1. Which of the following activities involve using a type of digital media? (You may circle more than one answer.)
|
|
- Wilfred Pitts
- 7 years ago
- Views:
Transcription
1 Digital Life Which of the following activities involve using a type of digital media? (You may circle more than one answer.) a) Instant messaging b) Playing baseball c) Sending a text message to a friend d) Playing a card game e) Sending a postcard to a friend 2. People use the term 24/7 to describe digital media because: a) This type of media is available 24 hours a day, 7 days a week. b) You need a password with 24 letters and 7 numbers to use digital media. c) There are 24 different kinds of digital media. 3. When digital media is described as being interactive, this means: a) People can make friends on the Internet b) Communication can be two-way c) Both a and b DIGITAL LIFE 101 / ASSESSMENT 14
2 A Creator s Responsibilities 1. Ben downloads songs from a website that doesn t make you pay for songs that normally cost money to download. What Ben is doing is called: a) Plunking b) Plagiarism c) Piracy 2. Which of the following is an example of plagiarism? a) Filming your friends acting out a play you wrote, and sharing the video online b) Writing an c) Copying parts of an essay you found online into your book report for school 3. Layla designed T-shirts online for her debate team. The design used a copyrighted image. Her friends liked the T-shirt so much that Layla decided to sell it to the public online. Selling the T-shirts online was: a) Legal because Layla designed the T-shirt herself b) Illegal because Layla made a profit from someone else s copyrighted work c) Illegal because Layla s friends already have the T-shirts A CREATOR S RESPONSIBILITIES / ASSESSMENT 16
3 Trillion Dollar Footprint 1. True or false: Your digital footprint is all the information about you online that only you post. 2. What kinds of information can make up a digital footprint? a) Online photos b) Comments that others post about you c) Both a and b 3. What kinds of information would make a POSITIVE digital footprint? Circle all that apply. a) Photos of you doing work in the community b) A newspaper article about your soccer team c) A mean comment that you made on a friend s website d) A blog you created to showcase your artwork e) Inappropriate photos of you on a social network site TRILLION DOLLAR FOOTPRINT / ASSESSMENT 18
4 Cyberbullying: Crossing the Line 1. Every time Ricardo messes up in an online game, another player sends him several messages making fun of him. Ricardo thinks the messages are funny, until he gets one that hurts his feelings. True or false: Ricardo is being cyberbullied. 2. Which of the following are examples of cyberbullying? Read each answer choice, and then circle YES or NO accordingly. a) Altering photos of friends in a goofy way, but not in a mean way YES NO b) Making a physical threat online YES NO c) Telling someone that you like them online YES NO d) Physically pushing someone YES NO e) Saying something mean about someone based on their race, gender, ability, religion, or sexual orientation YES NO 3. The answer choices below are examples of comments someone might say online. Each one contains words written in ALL CAPS. Which one would be considered flaming? a) NO WAY! That s SO cool! b) LOL i can t stop laughing c) SERIOUSLY? NOBODY CARES. GET OUT. CYBERBULLYING: CROSSING THE LINE / ASSESSMENT 21
5 Safe Online Talk 1. Marcus, a seventh grader, is chatting with Joel, a friend he knows only through an online virtual world. Joel asks Marcus if he wants to meet in person sometime. Is it okay for Marcus to agree to meet Joel in person by himself? a) Yes b) No 2. Alice is friends with someone who she only knows through an online chat room. Alice knows that when she makes an online-only friend, she needs to be careful. Alice s online friend asks the following three questions. Which question should Alice not answer? a) What bands do you like most? b) Will you promise to keep our friendship secret? c) Isn t it cool that we like the same TV shows? 3. True or false: Flirting with somebody you meet online is safe, as long as you are in control of the situation. SAFE ONLINE TALK / ASSESSMENT 17
e-rate toolkit Cyberbullying: Crossing the Line
e-rate toolkit Cyberbullying: Crossing the Line Lesson Plan Essential Question: When does inappropriate online behavior cross the line to cyberbullying, and what can you do about it? Learning Overview
More informationOnly talk with people online that you know in person Time does not equal trust It doesn t mean you really know the person Be suspicious; ANY person worth having as a friend wouldn t ask you to put yourself
More informationOKAY BINGO. Use Okay Bingo to begin, continue, or re visit these concepts throughout the year.
