ALEX Learning Activity Resources

Back
ALEX Learning Activities  
   View Standards     Standard(s): [HE1] (7) 7 :
7 ) Demonstrate decision-making skills as they relate to situations involving health risks.

Examples: responding appropriately to sexual harassment, avoiding physical conflict, objecting to verbal and physical bullying, avoiding inappropriate electronic communication

[HUM] ED02 (7) 6 :
6 ) Compare positive and negative peer pressure.

Examples: positive—involving friends in community service, tutoring peers

-  negative—bullying, teasing, gossiping

•  Determining causes of teen conflict
[TC2] (6-8) 9 :
9 ) Practice responsible and legal use of technology systems and digital content.

Examples: avoiding plagiarism; complying with acceptable-use policies, copyright laws, and fair use standards; recognizing secure Web sites

•  Identifying examples of computer crime and related penalties
Examples: computer crime—phishing, spoofing, virus and worm dissemination, cyberbullying

-  penalties—fines, incarceration

•  Citing sources of digital content
[DLIT] (5) 16 :
10) Identify appropriate and inappropriate uses of communication technology and discuss the permanence of actions in the digital world.

[DLIT] (5) 20 :
14) Analyze the impact of social media on individuals, families, and society.

Subject: Health (7), Human Services (7), Technology Education (6 - 8), Digital Literacy and Computer Science (5)
Title: Bullying
Description:

This Bully survey allows students to use their experiences as a basis of understanding what constitutes anti-social behavior so they can cease the behavior or get adult assistance if needed.




   View Standards     Standard(s): [TC2] (6-8) 14 :
14 ) Use digital tools to generate new ideas, products, or processes.

Examples: ideas—predictions, trends

-  products—animation, video

-  processes—models, simulations

[TC2] (6-8) 9 :
9 ) Practice responsible and legal use of technology systems and digital content.

Examples: avoiding plagiarism; complying with acceptable-use policies, copyright laws, and fair use standards; recognizing secure Web sites

•  Identifying examples of computer crime and related penalties
Examples: computer crime—phishing, spoofing, virus and worm dissemination, cyberbullying

-  penalties—fines, incarceration

•  Citing sources of digital content
[TC2] (6-8) 6 :
6 ) Select specific digital tools for completing curriculum-related tasks.

Examples: spreadsheet for budgets, word processing software for essays, probes for data collection

[TC2] (6-8) 12 :
12 ) Use digital tools to communicate and collaborate at all levels from interpersonal to global.

Examples: instant messages, e-mail, blogs, wikis, collaborative authoring tools, online learning communities

•  Demonstrating digital file transfer
Examples: attaching, uploading, downloading

[DLIT] (6) 6 :
R6) Produce, review, and revise authentic artifacts that include multimedia using appropriate digital tools.

[DLIT] (7) 6 :
R6) Produce, review, and revise authentic artifacts that include multimedia using appropriate digital tools.

[DLIT] (7) 22 :
16) Construct content designed for specific audiences through an appropriate medium.

Examples: Design a multi-media children's e-book with an appropriate readability level.

[DLIT] (7) 23 :
17) Publish content to be available for external feedback.

[DLIT] (8) 6 :
R6) Produce, review, and revise authentic artifacts that include multimedia using appropriate digital tools.

[DLIT] (8) 22 :
16) Present content designed for specific audiences through an appropriate medium.

Example: Create and share a help video for a senior's center that provides tips for online safety.

Subject: Technology Education (6 - 8), Digital Literacy and Computer Science (6 - 8)
Title: Digital Art Project Resource Page
Description:

This online flyer was created as a graphics resource for a digital art project. The flyer contains photos and examples that students may use when creating their digital art projects.




   View Standards     Standard(s): [TC2] (6-8) 9 :
9 ) Practice responsible and legal use of technology systems and digital content.

Examples: avoiding plagiarism; complying with acceptable-use policies, copyright laws, and fair use standards; recognizing secure Web sites

•  Identifying examples of computer crime and related penalties
Examples: computer crime—phishing, spoofing, virus and worm dissemination, cyberbullying

-  penalties—fines, incarceration

•  Citing sources of digital content
[DLIT] (6) 16 :
10) Describe the causes and effects of illegal use of intellectual property as it relates to print and digital media, considering copyright, fair use, licensing, sharing, and attribution.

