Professional Documents
Culture Documents
The programmes have been designed to meet the needs of UK and international students and
are suitable for both children and adult learners.
NCC Education Digi programmes are offered in a variety of settings and across different
delivery timeframes. For reference, delivering the Digi programmes following the English
school system would be as follows:
By covering the new English Computing Curriculum, NCC Education’s Digi programmes
reflect the increasing global demand for high quality Computer Science education. Lessons
provide a strong focus on digital literacy, online safety, content creation and coding using
multiple programming languages, helping to inspire the next generation of digital innovators.
On completion of each programme (i.e. all books for that programme) students can be entered
for formal assessment leading to certification by NCC Education.
NCC Education does not provide diagnostic tests for confirming Digi programme entry level.
However you may create such tests from the materials provided, using for example sample or
past papers available to your centre or institution, or the additional online enrichment material.
Students’ computer equipment and set-up should adhere to the following minimum
specification and features. Note that while it is possible to use computers running old operating
systems we would advise running a system which is still actively supported (e.g. for Microsoft,
Windows 7 or later), with:
For certain activities it would be beneficial to be able to share your screen with your class,
either via digital whiteboard, large screen monitor/TV or suitable screen sharing software. Pre-
installing software which may be used in future lessons should also be considered.
Activity 1
You are going to plan a presentation about your favourite character from a book you know.
Write a short list of characters you know in the box. Then choose one for your presentation.
Think about what you can say about the character you selected.
Tell the person next to you what you like about them, and:
Now write down five interesting facts about the character you have chosen.
Use a copy of the book or the Internet to research any details you may have forgotten.
1.
2.
3.
4.
5.
How much time do you have for your presentation? You might not have time to talk about
everything you want to. Which facts are you going to focus on?
Choose your three favourite facts. Decide which facts are the most interesting and refine
your information.
Tell your classmate why you chose these facts and then prioritise the list. Write 1 by the most
important fact, 2 by the second most important and 3 by the least important of your three facts.
Activity 1
Discuss the books the students are currently reading and create a list of the books on the
whiteboard. Extend the discussion to include the students’ favourite characters in books they
have read.
Encourage the students to list some of their favourite characters in their books and then
choose one from the list. Explain that the character they selected will now be the focus of their
presentation. If possible, you may choose to show a selection of books from the school library
to give the students some ideas.
Taking the example of the Mad Hatter from Alice in Wonderland, discuss the different
attributes that can be included in a character description including appearance, personality
traits and aspects of the story directly related to the character. Alternatively, you could also
use a character from a book you may be reading in class.
The students write down five facts about the character they have chosen. They then refine
their list down to three, discussing the reasons for their choices with their classmate.
Resources
• Computers with Internet access
Terminology
• Prioritise – put things in their order of importance
• Refine – reduce the information to key details that fit the purpose
By the end of this lesson you will know more about how to:
• Match a presentation to an audience
Activity 1
What is an audience?
Write down what you think an audience is and who you might see in an audience.
Audiences can be made up of lots of different groups of people; for example, your audience
could include members of your family, your school friends or people who share the same
hobby. They may be young or old, know a lot about the subject you are going to talk about or
nothing at all.
You are going to prepare a slide for two different audiences (this means one slide for each
audience). The presentations will give each audience some information about the same topic.
Show me how: Your teacher will show you some different pictures and facts to use and also
tell you how to make your two presentations.
Show your presentation to your teacher. Did everybody in the class use the same images and
facts for the same audience?
Activity 1
Ask the class to define the word audience and record their ideas on the whiteboard.
Working with a partner, the students write a definition of what an audience is and who they
would expect to see in it.
Explain to the students that when they give a presentation, it is important to consider who is
in the audience and make sure the content is appropriate to them.
A presentation to a young audience may include more pictures and less text, or simpler
wording. Even when presenting to older people or subject experts, it is important to think about
the amount of text and not to simply read out the information on the presentation slide.
You may choose to run the ‘slide planning’ activity by providing students (each pair or group
as you have arranged) with two sheets of A4 paper and asking them to cut out and glue the
‘slide components’ provided (i.e. photocopies as necessary), thereby producing their two
different ‘slides’, one for each audience.
With your additional guidance, reviewing and class discussion as necessary students should
think about using the two questions and simpler answers (with one or two general moon
images, appropriately positioned and relating to the text) to form the young learners’ slide, with
other content being arranged to produce the parents’ slide.
Resources
• Photocopies of pictures and text
• A4 paper
• Glue
• Scissors
The Moon fully orbits the Earth in 28 days. During this time
the sun lights the moon from different angles.
This is why we see different phases of the Moon.
Activity 1
Which book character did you select for your presentation in Lesson 1? Write the name of the
character below:
You are going to use the information you have already researched (and refined) about this
character to design your presentation.
Use the Internet to choose some images and verify the key facts for your presentation. You
can save more pictures than you need and choose which to use later on.
Use this space to make notes and record any additional information:
Now design your full slide on your notes page for this lesson. Think about layout, font style,
text and the pictures you are going to use.
Discuss your plan with your classmate and consider any suggestions he or she makes.
Activity 1
Working as a class, review and discuss the notes the students made in Lesson 1. Explain that
students will begin the process of creating their presentations about their favourite characters
from a book.
Working independently, encourage students to research additional facts and images using the
Internet, saving any images they wish to use and recording additional information in their
student booklet. Remind students to aim to save more images than they will eventually use.
Using the whiteboard, demonstrate how to create a plan, drafting the layout for a presentation.
The students then create their designs using the notes page in their books. Encourage the
students to show and discuss their designs and make suggestions as to how they might
improve them. Ensure that all work is carefully saved ready to be used in the next lesson.
Resources
• Computers with Internet access
Activity 1
You are going to use the plan you made last lesson to create a presentation using PowerPoint
or similar software.
When you open the software programme you can either choose to use a blank presentation
or select a template.
A template is a framework document that is stored in the software. The design has already
been set and you can create a slide using the design. The colours and fonts are pre-set and
all you need to do is add pictures and text.
Have a look at the templates in the software package you are using and decide whether you
want to use a template or open a blank document.
Use your plan and create a slide about your favourite book character.
Use the spell checker and check that you are happy with all the content on your slide before
you print it out.
Save
Remember to save your work!
Activity 1
Demonstrate how to open a new document and where to find the templates in the presentation
software package your class is using.
