Home 6th Grade - Text Only

6th Grade - Text Only

6th Grade - Text Only

Making Good Cyber Decisions:

  • Privacy:

    Angela loves science. One weekend, she was on her home computer and found a science website for kids. To play the games on the site, she had to give her name and home address, but she didn’t think it was a big deal since the website was for kids. She typed in her information and got to play three awesome science games.

    Angela made a bad cyber decision.

    You should never give out private information about yourself or your family—like your phone number, address, where you go to school, or even your name—without getting permission from your parents.

  • Reporting:

    Megan and Sarah have been best friends since kindergarten, but Megan has also become friends with Emmy, a new girl in their third grade class. Sarah got jealous and posted a message online saying that Emmy was ugly and mean, hoping that the rest of the class would see it and ignore Emmy. Megan saw the message and told her mom, who had it deleted. Megan also reported it to Sarah’s parents.

    Megan made a good cyber decision.

    Sarah engaged in cyberbullying. No form of bullying is acceptable. By reporting the e-mail to her mom and getting the message deleted, Megan made the right decision.

  • Cyberbullying:

    Antonio just moved here from Italy. He has made a lot of friends, but Jack is not nice to him and makes fun of his accent. One day, Jack used the computer to draw a mean picture of Antonio and e-mailed it to everyone in the class. Eddie saw it before anyone else and told the teacher. The teacher made sure everyone deleted the e-mail and met with Jack to talk about his actions.

    Eddie made a good cyber decision.

    Eddie was correct to report Jack’s cyberbullying. Making fun of other people online through pictures or writing is not funny. You can hurt other people’s feelings and get in trouble.

  • Passwords:

    Josh and Brian were playing video games after school at Brian’s house. Brian’s parents made him come downstairs to do homework, but Josh stayed upstairs playing. When he got bored with the game, he decided to get on the computer. Since Josh knew the password to the video game system, he guessed that it might be the same for the computer. He was right, and he was able to log on to Brian’s computer and surf the Internet until his parents came to pick him up.

    Brian made a bad cyber decision.

    Passwords should be different for every device that you use. Strong passwords should not be easy to guess, they should not be short, and they should contain a mix of uppercase and lowercase letters, numbers, and at least one special character (such as #, *, or %).

  • Netiquette:

    Cindy stayed late after school one day to work on the computer. When she left, she saw that Ashley forgot to log off her computer. Without looking at Ashley’s account, Cindy logged her off and told her about it the next day.

    Cindy made a good cyber decision.

    Cindy has good “netiquette” (computer manners) because she didn’t look at Ashley’s account, made sure that no one else could look either, and she let Ashley know what happened.

  • Reputable Sites:

    Whenever he saves up enough allowance money, Jacob’s parents let him buy stuff from his favorite website, which the whole family trusts. One day, Jacob got an e-mail from the website with a coupon—but when he clicked on the link in the e-mail, it took him to a strange page and asked him for his name, address, and credit card number. Since Jacob had never seen this page before, he closed it and went directly to his favorite website to shop. He realized that the e-mail was a phishing attempt, so he deleted it.

    Jacob made a good cyber decision.

    The strange page in the e-mail link could have been a non-reputable website phishing for information. Phishing is a sneaky way of trying to get personal information by posing as a trusted website. Jacob was right in closing the page and going directly to the website he trusted.

  • Copyright:

    Cassie’s teacher asked the class to complete a project about the plants and flowers native to the area—they had to write a paper and include pictures that they had personally taken. Cassie wrote the report at the last minute and didn’t have time to take any pictures, so she just used some images that she found online and said that she took them.

    Cassie made a bad cyber decision.

    Copyright infringement is taking someone else’s legally protected work and claiming it as your own. Cassie should not have used someone else’s photos without getting their permission or saying who took them. Only copyright holders have the right to reproduce their own work.

  • Virus Protection:

    Steven was doing some online research at a computer in the school library when a message popped up saying the virus protection software was going to expire if the new version was not downloaded. Even though all students had been told not to upload or download anything on the computers because they were connected to the school network, Steven went ahead and clicked on the “Update Now” button and downloaded the new version. He figured it was one less computer the school needed to update.

