You are on page 1of 6

Lesson 2 of 6

45 minutes
Curriculum expectations: C1.1, C2.2, 1.4, 1.5
Topics: Healthy Living
Benefits and Dangers of Technology
Grade 7 | Making Choices for Personal Health

Learning Goals

By the end of this lesson, students will be able to:

● apply health knowledge and living skills to make reasoned decisions and take appropriate actions concerning
the benefits and dangers of technology, the impact of bullying or harassment on themselves and others and
identify prevention or resolution strategies
● demonstrate critical and creative thinking skills, along with applying relationship and social skills, to describe
the benefits and dangers to themselves and others that are associated with the use of the computers and
other technology.

Facility

Classroom

Equipment List

5 – 10 markers

Chart paper

Pencils and pens

Sticky notes

Teacher Resource 4: Anecdotal Recording Chart: Safety With Technology

Student Resource 2: T-Chart for Technology Use

Grade 7 | Making Choices for Personal Health | Benefits and Dangers of Technology | Page 1 of 6
Lesson 2 of 6
45 minutes
Curriculum expectations: C1.1, C2.2, 1.4, 1.5
Topics: Healthy Living
Benefits and Dangers of Technology
Grade 7 | Making Choices for Personal Health

Student Resource 3: Technology and Harassment

Minds On

Share and clarify the Learning Goals with the class.

Using the Popcorn Strategy (see Appendix), review with students effective communication skills required
for the components of this lesson. Answers may include, but are not limited to: active listening, clarifying,
questioning, responding, clearly expressing information and ideas; expressing responses and providing
feedback.

Distribute sticky notes and pencils/pens to individual students. Using a sticky-note brainstorm, instruct
students to write down uses of computers and other technologies on the sticky notes, one idea per note.

Using large-group discussion, categorize with students the commonalities of their ideas (e.g., Internet and
cell phones are all means of communication). Review with students the different ways that computers and
other technologies are used by themselves or others.

Teacher prompt: “So we can see that one person might use his or her cell phone only as a means of
communication, but others might use it for the other features it may have; like as a calculator, a camera,
or a music player.”

A&E - Minds On

Teacher observation with verbal feedback of students’ ability to apply critical thinking to determine the
various uses of technology

Action

Place chart paper and markers on opposite sides of the classroom. Label one chart paper “Benefits” and

Grade 7 | Making Choices for Personal Health | Benefits and Dangers of Technology | Page 2 of 6
Lesson 2 of 6
45 minutes
Curriculum expectations: C1.1, C2.2, 1.4, 1.5
Topics: Healthy Living
Benefits and Dangers of Technology
Grade 7 | Making Choices for Personal Health

the other “Dangers”. Using Direct Instruction (see Appendix), divide the class into two equal groups. Direct
each group to contribute ideas to one of the charts. On a predetermined signal, direct the groups to switch
and contribute ideas to the other chart. See Notes to Teachers for potential responses regarding benefits
and dangers of technology.

Teacher prompt: “Based on our list of uses for technology, generate a list of ideas for the benefits of
technology and another list of ideas for the potential dangers of technology.”

Using Direct Instruction, explain to students that they are going to participate in a Gallery Walk (see
Appendix) where they will copy out the ideas for the benefits and dangers of technology that apply best to
themselves from the two lists the class have compiled to Student Resource 2: T-Chart for Technology Use.

Using large-group brainstorming, create a list of prevention or resolution strategies that an individual
might use in order to protect themselves from the dangers of technology. See Notes to Teachers for
potential responses regarding protective response strategies.

To accommodate various types of learners, consider recording student responses on chart paper for
referral throughout lesson.

Teacher prompt: “What are some ways of protecting your safety when using a computer, at home or in a
public place?”

Student response: “Everyone should be aware that anything they write or post could become public
information. If a person does not want someone else to know about something, he or she should not write
about it or post it. A person should never share his or her password. If a person is the target of online
harassment, he or she should save and print the messages and get help from a parent, teacher, or other
trusted adult. A person should never share financial information over email or with an unsecure site. A
person should also be wary of emails asking for money, if he or she is not sure, save and print the message
and get help from a parent, teacher or other trusted adult.”

Direct students to complete Student Resource 2: T-Chart for Technology Use, by listing the variety of
protective responses generated by the large-group brainstorm activity.

Grade 7 | Making Choices for Personal Health | Benefits and Dangers of Technology | Page 3 of 6
Lesson 2 of 6
45 minutes
Curriculum expectations: C1.1, C2.2, 1.4, 1.5
Topics: Healthy Living
Benefits and Dangers of Technology
Grade 7 | Making Choices for Personal Health

A&E - Action

Teacher observation with anecdotal writing of students’ ability to critically think and apply relationship
and social skills to their understanding of the benefits and dangers of technology, using Teacher Resource
4: Anecdotal Recording Chart: Safety With Technology

Consolidation

Distribute Student Resource 3: Technology and Harassment.