The students use the design they created in the previous lesson to write a presentation about
their favourite book character.
Encourage the students to use the time effectively and complete their presentations, printing
out a hard copy ready to review next lesson.
Extension: You may wish to demonstrate the notes function to students who have completed
their presentation. Stress the importance of not including large amounts of text on a slide and
using the notes function to write down what will be said.
Resources
• Computers with Internet access
• Presentation software
• Plans created in Lesson 3
Activity 1
Last lesson you created a presentation slide about your favourite book character.
When you review some else’s work you should give them your opinion and make helpful
suggestions as to how they could improve it, including correcting spelling and grammar
mistakes.
Circle or underline any errors and make notes about how this slide can be improven:
Tell your friend what you like about their work. Give them some suggestions about how they
could make their slide even better.
Explain any notes you have made and point out any spelling mistakes or grammatical errors.
Save
Remember to save your work!
Activity 1
Demonstrate how to review a piece of work, using the sample slide provided with this lesson.
Ask the students to make notes on the slide in their booklet, circling all the errors and
correcting any spelling mistakes.
Review the slide together and make the amendments the students suggest.
The students then swap slides with their classmates and review one another’s work.
Allow sufficient time for the students to make any suggested improvements to their
presentations.
Resources
• Computers with Internet access
• Presentation software
Activity 1
Let’s practise
Open your presentation about a book character and follow
these instructions to insert a hyperlink.
First, search the Internet and find a web page, video or audio clip that you would like to link
to your presentation.
Now go back to your document. Highlight the word or the picture that you want to hide the
hyperlink behind.
Any words associated with the hyperlink will show up as a different colour (normally blue) and
underlined. If you have added the hyperlink to a picture, you will not be able to see any
difference.
Once the hyperlink has been opened it will change colour (normally purple).
In order to make the hyperlink work, you will need to run the slide show.
Well done!
Save
Remember to save your work!
Activity 1
Read through the introductory information with the students. You may choose to show
students one or two examples of hyperlinked words and images, opening the different kinds
of resources mentioned (file, web link, video, audio clip etc.).
Guide the students through the process of adding one or more hyperlinks to their
presentations.
Extension: You may choose to direct students to the Animations tab and challenge them to
include animated text in their presentations.
Resources
• Computers with Internet access
• Presentation software
Activity 1
It is not just people that can become ill. When a computer is infected by malware it becomes
sick and is unable to run properly.
In the same way that tonsillitis and chicken pox affect different parts of the body, computer
bugs affect technology in different ways.
Some bugs corrupt the files on a computer. This means the information in a file becomes
scrambled or part of a file is deleted. Sometimes a corrupted file cannot even be opened.
Other bugs are able to steal information from a computer, such as the user’s name, date of
birth and address.
Activity 2
Work with a classmate and create a poster about computer bugs and how to stop them
infecting your computer.
Share
Show your teacher and share your poster with the class.
Activity 1
Ask the class whether they know what a virus is, or any common virus names. In a human
context, it is a biological agent which can copy itself thousands of times in a human cell,
making the human ill.
Students complete the gap-fill activity. You may choose to help students here, for example by
describing the virus symptoms or perhaps by translating the word into the students’ native
language.
Answers: F l u, C h i c k e n P o x
Extend the discussion and introduce the idea that computers can also become infected by
bugs. Review and explain the ways in which bugs can enter a computer:
• Infected links on websites.
• Infected game and utilities software
• Infected media files
• Opening files attached to emails
• Inserting an infected USB stick
Activity 2
The students work with a partner to create a poster, explaining how to avoid malware and
protect a computer from becoming infected.
You may choose to display the finished posters around the classroom and discuss the key
points the students have included.
Resources
• Computers with Internet access
• Paper
• Coloured pens and/or pencils
Terminology
• Corrupt – to manipulate or change a computer program and stop it working properly
• Malware – code that is written with the intention of harming a computer
• Utilities – small, non-essential programs that provide an extra function, for example
cleaning up unused files
• USB stick – small memory drive which stores computer programmes
Activity 1
Talk to the person next to you and remind them of three ways they can prevent a bug from
entering a computer’s system.
1.
2.
3.
As people, we protect ourselves from infectious diseases using vaccinations; computers use
anti-malware programs in a similar way to protect their systems from malware.
Interesting Fact:
Viruses like chicken pox work by attaching themselves to a living cell. They make the cell copy
the virus over and over again, making the person or animal sick. Computer viruses work in a
similar way; a piece of code enters a program and forces itself to be copied, corrupting the
computer system.
Anti-malware programs are small programs that can be downloaded and they work in a range
of ways:
• Some scan the computer, checking every file and/or email on the computer to make
sure they are safe.
• Firewalls behave like a wall or a barrier; they stop malware getting onto your computer
from the Internet.
• Anti-virus software is designed to detect computer viruses and destroy any it finds.
ADWARE
ANTI
EMAILS
FIREWALL
MALWARE
SCAN
SPYWARE
TROJAN
VIRUS
WORM
Activity 1
Ask the students to discuss how they can protect their computers from bugs and recap the
information introduced in the previous lesson. The students should be able to identify three of
the following factors and write them in their books:
• Be careful when clicking through a link on the Internet.
• Do not download software or media unless it is from a trusted source.
• Do not open email attachments if you do not know where they have come from.
• Do not put USBs or disks into a computer unless they have been checked for viruses.
Discuss the different ways in which malware can attack a computer system and the anti-
malware which should be installed to prevent infection i.e. firewall, anti-virus software.
The students complete the word search independently and then work with a partner to check
the definitions.
Resources
• Computers with Internet access
Terminology
• Scan – to check the files on a computer one at a time
Activity 1
Interesting fact:
Both Alexander Graham Bell’s mother and wife were deaf, which influenced him to research
hearing and speech devices. He would not have a telephone in his study as he did not want
to be distracted from his scientific work.
Before the telephone was invented, if we wanted to talk to someone we would have to be with
them in the same environment. Using technology, we can now talk to people who are in
another room, another building or even on the other side of the world.
Discuss your ideas with your teacher and classmates and then complete the table.
Which do you prefer, sending an instant text message or chatting by video link? Why?
Activity 1
The students can use the Internet to research answers to the two questions. The first US
patent for a telephone was granted to Alexander Graham Bell in 1876, however your students
may discover that other scientists such as Elisha Gray and Antonio Meucci have also been
credited with its invention.