    Steven made a bad cyber decision.

    While downloading virus protection for a computer is generally a good thing, Steven had been told not to download anything. Many pop-up ads—even ones that look important—contain hidden viruses, and Steven could not be sure what he downloaded was safe or even necessary for the computer. Steven should have informed a school official about the message.

  • Plagiarism:

    The last book report of the year was due in one day, and Lindsey was running out of time. She decided to do some research online. In a couple of hours, Lindsey had visited about 15 different websites. She just copied a little information from each page, changed a few words here and there, and before she knew it, she was done with her paper—and one day closer to summer vacation.

    Lindsey made a bad cyber decision.

    Plagiarism is taking someone’s words or ideas and using them as if they were your own. Lindsey wrote her paper solely by using the work of others, but she claimed she wrote it herself and did not say where she got the information.

  • Online Predators:

    Sarah was on her social networking page when she received a friend request from a man she didn’t recognize. She went to his page to see his information and noticed that they had seven friends in common—all girls in her grade. His profile picture showed an older guy with a hat covering his face, so she couldn’t tell if she knew him. Sarah felt like she didn’t have enough information to accept his friend request, so she denied him and told her parents.

    Sarah made a good cyber decision.

    Online predators are typically adults who disguise themselves online and try to befriend kids or teenagers in order to abuse or take advantage of them. Never accept an invitation from someone you don’t know. Online predators may seem innocent at first, but they can be extremely dangerous. Sarah was correct in being suspicious of this person, denying his friend request, and telling her parents what happened.

  • E-Mail:

    Bobby and Natalie always play kickball together at recess. When Natalie decided to play softball with Michelle one day instead, Bobby got really mad at her. When he got home, he wrote Natalie a very hurtful e-mail saying what a terrible friend she was and he called her a few bad names. Natalie was so upset when she read the e-mail that she didn’t want to come to school the next day.

    Bobby made a bad cyber decision.

    E-mail is just writing a letter over the computer, but that letter can be saved, stored, forwarded to other people, and can also be easily misunderstood. When using e-mail, you should use appropriate language and manners at all times.

  • Chat Rooms:

    Josh’s dad loved going into chat rooms to talk about cars. One day when no one was home, Josh decided to see what the chat room was all about. Josh mentioned that his dad had just gotten a new Porsche convertible, and a man named Eric seemed very interested. Eric said that he lived just around the corner from Josh and wanted to come see the car. Josh thought that since Eric was probably a neighbor it would be okay for him to come by, so he gave Eric his address and invited him over after school the next day.

    Josh made a bad cyber decision.

    Chat rooms are a way to talk to a lot of people online at one time. Online predators sometimes use chat rooms to find children to take advantage of. You shouldn’t use a chat room or arrange to meet someone you’ve talked to online without a parent’s permission.

  • Instant Messaging:

    Molly and Emma were using instant messaging to talk about an upcoming test. While they were chatting, Emma received a different message from someone with a username she didn’t know. That person was trying to chat with her about the same test, but since she wasn’t sure who it was, she ignored the message and told her parents about it.

    Emma made a good cyber decision.

    Instant messaging can be dangerous if kids start talking to strangers because child predators can use it to find kids to take advantage of. Emma made the right decision by not chatting with a stranger and telling her parents about the message.

  • Cell Phones:

    Sandy and Lisa decided to use their phones to take silly pictures of themselves to send to some of their friends. After taking the pictures, Sandy changed her mind about the plan, but Lisa sent the photos anyway. One of their friends received the pictures and uploaded them to a website so that anyone on the Internet could see them.

    Lisa made a bad cyber decision.

    Cell phones can be targeted for cyber threats and viruses just like computers. Also, anything sent over a cell phone can be saved, stored, forwarded, and uploaded—you can’t be sure that it will stay private. Lisa should have been more careful when taking and sending the photos.


