Online Safety

Not a Learning.com customer? Learn More

Type:Application Exercise

Estimated Time:45 minutes

Score Type:Auto Score

This application exercise automatically provides a score to your gradebook

Available Language: English


Vocabulary: free Internet, gambling, hot spot, https, keylogger, keyloggers, listener, phishing, public computer, public computers, scam, unsecured network, wi-fi, wifi


Objectives:

  • Students learn to recognize and avoid online scams.
  • Students learn to recognize and avoid email and phishing scams.
  • Students learn to avoid online gambling.
  • Students learn how to minimize risk while shopping online.
  • Students learn the significance and importance of https.
  • Students learn the risks of using public wi-fi and Internet networks.
  • Students learn the risks of using public computers.
  • Students learn about the dangers of keylogger software.

Subjects:

Advantages and Disadvantages of Technology Use 

Information Technology > Technology and Society > Advantages and Disadvantages of Technology Use 

Development of Safe Interactive Environments 

Information Technology > Internet > Development of Safe Interactive Environments 

Digital Citizenship

Information Literacy > Student Use - Digital Media > Digital Citizenship

Digital Citizenship 

Digital Literacy > Student Use > Digital Citizenship 

Email 

Information Technology > Basic Operations and Concepts > Email 

Ethics 

Information Technology > Digital Communications > Ethics 

From Nonfiction Material

Language Arts > Research > Collect Data / Note Taking > Gather Facts Information Highlighting > From Nonfiction Material

Games

Language Arts > Life Skills Daily Life > Games

Internet

Digital Literacy > Reference and Research > Reference Tools > Internet

Internet

Information Literacy > Reference and Research > Reference Tools > Internet

Internet Safety

Language Arts > Computer Literacy Skills > Personal Use > Internet Safety

Negative Impact

Information Technology > Internet > Negative Impact

Negative Impact 

Information Technology > Internet > Negative Impact 

Safety

Information Technology > Internet > Safety

Safety 

Information Technology > Internet > Safety 

Security and Privacy 

Information Technology > Internet > Security and Privacy 

Uses a Variety of Resources

Language Arts > Research > Reference Materials > Uses a Variety of Resources

Websites / Blogs / Email / Internet

Language Arts > Computer Literacy Skills > Personal Use > Websites / Blogs / Email / Internet
Show More

Standards:

S.2.a Students cultivate and manage their digital identity and reputation and are aware of the permanence of their actions in the digital world.
S.2.b Students engage in positive, safe, legal and ethical behavior when using technology, including social interactions online or when using networked devices.
S.2.d Students manage their personal data to maintain digital privacy and security and are aware of data-collection technology used to track their navigation online.
S.3.c Students curate information from digital resources using a variety of tools and methods to create collections of artifacts that demonstrate meaningful connections or conclusions.
S.5.b Students collect data or identify relevant data sets, use digital tools to analyze them, and represent data in various ways to facilitate problem-solving and decision-making.
S.7.a Students use digital tools to connect with learners from a variety of backgrounds and cultures, engaging with them in ways that broaden mutual understanding and learning.
3A-IC-29 Explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users. (P7.2)
3A-IC-30 Evaluate the social and economic implications of privacy in the context of safety, law, or ethics. (P7.3)
3A-NI-06 Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts. (P3.3)
3A-NI-07 Compare various security measures, considering tradeoffs between the usability and security of a computing system. (P6.3)
3B-AP-18 Explain security issues that might lead to compromised computer programs. (P7.2)
ELA-Literacy.RI.11-12.7 Integrate and evaluate multiple sources of information presented in different media or formats (e.g., visually, quantitatively) as well as in words in order to address a question or solve a problem.
ELA-Literacy.SL.11-12.1a Come to discussions prepared, having read and researched material under study; explicitly draw on that preparation by referring to evidence from texts and other research on the topic or issue to stimulate a thoughtful, well-reasoned exchange of ideas.
ELA-Literacy.SL.11-12.1b Work with peers to promote civil, democratic discussions and decision-making, set clear goals and deadlines, and establish individual roles as needed.
ELA-Literacy.SL.11-12.1c Propel conversations by posing and responding to questions that probe reasoning and evidence; ensure a hearing for a full range of positions on a topic or issue; clarify, verify, or challenge ideas and conclusions; and promote divergent and creative perspectives.
ELA-Literacy.SL.9-10.1a Come to discussions prepared, having read and researched material under study; explicitly draw on that preparation by referring to evidence from texts and other research on the topic or issue to stimulate a thoughtful, well-reasoned exchange of ideas.
ELA-Literacy.SL.9-10.1c Propel conversations by posing and responding to questions that relate the current discussion to broader themes or larger ideas; actively incorporate others into the discussion; and clarify, verify, or challenge ideas and conclusions.
ELA-Literacy.SL.9-10.1d Respond thoughtfully to diverse perspectives, summarize points of agreement and disagreement, and, when warranted, qualify or justify their own views and understanding and make new connections in light of the evidence and reasoning presented.
ELA-Literacy.W.11-12.7 Conduct short as well as more sustained research projects to answer a question (including a self-generated question) or solve a problem; narrow or broaden the inquiry when appropriate; synthesize multiple sources on the subject, demonstrating understanding of the subject under investigation.
ELA-Literacy.W.11-12.8 Gather relevant information from multiple authoritative print and digital sources, using advanced searches effectively; assess the strengths and limitations of each source in terms of the task, purpose, and audience; integrate information into the text selectively to maintain the flow of ideas, avoiding plagiarism and overreliance on any one source and following a standard format for citation.
ELA-Literacy.W.9-10.7 Conduct short as well as more sustained research projects to answer a question (including a self-generated question) or solve a problem; narrow or broaden the inquiry when appropriate; synthesize multiple sources on the subject, demonstrating understanding of the subject under investigation.
ELA-Literacy.W.9-10.8 Gather relevant information from multiple authoritative print and digital sources, using advanced searches effectively; assess the usefulness of each source in answering the research question; integrate information into the text selectively to maintain the flow of ideas, avoiding plagiarism and following a standard format for citation.
ISTE seal of compliance for proficiency student standards ISTE seal of compliance for readiness student standards
Feedback