Hi, what do you want to do?
Curated OER
Computer Language
A thorough and engaging slideshow presentation discusses all things computer, from artificial intelligence programs to text messaging lingo. Computer science students will get a kick out of the examples for ELIZA, Otto Jesperson's...
Curated OER
Chapter 9: Language Processing: Humans and Computers
Designed to accompany An Introduction to Language by Victoria Fromkin, Robert Rodman, and Nina Hyams, this powerpoint addresses a number of language, technological, and sociological topics. The slides could be helpful in either a...
Curated OER
What is a Computer Crime?
An important lesson on cybercrimes is here for you. In it, young computer users learn about how people commit crimes on computers by hacking into accounts, and stealing personal information from people. Some excellent discussion...
Hackers Lesson Plan Template
Describe the threat of viruses to computer/ network.
Illustrate the methods for avoiding attacks.
Explain the consequences of social, illegal, and unethical uses of technology (e.g., piracy; illegal downloading; licensing...
Nemours KidsHealth
Online Safety: Grades 9-12
Teach teens how to protect themselves from hackers, scammers, and online predators. First, class members examine their own digital footprints think critically about their online profile. Groups then generate lists of "do" and "don't do"...
Curated OER
Have I Been Hacked?
Students investigate how effective SNEAK strategies are in detecting hackers. In this technology lesson, students explain the ethical issues about hacking. They graph and analyze their experimental results.
Curated OER
Curious? "Hack Away" Computer Activity
In this computer worksheet, students complete 3 multiple choice questions about computer hacking. Page contains multiple links to additional activities.
Curated OER
Cartoons for the Classroom: The Climate Change Debate
Is global warming all smoke and mirrors? Find out what your scholars think with this handout, which has them analyzing two political cartoons on the topic. Background information gives context, detailing the computer hacking during the...
Curated OER
ComSec for Network+: New Threats
Students identify the different types of security threats on a system. For this technology lesson, students demonstrate ways to defend the system from such attacks. They use computer simulation to implement security procedure.
Curated OER
Gumshoeing the Web
Students discuss hackers and issues of computer privacy. They read the article "Sniffing Out Crime by Bits and Bytes," and debate the article through role-playing.
Curated OER
Tinker Toys
Students explore various computer items. They describe possible alternative uses for computer technology. Students explore the practice of "reverse engineering." They write an opinion essay on the ethics behind "reverse engineering."
Curated OER
Love Hurts
Students examine how the love bug virus caused billions of dollars in damage after it spread from Asia. Students create profiles of hackers and design a public service announcement and posters to discourage the creation of such viruses.
Curated OER
Cyber-crime
Learners discuss what types of Internet activity are or should be considered criminal, examine how criminal prohibitions against certain types of Internet activity are best implemented in law, determine whether computer crimes are unique...
Curated OER
Total English Upper Intermediate: Crime Issues
In order to build discussion skills, English language learners use a worksheet with several questions regarding crime and punishment in the justice system. They interview fellow classmates, noting how each feels about a given topic. They...
Curated OER
Direct Object Pronouns
In this direct object pronouns worksheet, learners read sentences and identify direct objects, then change the direct objects to pronouns. Students determine seventeen answers.
Curated OER
Direct Object Pronouns
In this direct object pronouns practice worksheet, learners identify direct objects in 10 sentences and rewrite 7 of the 10 sentences by replacing the direct objects with pronouns.
Curated OER
Movie titles
In this movie title worksheet, students read a summary of the movie and try to guess the title. Students read and guess 8 movie titles.
Curated OER
NUMB3RS Activity: Chains and Pyramids
Watch an episode of the TV show, NUMB3RS and then explore the mathematics of chain letters and pyramid schemes, both of which involve geometric progressions and exponential growth. They discuss why both are dangerous and illegal.
Curated OER
Teaching The Personality Profile
Students write a comprehensive personality profile feature that demonstrates knowledge of the Wall Street Journal formula of feature writing and the concept of show, don't tell. They experience a press conference interview situation.
Curated OER
Credit Card Scare
Students examine credit cards and how they work, analyze credit card applications, and practice good spending habits in a credit card simulation.
Curated OER
Lessons Using the Science Fiction Genre
Students can practice "The Lost Art of Imagination" when they delve into the science fiction genre.
Curated OER
Breaking News English: Forty Million Credit Cards Hacked
In this English learning exercise, students read "Forty Million Credit Cards Hacked," and then respond to 47 fill in the blank, 7 short answer, 20 matching, and 8 true or false questions about the selection.
University of California
University of California, Berkeley: Computer Hacking and Ethics
This article explores the topic of computer hacking and suggests ways of dealing with it in the educational setting.
Other
Great Hackers
This article explores the controversies surrounding and the rationale for computer hacking.