This performance task is designed for third grade and up to teach …
This performance task is designed for third grade and up to teach the importance of using strong passwords. This would be helpful to use at the beginning of the year to review password safety with upper elementary school students to refresh their memory. This includes an instructional slide show and a student handout.
This slideshow will help students to identify and use strong passwords, and explain …
This slideshow will help students to identify and use strong passwords, and explain why strong passwords should be used (e.g., protect name, address, and telephone number). It walks students through a process that can be used to create strong, easy to remember, passwords.
A short screencast to demonstrate how to change your password in #GoOpenVA …
A short screencast to demonstrate how to change your password in #GoOpenVA (if you have an assigned account). IF YOU HAVE AN ACCOUNT ACCESSED THROUGH A SINGLE-SIGN-ON SOLUTION FROM YOUR SCHOOL DIVISION (CLEVER OR GOOGLE), YOU SHOULD CHANGE PASSWORDS ONLY ON YOUR GENERAL DIVISION LOG-IN ACCOUNT.
Students will create a strong password to access a computer and/or website. …
Students will create a strong password to access a computer and/or website. The password must meet specific criteria. Once the students master the criteria, they will reveal their secret password with their teacher, using a highlighter and a blacklight.
Passwords are crucual in our world today. They give us a simple …
Passwords are crucual in our world today. They give us a simple measure to protect ourselves and our information online. This lesson provides an intro into cybersecurity and its vocabulary, as well as incorporates independent, partner, and whole group learning activities to determine what is a strong password and how to create it. All activities are low prep and can be modified to your needs.
Looking for a fun way to teach both scientific method and cybersecurity? …
Looking for a fun way to teach both scientific method and cybersecurity? Well great job, you found it. Students will not only learn 5 characteristics to making a good password but they will also be using all of their 2.1, 3.1, and 4.1 strands to build and rebuild a structure using different materials that are probably inside your classroom right now. Need a STEM activity for a club day? Need a “Friday and I can’t teach anymore content” lesson? This is for you. Roll up your sleeves and let the students do the work and problem solve in a simple and fun way.
Passwords are essential to protecting our private information from others. Use this …
Passwords are essential to protecting our private information from others. Use this lesson to explore some basic probabilty behind password options and how easily they can be guessed! This lesson provides an intro into cybersecurity and its vocabulary, as well as incorporates low prep activities you can modifiy to fit your needs.
This lesson plan is intended to guide teachers on how to direct …
This lesson plan is intended to guide teachers on how to direct second grade students to create strong passwords that will help protect privacy of information.
The teacher will introduce/ reiterate the importance of usernames and passwords. At …
The teacher will introduce/ reiterate the importance of usernames and passwords. At the beginning of the year students receive their username and password for their personal school devices or for logging into the school equipment. This activity allows students to locate and color the keys on the keyboard to help them with the initial login process and remembering their username and password.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.