Request More Info

Online Safety

Not a Learning.com customer? Learn More

Teacher-Facing Resources

Type:Quiz

Estimated Time:15 minutes

Grades:6-12

Score Type:Automatically Graded

Work completed by a student will be automatically graded and the grade will be sent to the Learning Management System (LMS) gradebook

Available Languages: English, Spanish


Vocabulary: copyright, creative commons, cyberbullying, derivative work, digital citizenship, digital footprint, fair use, plagiarism


Primary Objectives:

  • Student understands the importance of protecting personal safety when communicating online.
  • Student demonstrates an awareness of cyberbullying and the actions they can take to address this issue effectively and safely.
  • Student understands the permanent nature of the information they publish and share online.
  • Student understands copyright principles, including fair use and creative commons licenses, and how to legally use images and other media in derivative work.
  • Student can describe plagiarism and situations in which information can be legally and ethically used in personal work.

Secondary Objectives:

  • Student understands basic principles of effective and appropriate online communication.
  • Student understands and practices responsible measures for protecting oneself online and offline.
  • Student will evaluate the quality, credibility and accuracy of information published online.

Subjects:

Advantages and Disadvantages of Technology Use 

Technology Education > Information Technology > Technology and Society > Advantages and Disadvantages of Technology Use 

Appropriate Use of Information 

Technology Education > Information Technology > Internet > Appropriate Use of Information 

Bullying and Harassment

Library Media > Information Technology > Internet > Bullying and Harassment

Bullying and Harassment 

Technology Education > Information Technology > Internet > Bullying and Harassment 

Copyright Infringement and Plagiarism (Technology Specific)

Library Media > Information Technology > Technology and Society > Copyright Infringement and Plagiarism (Technology Specific)

Copyright Infringement and Plagiarism (Technology Specific) 

Technology Education > Information Technology > Technology and Society > Copyright Infringement and Plagiarism (Technology Specific) 

Copyright/Plagiarism

Library Media > Information Literacy > ALA Social Responsibility > Copyright/Plagiarism

Copyright/Plagiarism

Technology Education > Digital Literacy > Student Use > Digital Citizenship > Copyright/Plagiarism

Development of Safe Interactive Environments 

Technology Education > Information Technology > Internet > Development of Safe Interactive Environments 

Digital Citizenship

Library Media > Information Literacy > Student Use - Digital Media > Digital Citizenship

Digital Citizenship 

Technology Education > Digital Literacy > Student Use > Digital Citizenship 

Ethics 

Technology Education > Information Technology > Digital Communications > Ethics 

Internet Attacks and Abuse

Library Media > Information Technology > Internet > Internet Attacks and Abuse

Internet Attacks and Abuse 

Technology Education > Information Technology > Internet > Internet Attacks and Abuse 

Meaning Definition Analysis

Language Arts > Vocabulary > Grammar / Language Structure > Meaning Definition Analysis

Negative Impact

Library Media > Information Technology > Internet > Negative Impact

Negative Impact 

Technology Education > Information Technology > Internet > Negative Impact 

Personal Safety / Use / Online

Science > History / Technology / Social Perspectives > Computer Science > Personal Safety / Use / Online

Privacy 

Technology Education > Media and Culture > Law and Legal Issues > Privacy 

Responsible Use

Technology Education > Digital Literacy > Student Use > Digital Citizenship > Responsible Use

Risks and Benefits of Use 

Technology Education > Information Technology > Mobile Applications > Risks and Benefits of Use 

Safety

Library Media > Information Technology > Internet > Safety

Safety 

Technology Education > Information Technology > Internet > Safety 

Security and Privacy 

Technology Education > Information Technology > Internet > Security and Privacy 

Sharing of Information 

Technology Education > Information Technology > Internet > Sharing of Information 

