Uploaded by Milena Ackovic

eSafety fun book

advertisement
Information Communication Technology
www.thinkuknow.co.uk
A guide to internet safety and safe surfing. Learn about
online safety when using blogs, chatting, online gaming...
www.kidsmart.org.uk
Learn about the Internet and being a SMART surfer
Class:
REPLACE WITH CLASS NAME
Teacher:
REPLACE WITH TEACHER’S NAME
Customize this cover by adding some of your own clipart images below:
www.nwlg.org/esafetygames
E-safety Games
Put a photo of
yourself here
Created by www.clickschool.co.uk
Add any new words you don’t know to this list.
E-Safety = electronic safety
Slide Shows
File Management
Cyber-bullying
Transition
Folder
IM = instant messenger
Master slide
File
Key Logger = a computer program that
records passwords
Masquerading = pretending to be something
you’re not.
Phishing
Private
Scareware = fraudulent software people are
scared into installing because they get
messages about a virus or something. The
software can steal passwords or force people
to pay for it, despite it actually doing
nothing.
Social networking
Virus = computer program that duplicates
itself, it can harm your computer.
 Complete the boxes below.
What are good rules to have in ICT rooms & lessons?
 Fill in the ovals:
??????????
????????????
ICT Room
Rules
?????????
Words to get you thinking:
Bags, coats
Screens—off
Password
Run
Tidy
Food & Drink
Inappropriate files
Chair
Shout
Listen
Attention
Internet
Print
Respect
Applications
Personal details
Games
Cables
 Complete this:
I think ICT is about …
 Which is which? - MOVE the icons to the correct arrow!
Where MY private files are kept.
Where public ‘shared’ files are kept.
Where I can copy my private files to; for the
teacher to have a look.
I can locate files by DOUBLE CLICKING the computer icon on the
DESKTOP.
 Make sensible folders in your HOME area.
When I save files on a computer, I should always give the file a
SENSIBLE name. I should also save it in an appropriate FOLDER.
Files and folders can be renamed by pressing the F2 key.
I can create a folder by RIGHT mouse clicking, and then choosing
‘new folder’.
When writing capital letters, I should use the SHIFT key.
I can switch application by pressing ALT+TAB.
I can copy things by pressing CTRL+C, or clicking ‘Edit->Copy’.
I can cut things by pressing CTRL+X, or clicking ‘Edit->Cut’.
I can paste things by pressing CTRL+V or clicking ‘Edit->Paste’.
desktop
ctrl+v
sensible
ctrl+c
double clicking
ctrl+x
alt+tab
shift
right
folder
 Find the answers...
 State which keys you press to do these tasks:
Save something quickly = Ctrl +
Print something quickly? Ctrl +
Undo something quickly? Ctrl +
Load Internet Explorer from the START menu
2.
Go to a search engine web site, e.g.
www.google.co.uk OR http://uk.ask.com
3.
Search for the answers to...
F2
 < Move these boxes in the right place above.
Shortcuts are keys that you can press to do things quickly
1.
1.
A group of lions is known as a
2.
The planet nearest to the sun is called
3.
The two bones in my forearm are called
4.
The name of England’s tallest (not highest) waterfall is called
&
 Delete the ’‘ or ’‘. Be Honest!
Statement
 Drag the box under the appropriate column:
True/False?
If a social network member, my profile is set to ‘private’.

I have a weak password that could be guessed.

I’ve uploaded images/videos which others might not approve of.

Address
I’ve responded to mean electronic comments made about me.

I’ve got people on my ‘buddy list’ who I don’t actually know.
Cartoon picture

I’ve no idea how to report nasty messages.

I download games, music, movies etc illegally.

I mostly use a computer in my bedroom instead of a family room.

I’ve given personal information to strangers.

Plans for the weekend
School Name
Phone number
DOB
Age
Nickname
Hobbies
‘Copyright’
is a law that makes it illegal to copy other people’s work (e.g. music, film, text,
etc) unless you have permission and/or pay for it. If you break the law, you could be fined
or go to prison. Copyright law helps you to
“Lawrence Barratt, from Kent, was found
make a living from the work you produce, as people
guilty of manufacturing and selling
have to pay & acknowledge you for your work.
counterfeit DVDs. He was sentenced to two
Pet’s name
years suspended imprisonment, plus 175
hours unpaid work and pay £750 costs. “
Buying fake DVDs and other fake merchandise has
been linked to supporting organised
crime, weapon smuggling and child abuse.
“A group of youths all aged under 16 were arrested as
It also makes the genuine item more expensive
because
businesses
loose out.
they
tried to covertly
sell counterfeit
DVDsSo
atDON’T
a market”
BUY dodgy DVDs or download things illegally.
For more stories like this, see
. REPORT copyright theft anonymously to Crimestoppers 0800 555 111
this web site
 How can you tell if a DVD is fake?
See this publication
NEVER give your password to ANYONE, even if they ask. NEVER enter a
password on a web site from a link in an email—it might not be genuine.
WEAK passwords
These are less than 7 letters, your name, or found in a dictionary. These
can easily be guessed or hacked.
STRONG passwords
Include capital and lowercase letters, numbers, symbols, and at least 8
characters long. For advice, look here:
1.
eHow web site
2.
3.
 See if your password is a strong password:
to find out.
Have you got a strong
password? Use this
secure web site
Watch this YouTube eSafety video….then complete the poster.
Other e-safety tips:



