ALEX Classroom Resources

ALEX Classroom Resources  
   View Standards     Standard(s): [DLIT] (6) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (7) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (8) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (9-12) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (9-12) 17 :
11) Model and demonstrate behaviors that are safe, legal, and ethical while living, learning, and working in an interconnected digital world.

a. Recognize user tracking methods and hazards.

Examples: Cookies, WiFi packet sniffing.

b. Understand how to apply techniques to mitigate effects of user tracking methods.

c. Understand the ramifications of end-user license agreements and terms of service associated with granting rights to personal data and media to other entities.

d. Explain the relationship between online privacy and personal security.

Examples: Convenience and accessibility, data mining, digital marketing, online wallets, theft of personal information.

e. Identify physical, legal, and ethical consequences of inappropriate digital behaviors.

Examples: Cyberbullying/harassment, inappropriate sexual communications.

f. Explain strategies to lessen the impact of negative digital behaviors and assess when to apply them.

Subject: Digital Literacy and Computer Science (6 - 12)
Title: Screen Time: How Much Is Too Much?
URL: https://www.pbslearningmedia.org/resource/screen-time-above-the-noise/screen-time-above-the-noise/
Description:

Even by conservative estimates, the average American spends over 6 hours per day staring at a screen. That’s a lot of time. What does the scientific research say about it? Is it good or bad for us? This video comes with a facilitator guide and student handout that helps guide the discussion of this activity.



   View Standards     Standard(s): [DLIT] (6) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (7) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (7) 17 :
11) Demonstrate positive, safe, legal, and ethical habits when creating and sharing digital content and identify the consequences of failing to act responsibly.

[DLIT] (8) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (9-12) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (9-12) 17 :
11) Model and demonstrate behaviors that are safe, legal, and ethical while living, learning, and working in an interconnected digital world.

a. Recognize user tracking methods and hazards.

Examples: Cookies, WiFi packet sniffing.

b. Understand how to apply techniques to mitigate effects of user tracking methods.

c. Understand the ramifications of end-user license agreements and terms of service associated with granting rights to personal data and media to other entities.

d. Explain the relationship between online privacy and personal security.

Examples: Convenience and accessibility, data mining, digital marketing, online wallets, theft of personal information.

e. Identify physical, legal, and ethical consequences of inappropriate digital behaviors.

Examples: Cyberbullying/harassment, inappropriate sexual communications.

f. Explain strategies to lessen the impact of negative digital behaviors and assess when to apply them.

Subject: Digital Literacy and Computer Science (6 - 12)
Title: Are Internet Trolls Born or Made?
URL: https://www.pbslearningmedia.org/resource/internet-trolls-kqed/are-internet-trolls-born-or-made-above-the-noise/
Description:

Trolls are all over the internet, just annoying people to no end. What makes someone an internet troll? Are some people just destined to be a troll, or do they develop this ability? Believe it or not, there have been numerous scientific studies surrounding this behavior. Explore the science behind trolling behavior in the latest Above the Noise video. This video comes with a student handout that helps guide the discussion of this activity.



   View Standards     Standard(s): [DLIT] (6) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (7) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (8) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (9-12) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

Subject: Digital Literacy and Computer Science (6 - 12)
Title: Online, All the Time
URL: https://aptv.pbslearningmedia.org/resource/dgn09.la.rv.visual.elements.online/online-all-the-time/
Description:

The great thing about the Internet and cell phone technology is that it's available all the time, 24/7. But is there a downside to being connected all the time? In this video from FRONTLINE: "Digital Nation," 17-year-old Greg and his parents describe his desire to stay connected to his friends at all times. This video comes with discussion questions.



   View Standards     Standard(s): [DLIT] (6) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (7) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (7) 17 :
11) Demonstrate positive, safe, legal, and ethical habits when creating and sharing digital content and identify the consequences of failing to act responsibly.

[DLIT] (8) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (8) 17 :
11) Advocate for positive, safe, legal, and ethical habits when creating and sharing digital content.

Example: Students create a brochure that highlights the consequences of illegally downloading media.

[DLIT] (9-12) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (9-12) 17 :
11) Model and demonstrate behaviors that are safe, legal, and ethical while living, learning, and working in an interconnected digital world.

a. Recognize user tracking methods and hazards.

Examples: Cookies, WiFi packet sniffing.

b. Understand how to apply techniques to mitigate effects of user tracking methods.

c. Understand the ramifications of end-user license agreements and terms of service associated with granting rights to personal data and media to other entities.

d. Explain the relationship between online privacy and personal security.

Examples: Convenience and accessibility, data mining, digital marketing, online wallets, theft of personal information.

e. Identify physical, legal, and ethical consequences of inappropriate digital behaviors.

Examples: Cyberbullying/harassment, inappropriate sexual communications.

f. Explain strategies to lessen the impact of negative digital behaviors and assess when to apply them.

Subject: Digital Literacy and Computer Science (6 - 12)
Title: Is Facial Recognition Invading Your Privacy?
URL: https://aptv.pbslearningmedia.org/resource/facial-recognition-software-kqed/is-facial-recognition-invading-your-privacy-above-the-noise/
Description:

Facial recognition is creeping more and more into our daily lives. Facebook and Google use it for auto-tagging photos. Snapchat uses it to create hilarious filters. And Apple’s new iPhone will allow you to use your face to unlock your phone. But this same technology can be used by governments and companies to learn as much as they can about you. Find out how facial recognition technology works in the newest Above the Noise video. This video comes with a student viewing guide.



