ALEX Resources

Narrow Results:
Lesson Plans (1) A detailed description of the instruction for teaching one or more concepts or skills. Learning Activities (8) Building blocks of a lesson plan that include before, during, and after strategies to actively engage students in learning a concept or skill.


ALEX Lesson Plans  
   View Standards     Standard(s): [ELA2015] (7) 2 :
2 ) Determine a theme or central idea of a text and analyze its development over the course of the text; provide an objective summary of the text. [RL.7.2]

[ELA2015] (8) 2 :
2 ) Determine a theme or central idea of a text and analyze its development over the course of the text, including its relationship to the characters, setting, and plot; provide an objective summary of the text. [RL.8.2]

[TC2] (6-8) 8 :
8 ) Identify safe uses of social networking and electronic communication.

•  Recognizing dangers of online predators
•  Protecting personal information online
[TC2] (6-8) 12 :
12 ) Use digital tools to communicate and collaborate at all levels from interpersonal to global.

Examples: instant messages, e-mail, blogs, wikis, collaborative authoring tools, online learning communities

•  Demonstrating digital file transfer
Examples: attaching, uploading, downloading

Subject: English Language Arts (7 - 8), or Technology Education (6 - 8)
Title: Interactive Reading Project
Description:

Students are motivated to read and learn to discuss literature by discussing books they are reading via e-mail.




ALEX Learning Activities  
   View Standards     Standard(s): [TC2] (6-8) 8 :
8 ) Identify safe uses of social networking and electronic communication.

•  Recognizing dangers of online predators
•  Protecting personal information online
[TC2] CA2 (9-12) 8 :
8 ) Practice safe uses of social networking and electronic communication.

•  Recognizing dangers of online predators
•  Protecting personal information online
Example: recognizing risk of identity theft

Subject: Technology Education (6 - 12)
Title: Tracking Your Digital Footprint
Description:

The activity, Tracking Your Digital Footprint, will help students become aware of how much of their personal information has been made public on the internet. They will also be more aware of how information is shared with the public through social media without their knowledge. Students will post responses to a Padlet wall.

This activity was created as a result of the DLCS COS Resource Development Summit.




   View Standards     Standard(s): [TC2] (6-8) 8 :
8 ) Identify safe uses of social networking and electronic communication.

•  Recognizing dangers of online predators
•  Protecting personal information online
[DLIT] (6) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (6) 2 :
R2) Recognize and demonstrate age-appropriate responsible use of digital devices and resources as outlined in school/district rules.

[DLIT] (7) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (7) 2 :
R2) Recognize and demonstrate age-appropriate responsible use of digital devices and resources as outlined in school/district rules.

[DLIT] (8) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (8) 2 :
R2) Recognize and demonstrate age-appropriate responsible use of digital devices and resources as outlined in school/district rules.

Subject: Technology Education (6 - 8), Digital Literacy and Computer Science (6 - 8)
Title: Safe Side of the Internet
Description:

Padlet is an online digital bulletin board. The teacher will pose an open question or topic about online safety and elicit student responses to create a wall poster.   Using Padlet, students will post three ways to stay safe while online.




   View Standards     Standard(s): [TC2] (6-8) 8 :
8 ) Identify safe uses of social networking and electronic communication.

•  Recognizing dangers of online predators
•  Protecting personal information online
[DLIT] (7) 18 :
12) Discuss the impact of data permanence on digital identity including best practices to protect personal digital footprint.

Subject: Technology Education (6 - 8), Digital Literacy and Computer Science (7)
Title: How to Create a Safe Online Profile
Description:

Using the interactive tool Profile Publisher, students (grades 6-12) will create a printed social networking profile for a fictional character, a historical figure, an inanimate object, etc. to demonstrate their understanding of the appropriate and safe content for an online profile.




   View Standards     Standard(s): [TC2] (6-8) 2 :
2 ) Publish digital products that communicate curriculum concepts.

Examples: Web pages, videos, podcasts, multimedia presentations

[TC2] (6-8) 13 :
13 ) Use digital tools to formulate solutions to authentic problems.

Examples: electronic graphing tools, probes, spreadsheets

[TC2] (6-8) 14 :
14 ) Use digital tools to generate new ideas, products, or processes.

Examples: ideas—predictions, trends

-  products—animation, video

-  processes—models, simulations

[TC2] (6-8) 12 :
12 ) Use digital tools to communicate and collaborate at all levels from interpersonal to global.

