TECHNOLOGY. Telecommunication. Tools. What is cyberspace? How does the. Internet work? How do you protect. your computer? Focus



Similar documents
STOP. THINK. CONNECT. Online Safety Quiz

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness

HEADS up. stop think connect


Bad Netiquette Stinks 2

EADS up. stop think connect

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:

ACCEPTABLE/ RESPONSIBLE USE POLICY IIBE

2 nd - Watch My Online Neighborhood Video: online- neighborhood

National Cybersecurity Awareness Campaign. Kids Presentation

Activities for Protecting Your Identity and Computer for Middle and High School Students

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:

Internet Safety/CIPA Lesson Plan

Social Networking Sites like Facebook, MSN

It s easy to protect our files our school work, our music, our photos, our games everything that we save on our computers from loss by malware.

YOUR PRESENTERS TODAY S WORLD. Maryly Skallos Technology Coordinator St. Thomas the Apostle School mskallos@stthomasgr.org

E-Safety Issues and Online Safety

Online Safety for Middle and High School

UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET

Safety Tips for Social Networking

A Publication of the GCPS Information Management Division

Staying Safe.....on social media and online

Bring Your Own Device (BYOD) Student, Teacher and Parent Guide

E-Safety Issues and Online Safety

FIRBANK GRAMMAR SCHOOL

Social Media Curriculum Overview

Vail School District Acceptable Use Policy

Adult Retrospective Questionnaire

This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet.

Cyber safety Parent Easy Guide 63

Youth Online Behavior

Teens, Online Stranger Contact and Cyberbullying What the research is telling us

STUDENT LAPTOP GUIDELINES

Class 2: Manage Your Digital Footprint. Student Handbook

SOCIAL NETWORKING SITES

School Policy Regarding Computer Use, Technology and Internet Access

ONLINE SAFETY TEACHER S GUIDE:

Teen Online & Wireless Safety Survey

Related KidsHealth Links

EDEXCEL FUNCTIONAL SKILLS ICT. Study Module 8. Using ICT to communicate

ERA6 OBJECTIVE QUSESTION

E-Safety Issues and Online Safety. Parents Evening

SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?

HOW TO STAY SAFE. Smartphones

School Technology 101 for Parents. Tips for Monitoring Your Child s Digital Life

OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan ACCEPTABLE USE POLICY

Redland Christian Migrant Association (RCMA) Internet Security and Safety Policy

Tech savvy? Lesson A Tech support. I have no idea why... UNIT. A Unscramble the questions. B Unscramble the statements.

Bring Your Own Device (BYOD) to Collegium Charter School Acceptable Use Statement and Parameters of a Pilot Program for Grades 9-12

Cyberbullying. Understanding and Addressing Online Cruelty. Students Handouts and Supporting Materials for Teachers

Cyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 )

Middle secondary unit. Ethical use of technology.

YOUNG PEOPLE, MUSIC & THE INTERNET A GUIDE FOR PARENTS, CARERS AND TEACHERS ABOUT DIGITAL MUSIC AT HOME, AT SCHOOL AND ON THE GO

Class 3: Identify Tricks and Scams Online

Internet Safety Fact Sheet Facts about Social Networking:

Technology Acceptable Use Policy

Wakefield Public Schools Technology Acceptable Use Policy

Staying Safe Online. A Practical Guide for Parents and Children.

LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET

Passwords Students should not share their assigned password, or attempt to discover the school Apple Id.

Technology (Information Technology) Benchmarks

EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No

INSTRUCTION: Instructional Services

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences

Social Networking Sites A Predator s Playground?

BUILDING DIGITAL LITERACY PURPOSE DEFINING DIGITAL LITERACY USING THIS GUIDE

Sibford School Student Computer Acceptable Use Policy

BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12. Employee Computer Use Agreement. Terms and Conditions

DIGITAL CITIZENSHIP QUIZ

It provides the performance indicators to evaluate the level of knowledge and competence of teacher to apply ICT in the educational setting.

Chatroom and messaging safety Staying away from pornography Avoiding internet bullying. Keeping your child safe on the. internet

Digital Citizenship Lesson Plan

Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability

Case study: What the? Online scams and identity theft

Media converging in the palm of your hand

Transcription:

Telecommunication Tools TECHNOLOGY The Internet is like a giant web of computers connected. The Internet is also called the World Wide Web. There are good places to go on the Internet and there are some places that are not good to go to on the We can use the Internet to get information, shop, have fun and communicate with friends We use technology at home and school. We communicate in many different ways: verbal, nonverbal, telephones, cell phones, computers, walky-talky, radio, television, signs, beepers, fax, mail, letters, stories, etc. Computers can get viruses that make them work slower or even not work at all. What is cyberspace? How does the Internet work? How do you protect your computer? 1 st 2 nd Grade Learning Goals A computer is an electronic machine that takes in information (input), works with it (processes) and then puts the information out (output). The Internet is like a giant web of computers connected with wires, cables and satellites. The Internet is also called the World Wide Web. There are good places to go on the Internet and there are some places that are not good to go to on the We can use the Internet to get information (education), shop, have fun (entertainment) and talk (communicate) with friends We use technology at home and school. We communicate in many different ways: verbal, nonverbal, telephones, cell phones, computers, walky-talky, radio, television, signs, beepers, fax, mail, letters, stories, etc. Viruses are computer programs that hurt computer systems by making them work slower or even not work at all. 1

