Vocabulary: These words will help you understand this lesson.



Similar documents
Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

National Cybersecurity Awareness Campaign. Kids Presentation

Affirmative Action Presentation

Related KidsHealth Links

E-Safety Issues and Online Safety

Social Media and Cyber Safety

Online Safety for Middle and High School

FIRBANK GRAMMAR SCHOOL

BE SAFE ONLINE: Lesson Plan

Protecting Yourself from Identity Theft

E-Safety Issues and Online Safety

This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet.

Safety Tips for Social Networking

Hint: Best actions: Find out more in videos and FAQ: Hint: Best actions: Find out more in videos and FAQ:

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

STOP. THINK. CONNECT. Online Safety Quiz

Internet Quick Start Guide. Get the most out of your Midco internet service with these handy instructions.

Guideline on Windows 7 Parental Controls

Sibford School Student Computer Acceptable Use Policy

Identity Theft Protection

Cyber Security Awareness. Internet Safety Intro.

Security Fort Mac

Protect yourself online

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:

To learn more about social networking, see the handout titled Know Social Networking.

Online Safety How to Protect Yourself and Your Family

Protection. Identity. What should I do if I m. Common ID Theft TACTICS. a criminal obtains your personal information and uses it for his/her own gain.

Youth Online Behavior

E-Safety Issues and Online Safety. Parents Evening

i-safe CURRICULUM SCOPE Elementary Grades K - 5

Internet Safety/CIPA Lesson Plan

Social Networking Sites A Predator s Playground?

Digital Citizenship Lesson Plan

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau

Standard 9: The student will identify and explain consumer fraud and identity theft.

SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?

Share Aware Lesson 2 - Lucy

Related KidsHealth Links. Discussion Questions

How to Prevent It What to Do If You Are a Victim

Cambridge ESOL Certificates in Skills for Life Speaking and Listening Mode Level 1 Past Paper 6

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:

Class 2: Manage Your Digital Footprint. Student Handbook

Internet basics 2.2 Staying safe online. Beginner s guide to. Basics

i-safe K 12 CURRICULUM SCOPE 06-07

Social Network Security. Frank K. F. Chow Vice-Chairperson Professional Information Security Association (PISA)

Protection from Fraud and Identity Theft

2012 NCSA / McAfee Online Safety Survey

Activities for Protecting Your Identity and Computer for Middle and High School Students

Standard 9: The student will identify and explain consumer fraud and identity theft.

Cybersecurity Protecting Yourself, Your Business, Your Clients

Staying Safe Online. A Practical Guide for Parents and Children.

PROTECTING YOUR DIGITAL LIFE

ONLINE SAFETY TEACHER S GUIDE:

When you are prompted to enroll, you will be asked to enter a Security Phrase and select/answer three different Challenge Questions.

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential

Beware! Identity Theft

Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability

Common Facebook issues

Case study: What the? Online scams and identity theft

Protect Your Personal Information

National Cyber Security Month 2015: Daily Security Awareness Tips

The Basics of Building Credit Answer Guides

TECHNOLOGY. Telecommunication. Tools. What is cyberspace? How does the. Internet work? How do you protect. your computer? Focus

By Shanthi Balraj Ambigapathy Pandian Mohammed Zin Nordin Sumetha Nagalingam Julina Ismail

Learn to protect yourself from Identity Theft. First National Bank can help.

(EMC) ELECTRONICALLY MEDIATED COMMUNICATION. Communication sent via a channel such as a cell phone or the Internet (versus face-to-face).

Beware! Consumer Fraud

2014 Teen Internet Safety Survey. Conducted by The Futures Company

Frequently Asked Questions

Online Security Tips

Introduction to Computer Security

Transcription:

Internet Activities Vocabulary: These words will help you understand this lesson. Word/Term computer Internet chat room Definition Materials Needed: pen or pencil access to computer / Internet electronic device that executes the instructions in a program the Internet, sometimes called the Net, is a worldwide system of computer networks that allows users to send and receive information from other computers an area online where you can chat with other members in real time Journal Entry Do you have access to a computer on a regular basis? What would you use the computer for if you did? Do you have Internet capabilities? How much time have you spent on the Internet? In your journal write your thoughts about your knowledge or lack of knowledge of computers and Internet usage. Get off to a Good Start If you have daily access to the Internet answer the Official SAT Question of the Day at http://apps.collegeboard.com/qotd/question.do Do this daily. Create a free account. Also get in the habit of doing the New York Times Test Prep Question of the Day at http://www.nytimes.com/learning/students/satofday/ 123

