ALEX Learning Activity Resources

Back
ALEX Learning Activities  
   View Standards     Standard(s): [DLIT] (3) 15 :
9) Identify the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers.

[DLIT] (4) 14 :
8) Demonstrate the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers.

[DLIT] (5) 15 :
9) Explain the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers, cookies.

Subject: Digital Literacy and Computer Science (3 - 5)
Title: Protect Your Password and Your Privacy!
Description:

This activity will guide students through a discussion of why, how and when passwords are used to protect individual privacy, how to create strong passwords, and who to share passwords with. The activity will also show students how they can adjust their privacy settings on their online accounts.  After the presentation and discussion, students will practice what they have learned by playing “InterLand,” an online game resource that is part of the “Be Internet Awesome with Google” digital citizenship curriculum, designed for students in grades 3-6. The “Tower of Treasure” learning game focuses on protecting privacy and creating strong passwords.

This activity was created as a result of the ALEX Resource Development Summit.




   View Standards     Standard(s): [DLIT] (5) 15 :
9) Explain the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers, cookies.

[DLIT] (5) 7 :
1) Construct a complex system of numbers or letters to represent information.

Example: Student-created complex secret codes using more than one form to solve a problem or answer a question.

Subject: Digital Literacy and Computer Science (5)
Title: Security Technologies: Encryption
Description:

Students will understand and explain the security technologies of encryption and public keys and construct a complex system of numbers and/or letters to represent information.

This activity was created as a result of the DLCS COS Resource Development Summit.




ALEX Learning Activities: 2

Go To Top of page