ALEX Classroom Resources

ALEX Classroom Resources  
   View Standards     Standard(s): [SC2015] (2) 6 :
6 ) Design and construct models to simulate how animals disperse seeds or pollinate plants (e.g., animals brushing fur against seed pods and seeds falling off in other areas, birds and bees extracting nectar from flowers and transferring pollen from one plant to another).*

[DLIT] (0) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (1) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (2) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (2) 13 :
7) List positive and negative impacts of digital communication.

Example: Anything posted or communicated electronically may be easily reproduced and could remain a positive or negative part of your digital identity/footprint.

[DLIT] (3) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (4) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (5) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (6) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (6) 19 :
13) Define personal privacy, digital footprint, and open communication.

Subject: Science (2), Digital Literacy and Computer Science (K - 6)
Title: Steve Trash Science: Messy Babies and Pollinators / Your Digital Footprint
URL: https://www.pbs.org/video/messy-babies-and-pollinators-your-digital-footprint-0nv3uf/
Description:

Steve Trash teaches kids about science with fun and magic. The show is filmed in Alabama.

What are pollinators? What do they do? And how are they like messy babies? Then, see how every time you do something online you’re creating a digital footprint that can be tracked back to you. Steve Trash explains both with fun and magic.



   View Standards     Standard(s): [DLIT] (1) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (2) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (3) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (4) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (5) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

Subject: Digital Literacy and Computer Science (1 - 5)
Title: Energy Vampires
URL: https://aptv.pbslearningmedia.org/resource/arct14.sci.grnvampire/energy-vampires/
Description:

An "energy vampire" is an electronic device that drinks power even when it is not being used. Like computers in standby mode or chargers that are done charging. Spooky, huh? Take a look at this slideshow, from The Greens, and slay the energy vampires in your house! The Greens is a website for kids from WGBH about sustainability and green living.



   View Standards     Standard(s): [DLIT] (1) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (1) 12 :
6) Identify appropriate and inappropriate behaviors for communicating in a digital environment.

Examples: Cyberbullying, online etiquette.

Subject: Digital Literacy and Computer Science (1)
Title: Pause & Think Online
URL: https://www.commonsense.org/education/digital-citizenship/lesson/pause-think-online
Description:

From our head down to our toes, and our feet up to our nose, the Digital Citizens teach students how to be safe, responsible, and respectful online.

Students will be able to:
  • understand the importance of being safe, responsible, and respectful online.
  • learn the "Pause & Think Online" song to remember basic digital citizenship concepts.

Users will need a free account to access this resource. 



   View Standards     Standard(s): [DLIT] (1) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (1) 12 :
6) Identify appropriate and inappropriate behaviors for communicating in a digital environment.

Examples: Cyberbullying, online etiquette.

Subject: Digital Literacy and Computer Science (1)
Title: How Technology Makes You Feel
URL: https://www.commonsense.org/education/digital-citizenship/lesson/how-technology-makes-you-feel
Description:

This foundational digital citizenship lesson challenges kids to pay attention to their feelings while using tech. With an engaging emoji game, students learn practical strategies for managing their feelings -- good, bad, and everything in between.

Students will be able to:
  • recognize the different kinds of feelings they can have when using technology.
  • know what to do when they don't have a good feeling when using technology.

Users will need a free account to access this content. 



   View Standards     Standard(s): [DLIT] (1) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (1) 2 :
R2) Recognize and demonstrate age-appropriate responsible use of digital devices and resources as outlined in school/district rules.

Subject: Digital Literacy and Computer Science (1)
Title: Internet Traffic Light
URL: https://www.commonsense.org/education/digital-citizenship/lesson/internet-traffic-light
Description:

Staying safe online is a lot like staying safe in the real world. Using a fun traffic light activity, students learn how to identify "just right" content, giving them the green light to learn, play, and explore the internet safely.

Students will be able to:
  • understand that being safe online is similar to staying safe in real life.
  • learn to identify websites and apps that are "just right" and "not right" for them.
  • know how to get help from an adult if they are unsure about a website.

Users will need an account to access this resource. 



   View Standards     Standard(s): [DLIT] (1) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (1) 2 :
R2) Recognize and demonstrate age-appropriate responsible use of digital devices and resources as outlined in school/district rules.

[DLIT] (1) 10 :
4) Demonstrate age-appropriate methods for keeping personal information private.

Example: Keep passwords confidential, use anonymous profile picture or avatar, develop user names that are non-identifying or do not include actual name.

[DLIT] (1) 12 :
6) Identify appropriate and inappropriate behaviors for communicating in a digital environment.

Examples: Cyberbullying, online etiquette.

[DLIT] (1) 13 :
7) Recognize that a person has a digital identity.

Subject: Digital Literacy and Computer Science (1)
Title: Computer Science Fundamentals Unit 3 Course B Lesson 3: Your Digital Footprint (2018)
URL: https://curriculum.code.org/csf-18/courseb/3/
Description:

In collaboration with Common Sense Education - Website, this lesson helps students learn about the similarities of staying safe in the real world and when visiting websites. Students will also learn that the information they put online leaves a digital footprint or “trail.” This trail can be big or small, helpful or hurtful, depending on how they manage it.

Common Sense Education has created this lesson to teach kids the importance of understanding the permanence of something posted on the internet. By relating footprints on a map to what a student might post online, students will make important connections between being tracked by a physical footprint on a path and being tracked based on information posted online.

Students will be able to:
- Understand that being safe when they visit websites is similar to staying safe in real life.
- Learn to recognize websites that are safe for them to visit.
- Recognize if they should ask an adult they trust before they visit a particular website.
- Explore what information is appropriate to be put online.

Note: You must create a free account to access this and use this resource. 



ALEX Classroom Resources: 6

Go To Top of page