SlideShare ist ein Scribd-Unternehmen logo
1 von 35
Cyberbullying
What is cyberbullying? Cyberbullying in any kind of negative virtual communication.
There are many ways to bully someone other than just sending them a message.
Ways of Cyberbullying ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Instant messaging Sending threatening messages through IM’s or texting.  Sending warning messages not to tell on them. Creating screen names that are 1 letter away from someone else’s screen name and sending offensive messages Texting wars and death threats
Stealing passwords Student’s may steal passwords and access other’s accounts to send offensive messages to anger them. Students may gain access to an account and then change the settings to lock them out.
Blogs Blogs are used as online journals to write damaging thing about someone’s reputation.
Web Sites Web sites are created to insult another student or a group of students.  Students also post pictures and personal information about other students.
Sending pictures through cell phones and email Sending degrading photos through e-mails; the emails can then be passed around to hundreds of emails within hours. New cell phones are now able to send photos and can be spread to an entire address book at once.
Sending Malicious Code Student send viruses, spyware and hacking programs to other computers as a form of harassment. Some programs can even give the student access to a victims computer.
Impersonation When a student impersonates another students they usually do this in a chat room.  The students reveals personal information that could include name, address and phone number.  This could lead to an attack on the victim.
Prevention Understand that teasing, threats and taking over someone’s identity are all forms of bullying. If this happens to you report the behaviors to an adult. Parents
Parents Tell you parents. Parents need to inform you school counselor of the cyberbullying. Parents need to tell your doctor. It may be necessary to have counseling until the problems are resolved. Netiquette
[object Object],[object Object],[object Object],Go to Quiz
[object Object],[object Object],[object Object],[object Object]
Go read for the answer again. Read here
Instant messaging Sending threatening messages through IM’s or texting.  Sending warning messages not to tell on them. Creating screen names that are 1 letter away from someone else’s screen name and sending offensive messages Texting wars and death threats Go back to question
NEXT QUESTION
[object Object],[object Object],[object Object],[object Object]
Go read for the answer again. Read here
Stealing passwords Student’s may steal passwords and access other’s accounts to send offensive messages to anger them. Students may gain access to an account and then change the settings to lock them out.  Go back to question
NEXT QUESTION
[object Object],[object Object],[object Object],[object Object]
Go read for the answer again. Read here
Web Sites Web sites are created to insult another student or a group of students.  Students also post pictures and personal information about other students.  Go back to question
NEXT QUESTION
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Go read for the answer again. Read here
Sending pictures through cell phones and email Sending degrading photos through e-mails; the emails can then be passed around to hundreds of emails within hours. New cell phones are now able to send photos and can be spread to an entire address book at once.  Go back to question
NEXT QUESTION
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Go read for the answer again. Read here
Sending Malicious Code Student send viruses, spyware and hacking programs to other computers as a form of harassment. Some programs can even give the student access to a victims computer.  Go back to question  Impersonation When a student impersonates another students they usually do this in a chat room.  The students reveals personal information that could include name, address and phone number.  This could lead to an attack on the victim.
NEXT PAGE
Congratulations  you have just finished  your Cyberbullying training.

Weitere Àhnliche Inhalte

Was ist angesagt?

Internet saftey
Internet safteyInternet saftey
Internet safteyryanbud
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles schoolesksaints
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet SafetyKigose
 
Internet safety
Internet safetyInternet safety
Internet safetyjld1018
 
Digital citizenship contract
Digital citizenship contractDigital citizenship contract
Digital citizenship contractClaire Amos
 

Was ist angesagt? (6)

Internet saftey
Internet safteyInternet saftey
Internet saftey
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles school
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Digital citizenship contract
Digital citizenship contractDigital citizenship contract
Digital citizenship contract
 

Andere mochten auch

Project2
Project2Project2
Project2Joe Morgan
 
Herramientas de Comunicación 2.0
Herramientas de Comunicación 2.0Herramientas de Comunicación 2.0
Herramientas de Comunicación 2.0RubĂ©n CĂĄrdenas
 
