University of North Carolina
Blogs
The blogosphere may be overwhelmed with content, but there's still room for unique points of view. Creating a blog that stands out, however, is the bigger challenge. A handout on blogs, part of a series of handouts on specific writing...
Annenberg Foundation
Geometry 3D Shapes: Euler's Theorem
How do you get a theorem named after you? Euler knows what it takes! The third lesson of five asks pupils to use an interactive activity to compare the faces, vertices, and edges of seven different three-dimensional solids. They use...
Other
Broadband Now: The Living Internet
How much do you really know about the Internet? How does it work? Who invented it? The Living Internet has answers to these questions and just about everything else you ever wanted to know about our online world. Sections on: Internet,...
Other
U.s. Securities and Exchange Commission: Internet Fraud
"This alert tells you how to spot different types of Internet fraud, what the SEC is doing to fight Internet investment scams, and how to use the Internet to invest wisely."
Get Safe Online
Get Safe Online: Safe Internet Use
No matter what software a person uses to browse the internet, there are security risks involved. This article describes some of the security risks and how to browse the internet safely.
Other
Stop Cyberbullying: Cyberbullying
Stop Cyberbullying provides information on cyberbullying for students, parents and careers. Learn, how it works, why people use the internet to bully, how to prevent it, what action to take and the law. Take the survey and find out if...
Other
The Shuler Family: How Does the Internet Work?
Here you can get a technical but accessbile overview of the Internet. Learn about Internet addresses, networking infrastructure, Internet routing hierarchy, domain names, Internet protocols, and so on. Illustrated.
Other
Net Tutor
NetTutor offers tutorials on a variety of web topics, including improving search skills, research techniques, and using online tools.
Get Safe Online
Get Safe Online: Use Strong Passwords
Almost everyone that uses the internet accesses a site that requires a password. This site describes how to create strong passwords that are not easily guessed or cracked.
Other
Storytelling to Assess Speaking and Listening
An effective use of rubrics that encourages the student storyteller how to determine if his/her audience is listening. Learn about the different listening skill rubrics, storytelling rubrics and a self-assessment guide that asks the...
Ducksters
Ducksters: Kids Safety: Using the Internet
On this website, students can explore how to use the internet safely. This site has students learning web safety with tips from the FBI.
Other
Ic You See: T Is for Thinking: Guide to Critical Thinking
This clearly presented tutorial can be used by individuals or could be presented to a class. Be sure to take the interactive quiz for some thought-provoking exercises.
The Franklin Institute
The Franklin Institute: Minutes From Me: Build a "Links to Click" Web Page
Teachers are sometimes reluctant to turn students loose on the internet. This site explains how to create a simple webpage using HTML that guides the students to the intended sites.
Other
Literacy Works: Thanks to the Web, We're Alone Together and Loving It
While this resource was developed to support adult literacy learners, it can easily be used from junior grades and up. After reading an article about how people today interact on the Internet, students complete a variety of vocabulary...
Center for Innovation in Engineering and Science Education, Stevens Institute of Technology
Ciese Collaborative Projects: Down the Drain: How Much Water Do You Use?
How much water do you use everyday? Find out in this engaging investigation, where you compare your water usage with your classmates and other people around the world. An exploration filled with lots of math and science that students are...
Goodwill
Gcf Global: Etsy
In this tutorial, learn how to use this popular site for buying and selling homemade goods.
Get Safe Online
Get Safe Online: Safe Social Networking
Social networking sites are very popular. They also expose people to certain risks, such as online bullying, loss of privacy, cyber stalking and other problems. This resource describes some of the risks with social networking sites and...
Other
Use Mod Wiki: What Is a Wiki?
An explanation in question-and-answer form about wikis. Explains basic concepts, derivation of the name, and how to get started with this type of internet communication.
Other
About Debian Have Fun Learning Linux
About Debian, a non-commercial site offering free LInux distribution, provides a wide variety of step-by-step guides and tutorials on linux. Use this site to learn Linux basics, installing the Debian OS, using packages, configuring a...
Get Safe Online
Get Safe Online: Downloading and File Sharing
There are numerous peer-to-peer (P2P) file sharing sites on the internet. They can cause numerous problems if they are not used carefully. This article describes some of the dangers with P2P sites and how to use them safely.
Other
The Internet Mediator
Use this entire site to learn about how mediators are trained, how to mediate on-line, and why mediation is necessary.
PBS
Pbs News Hour: Race to Watch: Campaign 2008, Role of Technology and the Internet
Is the internet effective as a campaign tool? Help your students explore how presidential candidates use technology and the internet in their political campaigning in the twenty first century with this lesson plan from PBS NewsHour.
Center for Innovation in Engineering and Science Education, Stevens Institute of Technology
Ciese Collaborative Projects: Down the Drain: How Much Water Do You Use?
Meet another classroom and study how much water your class uses compared to another class that may be in another part of the world. Through a variety of activities and gather data be able to collaborate with others via the internet to...
Get Safe Online
Get Safe Online: Protect Your Privacy
Many people that use the internet seem to be more willing to give out personal information than they would in other settings. This can be very dangerous. This resource describes how to protect your privacy while using the internet.