Computer Science Grade 3 20 min

Online Safety: Protecting Your Information

Learn about the importance of protecting personal information online.

Tutorial Preview

1

Introduction & Learning Objectives

Learning Objectives Identify at least three types of private information that should not be shared online. Explain the difference between a kind and an unkind online comment. Apply the 'If-Then' Safety Rule to a new online scenario. Create a strong, secret password using a simple set of rules. Define 'Digital Footprint' and give an example of something that adds to it. List two trusted adults they can talk to if something online makes them feel uncomfortable. Have you ever played a game online or watched a video? 💻 The internet is like a giant, fun playground, but just like a real playground, it has rules to keep us safe! 🤔 Today, we're going to learn how to be super digital citizens! We'll discover what information is secret, how to act kind...
2

Key Concepts & Vocabulary

TermDefinitionExample Private InformationSpecial information about you that should be kept secret to stay safe. It's like a key to your house – you only share it with family.Your full name, home address, phone number, school name, or your password. Digital CitizenA person who uses the internet in a safe, kind, and responsible way. It's like being a good friend or neighbor, but online.You are being a good digital citizen when you post a nice comment or ask for help before downloading a new game. Digital FootprintThe trail of 'footprints' you leave behind every time you do something online. Everything you post, click, or share becomes a part of it.Posting a picture of your pet, writing a comment on a video, or playing an online game all add to your digital footprint. Use...
3

Core Syntax & Patterns

The 'If-Then' Safety Rule IF a website, game, or stranger asks for my private information, THEN I will stop, find a trusted adult, and ask for help. This is a conditional rule, just like in coding! Use this rule anytime you are asked for information like your name, address, or phone number online. It's an event that triggers a safe action. The T.H.I.N.K. Before You Post Rule Before you type or post, ask yourself: Is it True? Is it Helpful? Is it Inspiring? Is it Necessary? Is it Kind? This is an algorithm, or a set of steps, for being a good digital citizen. Follow these steps to make sure your digital footprint is a positive one. The Strong Password Algorithm 1. Pick a phrase you like. 2. Use the first letter of each word. 3. Add a number you can rememb...

4 more steps in this tutorial

Sign up free to access the complete tutorial with worked examples and practice.

Sign Up Free to Continue

Sample Practice Questions

Challenging
A friend wants to post a video online for a school contest. They want to say your full name, your age, and the name of your town in the video. What are two different safety reasons this might be a bad idea?
A.The video might be boring, and you might not win the contest.
B.It shares too much personal info, and your digital footprint could attract strangers.
C.Your friend might get more attention than you, and the sound might be bad.
D.You might not like how you look on camera, and your parents might not see it.
Challenging
Imagine your password for a game is 'Fluffy1', which is your dog's name. An online acquaintance follows your mom on social media and sees she posts many pictures of your dog, Fluffy. How could this create a security problem?
A.It's not a problem because the person doesn't know your last name.
B.The person might make fun of your dog's name.
C.The person could use that information to guess your password and access your account.
D.Your mom might get upset that you used the dog's name for a password.
Challenging
You have been playing a game with an online person for months and you feel like you know them well. They ask for your phone number so you can chat. Why is this still a potential risk?
A.It's not a risk because you have known them for a long time.
B.You don't really know who they are, and a phone number is very private information.
C.They might call you too late at night and wake you up.
D.Your parents might get a bill for the extra phone calls.

Want to practice and check your answers?

Sign up to access all questions with instant feedback, explanations, and progress tracking.

Start Practicing Free

More from Digital Citizenship: Responsible Online Behavior

Ready to find your learning gaps?

Take a free diagnostic test and get a personalized learning plan in minutes.