Understanding what attributes can sustain 5 s for_slideshare
Understanding what attributes can sustain 5 s for_slideshareUnderstanding what attributes can sustain 5 s for_slideshare
Understanding what attributes can sustain 5 s for_slideshareSubikash Roy
 
Workshop 25.05.2016 a SPS Italia - SENECA LET'S - VPN Connectivity Solutions
Workshop 25.05.2016 a SPS Italia - SENECA LET'S - VPN Connectivity SolutionsWorkshop 25.05.2016 a SPS Italia - SENECA LET'S - VPN Connectivity Solutions
Workshop 25.05.2016 a SPS Italia - SENECA LET'S - VPN Connectivity SolutionsSENECA
 
5 s checklist practice - kaizenvietnam, inc
5 s  checklist practice - kaizenvietnam, inc5 s  checklist practice - kaizenvietnam, inc
5 s checklist practice - kaizenvietnam, incDao Nguyen
 
5S Implementation - The first step to continuous improvement
5S Implementation - The first step to continuous improvement5S Implementation - The first step to continuous improvement
5S Implementation - The first step to continuous improvementAdrian Oprea
 
5S Workshop &Visual management - Krishna Heda
5S Workshop &Visual management - Krishna Heda5S Workshop &Visual management - Krishna Heda
5S Workshop &Visual management - Krishna Hedakrishnaheda
 
Dispositivi GSM/GPRS per applicazioni universali
Dispositivi GSM/GPRS per applicazioni universaliDispositivi GSM/GPRS per applicazioni universali
Dispositivi GSM/GPRS per applicazioni universaliSENECA
 
PresentaciĂł taller conta contes (2)
PresentaciĂł taller conta contes (2)PresentaciĂł taller conta contes (2)
PresentaciĂł taller conta contes (2)JanetSelma
 
10 Tips for WeChat
10 Tips for WeChat10 Tips for WeChat
10 Tips for WeChatChris Baker
 
Benefits of drinking water
Benefits of drinking waterBenefits of drinking water
Benefits of drinking waterEason Chan
 
20 Ideas for your Website Homepage Content
20 Ideas for your Website Homepage Content20 Ideas for your Website Homepage Content
20 Ideas for your Website Homepage ContentBarry Feldman
 

Andere mochten auch (17)

Project2
Project2Project2
Project2
 
Herramientas de Comunicación 2.0
Herramientas de Comunicación 2.0Herramientas de Comunicación 2.0
Herramientas de Comunicación 2.0
 
World lit.
World lit.World lit.
World lit.
 
Understanding what attributes can sustain 5 s for_slideshare
Understanding what attributes can sustain 5 s for_slideshareUnderstanding what attributes can sustain 5 s for_slideshare
Understanding what attributes can sustain 5 s for_slideshare
 
Hoisting
HoistingHoisting
Hoisting
 
Workshop 25.05.2016 a SPS Italia - SENECA LET'S - VPN Connectivity Solutions
Workshop 25.05.2016 a SPS Italia - SENECA LET'S - VPN Connectivity SolutionsWorkshop 25.05.2016 a SPS Italia - SENECA LET'S - VPN Connectivity Solutions
Workshop 25.05.2016 a SPS Italia - SENECA LET'S - VPN Connectivity Solutions
 
5 s checklist practice - kaizenvietnam, inc
5 s  checklist practice - kaizenvietnam, inc5 s  checklist practice - kaizenvietnam, inc
5 s checklist practice - kaizenvietnam, inc
 
5S Implementation - The first step to continuous improvement
5S Implementation - The first step to continuous improvement5S Implementation - The first step to continuous improvement
5S Implementation - The first step to continuous improvement
 
5S Workshop &Visual management - Krishna Heda
5S Workshop &Visual management - Krishna Heda5S Workshop &Visual management - Krishna Heda
5S Workshop &Visual management - Krishna Heda
 
Dispositivi GSM/GPRS per applicazioni universali
Dispositivi GSM/GPRS per applicazioni universaliDispositivi GSM/GPRS per applicazioni universali
Dispositivi GSM/GPRS per applicazioni universali
 