OKAY BINGO The Okay Bingo Game is part of a larger discussion about bullying, anti bullying, prosocial behaviors, and selfadvocacy for students with intellectual impairments. These are all integral parts
More informationCyberbullyNOT Student Guide to Cyberbullying
CyberbullyNOT Student Guide to Cyberbullying WHAT IS CYBERBULLYING? Cyberbullies use the Internet or cell phones to send hurtful messages or post information to damage people s reputation and friendships.
More informationHSC: All My Own Work. Copyright. Introduction. Module Outline
HSC: All My Own Work Copyright Introduction This module explains copyright and its relevance to students. The Board of Studies NSW gratefully acknowledges permission to quote from and paraphrase information
More informationBullying 101: Guide for Middle and High School Students
Bullying 101: Guide for Middle and High School Students A guide to the basics of bullying, what it is and isn t, the role of students, and tips on what you can do. 952.838.9000 PACERTeensAgainstBullying.org
More informationThe Fruit of the Spirit is Love
The Fruit of the Spirit is Love Pre-Session Warm Up (Galatians 5:22-23) Today we are going to learn more about the fruit of the Spirit called, Love. What do you think of when you hear the word love? A
More informationWebsites & Copyright. INFORMATION SHEET G057v12 April 2014. info@copyright.org.au www.copyright.org.au
INFORMATION SHEET G057v12 April 2014 Websites & Copyright This information sheet is for web developers, bloggers, website designers, startups, businesses and anyone interested in copyright issues relevant
More informationEADS up. stop think connect
EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,
More informationONLINE SAFETY TEACHER S GUIDE:
TEACHER S GUIDE: ONLINE SAFETY LEARNING OBJECTIVES Students will learn how to use the Internet safely and effectively. Students will understand that people online are not always who they say they are.
More informationPEER PRESSURE TEACHER S GUIDE:
TEACHER S GUIDE: PEER PRESSURE LEARNING OBJECTIVES Students will be able to identify peer pressure as both a positive and negative force. Students will understand how peer pressure impacts everyone. Students
More informationWWW.GOSTAFFINGPARTNERS.COM SEPTEMBER 2015. Volume 9, Issue 9 EMPLOYEES OF THE MONTH MANSFIELD OFFICE
WWW.GOSTAFFINGPARTNERS.COM SEPTEMBER 2015 Volume 9, Issue 9 EMPLOYEES OF THE MONTH MANSFIELD OFFICE Adam Sweeney has been selected for Employee of the Month for the Mansfield office. Adam has been on assignment
More informationNational Cybersecurity Awareness Campaign. Kids Presentation
National Cybersecurity Awareness Campaign Kids Presentation About Stop.Think.Connect. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help
More informationMaking a Video Year Six
Making a Video Year Six Unit Overview This children introduces the idea of using photos and videos within a multimedia presentation. Children will cover: - Using a digital camera to take photographs and
More informationYPS Technology, Internet, and Learning Management Systems (LMS) Acceptable Use Agreement (AUP)
YUKON PUBLIC SCHOOLS: DISTRICT POLICY BJ-R1 YPS Technology, Internet, and Learning Management Systems (LMS) Acceptable Use Agreement (AUP) To ensure that our students and employees become proficient in
More informationC-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:
Scenario #1 Jake and the Bad Virus The two major C3 concepts this scenario illustrates are: Cyber Security: Jake compromised his computer s security by providing personal information to an unknown online
More informationMaking Inferences Picture #1
Making Inferences Picture #1 Casey and Josie are standing in front of East Moore Middle School. Making Inferences Picture #2 Sue surprised her friend with a gift. Making Inferences Picture #3 Angela isn
More informationVentura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety
Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Student Policy--SP004 Ventura Charter School of Arts and Global Education ("School") recognizes the
More informationHector s World Lesson Plan Episode: Cyberbullying You re Not Alone Upper primary
Hector s World Lesson Plan Episode: Cyberbullying You re Not Alone Upper primary BACKGROUND Cyberbullying is an increasing problem for children and schools. This lesson addresses the inappropriateness
More informationAppropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness
Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Gordon Cooper Technology Center 2012 From http://onguardonline.gov/ Think Before You Share What you post could have a bigger
More informationHEADS up. stop think connect
HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more
More informationFAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:
FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful
More informationGrade 5 Unit. Lesson 2. Learning Goals. Facility. Materials. Cyberbullying and Lesson 2 of 4
Cyberbullying and Harrassment 30 Minutes* Curriculum Expectations Health and Physical Education - 1.3, C2.2, C3.2 Language: Media - 1.5 Lesson 2 Learning Goals By the end of this lesson, students will
More informationPirate Bay owners plan to fight High Court ruling ordering ISP site block Page 1 of 5. Questions to consider before listening.
