Online Safety

Not a Learning.com customer? Learn More

Type:Application Exercise

Estimated Time:45 minutes

Score Type:Auto Score

This application exercise automatically provides a score to your gradebook

Available Language: English


Vocabulary: Computer, Research, Writing


Primary Objectives:

  • Student understands acceptable use policies and their purposes.
  • Student understands computer hacking and its consequences.
  • Student understands computer piracy and its consequences.
  • Student understands intentional virus setting and its consequences.
  • Student understands invasion of privacy and its consequences.

Secondary Objectives:

  • Student exercises sound reasoning in understanding.
  • Student understands the interconnections among systems.
  • Student articulates thoughts and ideas clearly and effectively through speaking and writing.
  • Student demonstrates a sound understanding of technology concepts, systems, and operations. Student understands and uses technology systems.

Subjects:

Acceptable Use Policy / ICT Policy 

Technology Education > Information Technology > Internet > Acceptable Use Policy / ICT Policy 

Acceptable Use Policy/ICT Policy

Library Media > Information Technology > Internet > Acceptable Use Policy/ICT Policy

Copyright

Technology Education > Digital Literacy > Reference and Research > Intellectual Property > Copyright

Copyright

Library Media > Information Literacy > Reference and Research > Intellectual Property > Copyright

Copyright Infringement and Plagiarism (Technology Specific)

Library Media > Information Technology > Technology and Society > Copyright Infringement and Plagiarism (Technology Specific)

Copyright Infringement and Plagiarism (Technology Specific) 

Technology Education > Information Technology > Technology and Society > Copyright Infringement and Plagiarism (Technology Specific) 

Copyright/Plagiarism

Technology Education > Digital Literacy > Student Use > Digital Citizenship > Copyright/Plagiarism

Copyright/Plagiarism

Library Media > Information Literacy > ALA Social Responsibility > Copyright/Plagiarism

Development of Safe Interactive Environments 

Technology Education > Information Technology > Internet > Development of Safe Interactive Environments 

Ethics 

Technology Education > Information Technology > Digital Communications > Ethics 

Internet Attacks and Abuse

Library Media > Information Technology > Internet > Internet Attacks and Abuse

Internet Attacks and Abuse 

Technology Education > Information Technology > Internet > Internet Attacks and Abuse 

On-line Etiquette 

Technology Education > Information Technology > Basic Operations and Concepts > On-line Etiquette 

Plagiarism

Technology Education > Digital Literacy > Reference and Research > Intellectual Property > Plagiarism

Plagiarism

Library Media > Information Literacy > Reference and Research > Intellectual Property > Plagiarism

Privacy 

Technology Education > Media and Culture > Law and Legal Issues > Privacy 

Security and Privacy 

Technology Education > Information Technology > Internet > Security and Privacy 

Viruses and Virus Protection 

Technology Education > Information Technology > Basic Operations and Concepts > Viruses and Virus Protection 
Show More

Standards:

S.2.a Students cultivate and manage their digital identity and reputation and are aware of the permanence of their actions in the digital world.
S.2.b Students engage in positive, safe, legal and ethical behavior when using technology, including social interactions online or when using networked devices.
S.2.d Students manage their personal data to maintain digital privacy and security and are aware of data-collection technology used to track their navigation online.
2-IC-23 Describe tradeoffs between allowing information to be public and keeping information private and secure. (P7.2)
2-NI-05 Explain how physical and digital security measures protect electronic information. (P7.2)
ISTE seal of compliance for proficiency student standards ISTE seal of compliance for readiness student standards
Feedback