Hi, what do you want to do?
Curated OER
NW Link Protocol
In this technology worksheet, students practice logging in to the NW Server and following the security measures for the system.
Curated OER
Introduction to the Internet
Students conduct a brief overview of the Internet in four main sections: Background of the Internet, E-mail, Web Browsing, and Web Searching. The latter three sections of this unit cover the mechanics as well as the underlying concepts...
Curated OER
Installing and Sharing Printers
In this technology worksheet, students practice installing and sharing a printer access across the network system. This includes monitoring and changing configurations.
Curated OER
Meet Your New eBuddy
Pupils are introduced to the eBuddies laptop system. Using the technology, they create a new Word document and practice using a mouse. Opening a new window from Internet Explorer, they view an appropriate site which allows them to...
Curated OER
Organizational Strategies for First Year Composition Writers
Identify and analyze deductive reasoning through genuine texts. Compare cultural practices and beliefs about national ID cards. Look for another example of a deductive argument and prepare a brief paragraph analyzing the audience,...
Curated OER
Curious? "Hack Away" Computer Activity
In this computer instructional activity, students complete 3 multiple choice questions about computer hacking. Page contains multiple links to additional activities.
Curated OER
Read More Than Words
Students, in groups, visually read photographs from the Farm Security Administration taken during the Great Depression. They analyze the photos and present their observations to the class.
Curated OER
Great Graphing
Students collect data, use a computer spreadsheet program to create various graphs, and compare the graphs. They state the findings of each graph in writing and decide which graph type best represents the data.
Curated OER
Saving Private Pensions
Students consider the importance of financial security after retirement, examine current problems with pension plans in the private sector, research different retirement options, and create a "How it Works" poster.
Curated OER
Football game seating: Security or Restriction
Students read the Ohio High School Athletic Association Sportsmanship Resource Guide, paying particular attention to what it says for School Reporters. They then write a news article about the issue presented.
Curated OER
TECH:Introduction to Programming (IT)
Students complete an activity that illustrates the concepts of giving accurate instructions and computer programming. They also identify the relationship of the instructions/code to computer programming. Students then create a peanut...
College Board
1998 AP® Statistics Free-Response Questions
Free-response questions form the 1998 AP® Statistics exam allow class members to analyze data from real-life situations. The situations include tracking defective parts, tracking butterflies, evaluating weed killers and determining...
Curated OER
ComSec for Network+: New Threats
Learners identify the different types of security threats on a system. In this technology lesson, students demonstrate ways to defend the system from such attacks. They use computer simulation to implement security procedure.
Curated OER
Information Technology
Students identify various threats to computers today. In this technology lesson, students explore various techniques to address security issues. They demonstrate what they have learned using classroom computers.
EngageNY
Using Matrix Operations for Encryption
Data encryption is an important security measure for sensitive data stored on computers. Pupils learn how to utilize matrices for creating code. They also get a great review of matrix multiplication, inverse matrices, and the identity...
Curated OER
BUS:PowerPoint: All About Me - Office 2003/2007
Teach the class how to put together a PowerPoint presentation using their autobiography as the content. First, have them use the outline given to put together their autobiography in storyboard fashion. Now, they have their content ready...
Curated OER
Cyberattack Detection Versus Privacy Protection
High schoolers examine the issues of privacy and security as they relate to computer monitoring. In this privacy protection lesson, students carry out a round table discussion and write a persuasive essay pertaining to whether citizens...
Curated OER
Safe Passwords
Students brainstorm synonyms for security. In this Computer Skills lesson plan, students compare the home security to password security. Students read an article and review strategies for creating strong passwords. Students apply their...
Curated OER
Basic Infosec
Sixth graders identify similarities between home security and computer (or information) security. In this information security lesson, 6th graders create their own secure folders using passwords on the computer to organize their...
Curated OER
Your Safety and Security or Your Civil Liberties - Which is More Important?
Students examine provisions of USA PATRIOT Act and controversies that led the ACLU to take legal action against the legislation. They create, conduct, and document results of a survey related to the PATRIOT Act and controversies...
Google
Be Internet Awesome
Teach the qualities of a digitally smart citizen with a set of lesson plans created by Google. Along with creating strong passwords, learners explore how to protect their privacy, when to stand up for others against cyberbullying,...
Curated OER
Privacy and Online Life: Protect Yourself
Help your class protect privacy, security, and their online profiles with this examination of social media, especially Facebook, and who can see what about each of us. Resource contains useful links for learners to conduct their own...
Curated OER
Bicycle Wheel Gyro
Using a bicycle wheel and a rotating stool, young physicists experiment with angular momentum. This is a simple, fun, and educational activity that demonstrates a foundational concept. If you can secure the materials, it is definitely...
Curated OER
Anasazi Basket Weaving
The Anasazi Indians of Mesa Verde are the focus of this art and social studies lesson. Working in pairs or groups of three, pupils utilize computers and go online to search for websites about the Anasazi. Students will choose two or...
Other popular searches
- Firewalls, Computer Security
- Cyber Computer Security
- Computer Security Threats
- Cyb Computer Security
- Firewalls Computer Security