LESSON 0: CREATE A BOMBERBOT

Similar documents
ONLINE SAFETY TEACHER S GUIDE:

THE LITTLE BIG BOOK OF BADNESS

Page 18. Using Software To Make More Money With Surveys. Visit us on the web at:

Online Safety for Middle and High School

RingCentral for Desktop. UK User Guide

Internet basics 2.2 Staying safe online. Beginner s guide to. Basics

Windows Family Safety Filter

Why Your Business Needs a Website: Ten Reasons. Contact Us: Info@intensiveonlinemarketers.com

YOUTH SOCCER COACHES GUIDE TO SUCCESS Norbert Altenstad

Bullying 101: Guide for Middle and High School Students

UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET

Making a Video Year Six

Transportation: Week 2 of 2

Main Question 1: How and where do you or your family use the Internet - whether on a computer or a cell phone? Follow up questions for INTERNET USERS

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

6 th Grade Persuasive Essay Prompts

2 nd - Watch My Online Neighborhood Video: online- neighborhood

Easy Casino Profits. Congratulations!!

Grade 2 Lesson 3: Refusing Bullying. Getting Started

New Heavens and a New Earth Isaiah 65:17-25

STEAM STUDENT SET: INVENTION LOG

TEST-TAKING STRATEGIES FOR READING

A PARENT S GUIDE TO CPS and the COURTS. How it works and how you can put things back on track

Children and parents: media use and attitudes report

PEER PRESSURE TEACHER S GUIDE:

Keep your English up to date 4. Teacher s pack Lesson plan and student worksheets with answers. Facebook

Welcome to Northern Lights A film about Scotland made by you.

What qualities are employers looking for in teen workers? How can you prove your own skills?

The 5 P s in Problem Solving *prob lem: a source of perplexity, distress, or vexation. *solve: to find a solution, explanation, or answer for

Writing a Scholarship Essay. Making the essay work for you!

homework and revision

Click on a link below for additional information.

For parents and carers of children with autism

STEP 5: Giving Feedback

Activities for Protecting Your Identity and Computer for Middle and High School Students

5050 Getting Started

Set internet safety parental controls with Windows

Setting up a basic database in Access 2003

PT AVENUE GUIDE OVERVIEW

6th Grade ipad Setup. APS Personalized Learning Devices

Self-Acceptance. A Frog Thing by E. Drachman (2005) California: Kidwick Books LLC. ISBN Grade Level: Third grade

ScoMIS Encryption Service

Mental Health Role Plays

THE WISDOM OF 14 ACCOUNTING TEXTBOOKS.

How To Set Up A Video Referral Marketing Campaign That Spits Out Referrals & Repeat Business

CyberbullyNOT Student Guide to Cyberbullying

Why is it important?

GOD S BIG STORY Week 1: Creation God Saw That It Was Good 1. LEADER PREPARATION

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:

101 IELTS Speaking Part Two Topic cards about sports, hobbies and free time A- Z

Zero-knowledge games. Christmas Lectures 2008

Contents. The receiver

FAMILY. Reference Guide. Pogoplug Family. Reference Guide Cloud Engines, Inc. All Rights Reserved.

Learn How to Revise 1

Enrollment Specialist Volunteer Training Instructions Benefit Year 2015

CREATIVE S SKETCHBOOK

Quick Guide to Getting Started: LinkedIn for Small Businesses and Nonprofits

Digital Voice Services User Guide

The Fruit of the Spirit is Love

Provider ecorrespondence instructions when you don t have a My Secure L&I account:

Parents Corner. Habit 1 Be ProActive * You re In Charge

Society tells us otherwise. Our broke family and friends tell us otherwise.

How to setup EW-7438RPn with a Windows computer to extend an existing Wi-Fi network

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

Icebreaker: Fantastic Four

Writing Topics WRITING TOPICS

Intro to the Art of Computer Science

How to Make the Most of Excel Spreadsheets

Building Qualtrics Surveys for EFS & ALC Course Evaluations: Step by Step Instructions

Patient Education Connecting patients to the latest multimedia resources. Marra Williams, CHES

IT Information Packet

Help. F-Secure Online Backup

This is the Department s service that creates and manages unique identities, manages usernames and passwords, and provides secure access to edupass.

