5th Grade - Text Only
5th Grade - Text Only
Making Good Cyber Decisions:
Angela loves science. One weekend, she was on her home computer and found a science website for kids. To play the games on the site, she had to give her name and home address, but she didn’t think it was a big deal since the website was for kids. She typed in her information and got to play three awesome science games.
Angela made a bad cyber decision.
You should never give out private information about yourself or your family—like your phone number, address, where you go to school, or even your name—without getting permission from your parents.
Reporting:Megan and Sarah have been best friends since kindergarten, but Megan has also become friends with Emmy, a new girl in their third grade class. Sarah got jealous and posted a message online saying that Emmy was ugly and mean, hoping that the rest of the class would see it and ignore Emmy. Megan saw the message and told her mom, who had it deleted. Megan also reported it to Sarah’s parents.
Megan made a good cyber decision.
Sarah engaged in cyberbullying. No form of bullying is acceptable. By reporting the e-mail to her mom and getting the message deleted, Megan made the right decision.
Antonio just moved here from Italy. He has made a lot of friends, but Jack is not nice to him and makes fun of his accent. One day, Jack used the computer to draw a mean picture of Antonio and e-mailed it to everyone in the class. Eddie saw it before anyone else and told the teacher. The teacher made sure everyone deleted the e-mail and met with Jack to talk about his actions.
Eddie made a good cyber decision.
Eddie was correct to report Jack’s cyberbullying. Making fun of other people online through pictures or writing is not funny. You can hurt other people’s feelings and get in trouble.
Josh and Brian were playing video games after school at Brian’s house. Brian’s parents made him come downstairs to do homework, but Josh stayed upstairs playing. When he got bored with the game, he decided to get on the computer. Since Josh knew the password to the video game system, he guessed that it might be the same for the computer. He was right, and he was able to log on to Brian’s computer and surf the Internet until his parents came to pick him up.
Brian made a bad cyber decision.
Passwords should be different for every device that you use. Strong passwords should not be easy to guess, they should not be short, and they should contain a mix of uppercase and lowercase letters, numbers, and at least one special character (such as #, *, or %).
Cindy stayed late after school one day to work on the computer. When she left, she saw that Ashley forgot to log off her computer. Without looking at Ashley’s account, Cindy logged her off and told her about it the next day.
Cindy made a good cyber decision.
Cindy has good “netiquette” (computer manners) because she didn’t look at Ashley’s account, made sure that no one else could look either, and she let Ashley know what happened.
Whenever he saves up enough allowance money, Jacob’s parents let him buy stuff from his favorite website, which the whole family trusts. One day, Jacob got an e-mail from the website with a coupon—but when he clicked on the link in the e-mail, it took him to a strange page and asked him for his name, address, and credit card number. Since Jacob had never seen this page before, he closed it and went directly to his favorite website to shop. He realized that the e-mail was a phishing attempt, so he deleted it.
Jacob made a good cyber decision.
The strange page in the e-mail link could have been a non-reputable website phishing for information. Phishing is a sneaky way of trying to get personal information by posing as a trusted website. Jacob was right in closing the page and going directly to the website he trusted.
Cassie’s teacher asked the class to complete a project about the plants and flowers native to the area—they had to write a paper and include pictures that they had personally taken. Cassie wrote the report at the last minute and didn’t have time to take any pictures, so she just used some images that she found online and said that she took them.
Cassie made a bad cyber decision.
Copyright infringement is taking someone else’s legally protected work and claiming it as your own. Cassie should not have used someone else’s photos without getting their permission or saying who took them. Only copyright holders have the right to reproduce their own work.
Steven was doing some online research at a computer in the school library when a message popped up saying the virus protection software was going to expire if the new version was not downloaded. Even though all students had been told not to upload or download anything on the computers because they were connected to the school network, Steven went ahead and clicked on the “Update Now” button and downloaded the new version. He figured it was one less computer the school needed to update.
Steven made a bad cyber decision.
While downloading virus protection for a computer is generally a good thing, Steven had been told not to download anything. Many pop-up ads—even ones that look important—contain hidden viruses, and Steven could not be sure what he downloaded was safe or even necessary for the computer. Steven should have informed a school official about the message.
The last book report of the year was due in one day, and Lindsey was running out of time. She decided to do some research online. In a couple of hours, Lindsey had visited about 15 different websites. She just copied a little information from each page, changed a few words here and there, and before she knew it, she was done with her paper—and one day closer to summer vacation.
Lindsey made a bad cyber decision.
Plagiarism is taking someone’s words or ideas and using them as if they were your own. Lindsey wrote her paper solely by using the work of others, but she claimed she wrote it herself and did not say where she got the information.
