11. Why we’re doing this 1. What is the teacher's responsibility in educating his/her students on Internet Safety in the classroom?
12. Why we’re doing this A1. to help reinforce Internet Safety within the context of using the laptops in the classroom
13. Why we’re doing this 2. Where can teachers find additional Internet safety resources?
14. Why we’re doing this A2. http://staffdev.henrico.k12.va.us/netsafety/index.htm
15. Why we’re doing this 3. Instead of trying to teach students what NOT to do when they are online, we need to help them:
16. Why we’re doing this A3. 1) learn to make responsible choices, 2) understand how their actions can hurt others, and 3) understand how their own moral values are reflected in what they post online
17. Social Networking 4. Social network sites include:
18. Social Networking A4. MySpace, Facebook, Friendster, Bebo
19. Social Networking 5. An important point to remember about posting pictures online is:
20. Social Networking A5. The Internet is the real world. Once you post a picture, anyone can have access to it and do anything they want with it.
21. Social Networking 6. What is a teen's favorite way to communicate?
22. Social Networking A6. Chatting online, texting, and Instant Messaging
23. Social Networking 7. When you post information online, which of the following might be ways that your information could potentially be used?
24. Social Networking A7. by an internet predator, by a potential employer, or by a college admissions counselor
25. Social Networking 8. What percent of your students do you think have a social networking website?
26. Social Networking A8. 65%
27. Internet Predators 9. Grooming is:
28. Internet Predators A9. the techniques Internet Predators use to get children to trust them
29. Internet Predators 10. One popular place Internet Predators hang out online to meet children is:
30. Internet Predators A10. Online gaming sites
31. Internet Predators 11. The main goal of an Internet Predator is:
32. Internet Predators A11. Meeting the child in person
33. General Rule 12. Why is it important to keep your password secure?
34. General Rule A12. other people could assume your identity
35. Cyberbullying 13. What is cyberbullying?
36. Cyberbullying A13. sending or posting harmful or cruel information about someone online
37. Cyberbullying 14. What are examples of cyberbullying?
38. Cyberbullying A14. sending cruel messages online, flaming (harrassing) someone online, impersonating someone online, tricking people into revealing personal information
39. Cyberbullying 15. What should you do if you suspect a child in your class is being bullied online?
40. Cyberbullying A15. Save any evidence you have and try to identify the cyberbully. Contact a guidance counselor or administrator.
41. Cyberbullying 16. What could be said to help a student understand why cyberbullying is wrong?
42. Cyberbullying A16. What would happen if your actions were on the front page of the newspaper? How would you feel if someone did this to you? What would you parents say? Would it be OK if you did this in real life?
43. Cyberbullying 17. Why is it easier to be a cyberbully than just a bully?
44. Cyberbullying A17. It's easier to say things on line than it would be face to face because you don't have to see the hurt you are causing.
45. Cyberbullying 18. Which of these tips could help your students think before they bully?
46. Cyberbullying A18. Take 5- close the computer and walk away for 5 minutes before you respond