Common Sense Media
Cyberbullying: Crossing the Line
Teach pupils to identify different forms of cyberbullying, including harassment, deception, “flaming,” and threats to safety, as well as how to handle a situation in which cyberbullying might be involved.
Institute of Electrical and Electronics Engineers
Smart Buildings and the Internet of Things
Is your building a smart building? Pupils learn what makes a building smart and about the internet of things. After viewing several videos on the topic, they conduct an activity collecting data from sensors and brainstorm ways to improve...
Curated Video
Detecting Lies & Harmful Links
Who and what can you trust online? How do you know? After viewing a pair of introductory videos on positive and safe online conduct, learners discuss the content and put it into practice during an online search activity about alien life.
Code.org
Algorithms Detour - Shortest Path
Young programmers investigate the Single Source Shortest Path problem by working in paris to devise their own algorithm. They then progress to using Dijkstra's Algorithm to solve the problem.
Childnet International
Responding to Cyberbullying
After watching a short video about cyberbullying, individuals play an online cyberbullying game and then create their own Digizen that expresses their values and presents their vision for themselves, their friends, and the world at large.
Alabama Learning Exchange
Time to Tell Time
Students demonstrate how to tell time using an analog clock. In this time measurement lesson, students read the book Clocks and More Clocks and use analog clocks to demonstrate the time that the teacher called out.
Teach Engineering
What is GIS?
Is GIS the real manifestation of Harry Potter's Marauders Map? Introduce your class to the history of geographic information systems (GIS), the technology that allows for easy use of spatial information, with a resource that teaches...
University of the Desert
How Do I Feel That My Culture Is Misunderstood by Others?
Using video clips of young adults from around the world describing their cultures and how they can be misunderstood, learners compare their own cultural point of view to that of others through discussion and writing.
Curated OER
How Do You Know?
What is the difference between primary and secondary sources? Help your middle schoolers develop a knowledge of appropriate sources to use when doing accurate research. They develop unique ways to incorporate literature in historical...
Family Online Safety Institute
Digital Citizenship Flashcard Deck
Being responsible online, leaving a digital footprint, and knowing how to be Internet safe are all important aspects of digital citizenship. Use a set of flash cards that promote conversations among the classroom and instill awareness of...
Curated OER
Let's Plan a Trip!
Take a virtual trip to see other countries and cultures! After learning about different cultures and populations, English learners think about a place they'd like to visit. Small groups or individuals plan a trip to a country of their...
National History Day
Heroes Who Made a Difference: Memorializing a Distinguished Service Cross Award Recipient
Ever wonder how to memorialize World War I heroes in the classroom? Activities in a high-quality social studies resource prompt middle schoolers to research Internet sources, complete a graphic organizer, and write an editorial feature...
Buck Institute for Education
Project Template for Letter to Parents
What better way to elicit the support of parents and guardians in project-based learning than with a letter directed to them that details the project, the activities involved, and suggestions for how they can support their learner. The...
Center for Open Educational Resources and Language Learning
Reading Activity
Ready to integrate technology into your ELL instruction? Check out this reading lesson that has language learners using the Internet and apps, joining online book clubs, and creating blogs. A fine model of what can be done.
Virginia Department of Education
Researching Information on the Internet
Practice Internet research skills. Each class member will need Internet access in order to follow along as you model how to search using key words and to do their own research on African and Asian elephants. Their notes will go into a...
Curated OER
Credible Sources on the Internet: What to Trust, What to Dismiss and When to Cite a Source
Wait, you mean researchers don't all use Wikipedia? Teach your class about intelligent research with a instructional activity about evaluating digital sources. The instructional activity starts with a quickwrite and includes vocabulary...
Code.org
Routers and Redundancy
How are messages to the right recipient? Introduce the concept of routing Internet traffic by drawing a comparison to sending a letter. Groups use the Internet Simulator program to send messages to others using the same router and...
All About Explorers
How Could They Be so Wrong?
If it's on the Internet, it must be true ... right? Introduce young Internet explorers to the importance of fact-checking through a fun web-based activity. Pairs work together to read and analyze biographies about world explorers, then...
College Board
Evaluating Sources: How Credible Are They?
How can learners evaluate research sources for authority, accuracy, and credibility? By completing readings, discussions, and graphic organizers, scholars learn how to properly evaluate sources to find credible information. Additionally,...
National Association of School Nurses
Learn to Be Smart and Safe with Medicine
Begin educating young people on how to be smart and safe with medicine. Use a set of workbook pages to explore what symptoms are, uses for medications, how to read prescription and over-the-counter medicine labels, and who to trust when...
Utah Education Network (UEN)
8th Grade Poetry: A to Z Poem
A two-part lesson asks eighth graders first to draw connections between the myth of Aengus and William Butler Yeats' poem "The Song of Wandering Aengus." In the second part of the lesson, writers craft an "A to Z Poem."
EngageNY
Using Matrix Operations for Encryption
Data encryption is an important security measure for sensitive data stored on computers. Pupils learn how to utilize matrices for creating code. They also get a great review of matrix multiplication, inverse matrices, and the identity...
WindWise Education
How Does Energy Affect Wildlife?
Is wildlife affected the same way by different electricity generation methods? Teams work together to research four electricity generation sources and their impacts on wildlife. The teams create a summary report and share their findings.
Teach Engineering
Maker Challenge: Adding Helpful Carrier Devices to Crutches
Make breaking a leg a less troublesome experience. Groups brainstorm designs for crutches that have devices that help carry items. They build prototypes of their devices to test out their designs.