Information Technology Unit includes E-Safety, Searching the Internet, Spreadsheets and Cycle Tests

Information Technology Unit includes E-Safety, Searching the Internet, Spreadsheets and Cycle Tests

Information Technology Unit includes E-Safety lessons where students have to produce a leaflet to warn the audience of the risks and solutions of cyber bullying, predators, social media etc. Lessons also cover searching on the internet and spreadsheets. Every lesson includes a PowerPoint with resources and some contain videos for discussion. You also will get an overview with the lesson objectives and and overall student/teacher assessment checklist. Two cycle papers with questions and answers are also available. This unit covers lessons for a full term - Cycle One: Information Technology, the lessons are: Lesson 1 Welcome to ICT Lesson 2 ESafety and Cyberbullying Lesson 3 ESafety and Predators Lesson 4 ESafety and Social Networking Lesson 5 ESafety Mobile Phones Lesson 6 Spam and Viruses Lesson 7 Revision Lesson Lesson 8 Cycle One Test Lesson 9 Searching the Internet Lesson 10 Spreadsheets Lesson 11 Cycle Test One (1) Feedback and Revision Lesson Lesson 12 Spreadsheets Lesson 13 Final Revision Lesson 14 Cycle Test Final Assessment
samoliver368
Viruses, Malware, spyware and phishing

Viruses, Malware, spyware and phishing

PowerPoint presentation and worksheet on Computer risks. Can be used as part of the BCS E-safety qualification PowerPoint presentation with all the information you need about computer risks such as malware, spyware, phishing and spyware Complete with lesson activity sheet that corresponds to PowerPoint Feel free to modify
lydialouvain
Social Media Profiles - Internet Safety Resource

Social Media Profiles - Internet Safety Resource

Can your children look at these six fictional social media profiles and identify any potential issues. Possible answers include: * Numbers of friends - Do these people actually know that many people in real life? * Location - Giving away where you live, go to school or where you are at a particular time. * Age - Use of social media by children who are younger than the specified age limits. * Photos - Sharing images of others without their permission. ... and much more! Find more resources like this in our Internet Safety Pack at www.teachingpacks.co.uk
teachingideas
Functional Skills Level 2 Build Up Exercises Office 2010

Functional Skills Level 2 Build Up Exercises Office 2010

These exercises comprehensively cover the Functional Skills level 2 ICT specifications. This resource helps to bridge the gap between initial learning and final assessment and covers all aspect of the level 2 ICT specifications. The first build-up exercise includes handy tips to guide the learner through the exercises. The second build-up exercise is designed to test the learner's skills and knowledge without any tips/hints. You will also need to download the data files and worked copies. The build-up exercises cover 36 single-sided A4 pages and cover the following: Files and folders Internet Planning Creating a logo Spreadsheets Creating a newsletter Creating a leaflet Creating an invoice (tables) Compare documents Presentations Databases File compression Email and organise messages Evaluation questions
Qualiteach_Education
Pokémon GO Viruses, Malware Computing lesson for KS3 and KS4

Pokémon GO Viruses, Malware Computing lesson for KS3 and KS4

Students learn about how installing Apps onto mobile phones needs some consideration. Learning objectives: o Be aware that Apps from alternative sources may not be safe o Understand that you exchange some element of privacy in exchange for using Apps on a phone The narrative flow of the lesson follows the following: • How malware is installed on computers • How malware is social engineering - making people install Pokémon go from other sources is dangerous • Pokémon Go is actually known as malware for some people! • Pokémon Go was just the type of App that people were excited to get they would take risks for: but was this worth it?
studeapps
Privacy and Security of Data

Privacy and Security of Data

This material is ideal for GCE A level Applied ICT. It can also be used for the new Computing syllabus. Compiled by Herman Oduor. Author Computing Science Books for Kenya and Rwanda. Currently Director of ICT.
hermanoduor
Internet Safety/ Hoaxes

Internet Safety/ Hoaxes

A booklet that explores some of the weird and wonderful hoaxes of the Internet. Fake websites range from the endangered tree octopus to an online pregnancy scanner. Learners are asked to evaluate the sites and decide why things on the page may not be as they seem. At the end of the resource the learners are asked to look at some less controversial conspiracy theories such as time travel and life on Mars. This is a light-hearted and fun lesson designed to remind learners not to believe everything they see on the internet.
Rachel___
Using ICT Securely

Using ICT Securely

This 11 page resource is an extract from Functional Skills ICT Level 2 and covers Online Security, Viruses, Staying Safe and Respecting Others, Responding to ICT Problems. Each subject starts with a page on theory, folllowed by an activity to test knowledge (in the frm of multi-choice questions and mix and match activity. Answers are included.
Qualiteach_Education
Fusion IT and Computing - National Curriculum 2015

Fusion IT and Computing - National Curriculum 2015

Fusion AS is a fully integrated assessment system, providing feedback in bespoke formats and enabling the staff teams to work more closely with the learners, enabling the feedback to be relevant and useful. This part of Fusion is IT and Computing and supports the new National Curriculum IT and Computing. This tool can be used to assess gaming courses, games design courses, maths courses and Microsoft's Kodu. Progress can be tracked using the system by learner, staff or peers. Feedback can be between learner and staff or between learners in partnerships or groups. For more information, please view the website: http://www.fusion-as.co.uk/
kereascot146
E-Safety

E-Safety

A variety of presentations detailing what E-Safety is, how we communicate online as well as the different ratings for games and game descriptors. Each presentation includes activities that the learners can complete. Can be changed and adapted depending on the needs of the learners.
Squirrel50
eSafety Scenario

eSafety Scenario

This a PowerPoint presentation that looks at a scenario with different outcomes depending on the students choice. It includes a flowchart of the scenario which can be used to teach students how flowcharts work. Students can also create a scenario of their own using presentation software (you can use ThinkUKnow videos for help on a scenario if they are stuck). Great fun. Generates a lot of debate and teaches students why it is important to make the right choices when online.
MsCompGold