Updating search results...

Search Resources

6 Results

View
Selected filters:
  • VA.CS.5.9 - The student will evaluate and solve problems that relate to inappropri...
  • VA.CS.5.9 - The student will evaluate and solve problems that relate to inappropri...
Appropriate Use of Technology 5.9
Unrestricted Use
CC BY
Rating
0.0 stars

Students will read a passage about Sarah and Thomas and underline any use of technology in the passage. They will then write “AP” for appropriate or “IN” for inappropriate above any use of technology.5.9  The student will evaluate and solve problems that relate to inappropriate use of computing devices and networks.

Subject:
Computer Science
Cybersecurity
Material Type:
Activity/Lab
Author:
Robert Underwood
Date Added:
05/17/2022
Cybersecurity and The Constitution
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

In this lesson, students will review the development of the Constitution.  To experience what this might be like,  students will work together to create a set of rules, procedures, rights, and responsibilities needed to safely use computing devices and networks in our school. When they have finished they will compare their list to the school’s Acceptable Use Policy.

Subject:
American History
Computer Science
Cross-Curricular
Cybersecurity
History/Social Sciences
STEM/STEAM
Material Type:
Activity/Lab
Lesson
Lesson Plan
Author:
Kristin Vaughn
Date Added:
02/15/2024
Deciphering Facts
Unrestricted Use
CC BY
Rating
0.0 stars

This is an introductory lesson on encryption and decryption. It includes a discussion about the importance of protecting data when communicating across a network. The data is protected through a process of encryption and decryption.Students are asked to decrypt a message (in this case, a scientific fact to reinforce knowledge ) using the encrypted message and a decryption key.

Subject:
Cybersecurity
Material Type:
Lesson Plan
Author:
Jude Raffeinner
Date Added:
11/24/2021
My School Internet Policy
Unrestricted Use
CC BY
Rating
0.0 stars

Students use the school internet policy to answer questions about the school's rules and guidelines for internet and device use.

Subject:
Cybersecurity
Material Type:
Activity/Lab
Author:
Christopher McElraft
Date Added:
05/02/2022
Safe Websites and Research
Unrestricted Use
CC BY
Rating
0.0 stars

A lesson plan complete with video and research activity to explore the characteristics of safe websites. 

Subject:
Cross-Curricular
Material Type:
Activity/Lab
Author:
Barbara Matney
Date Added:
04/18/2022