Hector s World Lesson plan Episode: Computer security: Oops Upper primary

Similar documents
Hector s World Lesson plan Episode: Computer security: Oops Lower primary

Hector s World Lesson Plan Interactive Episode Computer Security: Oops Ages 8 9

Hector s World Lesson Plan Episode: Cyberbullying You re Not Alone Upper primary

STOP. THINK. CONNECT. Online Safety Quiz

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives

behind the scenes curriculum mapping: primary The following curriculum mapping is relevant for all 10 episodes of THE LION KING - Behind The Scenes

This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet.

Upper primary unit. Don t be fooled.

Share Aware Lesson 2 - Lucy

Basic lesson time includes activity only. Introductory and Wrap-Up suggestions can be used

School. Lesson plan. Topic. Aims. Age group. Level. Time. Materials. School, school objects, rules, subjects, rooms and uniforms

Music, Film, TV and the Internet. A guide for parents and teachers

National Cybersecurity Awareness Campaign. Kids Presentation

THE LITTLE BIG BOOK OF BADNESS

Money and shopping 8.1 Online banking. Beginner s guide to. Wider interests

ONLINE SAFETY TEACHER S GUIDE:

Advice for Class Teachers. Moderating pupils reading at P 4 NC Level 1

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:

Upper primary unit. Sharing personal information.

My Family FREE SAMPLE. This unit focuses on sequencing. These extension

Online financial transactions be savvy and safe. Lesson description. Enduring understanding/deep learnings: Year level: Year 9 and 10

PEER PRESSURE TEACHER S GUIDE:

Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability

Music, Film, TV and the Internet. A guide for parents and teachers

Upper primary unit. Cybersafety.

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

i-safe CURRICULUM SCOPE Elementary Grades K - 5

2 nd - Watch My Online Neighborhood Video: online- neighborhood

Hints and tips on how to get the most out of the performance. Book 4. Acting tips

Making a Video Year Six

Animals that move slowly, animals that move quickly

Keeping your online health and social care records safe and secure

INTERNET SAFETY: VIRUS: a computer program that can copy itself and infect your computer. CAPTCHAS: type the letters to set up an online account

Class 3: Identify Tricks and Scams Online

SHARING CONCERNS WITH PARENTS

Fun Learning Activities for Mentors and Tutors

TKT Online. Self-study Guide

YOUR PRESENTERS TODAY S WORLD. Maryly Skallos Technology Coordinator St. Thomas the Apostle School mskallos@stthomasgr.org

Materials and Preparation Preview the video, Mindful Messaging, and prepare to show it to students.

Case study: What the? Online scams and identity theft

SENIORS ONLINE SECURITY

YOUNG PEOPLE, MUSIC & THE INTERNET A GUIDE FOR PARENTS, CARERS AND TEACHERS ABOUT DIGITAL MUSIC AT HOME, AT SCHOOL AND ON THE GO

HEADS up. stop think connect

Information Security

The Court and your child:

Digital Citizenship Lesson

1 Online! 1 Listen and sing. 2 Look and ask a friend. LESSON 1

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Trial Copy. Guidelines for the Finance Coach TRAINING 3: PLANNING. Recommended for pupils in Years 7 to 9 (German school system)

Music and the Internet. A guide for parents and teachers

MoneySmart Rookie Community educator guide. Financial literacy for young people

Stock Market Challenge Maths, Business Studies and Key Skills Development. Dealing Room Game Teacher s Guide

Guidelines for Preventing and Dealing with Bullying Issues

Game 9. Overview. Materials. Recommended Grades 3 5 Time Instruction: minutes Independent Play: minutes

Celebrating Our Constitution

The band. 4 Write sentences: Here students must rewrite the sentences given as negatives under the pictures.

NSPCC s Share Aware Teaching Guidance

"Why is it important for ELL students to be active in listening, speaking, reading and writing on a daily basis?"

WHERE ARE YOU GOING WHERE HAVE YOU BEEN?

Haslingden High School

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:

Our Lady of Lourdes Catholic Nursery & Primary School. Modern Foreign Language Policy

Fraud Protection module

1. Provide a knowledge base 2. Create an atmosphere 3. Present a stimulus 4. Generate questions 5. Facilitate a discussion

Retail/Consumer Client. Internet Banking Awareness and Education Program

Viruses, Worms, and Trojan Horses

Chapter 8: Critical and Creative Thinking Skills

Thank you for choosing Zoom Internet!

