Lesson Overview
Participant will learn about understanding AI.
Participant will learn about understanding AI.
Ready?
Begin Lesson
Good morning/afternoon, everyone. Before we dive into AI, I want to acknowledge that you're all experts in something - your life experiences, your work, your communities. Today we're adding one more area of expertise: understanding AI. And I have good news - you're already using AI more than you think.
There are no silly questions here, and no one expects you to become a tech expert by the end of today. We're here to learn practical skills that make your daily life easier and safer.
Let's hear from a few pairs. What technologies came up in your discussions?
As participants share, reveal AI components:
See? You're not beginners with AI - you're already experienced users. Today we're going to help you become more intentional and safer in how you use it.
Congrats!
You've finished the lesson
Students will learn how to keep their online information more secure by using and maintaining strong passwords.
View Page
Students will learn to recognize unsecured Wi-Fi when it is available to them, understand the trade-offs inherent in using unsecured Wi-Fi, and make informed decisions about when to connect to and use unsecured Wi-Fi.
View Page
Students will learn about malicious online users who might attempt to use security weaknesses to gather information about them.
View Page
Students will learn what information verification is and why it is important for news consumers.
View Page
Students will learn about a five-step checklist they can use to verify the origin, source, date, location, and motivation of news.
View Page
Students will learn how to keep their online information more secure by using and maintaining strong passwords.
View Page
Students will learn to recognize unsecured Wi-Fi when it is available to them, understand the trade-offs inherent in using unsecured Wi-Fi, and make informed decisions about when to connect to and use unsecured Wi-Fi.
View Page
Students will learn about malicious online users who might attempt to use security weaknesses to gather information about them.
View Page
Students will learn what information verification is and why it is important for news consumers.
View Page
Students will learn about a five-step checklist they can use to verify the origin, source, date, location, and motivation of news.
View Page