Hector s World Lesson plan Episode: Computer security: Oops Upper primary
|
|
|
- Irma Lloyd
- 10 years ago
- Views:
Transcription
1 Hector s World Lesson plan Episode: Computer security: Oops Upper primary BACKGROUND Students of this age are emerging users of internet-enabled computers. They may be involved in a range of online activities including: playing online games against other players, participating in online communities, using search engines to research school projects and homework, communicating using ICT (such as IM and ), creating and posting content online and searching for and downloading digital material, such as music. This lesson aims to assist students to recognise some of the security risks associated with computers, particularly identifying viruses as programs that can damage a computer (including pop-up files). It explores basic strategies to prevent virus infection and demonstrates safe computer use practices when using the internet, such as using strong passwords and password protection. The lesson plan also highlights the importance for students to turn to a trusted adult or carer for help. OBJECTIVES: Students will: 1. understand that strong passwords can help protect computer files and information 2. understand that a computer virus can harm a computer, but users can take steps to prevent this. CURRICULUM LINKS This lesson plan supports the National Framework for Values Education in Australian Schools, including the Nine Values for Australian Schooling. For more information, visit: web.pdf on,8757.html The lesson plan supports the national Statements of Learning in ICT for Year 5: Communicating with ICT Students have opportunities to use different digital media to improve the communication of ideas, express a personal image and establish an identity. They reflect on experiences to analyse the delivery and effectiveness of the communication. Page 1
2 Teacher s hints Ethics, issues and ICT Students apply codes of practice that promote safety, responsibility and respect when working in online and stand-alone environments. They examine practices in a variety of ICT environments to recognise the underlying values. They recognise the importance of acknowledging the owner(s)/creator(s) of digital work and establish sound practices for acknowledging them. Students implement a range of preventative strategies for addressing health and safety issues when using ICT and develop and apply strategies for the security of personal information. The Year 5 statement is available at: Cross curriculum links This lesson plan can be used in any of the following subjects and topic areas: the arts communication health identity personal development science and technology SOSE/HSIE. SUGGESTED LESSON PROGRESSION Although this lesson may stand alone, students will find it easier if they have already been introduced to Hector s World, and the lesson is used as part of a unit on Hector s World and online safety. There are two activities to reinforce the lesson plan concepts. You should print, copy and prepare these before the lesson. The activities are included at the end of this plan, along with additional extension activities and learning links. The episode contains two Pause points classroom discussion. to provide an opportunity for Introduce the animation to the class by asking who is familiar with Hector s World. Allow students to share some of their previous knowledge. Explain, for anyone who is not familiar with the resource, that Hector and his friends use lots of technology in their world under the sea, Silicon Deep. They like to learn about helping each other and being good digital citizens. This episode is about a computer virus. Ask the students: Who has heard the term computer virus? What is a computer virus? What does a computer virus do? Page 2
3 Acquaint students with the term computer virus through a short discussion. Some students at this age may know the terms virus, anti-virus, pop-up window, spyware or malware. They may have a basic understanding that a computer virus can harm or damage computer files. Record new or unfamiliar vocabulary arising from discussion on the board. Explain that in this episode, Sprat s computer is infected with a virus just as his friends are about to watch something very special on it. He will need some help to sort out the problem. ACTIVITY 1. Before viewing the animation Show students the picture of the pop-up window from the episode (Image 1 attached). Ask students to look for this pop-up window scene and watch closely what happens to the computer. 2. View the animation View Hector s World Episode: Computer security: Oops. A pause point symbol will appear in the episode in the lower right corner, three seconds before the point to stop the video. Pause point 1 At the first pause point, stop the animation and allow students time to digest Sprat s problem and share some ideas about possible solutions. Ask the students: What do you think has happened to Sprat s computer? Sprat has invited all his friends to watch the special concert on his computer and now his computer has broken down. How would Sprat be feeling right now? Create a list of words on the board (or large paper) that students use to describe Sprat s feelings. This will be used later in the student activities for this lesson. The list is likely to include: unhappy, scared, worried, afraid, sorry, sad, upset, tricked, bad. What can Sprat do to solve his problem? Additional questions: These questions explore Sprat s need to find a resolution quickly and how this might make him feel. Do you think other stories and pictures Sprat created on his computer will be safe? Page 3
