Search Results
Multimedia Resource
Image
3, 4, 5, Elementary (3-5)
Students understand that predators are adults that form inappropriate relationships with children. They learn how to identify the steps in the grooming process and take the appropriate actions in order to protect their safety and well-being.
Student Handout
Image
3, 4, 5, 6, Elementary (3-5), Intermediate (6-8)
Fairy Tales with a 21st Century Twist: The Story of Little Red In this series, students explore online safety issues in modern adaptations of familiar childhood tales. Through the Story of Little Red, students come to understand that online friends can be impostors with harmful intentions. Students determine the central lesson by examining the events in the story. They conclude that the involvement of a parent or other trustworthy adult is necessary in unsafe online situations.
Multimedia Resource
Image
5, Elementary (3-5)
Students investigate ways safely and responsibly interact with others online. They come to understand that Internet predators exhibit a pattern of online communication and piece together personal information of their target over time. Students learn how to identify the grooming process, and they take proactive steps to protect themselves online to reduce risk.
Multimedia Resource
Image
6, 7, 8, Intermediate (6-8)
Students come to understand that not all online relationships are safe, nor are people always who they claim to be online. They learn how to distinguish between appropriate and inappropriate online contacts by examining a series of scenarios. A collaborative discussion about the grooming process enables students to recognize the tactics that unsafe online contacts use to draw minors into compromising situations.
Multimedia Resource
Image
7, Intermediate (6-8)
Students learn how to safely and responsibly interact online. They understand that unsafe contacts piece together information in online discussions as part of the grooming process. Students learn to identify key characteristics of suspicious online communication. Through collaborative discussion, students develop strategies to reduce personal safety risks involved with online relationships.
Multimedia Resource
Image
8, Intermediate (6-8)
Students simulate the process that online predators use to target youth. They determine the identity of chatroom participants though close analysis of screen names, and note the screen names that would be of particular interest to an online predator. They review key characteristics of the grooming process and devise techniques to reduce personal safety risks involved with online relationships by incorporating information delivered through the multimedia presentation and discussion.
Student Handout
Image
K, 1, 2, Primary (K-2)
Students follow dialogue between characters Dot & i as well as informational text. They come to understand that a website has an address called a URL. Students identify the basic parts of a URL.
Student Handout
Image
K, 1, 2, Primary (K-2)
Students follow dialogue between characters Dot & i to learn that Web browsers are a type of software application. They identify different types of Web browsers, locate basic components of Web browsers and explore child safe browsers.
Student Handout
Image
K, 1, 2, Primary (K-2)
Students follow dialogue between characters Dot & i as well as informational text. They learn that the World Wide Web enables people to navigate the Internet: search for information, click on links and visit websites with words, pictures and videos.
Student Handout
Image
K, 1, 2, Primary (K-2)
Students follow dialogue between characters Dot & i to learn that the Internet is a giant system of networks; connected computers, devices that can communicate with one another. They then identify an adults to whom they will ask for permission before using the Internet.
Student Handout
Image
K, 1, 2, Primary (K-2)
Students acquire and use age-appropriate technical terms related to information and communications technology, online safety and security. They practice technical skills, and they ask and answer questions about narrative and informational texts including a video featuring Dot & i.
Teacher Reference Page
Image
3, 4, Elementary (3-5)
Students come to understand that online games and gaming apps are software programs made up of code. Students design a game using a symbolic code to write a set of instructions and relate to principles of coding to game development and programming. The lesson may serve as an introduction to STEM/STEAM programs.
Student Handout
Image
3, 4, Elementary (3-5)
Students come to understand that online games and gaming apps are software programs made up of code. Students design a game using a symbolic code to write a set of instructions and relate to principles of coding to game development and programming. The lesson may serve as an introduction to STEM/STEAM programs.
Student Handout
Image
5, 6, Elementary (3-5), Intermediate (6-8)
Students develop digital literacy skills. They determine ways that organizations effectively use webcams to promote a cause by evaluating a series of websites. They learn that these sites may allow online ads to generate financial support, and develop guidelines for public websites to follow.
Teacher Reference Page
Image
5, 6, 7, Elementary (3-5), Intermediate (6-8)
Students come to understand the security and privacy issues involved in downloading apps. They design a game by plotting (x,y) coordinates; use a symbolic code to write a set of instructions; "debug" the code, and relate to principles of coding to game development and programming in a class discussion. The lesson may serve as an introduction to STEM/STEAM programs.
Student Handout
Image
5, 6, 7, Elementary (3-5), Intermediate (6-8)
Students come to understand the security and privacy issues involved in downloading apps. They design a game by plotting (x,y) coordinates; use a symbolic code to write a set of instructions; "debug" the code, and relate to principles of coding to game development and programming in a class discussion. The lesson may serve as an introduction to STEM/STEAM programs.
Student Handout
Image
5, 6, 7, 8, Elementary (3-5), Intermediate (6-8)
Students come to understand that digital citizens are creators and consumers of digital media. They identify types of media, discuss the role of media in the modern world, define media literacy, and conclude the importance of media literacy in today's society.
Student Handout
Image
5, 6, 7, 8, Elementary (3-5), Intermediate (6-8)
Students come to understand that online resources are not always reliable. They conduct a Web search on a number of given topics and use a set of criteria to determine whether an online source is valid, reliable and credible. They ensure that information is accurate. Students support their conclusions with reasoning and examples.
Student Handout
Image
5, 6, 7, 8, Elementary (3-5), Intermediate (6-8)
Students develop media literacy skills during an election year. They examine current events, and identify the ways that candidates use media coverage to their advantage. Students learn to distinguish fact from opinion, and determine the influence of media on societal perceptions.
Student Handout
Image
5, 6, 7, 8, Elementary (3-5), Intermediate (6-8)
Students learn how to develop effective search queries that produce higher quality results. They identify relevant and valid information from credible sources when using the Internet for information and research. Students acquire age-appropriate technical knowledge by learning about various types of search engines and operations.
,
Citizenship Rights
Theme Image
Image
,
Safety
Theme Image
Image
,
Identity Management
Theme Image
Image
,
Safety
Theme Image
Image
,
Technology Literacy
Theme Image
Image
,
Media & Information Literacy
Theme Image
Image