SlideShare une entreprise Scribd logo
1  sur  5
CYBERBULLYIN
G
Lesson Title

Cyber Bullying

Learning Goal (Curriculum Expectations)
Students are learning to:

  • Define the terms: cyber-bullying, spam, cyber space, netiquette, IM
  • Identify the impact of cyber-bullying
  • Generate strategies to deal with cyber-bullying situations

Lesson Components
Part 1-Minds On
  • Activate prior knowledge on cyber-bullying: Have you ever received o
     or text message?
  • Explain and list on the Graphic Organizer: bullying, using internet or a
     message that hurts or embarrasses someone
  • Play the video clip http://www.youtube.com/watch?v=fNumIY9D7uY o
     discuss the impact on the main character:
       1. What’s the Problem? How do you think Jay felt?
       2. What might Jay think or do?

15 minutes
Part 2-Action
TASK 1: Students will come on the Promethean Board, one at a time,

  • Reveal the definitions of the terms: spam, cyber space, netiquette, IM
  • Click on the computer logo to see the answers:
    Cyber-bullying is a way of bullying through the use of
       1. cyberspace
       2. chat rooms
       3. cell phone
       4. email
  • Multiple Choice:
    Someone sent you a nasty text message. What should you do?
       1. Send them a text message to ask them to PLEASE STOP!
       2. Send a nasty message back
       3. Tell your parents, teachers or caregivers (Answer)
  • Drag the correct answer to the STOP BULLY sign
Spam is known as….
          1. Junk mail
          2. Texting
          3. A brand of food
  • Click on the correct answers
    a. You have received junk email. What should you do? Choose 2 ans
          1. Save it to your desktop
          2. Tell a grownup about it so they can block it (Answer)
          3. Open it and read first, then delete it
          4. Delete the email before reading it (Answer)
    b. If you are using email to send a message to your friends make sure
    1. You are always polite
    2. You use CAPS LOCK for the whole message
    3. You ask your parents for permission before you use email

  • Pull the correct blue tab to check your answer
    You are creating a profile on a social network. You should add…
    1. Your name, address, and your picture
    2. General information about you and your hobbies (Answer)
    3. Your email so that people can contact with you easily

  • Slide the correct answer through the Magic Mirror
    a. You have been chatting with someone for a year. He or she asks y
       1. Ask them to send you a photograph of themselves so you can b
       2. It is ok to meet in person. You have been friends for a year. You
       3. Tell your parents or caregivers about it

    b. One of your friends sent you an email with an attachment. What sh
           1. Stop and think. This attachment could have virus
           2. Open it. Friends never send viruses through email attachme
           3. All attachments are safe
10 minutes

TASK 2
Students will watch the video clip: http://www.brainpop.com/technology/com
Discussion: Strategies to deal with Cyber Bullying.

5 minutes

TASK 3

Students will work in pairs to brainstorm the ideas:

  • What should Jay do?

  • How would you advise him?

5 minutes

Part 3- Consolidation

Role play the best solutions

5 minutes

Part 4-Highlights and Summary
What did we learn about cyber-bullying?

5 minutes

Contenu connexe

Similaire à 9 cyberbulling

1 Cyberbullying introduction.pdf
1 Cyberbullying introduction.pdf1 Cyberbullying introduction.pdf
1 Cyberbullying introduction.pdfAryaStark56
 
Admshs emp tech_q1_m2_netiquettes
Admshs emp tech_q1_m2_netiquettesAdmshs emp tech_q1_m2_netiquettes
Admshs emp tech_q1_m2_netiquettesDexter Dizon
 
Cyber Wellness Power point slides
Cyber Wellness Power point slidesCyber Wellness Power point slides
Cyber Wellness Power point slidesguest7e2cdf
 
Digital etiquette for school staff version 1
Digital etiquette for school staff version 1Digital etiquette for school staff version 1
Digital etiquette for school staff version 1skelleyrobin
 
