90 likes | 205 Vues
This lesson plan focuses on teaching 6th-grade students about Internet safety and security issues, as outlined in the Buford Middle School standards. Students will discuss the characteristics of online predators, learn about software piracy, hacking, and computer viruses. They will engage in creative activities, such as sketching what they think online predators look like, while understanding that these individuals can be known or unknown. The goal is to equip students with knowledge to navigate the Internet responsibly and protect their intellectual property.
E N D
Internet Safety Buford Middle 6th Grade
Standards: • MSBCS-BCSI-5: Students will discuss Internet safety and security issues. • MSBCS-BCSI-6: Students will utilize the Internet as a resource. • MSBCS-BCSI-8: Students will utilize word processing software. • CTAEW-1: The student demonstrates competence in a variety of genres. • CTAEMRC-1: Students will enhance reading in all curriculum areas by: • a. Reading in all curriculum areas. • c. Building vocabulary knowledge. • d. Establishing context.
What is Internet Safety? Using the internet safely and wisely
What do you think an online predator looks like? On a clean sheet of paper, draw a quick sketch of what you think online predators look like. Then share sketches with the class. Compare and contrast your sketches.
What is a predator? Anyone who uses technology with intentions to “harm” Can be someone you do not know Can be someone you know Can be someone online Can be someone texting you
Software Piracy • Unauthorized copying of software • Examples: • Using your neighbor’s copy of Microsoft Office and loading it onto your computer without paying for the software • Downloading a video game without paying for it
Hacking Computerhacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. www.wisegeek.com
Computer Viruses • Software written with intent to harm technology or a computer • Examples: • Worms – replicates it self through email or other transportation medium; causes damage to the security of your computer • Trojan Horse – looks useful, but causes damage to the security of your computer
Intellectual Property Theft Assignment: The Trial of Intellectual Property Theft • What is intellectual property? • Theft of property such as music, pictures, images, writings, essays, etc.