Frankenstein in the world of virtual reality (continued)

This lesson will continue our look into the Computer Science field. Students will learn about the dangers of cyber activity and the potential for “monsters” in the realm of computer science. As an enrichment activity, the students will use an avatar to search the graveyards and build their own monster through the settings of the novel.

Author: Yvonne Swader
Grade Level: 9-12
Materials: Promethean & Chrome Book

National Standards Alignment

ccss ela RL.9-10 SL.9-10
csta 3A-AP-21 3A-IC-29 3A-NI-04 3A-NI-05 3A-NI-06
iste ISTE-1d ISTE-7a ISTE-7b ISTE-7c

OVERVIEW

Activity Overview:

This lesson will continue our look into the Computer Science field. Students will learn about the dangers of cyber activity and the potential for “monsters” in the realm of computer science. As an enrichment activity, the students will use an avatar to search the graveyards and build their own monster through the settings of the novel.

Meta description

  • Subject Area: Computer Science, Reading/Language Arts, Technology
  • Grade Level : 9-12
  • Computer Science Domains:
    • Networks and The Internet
  • Computer Science Principles:
    • Collaborating Around Computing
  • Materials:
    • Promethean & Chrome Book
  • Considerations:
    • Depending on various school districts, students may or may not need in-depth introduction to Computer Science. The lesson can be modified to fit the experience of the students and the expectations of the state standards.

Lesson Plan

Overview

This lesson will continue our look into the Computer Science field. Students will learn about the dangers of cyber activity and the potential for “monsters” in the realm of computer science. As an enrichment activity, the students will use an avatar to search the graveyards and build their own monster through the settings of the novel.

ASSESSMENT PRE/POST-TEST

Instead of a standard test, students will use exit cards to answer the following questions: How comfortable am I with my own cyber security? Document creation of their own cyber monster.

OBJECTIVES

Students will be able to define the risks associated with Cybersecurity in Computer Science and explain the various ways to combat these risks.

Students will be able to use a virtual reality program to build their own monster much like the main character in the novel, Frankenstein.

CATCH/HOOK

Cybersecurity Training for Kids YouTube Video

ACTIVITY INSTRUCTIONS

Students will begin with the assignment: “Biometrics: New IDs that are uniquely you” on Common Lit. Next, students will read and answer questions in NewsELA: “Don’t feed the phish: Privacy & Security”.

Next, students will watch & take notes on: Cybersecurity Training for Kids Supplemental Activity Students will explore the world of Frankenstein using a Virtual Reality Program designed by Milana Wolf of the University of Wyoming staff.

Supplements

Any items in this section are the property & under the license of their respective owners.

REVIEW

Students will take part in a class discussion of what they have learned and how they can use it in their daily lives and futures. Students will write a paragraph summarizing this to be turned in.

STANDARDS

TypeListing
CS DomainsNetworks and The Internet
CS PrinciplesCollaborating Around Computing
Other Content StandardsELA RI.10.1 & ELA RI.10.2