Digital etiquette for school staff (2)
Digital etiquette for school staff (2)Digital etiquette for school staff (2)
Digital etiquette for school staff (2)skelleyrobin
 
DIgital Citizenship for Parents of Middle School Students
DIgital Citizenship for Parents of Middle School StudentsDIgital Citizenship for Parents of Middle School Students
DIgital Citizenship for Parents of Middle School StudentsLeon Letkeman
 
Cyber safety training for 6th grade
Cyber safety training for 6th gradeCyber safety training for 6th grade
Cyber safety training for 6th gradePamela Taylor
 
Internet 1 lesson plan
Internet 1 lesson planInternet 1 lesson plan
Internet 1 lesson planQuennith
 
#2 4th gr1 ppt internet etiquette xxxxx
#2   4th gr1 ppt internet etiquette xxxxx#2   4th gr1 ppt internet etiquette xxxxx
#2 4th gr1 ppt internet etiquette xxxxxShirley Valera
 
Internet Safety Lesson Plan 1
Internet Safety Lesson Plan 1Internet Safety Lesson Plan 1
Internet Safety Lesson Plan 1Quennith
 
Influencing student behaviour
Influencing student behaviourInfluencing student behaviour
Influencing student behaviourPeter Fenrich
 
Etiquette in the Digital World
Etiquette in the Digital WorldEtiquette in the Digital World
Etiquette in the Digital Worldmgastgoodman
 
Compare&contrast matrix about Edmodo, Grockit, Wikispaces, Pinterest and Scho...
Compare&contrast matrix about Edmodo, Grockit, Wikispaces, Pinterest and Scho...Compare&contrast matrix about Edmodo, Grockit, Wikispaces, Pinterest and Scho...
Compare&contrast matrix about Edmodo, Grockit, Wikispaces, Pinterest and Scho...Elton John Embodo
 
Bullying pp best
Bullying pp bestBullying pp best
Bullying pp besterinmacks
 

Similaire à 9 cyberbulling (20)

Digital citizenship lessonplan_en
Digital citizenship lessonplan_enDigital citizenship lessonplan_en
Digital citizenship lessonplan_en
 
NetiquetteOaks.pptx
NetiquetteOaks.pptxNetiquetteOaks.pptx
NetiquetteOaks.pptx
 
Parents must know about cyber bullying 2
Parents must know about cyber bullying  2Parents must know about cyber bullying  2
Parents must know about cyber bullying 2
 
1 Cyberbullying introduction.pdf
1 Cyberbullying introduction.pdf1 Cyberbullying introduction.pdf
1 Cyberbullying introduction.pdf
 
Admshs emp tech_q1_m2_netiquettes
Admshs emp tech_q1_m2_netiquettesAdmshs emp tech_q1_m2_netiquettes
Admshs emp tech_q1_m2_netiquettes
 
Cyber Wellness Power point slides
Cyber Wellness Power point slidesCyber Wellness Power point slides
Cyber Wellness Power point slides
 
Digital etiquette for school staff version 1
Digital etiquette for school staff version 1Digital etiquette for school staff version 1
Digital etiquette for school staff version 1
 
Digital etiquette for school staff (2)
Digital etiquette for school staff (2)Digital etiquette for school staff (2)
Digital etiquette for school staff (2)
 
DIgital Citizenship for Parents of Middle School Students
DIgital Citizenship for Parents of Middle School StudentsDIgital Citizenship for Parents of Middle School Students
DIgital Citizenship for Parents of Middle School Students
 
Cyber safety training for 6th grade
Cyber safety training for 6th gradeCyber safety training for 6th grade
Cyber safety training for 6th grade
 
Internet 1 lesson plan
Internet 1 lesson planInternet 1 lesson plan
Internet 1 lesson plan
 
#2 4th gr1 ppt internet etiquette xxxxx
#2   4th gr1 ppt internet etiquette xxxxx#2   4th gr1 ppt internet etiquette xxxxx
#2 4th gr1 ppt internet etiquette xxxxx
 
