Back to K-2 Impacts of Computing
K-2.IC.20 Describe approaches and rationales for keeping login information private, and for logging off of devices appropriately.
Digital Trails (code.org)
Students consider digital footprints.
Learn to Drag and Drop (code.org)
Lesson begins with discussion regarding respectful use of technology.