The VR experience in this project sounds like a great way to …
The VR experience in this project sounds like a great way to offer a more interactive learning environment. It's exciting to think about how teachers can use this technology (YouTube 360) to enhance their teaching methods and help students learn in new and exciting ways. The hands-on experience will certainly help teachers better understand the features and functionalities of VR, and how it can be effectively used in the classroom.
Overview of the activity:After the lesson has been taught, discuss with the …
Overview of the activity:After the lesson has been taught, discuss with the class if their friend was able to crack the code, or if it was secure enough and how could you make it more secure?
Create a fake social media page for a teacher in Spanish that …
Create a fake social media page for a teacher in Spanish that students will then learn how to protect their information through playing an online simulation game.
How are predators in the WILD and ONLINE similar? Check out this …
How are predators in the WILD and ONLINE similar? Check out this lesson that incorporates Cybersecurity and pack animals! You will learn ways on how both the animals and you can be protected from danger!
This activity will get your students out of their seats! They will …
This activity will get your students out of their seats! They will be actively engaged with their classmates to solve the puzzle as well as navigate the sphero mini robot around on the rug! This lesson will have everyone singing about the continents way after the unit is complete!
Today we do lots of activities online. Students need to know the …
Today we do lots of activities online. Students need to know the importance of having a secure password to keep their information safe when using the internet. In this lesson students will learn to make a safe password with a hands on activity.
This is a review lesson intended to be used at the end …
This is a review lesson intended to be used at the end of the unit on Oceans. Students work in teams to complete activities that will result in the creation of a code or password. The codes will open a series of four locks to open a large lock box. A smaller lock box with a more difficult password can be solved to reveal a prize. This lesson also incorporates the topic of cybersecurity using password safety.
A breakout box is a great way to get students thinking and …
A breakout box is a great way to get students thinking and problem solving! What a fun, engaging way to get all classmates involved! Everyone will have busy hands and brains while working on this activity! What a great way to get your students thinking and problem solving as a team!
Using sensory bins, wiki sticks, and magical water painting art, students will …
Using sensory bins, wiki sticks, and magical water painting art, students will merge their knowledge of Virginia’s civil rights icons with strong password dos and don’ts.
This hands-on lesson merges digital safety concepts with Virginia state symbols and …
This hands-on lesson merges digital safety concepts with Virginia state symbols and allows students to construct their own three-dimensional learning landscape with fun materials like Legos and model magic.
This lesson on keeping personal information safe includes a video and a …
This lesson on keeping personal information safe includes a video and a decision making chart. Help students understand what is and is not ok to share.
Students will use their understanding of password security to create a model …
Students will use their understanding of password security to create a model of the layers of the Earth. Each layer essential to our Earth’s systems and processes just as the components of a strong password are important to enhance cybersecurity.
In this first part of a three part series, students will explore …
In this first part of a three part series, students will explore the ideas around Brute Force algorithm/programs to further understand the importance of password development, use, safety, and safekeeping while completing several unplugged activities over the course of three class periods (approximately 30-45 minutes each). These activites can be completed seperately with a few adjustments as well. Part 1 introduces Brute Force using a playing cards demonstration to sort as desired. Part 2 introduces Decrease (or Divide) and Conquer to sort Quadrilaterals from Non-Quadrilateral shapes. Part 3 uses the methods of both Brute Force and Divide and Conquer algorithms to decrypt (unscramble) passwords using commonly recognizable number patterns and words (completed on paper, or unplugged). These activitess are intended for upper middle school students, but could also be adjusted for lower level highschool or simplified/adjusted for other ages as well with the editable copies provided.
In this second part of a three part series, students will explore …
In this second part of a three part series, students will explore the ideas around Decrease, or Divide, and Conquer algorithm/programs to further understand the importance of password development, use, safety, and safekeeping by completing several unplugged activities over the course of three class periods (approximately 30-45 minutes each). These activites can be completed seperately (stand-alone) with a few adjustments as well. Part 1 introduces Brute Force using a playing cards demonstration to sort as desired. Part 2 introduces Decrease (or Divide) and Conquer to sort Quadrilaterals from Non-Quadrilateral shapes. Part 3 uses the methods of both Brute Force and Divide and Conquer algorithms to decrypt (unscramble) passwords using commonly recognizable number patterns and words (completed on paper, or unplugged). These activitess are intended for upper middle school students, but could also be adjusted for lower level highschool or simplified/adjusted for other ages as well with the editable copies provided.
In this final part of a three part series, students will practice …
In this final part of a three part series, students will practice Brute Force and Decrease (or Divide) and Conquer methods to try to crack a password puzzle to further understand the importance of password development, use, safety, and safekeeping by completing several unplugged sorting activities over the course of three class periods (approximately 30-45 minutes each). These activites can be completed seperately with a few minor adjustments as well. Part 1 introduces Brute Force using a playing cards demonstration to sort as desired. Part 2 introduces Decrease (or Divide) and Conquer to sort Quadrilaterals from Non-Quadrilateral shapes. Part 3 uses the methods of both Brute Force and Divide and Conquer algorithms to decrypt (unscramble) passwords using commonly recognizable number patterns and words (completed on paper, or unplugged). These activitess are intended for upper middle school students, but could also be adjusted for lower level highschool or simplified/adjusted for other ages as well with the editable copies provided.
Strand: Cybersecurity3.11 The student will create examples of strong passwords, explain why …
Strand: Cybersecurity3.11 The student will create examples of strong passwords, explain why strong passwords should be used, and demonstrate proper use and protection of personal passwords.4.11 The student will create examples of strong passwords, explain why strong passwords should be used, and demonstrate proper use and protection of personal passwords.Private information such as your phone number, address, favorite foods, or where you like to vacation should be carefully guarded. Passwords are a way to protect devices and information from unauthorized access. There are many ways a password can be guessed or stolen from a user.This activity allows students to take turns guessing simple passwords.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.