Social Networking 

Technology Education > Information Technology > Internet > Social Networking 

Valid / Reliable

Science > Concepts and Processes > Research > Resources > Valid / Reliable
Show More
S.2.a Students cultivate and manage their digital identity and reputation and are aware of the permanence of their actions in the digital world.
S.2.b Students engage in positive, safe, legal and ethical behavior when using technology, including social interactions online or when using networked devices.
S.2.c Students demonstrate an understanding of and respect for the rights and obligations of using and sharing intellectual property.
S.2.d Students manage their personal data to maintain digital privacy and security and are aware of data-collection technology used to track their navigation online.
S.3.b Students evaluate the accuracy, perspective, credibility and relevance of information, media, data or other resources.
2-IC-23 Describe tradeoffs between allowing information to be public and keeping information private and secure. (P7.2)
2-NI-05 Explain how physical and digital security measures protect electronic information. (P7.2)
3A-AP-20 Evaluate licenses that limit or restrict use of computational artifacts when using resources such as libraries. (P7.3)
3A-IC-28 Explain the beneficial and harmful effects that intellectual property laws can have on innovation. (P7.3)
3A-IC-29 Explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users. (P7.2)
3A-IC-30 Evaluate the social and economic implications of privacy in the context of safety, law, or ethics. (P7.3)
3A-NI-06 Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts. (P3.3)
3A-NI-07 Compare various security measures, considering tradeoffs between the usability and security of a computing system. (P6.3)
3B-AP-18 Explain security issues that might lead to compromised computer programs. (P7.2)
ELA-Literacy.L.11-12.6 Acquire and use accurately general academic and domain-specific words and phrases, sufficient for reading, writing, speaking, and listening at the college and career readiness level; demonstrate independence in gathering vocabulary knowledge when considering a word or phrase important to comprehension or expression.
ELA-Literacy.L.6.6 Acquire and use accurately grade-appropriate general academic and domain-specific words and phrases; gather vocabulary knowledge when considering a word or phrase important to comprehension or expression.
ELA-Literacy.L.7.6 Acquire and use accurately grade-appropriate general academic and domain-specific words and phrases; gather vocabulary knowledge when considering a word or phrase important to comprehension or expression.
ELA-Literacy.L.8.6 Acquire and use accurately grade-appropriate general academic and domain-specific words and phrases; gather vocabulary knowledge when considering a word or phrase important to comprehension or expression.
ELA-Literacy.L.9-10.6 Acquire and use accurately general academic and domain-specific words and phrases, sufficient for reading, writing, speaking, and listening at the college and career readiness level; demonstrate independence in gathering vocabulary knowledge when considering a word or phrase important to comprehension or expression.
ELA-Literacy.RST.11-12.1 Cite specific textual evidence to support analysis of science and technical texts, attending to important distinctions the author makes and to any gaps or inconsistencies in the account.
ELA-Literacy.RST.11-12.7 Integrate and evaluate multiple sources of information presented in diverse formats and media (e.g., quantitative data, video, multimedia) in order to address a question or solve a problem.
ELA-Literacy.RST.11-12.8 Evaluate the hypotheses, data, analysis, and conclusions in a science or technical text, verifying the data when possible and corroborating or challenging conclusions with other sources of information.
ELA-Literacy.RST.6-8.8 Distinguish among facts, reasoned judgment based on research findings, and speculation in a text.
ELA-Literacy.RST.9-10.8 Assess the extent to which the reasoning and evidence in a text support the author's claim or a recommendation for solving a scientific or technical problem.
ELA-Literacy.WHST.11-12.8 Gather relevant information from multiple authoritative print and digital sources, using advanced searches effectively; assess the strengths and limitations of each source in terms of the specific task, purpose, and audience; integrate information into the text selectively to maintain the flow of ideas, avoiding plagiarism and overreliance on any one source and following a standard format for citation.
ELA-Literacy.WHST.11-12.9 Draw evidence from informational texts to support analysis, reflection, and research.
ELA-Literacy.WHST.6-8.8 Gather relevant information from multiple print and digital sources, using search terms effectively; assess the credibility and accuracy of each source; and quote or paraphrase the data and conclusions of others while avoiding plagiarism and following a standard format for citation.
ELA-Literacy.WHST.6-8.9 Draw evidence from informational texts to support analysis reflection, and research.
ELA-Literacy.WHST.9-10.8 Gather relevant information from multiple authoritative print and digital sources, using advanced searches effectively; assess the usefulness of each source in answering the research question; integrate information into the text selectively to maintain the flow of ideas, avoiding plagiarism and following a standard format for citation.
ELA-Literacy.WHST.9-10.9 Draw evidence from informational texts to support analysis, reflection, and research.