Chapter 28: Expanding Web Studio

worksheet: personal history questions

LESSON TITLE: Parable of the Workers in the Vineyard

Frequently Asked Questions

Christopher Seder Affiliate Marketer

User s Manual For Chambers

Phase 2 The System Specification

From a Finder window choose Applications (shown circled in red) and then double click the Tether icon (shown circled in green).

TECHNOLOGY. Telecommunication. Tools. What is cyberspace? How does the. Internet work? How do you protect. your computer? Focus

Apex Student Tutorial

Thinking about College? A Student Preparation Toolkit

Free Report. My Top 10 Tips to Betting Like a Pro With Zero Risk

Google Analytics Guide

K-1 Common Core Writing Santa Fe Public Schools Presented by: Sheryl White

How To Optimize your Marketing Strategy with Smart WiFi

Getting Started with WebSite Tonight

User Guide. Copyright 2003 Networks Associates Technology, Inc. All Rights Reserved.

Slave Computer 1 Slave Computer 2

Online Training Welcome Pack

Grade 8 Lesson Peer Influence

Exploring Media. Time. Activity Overview. Activity Objectives. Materials Needed. Trainer s Preparation. 30 minutes

Passwords: Past, Present and Future. Abstract: Passwords have been used for a long time now. According to an article in wired.

Dr. Candace Walkington, Assistant Professor of Mathematics Education Southern Methodist University

SEPTEMBER Volume 9, Issue 9 EMPLOYEES OF THE MONTH MANSFIELD OFFICE

Grade 8 English Language Arts 90 Reading and Responding, Lesson 9

Transcription:

LESSON 0: CREATE A BOMBERBOT CURRICULUM STANDARDS Recognize common uses of information technology Use technology safely and respectfully, keeping personal information private Identify where to go for help and support when faced with issues on the Internet OVERVIEW You may have remembered a society where letters were sent by post, phones only had a number pad, and television was still the most important screen in the home. Children growing up in the 21st century are born into a world surrounded by digital devices and technology that is driven by software, the computer program running on the device, rather than hardware (the machine itself). It is important for children to recognize that modern information and communication technology (ICT) has allowed humans to communicate and work in more advanced ways than ever before. From shopping to research to making friends, the Internet that we experienced in the past is a lot different than the Internet we have today with videos, games, social networks, and more. However, the Internet also has its limitations and does not necessarily need to be used in every aspect of life. Just like a computer could never replace YOU as a teacher, the Internet can never replace real human interaction. In this lesson, we will introduce your students to how they can use a website to learn about technology itself, discuss ways that technology has affected our lives, and help your students understand safety on the Internet. In today s assignment, your students will be able to create their own Bomberbot account with a unique username and password and explain why it is important to keep their account details secure. Your students will then be able to log into their Bomberbot account from wherever they are - in school or at home. Once students have logged into Bomberbot for the first time, you can help them update their account profile page with their real names so you can better keep track of how your students learn on Bomberbot. If your students are older or already have familiarity with Internet safety and creating and managing accounts, you may choose to skip this lesson. However, we recommend this introductory lesson to share your experience with technology and how the Internet works. Note: Before you start this lesson, make sure you already have a Bomberbot Teacher account (sign up at www.bomberbot.com) and have created a class with a Class Access Code for your students to connect. 1

LESSON PLAN (Estimated Time: 30-45 minutes) GOALS By the end of this lesson, students will be able to: Define the Internet and describe the role of information technology on society Understand Internet safety and keeping personal information private Understand the difference between good and bad passwords Choose a username for their Bomberbot account and share their account details with their parents KEY CONCEPTS Internet: A network of computers connected to each other that can communicate and share information Website: A location on the Internet identified with a web address (ex: www.bomberbot.com) Account: Username and password combination that allows a user to access a specific part of a website Username: A unique nickname that identifies a user of a website from other users Password: A secret code of numbers and letters that allows users to gain access to a specific location (ex: a house or a website) MATERIALS & PREP Lesson 0: Create a Bomberbot Presentation Parent Letter TEACH DIGITAL LITERACY (Estimated Time: 15-20 minutes) [SLIDE 1] LESSON 0: CREATE A BOMBERBOT Do: Explain that today you are starting a new program to learn technology with Bomberbot and that the first lesson is about the way we use the Internet. [SLIDE 2] WAYS WE COMMUNICATE Do: Discuss the impact of information technology on our society. Ask: What are some ways we communicate with each other or get information? Say (suggested): Technology in the form of computers, cell phones, tablets, and more, has changed the way people communicate, making it easier and faster to send and receive information. Do: You may want to share a personal story about how you communicated with your friends or family when you were younger, before the Internet was used on a daily basis. Discuss how things were different and how they have changed. You may want to discuss pros and cons. 2

