Request More Info

Online Safety

Not a Learning.com customer? Learn More

Teacher-Facing Resources

Type:Application Exercise

Estimated Time:45 minutes

Grades:6-8

Score Type:Mixed Graded

Work completed by a student will be graded through a variety of scoring options including participation, student self-assessment and teacher assessment via rubric to provide flexibility with the type of grade sent to the Learning Management System (LMS) gradebook. Student work may include opened-ended questions, correct/incorrect responses, a final product and/or a self-assessment

Available Language: English


Vocabulary: Cyber Safety, Digital Footprint, Internet Safety, Online Behavior, Online Safety, Password, Personal Information, Sharing Information, Strong Password


Objectives:

  • Students identify examples of appropriate and inappropriate online behavior.
  • Students identify suspicious requests for personal information online.
  • Students protect themselves by selecting strong passwords.

Subjects:

Advantages and Disadvantages of Technology Use 

Technology Education > Information Technology > Technology and Society > Advantages and Disadvantages of Technology Use 

Bullying and Harassment

Library Media > Information Technology > Internet > Bullying and Harassment

Bullying and Harassment 

Technology Education > Information Technology > Internet > Bullying and Harassment 

Development of Safe Interactive Environments 

Technology Education > Information Technology > Internet > Development of Safe Interactive Environments 

Digital Citizenship

Library Media > Information Literacy > Student Use - Digital Media > Digital Citizenship

Digital Citizenship 

Technology Education > Digital Literacy > Student Use > Digital Citizenship 

Ethical Usage

Language Arts > Computer Literacy Skills > Personal Use > Ethical Usage

Ethics 

Technology Education > Information Technology > Digital Communications > Ethics 

Internet Attacks and Abuse

Library Media > Information Technology > Internet > Internet Attacks and Abuse

Internet Attacks and Abuse 

Technology Education > Information Technology > Internet > Internet Attacks and Abuse 

Internet Safety

Language Arts > Computer Literacy Skills > Personal Use > Internet Safety

Negative Impact

Library Media > Information Technology > Internet > Negative Impact

Negative Impact 

Technology Education > Information Technology > Internet > Negative Impact 

On-line Etiquette 

Technology Education > Information Technology > Basic Operations and Concepts > On-line Etiquette 

Safety

Library Media > Information Technology > Internet > Safety

Safety 

Technology Education > Information Technology > Internet > Safety 

Security Options 

Technology Education > Information Technology > Internet > Security Options 

Security and Privacy 

Technology Education > Information Technology > Internet > Security and Privacy 

Social Networking 

Technology Education > Information Technology > Internet > Social Networking 

Websites / Blogs / Email / Internet

Language Arts > Computer Literacy Skills > Personal Use > Websites / Blogs / Email / Internet
Show More
EXCEEDS (4)MEETS (3)APPROACHES (2)DOES NOT MEET (1)
Directions and Participation The student followed all directions and went above and beyond in answering all questions in the assignment.The student followed all directions and answered all questions in the assignment.The student followed most directions and answered most questions in the assignment.The student did not follow directions or answer the questions in the assignment.
Required Final Product Components The final product includes additional elements to enhance the assignment beyond the required components.The final product includes all components required by the assignment.The final product includes most of the components required by the assignment.The final product does not demonstrate the components required by the assignment.
Organization and Originality The final product is exceptionally well designed, includes additional elements, contains no spelling, grammar or punctuation mistakes and reveals student’s creative insights into the assignment.The final product is neat, includes all components required by the assignment, contains minimal spelling, grammar or punctuation mistakes and includes some creative elements.The final product is adequate but lacks neatness and creativity, contains some spelling, grammar and punctuation mistakes and is missing required components.The final product is not neat or creative, is missing required components and contains many spelling, grammar or punctuation mistakes.
Digital Literacy Skills Application The final product clearly demonstrates an accurate and deep level of understanding of the concept.The final product demonstrates an accurate and appropriate level of understanding of the concept.The final product demonstrates some understanding of the concept.The final product demonstrates little to no understanding of the concept.
S.2.a Students cultivate and manage their digital identity and reputation and are aware of the permanence of their actions in the digital world.
S.2.b Students engage in positive, safe, legal and ethical behavior when using technology, including social interactions online or when using networked devices.
S.2.c Students demonstrate an understanding of and respect for the rights and obligations of using and sharing intellectual property.
S.2.d Students manage their personal data to maintain digital privacy and security and are aware of data-collection technology used to track their navigation online.
S.7.a Students use digital tools to connect with learners from a variety of backgrounds and cultures, engaging with them in ways that broaden mutual understanding and learning.
2-NI-05 Explain how physical and digital security measures protect electronic information. (P7.2)
ISTE seal of compliance for proficiency student standards ISTE seal of compliance for readiness student standards