Skip to content

How Information Travels OnlineActivities & Teaching Strategies

Active learning helps students grasp how information travels online because abstract concepts like data transmission and security become tangible through role play, investigation, and visual creation. When students simulate real-world scenarios, they confront practical questions about privacy and safety in ways that lectures cannot.

Year 6Technologies3 activities25 min35 min

Learning Objectives

  1. 1Explain how breaking information into packets improves transmission efficiency and resilience.
  2. 2Compare the journey of a data packet across a network to the postal service delivery of a letter.
  3. 3Predict the impact of network congestion or a blocked path on data packet delivery.
  4. 4Analyze the role of routers and network infrastructure in directing data packets.

Want a complete lesson plan with these objectives? Generate a Mission

25 min·Pairs

Role Play: The Phishing Detective

In pairs, one student 'sends' a suspicious email (written on a card) to the other. The 'detective' must look for red flags like urgent language, strange links, or poor spelling, and explain why they would or wouldn't click on it.

Prepare & details

Explain why sending information in small pieces might be a good idea.

Facilitation Tip: During Role Play: The Phishing Detective, give students time to rehearse their responses before performing for the class to reduce performance anxiety.

Setup: Open space or rearranged desks for scenario staging

Materials: Character cards with backstory and goals, Scenario briefing sheet

ApplyAnalyzeEvaluateSocial AwarenessSelf-Awareness
30 min·Small Groups

Inquiry Circle: Password Crackers

Groups are given a set of 'weak' passwords (e.g., 'password123' or 'fluffy'). They must use a set of 'security rules' to transform them into 'strong' passwords and then present their 'before and after' to the class, explaining the changes.

Prepare & details

Compare sending a letter directly to someone versus sending it through many different post offices.

Facilitation Tip: For Collaborative Investigation: Password Crackers, assign roles explicitly (e.g., recorder, investigator, presenter) to ensure all students contribute.

Setup: Groups at tables with access to source materials

Materials: Source material collection, Inquiry cycle worksheet, Question generation protocol, Findings presentation template

AnalyzeEvaluateCreateSelf-ManagementSelf-Awareness
35 min·Whole Class

Gallery Walk: Digital Footprint Mural

Students draw a 'footprint' and fill it with types of data they share online (photos, locations, game scores). They display these and walk around to discuss which pieces of data are 'safe' to share and which might be risky if seen by a stranger.

Prepare & details

Predict what might happen if one path for information is blocked on the internet.

Facilitation Tip: During Gallery Walk: Digital Footprint Mural, provide sentence starters on the wall to scaffold discussions about privacy choices.

Setup: Wall space or tables arranged around room perimeter

Materials: Large paper/poster boards, Markers, Sticky notes for feedback

UnderstandApplyAnalyzeCreateRelationship SkillsSocial Awareness

Teaching This Topic

Experienced teachers approach this topic by connecting technical details to students’ lived experiences, such as comparing online passwords to house keys. Avoid overwhelming students with jargon; focus instead on analogies they can test themselves. Research suggests that students retain concepts better when they physically manipulate materials or act out processes, as seen in the role play and mural activities.

What to Expect

Successful learning looks like students confidently explaining how data moves through networks, why strong passwords matter, and how to spot digital threats. They should also articulate their own digital footprint choices and justify them to peers.

These activities are a starting point. A full mission is the experience.

  • Complete facilitation script with teacher dialogue
  • Printable student materials, ready for class
  • Differentiation strategies for every learner
Generate a Mission

Watch Out for These Misconceptions

Common MisconceptionDuring Gallery Walk: Digital Footprint Mural, watch for students who believe posts can be fully erased.

What to Teach Instead

Use the mural’s layers to show that each digital action leaves traces. Ask students to cover a post with a blank paper and discuss whether the original is still visible underneath.

Common MisconceptionDuring Collaborative Investigation: Password Crackers, watch for students who think hackers only target ‘important’ people.

What to Teach Instead

Have students run a mock password-cracking simulation using a simple list of passwords. Track how long it takes for weak passwords to be guessed, emphasizing that automated bots target any weak account.

Assessment Ideas

Quick Check

After Collaborative Investigation: Password Crackers, present students with the scenario: 'Imagine you are sending a large drawing to a friend online. Why is it better to send it as many small pieces instead of one giant file?' Have students write two reasons on a sticky note and place them on the board under 'Speed' or 'Security'.

Discussion Prompt

During Role Play: The Phishing Detective, ask students to compare the internet to the postal service by posing: 'If you wanted to send a secret message to someone across the country, would you send one big envelope or many small, numbered envelopes? What are the pros and cons of each method?' Facilitate a class vote and tally responses on the board.

Exit Ticket

After Gallery Walk: Digital Footprint Mural, give students a diagram of a simple network with routers. Ask them to draw a possible path for a data packet from computer A to computer B, then answer: 'What might happen if the connection between Router 1 and Router 2 was cut?' Collect responses to identify misconceptions about network reliability.

Extensions & Scaffolding

  • Challenge early finishers to create a comic strip showing a data packet’s journey from their device to a friend’s, highlighting security risks along the way.
  • Scaffolding for struggling students: Provide a word bank with key terms (e.g., server, malware, phishing) during the Gallery Walk to support discussions.
  • Deeper exploration: Invite a local cybersecurity professional via video call to answer student questions after the password activity.

Key Vocabulary

PacketA small, fixed-size piece of data sent over a network. Information is broken into packets for transmission.
RouterA device that forwards data packets between computer networks. Routers direct packets along the most efficient path.
IP AddressA unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.
Network PathThe sequence of connections and devices that data packets travel through from source to destination.
Data TransmissionThe process of sending digital information from one device to another over a communication channel.

Ready to teach How Information Travels Online?

Generate a full mission with everything you need

Generate a Mission