Pirate Bay owners plan to fight High Court ruling ordering ISP site block Page 1 of 5 Questions to consider before listening 1. Complete the following mindmap: Piracy 2. How much time do you spend on the
More informationWhat makes a good friend?
What makes a good friend? Cross Curriculum links: En1 3a-e; 4a, b, c En3 1b, 12 PSHCE 4a, c Learning Outcomes: What you need: Understand that there are different kinds of friendship Consider how we might
More informationToday s teens use technology more than ever. Most have
Today s teens use technology more than ever. Most have high-speed Internet access, which they use to send instant messages to their friends, create blogs and online videos, keep personal profiles on social
More informationUNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET
UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET SPEAKING NOTES FOR GRADES 4 TO 6 PRESENTATION SLIDE (1) Title Slide SLIDE (2) Key Points It can be really
More informationthink before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney
think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! A Message from the District Attorney The use and capabilities
More informationEKOLA Junior High School Bilingual Programme Entrance Test (1h15) Sample Paper. Result:
EKOLA Junior High School Bilingual Programme Entrance Test (1h15) Sample Paper Name: Result: Task 1 Which notice says what? For questions 1 5, match the correct letter A H. 1. You do not have to pay extra
More informationCyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 )
Cyber-Bullying - Using technology to repeatedly and on purpose say or do mean or hurtful things to another person who has a hard time defending himself or herself. (Adapted from Olweus, Dan and Susan P.
More informationFinchley Catholic High School. Anti Bullying Policy
Finchley Catholic High School Anti Bullying Policy Bullying can occur through many types of anti-social behaviour: Physical A student can be physically punched, kicked, hit, spat at etc Verbal This can
More informationOur automatic thoughts echo our core beliefs. The more negative our core beliefs are, the more negative our automatic thoughts will be.
cchapter EIGHTb Core beliefs Think Good - Feel Good Paul Stallard Copyright 2002 John Wiley & Sons Ltd ISBN: 0470842903 (Paperback) CORE BELIEFS Core beliefs are the fixed statements ideas that we have
More informationArt-list License Agreement
Art-list License Agreement 1. General 1.1. The Agreement herein is made between you and Art list (or by any other name), the owner of the site: www.art list.io, and it settles the terms and conditions
More informationParent/Teen Cell Phone Survey 2009 Final Revised Topline 10/1/09 Data for June 26 September 24, 2009
Parent/Teen Cell Phone Survey 2009 Final Revised Topline 10/1/09 Data for June 26 September 24, 2009 Princeton Survey Research Associates International for the Pew Internet & American Life Project Sample:
More informationOverall Goal Students will identify and describe traits of positive, successful leaders.
Lesson 3b Leadership at the Movies: Miracle This lesson introduces the students to the trait theory of leadership by using the film Miracle. Use either this lesson or lesson 3a, Invictus, but not both.
