Search Results
Teacher Reference Page
Image

K, 1, 2, Primary (K-2)
Students acquire and use age-appropriate technical terms related to information and communications technology, online safety and security. They practice technical skills, and they ask and answer questions about narrative and informational texts including a video featuring Dot & i.
Lesson Plan
Image

K, 1, 2, Primary (K-2)
Students acquire and use age-appropriate technical terms related to information and communications technology, online safety and security. They practice technical skills, and they ask and answer questions about narrative and informational texts including a video featuring Dot & i.
Lesson Plan
Image

9, 10, 11, 12, Secondary (9-12)
Internet users have been buying and selling online for decades, but the digital economy is not without risks. iDrive digital correspondents uncover common consumer pitfalls and security issues involved with online commerce. Students are encouraged to use critical thinking when making purchases online. Use with the iDrive Student Toolkit.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
Internet users have been buying and selling online for decades, but the digital economy is not without risks. iDrive digital correspondents uncover common consumer pitfalls and security issues involved with online commerce. Students are encouraged to use critical thinking when making purchases online. Use with the iDrive Student Toolkit.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
Students investigate cyber security issues. They acquire and use technical terminology related to cyber security while discussing the ramifications for lack of security and the actions that promote the spread of malicious code. Students then describe four basic steps to ensure digital security and create informative materials to educate others.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
Students investigate online threats to homeland security an public safety brought about by hactivists, hate groups, gangs and terrorist organizations. They acquire and use key terms while discussing the rights and responsibilities of digital citizenship. They analyze the social and legal consequences of countering these rights and responsibilities, and arrange a meeting for community leaders aimed toward devising solutions to homeland security and public safety issues that arise online.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
Students investigate online threats to homeland security an public safety brought about by hactivists, hate groups, gangs and terrorist organizations. They acquire and use key terms while discussing the rights and responsibilities of digital citizenship. They analyze the social and legal consequences of countering these rights and responsibilities, and arrange a meeting for community leaders aimed toward devising solutions to homeland security and public safety issues that arise online.
Lesson Plan
Image

9, 10, 11, 12, Secondary (9-12)
Students investigate online threats to homeland security an public safety brought about by hactivists, hate groups, gangs and terrorist organizations. They acquire and use key terms while discussing the rights and responsibilities of digital citizenship. They analyze the social and legal consequences of countering these rights and responsibilities, and arrange a meeting for community leaders aimed toward devising solutions to homeland security and public safety issues that arise online.
Multimedia Resource
Image

9, 10, 11, 12, Secondary (9-12)
Students investigate cyber security issues. They acquire and use technical terminology related to cyber security while discussing the ramifications for lack of security and the actions that promote the spread of malicious code. Students then describe four basic steps to ensure digital security and create informative materials to educate others.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
Students investigate cyber security issues. They acquire and use technical terminology related to cyber security while discussing the ramifications for lack of security and the actions that promote the spread of malicious code. Students then describe four basic steps to ensure digital security and create informative materials to educate others.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
Students investigate cyber security issues. They acquire and use technical terminology related to cyber security while discussing the ramifications for lack of security and the actions that promote the spread of malicious code. Students then describe four basic steps to ensure digital security and create informative materials to educate others.
Lesson Plan
Image

9, 10, 11, 12, Secondary (9-12)
Students investigate cyber security issues. They acquire and use technical terminology related to cyber security while discussing the ramifications for lack of security and the actions that promote the spread of malicious code. Students then describe four basic steps to ensure digital security and create informative materials to educate others.
Lesson Plan
Image

9, 10, 11, 12, Secondary (9-12)
Students learn that phishing and pharming scams disseminated through e-mail are designed to elicit personal information for the purpose of identity theft. Students identify practical ways to protect against these types of malicious attacks and empower others to do the same by designing and distributing informational flyers.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
Working in collaborative groups, students engage in a short research project on a specific type of malware. They create multimedia presentations that integrate multiple sources of credible information and include source citations. As experts on the subject, students define aspects of digital security and inform on how the audience can better protect their computers and devices from malicious code such as viruses, Trojan horses, worms, and spyware.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
Working in collaborative groups, students engage in a short research project on a specific type of malware. They create multimedia presentations that integrate multiple sources of credible information and include source citations. As experts on the subject, students define aspects of digital security and inform on how the audience can better protect their computers and devices from malicious code such as viruses, Trojan horses, worms, and spyware.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
Working in collaborative groups, students engage in a short research project on a specific type of malware. They create multimedia presentations that integrate multiple sources of credible information and include source citations. As experts on the subject, students define aspects of digital security and inform on how the audience can better protect their computers and devices from malicious code such as viruses, Trojan horses, worms, and spyware.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
Working in collaborative groups, students engage in a short research project on a specific type of malware. They create multimedia presentations that integrate multiple sources of credible information and include source citations. As experts on the subject, students define aspects of digital security and inform on how the audience can better protect their computers and devices from malicious code such as viruses, Trojan horses, worms, and spyware.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
Working in collaborative groups, students engage in a short research project on a specific type of malware. They create multimedia presentations that integrate multiple sources of credible information and include source citations. As experts on the subject, students define aspects of digital security and inform on how the audience can better protect their computers and devices from malicious code such as viruses, Trojan horses, worms, and spyware.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
Working in collaborative groups, students engage in a short research project on a specific type of malware. They create multimedia presentations that integrate multiple sources of credible information and include source citations. As experts on the subject, students define aspects of digital security and inform on how the audience can better protect their computers and devices from malicious code such as viruses, Trojan horses, worms, and spyware.
Lesson Plan
Image

9, 10, 11, 12, Secondary (9-12)
Working in collaborative groups, students engage in a short research project on a specific type of malware. They create multimedia presentations that integrate multiple sources of credible information and include source citations. As experts on the subject, students define aspects of digital security and inform on how the audience can better protect their computers and devices from malicious code such as viruses, Trojan horses, worms, and spyware.