Examples: instant messages, e-mail, blogs, wikis, collaborative authoring tools, online learning communities

•  Demonstrating digital file transfer
Examples: attaching, uploading, downloading

[TC2] (6-8) 11 :
11 ) Use digital tools and strategies to locate, collect, organize, evaluate, and synthesize information.

Examples: locating—Boolean searches, graphic organizers, spreadsheets, databases

-  collecting—probeware, graphing calculators

-  organizing—graphic organizers, spreadsheets

-  evaluating—reviewing publication dates, determining credibility

-  synthesizing—word processing software, concept-mapping software

[TC2] (6-8) 8 :
8 ) Identify safe uses of social networking and electronic communication.

•  Recognizing dangers of online predators
•  Protecting personal information online
[TC2] (6-8) 7 :
7 ) Demonstrate correct keyboarding techniques.

[TC2] (6-8) 5 :
5 ) Use basic features of word processing, spreadsheets, databases, and presentation software.

Examples: word processing—reports, letters, brochures

-  spreadsheets—discovering patterns, tracking spending, creating budgets

-  databases—contact list of addresses and telephone numbers

-  presentation software—slideshow

Subject: Technology Education (6 - 8)
Title: Tailor Your Teaching with Today's Meet
Description:

This is a live stream chat, where students can ask questions and leave comments. Teachers can use the comments and questions to tailor their teaching on the spot to meet student needs. Students can also respond to one another, creating a live learning community. A temporary room can be set up that will automatically delete in a set time frame. 




   View Standards     Standard(s): [TC2] (6-8) 2 :
2 ) Publish digital products that communicate curriculum concepts.

Examples: Web pages, videos, podcasts, multimedia presentations

[TC2] (6-8) 8 :
8 ) Identify safe uses of social networking and electronic communication.

•  Recognizing dangers of online predators
•  Protecting personal information online
[TC2] (6-8) 9 :
9 ) Practice responsible and legal use of technology systems and digital content.

Examples: avoiding plagiarism; complying with acceptable-use policies, copyright laws, and fair use standards; recognizing secure Web sites

•  Identifying examples of computer crime and related penalties
Examples: computer crime—phishing, spoofing, virus and worm dissemination, cyberbullying

-  penalties—fines, incarceration

•  Citing sources of digital content
[TC2] (6-8) 12 :
12 ) Use digital tools to communicate and collaborate at all levels from interpersonal to global.

Examples: instant messages, e-mail, blogs, wikis, collaborative authoring tools, online learning communities

•  Demonstrating digital file transfer
Examples: attaching, uploading, downloading

[TC2] CA2 (9-12) 8 :
8 ) Practice safe uses of social networking and electronic communication.

•  Recognizing dangers of online predators
•  Protecting personal information online
Example: recognizing risk of identity theft

[TC2] CA2 (9-12) 9 :
9 ) Practice ethical and legal use of technology systems and digital content.

•  Explaining consequences of illegal and unethical use of technology systems and digital content
Examples: cyberbullying, plagiarism

•  Interpreting copyright laws and policies with regard to ownership and use of digital content
•  Citing sources of digital content using a style manual
Examples: Modern Language Association (MLA), American Psychological Association (APA)

[DLIT] (6) 6 :
R6) Produce, review, and revise authentic artifacts that include multimedia using appropriate digital tools.

[DLIT] (6) 18 :
12) Define digital permanence.

[DLIT] (7) 6 :
R6) Produce, review, and revise authentic artifacts that include multimedia using appropriate digital tools.

[DLIT] (7) 17 :
11) Demonstrate positive, safe, legal, and ethical habits when creating and sharing digital content and identify the consequences of failing to act responsibly.

[DLIT] (7) 18 :
12) Discuss the impact of data permanence on digital identity including best practices to protect personal digital footprint.

[DLIT] (8) 6 :
R6) Produce, review, and revise authentic artifacts that include multimedia using appropriate digital tools.

[DLIT] (8) 17 :
11) Advocate for positive, safe, legal, and ethical habits when creating and sharing digital content.

Example: Students create a brochure that highlights the consequences of illegally downloading media.

[DLIT] (8) 18 :
12) Cite evidence of the positive and negative effects of data permanence on personal and professional digital identity.

[DLIT] (9-12) 6 :
R6) Produce, review, and revise authentic artifacts that include multimedia using appropriate digital tools.

