7.3 Digital Citizens

In this unit you will become a campaigner for people to become better digital citizens. You will learn about the ethical, environmental and legal impact of digital devices and the WWW.
You will develop a range of products to help with your campaign. such as a digital poster, poster and your own logo.

Unit Resources

Sections

Success Criteria

Time Frame

3 Lessons

4. Use suitable success criteria when developing products.

3. Describe target audience and generate success criteria

2. Recognise the target audience and list success criteria.

1 Lesson

4. Use success criteria to evaluate success.

4. Create an effective product using advanced software features.

3. Create a product using different software features.

1 Lesson

5. Explain different types of ethical impacts of technology.

4. Describe ethical impacts.

3. Describe some ethical impacts.

2. List some ethical impacts.

1 Lesson

5. Explain different types of ethical impacts of technology.

4. Describe ethical impacts.

3. Describe some ethical impacts.

2. List some ethical impacts.

1 Lesson

4.Explain the different environmental  impacts caused by technology.

3.Desribe some of the environmental impacts  of computer technology.

2. List  some environmental  impacts of technology.

1 Lesson

4.Explain the different environmental  impacts caused by technology.

3.Desribe some of the environmental impacts  of computer technology.

2. List  some environmental  impacts of technology.

1 Lesson

4. Explain the different UK legislation designed to protect us.

3. Describe legal implications of using technology.

2. List laws connected to impacts.

2. Define legal and legislation.

1 Lesson

4. Explain the different UK legislation designed to protect us.

3. Describe legal implications of using technology.

2. List laws connected to impacts.

2. Define legal and legislation.

1 Lesson

4. Explain how malware can cause different types of harm, loss or damage.

3. Describe different malware threats and their usual action/aims.

2. List cyber security threats.

1. Define cyber security.

1 Lesson

4. Describe a range of protection methods.

3. Describe some protection methods.

2. List some protection methods.

1 Lesson
1 Lesson
1 Lesson