 4 Program Structure... 4 Using the Instructor

More information

The Online Generation Gap. Contrasting attitudes and behaviors of parents and teens

The Online Generation Gap. Contrasting attitudes and behaviors of parents and teens The Online Generation Gap Contrasting attitudes and behaviors of parents and teens The Online Generation Gap: Contrasting attitudes and behaviors of parents and teens Submitted to: The Family Online Safety

More information

Blackboard Exemplary Course Program Rubric

Blackboard Exemplary Course Program Rubric Blackboard Exemplary Course Program Rubric The Blackboard Exemplary Course Program(ECP) recognizes course creators whose courses demonstrate best practices in four major areas: Course Design, Interaction

More information

Montclair Public School District Technology Scope and Sequence K- 5 (Rev. August 18, 2015)

Montclair Public School District Technology Scope and Sequence K- 5 (Rev. August 18, 2015) PS K-5 Technology August 18, 2015 1 of 7 ontclair Public School District Technology Scope and Sequence K- 5 (ev. August 18, 2015) ntroduction to the Scope and Sequence Document The skills identified for

More information

LANGUAGE! 4 th Edition, Levels A C, correlated to the South Carolina College and Career Readiness Standards, Grades 3 5

LANGUAGE! 4 th Edition, Levels A C, correlated to the South Carolina College and Career Readiness Standards, Grades 3 5 Page 1 of 57 Grade 3 Reading Literary Text Principles of Reading (P) Standard 1: Demonstrate understanding of the organization and basic features of print. Standard 2: Demonstrate understanding of spoken

More information

Social Media Playbook

Social Media Playbook Social Media Playbook Personalized Experience Social technologies are changing the way we collaborate and communicate with each other. Many traditional forms of marketing and advertising have been replaced

More information

Mastering Lync Meetings

Mastering Lync Meetings Mastering Lync Meetings cd_mastering_lync_meetings_v2 1 8/25/2014 Course Title Contents Overview of scheduled Online Lync meetings... 3 General Best Practices... 3 Scheduling the meeting... 4 Recurring

More information

i-safe K 12 CURRICULUM SCOPE 06-07

i-safe K 12 CURRICULUM SCOPE 06-07 i-safe K 12 CURRICULUM SCOPE 06-07 GRADES K 4 Scope and sequence i-safe materials are available in topic modules to provide the teacher with flexibility in creating a program of instruction that best suits

More information

Data in Head Start and. Early Head Start:

Data in Head Start and. Early Head Start: Data in Head Start and Early Head Start: Creating a Culture That Embraces Data Guide for Users and Trainers Table of Contents Overview... 1 Audience... 2 Objectives... 2 Using the Module... 2 Using the

More information

Middle secondary unit. Ethical use of technology. www.cybersmart.gov.au

Middle secondary unit. Ethical use of technology. www.cybersmart.gov.au www.cybersmart.gov.au Creative Commons These teaching resources on the Cybersmart website s Schools Gateway are now available to schools under Creative Commons licences. The new licensing conditions are

More information

i-safe CURRICULUM SCOPE 2008-09 Elementary Grades K - 5

i-safe CURRICULUM SCOPE 2008-09 Elementary Grades K - 5 i-safe CURRICULUM SCOPE 2008-09 Elementary Grades K - 5 Scope of curriculum i-safe materials are available in topic modules to provide the teacher with flexibility in creating a program of instruction

More information

Dr. Seuss and Read Across America

Dr. Seuss and Read Across America Published on AASL Learning4Life Lesson Plan Database Dr. Seuss and Read Across America Created by: Honor Zalewski Title/Role: Teacher-Librarian Organization/School Name: Cumberland County Public Schools

More information

Cyber Safety Handbook 2014

Cyber Safety Handbook 2014 Cyber Safety Handbook 2014 Mission & Vision Statements Mission To provide students with an excellent, all-round education in a Christian environment. Cricos No: 01645K Vision Woodcroft College aspires

More information

HOW TO STAY SAFE. Smartphones

HOW TO STAY SAFE. Smartphones HOW TO STAY SAFE Smartphones Smartphones provide a variety of interesting activities and ways for young people to engage with their friends and families. However, it is important to be aware of what these

More information

User Guide. Chapter 6. Teacher Pages

User Guide. Chapter 6. Teacher Pages User Guide Chapter 6 s Table of Contents 1. Introduction... 4 I. Enhancements... 5 II. Tips... 6 2. Key Information... 7 3. How to Add a... 8 4. How to Edit... 10 I. SharpSchool s WYSIWYG Editor... 11

More information

Common Core State Standards Speaking and Listening

Common Core State Standards Speaking and Listening Comprehension and Collaboration. Prepare for and participate effectively in a range of conversations and collaborations with diverse partners, building on others ideas and expressing their own clearly

More information

Bitstrips for Schools http://www.bitstripsforschools.com

Bitstrips for Schools http://www.bitstripsforschools.com The SAMR Model: Integrating Bitstrips for Schools Ministry Licensed Resource Title: Description of resource Bitstrips for Schools http://www.bitstripsforschools.com Bitstrips for Schools is an online educational

More information

Teaching with PowerPoint

Teaching with PowerPoint Teaching with PowerPoint PowerPoint can be an effective tool to present material in the classroom and encourage student learning. PowerPoint, when effectively planned and used, can enhance instruction.