Discuss the different methods the students use to communicate with friends and family,
building up notes on the whiteboard. Some students may talk frequently using video chat
services such as Skype, or have their own mobile phones to chat and send messages to
friends.
Depending on the technology available in your school environment, you may choose to
arrange to contact the head or another member of staff, in their office, using Skype or a similar
service.
If your school environment is supported by an instant messaging service, the students can
message each other and try out the service. Where these services are not available, it is still
possible to gather the students’ ideas and discuss the advantages and disadvantages of using
computers to communicate.
Suggested solutions:
Instant Messaging – Advantages Instant Messaging – Disadvantages
Texting happens in real time. It is possible for misunderstandings to
happen when someone cannot see your
You can work on your computer and do
face.
other things at the same time.
There is limited time to think about what
you’re saying.
Video Chat – Advantages Video Chat – Disadvantages
Video happens in real time. The other person can see you when
you talk so you need to be dressed
You can see the person you are suitably.
talking to so know how they look.
There is sometimes a delay between
There is no need to travel to see the person speaking and being able to
someone. hear them.
Resources
• Computers with Internet access
Activity 1
Do your parents use social media sites? Do they ever post pictures of you on there?
Most social media platforms have quite a high age limit (13 years +). Why do you think this is?
Personalise your avatar and then post at least three messages. You could post about what
you have done today, something you are excited about or upload a link to a funny video or
website.
Reply to at least three messages posted by your classmates and click “like” if you think
something is positive or interesting.
Activity 1
Assess the level of knowledge and use of social media in the class with a class discussion.
Check whether the students are familiar with social media platforms and discuss the difference
between using instant messaging (real time) and posting to social media (asynchronous
communication/exchanges).
Discuss the picture of a social media profile in the student book and explain the concepts of
like, share and comment.
Ask the students why they think most platforms set an age limit for their user accounts.
Emphasise how important it is to keep information private and behave in a courteous way, not
offending other users.
Guide the students through the process of setting up their own accounts and designing their
own avatar. You may choose to use another social media platform but it should be both age
appropriate and intended for use in an educational context.
The students update their profiles with at least three posts and comment on posts made by
the other members of the class. When the students have spent some time using the
environment ask them to write a comment in their books about which aspects of using a social
media account they have most enjoyed.
Conclude the lesson with a whole class discussion about the advantages and disadvantages
of using social media. The discussion content should include:
Advantages:
Easy to stay in touch with friends
Easy to make new friends
A good way to find out new information and read other people’s opinions
Joining groups and sharing news with other people who have the same interests
Disadvantages:
It is difficult to undo or delete something that has been said or shared via social media
If you wouldn’t say something to someone’s face you shouldn’t share it on social media.
Never post or share something that is hurtful or mean.
Make sure your profile is set to private and only share information with people you know.
Emphasise that the students have been using an education social media account in today’s
lesson and make sure they are aware of the age limits for other accounts they may have come
into contact with. Remind the students about stranger danger and the need to remain safe
online, setting their profiles to private and only communicating with people known to them.
Resources
• Computers with Internet access
• Access to an age appropriate social media platform
Terminology
• Post – put something on the personal area of a social media site for other people to
see
Activity 1
Video
Your teacher will show you a short video. Watch carefully.
Here are some sentences and actions from the video. Is this right or wrong behaviour?
Sue came to my house. We played online computer games with Is this a tick or a cross?
lots of friends from school. Later I also talked to Sue’s friend
Tom online. He was really friendly. He asked me where I live.
I didn’t want to tell him. He asked if he could meet us. I was
worried it was rude if I didn’t answer his questions. I asked
my mum what I should do.
She told me Tom might not be nice like my friends at Is this a tick or a cross?
school. He might be telling lies. She said I should
only be friends on the Internet with people I know
well, like Sue. Tom asked if he could be my friend. I
said no. This isn’t rude.
Let’s Discuss
Discuss these questions with the person next to you:
• Why do you think it is important to be honest about who you are online?
• Why is it important not to accept a friend request from someone you don’t know?
Activity 1
Discuss the term online presence with the class. What do the students think it means? Make
a note of any different (relevant) ideas and/or definitions on the whiteboard.
Four extracts related to the video are in the student books. Students complete the boxes with
a tick or a cross.
And ask the students why the first two statements are crosses.
Emphasise the point made in the video that students should only befriend someone online if
they know that person in real life.
Ask the students whether they have ever interacted with people they don’t know when playing
games online. Why is it important to only share information with people we know? How do we
know someone is who they say they are when we’re using social media?
You may choose to watch one of the following suggested videos, or any suitable alternative,
which introduce the concept of someone being dishonest online and pretending to be
someone they are not:
https://www.youtube.com/watch?v=-nMUbHuffO8
https://www.youtube.com/watch?v=y-k4q6V7ERc
Emphasise the importance of keeping information private and not befriending strangers online
and recap with students the video’s key messages.
http://www.bbc.co.uk/newsround/34722158
What do the students think about using social media to become an online celebrity? How real
is the life people choose to share online? What positive message do the children in the video
want to share?
Resources
• Computers with Internet access
Terminology
• Online friend – someone you are in contact with through the Internet
Activity 1
Use the diagram to collect some information. First of all, write your name in the top box.
Your teacher will ask you to work with three other classmates.
Write their names in the three boxes below your name.
Your Name:
Do not talk to each other while you are filling in your books. Remember when you are online
you cannot ask who your friends are sharing information with.
When you have finished, take your own book back and review all the names you have in your
diagram.
If you do not know someone, colour their name in red. Colour the other boxes in the other
colour.
Share
Your teacher may ask you to share your information.
What do you think happens when a photo or comment is shared on social media?
When someone posts a picture on social media do they always know who might end up seeing
it?
Activity 1
Each student completes the activity in the student book, writing their name and the names of
the three other people in their group. They then pass their books to the members of their group
and write in six more names under theirs.
Encourage the students to work silently; when they are online they can’t simply talk to the
person to ask for information about their friends.
When the students have completed writing all the names, they colour in the boxes using red
for people they don’t know and another colour for friends and acquaintances.
How many friends do they have in common? How many people do they know? How many
boxes are coloured in red? You may choose to help (or ask students to try to) convert these
numbers into percentages and averages for the class?
