Request More Info

Online Safety

Not a Learning.com customer? Learn More

Teacher-Facing Resources

Type:Application Exercise

Estimated Time:45 minutes

Grades:9-12

Score Type:Mixed Graded

Work completed by a student will be graded through a variety of scoring options including participation, student self-assessment and teacher assessment via rubric to provide flexibility with the type of grade sent to the Learning Management System (LMS) gradebook. Student work may include opened-ended questions, correct/incorrect responses, a final product and/or a self-assessment

Available Language: English


Vocabulary: free Internet, gambling, hot spot, https, keylogger, keyloggers, listener, phishing, public computer, public computers, scam, unsecured network, wi-fi, wifi


Objectives:

  • Students learn to recognize and avoid online scams.
  • Students learn to recognize and avoid email and phishing scams.
  • Students learn to avoid online gambling.
  • Students learn how to minimize risk while shopping online.
  • Students learn the significance and importance of https.
  • Students learn the risks of using public wi-fi and Internet networks.
  • Students learn the risks of using public computers.
  • Students learn about the dangers of keylogger software.

Subjects:

Advantages and Disadvantages of Technology Use 

Technology Education > Information Technology > Technology and Society > Advantages and Disadvantages of Technology Use 

Development of Safe Interactive Environments 

Technology Education > Information Technology > Internet > Development of Safe Interactive Environments 

Digital Citizenship

Library Media > Information Literacy > Student Use - Digital Media > Digital Citizenship

Digital Citizenship 

Technology Education > Digital Literacy > Student Use > Digital Citizenship 

Email 

Technology Education > Information Technology > Basic Operations and Concepts > Email 

Ethics 

Technology Education > Information Technology > Digital Communications > Ethics 

From Nonfiction Material

Language Arts > Research > Collect Data / Note Taking > Gather Facts Information Highlighting > From Nonfiction Material

Games

Language Arts > Life Skills Daily Life > Games

Internet

Technology Education > Digital Literacy > Reference and Research > Reference Tools > Internet

Internet

Library Media > Information Literacy > Reference and Research > Reference Tools > Internet

