ALEX Resources

Narrow Results:
Learning Activities (1) Building blocks of a lesson plan that include before, during, and after strategies to actively engage students in learning a concept or skill. Classroom Resources (3)


ALEX Learning Activities  
   View Standards     Standard(s): [DLIT] (6) 18 :
12) Define digital permanence.

[DLIT] (6) 19 :
13) Define personal privacy, digital footprint, and open communication.

[DLIT] (6) 22 :
16) Communicate and/or publish collaboratively to inform others from a variety of backgrounds and cultures about issues and problems.

[DLIT] (7) 18 :
12) Discuss the impact of data permanence on digital identity including best practices to protect personal digital footprint.

[DLIT] (8) 16 :
10) Analyze different modes of social engineering and their effectiveness.

Examples: Phishing, hoaxes, impersonation, baiting, spoofing.

Subject: Digital Literacy and Computer Science (6 - 8)
Title: Presenting....Digital Citizenship through Infographics
Description:

Piktochart is one of many programs that makes it easy for teachers to integrate literacy and technology standards into any lesson.  Visual learners love the way that infographics seem to make data easier to digest.  Infographics are very helpful when a teacher wants to 'chunk' a lesson in to smaller units.  'Chunking' is a method for grouping and organizing information to make it easier to comprehend and remember.  Piktochart can be used to display and present a large amount of information in a visually appealing way.    




ALEX Learning Activities: 1

Go To Top of page
ALEX Classroom Resources  
   View Standards     Standard(s): [DLIT] (5) 20 :
14) Analyze the impact of social media on individuals, families, and society.

[DLIT] (7) 16 :
10) Explain social engineering, including countermeasures, and its impact on a digital society.

Examples: Phishing, hoaxes, impersonation, baiting, spoofing.

[DLIT] (8) 16 :
10) Analyze different modes of social engineering and their effectiveness.

Examples: Phishing, hoaxes, impersonation, baiting, spoofing.

Subject: Digital Literacy and Computer Science (5 - 8)
Title: How Do Different Social Media Platforms Affect Your Mood?
URL: https://aptv.pbslearningmedia.org/resource/social-media-brain-kqed/how-do-different-social-media-platforms-affect-your-mood-above-the-noise/
Description:

Do a quick Google search on how social media affects your mood, and the results make it seem like all the social media platforms will plunge you into depression. Facebook shows everyone’s perfect life and exotic vacations. Expertly curated selfies abound on Instagram. But, if you look at the actual research, the results aren’t that simple. In this Above the Noise video, host Myles Bess breaks down the science and cuts through the hype about the link between depression and social media use and looks at how different social media platforms may affect your brain in different ways.



   View Standards     Standard(s): [DLIT] (7) 16 :
10) Explain social engineering, including countermeasures, and its impact on a digital society.

Examples: Phishing, hoaxes, impersonation, baiting, spoofing.

[DLIT] (8) 16 :
10) Analyze different modes of social engineering and their effectiveness.

Examples: Phishing, hoaxes, impersonation, baiting, spoofing.

Subject: Digital Literacy and Computer Science (7 - 8)
Title: Deepfakes: Can You Spot a Phony Video?
URL: https://aptv.pbslearningmedia.org/resource/above-the-noise-deep-fakes/above-the-noise-deep-fakes/support-materials/
Description:

A doctored video of Speaker Nancy Pelosi got millions of views on social media. Deepfakes are becoming easier to make and spread, and Above the Noise is here to help people understand this new phenomenon and what to do about it. This video has an educator's guide and student viewing guide.



   View Standards     Standard(s): [DLIT] (6) 15 :
9) Differentiate between a secure and a non-secure website including how they affect personal data.

Example: HTTP vs. HTTPS.

[DLIT] (6) 31 :
25) Differentiate between secure and non-secure systems.

[DLIT] (7) 16 :
10) Explain social engineering, including countermeasures, and its impact on a digital society.

Examples: Phishing, hoaxes, impersonation, baiting, spoofing.

[DLIT] (8) 16 :
10) Analyze different modes of social engineering and their effectiveness.

Examples: Phishing, hoaxes, impersonation, baiting, spoofing.

Subject: Digital Literacy and Computer Science (6 - 8)
Title: Buyer Beware
URL: https://www.remc.org/21Things4Students/21/buyer-beware/
Description:

Buying and selling on the Internet have changed the way we live. We can now perform a web search to locate, compare, and buy goods and services.

You are going to investigate e-commerce as a consumer and learn some tips on how to shop online, avoid Internet fraud, and benefit from reviews and ratings.


LEARNING OBJECTIVES

When you have completed this activity you will:

  1. know how to research and compare products [Computational Thinker]

  2. know how to protect yourself as an online consumer [Digital Citizen]

  3. be able to protect yourself from deceptive advertising, scams, and rip-offs [Digital Citizen]



ALEX Classroom Resources: 3

Go To Top of page