Lesson Overview
Students understand basic AI concepts using relatable, culturally relevant analogies.
Before you start the lesson, make sure to read through the lesson overview and the lesson preparation. The Facilitator Guide can also help you prepare.
Students understand basic AI concepts using relatable, culturally relevant analogies.
Ready?
Begin Lesson
Analogy Introduction (2 minutes):
Think about learning a language. If you're Yoruba and learning English, Kikuyu and learning Swahili, or Zulu and learning Afrikaans, you listen to how people speak, you make mistakes, you practice. AI learns similarly, but instead of listening to family and friends, it 'listens' to millions of examples from books, websites, and conversations.
Interactive Discussion:
Expected Responses & Guidance:
Cultural Bridge (1 minute):
Here’s a timeline of the development of Artificial Intelligence.
Generative AI is like a very advanced autocomplete. You know how your phone suggests the next word when texting? GenAI does that but for entire stories, pictures, or songs.
Example Walkthrough:
If I tell Meta AI, 'Write a story about traffic in this city,' it looks at millions of stories it has read about cities, traffic, and our city, then combines patterns to create something new. It's not copying - it's like how you might tell a story using ideas from different movies you've watched.
Meta AI is an example of generative AI.
Turn to your partner and suggest a prompt you'd like to give AI. Make it about something in this country - your school, your neighborhood, our local food, anything!
Collect 3-4 suggestions and briefly discuss what AI might do with each.
Smartphone Interface Exploration (1 minute):
Let's look at your phone like an AI expert. Every feature I mention, raise your hand if you've used it.
Transition to hands-on: Now that you understand how AI works, let's actually create something with it!
Congrats!
You've finished the lesson
Students will learn how to keep their online information more secure by using and maintaining strong passwords.
View Page
Students will learn to recognize unsecured Wi-Fi when it is available to them, understand the trade-offs inherent in using unsecured Wi-Fi, and make informed decisions about when to connect to and use unsecured Wi-Fi.
View Page
Students will learn about malicious online users who might attempt to use security weaknesses to gather information about them.
View Page
Students will learn what information verification is and why it is important for news consumers.
View Page
Students will learn about a five-step checklist they can use to verify the origin, source, date, location, and motivation of news.
View Page
Students will learn how to keep their online information more secure by using and maintaining strong passwords.
View Page
Students will learn to recognize unsecured Wi-Fi when it is available to them, understand the trade-offs inherent in using unsecured Wi-Fi, and make informed decisions about when to connect to and use unsecured Wi-Fi.
View Page
Students will learn about malicious online users who might attempt to use security weaknesses to gather information about them.
View Page
Students will learn what information verification is and why it is important for news consumers.
View Page
Students will learn about a five-step checklist they can use to verify the origin, source, date, location, and motivation of news.
View Page