More informationGuidelines for Preventing and Dealing with Bullying Issues
Guidelines for Preventing and Dealing with Bullying Issues Stapleford School aims to value all its members, to give all the opportunity to learn, act fairly and celebrate differences between individuals.
More informationTECHNOLOGY. Telecommunication. Tools. What is cyberspace? How does the. Internet work? How do you protect. your computer? Focus
Telecommunication Tools TECHNOLOGY The Internet is like a giant web of computers connected. The Internet is also called the World Wide Web. There are good places to go on the Internet and there are some
More informationE-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
More informationETHICAL VALUES AND OTHER K INDS OF VALUES
3. Defining Ethical V a l u e s ETHICAL VALUES AND OTHER K INDS OF VALUES PURPOSE To help students begin to understand what ethics means To distinguish ethical values from other kinds of values PREPARATION
More informationi-safe America Internet Safety Tips for Parents
i-safe America Internet Safety Tips for Parents Online predators are out there. They can infect your computer with viruses, they want to steal your personal information and possibly your identity, and
More informationStudents will be able to explain the difference between harmless teasing and verbal bullying
LESSON PLAN: I WAS JUST KIDDING! OVERVIEW: Students are asked to consider the difference between good-natured teasing and bullying through discussion of fictional scenarios and reflection on real-life
More informationOnline Safety for Middle and High School
Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET
More informationHow can I improve my interviewing skills? MATERIALS
Mock Interviews 6 Finding a job The BIG Idea How can I improve my interviewing skills? AGENDA Approx. 45 minutes I. Warm Up: Model an Interview (10 minutes) II. Interview Practice (30 minutes) III. Wrap
More informationIntroduction. 1 st Reason. Extension of 1 st reason. Elaboration of 1 st reason. 2nd Reason. Extension of 2nd reason. Elaboration of 2nd reason
A special person is someone who listens to me, makes me laugh and buys me nice presents. Do you have anyone in your life that does those things? I do, and her name is Lucy. Let me tell you more about why
More informationCHAPTER 18 Programming Your App to Make Decisions: Conditional Blocks
CHAPTER 18 Programming Your App to Make Decisions: Conditional Blocks Figure 18-1. Computers, even small ones like the phone in your pocket, are good at performing millions of operations in a single second.
More informationFireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.]
1 Fireside Script INTRO MODERATOR: ALL DIGITAL PRODUCTS LIKE IPODS, CELL PHONES, COMPUTERS, WEBCAMS, DIGITAL CAMERAS AND GAME CONSOLES CONNECT TO WEB 2.0, WHICH ALLOWS US TO UPLOAD AND DOWNLOAD INFORMATION.
More informationAwesome Drinking Games
Awesome Drinking Games Five printable drinking games to play after a dinner party (or anytime!). Includes: Jet Thumb Master Word Builder The Rules The Peg Game These are totally free and easy to use Just
More informationE-Safety Issues and Online Safety. Parents Evening
E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children
More informationHOW TO STAY SAFE. Smartphones
HOW TO STAY SAFE Smartphones Smartphones provide a variety of interesting activities and ways for young people to engage with their friends and families. However, it is important to be aware of what these
More informationA GIRL SCOUT YEAR. If the answer is YES, we want to do all the activities an earn the A Girl Scout Year patch, put the date you decided here:
A GIRL SCOUT YEAR Dear Girl Scouts, Are you ready for a year of fun, friendship and adventure? Do you want to learn how to do new things and be a leader in your community? Then let s get started! Every
More informationSOCIAL NETWORKING SITES
YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING SITES Social networking sites such as Facebook, MySpace and Twitter, are very popular with children,
More informationInternet Acceptable Use Policy
1. Overview Quincy College provides Internet access to students, faculty, staff, and administration as part of its educational mission. When the Internet is used appropriately, it can provide a wealth
More informationSelf-Acceptance. A Frog Thing by E. Drachman (2005) California: Kidwick Books LLC. ISBN 0-9703809-3-3. Grade Level: Third grade
Self-Acceptance A Frog Thing by E. Drachman (2005) California: Kidwick Books LLC. ISBN 0-9703809-3-3 This Book Kit was planned by Lindsay N. Graham Grade Level: Third grade Characteristic Trait: Self Acceptance
More informationGrade 8 Lesson Peer Influence
Grade 8 Lesson Peer Influence Summary This lesson is one in a series of Grade 8 lessons. If you aren t able to teach all the lessons, try pairing this lesson with the Substance and Gambling Information,
More informationPeer. Pressure. Peer Pressure. Peer. Pressure
Property of the International Youth Alliance for Family Planning Peer Pressure What is peer pressure? The feeling that someone your own age is pushing you towards making a certain choice, good or bad.
