Information Communication Technology www.thinkuknow.co.uk A guide to internet safety and safe surfing. Learn about online safety when using blogs, chatting, online gaming... www.kidsmart.org.uk Learn about the Internet and being a SMART surfer Class: REPLACE WITH CLASS NAME Teacher: REPLACE WITH TEACHER’S NAME Customize this cover by adding some of your own clipart images below: www.nwlg.org/esafetygames E-safety Games Put a photo of yourself here Created by www.clickschool.co.uk Add any new words you don’t know to this list. E-Safety = electronic safety Slide Shows File Management Cyber-bullying Transition Folder IM = instant messenger Master slide File Key Logger = a computer program that records passwords Masquerading = pretending to be something you’re not. Phishing Private Scareware = fraudulent software people are scared into installing because they get messages about a virus or something. The software can steal passwords or force people to pay for it, despite it actually doing nothing. Social networking Virus = computer program that duplicates itself, it can harm your computer. Complete the boxes below. What are good rules to have in ICT rooms & lessons? Fill in the ovals: ?????????? ???????????? ICT Room Rules ????????? Words to get you thinking: Bags, coats Screens—off Password Run Tidy Food & Drink Inappropriate files Chair Shout Listen Attention Internet Print Respect Applications Personal details Games Cables Complete this: I think ICT is about … Which is which? - MOVE the icons to the correct arrow! Where MY private files are kept. Where public ‘shared’ files are kept. Where I can copy my private files to; for the teacher to have a look. I can locate files by DOUBLE CLICKING the computer icon on the DESKTOP. Make sensible folders in your HOME area. When I save files on a computer, I should always give the file a SENSIBLE name. I should also save it in an appropriate FOLDER. Files and folders can be renamed by pressing the F2 key. I can create a folder by RIGHT mouse clicking, and then choosing ‘new folder’. When writing capital letters, I should use the SHIFT key. I can switch application by pressing ALT+TAB. I can copy things by pressing CTRL+C, or clicking ‘Edit->Copy’. I can cut things by pressing CTRL+X, or clicking ‘Edit->Cut’. I can paste things by pressing CTRL+V or clicking ‘Edit->Paste’. desktop ctrl+v sensible ctrl+c double clicking ctrl+x alt+tab shift right folder Find the answers... State which keys you press to do these tasks: Save something quickly = Ctrl + Print something quickly? Ctrl + Undo something quickly? Ctrl + Load Internet Explorer from the START menu 2. Go to a search engine web site, e.g. www.google.co.uk OR http://uk.ask.com 3. Search for the answers to... F2 < Move these boxes in the right place above. Shortcuts are keys that you can press to do things quickly 1. 1. A group of lions is known as a 2. The planet nearest to the sun is called 3. The two bones in my forearm are called 4. The name of England’s tallest (not highest) waterfall is called & Delete the ’‘ or ’‘. Be Honest! Statement Drag the box under the appropriate column: True/False? If a social network member, my profile is set to ‘private’. I have a weak password that could be guessed. I’ve uploaded images/videos which others might not approve of. Address I’ve responded to mean electronic comments made about me. I’ve got people on my ‘buddy list’ who I don’t actually know. Cartoon picture I’ve no idea how to report nasty messages. I download games, music, movies etc illegally. I mostly use a computer in my bedroom instead of a family room. I’ve given personal information to strangers. Plans for the weekend School Name Phone number DOB Age Nickname Hobbies ‘Copyright’ is a law that makes it illegal to copy other people’s work (e.g. music, film, text, etc) unless you have permission and/or pay for it. If you break the law, you could be fined or go to prison. Copyright law helps you to “Lawrence Barratt, from Kent, was found make a living from the work you produce, as people guilty of manufacturing and selling have to pay & acknowledge you for your work. counterfeit DVDs. He was sentenced to two Pet’s name years suspended imprisonment, plus 175 hours unpaid work and pay £750 costs. “ Buying fake DVDs and other fake merchandise has been linked to supporting organised crime, weapon smuggling and child abuse. “A group of youths all aged under 16 were arrested as It also makes the genuine item more expensive because businesses loose out. they tried to covertly sell counterfeit DVDsSo atDON’T a market” BUY dodgy DVDs or download things illegally. For more stories like this, see . REPORT copyright theft anonymously to Crimestoppers 0800 555 111 this web site How can you tell if a DVD is fake? See this publication NEVER give your password to ANYONE, even if they ask. NEVER enter a password on a web site from a link in an email—it might not be genuine. WEAK passwords These are less than 7 letters, your name, or found in a dictionary. These can easily be guessed or hacked. STRONG passwords Include capital and lowercase letters, numbers, symbols, and at least 8 characters long. For advice, look here: 1. eHow web site 2. 