Computer Science
Grade 3
20 min
Privacy Settings: Controlling Your Information
Students will learn about privacy settings and how to control who sees their online activity.
Tutorial Preview
1
Introduction & Learning Objectives
Learning Objectives
Define 'digital footprint' using a simple analogy.
Identify at least three online actions that create a digital footprint.
Explain the difference between 'public' and 'private' information online.
Use a simple 'If-Then' statement to decide if information is safe to share.
Trace the potential path of a shared photo or message.
Describe one way to make their digital footprint smaller.
Have you ever left footprints in the sand or snow? 👣 The internet remembers your steps, too! Let's be detectives and find out how.
Today, we'll learn about our 'digital footprint,' which is the trail of information we leave online. We will investigate how our clicks and posts create this trail and learn how to be sm...
2
Key Concepts & Vocabulary
TermDefinitionExample
Digital FootprintThe trail of 'data' or information you leave behind when you use the internet. It's like leaving footprints everywhere you go online.When you post a photo, play a game, or watch a video, you are leaving a digital footprint.
DataTiny pieces of information about you. Data can be your name, your age, what you like, or a picture you took.Your username in a game is a piece of data. A comment you write is also data.
PublicSomething that anyone and everyone can see. It's like shouting in a crowded playground.A video posted on a public website for the whole world to watch.
PrivateSomething that is only for you or a small group of people you trust, like your family. It's like whispering a secret to a friend.An email you send only to y...
3
Core Syntax & Patterns
The Sharing Rule (Conditional)
IF information is private (like your address or full name), THEN keep it to yourself.
Use this rule before you type or post anything. It helps you decide if the data is safe to share with others.
The Public Post Rule (Event -> Consequence)
WHEN the event is 'posting publicly', THEN the consequence is 'anyone can see it forever'.
Remember this rule when you are about to share something. Once a digital footprint is made publicly, it's very hard to erase.
The T.H.I.N.K. Before You Post Rule
Is it True? Is it Helpful? Is it Inspiring? Is it Necessary? Is it Kind?
Ask yourself these five questions before any online event, like posting a comment or photo. It helps you create a positive digital footprint.
4 more steps in this tutorial
Sign up free to access the complete tutorial with worked examples and practice.
Sign Up Free to ContinueSample Practice Questions
Challenging
A game offers you free 'gems' IF you agree to let the game post a message on your social media page. What is the trade-off you are making?
A.You are trading some of your privacy for a reward in the game
B.You are trading your gems for a new character
C.There is no trade-off, you just get free gems
D.You are trading your password for gems
Challenging
An app has a feature where messages disappear after you read them. Why might this NOT be a perfect way to keep a secret message private?
A.The message might come back later
B.The app might tell your parents
C.The other person can take a screenshot before it disappears
D.Disappearing messages use too much internet data
Challenging
Imagine a new rule says all apps must use simple, Grade 3 words to explain their privacy settings. How would this event help you control your digital footprint?
A.It would make the apps have more colors
B.It would help you understand what you are agreeing to, so you can make better choices
C.It would make all your information automatically private
D.It would give you more points in games
Want to practice and check your answers?
Sign up to access all questions with instant feedback, explanations, and progress tracking.
Start Practicing Free