Lesson Plans for ESL Kids Teachers

PREVENTING HIGH-TECH IDENTITY THEFT

14.95 USD Euro Kč. Copyright 2010 by AVG Technologies, N.V. Claude Debussylaan 46, NL-1082 MD, Amsterdam, Netherlands

SCOTTISH RESOURCES. First Level/Second Level Autumn Tuesdays and 23 September BBC Radio 4 digital (terrestrial, cable, satellite)

Activities for Protecting Your Identity and Computer for Middle and High School Students

Safe Street Crossing is the first class we offer addressing road safety and transportation choices. 2nd grade: Pedestrian Safety Unit

Cyber Security. Maintaining Your Identity on the Net

Educator s Guide to Digital Citizenship: Responsibility and Digital Reputations

EADS up. stop think connect

An Enquire guide for young people

Tools to Use in Assessment

Storytime Crosswalk Connections: How the Six Skills and Five Practices Meet at the Library!

CYBERBULLYING TEACHER S GUIDE:

Internet Safety/CIPA Lesson Plan

Pre-K. Animals Around Us. Differentiated Resources. English Language Learners... 2 Three-Year-Olds Small Groups...5-6

It was late at night and Smartie the Penguin was WIDE awake He was supposed to be fast asleep but tomorrow was his birthday. He was so excited; all

i-safe K 12 CURRICULUM SCOPE 06-07


Middle secondary unit. Ethical use of technology.

How To Teach Your Students To Be Respectful

Moses. July 11-12, God has a plan for us. Exodus 2-4; Jeremiah 29:11

Part 5. Dinosaur School Notes to Teachers. 1. Introduction. 2. Iguanodon Unit: How to be Successful in School

username password school code school.ebonline.co.nz THE BRITANNICA SCHOOL USER GUIDE

2. _General Help and Technical Support

LESSON 2: JESUS, THE LIGHT OF THE WORLD, IS BORN

Teacher Training Guide

Lesson plans Years 5 6

Letters and Sounds, Phase 1, Aspect 2 General Sound Discrimination Instrumental Sounds Tuning into Sounds

Guideline on Windows 7 Parental Controls

Dr. Candace Walkington, Assistant Professor of Mathematics Education Southern Methodist University

Transcription:

Hector s World Lesson plan Episode: Computer security: Oops Upper primary BACKGROUND Students of this age are emerging users of internet-enabled computers. They may be involved in a range of online activities including: playing online games against other players, participating in online communities, using search engines to research school projects and homework, communicating using ICT (such as IM and email), creating and posting content online and searching for and downloading digital material, such as music. This lesson aims to assist students to recognise some of the security risks associated with computers, particularly identifying viruses as programs that can damage a computer (including pop-up files). It explores basic strategies to prevent virus infection and demonstrates safe computer use practices when using the internet, such as using strong passwords and password protection. The lesson plan also highlights the importance for students to turn to a trusted adult or carer for help. OBJECTIVES: Students will: 1. understand that strong passwords can help protect computer files and information 2. understand that a computer virus can harm a computer, but users can take steps to prevent this. CURRICULUM LINKS This lesson plan supports the National Framework for Values Education in Australian Schools, including the Nine Values for Australian Schooling. For more information, visit: www.valueseducation.edu.au/verve/_resources/framework_pdf_version_for_the_ web.pdf www.valueseducation.edu.au/values/val_national_framework_for_values_educati on,8757.html The lesson plan supports the national Statements of Learning in ICT for Year 5: Communicating with ICT Students have opportunities to use different digital media to improve the communication of ideas, express a personal image and establish an identity. They reflect on experiences to analyse the delivery and effectiveness of the communication. Page 1

Teacher s hints Ethics, issues and ICT Students apply codes of practice that promote safety, responsibility and respect when working in online and stand-alone environments. They examine practices in a variety of ICT environments to recognise the underlying values. They recognise the importance of acknowledging the owner(s)/creator(s) of digital work and establish sound practices for acknowledging them. Students implement a range of preventative strategies for addressing health and safety issues when using ICT and develop and apply strategies for the security of personal information. The Year 5 statement is available at: www.curriculum.edu.au/verve/_resources/stmntlearning_ict_2008.pdf Cross curriculum links This lesson plan can be used in any of the following subjects and topic areas: the arts communication health identity personal development science and technology SOSE/HSIE. SUGGESTED LESSON PROGRESSION Although this lesson may stand alone, students will find it easier if they have already been introduced to Hector s World, and the lesson is used as part of a unit on Hector s World and online safety. There are two activities to reinforce the lesson plan concepts. You should print, copy and prepare these before the lesson. The activities are included at the end of this plan, along with additional extension activities and learning links. The episode contains two Pause points classroom discussion. to provide an opportunity for Introduce the animation to the class by asking who is familiar with Hector s World. Allow students to share some of their previous knowledge. Explain, for anyone who is not familiar with the resource, that Hector and his friends use lots of technology in their world under the sea, Silicon Deep. They like to learn about helping each other and being good digital citizens. This episode is about a computer virus. Ask the students: Who has heard the term computer virus? What is a computer virus? What does a computer virus do? Page 2