3. See if your password is a strong password: to find out. Have you got a strong password? Use this secure web site Watch this YouTube eSafety video….then complete the poster. Other e-safety tips: < Type in 6 Internet Safety Rules Type any other safety tips above. Other videos… Claire thought she knew Matt thought he knew How to change Facebook Privacy settings: http://kidsmart.org.uk/ skills-school/ Make a bookmark that shows Internet Safety rules. Feedback from others: Do you know who your real friends are online? Good points... Even better if... Is your profile private? EXAMPLE My 1st attempt My 2nd attempt My e-safety Bookmark Success Criteria: Comment here Which software tools I used: Put screen shot(s) or a copy of your work here Publisher Comment here What I learnt: Comment here Reviewer’s rating out of 5: What I liked: Comment here ? Evaluation and Improvements I could make: What could be improved: Comment here Comment here What are these used for and what harm could they do? Use www.thinkuknow.co.uk/8_10/control/ to help! Bonus points –What is ‘scareware’? Find out at about.com or watch this youtube video. What is ‘phishing’? Find out at about.com or watch this youtube video. If I get an email with a link to a web site giving away mobile phones, what should I do? When I want to download games and movies from the web, I should (a) Fill in all my personal details right away (a) Just do it, who cares if it’s illegal to do it and my parents get fined or go to prison. It might include a virus, but hey, never mind. (b) Delete the email without opening it (c) Forward it to all my friends When entering a public chatroom, I should always use… (a) My real name, what harm can it do? Highlight the best answer... Use www.thinkuknow.co.uk/8_10/control/ to help! (b) A nickname to be on the safe side. If someone makes you feel uncomfortable on the Internet, what should you do? I’ve received a nasty electronic comment from someone, I will... If someone adds me to their IM list who I don’t know, I... (a) Ignore it (a) Send a mean one back (a) Do nothing, who cares if they can see me online? (b) Tell a trusted adult and/or report to CEOP (b) Block them so they don’t know when I’m online, they might be stalking me! (c) Tell my best friend The best image for my profile picture is... When filling out my profile on a social networking web site, I should always include: (a) A picture of me in my school uniform, so everyone can tell which school I go to and know who I am (a) My mobile number and address so my friends who don’t know it can get it, even if they’re not who they say they are (b) A general picture of me (b) The bare minimum—just a nickname and things that people can’t easily identify me from, e.g. my hobbies and favourite films. (b) Delete it. (c) Save the evidence and tell a trusted adult about it Someone I’ve met up with online asks me which school I go to, the area I live in, and other personal information. I will... (a) Tell them, it’s no big deal (b) Ignore the request, and block them if they do it again. (c) Only tell them a little bit of information, what harm can it do? (c) A picture of a pet or pop group so strangers don’t have a clue what I look like. The best time to use my web cam is… When filling out my age on a profile on a social networking web site, I should always: People who communicate online are always who they say they are, e.g. your friend. (a) Just after school in my school uniform which even strangers can see (a) Lie, so I can actually sign up and get older people interested in me. (a) True (b) Only when I can be absolutely certain I know who the person is who can watch me (b) Tell the truth so it’s less likely that older strangers will contact me. (c) Never When setting up an internet profile on a web site, I should... (b) False If someone I’ve met online wants to meet up with me in the real world, I would... (a) Ignore them, they could be anyone. If I receive a electronic message from someone I don’t know, I should.. (b) Go with a friend so be on the safe side. (a) Open it anyway and reply if it looks interesting (c) Not go and tell a trusted adult because they’re strange. (b) Delete it, it’s probably junk or a scam (c) Open it and then decide what to do. (a) Make it public as there’s no point otherwise (b) Make it private, so only my friends can see (b) Check that it’s copyright free & genuine, and if unsure, ask an adult for advice. When playing games online, I should… (a) Take it dead seriously and respond to nasty comments people make, making sure I use my real name. (b) Remember it’s only a game… win or loose...and keep my cool, and use a nickname. To reduce the chances of getting a virus or having a keylogger installed, I should: (a) Download any old internet security software (b) Download or buy genuine internet security software that’s well-known (c) Not bother, what are the chances? A good password should always be: (a) 6 letters long (b) More than 6 letters long and include a number and symbol (c) “Password123” If I receive a message warning me about a virus that will destroy my computer, I should... (a) Forward it to all my friends as they usually tell you to do (b) Delete the email, it’s probably a fake. REMEMBER: You can’t always be certain how people will share or use electronic information you give to them. DESIGN and BUILD a PowerPoint presentation. The presentation’s