This performance task is designed for third grade and up to teach …
This performance task is designed for third grade and up to teach the importance of using strong passwords. This would be helpful to use at the beginning of the year to review password safety with upper elementary school students to refresh their memory. This includes an instructional slide show and a student handout.
This slideshow will help students to identify and use strong passwords, and explain …
This slideshow will help students to identify and use strong passwords, and explain why strong passwords should be used (e.g., protect name, address, and telephone number). It walks students through a process that can be used to create strong, easy to remember, passwords.
Every day our privacy is at risk with data being collected about …
Every day our privacy is at risk with data being collected about us as we share and live more of our lives online. For this activity, you will explore how you do and do not protect your privacy online and then create a security avatar to help you battle for your privacy.
Strand: Cybersecurity3.11 The student will create examples of strong passwords, explain why …
Strand: Cybersecurity3.11 The student will create examples of strong passwords, explain why strong passwords should be used, and demonstrate proper use and protection of personal passwords.4.11 The student will create examples of strong passwords, explain why strong passwords should be used, and demonstrate proper use and protection of personal passwords.Private information such as your phone number, address, favorite foods, or where you like to vacation should be carefully guarded. Passwords are a way to protect devices and information from unauthorized access. There are many ways a password can be guessed or stolen from a user.This activity allows students to take turns guessing simple passwords.
Strong Passwords is a "King of the Mountain" style game created using …
Strong Passwords is a "King of the Mountain" style game created using Gamilab. Students will answer ten true or false questions about passwords in order to help the climber get to the top of the mountain. It is based on SOL 3.11: The student will create examples of strong passwords, explain why strong passwords should be used, and demonstrate proper use and protection of personal passwords.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.