Search Results
Student Handout
Image
7, 8, 9, 10, 11, 12, Intermediate (6-8), Secondary (9-12)
Students learn how prolonged use of the Internet and digital devices impact health. They conduct short research projects, closely read relevant informational text and develop strategies to maintain a healthy lifestyle while using digital technologies. Implementation options are as follows: • Explore Digital Age Health Issues as a Class • Explore Digital Age Health Issues Using a Jigsaw Strategy
Student Handout
Image
7, 8, 9, 10, 11, 12, Intermediate (6-8), Secondary (9-12)
Students learn how prolonged use of the Internet and digital devices impact health. They conduct short research projects, closely read relevant informational text and develop strategies to maintain a healthy lifestyle while using digital technologies. Implementation options are as follows: • Explore Digital Age Health Issues as a Class • Explore Digital Age Health Issues Using a Jigsaw Strategy
Student Handout
Image
7, 8, 9, 10, 11, 12, Intermediate (6-8), Secondary (9-12)
Students learn how prolonged use of the Internet and digital devices impact health. They conduct short research projects, closely read relevant informational text and develop strategies to maintain a healthy lifestyle while using digital technologies. Implementation options are as follows: • Explore Digital Age Health Issues as a Class • Explore Digital Age Health Issues Using a Jigsaw Strategy
Student Handout
Image
7, 8, 9, 10, 11, 12, Intermediate (6-8), Secondary (9-12)
Students learn how prolonged use of the Internet and digital devices impact health. They conduct short research projects, closely read relevant informational text and develop strategies to maintain a healthy lifestyle while using digital technologies. Implementation options are as follows: • Explore Digital Age Health Issues as a Class • Explore Digital Age Health Issues Using a Jigsaw Strategy
Student Handout
Image
8
Students use what they know and understand about online safety to write a story for younger students. They use a variety of narrative techniques to develop the sequence of events including descriptive details and dialogue that reveal characters' thoughts and feelings. Students plan, revise and edit their literary work. They use media or illustrations to aid in comprehension. Digital publication is optional.
Student Handout
Image
8
Students use what they know and understand about online safety to write a story for younger students. They use a variety of narrative techniques to develop the sequence of events including descriptive details and dialogue that reveal characters' thoughts and feelings. Students plan, revise and edit their literary work. They use media or illustrations to aid in comprehension. Digital publication is optional.
Student Handout
Image
9, 10, 11, 12, Secondary (9-12)
Students investigate the safety and security issues surrounding online shopping. They use a set of criteria to evaluate online shopping websites and practice determining whether an online offer or merchant site is safe, secure, and legitimate.
Student Handout
Image
9, 10, 11, 12, Secondary (9-12)
Students investigate the safety and security issues surrounding online shopping. They use a set of criteria to evaluate online shopping websites and practice determining whether an online offer or merchant site is safe, secure, and legitimate.
Student Handout
Image
9, 10, 11, 12, Secondary (9-12)
Students investigate the safety and security issues surrounding online shopping. They use a set of criteria to evaluate online shopping websites and practice determining whether an online offer or merchant site is safe, secure, and legitimate.
Student Handout
Image
9, 10, 11, 12, Secondary (9-12)
Students investigate the safety and security issues surrounding online shopping. They use a set of criteria to evaluate online shopping websites and practice determining whether an online offer or merchant site is safe, secure, and legitimate.
Student Handout
Image
9, 10, 11, 12, Secondary (9-12)
Students investigate the safety and security issues surrounding online shopping. They use a set of criteria to evaluate online shopping websites and practice determining whether an online offer or merchant site is safe, secure, and legitimate.
Student Handout
Image
9, 10, 11, 12, Secondary (9-12)
Students investigate the safety and security issues surrounding online shopping. They use a set of criteria to evaluate online shopping websites and practice determining whether an online offer or merchant site is safe, secure, and legitimate.
Student Handout
Image
9, 10, 11, 12, Secondary (9-12)
Students understand that revealing private information online increases the risk of identity theft. They develop an action plan for dealing with identity theft and create informative brochures.
Student Handout
Image
9, 10, 11, 12, Secondary (9-12)
Students understand that revealing private information online increases the risk of identity theft. They develop an action plan for dealing with identity theft and create informative brochures.
Student Handout
Image
9, 10, 11, 12, Secondary (9-12)
Students understand that revealing private information online increases the risk of identity theft. They develop an action plan for dealing with identity theft and create informative brochures.
Student Handout
Image
9, 10, 11, 12, Secondary (9-12)
Students examine legal trends concerning the Internet. They crirically evaluate laws concerning issues such as cyber bullying, identity theft and malicious code. They collaborate in groups to discuss and evaluate the laws and their implications. Students take action by drafting a letter to their Congressional member to affect change and recommend solutions. A template is provided.
Student Handout
Image
9, 10, 11, 12, Secondary (9-12)
Students examine legal trends concerning the Internet. They crirically evaluate laws concerning issues such as cyber bullying, identity theft and malicious code. They collaborate in groups to discuss and evaluate the laws and their implications. Students take action by drafting a letter to their Congressional member to affect change and recommend solutions. A template is provided.
Student Handout
Image
9, 10, 11, 12, Secondary (9-12)
Students examine legal trends concerning the Internet. They crirically evaluate laws concerning issues such as cyber bullying, identity theft and malicious code. They collaborate in groups to discuss and evaluate the laws and their implications. Students take action by drafting a letter to their Congressional member to affect change and recommend solutions. A template is provided.
Student Handout
Image
9, 10, 11, 12, Secondary (9-12)
Students examine legal trends concerning the Internet. They crirically evaluate laws concerning issues such as cyber bullying, identity theft and malicious code. They collaborate in groups to discuss and evaluate the laws and their implications. Students take action by drafting a letter to their Congressional member to affect change and recommend solutions. A template is provided.
Student Handout
Image
9, 10, 11, 12, Secondary (9-12)
Students examine legal trends concerning the Internet. They crirically evaluate laws concerning issues such as cyber bullying, identity theft and malicious code. They collaborate in groups to discuss and evaluate the laws and their implications. Students take action by drafting a letter to their Congressional member to affect change and recommend solutions. A template is provided.
,
Safety
Theme Image
Image
,
Media & Information Literacy
Theme Image
Image
,
Technology Literacy
Theme Image
Image
,
Privacy
Theme Image
Image
,
Identity Management
Theme Image
Image
,
Security
Theme Image
Image
,
Safety
Theme Image
Image
,
Media & Information Literacy
Theme Image
Image