  • Password: A secret word or other sequence of letters, numbers, or symbols that you use to access a computer or program

  • Privacy: The ability to control what information you reveal about yourself over the Internet and who can access that information

  • Reporting: Telling a teacher, parent, or other adult about something you saw online that you didn’t think was appropriate

  • Cyberbullying: Using the Internet to send or post messages or pictures that are meant to hurt or embarrass another person

  • Netiquette: Short for “Internet etiquette” or “network etiquette,” it means good computer and Internet manners

  • E-Mail: Messages sent and received electronically over the Internet

  • Virus Protection: Preventing a computer virus from infecting a computer by using special software and common sense

  • Copyright: The legal right to copy, publish, sell, or distribute an original piece of work, like a book, song, or photograph

  • Reputable Site: A website that contains trusted and reliable content from a respected source

  • Plagiarism: The act of using another person’s words or ideas as your own, without giving credit to that person

  • Online Predator: A person who uses the Internet to attempt to abuse or take advantage of kids

  • Chat Room: An online, real-time discussion group that several people can participate in at once

  • Instant Messaging: Similar to a chat room, but it’s an online, real-time conversation between just two people

  • Cell Phone: A portable device that can make and receive telephone calls and in many cases can also be used for web browsing and to send text messages, e-mails, and pictures

Sliding Puzzle Game:

  • Kids and teenagers that express strong emotion over the internet: Strangers can read what you write online, even if you think it’s private. Predators search for emotionally vulnerable kids.

  • Kids and teens that post revealing photographs: Online pictures can include details such as your address, neighborhood, school name, or even your geographical coordinates. Predators look for any information to identify you.

  • Kids that aren’t able to recognize dangerous situations: Strangers with bad intentions might use instant messages, chat rooms, or even e-mails to establish contact with you. Remember to always tell a parent or teacher if something makes you uncomfortable.

Spy Glasses Game:

  • I know something about you.
    I am building trust to learn your secrets.

  • Type in your name and address to win a free prize.
    I want your private information to scam you, not to give you a prize.

  • Take this quick personality test.
    I am gathering facts about you to make it easy to guess your password or other secret information.

  • Enter the contest on this pop-up ad and win big!
    I’m tricking you so I can get your information, use your e-mail, or infect your computer.

  • Download this file.
    If you do not know me, this file probably contains a virus that will harm your computer.

  • Forward this spam e-mail.
    I’m trying to get you to engage in bad netiquette. Spam e-mails can damage your computer.

  • You really stink!
    This is cyberbullying. Tell an adult if you feel you are being bullied online or off.

  • Online predators like to trick kids and teens into telling secrets. Once they have gained your trust, they may threaten to tell your friends and family these secrets unless you meet them in person. Never fall for this trick.

    Never give up your personal information if a website asks for it.

    Do not forward spam emails, click the links in spam emails, or click links on pop-up ads. Many of these links can download harmful viruses onto your computer.

Scuba Game:

  • When signing up for an account on a trusted website, never give out your credit or debit card number.
    You should never give out your credit card number to create an account, even on a shopping website. Do not give out your credit card number unless you are making a transaction on a trusted website and have your parent’s permission.

  • If you receive an email saying you have won a free electronic, such as a cellphone or MP3 player, from a well-known company, you should delete it.
    Although it may be tempting to claim your prize, this is usually most likely a phishing attempt.

  • When a predator is grooming, they might talk about something inappropriate.
    Predators will ask you about your personal life or relationships to find out more information about you.

  • If you use information from the Internet in a school project, you should cite the information.
    Always cite the work you use from the Internet- merely telling your teacher where you found it is not enough.

  • You can get in trouble for being a bystander to cyberbullying.
    Many schools are adopting policies that punish bystanders of cyberbullying. If you know cyberbullying is going on, report it to a parent, guardian, or teacher.

  • The safest website addresses end in .gov, .edu.
    Although websites that end in .com and .org are usually safe, you can always trust a website ending in .gov and .edu.

  • An example of a strong password is b4!3h7&i.
    Your password should contain at least 8 characters and be made up of letters, numbers, and symbols.

Take the Quiz:

6th Grade Quiz