More informationCyber-bullying is covered by this policy: all members of the community need to be aware that
DUKE OF KENT SCHOOL A8 ANTI-BULLYING POLICY Aims and Objectives: Duke of Kent School values every individual in the community and believes each deserves to be treated with respect. Sensitivity to the feelings
More informationMiddle secondary unit. Ethical use of technology. www.cybersmart.gov.au
www.cybersmart.gov.au Creative Commons These teaching resources on the Cybersmart website s Schools Gateway are now available to schools under Creative Commons licences. The new licensing conditions are
More informationThe 5 P s in Problem Solving *prob lem: a source of perplexity, distress, or vexation. *solve: to find a solution, explanation, or answer for
The 5 P s in Problem Solving 1 How do other people solve problems? The 5 P s in Problem Solving *prob lem: a source of perplexity, distress, or vexation *solve: to find a solution, explanation, or answer
More informationFront Range Christian School ipad Acceptable Use Policy
Introduction Front Range Christian School ipad Acceptable Use Policy Front Range Christian School recognizes that access to technology in school gives students greater opportunities to learn, engage, communicate,
More informationWORKSHEET ONE FIRST ACTIVITY. Treating others with respect. List of ideas for treating others with respect
WORKSHEET ONE FIRST ACTIVITY Have the group brainstorm what they think it means to treat other people with. Write the answers on the whiteboard, if it helps use this list on the worksheet as a guide. List
More informationChapter 3. Online Bullying
Chapter 3 Online Bullying Children and teens often face online cruelty (as well as cruelty in the real world). For younger kids, instant messaging and texting can become platforms for teasing and meanness.
More informationConducting Virtual Meetings
Page 1 oovoo Chat & Video Conferencing Information gathered by, International Faculty 2013 Faculty Training General Information What can I do with oovoo? oovoo offers free high quality video chat and instant
More informationPlanning a Successful Facebook Fan Promotion
Planning a Successful Facebook Fan Promotion 10 things you need to do to make your campaign a success 2014 Copyright Constant Contact, Inc. 14-3931 v1.0 Helping Small Business Do More Business What is
More informationFacebook Guidelines For Parents
Facebook Guidelines For Parents By Jayne A. Hitchcock Copyright 2010 As kids go online at younger and younger ages, parents need to be aware of what they are doing on the Internet, most importantly on
More informationTechnology Acceptable Use Policy
Technology Acceptable Use Policy Introduction San Gabriel Christian School recognizes that access to technology in school gives students greater opportunities to learn, engage, communicate, and develop
More informationGender: Participants define gender and discuss ways it influences their lives.