 < Type in 6 Internet Safety Rules
Type any other safety tips above.
Other videos…
Claire thought she knew
Matt thought he knew
How to change Facebook
Privacy settings:
http://kidsmart.org.uk/
skills-school/
 Make a bookmark that shows Internet Safety rules.
Feedback from others:
Do you know
who your real friends
are online?
Good points...

Even better if...

Is your
profile
private?
EXAMPLE
My 1st attempt
My 2nd attempt
My e-safety Bookmark
Success Criteria:

Comment here
Which software tools I used:
Put screen shot(s) or a copy of your work here
Publisher
 Comment here

What I learnt:

Comment here
Reviewer’s rating out of 5:
What I liked:

Comment here
?
Evaluation and Improvements I could make:
What could be improved:

Comment here
Comment here
 What are these used for and what harm could they do?
Use www.thinkuknow.co.uk/8_10/control/ to help!
Bonus points –What is ‘scareware’? Find out at about.com or watch this youtube video.
What is ‘phishing’? Find out at about.com or watch this youtube video.
If I get an email with a link to a web site giving
away mobile phones, what should I do?
When I want to download games and movies
from the web, I should
(a) Fill in all my personal details right away
(a) Just do it, who cares if it’s illegal to do it
and my parents get fined or go to prison. It
might include a virus, but hey, never mind.
(b) Delete the email without opening it
(c) Forward it to all my friends
When entering a public chatroom, I should
always use…
(a) My real name, what harm can it do?
 Highlight the best answer...
Use www.thinkuknow.co.uk/8_10/control/ to help!
(b) A nickname to be on the safe side.
If someone makes you feel uncomfortable on
the Internet, what should you do?
I’ve received a nasty electronic comment from
someone, I will...
If someone adds me to their IM list who I don’t
know, I...
(a)
Ignore it
(a) Send a mean one back
(a) Do nothing, who cares if they can see me
online?
(b)
Tell a trusted adult and/or report to
CEOP
(b) Block them so they don’t know when I’m
online, they might be stalking me!
(c)
Tell my best friend
The best image for my profile picture is...
When filling out my profile on a social
networking web site, I should always include:
(a) A picture of me in my school uniform, so
everyone can tell which school I go to and
know who I am
(a) My mobile number and address so my friends
who don’t know it can get it, even if they’re
not who they say they are
(b) A general picture of me
(b) The bare minimum—just a nickname and
things that people can’t easily identify me
from, e.g. my hobbies and favourite films.
(b) Delete it.
(c) Save the evidence and tell a trusted adult
about it
Someone I’ve met up with online asks me
which school I go to, the area I live in, and
other personal information. I will...
(a) Tell them, it’s no big deal
(b) Ignore the request, and block them if they
do it again.
(c) Only tell them a little bit of information,
what harm can it do?
(c) A picture of a pet or pop group so strangers
don’t have a clue what I look like.
The best time to use my web cam is…
When filling out my age on a profile on a social
networking web site, I should always:
People who communicate online are always
who they say they are, e.g. your friend.
(a) Just after school in my school uniform which
even strangers can see
(a) Lie, so I can actually sign up and get older
people interested in me.
(a) True
(b) Only when I can be absolutely certain I know
who the person is who can watch me
(b) Tell the truth so it’s less likely that older
strangers will contact me.
(c) Never
When setting up an internet profile on a web
site, I should...
(b) False
If someone I’ve met online wants to meet up
with me in the real world, I would...
(a) Ignore them, they could be anyone.
If I receive a electronic message from someone
I don’t know, I should..
(b) Go with a friend so be on the safe side.
(a) Open it anyway and reply if it looks
interesting
(c) Not go and tell a trusted adult because
they’re strange.
(b) Delete it, it’s probably junk or a scam
(c) Open it and then decide what to do.
(a) Make it public as there’s no point otherwise
(b) Make it private, so only my friends can see
(b) Check that it’s copyright free & genuine,
and if unsure, ask an adult for advice.
When playing games online, I should…
(a) Take it dead seriously and respond to nasty
comments people make, making sure I use
my real name.
(b) Remember it’s only a game… win or
loose...and keep my cool, and use a
nickname.
To reduce the chances of getting a virus or
having a keylogger installed, I should:
(a) Download any old internet security software
(b) Download or buy genuine internet security
software that’s well-known
(c) Not bother, what are the chances?
A good password should always be:
(a) 6 letters long
(b) More than 6 letters long and include a
number and symbol
(c) “Password123”
If I receive a message warning me about a virus
that will destroy my computer, I should...
(a) Forward it to all my friends as they usually
tell you to do
(b) Delete the email, it’s probably a fake.
REMEMBER: You can’t always
be certain how people will
share or use electronic
information you give to them.
DESIGN and BUILD a PowerPoint presentation.
The presentation’s AUDIENCE is for YEAR 6 students.
The presentation’s PURPOSE is to tell them how to stay safe online.
Use the information on this web site: to make 4 PowerPoint slides:
< You can use these images to help.
COPY and PASTE them into PowerPoint.
Information for slide 1:
Information for slide 2:
Information for slide 3:
Information for slide 4:
 Delete the ‘’ or ‘’ appropriately.
Can you…?
 Save it with a SENSIBLE filename in a SUITABLE folder
 Choose a slide design
 Choose a colour scheme
 Change a slide layout
 Change the background
 Insert text, clipart and/or images/shapes
 Format the appearance of text (e.g. font, colour)
 Change the master slide (s)
 Make the slide show loop
 Add a slide transition
 Change the ‘order’ of items
 Group items together
 Add an animation
 Suggest how someone else might improve their presentation
TOP TIPS for readable slides:
1.
Split chunks of text into short bullet points.
2.
Try to use about 7 words MAXIMUM per bullet point
3.
Use a CONSISTENT theme throughout
 Answer these:
My PowerPoint
Presentation
Success Criteria:




