Students will read a passage about Sarah and Thomas and underline any …
Students will read a passage about Sarah and Thomas and underline any use of technology in the passage. They will then write “AP” for appropriate or “IN” for inappropriate above any use of technology.5.9 The student will evaluate and solve problems that relate to inappropriate use of computing devices and networks.
In this lesson, students will review the development of the Constitution. To …
In this lesson, students will review the development of the Constitution. To experience what this might be like, students will work together to create a set of rules, procedures, rights, and responsibilities needed to safely use computing devices and networks in our school. When they have finished they will compare their list to the school’s Acceptable Use Policy.
This is an introductory lesson on encryption and decryption. It includes a …
This is an introductory lesson on encryption and decryption. It includes a discussion about the importance of protecting data when communicating across a network. The data is protected through a process of encryption and decryption.Students are asked to decrypt a message (in this case, a scientific fact to reinforce knowledge ) using the encrypted message and a decryption key.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.