4 What could happen if Sprat tries to fix the computer himself? What could Sprat say to his friends who are here to watch the concert? How did Hector and Tama feel when Sprat rushed out? Who can Sprat turn to for help? Resume the animation. Pause point 2 At the second pause point, stop the animation and allow students time to digest the question and share some ideas. Ask the students: What could Ranjeet say to make Sprat feel better? Using the list created at Pause point 1, ask students what Ranjeet could say if Sprat is feeling: for example unhappy, scared, worried, afraid, sorry, sad, upset, tricked or bad. Conclusion of the animation Immediately following the viewing, briefly discuss what happened in the animation focussing on Sprat s advice at the end and Sprat s strategy to solve the problem. New vocabulary and the list of words describing how Sprat felt will aid the discussion. Discuss the key points in the episode: Sprat s Dad used his strong password to log on to the computer. Sprat clicked on a pop up window. A virus caused Sprat s computer to stop working. Sprat sought help and did not try to fix the computer himself. Sprat s friends help him to feel better. 3. Review and consolidation of learning Student activity 1: What happened next? Organise students into small groups to complete the Student activity 1: What happened next? Students work together to place the story strips from the activity sheet in the correct order. Each story strip highlights a key point in the story. This activity helps students recall the important messages. You need to prepare the student activity sheets prior. Alternative activity: Students work in a group of eight, each with a story strip. They line themselves up in the correct order of the story. The teacher may ask each group member to read out or act out their part of the story. Page 4
5 Teacher s notes Student activity 2: Key Ideas Distribute Student activity 2: Key Ideas to students. Direct students to complete the activity sheet. Students can work in pairs to write down the key messages in the story in their own words. Words from the list on the board created during discussion and pictures on the activity sheet will assist students to recall the key messages. This can also be assigned as a homework activity. Student activity 3: Using passwords to protect valuable information SUGGESTED LESSON PROGRESSION: A student s first introduction to a computer password may be when they begin using a school network or a shared classroom computer. This activity introduces the concept of a strong password. The activity encourages students to draw a picture that helps them remember their password. In some school environments young children may share a class password to access a class blog or a shared area of a computer network. Teachers can encourage the use of a strong password in this situation and reinforce the concept that passwords protect files and information that are important to us as a group. Introduce the activity by determining students current knowledge about passwords and their purpose. What is a password? Who uses passwords? Why are passwords used? Why do people keep their passwords secret? What happens when someone guesses a password? What is a weak password/what is a strong password? Often young students will consider using the name of a favourite pet, a birthday or a nickname as a password. It is important to help students understand that their friends may already know this information. They may also consider an easy to remember number sequence e.g or even the word password. It is important to help students understand the difference between a weak password and a strong password. You may like to display some examples on the board. Explain that this lesson will assist students to make up a strong password. A strong password is made of letters, numbers and symbols combined in a way that no one can guess. Page 5
6 Explain that writing the password down means that someone may see it and it will no longer be a secret password. Drawing a picture can be a way to help remember a password and still keep it secret. Distribute the Make a strong password activity sheet to students. This sheet is available on the Silicon Deep Workshop at: The activity sheet encourages students to choose words, numbers or symbols from each column and combine them to make a strong password. Students can circle their choices but should try to keep them secret. Students then draw a picture that will help them remember their password and discard the top portion. Students may have computer passwords at school or home. The class may share a log-on to class materials or website. Their examples can be integrated into the discussion. Ask the group: Who uses passwords? Why do some websites use passwords? What could happen if someone knows your computer password? How does a password protect computer files? Why do we want to protect some computer files? EXTENSION ACTIVITIES FOR ALL AGE GROUPS The following are suggested activities that can be used to further extend students understanding of computer security and passwords. These are for all age groups so they can be modified to suit individual classes. Some of these activities use Hector s World resources that are available on the following websites: Hector s World pages: Information Island or Silicon Deep: 1. Invite an expert Invite the school computer technician or a computer technician from the local community to speak to students about the importance of computer security and what strategies are used to keep the school computers safe. Students might prepare questions in advance. 2. Drama activity Organise students into groups of six or seven to act out a mini play that retells the story. Page 6