Internet Safety

Language Arts > Computer Literacy Skills > Personal Use > Internet Safety

Negative Impact

Library Media > Information Technology > Internet > Negative Impact

Negative Impact 

Technology Education > Information Technology > Internet > Negative Impact 

Safety

Library Media > Information Technology > Internet > Safety

Safety 

Technology Education > Information Technology > Internet > Safety 

Security and Privacy 

Technology Education > Information Technology > Internet > Security and Privacy 

Uses a Variety of Resources

Language Arts > Research > Reference Materials > Uses a Variety of Resources

Websites / Blogs / Email / Internet

Language Arts > Computer Literacy Skills > Personal Use > Websites / Blogs / Email / Internet
Show More
EXCEEDS (4)MEETS (3)APPROACHES (2)DOES NOT MEET (1)
Directions and Participation The student followed all directions and went above and beyond in answering all questions in the assignment.The student followed all directions and answered all questions in the assignment.The student followed most directions and answered most questions in the assignment.The student did not follow directions or answer the questions in the assignment.
Required Final Product Components The final product includes additional elements to enhance the assignment beyond the required components.The final product includes all components required by the assignment.The final product includes most of the components required by the assignment.The final product does not demonstrate the components required by the assignment.
Organization and Originality The final product is exceptionally well designed, includes additional elements, contains no spelling, grammar or punctuation mistakes and reveals student’s creative insights into the assignment.The final product is neat, includes all components required by the assignment, contains minimal spelling, grammar or punctuation mistakes and includes some creative elements.The final product is adequate but lacks neatness and creativity, contains some spelling, grammar and punctuation mistakes and is missing required components.The final product is not neat or creative, is missing required components and contains many spelling, grammar or punctuation mistakes.
Digital Literacy Skills Application The final product clearly demonstrates an accurate and deep level of understanding of the concept.The final product demonstrates an accurate and appropriate level of understanding of the concept.The final product demonstrates some understanding of the concept.The final product demonstrates little to no understanding of the concept.
S.2.a Students cultivate and manage their digital identity and reputation and are aware of the permanence of their actions in the digital world.
S.2.b Students engage in positive, safe, legal and ethical behavior when using technology, including social interactions online or when using networked devices.
S.2.d Students manage their personal data to maintain digital privacy and security and are aware of data-collection technology used to track their navigation online.
S.3.c Students curate information from digital resources using a variety of tools and methods to create collections of artifacts that demonstrate meaningful connections or conclusions.
S.5.b Students collect data or identify relevant data sets, use digital tools to analyze them, and represent data in various ways to facilitate problem-solving and decision-making.
S.7.a Students use digital tools to connect with learners from a variety of backgrounds and cultures, engaging with them in ways that broaden mutual understanding and learning.
3A-IC-29 Explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users. (P7.2)
3A-IC-30 Evaluate the social and economic implications of privacy in the context of safety, law, or ethics. (P7.3)
3A-NI-06 Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts. (P3.3)
3A-NI-07 Compare various security measures, considering tradeoffs between the usability and security of a computing system. (P6.3)
3B-AP-18 Explain security issues that might lead to compromised computer programs. (P7.2)
ELA-Literacy.RI.11-12.7 Integrate and evaluate multiple sources of information presented in different media or formats (e.g., visually, quantitatively) as well as in words in order to address a question or solve a problem.
ELA-Literacy.SL.11-12.1a Come to discussions prepared, having read and researched material under study; explicitly draw on that preparation by referring to evidence from texts and other research on the topic or issue to stimulate a thoughtful, well-reasoned exchange of ideas.
ELA-Literacy.SL.11-12.1b Work with peers to promote civil, democratic discussions and decision-making, set clear goals and deadlines, and establish individual roles as needed.
ELA-Literacy.SL.11-12.1c Propel conversations by posing and responding to questions that probe reasoning and evidence; ensure a hearing for a full range of positions on a topic or issue; clarify, verify, or challenge ideas and conclusions; and promote divergent and creative perspectives.
ELA-Literacy.SL.9-10.1a Come to discussions prepared, having read and researched material under study; explicitly draw on that preparation by referring to evidence from texts and other research on the topic or issue to stimulate a thoughtful, well-reasoned exchange of ideas.
ELA-Literacy.SL.9-10.1c Propel conversations by posing and responding to questions that relate the current discussion to broader themes or larger ideas; actively incorporate others into the discussion; and clarify, verify, or challenge ideas and conclusions.
ELA-Literacy.SL.9-10.1d Respond thoughtfully to diverse perspectives, summarize points of agreement and disagreement, and, when warranted, qualify or justify their own views and understanding and make new connections in light of the evidence and reasoning presented.
ELA-Literacy.W.11-12.7 Conduct short as well as more sustained research projects to answer a question (including a self-generated question) or solve a problem; narrow or broaden the inquiry when appropriate; synthesize multiple sources on the subject, demonstrating understanding of the subject under investigation.
ELA-Literacy.W.11-12.8 Gather relevant information from multiple authoritative print and digital sources, using advanced searches effectively; assess the strengths and limitations of each source in terms of the task, purpose, and audience; integrate information into the text selectively to maintain the flow of ideas, avoiding plagiarism and overreliance on any one source and following a standard format for citation.
ELA-Literacy.W.9-10.7 Conduct short as well as more sustained research projects to answer a question (including a self-generated question) or solve a problem; narrow or broaden the inquiry when appropriate; synthesize multiple sources on the subject, demonstrating understanding of the subject under investigation.
ELA-Literacy.W.9-10.8 Gather relevant information from multiple authoritative print and digital sources, using advanced searches effectively; assess the usefulness of each source in answering the research question; integrate information into the text selectively to maintain the flow of ideas, avoiding plagiarism and following a standard format for citation.
null