Computer Science Grade 5 20 min

Network Safety: Talking to Strangers

Introduction to online safety, emphasizing not talking to strangers online.

Tutorial Preview

1

Introduction & Learning Objectives

Learning Objectives Analyze online conversations using complex conditional logic (IF-THEN-ELSE) to identify potential risks. Model a safety check process as a loop that repeats until a conversation is confirmed safe or is ended. Classify personal information using a binary system (1 for 'safe to share', 0 for 'unsafe to share'). Deconstruct a stranger's request to identify phishing or social engineering tactics. Design a simple algorithm (a set of rules) for safely exiting a conversation that feels uncomfortable. Explain how a digital footprint is created by the data we share online. Have you ever gotten a message from someone you don't know in a game or app? 🤔 Let's think like a computer to decide if it's safe to reply! In this less...
2

Key Concepts & Vocabulary

TermDefinitionExample Conditional LogicA way of making decisions, like in coding. It follows an 'IF this happens, THEN do that, ELSE do something different' structure.IF a stranger asks for my full name, THEN I will not share it and will tell a trusted adult. ELSE, I can continue the conversation about the game we are playing. Safety LoopA repeating process or check you perform during an online conversation. You 'loop' through your safety questions as long as you are talking.WHILE talking to a new person, REPEAT these checks: Are they asking for personal info? Are they being too friendly too fast? Do I feel uncomfortable? Binary Information ClassificationA method of sorting information into only two groups, like a computer uses 0 and 1. We can use 0 for 'Unsafe to...
3

Core Syntax & Patterns

The Personal Information Sorter Algorithm IF (information type == 'Personal Identifiable Information') THEN classification = 0 (Unsafe) ELSE classification = 1 (Safe) Use this rule to quickly decide if a piece of information is safe to share. Personal Identifiable Information (PII) is anything that can be used to find you in the real world, like your full name, address, school, or phone number. The Red Flag Detection Loop WHILE (conversation is active) { CHECK for red_flag; IF (red_flag == TRUE) THEN execute_exit_plan; } Use this continuous loop in your mind during any online chat with a stranger. A 'red flag' could be asking for secrets, trying to get you to switch apps, or making you feel weird. The 'exit plan' is to stop replying, block them,...

4 more steps in this tutorial

Sign up free to access the complete tutorial with worked examples and practice.

Sign Up Free to Continue

Sample Practice Questions

Challenging
You are a game moderator reviewing a chat log. Over several days, UserA asks UserB their favorite sport, then what team they play for, then what city their team is in, and finally offers them free game items to tell them their coach's name. This escalating pattern of questions is a form of:
A.friendly interview to get to know someone.
B.Grooming, which is a process of building trust to slowly get personal information.
C.normal trading negotiation for game items.
D.technical support survey to improve the game.
Challenging
A stranger messages you, 'Hey, I think I know you from soccer camp! My friend Sarah said you were cool.' You don't know a Sarah from camp. What is the most secure and logical sequence of actions to take?
A.Believe them and start talking about camp to see what they know.
B.Tell them your real name and ask for their picture to see if you recognize them.
C.Do not confirm or deny anything. Say 'I don't know who you are,' block them, and tell a trusted adult.
D.Give them your Instagram username so they can see your pictures and confirm it's you.
Challenging
Imagine your privacy settings are code: `IF (user is on 'friends_list') THEN show_posts; ELSE hide_posts;`. A stranger asks you to change this logic to be public. What would the new, dangerous code look like?
A.`IF (user is NOT on 'friends_list') THEN show_posts;`
B.`IF (user is anyone) THEN show_posts;`
C.`LOOP forever { hide_posts; }`
D.`IF (user is 'stranger') THEN block_user;`

Want to practice and check your answers?

Sign up to access all questions with instant feedback, explanations, and progress tracking.

Start Practicing Free

More from Advanced Topics

Ready to find your learning gaps?

Take a free diagnostic test and get a personalized learning plan in minutes.