7 A drama activity gives students scope to explore alternative solutions, similar events or other computer security issues. Students can use the character cards or character hats to portray each character. These resources are available from the Hector s World pages on and 3. Music video and song These resources are available from the Hector s World pages on Play the music video Keep Yourself Switched On to introduce the class to the music and lyrics. The song encourages students to keep themselves up-to-date and build their skills. It includes ideas about virus symptoms and virus prevention. Song lyrics can be displayed using a data projector or printed for students to read. Other ideas In groups, students can create movements and dance steps to the song. Teach the song to another class. This teaching could cascade across the school until all students sing the song together. That is, the first class to learn the song teaches to the next. Each class teaches another until the whole school knows the song and can sing it together. Page 7
8 IMAGE 1: POP-UP WINDOW For use before viewing the episode. This is Sprat the fish. He is using his computer when a pop-up window appears on the screen. Look for this scene in the episode and watch what happens next. IMAGE 2: SPRAT For use after Pause point 1 How does Sprat feel? Page 8
9 STUDENT ACTIVITY 1: WHAT HAPPENED NEXT? Note: Play the animated episode first before completing this activity. Below are the major points in Hector s World Episode: Computer security: Oops. Students can work together in small groups to place the story strips in the correct order. The first one is numbered. Alternately a group of eight students can each be given one story strip. They must then arrange themselves in the correct order. The teacher may then ask each student to read out or act out their part of the story. Instructions: Print and make copies of this list. Cut along the lines to create individual story strips and mix their order. Give a complete set of strips to each group and ask them to find number one. Ask the students: What happened next? Groups can then work at their own pace to retell the story in the correct order. Sprat invites his friends to his house to listen to music. Sprat s Dad uses a strong password to log on to the computer. Sprat clicks on a pop up window. Sprat s computer gets a virus. Sprat s computer stops working. Sprat gets help from Ranjeet the crab. Page 9
10 Sprat s friends help him to feel better. The music starts and Ranjeet, Sprat and Tama dance. Page 10
11 STUDENT ACTIVITY SHEET 2: KEY IDEAS Sprat invited his friends to see a special online concert on his computer. The computer stopped working just before the concert was going to start. 1. Sprat s computer stopped working because 2. When the computer stopped working, Sprat felt 3. Ranjeet helped Sprat feel better by saying 4. A computer needs anti-virus software so the computer will Page 11
12 5. If something goes wrong with my computer I will Page 12
Hector s World Lesson plan Episode: Computer security: Oops Lower primary
Hector s World Lesson plan Episode: Computer security: Oops Lower primary BACKGROUND Very young students are unlikely to fully understand how computers work. They may have limited understanding about the
Hector s World Lesson Plan Interactive Episode Computer Security: Oops Ages 8 9
Hector s World Lesson Plan Interactive Episode Computer Security: Oops Ages 8 9 OBJECTVES: 1. Children understand that strong passwords can help protect computer files and information. 2. Children undrestand
Hector s World Lesson Plan Episode: Cyberbullying You re Not Alone Upper primary
Hector s World Lesson Plan Episode: Cyberbullying You re Not Alone Upper primary BACKGROUND Cyberbullying is an increasing problem for children and schools. This lesson addresses the inappropriateness
STOP. THINK. CONNECT. Online Safety Quiz
STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.
Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?
LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams
Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives
Estimated time: 45 minutes Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives Overview: Students learn strategies for guarding against
behind the scenes curriculum mapping: primary The following curriculum mapping is relevant for all 10 episodes of THE LION KING - Behind The Scenes
curriculum mapping: primary The following curriculum mapping is relevant for all 10 episodes of THE LION KING - Behind The Scenes Episode 1 from screen to stage Episode 2 BEHIND THE STORY Episode 3 meet
This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet.
