The current form is used to filter the resulting content displayed for the archive that comes after this form. Each set of filters is grouped with an expandable heading. Selecting an filter using spacebar or enter updates the content displaying only selected items.

Show Filters Hide filters

Resources For

Resources For to choose from:

Types

Types to choose from:

Levels

Levels to choose from:

Topics

Topics to choose from:

Software

Software to choose from:

Subjects

Subjects to choose from:

Tags

Tags to choose from:

Showing 52 Results

Students sitting at a rounch table working on computers.

CyberTitan Spotlight

Grade audience: Middle - Secondary

On this episode of the Root & STEM podcast, Sheeana Bolton and Timothy King of the Information and Communications Technology Council (ICTC) explain CyberTitan, a cybersecurity competition for middle and high schoolers organized by the ICTC.

3 students in the computer lab, spaced out with mask on their faces. They are all facing the camera.

Get Cyber Safe

Grade audience: Middle - Secondary

On this episode of the Root & STEM podcast, Christine Menard of Get Cyber Safe shares loads of tips and advice regarding cybersecurity. She begins with an explanation of what Get Cyber Safe is, and continues by revealing which demographics are the highest risk for cyber attacks.

Fake Voices Versus Deepfakes

Fake Voices Versus Deepfakes

Grade audience: Grade 9

Students explore deepfakes and create a fake voices app using the MIT App Inventor. Learners also explore how deepfakes can pose a threat to online safety and privacy, and how they can have an impact on not only our daily lives but also other areas like commerce, history, crime, and pop culture.

Snakes and Ladders: Online Safety

Snakes and Ladders: Online Safety

Navigating the internet can feel tricky sometimes, much like a game of Snakes and Ladders. But in this version of the classic game, there’s a twist. The objective is to be the first to reach the 100th square but some squares have snakes and some squares have ladders. Check out Challenge Mode to challenge yourself further.

Progress & Privacy

Progress & Privacy

Grade audience: Middle - Adult

Lawyer and UOIT Business Law Professor, Dr. Rajen Akalu offers insights on the privacy concerns of artificial intelligence and data collection.

Harnessing The Benefits: The Digital World

Harnessing The Benefits: The Digital World

Grade audience: Middle - Secondary

This three-episode series designed for Grade 9-12 students highlights the advantages of technology while introducing potential dangers of the online world and how to avoid them. Each episode focuses on one popular aspect of the digital world: artificial intelligence, social media, and online learning.

Smart phone with a set of headphones displaying "Root & STEM podcast" cover art.

The Root & STEM Podcast

We’re excited to launch a new podcast, bringing you an audio version of everything you love about Root & STEM.

Think acronym broke down. T - is it true? H - is it helpful? I - is it inspiring? N - is it necessary? K - is it kind?

Online Safety

Grade audience: Adult

Learners will understand how to protect their personal information while online,  source reliable information online for their ongoing protection and how to do a safety check-up on their devices and computer. In this course learners will cover: Introduction to the Internet Browsers Browser Privacy  Wifi and Wifi Safety and Software Updates Online Resources for Web […]

An eye with labels over it.

Lesson 10: Security Check Ups

Grade audience: Secondary - Adult

Self-guided Security Check Ups are simple things you can do with software you already have that can make a big difference to your safety online.

A keyboard with a blue button reading "Update."

Lesson 9: Software Updates

Grade audience: Secondary - Adult

Software updates can do wonderful things: Protect against emerging security risks, improve your software and battery performance, fix software problems and make your device run more smoothly.

Glowing lock on background of binary code.

Lesson 8: Device Encryption

Grade audience: Secondary - Adult

Encryption is a process that makes data inaccessible to anyone who doesn’t have the right key. Encryption is already used in many of the tech products and tools we use today, and forms the basis of security for everything from online shopping and banking, to your messages and browsing.

Two USB sticks sitting on a laptop trackpad.

Lesson 7: Backup Basics

Grade audience: Secondary - Adult

If your device happens to be damaged, compromised, lost or stolen, having a copy of your files on hand will help you get back up and running quickly and easily. Backup software can also help you restore previous versions of files in case you delete or damage them accidentally.

Person sitting at a table with their hands resting on a laptop keyboard.

Lesson 6: Web Browser Basics

Grade audience: Secondary - Adult

A web browser is an application that can take you anywhere on the internet. Simply put, it gets information from other places, and displays it on your device. The best browsers can do things to keep your information relatively private: They can stop or warn you before you visit unsecured or unencrypted websites. They can also be automatically updated to keep your browsing safer.

The word "password" revealed in red, surrounded by lines of binary code.

Lesson 5: Privacy Script

Grade audience: Secondary - Adult

The more you engage and interact on the internet, the higher the chances that your privacy and safety could be violated. Learners will explore how someone could gain access to your email account, read your emails, or send emails in your name. How your emails could be read by the email service provider itself.

A graphic with a lock icon in the center.

Lesson 4: Passwords

Grade audience: Secondary - Adult

By now, most people know what a password is. A password is a secret code that you make up, usually with a combination of letters and numbers. It allows you to access your online accounts, such as email or banking. But when it comes to online safety, do you know how to choose passwords that will keep attackers at bay?

Keyboard with a large red key that reads "SECURE".

Lesson 3: Two-Factor Authentication

Grade audience: Secondary - Adult

Two-factor authentication is an added layer of security used when logging into your accounts, such as email. It’s where access to your online accounts require not just a password but an additional, one-time code, sent to a device you trust, like your phone) as a way of verifying that it is you, and not someone else, trying to access your account.

Person sitting cross-legged on the ground using a laptop with a large red lock on the screen.

Lesson 2: Ransomware

Grade audience: Secondary - Adult

Ransomware is malicious software that uses encryption to lock you out of your computer and make your files inaccessible. The attacker usually demands payment, and in return, promises to give you back access to your files. Learn about how to help prevent this and the resources available to you if you are ever a victim of a ransomware or malware attack.

Person using a tablet device with an email message on-screen reading "malware".

Lesson 1: Phishing Scam

Grade audience: Secondary - Adult

Learn how to help prevent an online attacker from getting your information, and accessing your accounts.Phishing is one of the most common types of online scams, and can happen to anyone. There are five simple tips the average computer user can keep in mind to spot, and thwart these phishing emails.

Person sitting cross-legged on the ground using a laptop with a large red lock on the screen.

The Online Safety Podcast Series

On Pinnguaq’s Radio Hour The Web Use and Online Safety podcasts series explore how to stay safe while on the Internet including best practices and where to find answers to some of your online safety questions.    Listeners will learn how to protect their personal information while online,  source reliable information for their ongoing protection and how to […]

Gon’ Phishing

Gon’ Phishing

Grade audience: Middle - Adult

Gon’ Phising is a game built to provide an opportunity to experience a variety of phishing attempts and become familiar with the signs of a phishing email.

The interface of the game. Play is highlighted.

Socializing at a Distance

At a time when much of the world is stuck at home, the need for connection and some semblance of normalcy is incredibly important. Even though many of us can’t get together to enjoy our regular pastimes, there are plenty of ways to recreate those hobbies online. This series will explore some of those workarounds, […]