Media & Information Literacy

Students gain the ability to access, analyze, evaluate, create and use various media-based communication formats. Students interpret messages transmitted through Information and Communications Technology (ICT) including Internet publications, infographics, charts, images, videos, audio recordings and multimedia presentations. They learn to effectively locate, evaluate and use information for research and writing. They determine whether an online source is valid and reliable. They distinguish between fact and opinion; bias and objectivity.  Students exercise communication etiquette as a 21st century skill.

Search Results

Displaying 1601 - 1620 of 1708
Student Handout Image Student
Digital Citizenship Theme Image Image , Citizenship Rights Theme Image Image , Privacy Theme Image Image , Identity Management Theme Image Image , Security Theme Image Image , Safety Theme Image Image
6, Intermediate (6-8)
Students recognize the importance of protecting their identity by engaging in class discussion. They list types of information that reveal personal identity; identify three risks to online personal safety and security; assess screen names for safety; create safe screen names, and weigh the pros and cons of online anonymity.
Student Handout Image Student
Digital Citizenship Theme Image Image , Citizenship Rights Theme Image Image , Privacy Theme Image Image , Identity Management Theme Image Image , Security Theme Image Image , Safety Theme Image Image
6, Intermediate (6-8)
Students recognize the importance of protecting their identity by engaging in class discussion. They list types of information that reveal personal identity; identify three risks to online personal safety and security; assess screen names for safety; create safe screen names, and weigh the pros and cons of online anonymity.
Student Handout Image Student
Digital Citizenship Theme Image Image , Privacy Theme Image Image , Identity Management Theme Image Image , Security Theme Image Image , Safety Theme Image Image
6, Intermediate (6-8)
Students recognize the risks of having a weak password. They state the attributes of a strong password; define four techniques used to decipher passwords; describe three threats to online security and safety; explain the importance of protecting online accounts, and practice creating strong passwords.
Student Handout Image Student
Digital Citizenship Theme Image Image , Citizenship Rights Theme Image Image , Identity Management Theme Image Image , Safety Theme Image Image , Media & Information Literacy Theme Image Image , Technology Literacy Theme Image Image
9, 10, 11, 12, Secondary (9-12)
Students explore the safety and security risks of apps, like Snapchat, that enable users to share self-destructing photos and videos. They expose the risks of sharing private or compromising photos, and dispel the idea that photos and videos completely disappear by demonstrating how media files can be recovered. Students write and publish an informative article about disappearing media and submit their entry to iDrive.
Teacher Reference Page Image
Digital Citizenship Theme Image Image , Citizenship Rights Theme Image Image , Identity Management Theme Image Image , Safety Theme Image Image , Media & Information Literacy Theme Image Image , Technology Literacy Theme Image Image
9, 10, 11, 12, Secondary (9-12)
Students explore the safety and security risks of apps, like Snapchat, that enable users to share self-destructing photos and videos. They expose the risks of sharing private or compromising photos, and dispel the idea that photos and videos completely disappear by demonstrating how media files can be recovered. Students write and publish an informative article about disappearing media and submit their entry to iDrive.
Teacher Reference Page Image
Digital Citizenship Theme Image Image , Privacy Theme Image Image , Identity Management Theme Image Image , Security Theme Image Image , Safety Theme Image Image
6, Intermediate (6-8)
Students recognize the risks of having a weak password. They state the attributes of a strong password; define four techniques used to decipher passwords; describe three threats to online security and safety; explain the importance of protecting online accounts, and practice creating strong passwords.
Teacher Reference Page Image
Digital Citizenship Theme Image Image , Privacy Theme Image Image , Identity Management Theme Image Image , Safety Theme Image Image , Technology Literacy Theme Image Image
5, Elementary (3-5)
Students learn how to safeguard their identities, protect their personal safety, and take action when contacted by an inappropriate and unsafe person online. Students complete their plan for their Sock Puppet Nation virtual world.
Teacher Reference Page Image
Digital Citizenship Theme Image Image , Privacy Theme Image Image , Identity Management Theme Image Image , Safety Theme Image Image , Technology Literacy Theme Image Image
5, Elementary (3-5)
Students learn how to safeguard their identities, protect their personal safety, and take action when contacted by an inappropriate and unsafe person online. Students complete their plan for their Sock Puppet Nation virtual world.
Teacher Reference Page Image
Digital Citizenship Theme Image Image , Privacy Theme Image Image , Identity Management Theme Image Image , Safety Theme Image Image , Technology Literacy Theme Image Image
5, Elementary (3-5)
Students learn how to safeguard their identities, protect their personal safety, and take action when contacted by an inappropriate and unsafe person online. Students complete their plan for their Sock Puppet Nation virtual world.
Student Handout Image Student
Digital Citizenship Theme Image Image , Privacy Theme Image Image , Identity Management Theme Image Image , Security Theme Image Image , Ethics Theme Image Image , Media & Information Literacy Theme Image Image
9, 10, 11, 12, Secondary (9-12)