This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet. Hft Safeguarding Group commissioned a member of Hft National
Upper primary unit. Don t be fooled. www.cybersmart.gov.au
www.cybersmart.gov.au Creative Commons These teaching resources on the Cybersmart website s Schools Gateway are now available to schools under Creative Commons licences. The new licensing conditions are
Share Aware Lesson 2 - Lucy
Share Aware Lesson 2 - Lucy Class Key Stage 2 Time 40 mins Date October 2015 Learning Objectives Learning Outcomes Key Vocabulary Resources We are learning about online safety and how to access available
School. Lesson plan. Topic. Aims. Age group. Level. Time. Materials. School, school objects, rules, subjects, rooms and uniforms
School Lesson plan Topic School, school objects, rules, subjects, rooms and uniforms Aims To practise (depending on stages chosen): vocabulary: words connected to school, school objects, rules, subjects,
Music, Film, TV and the Internet. A guide for parents and teachers
Music, Film, TV and the Internet A guide for parents and teachers Music, film and TV on the internet what you should know There are many great ways of accessing music, film, TV and video safely and legally
National Cybersecurity Awareness Campaign. Kids Presentation
National Cybersecurity Awareness Campaign Kids Presentation About Stop.Think.Connect. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help
THE LITTLE BIG BOOK OF BADNESS
THE LITTLE BIG BOOK OF BADNESS How to stay safe on the Internet a guidebook for students and parents USE THIS BOOK TO FIND OUT HOW YOU AND YOUR COMPUTER CAN STAY AWAY FROM BAD THINGS 2 CONTENTS Why you
Money and shopping 8.1 Online banking. Beginner s guide to. Wider interests
Wider interests Use this document with the glossary Beginner s guide to Money and shopping 8.1 Online banking This activity will help you register to bank online and get you started with your online banking
ONLINE SAFETY TEACHER S GUIDE:
TEACHER S GUIDE: ONLINE SAFETY LEARNING OBJECTIVES Students will learn how to use the Internet safely and effectively. Students will understand that people online are not always who they say they are.
Advice for Class Teachers. Moderating pupils reading at P 4 NC Level 1
Advice for Class Teachers Moderating pupils reading at P 4 NC Level 1 Exemplars of writing at P Scales and into National Curriculum levels. The purpose of this document is to provide guidance for class
C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:
Scenario #1 Jake and the Bad Virus The two major C3 concepts this scenario illustrates are: Cyber Security: Jake compromised his computer s security by providing personal information to an unknown online
Upper primary unit. Sharing personal information. www.cybersmart.gov.au
www.cybersmart.gov.au Creative Commons These teaching resources on the Cybersmart website s Schools Gateway are now available to schools under Creative Commons licences. The new licensing conditions are
My Family FREE SAMPLE. This unit focuses on sequencing. These extension
Unit 5 This unit focuses on sequencing. These extension Unit Objectives activities give the children practice with sequencing beginning, middle, and end. As the learn to name family members and rooms children
PEER PRESSURE TEACHER S GUIDE:
TEACHER S GUIDE: PEER PRESSURE LEARNING OBJECTIVES Students will be able to identify peer pressure as both a positive and negative force. Students will understand how peer pressure impacts everyone. Students
Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability
Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability The i-safe comprehensive curriculum provides a unique approach to Internet safety education, by meaningfully integrating
Music, Film, TV and the Internet. A guide for parents and teachers
Music, Film, TV and the Internet A guide for parents and teachers Music, film and TV on the internet what you should know There are many great ways of accessing music, film, TV and video safely and legally
Upper primary unit. Cybersafety. www.cybersmart.gov.au
www.cybersmart.gov.au Creative Commons These teaching resources on the Cybersmart website s Schools Gateway are now available to schools under Creative Commons licences. The new licensing conditions are
Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?
LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams
i-safe CURRICULUM SCOPE 2008-09 Elementary Grades K - 5
i-safe CURRICULUM SCOPE 2008-09 Elementary Grades K - 5 Scope of curriculum i-safe materials are available in topic modules to provide the teacher with flexibility in creating a program of instruction
2 nd - Watch My Online Neighborhood Video: https://www.commonsensemedia.org/videos/my- online- neighborhood
K- Going Places Safely Essential Question: How do I go places safely on the computer? Students will: discover the Internet can be used to visit far- away places and learn new things; compare how staying
Hints and tips on how to get the most out of the performance. Book 4. Acting tips
Hints and tips on how to get the most out of the performance. Book 4 Acting tips Tips on how to introduce the show to the group, run workshops, explore the text, cast and organise the show. Before the
Making a Video Year Six
Making a Video Year Six Unit Overview This children introduces the idea of using photos and videos within a multimedia presentation. Children will cover: - Using a digital camera to take photographs and
Animals that move slowly, animals that move quickly
Unit Three Time 74 Animals that move slowly, animals that move quickly Unit 3: Time Image courtesy of: Microsoft clipart Focus: Animals that move slowly and quickly linked with time Whole class activity
Keeping your online health and social care records safe and secure
Keeping your online health and social care records safe and secure Keeping your online health and social care records safe and secure By 2015, everyone in England will have access to their GP medical records
INTERNET SAFETY: VIRUS: a computer program that can copy itself and infect your computer. CAPTCHAS: type the letters to set up an online account
INTERNET SAFETY: VIRUS: a computer program that can copy itself and infect your computer Malware: Harmful software programs designed to damage your computer without you knowing. Spyware: Undetected programs
Class 3: Identify Tricks and Scams Online
Class 3: Identify Tricks and Scams Online Identify Tricks and Scams Online Instructor s Overview DESCRIPTION: In this lesson, students will learn how to avoid online tricks and scams, and learn best practices
SHARING CONCERNS WITH PARENTS
MODULE 3.3 SHARING CONCERNS WITH PARENTS FACILITATOR GUIDE Module 3.3 Sharing concerns with parents Introduction The Module 3.3 Sharing concerns with parents facilitator guide is designed to assist you
Fun Learning Activities for Mentors and Tutors
Fun Learning Activities for Mentors and Tutors Mentors can best support children s academic development by having fun learning activities prepared to engage in if the child needs a change in academic/tutoring
TKT Online. Self-study Guide
TKT Online Self-study Guide TKT Online overview The Cambridge ESOL Teaching Knowledge Test (TKT) is a test of knowledge of concepts related to language, language use and the background to practical language
YOUR PRESENTERS TODAY S WORLD. Maryly Skallos Technology Coordinator St. Thomas the Apostle School [email protected]
CYBER SAFETY, CYBER ETHICS, CYBER SECURITY How to teach the kids about these concepts (a primer from staysafeonline.org program that is available free from the website) YOUR PRESENTERS Maryly Skallos Technology
Case study: What the? Online scams and identity theft
Case study: What the? Online scams and identity theft Theme The internet and mobile technologies are a source of scams and identity theft. Key learning/subject areas Cross curricula. Duration One to two
YOUNG PEOPLE, MUSIC & THE INTERNET A GUIDE FOR PARENTS, CARERS AND TEACHERS ABOUT DIGITAL MUSIC AT HOME, AT SCHOOL AND ON THE GO
YOUNG PEOPLE, MUSIC & THE INTERNET A GUIDE FOR PARENTS, CARERS AND TEACHERS ABOUT DIGITAL MUSIC AT HOME, AT SCHOOL AND ON THE GO DIGITAL MUSIC: THE KEY FACTS Music is an important part of young people
HEADS up. stop think connect
HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more
Information Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
The Court and your child:
The Court and your child: when social workers get involved easy words and pictures The Court and your child when social workers get involved People These are the people who appear in the booklet. 2 3 Text
1 Online! 1 Listen and sing. 2 Look and ask a friend. LESSON 1
1 Online! LESSON 1 1 Listen and sing. 1.7 I love our computer, I use it every day. I search the internet, For new games to play. I upload photos, And I chat with my friends. I sometimes write an email,
Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data
Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer
Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data
Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer
Trial Copy. Guidelines for the Finance Coach TRAINING 3: PLANNING. Recommended for pupils in Years 7 to 9 (German school system)