   View Standards     Standard(s): [DLIT] (7) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (7) 17 :
11) Demonstrate positive, safe, legal, and ethical habits when creating and sharing digital content and identify the consequences of failing to act responsibly.

Subject: Digital Literacy and Computer Science (7)
Title: My Media Use: A Personal Challenge
URL: https://www.commonsense.org/education/digital-citizenship/lesson/my-media-use-a-personal-challenge
Description:

Most of us use a lot of digital media in our daily lives -- even when we don't realize it! Having a balance between online and offline time is important, but a healthy media balance might look different for everyone. Help students create a personalized plan for healthy media use.

Students will be able to:
  • make an inventory of their media choices and how those choices make them feel.
  • brainstorm personal strategies for balancing media use.
  • create personal guidelines for promoting healthy media balance.

Users will need to create a free account to access this resource. 



   View Standards     Standard(s): [DLIT] (6) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (6) 2 :
R2) Recognize and demonstrate age-appropriate responsible use of digital devices and resources as outlined in school/district rules.

[DLIT] (6) 17 :
11) Differentiate between appropriate and inappropriate digital content and the use of that content.

[DLIT] (7) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (7) 2 :
R2) Recognize and demonstrate age-appropriate responsible use of digital devices and resources as outlined in school/district rules.

[DLIT] (8) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (8) 2 :
R2) Recognize and demonstrate age-appropriate responsible use of digital devices and resources as outlined in school/district rules.

Subject: Digital Literacy and Computer Science (6 - 8)
Title: Basics
URL: https://www.remc.org/21Things4Students/21/1-basics/
Description:

Welcome! There are eight main Quests that are separated into two parts for this Basics adventure and three Gold Quests that are included for those wishing additional resources.

Learning Objectives

When you have completed this activity you will:



   View Standards     Standard(s): [DLIT] (6) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (6) 18 :
12) Define digital permanence.

[DLIT] (6) 19 :
13) Define personal privacy, digital footprint, and open communication.

[DLIT] (7) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (7) 18 :
12) Discuss the impact of data permanence on digital identity including best practices to protect personal digital footprint.

[DLIT] (8) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (8) 18 :
12) Cite evidence of the positive and negative effects of data permanence on personal and professional digital identity.

Subject: Digital Literacy and Computer Science (6 - 8)
Title: Cyber Safety
URL: https://www.remc.org/21Things4Students/21/cybersafety/
Description:

Your challenge is to open the Cyber Safe by completing Quests to help make the connection between the real world and the digital world. The decisions made in your digital world affect you as much as those made in the real world. In fact, your digital decisions and behaviors can affect you more and for longer than decisions made in the real world--even with prospective employers and college applications!

Earn your Cyber Safety Expert badge by successfully completing the Quests and cracking the cyber safe.


LEARNING OBJECTIVES

When you have completed this activity you will:

  1. know how to be safe while on the Internet [Digital Citizen]

  2. understand online etiquette [Digital Citizen]

  3. understand the impact of online bullying [Digital Citizen]



   View Standards     Standard(s): [DLIT] (7) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (7) 17 :
11) Demonstrate positive, safe, legal, and ethical habits when creating and sharing digital content and identify the consequences of failing to act responsibly.

[DLIT] (7) 18 :
12) Discuss the impact of data permanence on digital identity including best practices to protect personal digital footprint.

[DLIT] (8) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (8) 18 :
12) Cite evidence of the positive and negative effects of data permanence on personal and professional digital identity.

Subject: Digital Literacy and Computer Science (7 - 8)
Title: Being Aware of What You Share
URL: https://www.commonsense.org/education/digital-citizenship/lesson/being-aware-of-what-you-share
Description:

Kids share a lot of information whenever they go online -- sometimes on purpose, sometimes not. But do they understand that online privacy isn't just what they say and post? Help your students learn about their digital footprints and the steps they can take to shape what others find and see about them.

Students will be able to:
- Reflect on the concept of privacy, including what they feel comfortable sharing and with which people.
- Analyze different ways that advertisers collect information about users to send them targeted ads.
- Identify strategies for protecting their privacy, including opting out of specific features and analyzing app or website privacy policies.

Available in both English and Spanish.



   View Standards     Standard(s): [DLIT] (7) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (7) 17 :
11) Demonstrate positive, safe, legal, and ethical habits when creating and sharing digital content and identify the consequences of failing to act responsibly.

[DLIT] (7) 18 :
12) Discuss the impact of data permanence on digital identity including best practices to protect personal digital footprint.

Subject: Digital Literacy and Computer Science (7)
Title: The Power of Digital Footprints
URL: https://www.commonsense.org/education/digital-citizenship/lesson/the-power-of-digital-footprints
Description:

What others find about us online shapes who they think we are and how they feel about us. But do kids know what kinds of tracks they've already left? Help your students learn about their digital footprints and the steps they can take in the future to shape what others find and see about them online.

Students will be able to:

Resources available in both English and Spanish.



ALEX Classroom Resources: 9

Go To Top of page