Ask: What are some ways information technology helps us? What are some things we don t need the information technology for? [SLIDE 3] WHAT IS THE INTERNET? (WE ARE ALL CONNECTED!) Say (suggested): How has information been sent and received for many years? Postal mail was connected by a series of highways or railroads. Cables connected phone and telephone lines. Internet used to be hooked up by Ethernet cables. Today, these connections still exist, but with the rise of wireless Internet (or WiFi ) we may not be able to see all these connections, but they are there, helping to deliver packets of information from one destination on the Internet to the next. You can think of the Internet like a giant spider web where all computers in the world are connected to one another by invisible, spider-like threads. [SLIDE 4] WHAT IS A WEBSITE? Ask: What are some websites we like to visit? How do we get to this website? Say: When we go to a website, we are going to a specific place, or site on the Internet. Today, we are going to use a website called Bomberbot which has a game that will help us learn. Say: Just like every house in a neighborhood has an address, every site on the web has an address too. But instead of going to a house address like 1 Bomberbot Lane, we go to a website address, like www.bomberbot.com. Did you know? Websites can be made of numbers instead of letters! In the beginning of the Internet, many websites were just numbers like 54.172.96.178:3001. Over time, we learned to give these numbered addresses ( IP addresses ) names so it was easier to remember! Ask: What are some of your favorite websites? Has a website ever helped you learn something? Sample responses: We watch a video about biology on a science website, we read news articles online, etc. Do: If you have a smartboard, fill in the blank with suggestions of child-safe websites or websites you have used a class. [slide 5] INTERNET SAFETY Say: When we go onto the Internet, sometimes we have to be careful, because everything is open and public for anyone to see or use on the Internet - unless it is protected or kept safe. Imagine that you can knock on anyone s door and go inside the house. That is what any website on the Internet is like - unless it is a password protected website. If you are also visiting someone s house, it is also a good idea to let the person living in the house know who you are. If you knock on the door, the people inside might look through the door or window to see 3

who you are. If they know you, they know it is safe to let you in. But a website cannot see you, so how does the website recognize you? [SLIDE 6] WHAT IS AN ACCOUNT? Say: That s why we need to create an account, a special key that lets the owner of the house (the website) know who we are. This also allows us to come back to the house again quickly and easily. On Bomberbot, this is called your Bomberbot account. Your Bomberbot account allows you to create your very own Bomberbot inside of the website. You can access your Bomberbot in a place on the website that no one else but YOU can enter. It is like your account lets you open up a special room (the platform) in the house (the website). This room (the platform) will look different than someone else s room (platform), because of what you do inside of the room (the platform), such as the games you played, or where you decide to put things. Anyone can go to a website but you need your own account to access your own part of the website. Anyone else that wants their own room with their own Bomberbot needs their own account, or their own special key. YOUR special key will not let you into their room, and their special key will not let them into YOUR room! Your account has two different parts: your username and your password. Together, these prevent other people from getting into your room. [SLIDE 7] CHOOSE A GOOD USERNAME Say: You should never tell anyone your real name on the Internet, because you do not always know who the owner of the website is or what they are going to do with your information. That s why we need to create a different kind of name called a username. A username is like a nickname on the Internet. Superheroes, for example, never give away their real identity. They have code names or usernames just like you! Usernames should be easy for you to remember but also special. No two people can have the same username on the same website. Do: Discuss examples of good and bad usernames and what makes them good or bad. Have students come up with examples of usernames and have the class judge whether or not they are unique, do not give away personal information, and are appropriate. Suggested examples of good usernames: NinjaTurtle17, Princess138, RocknRollKid (These are good user names because they are unique and do not give away personal information, such as real name or contact information). 4