Acquaint students with the term computer virus through a short discussion. Some students at this age may know the terms virus, anti-virus, pop-up window, spyware or malware. They may have a basic understanding that a computer virus can harm or damage computer files. Record new or unfamiliar vocabulary arising from discussion on the board. Explain that in this episode, Sprat s computer is infected with a virus just as his friends are about to watch something very special on it. He will need some help to sort out the problem. ACTIVITY 1. Before viewing the animation Show students the picture of the pop-up window from the episode (Image 1 attached). Ask students to look for this pop-up window scene and watch closely what happens to the computer. 2. View the animation View Hector s World Episode: Computer security: Oops. A pause point symbol will appear in the episode in the lower right corner, three seconds before the point to stop the video. Pause point 1 At the first pause point, stop the animation and allow students time to digest Sprat s problem and share some ideas about possible solutions. Ask the students: What do you think has happened to Sprat s computer? Sprat has invited all his friends to watch the special concert on his computer and now his computer has broken down. How would Sprat be feeling right now? Create a list of words on the board (or large paper) that students use to describe Sprat s feelings. This will be used later in the student activities for this lesson. The list is likely to include: unhappy, scared, worried, afraid, sorry, sad, upset, tricked, bad. What can Sprat do to solve his problem? Additional questions: These questions explore Sprat s need to find a resolution quickly and how this might make him feel. Do you think other stories and pictures Sprat created on his computer will be safe? Page 3

What could happen if Sprat tries to fix the computer himself? What could Sprat say to his friends who are here to watch the concert? How did Hector and Tama feel when Sprat rushed out? Who can Sprat turn to for help? Resume the animation. Pause point 2 At the second pause point, stop the animation and allow students time to digest the question and share some ideas. Ask the students: What could Ranjeet say to make Sprat feel better? Using the list created at Pause point 1, ask students what Ranjeet could say if Sprat is feeling: for example unhappy, scared, worried, afraid, sorry, sad, upset, tricked or bad. Conclusion of the animation Immediately following the viewing, briefly discuss what happened in the animation focussing on Sprat s advice at the end and Sprat s strategy to solve the problem. New vocabulary and the list of words describing how Sprat felt will aid the discussion. Discuss the key points in the episode: Sprat s Dad used his strong password to log on to the computer. Sprat clicked on a pop up window. A virus caused Sprat s computer to stop working. Sprat sought help and did not try to fix the computer himself. Sprat s friends help him to feel better. 3. Review and consolidation of learning Student activity 1: What happened next? Organise students into small groups to complete the Student activity 1: What happened next? Students work together to place the story strips from the activity sheet in the correct order. Each story strip highlights a key point in the story. This activity helps students recall the important messages. You need to prepare the student activity sheets prior. Alternative activity: Students work in a group of eight, each with a story strip. They line themselves up in the correct order of the story. The teacher may ask each group member to read out or act out their part of the story. Page 4

Teacher s notes Student activity 2: Key Ideas Distribute Student activity 2: Key Ideas to students. Direct students to complete the activity sheet. Students can work in pairs to write down the key messages in the story in their own words. Words from the list on the board created during discussion and pictures on the activity sheet will assist students to recall the key messages. This can also be assigned as a homework activity. Student activity 3: Using passwords to protect valuable information SUGGESTED LESSON PROGRESSION: A student s first introduction to a computer password may be when they begin using a school network or a shared classroom computer. This activity introduces the concept of a strong password. The activity encourages students to draw a picture that helps them remember their password. In some school environments young children may share a class password to access a class blog or a shared area of a computer network. Teachers can encourage the use of a strong password in this situation and reinforce the concept that passwords protect files and information that are important to us as a group. Introduce the activity by determining students current knowledge about passwords and their purpose. What is a password? Who uses passwords? Why are passwords used? Why do people keep their passwords secret? What happens when someone guesses a password? What is a weak password/what is a strong password? Often young students will consider using the name of a favourite pet, a birthday or a nickname as a password. It is important to help students understand that their friends may already know this information. They may also consider an easy to remember number sequence e.g.12345 or even the word password. It is important to help students understand the difference between a weak password and a strong password. You may like to display some examples on the board. Explain that this lesson will assist students to make up a strong password. A strong password is made of letters, numbers and symbols combined in a way that no one can guess. Page 5