Telecommunication Tools What is cyberspace? How does the Internet work? How do you protect your computer? TECHNOLOGY 3 rd -4 th grade Learning Goals We can use the Internet to get information, shop, have fun and communicate. We communicate in many different ways: verbal, nonverbal, telephones, cell phones, computers, walky-talky, radio, television, signs, beepers, fax, mail, letters, stories, etc. We use technology at home, work and school. Computers can get viruses that make them work slower or even not work at all. We use software programs to help prevent viruses from entering the computer and to help cure the computer if a virus does get in. Your computer can get a virus by downloading programs, games, sharing software and opening attachments from unknown sources from the Download means to receive or get a program from another computer and then save it on your own computer or on a flash drive, CD rom or other storage device. I know that to go "online," "into cyberspace," and "on the Internet" mean the same thing. The Internet is when computers from anywhere around the world communicate. Input devices take information into computers: mouse, keyboard, scanner, microphones, touch screens, student response remotes, cameras, etc. Output devices transmit information out of computers: monitor, printer, speakers, The brain of the computer is the CPU: (Central Processing Unit) 5 th - 6 th grade Learning Goals We can use the Internet to for information, communication, entertainment, We communicate in many different ways: verbal, nonverbal, telephones, cell phones, computers, walky-talky, radio, television, signs, beepers, fax, mail, letters, stories, etc. Computers can get viruses that make them work slower or even not work at all. I know that to go "online," "into cyberspace," and "on the Internet" mean the same thing. Cyberspace involves real people communicating through computers connected to the A network is a connection system that lets your computer exchange data. Network drives are where we store electronic data in school. Input devices take information into computers: mouse, keyboard, scanner, microphones, touch screens, student response remotes, cameras, etc. Output devices transmit information out of computers: monitor, printer, speakers, The brain of the computer is the CPU: (Central Processing Unit) Cookies are small computer files placed in your computer by the sites you visit. A cookie records the date and time you visited and how long you stayed. It also records which Web pages and ads you viewed. The next time you return, the site reads the cookie for preferences chosen on the last visit. Then it can present customized content and ads. 2

Personal Information Identity Theft Online communications Communicating through IM Communicating with Email SAFETY I keep safe my personal information- all of it! I never give my real name, address, phone number, the name of my school, or a picture of myself to strangers. A stranger is someone you and your family don t know well and don t trust. I will check first with a parent or trusted adult before going on the Internet, helping anyone, getting into a car or leaving with anyone. I will say NO and tell a parent or trusted adult if something makes me feel scared or uncomfortable. I only visit places my teacher tells me are safe at school when I use the computer. We are safe and smart when we login and logoff. 1 st 2 nd Grade Learning Goals I keep safe my personal information- all of it! I never give my real name, address, phone number, the name of my school, or a picture of myself to strangers. A stranger is someone you and your family don t know well and don t trust. You can t always trust people you connect to on the Internet because on the web anyone can pretend to be someone else. I will check first with a parent or trusted adult before going on the Internet, helping anyone, getting into a car or leaving with anyone. I will say NO and tell a parent or trusted adult if something makes me feel scared or uncomfortable. I only visit places my teacher tells me are safe at school when I use the computer. We are safe and smart when we login and logoff. Turn off your monitor and tell a teacher or trusted adult if you see something that doesn t look right or makes you feel uncomfortable. 3

Personal Information Identity Theft Online communications Communicating through IM Communicating with Email SAFETY 3 rd -4 th grade Learning Goals I never give my real name, address, phone number, the name of my school, or a picture of myself to strangers. I never give out my login or password. I only visit Internet sites my teacher tells me are safe at school when I use the computer. I know it is difficult to know what fact is and what fiction is on the internet. I can communicate with people on the Internet through Instant Messengers (IM is a variation of chat rooms that allow users to communicate through text messages), chat rooms (chat rooms are websites where users communicate electronically with others), and email (electronic mail). 5 th 6 th grade Learning Goals I never give out my login or password. I will not open any file that I receive over the Internet from someone I don t know. I will never respond to any messages that are rude or offensive in any way. I will never reply to, or click on a link in an IM from someone who is not a face to face friend. I know how to turn off only my monitor so I can go get a parent or teacher to show information that I know is wrong. I will show the message to my parents, my guardian, or the trusted adult in charge right away so that they can decide if it s necessary to contact the online service or other authorities. I know the difference between private (my name, address, school, email, phone number, password, pictures) and personal (my age, whether I am male or female, how many brothers and sisters, my pets, my favorite things band, food, etc) information. I know to keep my private and personal information safe (to myself). I will never meet a person that I only know online unless my parent is with me. My screen name does not tell my name, age, or whether I m a boy or girl. I know the person on the other end of my chat may not be who I think it is. I know that most of the pop-ups I get are just advertising something. I know the contests and such are just trying to get my private information. 4

