This collection uses primary sources to compare American responses to Pearl Harbor …
This collection uses primary sources to compare American responses to Pearl Harbor and September 11. Digital Public Library of America Primary Source Sets are designed to help students develop their critical thinking skills and draw diverse material from libraries, archives, and museums across the United States. Each set includes an overview, ten to fifteen primary sources, links to related resources, and a teaching guide. These sets were created and reviewed by the teachers on the DPLA's Education Advisory Committee.
Innovation and technology can play a beneficial role in changing our food …
Innovation and technology can play a beneficial role in changing our food landscape, if we allow it to. Hydroponics and freight farms are just one of many technological advances already being utilized by communities to provide greater access to food. Spanish captions and transcript also available. [3:15]
The COVID-19 pandemic affected many Minnesotans' ability to access healthy foods because …
The COVID-19 pandemic affected many Minnesotans' ability to access healthy foods because of lost jobs and income, students unable to receive school meals, and myriad other reasons. Local farmers and food banks teamed up to ensure that hungry families could still eat well, while also providing income for farmers whose markets were challenged by the pandemic. Spanish captions and transcript also available. [3:08]
The power of the internet allows students to experience and visit places …
The power of the internet allows students to experience and visit places they might not be able to see in person. But, just like traveling in the real world, it's important to be safe when traveling online. On this virtual field trip, kids can practice staying safe on online adventures. This lesson aligns to national Computer Science standards from CSTA.
Are you looking for some random facts, survey results and quotes about …
Are you looking for some random facts, survey results and quotes about technology in the future- then you have come to the right place. This site contains links to many surveys with predcitions aboput the future of technology
Many people that use the internet seem to be more willing to …
Many people that use the internet seem to be more willing to give out personal information than they would in other settings. This can be very dangerous. This resource describes how to protect your privacy while using the internet.
Mac OS X is the operating system that Apple introduced for Macintosh …
Mac OS X is the operating system that Apple introduced for Macintosh computers in 2002. This resource provides advice on how to make a Mac OS X installation secure.
Firewall software forms the first line of defense against hackers and certain …
Firewall software forms the first line of defense against hackers and certain types of computer viruses. This site explains what a firewall can do to help secure a computer and what it cannot do. The site also discusses different types of firewalls and provides some installation and maintenance tips.
Steganography is the science and art of hiding messages in plain sight …
Steganography is the science and art of hiding messages in plain sight so only the sender and intended recipient know the existence of a message. Steganography can be characterized as security through obscurity. Through this lesson, students experience a portion of the engineering design process as they research steganography and steganographic methods; identify problems, criteria and constraints; brainstorm possible solutions; and generate ideas. These are the critical first steps in the engineering design process, often overlooked by students who want to get to the "doing" phases—designing, building and testing. In computer science, a thorough design phase makes program implementation much easier and more effective. Students obtain practice with a portion of the design process that may be less exciting, but is just as important as the other steps in the process.
This podcast addresses the issue of protecting your privacy today with threats …
This podcast addresses the issue of protecting your privacy today with threats from identity theft, malware, government surveillance, and consumer profiling. Marc Hedlund speaks about how can we best protect our future selves from the quiet hard drives of today, and what might it mean to have an "open data" movement. He lists the current threats that might lead to privacy problems later and then gives some defense techniques that should help provide future protection. He also proposes a modest call to arms, stating that privacy policies modeled on the General Public License (GPL) should be developed and suggests strongly that it is best to assume that any data made available is being added to the pool.
Students apply the design process to the problem of hiding a message …
Students apply the design process to the problem of hiding a message in a digital image using steganographic methods, a PictureEdit Java class, and API (provided as an attachment). They identify the problems and limitations associated with this task, brainstorm solutions, select a solution, and implement it. Once their messages are hidden, classmates attempt to decipher them. Based on the outcome of the testing phase, students refine and improve their solutions.
This MIT course on network and computer security covers topics such as …
This MIT course on network and computer security covers topics such as security in multi-user distributed systems, cryptography, authentication, intrusion detection, and many other security topics.
Everything you wanted to know about the Overseas Security Advisory Council - …
Everything you wanted to know about the Overseas Security Advisory Council - "an enormously succcessful joint venture for effective security cooperation. Topics include: Global News, What's New, Publications, and Site Search, among others.
National Boarder Control Council President discusses his views and experiences at the …
National Boarder Control Council President discusses his views and experiences at the U.S.-Mexican border. Text, audio, and video of this August, 2006, interview are available.
When children are exposed to traumatic events within their neighborhoods, communities, or …
When children are exposed to traumatic events within their neighborhoods, communities, or across the world, you can help them feel safer and more secure...and build hope for a more peaceful, kinder future. These resources will help you find age-appropriate ways to respond to their fears and questions.
These resources can help children in foster care develop a sense of …
These resources can help children in foster care develop a sense of belonging. Visual reminders of belonging can build children's sense of comfort, safety, and security-and rhythm and music can help them remember important messages.
The Cyber Club Toolkit is designed to hep schools and other civic …
The Cyber Club Toolkit is designed to hep schools and other civic organizations create and run cyber clubs in Ohio.
The toolkit will include cyber security activities, career resources and other links to help students understand how cyber security impacts everyone and that there are significant current and future employment opportunities in this field.
Many of these materials will be created by Ohio educators, industry partners and government agencies and will be available for school, after school clubs and other youth organizations in Ohio.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.