CfE Experiences and Outcomes

LIT 0 – 01c - I enjoy exploring events and characters in stories and other texts, sharing my thoughts in different ways.  

HWB 0 – 17a - I know and can demonstrate how to keep myself and others safe and how to respond in a range of emergency situations.
HWB 0 – 45b - I am aware of the need to respect personal space and boundaries and can recognise and respond appropriately to verbal and non-verbal communication.


Sharing the Learning Outcomes - • I can identify how Goldilocks broke social rules e.g. entering someone’s house without knocking or getting permission, eating someone’s food without asking, etc.
• I can explain why I need to ask for permission to use ICT.
• I can compare a key to a username and a lock to a password to keep my information safe.
2. Active Learning – Retell the story of Goldilocks and the Three Bears. Discuss the rules that Goldilocks broke in the story. Play the online activity where children get a chance to spot the poor choices Goldilocks made. Ask the children if they would like someone helping themselves to their things, tuck, toys, room, piggy bank, birthday cards, presents, etc.? How would they feel if Goldilocks took all their personal things away from them? (The teacher could use an interval or lunch break to move or hide things in the room to demonstrate Goldilocks using the classroom without permission.) Discuss how people usually protect themselves, their belongings, their personal information from others like Goldilocks? Direct their thinking to a lock and a key! Link to their personal information on the computer how could you protect it? A lock and a key = a username and a password.
3. Demonstrating Understanding –  Show how we type in user names and passwords on the computer to log on. If appropriate, let children type in their own user names and passwords to log in (with support if needed.) Ask why we need a username and password, compare to Goldilocks breaking an entry and how could you protect your things from Goldilocks.
4. Review and Recall – What is the lock on a computer? What is the key on the computer? Why would you need a user name and password to protect your personal information on the computer?
Image of Boundries
Skip to activity

Please select your region from the list below:

Please enter your username and password and press the "log in" button