Students discuss their comfort level with sharing their data and personal details with online services and companies. They review the common practices of online services and develop a perspective on consumer data privacy by examining the privacy policies of sites and services.
Student Handout Image Student
Digital Citizenship Theme Image Image , Privacy Theme Image Image , Identity Management Theme Image Image , Security Theme Image Image , Ethics Theme Image Image , Media & Information Literacy Theme Image Image
9, 10, 11, 12, Secondary (9-12)
Students discuss their comfort level with sharing their data and personal details with online services and companies. They review the common practices of online services and develop a perspective on consumer data privacy by examining the privacy policies of sites and services.
Student Handout Image Student
Digital Citizenship Theme Image Image , Privacy Theme Image Image , Identity Management Theme Image Image , Security Theme Image Image , Ethics Theme Image Image , Media & Information Literacy Theme Image Image
9, 10, 11, 12, Secondary (9-12)
Students discuss their comfort level with sharing their data and personal details with online services and companies. They review the common practices of online services and develop a perspective on consumer data privacy by examining the privacy policies of sites and services.
Teacher Reference Page Image
Digital Citizenship Theme Image Image , Citizenship Rights Theme Image Image , Privacy Theme Image Image , Ethics Theme Image Image
9, 10, 11, 12, Secondary (9-12)
In this lesson, students explore the concept of invasion of privacy. They research key terms in order to better understand the technologies and online practices that intrude on their right to privacy. Students deconstruct the legal definition of “invasion of privacy” into four categories and decide whether a particular practice is highly invasive, moderately invasive or non-invasive. Students use their understanding of privacy policies, and their knowledge of key terms, to support their opinions.
Student Handout Image Student
Digital Citizenship Theme Image Image , Citizenship Rights Theme Image Image , Privacy Theme Image Image , Ethics Theme Image Image
9, 10, 11, 12, Secondary (9-12)
In this lesson, students explore the concept of invasion of privacy. They research key terms in order to better understand the technologies and online practices that intrude on their right to privacy. Students deconstruct the legal definition of “invasion of privacy” into four categories and decide whether a particular practice is highly invasive, moderately invasive or non-invasive. Students use their understanding of privacy policies, and their knowledge of key terms, to support their opinions.
Student Handout Image Student
Privacy Theme Image Image , Identity Management Theme Image Image
9, 10, 11, 12, Secondary (9-12)
Students develop an informed perspective on Internet privacy. They explore personal privacy and consumer privacy. They review privacy policies and determine whether a situation constitutes an “invasion of privacy.” Students are empowered to protect their privacy online. iDrive Empowerment Activity included.
Student Handout Image Student
Digital Citizenship Theme Image Image , Citizenship Rights Theme Image Image , Media & Information Literacy Theme Image Image
3, 4, 5, Elementary (3-5)
The Sock Puppet Nation comic “A Major Misunderstanding” illustrates how a text message conversation can quickly unravel without the aid of non-verbal cues like tone-of-voice and body language to interpret the meaning of words and phrases. Students analyze characters' thoughts, words, actions and feelings, and they distinguish between literal language and figures of speech. The lesson includes a teacher guide, printable activity pages, and interactive multimedia resources.
Student Handout Image Student
Digital Citizenship Theme Image Image , Citizenship Rights Theme Image Image , Media & Information Literacy Theme Image Image
3, 4, 5, Elementary (3-5)
The Sock Puppet Nation comic “A Major Misunderstanding” illustrates how a text message conversation can quickly unravel without the aid of non-verbal cues like tone-of-voice and body language to interpret the meaning of words and phrases. Students analyze characters' thoughts, words, actions and feelings, and they distinguish between literal language and figures of speech. The lesson includes a teacher guide, printable activity pages, and interactive multimedia resources.
Teacher Reference Page Image
Digital Citizenship Theme Image Image , Citizenship Rights Theme Image Image , Ethics Theme Image Image , Media & Information Literacy Theme Image Image
6, 7, 8, Intermediate (6-8)
This interactive lesson underscores the importance of being mindful while communicating via text messages. Given three scenarios, students analyze the context of the conversation, find key details, draw inferences and draft an appropriate response. The lesson includes a teacher guide, printable activity pages, and interactive multimedia resources.
Teacher Reference Page Image
Digital Citizenship Theme Image Image , Citizenship Rights Theme Image Image , Privacy Theme Image Image , Identity Management Theme Image Image , Safety Theme Image Image , Media & Information Literacy Theme Image Image , Technology Literacy Theme Image Image
7, 8, Intermediate (6-8)
Students explore the safety and security risks of apps like Snapchat, which facilitate the real-time sharing of photos that self-destruct after a designated period of time. They use a graphic organizer to sort their ideas.
Lesson Plan Image
Digital Citizenship Theme Image Image , Citizenship Rights Theme Image Image , Media & Information Literacy Theme Image Image
6, 7, 8, Intermediate (6-8)
This interdisciplinary unit provides educators with a flexible framework for debate. The purpose of the debate unit is to afford students the opportunity to engage in the dynamic challenge of forming an opinion on e-Safety issues based on evidence and reason, articulating their position and persuading an audience.

Search By Filter