[DLIT] (9-12) 17 :
11) Model and demonstrate behaviors that are safe, legal, and ethical while living, learning, and working in an interconnected digital world.

a. Recognize user tracking methods and hazards.

Examples: Cookies, WiFi packet sniffing.

b. Understand how to apply techniques to mitigate effects of user tracking methods.

c. Understand the ramifications of end-user license agreements and terms of service associated with granting rights to personal data and media to other entities.

d. Explain the relationship between online privacy and personal security.

Examples: Convenience and accessibility, data mining, digital marketing, online wallets, theft of personal information.

e. Identify physical, legal, and ethical consequences of inappropriate digital behaviors.

Examples: Cyberbullying/harassment, inappropriate sexual communications.

f. Explain strategies to lessen the impact of negative digital behaviors and assess when to apply them.

Subject: Technology Education (6 - 12), Digital Literacy and Computer Science (6 - 12)
Title: Social Media Responsibility
Description:


   View Standards     Standard(s): [TC2] (6-8) 8 :
8 ) Identify safe uses of social networking and electronic communication.

•  Recognizing dangers of online predators
•  Protecting personal information online
[DLIT] (8) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (8) 18 :
12) Cite evidence of the positive and negative effects of data permanence on personal and professional digital identity.

Subject: Technology Education (6 - 8), Digital Literacy and Computer Science (8)
Title: Teaching Students to Think Before You Post
Description:

This video promoted by the Ad Council is designed to make teens aware of the potential dangers of sharing and posting personal information online and communicating with unfamiliar people.




   View Standards     Standard(s): [TC2] (6-8) 8 :
8 ) Identify safe uses of social networking and electronic communication.

•  Recognizing dangers of online predators
•  Protecting personal information online
[TC2] CA2 (9-12) 8 :
8 ) Practice safe uses of social networking and electronic communication.

•  Recognizing dangers of online predators
•  Protecting personal information online
Example: recognizing risk of identity theft

[DLIT] (7) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (6) 18 :
12) Define digital permanence.

[DLIT] (6) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (7) 17 :
11) Demonstrate positive, safe, legal, and ethical habits when creating and sharing digital content and identify the consequences of failing to act responsibly.

[DLIT] (7) 18 :
12) Discuss the impact of data permanence on digital identity including best practices to protect personal digital footprint.

[DLIT] (8) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

Subject: Technology Education (6 - 12), Digital Literacy and Computer Science (6 - 8)
Title: Safebook
Description:

ReadWriteThink profile is an interactive profile for students to learn how to create a safe online profile.




   View Standards     Standard(s): [TC2] (6-8) 12 :
12 ) Use digital tools to communicate and collaborate at all levels from interpersonal to global.

Examples: instant messages, e-mail, blogs, wikis, collaborative authoring tools, online learning communities

•  Demonstrating digital file transfer
Examples: attaching, uploading, downloading

[TC2] (0-2) 5 :
5 ) Practice responsible use of technology systems and applications.

Example: maintaining proper settings

•  Demonstrating care of digital equipment and media
Examples: washing hands before use, cleaning work area before and after use

•  Distinguishing between ethical and unethical use of others' work
Examples: avoiding plagiarism, avoiding manipulation of others' work without permission

[TC2] (3-5) 5 :
5 ) Practice safe use of technology systems and applications.

Examples: protecting personal information online, avoiding inappropriate sites, exiting inappropriate sites

[TC2] (6-8) 8 :
8 ) Identify safe uses of social networking and electronic communication.

•  Recognizing dangers of online predators
•  Protecting personal information online
[CE] (0-12) 3 :
3 ) Citizenship

[CE] (0-12) 4 :
4 ) Honesty

[CE] (0-12) 5 :
5 ) Fairness

[CE] (0-12) 6 :
6 ) Respect for others

[CE] (0-12) 7 :
7 ) Kindness

[CE] (0-12) 8 :
8 ) Cooperation

[CE] (0-12) 9 :
9 ) Self-respect

[CE] (0-12) 10 :
10 ) Self-control

[CE] (0-12) 11 :
11 ) Courtesy

[CE] (0-12) 12 :
12 ) Compassion

Subject: Technology Education (K - 8), Character Education (K - 12)
Title: Stop Cyberbullying
Description:

Infinity Interactive Learning Lab provides a interactive training site for teaching them how to prevent cyber bullying to students. Students watch a video and apply the concepts they have learned.




ALEX Learning Activities: 8

Go To Top of page