Guidelines for the Finance Coach TRAINING 3: PLANNING Recommended for pupils in Years 7 to 9 (German school system) Duration: Approx. 2 lessons (90 minutes) E-Mail: [email protected] Training 3: Planning/Guidelines
Music and the Internet. A guide for parents and teachers
Music and the Internet A guide for parents and teachers Music on the internet what you should know There are many great ways of accessing music safely and legally online. This guide aims to keep parents,
MoneySmart Rookie Community educator guide. Financial literacy for young people
MoneySmart Rookie Community educator guide Financial literacy for young people Copyright information Website: ISBN: 978 0 9805533 9 0. Creative Commons This Community educator guide is available under
Stock Market Challenge Maths, Business Studies and Key Skills Development. Dealing Room Game Teacher s Guide
Stock Market Challenge Maths, Business Studies and Key Skills Development Dealing Room Game Teacher s Guide 10 Lane Learning 2010 Stock Market Challenge: Maths, Business Studies and Key Skills Development
Guidelines for Preventing and Dealing with Bullying Issues
Guidelines for Preventing and Dealing with Bullying Issues Stapleford School aims to value all its members, to give all the opportunity to learn, act fairly and celebrate differences between individuals.
Game 9. Overview. Materials. Recommended Grades 3 5 Time Instruction: 30 45 minutes Independent Play: 20 30 minutes
Game 9 Cross Out Singles Recommended Grades 3 5 Time Instruction: 30 45 minutes Independent Play: 20 30 minutes Quiet Dice Rolling dice can create lots of noise. To lessen the noise, consider using foam
Celebrating Our Constitution
C O N S T I T U T I O N D A Y L E S S O N Celebrating Our Constitution L E S S O N In 1 day Why are 200 year old words meaningful? Overview Students analyze key vocabulary from the Preamble as they discuss
The band. 4 Write sentences: Here students must rewrite the sentences given as negatives under the pictures.
The band Level: 2º E.S.O. Grammar: Present simple, frequency adverbs and word order Functions: describing habits and routines; asking for and giving personal information; talking about abilities Vocabulary:
NSPCC s Share Aware Teaching Guidance
NSPCC s Share Aware Teaching Guidance Helping children stay safe on social networks, apps and games The Share Aware teaching resources and lesson plans have been created to provide straightforward, no-nonsense
"Why is it important for ELL students to be active in listening, speaking, reading and writing on a daily basis?"
"Why is it important for ELL students to be active in listening, speaking, reading and writing on a daily basis?" Monica Gonzalez Bilingual/ESL Specialist [email protected] "Tell me and I
WHERE ARE YOU GOING WHERE HAVE YOU BEEN?
WHERE ARE YOU GOING WHERE HAVE YOU BEEN? LESSON PLAN FOR DAY 1 OF WHERE ARE YOU GOING WHERE HAVE YOU BEEN TITLE: WHERE ARE YOU GOING WHERE HAVE YOU BEEN INTRODUCTION OVERVIEW Students will be introduced
Haslingden High School
Haslingden High School ICT Department Year 8 esafety and Web Design homework Student name: Form: ICT teacher: Date issued: Date due: Level Effort House points Teacher feedback: KS3 Target level Parent/Carer
FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:
FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful
Our Lady of Lourdes Catholic Nursery & Primary School. Modern Foreign Language Policy
Our Lady of Lourdes Catholic Nursery & Primary School Modern Foreign Language Policy September 2014 Review Date: September 2016 INTRODUCTION This subject policy is one in a series that makes up the Whole
Fraud Protection module
Fraud Protection module Trainer s Introduction While the vast majority of financial transactions are legitimate and honest, the few fraudulent ones can be costly and damaging. By recognizing the warning
1. Provide a knowledge base 2. Create an atmosphere 3. Present a stimulus 4. Generate questions 5. Facilitate a discussion
1. Provide a knowledge base 2. Create an atmosphere 3. Present a stimulus 4. Generate questions 5. Facilitate a discussion 1 1. Provide a knowledge base If you want students to discuss a scientific or
Retail/Consumer Client. Internet Banking Awareness and Education Program
Retail/Consumer Client Internet Banking Awareness and Education Program Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 E-mail Risk... 3 Internet
Viruses, Worms, and Trojan Horses
Viruses, Worms, and Trojan Horses Be a Power Reader Make Personal Connections As you read this article, think to yourself, How can I apply this knowledge? How will what I m learning be useful to me? You
Chapter 8: Critical and Creative Thinking Skills
Chapter 8: Critical and Creative Thinking Skills THINKING SKILLS A thinking skill is any cognitive process that is broken down into steps and explicitly taught (Johnson, 2000). It is different from high-level
Thank you for choosing Zoom Internet!
