Search Results
Student Handout
Image

5, 6, Elementary (3-5), Intermediate (6-8)
Students come to understand that spyware is type of malicious program that tracks computer user activities and collects personal information. They learn how computers become infected with spyware, identify signs that a computer is infected, and discover ways to keep their computer and personal information secure.
Parent & Family Tip Sheet
Image

5, 6, Elementary (3-5), Intermediate (6-8)
Students come to understand that spyware is type of malicious program that tracks computer user activities and collects personal information. They learn how computers become infected with spyware, identify signs that a computer is infected, and discover ways to keep their computer and personal information secure.
Student Handout
Image

6, Intermediate (6-8)
Students come to understand that spyware compromises personal information security. Through close reading of informational text, students learn how computers and devices become infected with spyware. They also learn how to protect their computers and devices from infection. Students add to their list of cyber security tips.
Student Handout
Image

6, Intermediate (6-8)
Students use what they know and understand about digital security to write a story for younger students. They use a variety of narrative techniques to develop the sequence of events including descriptive details and dialogue that reveal characters' thoughts and feelings. Students plan, revise and edit their literary work. They use media or illustrations to aid in comprehension. Digital publication is optional.
Student Handout
Image

7, Intermediate (6-8)
Students come to understand that spyware compromises personal information security. Through close reading of informational text, students learn how computers and devices become infected with spyware. They also learn how to protect their computers and devices from infection. Students add to their list of cyber security tips.
Multimedia Resource
Image

7, Intermediate (6-8)
Students review what they have learned about cyber security. The correlating slideshow addresses topics such as malware, e-mail protocol, Acceptable Use Policies, peer-to-peer file sharing, and the risks of digital downloads including e-mail attachments, online programs and digital content. They then review signs of digital infection and ways to prevent cyber security issues. Students then complete a media-based empowerment project that educates others about cyber security problems and solutions.
Student Handout
Image

8, Intermediate (6-8)
Students build knowledge and understanding of malware and cybersecurity protocol through close reading of informational text and collaborative discussion. Students also use graphic organizers to aide in comprehension. They practice informed decision-making by responding to a series of cyber security scenarios.
Student Handout
Image

8, Intermediate (6-8)
Students build knowledge and understanding of malware and cybersecurity protocol through close reading of informational text and collaborative discussion. Students also use graphic organizers to aide in comprehension. They practice informed decision-making by responding to a series of cyber security scenarios.
Multimedia Resource
Image

8, Intermediate (6-8)
Students review what they have learned about cyber security. The correlating slideshow addresses topics such as malware, e-mail protocol, Acceptable Use Policies, peer-to-peer file sharing, and the risks of digital downloads including e-mail attachments, online programs and digital content. They then review signs of digital infection and ways to prevent cyber security issues. Students then complete a media-based empowerment project that educates others about cyber security problems and solutions.
Student Handout
Image

8, Intermediate (6-8)
Students review the security risks associated with downloading items online. Students identify types of spyware, and describe how spyware can compromise personal information. They use technology to produce multimedia presentations that educates others about spyware.
Student Handout
Image

8, Intermediate (6-8)
Students review the security risks associated with downloading items online. Students identify types of spyware, and describe how spyware can compromise personal information. They use technology to produce multimedia presentations that educates others about spyware.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
Students learn that phishing and pharming scams disseminated through e-mail are designed to elicit personal information for the purpose of identity theft. Students identify practical ways to protect against these types of malicious attacks and empower others to do the same by designing and distributing informational flyers.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
Students investigate cyber security issues. They acquire and use technical terminology related to cyber security while discussing the ramifications for lack of security and the actions that promote the spread of malicious code. Students then describe four basic steps to ensure digital security and create informative materials to educate others.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
Students investigate cyber security issues. They acquire and use technical terminology related to cyber security while discussing the ramifications for lack of security and the actions that promote the spread of malicious code. Students then describe four basic steps to ensure digital security and create informative materials to educate others.
Student Handout
Image

1, 2, Primary (K-2)
This unit lays a foundation for digital ethics by introducing students to the concepts of intellectual property and ownership of creative material.Students learn how to ethically utilize creative material online and offline. They participate in the creative process and perform quick skits involving Dot & i for each step in the process.
Student Handout
Image

1, 2, Primary (K-2)
Students learn that the brain is responsible for different ways of thinking; logic and creativity. After following along with dialogue between the characters Dot & i, students participate in a collaborative discussion about inventions and the creative process.
Student Handout
Image

1, 2, Primary (K-2)
Students understand that an invention is often the result of creative problem solving. They learn that solutions start with a brainstorm. After following along with dialogue between the characters Dot & i, students examine inventions by kids. They practice identifying problems in brainstorming solutions.
Student Handout
Image

1, 2, Primary (K-2)
Students learn that evaluation is an important part of the creative process. They come to understand the value of feedback to improving upon an idea; also known as "innovation."
Student Handout
Image

1, 2, Primary (K-2)
Students follow along with dialogue between characters Dot & i, and they learn that an inventor's log helps a person keep track of their ideas and provides proof that they are the original owner of a project.
Student Handout
Image

1, 2, Primary (K-2)
Students understand that inventions have a name. After following along with dialogue between Dot & i, they explore different ways to come up with names for their inventions. Students learn that an invention, and its name, are forms of intellectual property.