Computer 101 When you get to college many students will have their own computer. Many will have used the computer and the Internet on a daily basis. You will have access to a computer at college even if you don t have your own. Most likely you can obtain access to a computer in the college library and/or a computer lab. With a little practice you can catch up easily. You will have many experts to help you. They will not be your professors, but your fellow students. Computers are showing up everywhere you look, and even in places you can t see. Computers check out your groceries, run your I-Pod, dispense money at the ATM, control the way your car runs. They re everywhere! For the New Internet User A computer is an electronic device that executes the instructions in a program. The computer accepts data (input), processes data, produces output, and stores the results. The computer does this with tremendous speed, reliability (except for human error), and stores huge amounts of data (information). Word processing is the most used computer application. There are many word processing programs. Probably one of the best known programs is Microsoft. Computers have replaced the typewriter. One of the best features is that documents can be revised and corrected before they are ever printed. You will most likely use a computer in whatever career you end up in. So learn how to use a computer if you don t already know how. Your Assignment is to Learn about the Computer Many Internet sites offer information on computer basics and some even offer tutorials. By just writing computer basics on the Internet space you will have a variety of sites from which to choose. One tutorial program is called Jan s Illustrated Computer Literacy 101: Computer Basics, http://www.jegsworks.com/lessons/lessonintro.htm It is free and easy to use. Log onto one free tutorial site and explore the unknown. Language Arts Unit 5 Option: Preparing for College 124

For the Experienced Internet User Internet SCAVENGER HUNT Find the information on the Internet for the following questions. 1. In the United States what state is the most eastern state? 2. Who said, Give me liberty or give me death and when was it said? 3. What famous painter cut off his ear? 4. What is the origin of the song Ring Around the Rosie? 5. Name two wonders of the ancient world. 6. Name two wonders of the modern world. 7. What is the longest man-made structure in the world? 125

8. How tall is the Matterhorn? 9. What is the state bird of Virginia? 10. Who was the 19 th president of the United States? 11. Name the seven dwarfs. 12. What is the most venomous creature on earth and where does it live? 13. Who was the first woman in space? 14. What is the current weather in Mexico City? 15. What is today s main news story? Language Arts Unit 5 Option: Preparing for College 126

16. Find the following information for any 2 colleges. a. Can you apply online? How difficult is the application to fill out? b. Does it give information of the variety of students enrolled? How diverse is the college? c. Can you take a virtual tour? (If so take the tour.) d. What impressed you most about the college from the online information? Name of College: a. a. Name of College: b. b. c. c. d. d. For All Internet Users Internet-Related Safety Unfortunately the Internet has become a tool of people who do not always have good intentions. The key is to learn danger signs and protect yourself online. MySpace.com, AOL, Facebook, Hoverspot, and Tagged are online networks that allow users to visit using text, sound, and images for everyone to see. There are millions of users. A series of questions including name, birthday, birthplace, best physical feature, are among the many types of data creating a profile. Most profiles include a photo. Often more personal data is given such as body type, education level, cell phone numbers, and even addresses. None or all the information may be accurate. These online networks allow users to chat with friends and strangers. Users of the sites can browse for members using the profile criteria given. One of the dangers of these online chat rooms is that the information you post becomes accessible to people you don t even know. Some profiles contain just enough information that a resourceful user can contact you. Posting your first name, school mascot, and sports team gives another user enough information to physically find you at school. 127

Posting personal information can be dangerous in itself. Engaging in conversation with people you don t already know can create new dangers. By not giving a name, online chatters allow predators to alter their profile to interest you. You may believe you are talking to young person only to find your new friend is actually a middle aged man. In chat rooms use a nickname that is different from your screen name. If needed you can exit without having someone track you down via e-mail. It is possible to set up private chat rooms where you invite only certain people to enter to chat. Posting Is Forever Anything you post online can be edited and can be saved while e-mailing. Any user can save, keep or distribute photos or text from a Web page. This means that suggestive photos, photos depicting drug use, gang signs, threats against others or language indicating criminal behavior are all potentially permanent collector s items for classmates, friends, enemies, parents, total strangers, and law officials. Predators are constantly searching for personal information online, and there are many different sites where they can find it. Identity Theft Sharing too much personal information online, such as full name and birth date, may allow a criminal to steal a user s identity. Never give out your social security number to someone who requests it. One strategy to steal your identity is to distribute spam that prompts you to send personal information such as your social security number to obtain a (false) benefit. Another way is by creating phony websites to get users to enter account numbers or passwords. BEWARE! The IFCC (Internet Fraud Complaint Center) report provides a lengthy list of rules for dealing with the various types of fraud that may be encountered on the Internet. A frequently repeated warning in the report concerns giving out personal information via the Internet -- the general rule is DON T DO IT. Before giving information or money, thoroughly check out the individual or company. The IFCC received almost 50,000 complaints last year and referred nearly 34,000 for possible investigation by law-enforcement agencies. Language Arts Unit 5 Option: Preparing for College 128

Other Problems E-mail is relatively private, but hackers can still gain access and add you to their spam lists. Spam blockers can keep your mailbox relatively free of spam. If you don t recognize the sender of a document, delete it without opening it. A virus may be sent to disrupt your computer. Virus protection software is a must. If you ever get involved in a chat room conversation that makes you uncomfortable or afraid for any reason, exit, and tell someone immediately so they can report the incident. The form for reporting this type of incident is called a CyberTipline The Internet has a world of possibilities. Some are good and some are bad. The Good Access to museums and libraries all over the world Instant access to the latest news and events Instant access to friends, family and business associates Shop from home Consumer information Trivial knowledge Entertainment music, books, movies The Bad SPAM Viruses and bad software that find its way into computers Deceptive marketing Online stalking of people, especially children Easy access to pornography Can be a time-waster 129

17. Self Assessment of Your Internet Capabilities. a. What do you know? b. What do you need to find out? End of Language Arts Unit 5 Option: Preparing for College 130