Explain the importance of privacy settings and maintaining a secure, safe profile online.
Resources
• Coloured pencils
Activity 1
When bullying happens online or using mobile technology (phone / tablet) it is called cyber
bullying.
Movie
Your teacher will ask you to watch a short film.
Watch the video with your group and use this space to record any important Information
and make notes.
Make sure everyone in your group has something to do, like researcher, writer, presenter.
Activity 1
Ask the students to discuss the concept of bullying with their classmate and write a definition
in their books. Feedback on the whiteboard and arrive at a class definition similar to the
following:
Bullying is unkind, repeated behaviour directed towards a person with the intention of
upsetting or hurting them physically or emotionally. Bullying includes physical violence,
making threats, spreading rumours and excluding someone from a group (not playing with
them) on purpose.
Explain that cyber bullying is bullying using technology. Be aware that this may be a sensitive
issue for certain individuals within the class.
Split the class into small groups and allocate a video from the following list to each group:
https://www.youtube.com/watch?v=YFzay3Vm860
https://www.youtube.com/watch?v=WegCMoQ-UNs
https://www.youtube.com/watch?v=IMevJ-luI2s
https://www.youtube.com/watch?v=XktuYaCqj5k
Allocate sufficient time for groups you feel are able to present their material to the class.
Resources
• Computers with Internet access
• Presentation software (e.g. MS PowerPoint)
Activity 1
Anna Nnamani is eight years old. She was born on 26th April 2012 in Bangui in the
Central African Republic and moved to London when she was 3.
Anna lives with her mum at Flat B, 5 Eastfields, Hackney, E8 1GT. She goes to
Eastfields Primary School. Her phone number is 020 8777 6316.
Anna is going on holiday from 10th to 30th December to visit her grandparents in
Bangui.
Work with the person next to you and tick the box if you think it is OK for her to share the
information with that person or organisation.
Why shouldn’t you post information online about when you are going on holiday?
Have you heard of the term shoulder surfing? It means looking over a person’s shoulder
while they are typing a password or passcode.
It is important to keep passwords secret, make sure your profile is always set to private and
to be very careful about the information you share online.
Activity 1
Ask the students what they understand by the term personal information. Write a list of
examples on the whiteboard.
Working with a partner, the students read the personal information about Anna Nnamani and
decide which organisations or individuals may be given access to each item of information.
Resources
• Computers with Internet access
Activity 1
Last lesson we discussed how important it is to protect personal information and never share
facts like a date of birth, address or phone number online.
One of our most important items of personal information is what we look like!
A B C
D E F
If these pictures were used as profile images for online accounts, would you be able to
recognise the person if you came into contact with them?
A B C
E F
D
The images have been jumbled up into a different order. Can you identify which avatar belongs
to which original picture?
Your teacher will give you a link to the website which created the avatars.
Create an avatar which looks a bit like you. You can change the hair colour, hair style, skin
tone, face shape, eyes and mouth.
When and why do you think you might use an avatar online?
Share: Download your avatar, save it and share it with your class.
Can you guess who the people in your class are from their avatars?
Activity 1
Introduce the idea that our image, the way we look, is also part of our personal information.
Ask the class why they shouldn’t share their image on a public profile. Do they want strangers
to recognise them or look at their photographs?
Look at the edited images and discuss with the students whether they think these images
would be appropriate to use as profile pictures? Could the individuals still be recognised?
The students work individually to match the pictures to the corresponding avatar.
Solution:
E C D
B A F
Ask the class why people use avatars online, especially when playing games. The students
should be able to explain that they do not want strangers to see what they look like. An avatar
is safer and more secure than using a photograph.
Share the following site with the students and give them sufficient time to play with the features
and build their own avatar.
https://www.cartoonify.de/
When they are happy with their creation, the students can download their avatar as a PNG
and open it in a graphics program such as Paint. Advise the students where you would like
them to share their avatars and show some of them to the class. Can the students identify
who the avatars represent?
Resources
• Computers with Internet access
Activity 1
What do you think would happen if you deleted the copy you uploaded?
A tagline is a memorable phrase used to give a clear message. Taglines are often used in
advertising. How many can you think of?
Create a tagline to help Lucy remember what to do if a stranger asks her to share
information:
When you’ve written your tagline, compare it with the tagline at the bottom of the
page. The tagline used by the one charity who makes online safety videos is: REPORT…
BUT DON’T DELETE, REPLY OR MEET.
Activity 1
Discuss the image in the student book which demonstrates the cascade effect when images
are uploaded.
Ask the students how many people now have a copy of the photograph - (10).
What do they think will happen next? - The photograph will continue to be shared.
What would happen if you deleted the original photograph you uploaded? - Nothing, each time
the photograph is shared a new copy is made so even if the original is deleted the copies will
stay online.
Show the following video to the class which has been produced by a UK children’s charity to
spread the Share Aware message:
Lucy and the boy: https://www.youtube.com/watch?v=3zeuuHhzQ5A
You may choose to use any suitable alternative which promotes this important message.
Encourage the students to discuss the questions raised by the video between themselves
before joining together for a class discussion and writing the students’ relevant feedback on
the whiteboard.
The students should understand that it is important to keep themselves safe online. - Just as
in the real world, not everyone is kind and there are people online who want to harm others.
We need to keep ourselves safe from these people.
Discuss the concept of a tagline or slogan with the students. You could mention some current
advertising slogans and see if the students can name the product. Ask the students to create
a memorable slogan to help them remember the Share Aware message.
Review the NSPCC tagline, REPORT… BUT DON’T DELETE, REPLY OR MEET.
Resources
• Computers with Internet access
Terminology
• Danger sign – a warning or a signal that something may be wrong.
Activity 1
password
The passwords above are amongst the top 25 most commonly used passwords!
How easy do you think these passwords are for a hacker to guess?
Most computers and websites request that a password is at least 8 characters long:
elephant
Your password may now take longer to type (and be a little bit more difficult to remember)
however it is much more secure.
Football
Mountain
Treasure
Envelope
Squirrel
Share your password combinations with a friend. Did they create some you didn’t?
Think about changing your own password to make it more secure. DO NOT WRITE IT DOWN!
Activity 1
Ask the students to look through the list of commonly used passwords and tell them to circle
any that they have used themselves.
How easy do the students think these passwords are to guess? Have they ever used their
pet’s name or the name of their best friend as a password?