More information

Monitoring for Meaning

Monitoring for Meaning Monitoring for Meaning Grades 3-5 eeee Wwh Monitoring comprehension is above all engagement. When readers monitor their thinking, they have an inner conversation with the text. They listen to the voice

More information

Longman English Interactive

Longman English Interactive Longman English Interactive Level 2 Orientation (English version) Quick Start 2 Microphone for Speaking Activities 2 Translation Setting 3 Goals and Course Organization 4 What is Longman English Interactive?

More information

RCN BUSINESS OFFICE MOBILITY FOR DESKTOP

RCN BUSINESS OFFICE MOBILITY FOR DESKTOP RCN BUSINESS OFFICE MOBILITY FOR DESKTOP Quick Reference Guide 3 Office Mobility File Tools Help RECEIVING CALLS JOE SMITH Enter name or number + When someone calls your RCN Business number, you ll see

More information

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are: Scenario #1 Jake and the Bad Virus The two major C3 concepts this scenario illustrates are: Cyber Security: Jake compromised his computer s security by providing personal information to an unknown online

More information

COMPUTER TECHNOLOGY IN TEACHING READING

COMPUTER TECHNOLOGY IN TEACHING READING Лю Пэн COMPUTER TECHNOLOGY IN TEACHING READING Effective Elementary Reading Program Effective approach must contain the following five components: 1. Phonemic awareness instruction to help children learn

More information

Educator s Guide to Digital Citizenship: Responsibility and Digital Reputations

Educator s Guide to Digital Citizenship: Responsibility and Digital Reputations Educator s Guide to Digital Citizenship: Responsibility and Digital Reputations Overview: Students examine their participation in digital life. They explore how information shared through digital media

More information

Upper primary unit. Sharing personal information. www.cybersmart.gov.au

Upper primary unit. Sharing personal information. www.cybersmart.gov.au www.cybersmart.gov.au Creative Commons These teaching resources on the Cybersmart website s Schools Gateway are now available to schools under Creative Commons licences. The new licensing conditions are

More information

Fireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.]

Fireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.] 1 Fireside Script INTRO MODERATOR: ALL DIGITAL PRODUCTS LIKE IPODS, CELL PHONES, COMPUTERS, WEBCAMS, DIGITAL CAMERAS AND GAME CONSOLES CONNECT TO WEB 2.0, WHICH ALLOWS US TO UPLOAD AND DOWNLOAD INFORMATION.

More information

Conditions of Learning (R. Gagne)

Conditions of Learning (R. Gagne) Conditions of Learning (R. Gagne) http://tip.psychology.org/gagne.html Overview: This theory stipulates that there are several different types or levels of learning. The significance of these classifications

More information

Reading Strategies by Level. Early Emergent Readers

Reading Strategies by Level. Early Emergent Readers The charts below were created as a common language for teachers and students in the Wallingford Public Schools in kindergarten through eighth grade. The level of the chart selected for use in the classroom

More information

English sample unit: Online magazine Stage 4

English sample unit: Online magazine Stage 4 English sample unit: Online magazine Stage 4 Focus outcomes: EN4-1A,, EN4-3B, EN4-4B, EN4-5C, EN4-9E Duration: 5 6 weeks Unit overview In this unit students design, develop and publish a class magazine

More information

Using Your Credit - Crazy or Compelling? EPISODE # 115

Using Your Credit - Crazy or Compelling? EPISODE # 115 Using Your Credit - Crazy or Compelling? EPISODE # 115 LESSON LEVEL Grades 4-6 KEY TOPICS Entrepreneurship Credit Interest LEARNING OBJECTIVES 1. Learn about borrowing money. 2. Understand your credit

More information

Bills, Budgets and Bank Accounts

Bills, Budgets and Bank Accounts Bills, Budgets and Bank Accounts Teacher s Guide Introduction to the Unit... 2 What are the activities? What is the assessment? What are the activity descriptions? How does this unit align with the Common

More information

Today s mobile ecosystem means shared responsibility

Today s mobile ecosystem means shared responsibility It seems just about everybody has a mobile phone now, including more than three-quarters of U.S. teens and a rapidly growing number of younger kids. For young people as well as adults, the technology has

More information

Site Credibility. Grade Level: 4-8

Site Credibility. Grade Level: 4-8 Site Credibility Grade Level: 4-8 Objectives: 1. Students will identify and classify sources of information for validity according to the source. 2. Through the use of a concept map, students will list

More information

COSMETIC SURGERY UNIT OVERVIEW. Authors Introduction Go to impactseries.com/issues to listen to Joseph s unit introduction.

COSMETIC SURGERY UNIT OVERVIEW. Authors Introduction Go to impactseries.com/issues to listen to Joseph s unit introduction. UNIT 1 COSMETIC SURGERY UNIT OVERVIEW In this unit, students will: T Read and listen to the conversation between Ayu and her mother. Answer open-ended comprehension questions to show understanding of the

More information