Hikayat Patani
Hikayat PataniHikayat Patani
Hikayat Patani
 
Sakura Mengorak Kelopak
Sakura Mengorak KelopakSakura Mengorak Kelopak
Sakura Mengorak Kelopak
 
Panduan Pengendalian Blog
Panduan Pengendalian BlogPanduan Pengendalian Blog
Panduan Pengendalian Blog
 
PresentaciĂł taller conta contes (2)
PresentaciĂł taller conta contes (2)PresentaciĂł taller conta contes (2)
PresentaciĂł taller conta contes (2)
 
10 Tips for WeChat
10 Tips for WeChat10 Tips for WeChat
10 Tips for WeChat
 
Benefits of drinking water
Benefits of drinking waterBenefits of drinking water
Benefits of drinking water
 
20 Ideas for your Website Homepage Content
20 Ideas for your Website Homepage Content20 Ideas for your Website Homepage Content
20 Ideas for your Website Homepage Content
 

Ähnlich wie Keenright591 Interactive Presentation

Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among studentsjune21harsh
 
The Hazards Of Cyberbullying
The Hazards Of CyberbullyingThe Hazards Of Cyberbullying
The Hazards Of CyberbullyingIC
 
Ppt cyberbullying
Ppt cyberbullyingPpt cyberbullying
Ppt cyberbullying3610Instructor
 
Ppt cyberbullying
Ppt cyberbullyingPpt cyberbullying
Ppt cyberbullying3610Instructor
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingAntolduvai
 
Abhishek cyber bullying
Abhishek   cyber bullyingAbhishek   cyber bullying
Abhishek cyber bullyingparulata
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010adewolfe
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingTeamBanana
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingsmeech
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipPantegoChristian
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingguestb1fb9
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingpscl
 
eSmart Cybersafety
eSmart CybersafetyeSmart Cybersafety
eSmart Cybersafetytekwire
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxDominicCaling
 
Internet Safety
Internet SafetyInternet Safety
Internet SafetyStaci Trekles
 
Students I Safety
Students I SafetyStudents I Safety
Students I SafetyDesiree Caskey
 
Cyberbullying
CyberbullyingCyberbullying
CyberbullyingA27alex27A
 

Ähnlich wie Keenright591 Interactive Presentation (20)

Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among students
 
The Hazards Of Cyberbullying
The Hazards Of CyberbullyingThe Hazards Of Cyberbullying
The Hazards Of Cyberbullying
 
Cyberbullying year7
Cyberbullying year7Cyberbullying year7
Cyberbullying year7
 
Ppt cyberbullying
Ppt cyberbullyingPpt cyberbullying
Ppt cyberbullying
 
Ppt cyberbullying
Ppt cyberbullyingPpt cyberbullying
Ppt cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Abhishek cyber bullying
Abhishek   cyber bullyingAbhishek   cyber bullying
Abhishek cyber bullying
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
eSmart Cybersafety
eSmart CybersafetyeSmart Cybersafety
eSmart Cybersafety
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 

KĂŒrzlich hochgeladen

Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Visit to a blind student's school🧑‍🩯🧑‍🩯(community medicine)
Visit to a blind student's school🧑‍🩯🧑‍🩯(community medicine)Visit to a blind student's school🧑‍🩯🧑‍🩯(community medicine)
Visit to a blind student's school🧑‍🩯🧑‍🩯(community medicine)lakshayb543
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...SeĂĄn Kennedy
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
HỌC TỐT TIáșŸNG ANH 11 THEO CHÆŻÆ NG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIáșŸT - Cáșą NĂ...
HỌC TỐT TIáșŸNG ANH 11 THEO CHÆŻÆ NG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIáșŸT - Cáșą NĂ...HỌC TỐT TIáșŸNG ANH 11 THEO CHÆŻÆ NG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIáșŸT - Cáșą NĂ...
HỌC TỐT TIáșŸNG ANH 11 THEO CHÆŻÆ NG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIáșŸT - Cáșą NĂ...Nguyen Thanh Tu Collection
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 