Subject: Technology Education (6 - 8), Digital Literacy and Computer Science (6)
Title: Exploring and Understanding Copyright
Description:

This site includes important information about copyright. Explanations are given for the following topics: What is copyright, why is it important to me, which works are protected and which are not, who owns the copyright, what is copyright infringement, when do I need permission to copy, how long does copyright protection last, how to obtain copyright protection and when and how do you register a copyright.

Students will use the site to gain deeper understanding of copyright in literature, music, art, the theater, motion pictures, and other forms of intellectual property. 




   View Standards     Standard(s): [TC2] (6-8) 2 :
2 ) Publish digital products that communicate curriculum concepts.

Examples: Web pages, videos, podcasts, multimedia presentations

[TC2] (6-8) 8 :
8 ) Identify safe uses of social networking and electronic communication.

•  Recognizing dangers of online predators
•  Protecting personal information online
[TC2] (6-8) 9 :
9 ) Practice responsible and legal use of technology systems and digital content.

Examples: avoiding plagiarism; complying with acceptable-use policies, copyright laws, and fair use standards; recognizing secure Web sites

•  Identifying examples of computer crime and related penalties
Examples: computer crime—phishing, spoofing, virus and worm dissemination, cyberbullying

-  penalties—fines, incarceration

•  Citing sources of digital content
[TC2] (6-8) 12 :
12 ) Use digital tools to communicate and collaborate at all levels from interpersonal to global.

Examples: instant messages, e-mail, blogs, wikis, collaborative authoring tools, online learning communities

•  Demonstrating digital file transfer
Examples: attaching, uploading, downloading

[TC2] CA2 (9-12) 8 :
8 ) Practice safe uses of social networking and electronic communication.

•  Recognizing dangers of online predators
•  Protecting personal information online
Example: recognizing risk of identity theft

[TC2] CA2 (9-12) 9 :
9 ) Practice ethical and legal use of technology systems and digital content.

•  Explaining consequences of illegal and unethical use of technology systems and digital content
Examples: cyberbullying, plagiarism

•  Interpreting copyright laws and policies with regard to ownership and use of digital content
•  Citing sources of digital content using a style manual
Examples: Modern Language Association (MLA), American Psychological Association (APA)

[DLIT] (6) 6 :
R6) Produce, review, and revise authentic artifacts that include multimedia using appropriate digital tools.

[DLIT] (6) 18 :
12) Define digital permanence.

[DLIT] (7) 6 :
R6) Produce, review, and revise authentic artifacts that include multimedia using appropriate digital tools.

[DLIT] (7) 17 :
11) Demonstrate positive, safe, legal, and ethical habits when creating and sharing digital content and identify the consequences of failing to act responsibly.

[DLIT] (7) 18 :
12) Discuss the impact of data permanence on digital identity including best practices to protect personal digital footprint.

[DLIT] (8) 6 :
R6) Produce, review, and revise authentic artifacts that include multimedia using appropriate digital tools.

[DLIT] (8) 17 :
11) Advocate for positive, safe, legal, and ethical habits when creating and sharing digital content.

Example: Students create a brochure that highlights the consequences of illegally downloading media.

[DLIT] (8) 18 :
12) Cite evidence of the positive and negative effects of data permanence on personal and professional digital identity.

[DLIT] (9-12) 6 :
R6) Produce, review, and revise authentic artifacts that include multimedia using appropriate digital tools.

[DLIT] (9-12) 17 :
11) Model and demonstrate behaviors that are safe, legal, and ethical while living, learning, and working in an interconnected digital world.

a. Recognize user tracking methods and hazards.

Examples: Cookies, WiFi packet sniffing.

b. Understand how to apply techniques to mitigate effects of user tracking methods.

c. Understand the ramifications of end-user license agreements and terms of service associated with granting rights to personal data and media to other entities.

d. Explain the relationship between online privacy and personal security.

Examples: Convenience and accessibility, data mining, digital marketing, online wallets, theft of personal information.

e. Identify physical, legal, and ethical consequences of inappropriate digital behaviors.

Examples: Cyberbullying/harassment, inappropriate sexual communications.

f. Explain strategies to lessen the impact of negative digital behaviors and assess when to apply them.

Subject: Technology Education (6 - 12), Digital Literacy and Computer Science (6 - 12)
Title: Social Media Responsibility
Description:


ALEX Learning Activities: 4

Go To Top of page