Suggested examples of bad usernames: Joris, YouSuck, 14AmstelRd, Me (These are bad user names because they are not unique and/or give away personal information, such as real name or contact information). [SLIDE 8] CHOOSING A SECURE PASSWORD Say (suggested): Having just a username is not a good enough key to open the special room in the website. Otherwise, anyone who has your username can just enter. You also need a password. A password is a secret code made up of letters and/or numbers that only you know for your account. Passwords usually need to have a certain number of characters for them to be good, strong passwords. In Bomberbot, your password needs to be at least 6 characters. Uppercase and lowercase matters! Do: Discuss good and bad examples of passwords. Create practice passwords as a class and discuss whether or not they are secure. Suggested example of bad passwords: password, bomberbot, hello o Easy to guess o Less than 6 characters Suggested examples of good passwords: horsewindowseven, 16071928 o Easy to remember o Can be random words or numbers strung together o At least 6 characters long MISSION 0: CREATE A BOMBERBOT (Estimated Time: 10 minutes) [SLIDE 9 & 10] SIGN UP ON BOMBERBOT.COM Do: Children should go to www.bomberbot.com and create a Bomberbot account by clicking Sign Up and choosing I m a Kid. If there are not enough devices for all students, have students take turns signing up. Say: To join your classmates on Bomberbot, we need a Class Access Code, which is [CODE]. This allows you to see and play, for example, the levels of other students in your class - but not the levels of other students in other classes or even in other schools. Do: Give your students the Class Access Code. The Class Access Code is the special code that allows students to connect to the Class (vs. a Class in another school). Once students sign up, you should be able to see them in your Student List in My Classes. Teacher Note: If you have already created accounts for students in My Classes, you can explain that you are the owner of this house and you ve already created an account for your students and 5

have already given them access to their own room and allowed them into the Class. Provide them with their account details (username and password). [SLIDE 11] KEEPING YOUR ACCOUNT DETAILS SAFE Do: Give students their Parent Letter where students should write down their username and password and share it with their parents when they go home. Say: If you have an important key for your room in your house, you don t want to lose it, and you don t want to give it to strangers. You want to keep it safe! So make sure you write it down in a safe place. The only person who should know your account information is your teacher, parent, or adult that you trust. Do: Have students log in again by clicking Log In at www.bomberbot.com. They should refer to their account details on their Parent Letter if they forget. Say: Great! Now let s practice logging into Bomberbot to make sure it works. We won t be starting on Bomberbot today, but we will get set up to make sure everything works. Ask (optional): Why do you think the password field is in blocks? (Suggested answer: To hide anyone from seeing the password around us!) Do: Once students are logged in for the first time, have them update their Account Profile with their real names. Say: The first thing you should do when you start Bomberbot is to update your secret identity on your account profile page. The only person who should know your real identity, including your first and last name, is an adult you trust, such as me, your teacher (and your parents). I need to know this information so I can help you complete Bomberbot Missions. No one else in your class or even outside of your school will know who you are with your username (unless you tell them of course!) Do: Help all students log out of Bomberbot. Say: When you want to leave your room, make sure you click Log out so no one else but you can enter your room. This is like locking the door to your room again. [SLIDE 12] GETTING HELP (Estimated Time: 5 minutes) Say: Nice work! We all successfully created our own accounts with special usernames and secure passwords. We can now safely go to our own room in Bomberbot to learn and play games, and this room will be different for every account that is made. We shared our private information only with adults we trust. Say: But sometimes some things can go wrong on the Internet. Sometimes we might see a weird image or someone might have written a comment that s not so nice. Or maybe the website is just not working. When this happens, there are a couple of things we can do: 6

Check that you have Internet connection. Make sure you are connected to the school WiFi or Ethernet? Try again! Refresh the website by clicking on the arrow on top of your browser (the box that holds your website), or close the website and open it again. If it still doesn t work, you can also try to turn your computer off and on. Ask a teacher or parent, describing exactly what happened. It is important that we explain the problem clearly because adults don t always see the same problem kids do. Don t get frustrated! Computers are not as smart as humans are. They don t always know what to do. Ask: What are some things that might go wrong when we try to play Bomberbot? (Suggested answer: Website doesn t work, I forgot my password, etc.) Ask: What should we do when something doesn t work the way we expect it to? (Suggested answer: Ask a teacher, describe what happened). HOMEWORK Have students take their parent letter to a parent or guardian at home. Explain that they made a Bomberbot account and what that means. Suggested questions for children to discuss with parents: What type of accounts do you have online? (Ex: E-mail, Facebook, etc.) What is some information we keep safe on the Internet? How do we know whether a website is safe or not? How do you keep your personal details online private? 7