Thank you for choosing Zoom Internet! We know you are going to love the speed, convenience and reliability of Zoom s super fast, always on connectivity to the Web! This guide provides helpful information
www.eslkidstuff.com Lesson Plans for ESL Kids Teachers
You will need: Resources: CD / Tape player cushions (if you have enough floor space) name tags for each student glove puppet (for kids under 7) ball (for kids over 7) resources for whatever you are going
PREVENTING HIGH-TECH IDENTITY THEFT
1 PREVENTING HIGH-TECH IDENTITY THEFT Presented by The Monument Group Companies Featured speaker: David Floyd November 19, 2014 2 Introduction Preventing Identity Theft (this session) Monitoring for Theft
SCOTTISH RESOURCES. First Level/Second Level Autumn 2008. Tuesdays 03.45 04.00 16 and 23 September BBC Radio 4 digital (terrestrial, cable, satellite)
B B C Learning Scotland SCOTTISH RESOURCES First Level/Second Level Autumn 2008 Tuesdays 03.45 04.00 16 and 23 September BBC Radio 4 digital (terrestrial, cable, satellite) China Stories Programmes in
Activities for Protecting Your Identity and Computer for Middle and High School Students
Activities for Protecting Your Identity and Computer for Middle and High School Students Overview There are three posters about protecting your computer for this grade span. We recommend that these be
Safe Street Crossing is the first class we offer addressing road safety and transportation choices. 2nd grade: Pedestrian Safety Unit
2nd Grade: Pedestrian Safety Unit Safe Street Crossing is the first class we offer addressing road safety and transportation choices. 2nd grade: Pedestrian Safety Unit 4th grade: Three-part Bicycle Safety
Cyber Security. Maintaining Your Identity on the Net
Cyber Security Maintaining Your Identity on the Net Why Cyber Security? There are three points of failure in any secure network: Technology (hardware and software) Technology Support (ITS) End Users (USD
Educator s Guide to Digital Citizenship: Responsibility and Digital Reputations
Educator s Guide to Digital Citizenship: Responsibility and Digital Reputations Overview: Students examine their participation in digital life. They explore how information shared through digital media
EADS up. stop think connect
EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,
An Enquire guide for young people
An Enquire guide for young people Going to a new school Going to a new school Contents Intro 3 How are you feeling? 4 What can I do to get ready? 6 Starting at secondary school? 8 Getting extra help at
Tools to Use in Assessment
Tools to Use in Assessment II. Observations and Checklists Teachers have always watched and observed students in the classroom and they have made instructional decisions based on these observations. Too
Storytime Crosswalk Connections: How the Six Skills and Five Practices Meet at the Library!
