Inbox

CfE Experiences and Outcomes

HWB 2-16a - I am learning to assess and manage risk, to protect myself and others, and to reduce the potential for harm when possible. 

HWB 2-17a - I know and can demonstrate how to keep myself and others safe and how to respond in a range of emergency situations.
 
HWB 2-45b - I am aware of the need to respect personal space and boundaries and can recognise and respond appropriately to verbal and non-verbal communication.   
 
TCH 2-08a - I am developing my knowledge and use of safe and acceptable conduct as I use different technologies to interact and share experiences, ideas and information with others.
 
1.

 

Sharing the Learning Outcomes - • I can identify what constitutes personal information.
• I can understand what makes a strong and safe password.
• I can recognise ways information from one source can be used on another e.g. passwords, personal information, photos, etc.
• I can identify precautions I can take to stay safe online.
• I can explain what a digital footprint is.
   
2. Active Learning – Internet Detectives- Examine a (fake) screen capture of a person’s online e-mail account what information can you gather about the person from what you can see. What information can you guess? Are there any clues to other pieces of information and are there ways to confirm this if you have access to the e-mails?
Explore ways that different websites can be linked to one another. Create a mind map of inter linked web sites a person might use e.g. shopping sites, auction sites, online banking sites, etc Sort various forms of data into different categories such as text, numerical, date, .
   
3. Demonstrating Understanding –  Create a presentation explaining why you should not put personal information online.
Create a safer version of a profile page by redrafting example comments.
Identify where it is appropriate to share information e.g. making information only available to limited viewers.
Explain ways information about my computer usage is stored e.g. cookie files, browser history, etc.
Draft safe comments for posting on a blog.
Employ strategies to create multiple strong passwords.
   
4. Review and Recall – Personal information can be used by others to infiltrate your digital footprint.
There are ways to store data to prevent it being misused.
It can be very hard to identify if your passwords have been compromised if the hacker is careful.

 

Image of Inbox
Skip to activity

Please select your region from the list below:

Please enter your username and password and press the "log in" button


*

*