Gender: Participants define gender and discuss ways it influences their lives. Lesson Plans: 1. Just Because --Stereotypes 2. Gender Lesson: Just Because Stereotypes (adapted from TKF) ESSENTIAL QUESTIONS:
More informationMock Sides, Volume 1: Original Scripts for Workshop Actors. Pimp Bobby. by David Dalton & Chad Schnackel
Pimp Bobby by David Dalton & Chad Schnackel Pages: 3+ Characters: 2 women Tanya, 25-30 Catherine, 40 s Synopsis: Catherine comes to pay her respects at the funeral of her ex-husband, Robert. But it s not
More informationGrand Canyon Council - Social Media Policy
INTRODUCTION It s an exciting time to be part of the BSA for many reasons. One of those is that new communication vehicles now enable current and past Scouts and Scouters, as well those who are interested
More informationCode of Virginia, 1950, as amended, Sections 18.2 372, 18.2 374.1:1, 18.2 390, 22.1 70.2, and 22.1 78
Book Section Title Number Status SCS Policy Manual I INSTRUCTION Acceptable Use of Electronic Network Resources and Internet Safety IIBEA * R Active Legal 18 U.S.C. Sections 1460 and 2256 47 U.S.C. Section
More informationTechnology Acceptable Use Policy. Introduction
Technology Acceptable Use Policy Introduction Shiloh Christian School recognizes that access to technology in school gives students greater opportunities to learn, engage, communicate, and develop skills
More informationTeach your child The Underwear Rule.
1. Teach your child The Underwear Rule. About one in five children falls victim to sexual violence, including sexual abuse. You can help prevent this happening to your child. Teach your child The Underwear
More informationE-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
More informationTraining Materials: Legal Protection
INFORMATION SHEET G037v11 December 2014 Training Materials: Legal Protection In this information sheet, we give a brief overview of copyright law as it applies to the creation and use of training materials.
More informationKeep your English up to date 4. Teacher s pack Lesson plan and student worksheets with answers. Facebook
Keep your English up to date 4 Teacher s pack Lesson plan and student worksheets with answers British Broadcasting Corporation 2008 Lesson Plan: Teacher's notes CONTENTS 1. Level, topic, language, aims,
More informationRetailer Increases Sales with Digital Signage in Stores
Retailer Increases Sales with Digital Signage in Stores Norsk Tipping, the Norwegian lottery, uses the Cisco Digital Media System to promote its games on networked digital signs in 4,500 retail stores.
More informationSTOP. THINK. CONNECT. Online Safety Quiz
STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.
More informationIt was late at night and Smartie the Penguin was WIDE awake He was supposed to be fast asleep but tomorrow was his birthday. He was so excited; all
1 It was late at night and Smartie the Penguin was WIDE awake He was supposed to be fast asleep but tomorrow was his birthday. He was so excited; all he wanted was a new computer! 2 The big day came and
More informationMusic and the Internet. A guide for parents and teachers
Music and the Internet A guide for parents and teachers Music on the internet what you should know There are many great ways of accessing music safely and legally online. This guide aims to keep parents,
More informationHadopi, cultural property and Internet usage: French Internet users' habits and points of view. 2 nd survey - Overview and key figures.
Hadopi, cultural property and Internet usage: French Internet users' habits and points of view. 2 nd survey - Overview and key figures. The full survey will be available for download on http://www.hadopi.fr/
More informationInterview with David Bouthiette [at AMHI 3 times] September 4, 2003. Interviewer: Karen Evans
Interview with David Bouthiette [at AMHI 3 times] September 4, 2003 Interviewer: Karen Evans KE: What we are going to talk about first are your experiences while you were at AMHI, and then we will go on
More informationCourse Overview and Outline
Course Overview and Outline The My Digital Life curriculum is comprised of seven modules that cover key concepts for building digital literacy. Each module contains between three and nine brief activities
More informationThe Respectful Workplace: You Can Stop Harassment: Opening the Right Doors. Taking Responsibility
The Respectful Workplace: Opening the Right Doors You Can Stop Harassment: Taking Responsibility Statewide Training and Development Services Human Resource Services Division Department of Administrative
More informationChapter 1 Introduction to Correlation
Chapter 1 Introduction to Correlation Suppose that you woke up one morning and discovered that you had been given the gift of being able to predict the future. Suddenly, you found yourself able to predict,
More informationCambridge Friendship Questionnaire
Cambridge Friendship Questionnaire Please complete the following background information about yourself and then turn over to fill out the rest of the questionnaire. Name:..... Sex:... Date of birth:...
