inquiry project presentation
DESCRIPTION
This is a power up inquiry presentationTRANSCRIPT
![Page 1: Inquiry project presentation](https://reader035.vdocument.in/reader035/viewer/2022081816/54b365934a79595a288b45ed/html5/thumbnails/1.jpg)
Cyberbullying
By Samara and Michelle
![Page 2: Inquiry project presentation](https://reader035.vdocument.in/reader035/viewer/2022081816/54b365934a79595a288b45ed/html5/thumbnails/2.jpg)
❖ When the cyberbully uses his/her power to hurt others then it will affect relationships as no one will like that particular person.
❖ It affects access to opportunities because your employer could easily trace your digital footprints. If you’ve been harmful then there’s a good chance you won’t get accepted.
❖ The cyberbully has the power, they can have consequences by getting in trouble.
Our main inquiry is power through cyberbullying.
How does cyberbullying connect to our Central Idea?
![Page 3: Inquiry project presentation](https://reader035.vdocument.in/reader035/viewer/2022081816/54b365934a79595a288b45ed/html5/thumbnails/3.jpg)
What is our responsibility if we get we get cyber bullied?
How does cyberbullying work?
Main Questions:
![Page 4: Inquiry project presentation](https://reader035.vdocument.in/reader035/viewer/2022081816/54b365934a79595a288b45ed/html5/thumbnails/4.jpg)
Answers to our questions (Samara)
When get cyber bullied you should/should not ● write back● block cyberbullies from your computer ● if the cyberbully goes to your school contact the vice principal ● Tell a friend or adult you trust
This answer connects to our unit because:● The cyberbully has the power● If someone follows these tips● Affecting relationships● cyberbully can lose access to opportunities
What we found out
![Page 5: Inquiry project presentation](https://reader035.vdocument.in/reader035/viewer/2022081816/54b365934a79595a288b45ed/html5/thumbnails/5.jpg)
Answers to our questions (Michelle)Cyberbullying comes in three different categories-Direct Attacks consist of:● Threatening texts, IMs or emails● Creating websites that could be harmful to others
Cyberbullying-by-proxy attacks consist of:● Misusing the internet by targeting others (accomplices) to do for them● Stealing the password of others and locking them out of their own
accountPosting humiliating information and images
What we found out
![Page 6: Inquiry project presentation](https://reader035.vdocument.in/reader035/viewer/2022081816/54b365934a79595a288b45ed/html5/thumbnails/6.jpg)
Primary and secondary resources
Brain Pop video on Digital Etiquette:
Video
www.brainpop.com/technology/computersandinternet/digitaletiquette/ Video
![Page 7: Inquiry project presentation](https://reader035.vdocument.in/reader035/viewer/2022081816/54b365934a79595a288b45ed/html5/thumbnails/7.jpg)
Reflecting on our learning:
Reflecting on our learning…
What we can do to take action...
Taking Action
![Page 8: Inquiry project presentation](https://reader035.vdocument.in/reader035/viewer/2022081816/54b365934a79595a288b45ed/html5/thumbnails/8.jpg)
Our Resources
www.brainpop.com/technology/computersandinternet/digitaletiquette/ Video for slide Finding Out (BrainPop) and Photo’s.
http://www.bullyingstatistics.org/content/text-bullying.html Information-Cyber Bullying
http://www.helpguide.org/mental/cyber-bullying.htm Information- Cyber Bullying
http://thumbs.dreamstime.com/z/computer-cyber-bullying-hands-security-theft-16479290.jpg Image (Title Page)
http://www.simplyclick.net/sc/website/cyberbullying_by_proxy.html Information-Cyber Bullying
http://www.webroot.com/us/en/home/resources/tips/cyberbullying-online-predators/safety-my-child-is-being-cyberbullied Information-Cyber Bullying
Credits
![Page 9: Inquiry project presentation](https://reader035.vdocument.in/reader035/viewer/2022081816/54b365934a79595a288b45ed/html5/thumbnails/9.jpg)