Fifth Grade

Unit OnePrivate and Personal Information

How can you protect yourself from online identity theft?

As students visit sites that request information about their identity, they learn to adopt a critical inquiry process that empowers them to protect themselves and their families from identity theft. In this lesson, students learn to think critically about the user information that some websites request or require. They learn the difference between private information and personal information, distinguishing what is safe and unsafe to share online..

Lesson Plan

Student Handout




Alignment with Standards

Common Core State Standards:

Grade 5: RI.1, RI.4, RI.10, RF.4a, W.4, W.7, W.10, SL.1a, SL.1b, SL.1c, SL.1d, SL.4, SL.6, L.3a, L.6

ISTE NETS•S:

1b, 5a, 5b

YouTube Video




 Unit TwoStrong Passwords

How can a secure password help you protect your private information?

Students learn how to create secure passwords in order to protect their private information and accounts online. 
Students learn tips for creating safe passwords. They explore scenarios in which two characters choose passwords, and they use the tips they have learned to create secure new ones for those characters. They then create posters to communicate password tips to their families and other students.

Lesson Plan

Student Handout


Alignment with Standards

Grade 5: RI.1, RI.4, RI.10, RF.4a, W.4, W.10, SL.1a, SL.1b, SL.1c, SL.1d, SL.6, L.3a, L.6

ISTE NETS•S:

2a, 2b, 3b, 5a, 5b


YouTube Video

 
 Unit ThreeDigital Citizenship Pledge

How do you create a positive online community?

Students will establish group norms to create a positive online community that promotes responsible and respectful digital behavior within their classroom. 
Students collaborate in creating a digital citizenship pledge outlining their collective social norms for exploring in and interacting with the digital world.


Lesson Plan

Student Handout


Alignment with Standards

Grade 5:
 RI.1, RI.4, RI.10, RF.4a, W.4, W.10, SL.1a, SL.1b, SL.1c, SL.1d, SL.4, SL.6, L.3a, L.6

ISTE NETS•S:

1a, 1b, 2a, 2b, 2d, 3a-d, 4a-c, 5a-d, 6a, 6b, 6d


YouTube Video


 Unit FourHow to Cite a Site

How do you cite different types of online sources

Students reflect on the importance of citing all sources when they do research. 
Students learn how to write citations for two different types of online sources in Modern Language Association (MLA) style, and practice doing so. 

Lesson Plan

Student Handout


Alignment with Standards

Grade 5: RI.1, RI.4, RI.10, RF.4a, W.4, W.10, SL.1a, SL.1b, SL.1c, SL.1d, SL.6, L.3a, L.6

ISTE NETS•S:

3b, 3c, 3d

 

YouTube Video

YouTube Video

 Unit FivePicture Perfect

How can photos be changed on the computer, and how can that affect your feelings about the way you look?

Students consider how digitally manipulated photos can affect the way people feel about their appearance, as well as help sell products. 
After learning that photos can be transformed on the computer, students first discuss how photo alteration can be both creative and, at times, deceptive. They then watch a short video that shows the evolution of a makeup-free model into a digitally enhanced billboard ad. Finally, students work in groups to analyze the messages on two magazine covers featuring digitally altered photographs.

Lesson Plan

Student Handout



Alignment with Standards

Grade 5: RI.4, RI.7, RI.10, SL.1a, SL.1b, SL.1c, SL.1d, SL.6, L.3a, L.6
 

YouTube Video


YouTube Video



Ċ
Scott Holmstedt,
Jun 2, 2016, 9:58 AM
Ċ
Scott Holmstedt,
Jun 2, 2016, 10:55 AM
Ċ
Scott Holmstedt,
Jun 2, 2016, 11:16 AM
Ċ
Scott Holmstedt,
Jun 2, 2016, 11:43 AM
Ċ
Scott Holmstedt,
Jun 2, 2016, 10:29 AM
Ċ
Scott Holmstedt,
Jun 2, 2016, 9:58 AM
Ċ
Scott Holmstedt,
Jun 2, 2016, 10:57 AM
Ċ
Scott Holmstedt,
Jun 2, 2016, 11:16 AM
Ċ
Scott Holmstedt,
Jun 2, 2016, 11:43 AM
Ċ
Scott Holmstedt,
Jun 2, 2016, 10:29 AM
Ċ
Scott Holmstedt,
Feb 4, 2016, 12:52 PM