Frankenstein in the world of virtual reality (continued)
This lesson will continue our look into the Computer Science field. Students will learn about the dangers of cyber activity and the potential for “monsters” in the realm of computer science. As an enrichment activity, the students will use an avatar to search the graveyards and build their own monster through the settings of the novel.
National Standards Alignment
OVERVIEW
Activity Overview:
This lesson will continue our look into the Computer Science field. Students will learn about the dangers of cyber activity and the potential for “monsters” in the realm of computer science. As an enrichment activity, the students will use an avatar to search the graveyards and build their own monster through the settings of the novel.
Meta description
- Subject Area: Computer Science, Reading/Language Arts, Technology
- Grade Level : 9-12
- Computer Science Domains:
- Networks and The Internet
- Computer Science Principles:
- Collaborating Around Computing
- Materials:
- Promethean & Chrome Book
- Considerations:
- Depending on various school districts, students may or may not need in-depth introduction to Computer Science. The lesson can be modified to fit the experience of the students and the expectations of the state standards.
Lesson Plan
Overview
This lesson will continue our look into the Computer Science field. Students will learn about the dangers of cyber activity and the potential for “monsters” in the realm of computer science. As an enrichment activity, the students will use an avatar to search the graveyards and build their own monster through the settings of the novel.
ASSESSMENT PRE/POST-TEST
Instead of a standard test, students will use exit cards to answer the following questions: How comfortable am I with my own cyber security? Document creation of their own cyber monster.
OBJECTIVES
Students will be able to define the risks associated with Cybersecurity in Computer Science and explain the various ways to combat these risks.
Students will be able to use a virtual reality program to build their own monster much like the main character in the novel, Frankenstein.
CATCH/HOOK
Cybersecurity Training for Kids YouTube Video
ACTIVITY INSTRUCTIONS
Students will begin with the assignment: “Biometrics: New IDs that are uniquely you” on Common Lit. Next, students will read and answer questions in NewsELA: “Don’t feed the phish: Privacy & Security”.
Next, students will watch & take notes on: Cybersecurity Training for Kids Supplemental Activity Students will explore the world of Frankenstein using a Virtual Reality Program designed by Milana Wolf of the University of Wyoming staff.
Supplements
Any items in this section are the property & under the license of their respective owners.
REVIEW
Students will take part in a class discussion of what they have learned and how they can use it in their daily lives and futures. Students will write a paragraph summarizing this to be turned in.
STANDARDS
| Type | Listing |
|---|---|
| CS Domains | Networks and The Internet |
| CS Principles | Collaborating Around Computing |
| Other Content Standards | ELA RI.10.1 & ELA RI.10.2 |