Search Results
Student Handout
Image

K, 1, 2, Primary (K-2)
Students come to understand that, just as germs invade a person's body, computers and devices can also become infected. After following along with character dialogue between Dot & i and closely reading the informational text, students learn that infected computers do not work properly.
Student Handout
Image

K, 1, 2, Primary (K-2)
Students come to understand that, just as germs invade a person's body, computers and devices can also become infected. After following along with character dialogue between Dot & i and closely reading the informational text, students learn that infected computers do not work properly.
Student Handout
Image

K, 1, 2, Primary (K-2)
Students closely follow along with dialogue between characters dot & I as well as informational text to understand that malware infects computers. They learn about different types of malware.
Student Handout
Image

K, 1, 2, Primary (K-2)
Students closely follow along with dialogue between characters dot & I as well as informational text to understand that malware infects computers. They learn about different types of malware.
Student Handout
Image

K, 1, 2, Primary (K-2)
Students come to understand that security software protects computers and devices against malware infection. After closely following along with dialogue between characters Dot & i as well as inforamtional text, students learn how computers and devices can become infected. They gain security tips to share with their family and write a reflection on what they have learned.
Student Handout
Image

K, 1, 2, Primary (K-2)
Students come to understand that security software protects computers and devices against malware infection. After closely following along with dialogue between characters Dot & i as well as inforamtional text, students learn how computers and devices can become infected. They gain security tips to share with their family and write a reflection on what they have learned.
Student Handout
Image

1, Primary (K-2)
Students learn that a computer virus is type of program that can infect a computer through e-mail. This lesson builds upon prior learning in grade K. Students participate in collaborative class discussion and share their learning with family members.
Student Handout
Image

1, Primary (K-2)
Students learn that a computer virus is type of program that can infect a computer through e-mail. This lesson builds upon prior learning in grade K. Students participate in collaborative class discussion and share their learning with family members.
Student Handout
Image

1, Primary (K-2)
Students learn that a computer virus is type of program that can infect a computer through e-mail. This lesson builds upon prior learning in grade K. Students participate in collaborative class discussion and share their learning with family members.
Student Handout
Image

2, Primary (K-2)
This lesson builds upon the key terms and concepts introduced in grade 1. Students deepen their understanding of the ways that computer viruses enter devices. They closely follow the events in a story about i-Buddy and a computer virus. They then discuss ways to prevent viruses from infecting computers.
Student Handout
Image

3, Elementary (3-5)
Students understand that a computer virus can spread through e-mail. By building upon Grade 2 concepts, students learn how to prevent computers from being infected with viruses. Students complete a workbook to demonstrate and reinforce their learning.
Student Handout
Image

3, Elementary (3-5)
Students understand that a computer virus can spread through e-mail. By building upon Grade 2 concepts, students learn how to prevent computers from being infected with viruses. Students complete a workbook to demonstrate and reinforce their learning.
Student Handout
Image

3, Elementary (3-5)
Students understand that a computer virus can spread through e-mail. By building upon Grade 2 concepts, students learn how to prevent computers from being infected with viruses. Students complete a workbook to demonstrate and reinforce their learning.
Student Handout
Image

3, Elementary (3-5)
Students understand that a computer virus can spread through e-mail. By building upon Grade 2 concepts, students learn how to prevent computers from being infected with viruses. Students complete a workbook to demonstrate and reinforce their learning.
Student Handout
Image

3, 4, Elementary (3-5)
Students build on prior learning. They examine cyber security issues brought about by e-mail attachments. Students identify types of malware. They learn the steps to prevent malicious code from damaging a computer and use vocabulary terms in a class discussion. As evidence of their learning, students select the best response in a given scenario.
Student Handout
Image

3, 4, 5, 6, Elementary (3-5), Intermediate (6-8)
Henny Penny thinks the sky is falling because of what she receives in her e-mail inbox. Students learn about security risks associated with e-mail by determining the central lesson in the story. They acquire and use new vocabulary terms related to digital security in discussion and when answering questions about the events in the story.
Student Handout
Image

3, 4, 5, 6, Elementary (3-5), Intermediate (6-8)
Students come to understand that technology users are responsible for maintaining the security of their computers and devices. They determine the central lesson in the Story of the Pig Family; discuss digital security issues, and draw correlations with the central lesson in the traditional story of the Three Little Pigs.
Student Handout
Image

5, Elementary (3-5)
Students come to understand that malware causes damage to computers and digital devices. They learn how to identify suspicious e-mail attachments, detect the signs of an infected computer, and follow the recommended protocol in the case of compromised security. Students aquire and use domain-specific vocabulary terms: malware, malicious code, viruses, worms, Trojans and spyware.
Parent & Family Tip Sheet
Image

5, Elementary (3-5)
Students come to understand that malware causes damage to computers and digital devices. They learn how to identify suspicious e-mail attachments, detect the signs of an infected computer, and follow the recommended protocol in the case of compromised security. Students aquire and use domain-specific vocabulary terms: malware, malicious code, viruses, worms, Trojans and spyware.
Student Handout
Image

5, 6, Elementary (3-5), Intermediate (6-8)
Students come to understand that spyware is type of malicious program that tracks computer user activities and collects personal information. They learn how computers become infected with spyware, identify signs that a computer is infected, and discover ways to keep their computer and personal information secure.