KĂŒrzlich hochgeladen (20)

Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Visit to a blind student's school🧑‍🩯🧑‍🩯(community medicine)
Visit to a blind student's school🧑‍🩯🧑‍🩯(community medicine)Visit to a blind student's school🧑‍🩯🧑‍🩯(community medicine)
Visit to a blind student's school🧑‍🩯🧑‍🩯(community medicine)
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
HỌC TỐT TIáșŸNG ANH 11 THEO CHÆŻÆ NG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIáșŸT - Cáșą NĂ...
HỌC TỐT TIáșŸNG ANH 11 THEO CHÆŻÆ NG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIáșŸT - Cáșą NĂ...HỌC TỐT TIáșŸNG ANH 11 THEO CHÆŻÆ NG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIáșŸT - Cáșą NĂ...
HỌC TỐT TIáșŸNG ANH 11 THEO CHÆŻÆ NG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIáșŸT - Cáșą NĂ...
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 

Keenright591 Interactive Presentation

  • 2. What is cyberbullying? Cyberbullying in any kind of negative virtual communication.
  • 3. There are many ways to bully someone other than just sending them a message.
  • 4.
  • 5. Instant messaging Sending threatening messages through IM’s or texting. Sending warning messages not to tell on them. Creating screen names that are 1 letter away from someone else’s screen name and sending offensive messages Texting wars and death threats
  • 6. Stealing passwords Student’s may steal passwords and access other’s accounts to send offensive messages to anger them. Students may gain access to an account and then change the settings to lock them out.
  • 7. Blogs Blogs are used as online journals to write damaging thing about someone’s reputation.
  • 8. Web Sites Web sites are created to insult another student or a group of students. Students also post pictures and personal information about other students.
  • 9. Sending pictures through cell phones and email Sending degrading photos through e-mails; the emails can then be passed around to hundreds of emails within hours. New cell phones are now able to send photos and can be spread to an entire address book at once.
  • 10. Sending Malicious Code Student send viruses, spyware and hacking programs to other computers as a form of harassment. Some programs can even give the student access to a victims computer.
  • 11. Impersonation When a student impersonates another students they usually do this in a chat room. The students reveals personal information that could include name, address and phone number. This could lead to an attack on the victim.
  • 12. Prevention Understand that teasing, threats and taking over someone’s identity are all forms of bullying. If this happens to you report the behaviors to an adult. Parents
  • 13. Parents Tell you parents. Parents need to inform you school counselor of the cyberbullying. Parents need to tell your doctor. It may be necessary to have counseling until the problems are resolved. Netiquette
  • 14.
  • 15.
  • 16. Go read for the answer again. Read here
  • 17. Instant messaging Sending threatening messages through IM’s or texting. Sending warning messages not to tell on them. Creating screen names that are 1 letter away from someone else’s screen name and sending offensive messages Texting wars and death threats Go back to question
  • 19.
  • 20. Go read for the answer again. Read here
  • 21. Stealing passwords Student’s may steal passwords and access other’s accounts to send offensive messages to anger them. Students may gain access to an account and then change the settings to lock them out. Go back to question
  • 23.
  • 24. Go read for the answer again. Read here
  • 25. Web Sites Web sites are created to insult another student or a group of students. Students also post pictures and personal information about other students. Go back to question
  • 27.
  • 28. Go read for the answer again. Read here
  • 29. Sending pictures through cell phones and email Sending degrading photos through e-mails; the emails can then be passed around to hundreds of emails within hours. New cell phones are now able to send photos and can be spread to an entire address book at once. Go back to question
  • 31.
  • 32. Go read for the answer again. Read here
  • 33. Sending Malicious Code Student send viruses, spyware and hacking programs to other computers as a form of harassment. Some programs can even give the student access to a victims computer. Go back to question Impersonation When a student impersonates another students they usually do this in a chat room. The students reveals personal information that could include name, address and phone number. This could lead to an attack on the victim.
  • 35. Congratulations you have just finished your Cyberbullying training.