Cyber Responsibilities Respecting the Law Cyberbullying Copyright Computer Ethics Netiquette ETIQUETTE We respect our computer by not pulling the keys off, keeping the icons in the same place A bully is someone who tries to hurt or embarrass another person. A cyberbully is someone who uses the Internet or cell phone to send mean pictures of words that will hurt or embarrass another person. We can not use a computer to steal someone else s words, music or pictures. We can talk or chat with people on the computer with email, instant message and chat rooms. Some games online allow you to chat with other people. 1 ST 2 ND Grade Learning Goals We respect our computer by not pulling the keys off, keeping the icons in the same place A bully is someone who tries to hurt or embarrass another person. A cyberbully is someone who uses the Internet or cell phone to send mean pictures of words that will hurt or embarrass another person. We can not use a computer to steal someone else s words, music or pictures. We can talk or chat with people on the computer with email, instant message and chat rooms. Watch out for peop le who use rude and mean language on the Internet (NetSmartz toon: Potty- Mouth Pete) Watch out for people who want to meet you somewhere when you are on the Internet (NetSmartz toon: Meet-Me Mack) Watch out for people who send pictures of things that are mean and ugly on the Internet (NetSmartz toon: Look-At-Dis Louie) Watch out for people who want to know everything about you and your family (NetSmartz toon: Wanta-Know Wally) The Copyright Law protects another person s words, images, songs or movies and makes it against the law to use them unfairly without that person s permission. You may not copy another person s words from the Internet word for word. This is not fair and breaks the Copyright Law. 5

Cyber Responsibilities Respecting the Law Cyberbullying Copyright Computer Ethics Netiquette ETIQUETTE 3 rd 4 th Grade Learning Goals A cyber bully is someone who uses the Internet or cell phone to send mean pictures or words that will hurt or embarrass another person. Plagiarism is stealing someone else s words, pictures, or music. I understand the consequences of plagiarism. I know my cyber pals are different than my face-to-face friends. I know what is allowed at school, according to the Acceptable Use Policy. Watch out for people who spend all their time on the computer and need to get a life (NetSmartz toon: The Numbut) Watch out for people who watch what you do online and try to sell you things or sell your personal information to people (NetSmartz toon: The Oogle) Watch out for people who use rude or mean language on the Internet (NetSmartz toon: The Hot-Head) Watch out for people who send junk e-mail to lots of people. It is usually stuff you don t want to see (NetSmartz toon: The Spamazoid) Watch out for people who pretend to be your friend and try to gain your trust to meet you somewhere to do mean and illegal things (NetSmartz toon: The Follow-You Fiona) 5 th 6 th Grade Learning Goals We respect our computer by not pulling the keys off, keeping the icons in the same place, and not changing the background. I know my email: dos and don ts. (Don t write in all caps, don t write mean things, do learn the emoticons) I know the dos and don t of IMing and chatting. I know my cyber pals are different than my face-to-face friends. A cyber bully is someone who uses the Internet or cell phone to send mean pictures or words that will hurt or embarrass another person. Plagiarism is stealing someone else s words, pictures, or music. I understand the consequences of plagiarism. I know what is allowed at school, according to the Acceptable Use Policy. The Internet is a large community; therefore, my behavior while on it affects others. I will always treat others the way I would like to be treated. 6

Search Engines and Directories Evaluating Websites Appropriate online research Citing resources RESEARCH Students and adults can put information on the Teachers and parents can help you decide what is good or bad information on the The Internet is like a giant library with lots of information with words, pictures, music and movies. I can search for information on the Internet using a search engine. I will not steal someone else s words, pictures or music from the 1 ST 2 ND Grade Learning Goals Students and adults can put information on the Teachers and parents can help you decide what is good or bad information on the The Internet is like a giant library with lots of information with words, pictures, music and movies. I can search for information on the Internet using a search engine. You can use information from the Internet if you put it in your own words and you tell where you got the information from. Search engines take us to places on the Internet with information about the topic we are researching. There are safe search engines for kids like: Kids Click; Ask for Kids, Yahoo Kids; Some websites are blocked in school and students will see a gray box telling you Access Denied. 3 rd 4 th Grade Learning Goals Teachers and parents can help you decide what is fact or fictional information on the It is important to use at least two different sources on the internet when researching. Be sure to cite all sources. 5 th 6 th Grade Learning Goals Teachers and parents can help you decide what is fact or fictional information on the Search engines are indexed by computer programs and directories are indexed by people. Search engines usually have many more sites indexed than do directories. It is important to use at least two different sources on the internet when researching for accuracy. Be sure to cite all sources I know how to cite my sites. I know to use several synonyms for my keyword searches to produce the best results. I know using + and signs with keywords helps refine my search. 7