Internet Safety Lesson Plan 1
Internet Safety Lesson Plan 1Internet Safety Lesson Plan 1
Internet Safety Lesson Plan 1
 
Influencing student behaviour
Influencing student behaviourInfluencing student behaviour
Influencing student behaviour
 
Etiquette in the Digital World
Etiquette in the Digital WorldEtiquette in the Digital World
Etiquette in the Digital World
 
Cyber bullying gr8
Cyber bullying gr8Cyber bullying gr8
Cyber bullying gr8
 
Compare&contrast matrix about Edmodo, Grockit, Wikispaces, Pinterest and Scho...
Compare&contrast matrix about Edmodo, Grockit, Wikispaces, Pinterest and Scho...Compare&contrast matrix about Edmodo, Grockit, Wikispaces, Pinterest and Scho...
Compare&contrast matrix about Edmodo, Grockit, Wikispaces, Pinterest and Scho...
 
Online safety
Online safetyOnline safety
Online safety
 
Bullying pp best
Bullying pp bestBullying pp best
Bullying pp best
 
Social Media 2012
Social Media 2012Social Media 2012
Social Media 2012
 

Dernier

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 

Dernier (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 

9 cyberbulling

  • 2. Lesson Title Cyber Bullying Learning Goal (Curriculum Expectations)
  • 3. Students are learning to: • Define the terms: cyber-bullying, spam, cyber space, netiquette, IM • Identify the impact of cyber-bullying • Generate strategies to deal with cyber-bullying situations Lesson Components Part 1-Minds On • Activate prior knowledge on cyber-bullying: Have you ever received o or text message? • Explain and list on the Graphic Organizer: bullying, using internet or a message that hurts or embarrasses someone • Play the video clip http://www.youtube.com/watch?v=fNumIY9D7uY o discuss the impact on the main character: 1. What’s the Problem? How do you think Jay felt? 2. What might Jay think or do? 15 minutes Part 2-Action TASK 1: Students will come on the Promethean Board, one at a time, • Reveal the definitions of the terms: spam, cyber space, netiquette, IM • Click on the computer logo to see the answers: Cyber-bullying is a way of bullying through the use of 1. cyberspace 2. chat rooms 3. cell phone 4. email • Multiple Choice: Someone sent you a nasty text message. What should you do? 1. Send them a text message to ask them to PLEASE STOP! 2. Send a nasty message back 3. Tell your parents, teachers or caregivers (Answer) • Drag the correct answer to the STOP BULLY sign
  • 4. Spam is known as…. 1. Junk mail 2. Texting 3. A brand of food • Click on the correct answers a. You have received junk email. What should you do? Choose 2 ans 1. Save it to your desktop 2. Tell a grownup about it so they can block it (Answer) 3. Open it and read first, then delete it 4. Delete the email before reading it (Answer) b. If you are using email to send a message to your friends make sure 1. You are always polite 2. You use CAPS LOCK for the whole message 3. You ask your parents for permission before you use email • Pull the correct blue tab to check your answer You are creating a profile on a social network. You should add… 1. Your name, address, and your picture 2. General information about you and your hobbies (Answer) 3. Your email so that people can contact with you easily • Slide the correct answer through the Magic Mirror a. You have been chatting with someone for a year. He or she asks y 1. Ask them to send you a photograph of themselves so you can b 2. It is ok to meet in person. You have been friends for a year. You 3. Tell your parents or caregivers about it b. One of your friends sent you an email with an attachment. What sh 1. Stop and think. This attachment could have virus 2. Open it. Friends never send viruses through email attachme 3. All attachments are safe 10 minutes TASK 2
  • 5. Students will watch the video clip: http://www.brainpop.com/technology/com Discussion: Strategies to deal with Cyber Bullying. 5 minutes TASK 3 Students will work in pairs to brainstorm the ideas: • What should Jay do? • How would you advise him? 5 minutes Part 3- Consolidation Role play the best solutions 5 minutes Part 4-Highlights and Summary What did we learn about cyber-bullying? 5 minutes