To make the most of the Internet, learners need to be prepared to make smart decisions. This collection includes resources to support teaching the fundamentals of digital citizenship and safety so they can explore the online world with confidence.
This is a PowerPoint based on the Computer Science standard 2.9 that …
This is a PowerPoint based on the Computer Science standard 2.9 that reminds students of the rules of using computers appropriately at schoolThis is a PowerPoint based on the Computer Science standard 2.9 that reminds students of the rules of using computers appropriately at schoolThis is a PowerPoint based on the Computer Science standard 2.9 that reminds students of the rules of using computers appropriately at schoolThis is a PowerPoint based on the Computer Science standard 2.9 that reminds students of the rules of using computers appropriately at schoolThis is a PowerPoint based on the Computer Science standard 2.9 that reminds students of the rules of using computers appropriately at schoolThis is a PowerPoint presentation that is based on the Computer Science standard in Cybersecurity, SOL C.S. 2.9 where students will be reminded of the rules of how to use and handle their computers safely and responsibly.
This is a crossword puzzle that is comprised of the essential vocabulary from …
This is a crossword puzzle that is comprised of the essential vocabulary from the Computer Science SOL 8.7 in Cybersecurity. It was made at Flippity.net.
These Pocket Guides are a quick summary of each of the 6 …
These Pocket Guides are a quick summary of each of the 6 computer science strands for grades K-8. The pocket guides explain what the strand is about and how it increases in complexity from Kindergarten to 8th grade.
This unplugged lesson will allow students to encrypt and decrypt message using …
This unplugged lesson will allow students to encrypt and decrypt message using the Caesar Cipher letter shift method of encryption. Cover the process of how this method works by doing an example and explaining the process of shifting the plaintext by the letter shift value to create the encrypted cipher text.
This lesson is designed to teach students basic encryption using the Caesar …
This lesson is designed to teach students basic encryption using the Caesar cipher method. This is a simple letter shift cipher that takes a plaintext message and encrypts it into cipher text by shifting each letter of the message by a value between 1 and 25 (1 less than the total number of letters in the English alphabet). This technique was used by Julius Caesar to encrypt messages by shifting each letter of the message by 3 letters. The message would be decrypted by taking each letter and shifting back 3 letters to reveal the plaintext message.
Checkology is a free e-learning platform with engaging, authoritative lessons on subjects …
Checkology is a free e-learning platform with engaging, authoritative lessons on subjects like news media bias, misinformation, conspiratorial thinking and more.
Learners develop the ability to identify credible information, seek out reliable sources and apply critical thinking skills to separate fact-based content from falsehoods.
Students will examine the history and culture of the Choctaw Native Americans, …
Students will examine the history and culture of the Choctaw Native Americans, as well as the story of the Code Talkers in WW1, in order to memorialize one of the Choctaw Code Talkers.
The student or class will watch a video clip about spies and …
The student or class will watch a video clip about spies and secret codes from the past. Next students will be able to use a Pigpen cipher to crack a secret message of their own. Teachers can edit the message to fit their needs and make adjustments as desired. This is one mini lesson out of a series of five.
The student or class will watch a video clip about how to …
The student or class will watch a video clip about how to decode a Vigenère Square Cipher.Next students will be able to use the cipher to crack a secret message of their own (teacher provided messages in a hat (not inlcuded)). One student chooses the word or phrase, the teacher puts the key (word) on the board, that same student will encrypt the message and send it to their partner. The partner with use the same key word to return the text to plain text revealing the message and send their guess back to their partner. Teachers can edit the message to fit their needs and make adjustments as desired. This is one mini lesson out of a series of five (part 2) and can be used alone, or with other lessons in the series. Vigenère Square Ciphefrom the past. Next students will be able to use a Pigpen cipher to crack a secret message of their own. Teachers can edit the message to fit their needs and make adjustments as desired. This is one mini lesson out of a series of five. Vigenère Square Ciphe
The student or class will watch a video clip about ciphers, specifically …
The student or class will watch a video clip about ciphers, specifically Caesar Ciphers. Next students will learn more about encryption and decryption through the use of "keys". Lastly, students will be introduced to the career path choices as a Cyber-security analyst. This is one lesson out of a series of five, and can be used alone, or with the some or all of the other four lessons.
The Internet is open, so everything that happens on it can be …
The Internet is open, so everything that happens on it can be seen unless it's protected. In modern countries, people are more worried about getting hacked than about any other crime. Why? Because every computer or phone on the Internet is regularly being tested for vulnerabilities by criminals, terrorists, or even state actors. If you're not careful, somebody could hack your device or accounts, and even steal your identity or your money.
Use digital citizenship lesson plans to address timely topics and prepare students …
Use digital citizenship lesson plans to address timely topics and prepare students to take ownership of their digital lives. Browse lessons by grade and topic below, or see an overview of the curriculum.
We've got more new lessons! Explore all lesson plans or check our lesson collections!
Use digital citizenship lesson plans to address timely topics and prepare students …
Use digital citizenship lesson plans to address timely topics and prepare students to take ownership of their digital lives. Browse lessons by grade and topic below, or see an overview of the curriculum.
We've got more new lessons! Explore all lesson plans or check our lesson collections!
Use digital citizenship lesson plans to address timely topics and prepare students …
Use digital citizenship lesson plans to address timely topics and prepare students to take ownership of their digital lives. Browse lessons by grade and topic below, or see an overview of the curriculum.
We've got more new lessons! Explore all lesson plans or check our lesson collections!
Use digital citizenship lesson plans to address timely topics and prepare students …
Use digital citizenship lesson plans to address timely topics and prepare students to take ownership of their digital lives. Browse lessons by grade and topic below, or see an overview of the curriculum.
Learn about what copyright does—and does not—cover in our Circulars. These guides …
Learn about what copyright does—and does not—cover in our Circulars. These guides provide detailed, up-to-date information to explain copyright to the public.
The Learning Engine series of videos introduces copyright concepts and the Copyright …
The Learning Engine series of videos introduces copyright concepts and the Copyright Office to those who may be new to the topic or who want to learn more. More videos will be added in the future here and to our YouTube channel. Subscribe to the channel to be notified when new videos are available.
This breakout activity provides teachers and students an interactive way to demonstrate …
This breakout activity provides teachers and students an interactive way to demonstrate their learning about cryptography, code-breaking, and historic ciphers. Clues are provided, along with additional hints you can choose to provide to students so that students solve ciphers and learn what time their army is planning to raid the enemy camp.
In this lesson, students will learn about one of the most significant …
In this lesson, students will learn about one of the most significant and successful spy rings in American History. They will also actually conduct some of the same techniques and demonstrate them to the rest of the class.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.