ALEX Classroom Resources

ALEX Classroom Resources  
   View Standards     Standard(s): [DLIT] (6) 15 :
9) Differentiate between a secure and a non-secure website including how they affect personal data.

Example: HTTP vs. HTTPS.

[DLIT] (7) 16 :
10) Explain social engineering, including countermeasures, and its impact on a digital society.

Examples: Phishing, hoaxes, impersonation, baiting, spoofing.

[DLIT] (8) 16 :
10) Analyze different modes of social engineering and their effectiveness.

Examples: Phishing, hoaxes, impersonation, baiting, spoofing.

Subject: Digital Literacy and Computer Science (6 - 8)
Title: Avoid Online Scams
URL: https://applieddigitalskills.withgoogle.com/c/middle-and-high-school/en/avoid-online-scams/overview.html
Description:

This is a lesson plan from Google for Education, Applied Digital Skills. During this lesson, students learn to identify and avoid online scams by analyzing a real-life situation in a group. Students will work collaboratively to identify online scams. They will analyze an online scam to identify suspicious behavior and warning signs. Then they will create a group document discussing an online scam and provide guidelines for how to avoid scams. 



   View Standards     Standard(s): [DLIT] (7) 16 :
10) Explain social engineering, including countermeasures, and its impact on a digital society.

Examples: Phishing, hoaxes, impersonation, baiting, spoofing.

[DLIT] (8) 19 :
13) Evaluate the impact of digital globalization on public perception and ways Internet censorship can affect free and equitable access to information.

[DLIT] (8) 25 :
19) Critique the impacts of censorship as it impacts global society.

Example: Create a presentation outlining the social implications of limiting access to web content by favoring or blocking particular products or websites.

[DLIT] (9-12) 17 :
11) Model and demonstrate behaviors that are safe, legal, and ethical while living, learning, and working in an interconnected digital world.

a. Recognize user tracking methods and hazards.

Examples: Cookies, WiFi packet sniffing.

b. Understand how to apply techniques to mitigate effects of user tracking methods.

c. Understand the ramifications of end-user license agreements and terms of service associated with granting rights to personal data and media to other entities.

d. Explain the relationship between online privacy and personal security.

Examples: Convenience and accessibility, data mining, digital marketing, online wallets, theft of personal information.

e. Identify physical, legal, and ethical consequences of inappropriate digital behaviors.

Examples: Cyberbullying/harassment, inappropriate sexual communications.

f. Explain strategies to lessen the impact of negative digital behaviors and assess when to apply them.

[DLIT] (9-12) 39 :
33) Evaluate the scalability and reliability of networks by describing the relationship between routers, switches, servers, topology, packets, or addressing, as well as the issues that impact network functionality.

Examples: Bandwidth, load, delay.

a. Explain the purpose of Internet Protocol addresses and how domain names are resolved to IP addresses through a Domain Name System server.

b. Understand the need for networking protocols and examples of common protocols.

Examples: HTTP, SMTP, and FTP

Subject: Digital Literacy and Computer Science (7 - 12)
Title: What Is Net Neutrality and What Will the Internet Look Like Without It?
URL: https://aptv.pbslearningmedia.org/resource/net-neutrality-kqed/the-lowdown-what-is-net-neutrality-and-what-will-the-internet-look-like-without-it/
Description:

The policy of net neutrality prevents internet service providers (ISPs), like Verizon and AT&T, from slowing down the loading speeds of certain websites or creating “fast lanes” for sites that pay a fee. This policy will almost certainly be overturned by the Republican-controlled Federal Communications Commission. This Lowdown lesson explores the pros and cons of net neutrality and examines the different ways lawmakers view internet service.



   View Standards     Standard(s): [DLIT] (5) 20 :
14) Analyze the impact of social media on individuals, families, and society.

[DLIT] (7) 16 :
10) Explain social engineering, including countermeasures, and its impact on a digital society.

Examples: Phishing, hoaxes, impersonation, baiting, spoofing.

