Students create a flowchart of actions to take when they encounter a threat, learning how to block, report, and delete suspicious content.

Similar Lessons