Search Results
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
Students examine the circumstances that prompted IPTO Director Robert Taylor to propose the ARPANET project. They describe the magnitude and complexity entailed in the building of the first-ever computer network which, unintentionally, gave rise to the Internet.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
Students examine the circumstances that prompted IPTO Director Robert Taylor to propose the ARPANET project. They describe the magnitude and complexity entailed in the building of the first-ever computer network which, unintentionally, gave rise to the Internet.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
Students examine the circumstances that prompted IPTO Director Robert Taylor to propose the ARPANET project. They describe the magnitude and complexity entailed in the building of the first-ever computer network which, unintentionally, gave rise to the Internet.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
Students examine the circumstances that prompted IPTO Director Robert Taylor to propose the ARPANET project. They describe the magnitude and complexity entailed in the building of the first-ever computer network which, unintentionally, gave rise to the Internet.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
The Internet is a ubiquitous system that is integrated into almost every aspect of 21 st century life: communications, education, healthcare, government, economics, resource management (i.e. water and electricity) and homeland security, but how did we get here? In this lesson, students trace the evolution of the Internet from the Cold War era of the 1950s and 60s to the present. They work in jigsaw groups: each group investigates one decade in Internet history. Students collaborate among their groups to build a timeline that identifies the major events in Internet history.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
The Internet is a ubiquitous system that is integrated into almost every aspect of 21 st century life: communications, education, healthcare, government, economics, resource management (i.e. water and electricity) and homeland security, but how did we get here? In this lesson, students trace the evolution of the Internet from the Cold War era of the 1950s and 60s to the present. They work in jigsaw groups: each group investigates one decade in Internet history. Students collaborate among their groups to build a timeline that identifies the major events in Internet history.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
The Internet is a ubiquitous system that is integrated into almost every aspect of 21 st century life: communications, education, healthcare, government, economics, resource management (i.e. water and electricity) and homeland security, but how did we get here? In this lesson, students trace the evolution of the Internet from the Cold War era of the 1950s and 60s to the present. They work in jigsaw groups: each group investigates one decade in Internet history. Students collaborate among their groups to build a timeline that identifies the major events in Internet history.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
The Internet is a ubiquitous system that is integrated into almost every aspect of 21 st century life: communications, education, healthcare, government, economics, resource management (i.e. water and electricity) and homeland security, but how did we get here? In this lesson, students trace the evolution of the Internet from the Cold War era of the 1950s and 60s to the present. They work in jigsaw groups: each group investigates one decade in Internet history. Students collaborate among their groups to build a timeline that identifies the major events in Internet history.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
Students come to understand that gangs have used the Internet to promote unlawful activity. They examine the impact that negative groups have on society. Students help to create a safer environment at school and in the community by designing visual media to illustrate how to anonymously report gang-related sites while promoting positive networking.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
As students determine the central lesson found in modern derivatives of classic children's stories, they are challenged to think critically, creatively and philosophically about the implications in their own lives. At the conclusion of the unit, students reflect on the benefits and drawbacks of modern technology, and they write their own narrative based on a digital citizenship theme.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
Students read the 21st century tale to discover that Henny Penny thinks the sky is falling because of what she receives in her e-mail inbox. Students conclude that, unlike Henny Penny, they cannot believe everything that they read or hear. They then suggest reasons that people publish biased or fabricated information online and electronic messages. Students identify ways to distinguish between fact and opinion; objective and biased information; valid or false claims. They then list the steps to verify information from online sources and e-mails.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
Goldy Locks comes to terms with intellectual property, copyright and plagiarism. Students identify the ethical guidelines that "Goldy" crosses in the both the original story and the 21st century version. They then discuss the consequences that the central character faced in the story. Students write a short skit that illustrates the consequences of violating intellectual property rights, laws and ethical guidelines for creative works found online.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
Story 2: Uma Duck a.k.a. Ugly "Uma Duck a.k.a. Ugly" is a story about cyber bullying and the potential advantages of social networking. Students determine the central message in the story. They compare the adaptation with the original tale “The Ugly Duckling.” They reflect on the conflicts that they may have experienced online and then write a narrative in which the central character overcomes a conflict or challenge in a unique and positive way.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
As students determine the central lesson found in modern derivatives of classic children's stories, they are challenged to think critically, creatively and philosophically about the implications in their own lives. At the conclusion of the unit, students reflect on the benefits and drawbacks of modern technology, and they write their own narrative based on a digital citizenship theme.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
As students determine the central lesson found in modern derivatives of classic children's stories, they are challenged to think critically, creatively and philosophically about the implications in their own lives. At the conclusion of the unit, students reflect on the benefits and drawbacks of modern technology, and they write their own narrative based on a digital citizenship theme.
Parent & Family Tip Sheet
Image

K, 1, 2, Primary (K-2)
Students understand that sharing their personal information online enables others to discover their real-world identity. They learn to ask for help from a parent, guardian or trusted adult before sharing personal information online.
Lesson Plan
Image

K, 1, 2, Primary (K-2)
Students understand that sharing their personal information online enables others to discover their real-world identity. They learn to ask for help from a parent, guardian or trusted adult before sharing personal information online.
Multimedia Resource
Image

K, 1, 2, Elementary (3-5)
As part of i-SAFE’s Music and Movement series of lessons, students will have fun moving to the song, “Ask an Adult (When You Login),” and will gain an understanding of a basic Internet safety concept: ask an adult to help while online. Through collaborative class discussion, they learn about challenges to safety online, through the use of computers, smartphones and other Internet-ready devices.
Lesson Plan
Image

K, 1, 2, Elementary (3-5)
As part of i-SAFE’s Music and Movement series of lessons, students will have fun moving to the song, “Ask an Adult (When You Login),” and will gain an understanding of a basic Internet safety concept: ask an adult to help while online. Through collaborative class discussion, they learn about challenges to safety online, through the use of computers, smartphones and other Internet-ready devices.
Lesson Plan
Image

K, 1, 2, Elementary (3-5)
As part of i-SAFE’s Music and Movement series of lessons, students will have fun moving to the song, “Ask an Adult (When You Login),” and will gain an understanding of a basic Internet safety concept: ask an adult to help while online. Through collaborative class discussion, they learn about challenges to safety online, through the use of computers, smartphones and other Internet-ready devices.