For year 6 students
Bright colours
Cartoon images, not much text
4 slides long, looping
Which software tools I used:
Put screen shot(s) or a copy of your work here
PowerPoint
 Comment here

What I learnt:

Comment here
Reviewer’s rating out of 5:
?
Evaluation and Improvements I could make:
What I liked:
What could be improved:
Comment here

Comment here

Comment here
You have received an email from what appears to be ‘MySpace’. It tells
you to visit a web site because someone has been trying to hack into
your account. The web site asks you to verify your password.
You’ve found a blog that has nasty comments on it about you.
The new iPad is the latest “Must have” gadget, but you cannot afford it.
You come across an auction site which is selling it for £250 but requires
you to enter your bank account details.
You enter a chat room online and start receiving abuse from other
people in the room.
When checking your email you find you have a new message from
someone you do not know. The message asks you to open the
attachment to delete a virus on your computer.
You’ve just got a new phone for your birthday. It has a mp3 player!
You want some music but cannot afford to buy any. A friend tells you
about a piece of software that allows you to download music for free.
Plan, design and make videos for:
1. Year 6 students, warning them about dangers of the
Internet and/or cyberbullying.
negative impacts.
2. Teenagers, making use of real-life stories, produce a
news ‘feature’ on the impact that social networking has
had on society. Give a balanced view of both positive and
You also need to include testing and a evaluation of your production.
Refer to the APP grid to make sure your work meets as many assessment objectives
as possible!
My Target Level:
Level
Planning, developing and evaluating

7
6
5
4
Design and plan an ICT-based system:
Scope the information flow through the system
Devise and apply success criteria to ensure a quality solution, refine
work as it progresses
Finding, using and communicating information
Develop an appropriate user interface for an ICT based
system:
Enable efficient data input
Display system outcomes that are fit for purpose and audience

Plan and develop solutions which show efficiency and integration  Use complex lines of enquiry efficiently to interrogate
of ICT tools and techniques
information
 Explain choices when presenting information for different
 Use criteria and feedback to improve the effectiveness and
purposes and wider or remote audiences
efficiency of solutions


 Take account of accuracy and potential bias when searching for
Use criteria to evaluate the quality of solutions, identifying
improvements and refining own work

Plan and develop structured solutions to problems which use a
combination of ICT tools and techniques

Plan and implement solutions that combine and refine different
forms of information


Evaluate the quality and success of own solutions
and selecting information
 Present information in a range of forms for specific purposes
and familiar audiences
Use ICT safely and responsibly
Use appropriate search criteria to find relevant
information, and check its plausibility and usefulness
 Present information in different forms suited to purpose
 Identify some of the risks and act to minimise them

Identify and select appropriate information using
straightforward lines of enquiry
 Comment on success of my solution
 Present information using text, images and other media
 Refine and develop information using ICT tools and techniques to  Identify ways I can keep myself safe when using ICT
make changes

3
My Effort Grade:
Plan how I will use ICT to solve a problem

1a. Put the face that represents how you feel about the unit into the box:
1b. ...Why do you feel like that?
2. What have you learnt?
3. What did you do well?
4. What could you or your teacher do to help you improve your work?
accommodate
favourable
adapt
fine
adequate
good
adjust
great
advance
hard
amend
imaginative
attractive
impressive
bad
improve
better
lacking
bright
mend
brilliant
missing
care
plain
clever
polish
compelling
productive
complete
reduce
comprehensive
refine
correct
reform
desirable
reorganise
discerning
replace
distinctive
reshape
easy
revamp
effective
review
efficient
sufficient
Download