Using Student Resource 2: T-Chart for Technology Use and Student Resource 1: Defining Harassment,
instruct students to complete the handout.

Teacher prompt: “Using your T-Chart and prior knowledge from Lesson 1 on harassment and bullying,
describe the uses of technology (e.g., social networking, texting, email) that create opportunities for
bullying and/or harassment. Then, assess the impact of this harassment on the affected person and
identify protective responses that could be used.”

To accommodate various types of learners, note that some students may have more success completing
this activity in strategic pairs, with a scribe, or using student/teacher conferencing.

Using large-group discussion, review with students the different ways that computers and technology can
present both benefits and dangers and how technology can be used to harass or bully others. Review with
students the protective responses that they can use to ensure their safety.

A&E - Consolidation

Teacher observation with anecdotal writing of students’ ability to critically think and apply relationship
and social skills to their understanding of how technology is connected to harassment and bullying, its
impact on individuals and prevention or resolution strategies, using Teacher Resource 4: Anecdotal
Recording Chart: Safety With Technology

Grade 7 | Making Choices for Personal Health | Benefits and Dangers of Technology | Page 4 of 6
Lesson 2 of 6
45 minutes
Curriculum expectations: C1.1, C2.2, 1.4, 1.5
Topics: Healthy Living
Benefits and Dangers of Technology
Grade 7 | Making Choices for Personal Health

Ideas for Extension

Direct students to write a procedure or policy for safe technology use that incorporates the proper use of
technology, the reduction of cyber-harassment and protective responses that can be employed if they feel
that they are in cyber-danger.

Next Steps

Students will explore how harassment may lead to mental health problems and demonstrate an
understanding of the linkages between mental health and substance abuse.

Notes to Teacher

Note that for some students, oral conferencing or scribing may be necessary to achieve success with this
lesson.

Teachers should not assume that students have access to computers, the Internet, or other electronics at
home. When giving your own examples, assume public accessibility, e.g., school, library, or other free
public use. For students who are economically disadvantaged, ESL students, or students with a disability,
consider arranging for a demonstration of computer or technology use as part of the unit so that they are
not left out of the discussion.

Below are examples of positive uses of computers and other technology:

● researching information from around the world


● getting business or commercial information, photos, addresses
● purposeful writing activities (e.g., email, blogs, internet)
● getting organized information for assignments or presentations
● connecting with family members and close friends using social networking platforms, such as instant
messengers or blogs
● connecting with worldwide pen pals
● accessing email services
● advertising commercial products, ideas or services through the web

Grade 7 | Making Choices for Personal Health | Benefits and Dangers of Technology | Page 5 of 6
Lesson 2 of 6
45 minutes
Curriculum expectations: C1.1, C2.2, 1.4, 1.5
Topics: Healthy Living
Benefits and Dangers of Technology
Grade 7 | Making Choices for Personal Health

● purchasing and downloading music


● accessing personal or business banking
● shopping online
● searching varied sources and costs easily
● accessing information easily for physically challenged
● researching a company’s or an individual’s history
● searching for jobs
● making travel plans
● subscribing to and receiving online newsletters
● watching movies or video clips

Below are examples of negative uses or potential dangers of computer and technology:

● intruding on others’ personal information


● spreading of others’ personal information without permission
● accessing questionable or unreliable sources, such as unknown websites or unknown authors
● purchasing illegal products
● spreading of propaganda
● exposure to harassment or cyber bullying
● hacking others’ websites
● spreading of viruses that can destroy computer hard drives
● spreading of chain letters
● exposure to unwanted pop-up advertisement
● encountering cults or racism
● exposure to sexual predators or scam artists
● exposure to illegal information, behaviours, music files, etc.

Below are some examples of protection strategies:

● Never trade personal digital photographs over the Internet.


● Never reveal personal information, such as address, phone number, or school name or location. Use only a
screen name.
● Never agree to meet anyone from a chat room in person.
● Never respond to a threatening email or message.
● Always tell a parent, teacher or trusted adult about any communication or conversation that was threatening.
● Never reveal financial information over email or chat rooms. Use only secure websites for financial transaction.
● Report suspicious emails or messages to a parent, teacher or trusted adult immediately.
● Use passwords that are not easily guessed. A strong password is a combination of letters, numbers and symbols.

Grade 7 | Making Choices for Personal Health | Benefits and Dangers of Technology | Page 6 of 6

You might also like