AUDIENCE is for YEAR 6 students. The presentation’s PURPOSE is to tell them how to stay safe online. Use the information on this web site: to make 4 PowerPoint slides: < You can use these images to help. COPY and PASTE them into PowerPoint. Information for slide 1: Information for slide 2: Information for slide 3: Information for slide 4: Delete the ‘’ or ‘’ appropriately. Can you…? Save it with a SENSIBLE filename in a SUITABLE folder Choose a slide design Choose a colour scheme Change a slide layout Change the background Insert text, clipart and/or images/shapes Format the appearance of text (e.g. font, colour) Change the master slide (s) Make the slide show loop Add a slide transition Change the ‘order’ of items Group items together Add an animation Suggest how someone else might improve their presentation TOP TIPS for readable slides: 1. Split chunks of text into short bullet points. 2. Try to use about 7 words MAXIMUM per bullet point 3. Use a CONSISTENT theme throughout Answer these: My PowerPoint Presentation Success Criteria: For year 6 students Bright colours Cartoon images, not much text 4 slides long, looping Which software tools I used: Put screen shot(s) or a copy of your work here PowerPoint Comment here What I learnt: Comment here Reviewer’s rating out of 5: ? Evaluation and Improvements I could make: What I liked: What could be improved: Comment here Comment here Comment here You have received an email from what appears to be ‘MySpace’. It tells you to visit a web site because someone has been trying to hack into your account. The web site asks you to verify your password. You’ve found a blog that has nasty comments on it about you. The new iPad is the latest “Must have” gadget, but you cannot afford it. You come across an auction site which is selling it for £250 but requires you to enter your bank account details. You enter a chat room online and start receiving abuse from other people in the room. When checking your email you find you have a new message from someone you do not know. The message asks you to open the attachment to delete a virus on your computer. You’ve just got a new phone for your birthday. It has a mp3 player! You want some music but cannot afford to buy any. A friend tells you about a piece of software that allows you to download music for free. Plan, design and make videos for: 1. Year 6 students, warning them about dangers of the Internet and/or cyberbullying. negative impacts. 2. Teenagers, making use of real-life stories, produce a news ‘feature’ on the impact that social networking has had on society. Give a balanced view of both positive and You also need to include testing and a evaluation of your production. Refer to the APP grid to make sure your work meets as many assessment objectives as possible! My Target Level: Level Planning, developing and evaluating 7 6 5 4 Design and plan an ICT-based system: Scope the information flow through the system Devise and apply success criteria to ensure a quality solution, refine work as it progresses Finding, using and communicating information Develop an appropriate user interface for an ICT based system: Enable efficient data input Display system outcomes that are fit for purpose and audience Plan and develop solutions which show efficiency and integration Use complex lines of enquiry efficiently to interrogate of ICT tools and techniques information Explain choices when presenting information for different Use criteria and feedback to improve the effectiveness and purposes and wider or remote audiences efficiency of solutions Take account of accuracy and potential bias when searching for Use criteria to evaluate the quality of solutions, identifying improvements and refining own work Plan and develop structured solutions to problems which use a combination of ICT tools and techniques Plan and implement solutions that combine and refine different forms of information Evaluate the quality and success of own solutions and selecting information Present information in a range of forms for specific purposes and familiar audiences Use ICT safely and responsibly Use appropriate search criteria to find relevant information, and check its plausibility and usefulness Present information in different forms suited to purpose Identify some of the risks and act to minimise them Identify and select appropriate information using straightforward lines of enquiry Comment on success of my solution Present information using text, images and other media Refine and develop information using ICT tools and techniques to Identify ways I can keep myself safe when using ICT make changes 3 My Effort Grade: Plan how I will use ICT to solve a problem 1a. Put the face that represents how you feel about the unit into the box: 1b. ...Why do you feel like that? 2. What have you learnt? 3. What did you do well? 4. What could you or your teacher do to help you improve your work? accommodate favourable adapt fine adequate good adjust great advance hard amend imaginative attractive impressive bad improve better lacking bright mend brilliant missing care plain clever polish compelling productive complete reduce comprehensive refine correct reform desirable reorganise discerning replace distinctive reshape easy revamp effective review efficient sufficient