Do you want to learn more about technology?
Do you want to learn more about technology?

Do you want to learn how to use technology?
Do you want to learn how to use technology?
Do you want to learn how to use technology?
Do you want to learn how to use technology?
Do you want to learn more about coding?
Do you want to learn more about coding?
Do you want to learn more about coding?
Do you want to learn more about coding?
Do you want to learn more about robotics?
Do you want to learn more about robotics?
Do you want to learn more about robotics?
Do you want to learn more about robotics?
Do you want to learn more about making?
Do you want to learn more about making?
Do you want to learn more about making?
Do you want to learn more about making?
Do you want to learn more about cybersecurity?
Do you want to learn more about cybersecurity?
Do you want to learn more about cybersecurity?
Do you want to learn more about cybersecurity?
Do you want to learn more about ethical hacking?
Do you want to learn more about ethical hacking?
Do you want to learn more about ethical hacking?
Do you want to learn more about ethical hacking?
Do you want to learn more about online safety?
Do you want to learn more about online safety?
Do you want to learn more about online safety?
Do you want to learn more about online safety?
Do you want to discover more?
Do you want to discover more?
Do you want to discover more?
Do you want to discover more?
Click here to use ISearch

5 Questions About Your Online Presence

Make sure that no matter what you do on the Internet, you are leaving a positive digital footprint.

A Cyber Privacy Parable

Learn what can happen when you post something to social media, who can access it and your personal information.

Be Internet Awesome with Interland

Interland includes online adventures in learning more about online safety, phishing, privacy, security, and online behavior.   

Build an Electromagnet

Build an electromagnet in this COSI Connects activity. Click the green Open button to access this COSI Connects activity.

Code Combat

Play Kithgard Dungeon and use simple lines of code to move your hero through a labyrinth of spikes. Follow the link to play without an account.

Cyber Security: Passwords

Watch this video from The World Almanac for Kids about using passwords. One vital way to keep intruders out of a personal computer is to safeguard passwords. Passwords should be at least 8 characters long and should include letters, symbols, and numbers. (If you're at home, you'll need your school's INFOhio username/password. If you don't know it, find it on INFOhio's Get Password page).

Cyberbullying Research Center: Tips for Teens

Downloadable tip sheets on identifying, preventing, and responding to cyberbullying, cell phone safety, social media safety, and other related topics.

Cybersecurity Lab

In this online lab, you will complete a series of cybersecurity challenges to defend your company against some sophisticated cyber attacks.

Cybersecurity Lab - NOVA Labs

Whenever we go online—to shop, chat with our friends, or do anything else—we put ourselves at risk of cybercrime. NOVA has teamed up with cybersecurity experts to create the Cybersecurity Lab, a game in which players will discover how they can keep their digital lives safe and develop an understanding of cyber threats and defenses.

Cybersecurity: Crash Course

Discussion on ways to protect the security, integrity, and availability of computer systems and data against threats.

Dance Mat Typing

Four levels to play practicing typing skills. New letters are introduced at each level along with a test and reward. 

Design Squad

Learn how everyday objects are built and redesign them to be better!

Ethical Hacker

Read more about how hacking is used to evaluate the security and vulnerabilities in computer and network systems.

Express Course - Code.org

Learn computer science by trying the lessons at your own pace! Learn to create computer programs, develop problem-solving skills, and work through fun challenges! Make games and creative projects to share with friends, family, and teachers.

Google Quick Draw

Can a neural network learn to recognize doodling?
Help teach it by adding your drawings to the world’s largest doodling data set, shared publicly to help with machine learning research.

Hackers and Cyber Attacks

 Learn the difference between Black Hats (malicious cybercriminals) and White Hats (who work to identify and close security vulnerabilities).

Hacktivism [Points of View Reference Center]

Learn more about Hacktivism that combines high-tech computer hacking with political activism.

Hour of Code Activities

Search by grade level, experience level, topics, and more to access hundreds of coding games and resources. 

IEEE Spectrum

Learn about what is happening with robots today!

iKids

Learn about inventors, inventions, and technology.


Copyright ©2022. INFOhio. All rights reserved.