Sarah was on her social networking page when she received a friend request from a man she didn’t recognize. She went to his page to see his information and noticed that they had seven friends in common—all girls in her grade. His profile picture showed an older guy with a hat covering his face, so she couldn’t tell if she knew him. Sarah felt like she didn’t have enough information to accept his friend request, so she denied him and told her parents.
Sarah made a good cyber decision.
Online predators are typically adults who disguise themselves online and try to befriend kids or teenagers in order to abuse or take advantage of them. Never accept an invitation from someone you don’t know. Online predators may seem innocent at first, but they can be extremely dangerous. Sarah was correct in being suspicious of this person, denying his friend request, and telling her parents what happened.
Bobby and Natalie always play kickball together at recess. When Natalie decided to play softball with Michelle one day instead, Bobby got really mad at her. When he got home, he wrote Natalie a very hurtful e-mail saying what a terrible friend she was and he called her a few bad names. Natalie was so upset when she read the e-mail that she didn’t want to come to school the next day.
Bobby made a bad cyber decision.
E-mail is just writing a letter over the computer, but that letter can be saved, stored, forwarded to other people, and can also be easily misunderstood. When using e-mail, you should use appropriate language and manners at all times.
Password: A secret word or other sequence of letters, numbers, or symbols that you use to access a computer or program
Privacy: The ability to control what information you reveal about yourself over the Internet and who can access that information
Reporting: Telling a teacher, parent, or other adult about something you saw online that you didn’t think was appropriate
Cyberbullying: Using the Internet to send or post messages or pictures that are meant to hurt or embarrass another person
Netiquette: Short for “Internet etiquette” or “network etiquette,” it means good computer and Internet manners
E-Mail: Messages sent and received electronically over the Internet
Virus Protection: Preventing a computer virus from infecting a computer by using special software and common sense
Copyright: The legal right to copy, publish, sell, or distribute an original piece of work, like a book, song, or photograph
Reputable Site: A website that contains trusted and reliable content from a respected source
Plagiarism: The act of using another person’s words or ideas as your own, without giving credit to that person
Online Predator: A person who uses the Internet to attempt to abuse or take advantage of kids
Sliding Puzzle Game:
Kids and teenagers that express strong emotion over the internet: Strangers can read what you write online, even if you think it’s private. Predators search for emotionally vulnerable kids.
Kids and teens that post revealing photographs: Online pictures can include details such as your address, neighborhood, school name, or even your geographical coordinates. Predators look for any information to identify you.
Kids that aren’t able to recognize dangerous situations: Strangers with bad intentions might use instant messages, chat rooms, or even e-mails to establish contact with you. Remember to always tell a parent or teacher if something makes you uncomfortable.
Spy Glasses Game:
I know something about you.
I am building trust to learn your secrets.
Type in your name and address to win a free prize.
I want your private information to scam you, not to give you a prize.
Take this quick personality test.
I am gathering facts about you to make it easy to guess your password or other secret information.
Enter the contest on this pop-up ad and win big!
I’m tricking you so I can get your information, use your e-mail, or infect your computer.
Download this file.
If you do not know me, this file probably contains a virus that will harm your computer.
Forward this spam e-mail.
I’m trying to get you to engage in bad netiquette. Spam e-mails can damage your computer.
You really stink!
This is cyberbullying. Tell an adult if you feel you are being bullied online or off.
Online predators like to trick kids and teens into telling secrets. Once they have gained your trust, they may threaten to tell your friends and family these secrets unless you meet them in person. Never fall for this trick.
Never give up your personal information if a website asks for it.
Do not forward spam emails, click the links in spam emails, or click links on pop-up ads. Many of these links can download harmful viruses onto your computer.
When you sign up on a website, you should use your favorite color as a screenname.
When creating a username, you should never use any personal information, such as your name.
When you receive spam e-mail, you should delete it.
Spam e-mails can have viruses that can damage your computer. You should delete all spam messages.
WHEN YOU TYPE IN ALL CAPS LIKE THIS, it is bad netiquette.
Typing in caps is the same as yelling, which is bad netiquette!
If you see an image online that makes you uncomfortable, you should tell an adult.
If you see a picture that makes you uncomfortable, turn off your monitor and go tell an adult.
The internet is for kids and adults to play games, research, and other things.
Anyone can use the internet! It is a great tool to play games, do research, keep in contact with friends and family, watch videos, and more.
u2#7lj9TR3 would be an example of a strong password.
A strong password is made up of at least 8 letters, numbers, and symbols.
Before you sign up for a website program, you should ask a parent or guardian.
Always ask a parent or guardian before setting up an account on a website.
Your password should never include something that would be easy for someone else to guess.
Don’t make a password with information about you that is easy to learn.
Once you make a password, you should change it often.
You should change your password often as a safety measure.
Being mean to other players in online games is never ok.
Games are meant to be fun! You should be nice to other players so it stays that way.