[DLIT] (8) 16 :
10) Analyze different modes of social engineering and their effectiveness.

Examples: Phishing, hoaxes, impersonation, baiting, spoofing.

Subject: Digital Literacy and Computer Science (5 - 8)
Title: How Do Different Social Media Platforms Affect Your Mood?
URL: https://aptv.pbslearningmedia.org/resource/social-media-brain-kqed/how-do-different-social-media-platforms-affect-your-mood-above-the-noise/
Description:

Do a quick Google search on how social media affects your mood, and the results make it seem like all the social media platforms will plunge you into depression. Facebook shows everyone’s perfect life and exotic vacations. Expertly curated selfies abound on Instagram. But, if you look at the actual research, the results aren’t that simple. In this Above the Noise video, host Myles Bess breaks down the science and cuts through the hype about the link between depression and social media use and looks at how different social media platforms may affect your brain in different ways.



   View Standards     Standard(s): [DLIT] (7) 16 :
10) Explain social engineering, including countermeasures, and its impact on a digital society.

Examples: Phishing, hoaxes, impersonation, baiting, spoofing.

[DLIT] (8) 16 :
10) Analyze different modes of social engineering and their effectiveness.

Examples: Phishing, hoaxes, impersonation, baiting, spoofing.

Subject: Digital Literacy and Computer Science (7 - 8)
Title: Deepfakes: Can You Spot a Phony Video?
URL: https://aptv.pbslearningmedia.org/resource/above-the-noise-deep-fakes/above-the-noise-deep-fakes/support-materials/
Description:

A doctored video of Speaker Nancy Pelosi got millions of views on social media. Deepfakes are becoming easier to make and spread, and Above the Noise is here to help people understand this new phenomenon and what to do about it. This video has an educator's guide and student viewing guide.



   View Standards     Standard(s): [DLIT] (6) 15 :
9) Differentiate between a secure and a non-secure website including how they affect personal data.

Example: HTTP vs. HTTPS.

[DLIT] (6) 31 :
25) Differentiate between secure and non-secure systems.

[DLIT] (7) 16 :
10) Explain social engineering, including countermeasures, and its impact on a digital society.

Examples: Phishing, hoaxes, impersonation, baiting, spoofing.

[DLIT] (8) 16 :
10) Analyze different modes of social engineering and their effectiveness.

Examples: Phishing, hoaxes, impersonation, baiting, spoofing.

Subject: Digital Literacy and Computer Science (6 - 8)
Title: Buyer Beware
URL: https://www.remc.org/21Things4Students/21/buyer-beware/
Description:

Buying and selling on the Internet have changed the way we live. We can now perform a web search to locate, compare, and buy goods and services.

You are going to investigate e-commerce as a consumer and learn some tips on how to shop online, avoid Internet fraud, and benefit from reviews and ratings.


LEARNING OBJECTIVES

When you have completed this activity you will:

  1. know how to research and compare products [Computational Thinker]

  2. know how to protect yourself as an online consumer [Digital Citizen]

  3. be able to protect yourself from deceptive advertising, scams, and rip-offs [Digital Citizen]



   View Standards     Standard(s): [DLIT] (5) 33 :
27) Define social engineering and discuss possible defenses.

Examples: Phishing, impersonating

[DLIT] (7) 16 :
10) Explain social engineering, including countermeasures, and its impact on a digital society.

Examples: Phishing, hoaxes, impersonation, baiting, spoofing.

Subject: Digital Literacy and Computer Science (5 - 7)
Title: What Is Clickbait and How Can You Avoid It?
URL: https://www.commonsense.org/education/digital-citizenship/lesson/you-wont-believe-this
Description:

The internet is full of catchy headlines and outrageous images, all to make us curious and get our attention. But kids don't usually realize: What you click on isn't always what you get. Show your students the best ways to avoid clickbait online.

Students will be able to:

Note: You will need to create a free account at https://www.commonsense.org/education/user/register?destination=/education before you can view this resource.



ALEX Classroom Resources: 6

Go To Top of page