Explain that hacking software or hackers try to get into people’s accounts to steal information.
It is important to keep passwords secret and make them as difficult as possible to guess.
Demonstrate how to turn a simple 8 letter word into a strong password e.g.
elephant/e1ePh@nt, champion/ch@mp1oN.
The students make as many combinations as possible from the eight letter words in the
student booklet, using capital letters, numbers and symbols.
Discuss the strength of the passwords the students are currently using and ask them whether
they are going to change them to make them stronger.
Terminology
• Hacker – someone who secretly accesses another person’s account on a computer
to steal information or cause damage
Activity 1
Are you learning another language in school? Did you know that some words appear in more
than one language but mean something very different?
For example, ‘tuna’ means prickly pear in Spanish, not a kind of fish. ‘Coin’ means corner in
French, not money.
Show me how: Your teacher will show you how to use an online dictionary or translator to
check the meaning of the following words in German:
English German
Gift A present
Bald No hair
Handy Useful
Words can also change meaning over time, for example meat used to mean all food, not just
animal food, and a clue was a ball of wool (you could use it to get out of a maze).
Be Careful: Different countries and cultures consider different actions to be rude or offensive.
For example, if you finish the food on your plate in the USA your host will think you enjoyed
your meal but in Russia they may think you are still hungry and offer you more to eat!
Certain behaviour, such as writing on money, burning a flag or changing a religious icon, is
considered offensive in many countries around the world.
Let’s Present
When you have finished your list, create two presentation slides explaining the dos and don’ts
for posting material online.
Remember you can include images or hyperlinks to make your presentation more interesting.
Activity 1
The students use an online translator to look up the meaning of the homographs in German.
You may direct students to using the following online resources or any suitable alternative:
https://translate.google.co.uk/
http://dictionary.cambridge.org/dictionary/german-english/
Solution:
English German
Gift A present Toxic/Poison
Arm Upper limb Poor
Bald No hair Soon
Handy Useful Mobile phone
Ask the students whether they have travelled to other countries or regions. Were there
different or new customs that they needed to be aware of? For example, did they eat with
chopsticks, utensils or their hands and were they aware of what may be considered bad
manners e.g. eating with the left hand.
If we are unaware of the local etiquette, we may unintentionally offend or upset someone from
another culture.
Discuss the examples given in the student book with the class and ask them to complete the
table with a partner, thinking of and giving examples of appropriate and inappropriate material.
The following is a suggestion only. Your students may make suggestions related to their local
culture and environment.
Resources
• Presentation software
Activity 1
Aspects of our appearance such as hair colour and eye colour can be defined as physical
characteristics. When we are older, we may choose to dye our hair or wear coloured contact
lenses, but generally speaking, physical characteristics are something we cannot easily
change.
You may not have your ears pierced or wear a watch right now but when you are older you
will be able to make personal choices about your appearance. Personal choice is something
we can change.
Our views and beliefs arise from the influences around us, such as our cultural heritage, our
family background and the environment we live in.
Our community and surroundings form a part of who we are. They may even determine what
we eat and the clothes we wear. If we are surrounded by particular values and expectations,
it may be difficult to change our opinions and appearance without seeming to appear
disrespectful.
Which festivals are celebrated in the town or city where you live?
Does everyone wear the same style of clothes or head dress in your country or are there
regional variations?
What do you particularly like about your school or the region where you live?
How would you feel if someone criticised your school or your community online?
Let’s Practise
Create an advice leaflet for your classmates, using this RESPECT idea to advise them about
how to be a good digital citizen.
Activity 1
The students conduct a class survey, using the table in their books.
When they have gathered the information about physical characteristics, discuss what a
physical characteristic is i.e. our appearance, the way we look, something that is not easily
changed.
Depending on the level of understanding in your class, you may wish to analyse the data and
discuss whether the outcome would be the same if your school was in another town or region.
The students then complete another survey, focusing on personal choice, rather than
physical appearance.
Activity 2
The students carry out research into their community, starting with their school. The students
can use the Internet to carry out their research or, if possible, you may choose to organise an
interview with a member of the school management team.
When the students have finished their research, take feedback from the class about aspects
of their school and community they are proud of. How would they feel if someone criticised
their school or community online?
The students create a leaflet, advising how to be a good digital citizen. Encourage the students
to be as creative as possible with their leaflets.
Resources
• Presentation software
Activity 1
Do you remember the video we watched about Lucy? Was the boy who asked her to
send a selfie really a boy?
People don’t always tell the truth online. Some of the people you meet online might not be
who they say they are.
They might say they like the same music as you, read the same books and films, or visit the
same places when in fact they are trying to deceive you and trick you into trusting them.
They might lie about their age and gender, for example telling you they are a 10 year old girl,
when in fact they are a 30 year old man.
Even if they post or send you a photograph, it may be a picture of somebody else.
This is why children: SHOULD NEVER AGREE TO MEET WITH SOMEONE THEY ONLY
KNOW ONLINE
Make a scene
Your teacher will ask you to work in a group.
You are going to make a short scene which will show children and young adults the dangers
of befriending strangers online.
Make sure everybody in your group has a clear role and knows what they are going to say.
Your teacher may ask you to perform your scene to the rest of your class.
Activity 1
Ask the children what makes a good friend. Would they consider someone they haven’t met
to be a friend?
Refer to the video the students watched in Lesson 16. Was the “boy” who he said he was?
Emphasise the message that it is not safe to arrange to meet somebody you have only met
online.
Arrange the class into groups of 4-5. Explain to students that you would like them to create a
short scene in the style of a public information film. If you have access to cameras, you may
choose to film the scenes or the students can simply perform their scenes to the rest of the
class.
Discuss how effectively each group has communicated their message and record their taglines
on the whiteboard.
Resources
• Video recorder(s) (optional)
Terminology
• Deceive – to make someone believe something that is not true
Activity 1
Can you think of three ways you may come into contact with someone you do not know when
you are using technology?
1.
2.
3.
If you have made a mistake by sharing too much information and think you may be in danger,
it is important to tell an adult you trust.
If you see an email from an address you do not recognise, do not open it and delete it
immediately as it could contain a virus. Do not fill in online forms which ask for your email
address.
Remember:
Never open emails from strangers.
If you receive an email which is rude, threatening or upsetting in any way, tell a responsible
adult, especially if you feel you are in danger. Do not delete it and do not reply to it.