More informationGirls & Cyber- bullying
MARC Research Results First Report March, 2010 Girls & Cyber- bullying Elizabeth K. Englander, Ph.D. Director, Massachusetts Aggression Reduction Center Bridgewater State University Bridgewater, Massachusetts
More informationChild & Vulnerable Adults Protection Policy 2009 2012
Child & Vulnerable Adults Protection Policy 2009 2012 Contents Introduction 3 Recruitment procedures 4 Responsible adults 5 Unaccompanied children 5 School pupils on work placements 5 Lost children 5 Family
More informationCyber Safety Handbook 2014
Cyber Safety Handbook 2014 Mission & Vision Statements Mission To provide students with an excellent, all-round education in a Christian environment. Cricos No: 01645K Vision Woodcroft College aspires
More informationProtect Your Privacy Online
Protect Your Privacy Online By Kathiann M. Kowalski Keep personal information private for your own good! High school sophomore Karra H. never expected to see herself on a Web site featuring scantily clad
More informationInterview Questions for Secondary Schools Interviews
Interview Questions for Secondary Schools Interviews PART I 1. What is your name? My name is Lu Kin Tsang. My English name is Donald. 2. How old are you? I am twelve years old. 3. Where were you born?
More information2 nd - Watch My Online Neighborhood Video: https://www.commonsensemedia.org/videos/my- online- neighborhood
K- Going Places Safely Essential Question: How do I go places safely on the computer? Students will: discover the Internet can be used to visit far- away places and learn new things; compare how staying
More informationKET for Schools Reading and Writing Part 9 teacher s notes
KET for Schools Reading and Writing Part 9 teacher s notes Description This is a guided discovery activity to find out what candidates need to do in KET for Schools Reading and Writing Part 9. Students
More informationSafety Tips for Social Networking
Internet Safety for Kids & Families Safety Tips for Social Networking As a social medium, the Internet enables young people to stay in touch with friends when they are physically separated from them and
More informationSuggested Answers to Literature Circle Questions
Literature Circle Guide to FRINDLE by Andrew Clements Book Summary Mrs. Granger is notorious among all the fifth grade teachers for being strict, yes, but mostly for her love of words and of the dictionary.
More informationNF5-12 Flexibility with Equivalent Fractions and Pages 110 112
NF5- Flexibility with Equivalent Fractions and Pages 0 Lowest Terms STANDARDS preparation for 5.NF.A., 5.NF.A. Goals Students will equivalent fractions using division and reduce fractions to lowest terms.
More informationWakefield Public Schools Technology Acceptable Use Policy
Wakefield Public Schools Technology Acceptable Use Policy Vision (per Technology Strategic Plan 2013-2016) Wakefield Public Schools considers classroom technology to be an essential, imperative part of
More informationPortmarnock Community School ICT and Social Media Expected Use Policy. June 2013
Portmarnock Community School ICT and Social Media Expected Use Policy June 2013 1.0 Introduction Portmarnock Community School recognizes that access to Information and Communication Technology (ICT) gives
More informationEarn Money Sharing YouTube Videos
Earn Money Sharing YouTube Videos Get Started FREE! Make money every time you share a video, also make money every time the videos you have shared get watched! Unleash The Viral Power of Social Media To
More informationName Total Listening / 100 Total Grammar Part 2 / 50 Total Grammar Part 1 / 50 Grand total / 200
OXFORD PLACEMENT TEST 2 GRAMMAR TEST PART 1 Name Total Listening / 100 Total Grammar Part 2 / 50 Total Grammar Part 1 / 50 Grand total / 200 Look at these examples. The correct answer is indicated in bold.
More information17 Laws of Soccer. LAW 5 The Referee The referee enforces the 17 laws.
17 Laws of Soccer The 17 laws explained below are the basic laws of soccer accepted throughout the world. These laws are usually altered slightly so the game is more fun and beneficial for young players.
More informationSTUDENT HANDBOOK. Policies and Procedures. 1 of 11
STUDENT HANDBOOK Policies and Procedures 2012 2013 1 of 11 GENERAL INFORMATION K-12 schools arrange for Founders Education to deliver comprehensive virtual courses to the school s students. The virtual
More information