2-1 Internet Basics and Cyber Safety Lesson Plan
2-1 Internet Basics and Cyber Safety Lesson Plan
4. Open the following documents on your computer and then minimize them:
• 2.2 Internet Basics Presentation
• 2.3 Internet Scavenger Hunt – Teacher
• 2.4 Cyber Safety Presentation
From the Student Folder:
2.0.2 Internet Scavenger Hunt - Student
2.0.3 Web Site Evaluation Rubrics
2.0.4 Internet and Cyber Safety Online Resources
In Class
Tell students that Internet & Cyber-Safety is a two to four-hour course designed to familiarize
students with web browser basics, search engines, and search strategies. Ethical and safety
concerns will also be considered.
Introduce Ourselves. Ask about their expectations… ie: “What do you hope to learn today?”
IIA.1 INTERNET BASICS AND CYBER SAFETY LESSON PLAN
Instruction: Display the Internet Basics Presentation on the LCD Projector screen. Instructor
students to take notes in the student handbook (dotted lines are provided in the handbook for
this purpose) when necessary. ENCOURAGE students to stop you if they have any questions.
Learning Goals
Definitions:
Define “networks”- 2 or more computers connected by cables, telephone lines, radio waves,
satellites, or infrared light beams.
Define “World Wide Web” – the system we use to access the internet.
Define “Web Browser” – the type of program we use to access the World Wide Web.
Review screen components of Internet Explorer from the top down. Students have space to
take notes.
• Title Bar:
• Minimize:
• Restore:
• Close:
• Address Bar:
• Back & Forward Buttons:
• Tabs:
• Status Bar:
Define “Hyperlink” – a command embedded in text or an object which, when clicked, will open
another file, take you to another place in the same file or to a new location on the internet.
Define “URL” (Uniform Resource Locator) or Web Address – the global address for documents
and other resources on the internet.
Define “Search Engine” – a program that searches documents / web pages for a particular word
or set of words and returns a list of pages containing those words and/or set of words. The
three most widely used search engines are google.com.
Close the Internet Basics Presentation and maximize these search engines:
Google.com Bing.com
Yahoo.com
• Explain that each of these is a search engine. Show each on the overhead and point out the
differences.
• Sponsor/Owner: On what type of Internet provider or organization does the page reside?
• Organization and Content: Is the page organized and focused? Is it well designed? Is the
text well written? Are the links relevant and appropriate? Are the links evaluated?
• Bias--political or issue stance (of the author or sponsor): Some web pages have an inherent
bias that will impact everything that appears on them. Is the author or sponsor:
• Authority/Author Who is responsible for the page? Is the author an expert in this field?
What else has he/she written or produced? Does the author provide an e-mail address?
How accurate is the provided information? Is a bias evident?
• Audience: To what type of reader is the Web page directed? Is the level appropriate for
your needs? Is the page for:
• Coverage: Does the page cover the topic comprehensively, partially or is it an overview?
• Illustrations: Are the graphics clear in intent, relevant and professional looking? Do the
graphics add to or enhance the content?
SITES TO EVALUATE
Refer students to the 2.0.3 Website Evaluation Rubrics in their Student Manual.
Maximize the Lewis and Clark Evaluation link. As a class, evaluate the website. Ask students to
rank each criterion with 5 being the best ranking. Discuss.
Then tell students to use the rubric in their Student Manual to mark their evaluations either
alone or working in pairs.
Protect your PC from external threats by installing antivirus software and updating and running
it on a regular basis.
Maximize the Password Meter link. Show students how to use the site.
Then they should test their current passwords and come up with some that are more secure..
Show the student the 2.0.4 Internet Basics and Cyber Safety Online Resources document on
the screen. Have them find the document in the student folder on their desktop and open it.
Ensure they can use the Ctrl/Mouse Click to open the links.
Then, depending on the student skill levels and time constraints, you can choose to cover any
additional material in the student manual or on the resource list.
ASSIST STUDENTS WITH COPYING THEIR STUDENT FOLDER FILES TO THEIR OWN USB DRIVE
OR THEIR OWN ONLINE DRIVE.
2.6 Certificate of Completion. Depending on your printing situation, do one of the following:
• Call students up one at a time to print their Certificate of Completion from your
computer. You can ask them to type in their own names. Sign their certificates.
• If no printer is available in the lab, have pre-printed certificates available and write or
pre-type student names. Sign certificates before the class so they are ready to
distribute.
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................