The reason for not deleting the email is the police or legal authorities can use it as evidence.
Why should you always use a nickname when you are playing a game or using a chat room?
Some chat rooms include a private chat function, where only you and the other person can
see what is being said. Never private chat with someone you do not know in real life.
If someone is rude or offensive to you in an online game or chat room, tell a responsible adult,
especially if you feel you are in danger.
If you use a social media network, do you know how to block messages and prevent someone
from contacting you or seeing the information on your wall?
If the problem is serious and you think you are in danger, you should:
• Tell a grown up
• Take screen shots of the messages and save them as evidence. Always date a
screenshot.
• Report the abuse to the provider
A dialogue box will appear, showing all the screens that are currently running on your desktop.
Select the screenshot you require and it will appear in your document. Write the date next to
it.
Activity 1
Ask the students to think of three ways they may come into contact with strangers when they
are using technology to communicate:
• Email
• Chat rooms and chat features in computer games
• Social media
Read through the information with the students and talk about staying safe when using email.
Enforce the message that they should not open emails from an unknown source and if they
feel they are in danger they should tell a responsible adult.
The students answer the questions about online chat rooms and gaming in their books.
Suitable answers are: - I should not share my real name, address, phone number or details
about where I go to school. - I should use a nick name so that I do not share my real name.
Again, enforce the message that if a student is upset by a comment in a chat room or believes
themselves to be in danger, they should tell an adult straight away.
Although the age limit for many social media platforms is 13+ or 16+, many primary aged
children will be aware of or use social media. Certain platforms have been designed to be age
appropriate with a higher level of security and parental control (e.g. Togetherville, What’s
What?). However, it is still important for students to understand what they should do if they
are upset and feel they are in danger when using these sites.
The children write down the information they should never share on social media platforms in
their books: photographs, address, phone number, school name, details about their daily
routine and where they go to play with friends.
Ask the students, “Why it is important to save abusive messages?” Because it can be used as
evidence to prosecute an offender.
You may choose to show the students the information at the following link which contains
advice on how to report malicious activity on social media:
http://www.childnet.com/resources/how-to-make-a-report
Demonstrate how to take a screenshot, date it and save it. The students open a new document
and practise taking screenshots.
Extension / plenary: Invite a representative from your local police force or a professional from
a charity dedicated to keeping children safe online to come in and talk to your class.
Resources
• Computers with word processing software installed
Terminology
• Block – to stop someone from contacting you online or seeing your social media
content
• Spam – unwanted, uninvited emails sent out to a large number of people, usually for
advertising purposes or to send malware
Activity 1
Discuss: with your classmate what you would do if a friend sent you a link that you found
upsetting.
Do you know who you would tell if you were upset by something you found on the Internet?
Y/N
Discuss: which responsible adults you could tell (e.g. parent, grandparent, teacher).
What should you do if you see inappropriate content when you are online?
Sometimes it can be difficult to tell other people about things that have upset you because you
feel embarrassed. You might have been on a site you were told not to visit, or you do not know
who you can really trust.
At these times it can be easier to tell someone who works for a charity which is dedicated to
protecting children online. Calls made to a charity like Childline in the UK are anonymous and
the charity advisor will know what to do and can give good advice.
Let’s Design: Design a poster in the Notes Page of your book, advising children your age what
they should do if they see inappropriate content on a website, in an email, or on a social media
platform.
Remember: to include the website or phone number for a local support service.
Activity 1
Ask the students what they understand by the term ‘inappropriate content’ and ask them to
write a definition. A suitable response might be text or images that are not suitable for children
to see and might upset them.
Take feedback from the class and record the students’ ideas as to what inappropriate content
includes. Their suggestions may include:
Insulting other people’s beliefs
Inciting hate towards a group of people
Mocking people with disabilities
Promoting criminal activity
Promoting guns, knives or drugs
Alcohol
Nudity
The students discuss what they would do if they were sent a link that upset them or came
across inappropriate content online. All students should be able to state – or be guided to state
- that they would tell a responsible adult. They should also know to take screenshots and
record the date and time.
Discuss the work of charities local to your region which support children suffering from online
abuse and share the number and website with the whole class. For example:
In the UK children may contact Childline:
https://www.childline.org.uk/get-support/contacting-childline/
Support in other regions (Africa, Americas & the Caribbean, Asia Pacific, Europe, Middle East
and North Africa) can be found at the following link:
https://www.childhelplineinternational.org/
You may choose to encourage students to design their posters on their computers. However,
by creating a poster in their books students will have a memory aid and source of information
for future reference if required.
Resources
• Computers with Internet access
Terminology
• Anonymous – not identified by name.
Activity 1
When we communicate online, we become part of the digital community. Just as we respect
one another in our classroom environment, good digital citizens respect each other online too.
Do you remember the work RESPECT from Lesson 19? Working with a partner, create a
mnemonic of your own that will help you remember to be a good digital citizen:
Most social media providers now ask their users to sign up to a code of conduct.
In Europe companies such as Facebook, Twitter, YouTube and Microsoft have agreed to a
code of conduct, including removing all hate speech uploaded to their websites within 24
hours.
Show Me How: Your teacher will ask you to agree on five rules for an Online Code of Conduct
for your class.
Once you have agreed the wording with the whole class, you teacher will print off a copy to
display in your classroom and ask you all to sign up to it.
Activity 1
Begin the lesson with a discussion of the rules and standards of behaviour expected in your
classroom. How should the students behave to be considered a good citizen within their school
community? If your class wrote a class charter at the beginning of the academic year, refer to
the key points they agreed together. Expect the discussion to include:
• Keeping the classroom tidy, not dropping litter and picking things off the floor
• Looking after school property
• Looking after each other’s belongings
• Never hurting anyone physically
• Never saying anything hurtful to another member of the class
• By doing all these things we are showing respect for each other and the school
environment
Extend the discussion to include the digital community. What makes a good digital citizen?
Display the mnemonic first discussed in Lesson 19 and ask the students to work with a partner
and create a new mnemonic for the word RESPECT.
Ask the students what they understand by the term code of conduct. Explain that it is a set of
rules which lays out expected behaviour for users of interactive websites and social media
platforms.
Encourage students to work in small groups to write an Online Code of Conduct for the class.
