The game contains 57 symbols that represent terms from the field of information technology and cyber security. The meaning of all terms is briefly explained in the attached glossary. For example, children will learn what digital footprint, hoax, cyber grooming is, but also why they should regularly update software or use an antivirus program. Next, they will get acquainted with Safer Internet Day. It is also good to know that children can always turn to our Safety Line project partner with confidence. Last but not least, children will receive information about our projects such as ON-LINE ZOO, Safely on the Net or Tablexia. The game is fun, fast and we believe that it will find popularity not only with younger children, but also with teenagers or their parents and teachers. Thanks to its compact size and minimal space requirements, it can be taken anywhere, even in a restaurant. The game in the pdf version is intended for printing, cutting and subsequent playing.
About this resource
The game contains 57 symbols that represent terms from the field of information technology and cyber security. The meaning of all terms is briefly explained in the attached glossary. For example, children will learn what digital footprint, hoax, cyber grooming is, but also why they should regularly update software or use an antivirus program. Next, they will get acquainted with Safer Internet Day. It is also good to know that children can always turn to our Safety Line project partner with confidence. Last but not least, children will receive information about our projects such as ON-LINE ZOO, Safely on the Net or Tablexia. The game is fun, fast and we believe that it will find popularity not only with younger children, but also with teenagers or their parents and teachers. Thanks to its compact size and minimal space requirements, it can be taken anywhere, even in a restaurant. The game in the pdf version is intended for printing, cutting and subsequent playing.
About this resource
- Related content
- Safer Internet Day (SID) cyberbullying cybercrime cybersecurity data privacy data protection data security digital footprints disinformation fake news grooming hacking mobile phones and mobile devices online addiction online hoaxes positive content sexting social media and networking spam phishing and pharming viruses and malware