Storytime Crosswalk Connections: How the Six Skills and Five Practices Meet at the Library! Cheilon Preston Chillicothe and Ross County Public Library Adapted from the chart The Five Practices And The
CYBERBULLYING TEACHER S GUIDE:
TEACHER S GUIDE: CYBERBULLYING LEARNING OBJECTIVES Students will understand the meaning of cyberbully. Students will learn to recognize different forms of cyberbullying. Students will learn different strategies
Internet Safety/CIPA Lesson Plan
Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,
Pre-K. Animals Around Us. Differentiated Resources. English Language Learners... 2 Three-Year-Olds...3-4 Small Groups...5-6
Pre-K Differentiated Resources Animals Around Us English Language Learners.......... 2 Three-Year-Olds...................3-4 Small Groups......................5-6 Visit www.macmillanmh.com for online games
It was late at night and Smartie the Penguin was WIDE awake He was supposed to be fast asleep but tomorrow was his birthday. He was so excited; all
1 It was late at night and Smartie the Penguin was WIDE awake He was supposed to be fast asleep but tomorrow was his birthday. He was so excited; all he wanted was a new computer! 2 The big day came and
i-safe K 12 CURRICULUM SCOPE 06-07
i-safe K 12 CURRICULUM SCOPE 06-07 GRADES K 4 Scope and sequence i-safe materials are available in topic modules to provide the teacher with flexibility in creating a program of instruction that best suits
Only talk with people online that you know in person Time does not equal trust It doesn t mean you really know the person Be suspicious; ANY person worth having as a friend wouldn t ask you to put yourself
Middle secondary unit. Ethical use of technology. www.cybersmart.gov.au
www.cybersmart.gov.au Creative Commons These teaching resources on the Cybersmart website s Schools Gateway are now available to schools under Creative Commons licences. The new licensing conditions are
How To Teach Your Students To Be Respectful
E-RATE TOOLKIT Show Respect Online LESSON PLAN Essential Question: How can I make sure my emails are clear and respectful? Learning Overview and Objectives Overview: Students explore the similarities and
Moses. July 11-12, 2015. God has a plan for us. Exodus 2-4; Jeremiah 29:11
rd 3 5 July 11-12, 2015 Moses Exodus 2-4; Jeremiah 29:11 God has a plan for us. th Connect Time (20 minutes): Five minutes after the service begins, split kids into groups and begin their activity. Remember
Part 5. Dinosaur School Notes to Teachers. 1. Introduction. 2. Iguanodon Unit: How to be Successful in School
Part 5 Dinosaur School Notes to Teachers 1. Introduction 2. Iguanodon Unit: How to be Successful in School 3 & 4. Triceratops Unit: Detecting, Understanding and Talking About Feelings 5. Stegosaurus Unit:
username password school code school.ebonline.co.nz THE BRITANNICA SCHOOL USER GUIDE
username password school code school.ebonline.co.nz THE BRITANNICA SCHOOL USER GUIDE TABLE OF CONTENTS SECTION 1: GETTING STARTED WELCOME TO BRITANNICA SCHOOL... 4 SEARCH RESULTS... 5 ARTICLE FEATURES...
2. _General Help and Technical Support
1. _Welcome Welcome to Business Internet Banking. Our online service is available 06:00 AM ET 12:00 AM (Midnight) ET, seven days a week, so you and your employees can manage your business banking accounts
LESSON 2: JESUS, THE LIGHT OF THE WORLD, IS BORN
LESSON 2: JESUS, THE LIGHT OF THE WORLD, IS BORN Leader Guide for One Room Classroom: M y Classroom Luke 2:1-20 06/06/2016 Teachers Dig In Dig In to the Bible Read: Luke 2:1-20 In This Passage: Mary and
Teacher Training Guide
Training Goals: Understand the student online experience. Learn how to access real-time student data to plan instruction. Determine how to help struggling students with teacher-led Lexia Lessons, targeted
Lesson plans Years 5 6
Lesson plans Years 5 6 These lesson plans have been developed for schools to explore the topic of online bullying with their students. Introduction to the lesson plans Lesson 1: Qualities of respectful
Letters and Sounds, Phase 1, Aspect 2 General Sound Discrimination Instrumental Sounds Tuning into Sounds
Tuning into Sounds Main Purpose: To experience and develop awareness of sounds made with instruments and noise makers. Organise an area so that the children sit facing a screen. Ensure there one set of
Guideline on Windows 7 Parental Controls
CMSGu2012-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Windows 7 Parental Controls National Computer Board Mauritius