When each group has agreed on five points, bring the class back together. The whole class
should ideally agree on the wording for the Code of Conduct. Expect to include some or all of
the following points:
• Do not swear online
• Do not be rude to someone else online
• Be respectful of religion, politics and culture
• Do not write anything that encourages hatred or bullying
• Do not spread rumours
• Report inappropriate behaviour and content
• Show respect for other people at all times
When the students have agreed on the wording you may choose to print the Code of Conduct
out, ask all the members of your class to sign it and display the signed copy on the classroom
wall.
Terminology
• Hate speech – stating an opinion which directs hatred towards someone because of
their race, colour, religion, nationality or ethnic origin.
Activity 1
Do you have a hobby or is there a subject you are particularly interested in?
When we research using the Internet, we need to use a search engine. Search engines are
a quick way to find information. The search engine looks through all the pages on the Internet
and displays the pages which are relevant to the search term typed in by the user.
There are lots of search engines you can use but it is safest to use the ones which have been
specially designed for children because they have extra security in place.
http://www.kidrex.org/ http://www.swiggle.org.uk/
http://www.kidzsearch.com/ http://www.kiddle.co/
http://www.safesearchkids.com/ http://www.factmonster.com/
http://www.kidtopia.info/
http://www.lures.info/childrens_search/gogooligans.html
Are the results the same? Discuss your findings with your classmate.
Try your search again using another search engine and then answer the questions. Try and
pick a different search engine to the person next to you.
Search engine:
3. Were the hits displayed in the same order on each search engine you tried?
Activity 1
Discuss the range of hobbies and areas of interest shared by the class. Ask, “Where might
you go to find out more information?” A library. What are the advantages of using a library?
The books are arranged by subject. The books have been researched, edited and fact
checked. A librarian can help you with your research.
Ask, “What are the disadvantages of using a library?” It takes time to travel there. They may
not have the book you want. Someone else may have already borrowed the book you need.
It may be closed when you want to use it.
Ask the students how they would look up information in a non-fiction book. They should be
able to answer that they would use the contents page or index to find the information.
Explain that researching online using a search engine can be a quick, efficient way of finding
out information.
The students choose a topic to research and compare the results, answering the questions in
their student book. Point out that kidsclick.org and factmonster.com both include a category
Take feedback from the students and decide which search engine is preferred by the class.
Resources
• Computers with Internet access
Terminology
• Hit – a result displayed on the screen as a result of entering a term in a search
engine
Activity 1
Have you ever started looking for something and then found another interesting thing?
For example, you might look at a book about animals and find a page about tigers.
You are so interested in tigers that you go and find another book just about them.
Search engines use web crawlers to scan the Internet and gather information about the web
pages they find. They visit different pages on the Internet and put information about the pages
they visit onto the search engine’s index.
The crawlers follow any links on the web pages they visit and then add that information to the
index as well.
When you use a search engine to find something, the engine looks through the indexes to
look for the word or words that you are searching on.
Where words are the same, the website is then listed in the search results.
Video: Your teacher is going to show you a video about how search engines work
When you have watched the video work with a classmate and create a presentation slide that
explains web crawlers.
You can create a diagram or picture that shows how the web crawlers work.
Activity 1
Show students the following short video (suggested) or suitable alternative. You may choose
to allow students to watch the video more than once:
http://www.bbc.co.uk/education/clips/zwdxhyc
When they have watched the video at least twice the children should work with a classmate
and create a picture or diagram that shows what web crawlers do.
Encourage all students to show their slides to you and the class.
Terminology
• Browse – when you browse something you have no set plan about what you want to
see. If you are browsing books on a website, you may look at different subjects and
different authors
• Index – an index is a list. You will find an index in most reference books to help you
find information quickly
• Surf – this is when you use a search engine to follow random links on the Internet just
for fun
• Web Crawler – a small program that a search engine uses to scan Internet pages and
to add information about the page to an index
Activity 1
Pages on the Internet have hidden information that you cannot see.
Normally, when we open a webpage, we see the perfect typography and beautiful images
perfectly placed on the webpage. Underneath these visible elements is the website’ source
code which determines how everything appears on the website.
The source code does different things. Some of the code organises the web page. For
example, the colours and fonts that are used.
In the last lesson you looked at how Internet pages are selected and displayed on your
screen during a search (by a search engine). The source code determines how the webpage
should be indexed and how they should appear in search engine.
To view source code, hold down the CTRL key + “U”. One of the things that affects search
results is the use of title tags. When we search something from a search engine, the results
search engine provides come from the title tags of the webpages.
This comes
directly from the
title tag.
When we click on the first result and view the page source code, we can see the title tag.
The title tag contains the title of the web page. The title tag must have an opening tag:
<title> and end with the closing tag: </title>. The title tag is usually near the top of the
source code in the <head> section. We can see the content inside the title tag matches the
headline of the Google result.
Let’s Practise: In pair, use a search engine to search the following terms:
• Theme Parks
• Educational Games for Kids
• National Museum
Click on the first result and view the page source. Can you find the title tag? Is the title on the
page source same with the return result headline?
Activity 1
The focus of this lesson is webpage source code at the highest level only, specifically as it
links to searching. Students should be introduced to title tags as a concept only, along with
page head.
This might sound advanced but the concept of embedding data in a file so that it can be found
more easily amongst the billions of web pages on the Internet is relatively simple.
You can show the class on how to view a webpage page source and emphasise on the title
tag and the header section.
Encourage students to work in pairs and locate the title of the search terms from the page
source.
Resources
• Internet access
Terminology
• Title tags – title tag is used to specify the title of a webpage. A title tag is an element
in the head section of an HTML document.
Activity 1
With information you find on the Internet you should also think about intellectual property.
For your own work do not copy and paste from the Internet without making the words your
own or saying where the words come from. If you do this, it is called plagiarism.
If you want to use information from the Internet and say where the words come from just put
the words in “ ” (quotes) and also note where you got it from. Like this:
“Plagiarism is a form of cheating, but it’s a little complicated so a kid might do it without
understanding that it’s wrong.” (Source: http://kidshealth.org/en/kids/plagiarism.html)
The checker looks at each paragraph of your text and compares it with information on the
Internet.
If we check the words about intellectual property from this activity there is no plagiarism. This
means the words were not taken from any Internet page.
Let’s Practise: Use the online plagiarism checker. Type in the plagiarism sentence in quotes:
What is the result? Tell your teacher what this result means.
