Computer Science Grade 1 20 min

Keeping Information Private

Keeping Information Private

Tutorial Preview

1

Introduction & Learning Objectives

Learning Objectives Identify three examples of private information. Explain that private information should not be shared online. Name two trusted adults they can talk to. State the 'Ask First' rule before sharing anything online. Demonstrate what to do if a stranger asks for information. Would you give the key to your secret treasure chest to just anyone? ๐Ÿ”‘ Your information is like a special treasure. We will learn what information is private. We will also learn how to keep it safe online. ๐Ÿ›ก๏ธ Real-World Applications Playing games on a tablet safely Watching videos on the computer Creating a fun and safe username Knowing when to ask a grown-up for help
2

Key Concepts & Vocabulary

TermDefinitionExample Private Information ๐ŸคซSecret information that is only about you and your family.Your home address, your birthday, or your full name. Trusted Adult ๐Ÿง‘โ€๐ŸซA grown-up you know and trust to help you stay safe.Your parent, your guardian, or your teacher. Username ๐ŸŽฎA special nickname you use for online games and websites.A safe username is 'HappyHippo7' instead of 'MariaJones'. Password ๐Ÿ—๏ธA secret code that unlocks your online accounts.Your password should be a secret, just for you and your parents. Stranger ๐Ÿ‘คSomeone you do not know in the real world.Another player in an online game is a stranger.
3

Core Syntax & Patterns

The 'Keep it Secret' Rule ๐Ÿค Keep your private information a secret, like a superhero's identity. Use this rule to remember not to share your name, address, or birthday online. The 'Ask First' Rule ๐Ÿค” Before you click, type, or share, always ask a trusted adult first. Use this rule when a website or game asks you for any information. The 'Tell an Adult' Rule ๐Ÿƒโ€โ™€๏ธ If something feels weird or makes you sad, tell a trusted adult right away. Use this rule if a stranger asks you a question or you see something scary.

4 more steps in this tutorial

Sign up free to access the complete tutorial with worked examples and practice.

Sign Up Free to Continue

Sample Practice Questions

Challenging
Lily posts a picture of her new bike. In the background, you can see her house number (123) and the street sign (Oak St.). What TWO pieces of private information did she accidentally share?
A.Her bike's color and her name
B.Her house number and street name
C.The time of day and the weather
D.Her age and her favorite toy
Challenging
Tom gets an email that looks like it's from his favorite game. It asks him to click a link and enter his password to get 1,000 free coins. What is the SAFEST sequence of actions (what to do first, second, and third)?
A.Click the link -> Enter password -> Tell a grown-up
B.Delete the email -> Ask a friend -> Click the link
C.Enter password -> Get the coins -> Delete the email
D.Don't click anything -> Go get a grown-up -> Let them look at the email
Challenging
A new drawing app asks for permission to use your LOCATION ๐Ÿ“, your CAMERA ๐Ÿ“ท, and your CONTACTS ๐Ÿ“–. Which permission is the MOST risky for keeping your home private, and why?
A.Location, because it can show where you are right now
B.Camera, because it can take silly pictures
C.Contacts, because it can see your friends' names
D.All of them are perfectly safe for a drawing app

Want to practice and check your answers?

Sign up to access all questions with instant feedback, explanations, and progress tracking.

Start Practicing Free

More from Internet Safety

Ready to find your learning gaps?

Take a free diagnostic test and get a personalized learning plan in minutes.