Explain that writing the password down means that someone may see it and it will no longer be a secret password. Drawing a picture can be a way to help remember a password and still keep it secret. Distribute the Make a strong password activity sheet to students. This sheet is available on the Silicon Deep Workshop at: www.hectorsworld.com/island/main/workshop_interior_01/index.html The activity sheet encourages students to choose words, numbers or symbols from each column and combine them to make a strong password. Students can circle their choices but should try to keep them secret. Students then draw a picture that will help them remember their password and discard the top portion. Students may have computer passwords at school or home. The class may share a log-on to class materials or website. Their examples can be integrated into the discussion. Ask the group: Who uses passwords? Why do some websites use passwords? What could happen if someone knows your computer password? How does a password protect computer files? Why do we want to protect some computer files? EXTENSION ACTIVITIES FOR ALL AGE GROUPS The following are suggested activities that can be used to further extend students understanding of computer security and passwords. These are for all age groups so they can be modified to suit individual classes. Some of these activities use Hector s World resources that are available on the following websites: Hector s World pages: www.cybersmart.gov.au Information Island or Silicon Deep: www.hectorsworld.com 1. Invite an expert Invite the school computer technician or a computer technician from the local community to speak to students about the importance of computer security and what strategies are used to keep the school computers safe. Students might prepare questions in advance. 2. Drama activity Organise students into groups of six or seven to act out a mini play that retells the story. Page 6

A drama activity gives students scope to explore alternative solutions, similar events or other computer security issues. Students can use the character cards or character hats to portray each character. These resources are available from the Hector s World pages on www.cybersmart.gov.au and www.hectorsworld.com. 3. Music video and song These resources are available from the Hector s World pages on www.cybersmart.gov.au Play the music video Keep Yourself Switched On to introduce the class to the music and lyrics. The song encourages students to keep themselves up-to-date and build their skills. It includes ideas about virus symptoms and virus prevention. Song lyrics can be displayed using a data projector or printed for students to read. Other ideas In groups, students can create movements and dance steps to the song. Teach the song to another class. This teaching could cascade across the school until all students sing the song together. That is, the first class to learn the song teaches to the next. Each class teaches another until the whole school knows the song and can sing it together. Page 7

IMAGE 1: POP-UP WINDOW For use before viewing the episode. This is Sprat the fish. He is using his computer when a pop-up window appears on the screen. Look for this scene in the episode and watch what happens next. IMAGE 2: SPRAT For use after Pause point 1 How does Sprat feel? Page 8

STUDENT ACTIVITY 1: WHAT HAPPENED NEXT? Note: Play the animated episode first before completing this activity. Below are the major points in Hector s World Episode: Computer security: Oops. Students can work together in small groups to place the story strips in the correct order. The first one is numbered. Alternately a group of eight students can each be given one story strip. They must then arrange themselves in the correct order. The teacher may then ask each student to read out or act out their part of the story. Instructions: Print and make copies of this list. Cut along the lines to create individual story strips and mix their order. Give a complete set of strips to each group and ask them to find number one. Ask the students: What happened next? Groups can then work at their own pace to retell the story in the correct order. Sprat invites his friends to his house to listen to music. Sprat s Dad uses a strong password to log on to the computer. Sprat clicks on a pop up window. Sprat s computer gets a virus. Sprat s computer stops working. Sprat gets help from Ranjeet the crab. Page 9

Sprat s friends help him to feel better. The music starts and Ranjeet, Sprat and Tama dance. Page 10

STUDENT ACTIVITY SHEET 2: KEY IDEAS Sprat invited his friends to see a special online concert on his computer. The computer stopped working just before the concert was going to start. 1. Sprat s computer stopped working because 2. When the computer stopped working, Sprat felt 3. Ranjeet helped Sprat feel better by saying 4. A computer needs anti-virus software so the computer will Page 11

5. If something goes wrong with my computer I will Page 12