Activity 1
Allow students time to write down books they have recently read (titles and authors). You may
choose to ask students to use the Internet to research the authors if they cannot remember
this information.
Work through the information about authors and intellectual property with the whole class,
ensuring students are able to identify the general concept here that the author owns what
he/she produces and it is not considered acceptable to use another person’s intellectual
property in your work without permission.
Explain to students that sometimes, however, we do want to include another person’s words
(or images etc.) in our work and the principle for avoiding plagiarism, i.e. by noting the
source in our own work.
As students complete the practical plagiarism checking task, check that their interpretation of
results is correct. A high percentage score indicates that the content has been taken from an
Internet source. A low or zero percentage score means the content is likely to be unique and
is not taken from any Internet source.
Resources
• Computers with Internet access
Terminology
• Captcha – captcha checks that the information being typed into a box is being typed
by a human rather than a robotic software program. You will see Captcha boxes a lot
in computing
• eBook – an eBook is an electronic version of a book that can be read on a device. The
pages flip like a real book
• Intellectual property – the original creative ideas or writing from a person. Other
things that count as intellectual property include logos for a company or a brand,
information about new ideas or inventions, and designs for products
• Plagiarism – taking someone else’s creative ideas or writing and pretending it is your
own work
• Source – a source is the original place something has come from
Activity 1
The Internet is full of information. Some of the information is good quality and you can trust it
to be correct. Some of the information is bad quality, not correct and not trustworthy.
When you use the Internet always go to reliable websites for information.
Let’s Compare: If you needed directions to your new school, which is better? A map or a
handwritten drawing?
A handwritten drawing
Some websites are more reliable than others so you should always try and find one which is
well known or belongs to a well-known company.
A website may be better if it has recent dates. Use the Internet and find two good webpages
with information about:
Raspberry Pi:
Wi-Fi:
Captcha:
If you want to know that information from a website is correct and reliable you can check it
using another website. This is called verification. If both have the same information, the
sources are probably good.
Activity 1
It is important for students to develop an awareness that not all information on the Internet is
good quality and/or reliable.
Encourage students to compare the two different maps and write down some of the ‘problems’
with the handwritten drawing. Allow sufficient time before conducting whole class feedback.
Students may note the poor detail and/or accuracy problems with the handwritten map; for
instance, no name for the road the school is on, Chaldon Road connecting to Delaford Street.
Explain to students that when they are searching for websites they can try to find sites that
are well known, belong to a well-known company or have recent dates. These kinds of sites
are likely to have better/more reliable information.
Allow students sufficient time to research pairs of websites for the three topics, encouraging
them to only note websites with the reliable characteristics already discussed. Emphasise the
concept that by finding the same information across more than one website (verification)
students can be more confident that that information is reliable.
Alternatively, you may choose to provide each pair of websites to students, pointing out or
asking them how they would know that the sources were valid.
Resources
• Computers with Internet access
Terminology
• Reliable – good quality; something or somebody you can trust
• Verification – this is the process of checking information
Activity 1
You can place information on the Internet into two useful categories:
An opinion is a point of view, a thought or a feeling. It cannot be proven but it can be supported
using facts.
Video: Watch the video and then decide whether the following statements are facts or
opinions. Circle the correct answer.
Activity 1
Write a fact on the whiteboard related to a topic your students are currently studying. e.g. The
Amazon River is 6,992 km long. Ask the students how we know this is a fact. Can it be proven?
Write an (obvious) opinion relating to the same topic. Ask the class whether the information
on the board is a fact or an opinion. Can the statement be proven? Do the students agree with
what you have written?
Explore the ‘fact versus opinion’ idea further by showing the following video or suitable
alternative: https://www.youtube.com/watch?v=FIyt5pEcE_g
Statements Solution:
Cows give milk Fact
Chocolate tastes great Opinion
The sky is blue Fact
Eggs come from chickens Fact
Fridays are boring Opinion
German is very easy to learn Opinion
Manchester United is the best football team Opinion
This is not a good TV programme Opinion
The church is the oldest building in town Fact
I believe I can win the race Opinion
Discuss (and you may choose to score) the answers as a class before moving on to Activity
2.
Students should be able to explain that the information in the final two rows of the table are
opinion.
Extension / Plenary:
https://www.youtube.com/watch?v=emDQia_wH8o
https://www.youtube.com/watch?v=pxFS0nJet3s
https://www.youtube.com/watch?v=1Ngkj2Lx-Ks
https://www.youtube.com/watch?v=9iY6X7tJSYE
Resources
• Computers with Internet access
Terminology
• Fact – something that can be proven
• Opinion – a view or belief that cannot be proven
Activity 1
In many countries documents and images are governed by copyright laws. Copyright laws
protect the legal rights of the people who create original media (for example authors,
musicians and photographers).
Make a list of the media you think may be protected by copyright law:
To make it obvious that something is copyrighted, it is marked with the copyright symbol.
Look around your classroom and write down all the copyrighted items you can see.
Some students wrote the music, others performed it. Another group took photos and designed
the album cover.
Discuss:
• What are the advantages of copyright?
• What are the disadvantages?
• Will your music reach more people if you don’t copyright your album?
Show Me How: Your teacher will ask you to decide if you should copyright your work or not.
Activity 1
Discuss the concept of copyright and protecting creative rights with the students. Ask them to
write a list of media they think is covered by copyright. Suitable answers will include: music,
books, photographs, film, TV, software.
Ask the students to identify any copyrighted items in the classroom. You may choose to place
some additional objects in the room prior to the lesson, for students to ‘find’; these may include
posters, textbooks, DVDs etc.
Activity 2
Ask the students why copyright laws are important. Why do they think the creators need to
protect their work in this way? Would an author be able to earn a living without copyright on
their work? Is there any advantage to not copyrighting work?
Explore the discussion scenario presented. You may choose to split the class into small
groups and allocate ‘for’ and ‘against’ roles. Expect - or encourage - the ‘for’ students to think
about how copyright protects their work, making it less attractive for people to copy or steal
their ideas, claiming them as their own work. Encourage the ‘against’ students to think about
how their work may spread more easily and quickly if people can share it freely; maybe this
will generate more interest in their work (and any future projects).
Debate the use of copyright from each groups’ point of view and come to a conclusion as a
class.
Terminology
• Copyright – a law which means the creator of a piece of work (art, music, writing, etc.)
receives the credit and payment for their work.