Sie sind auf Seite 1von 3

Inquiry/problem-solving Lesson Plan.

Teacher Name: Seref Yagli

Date: 04/01/2016

Grade: 7
Lesson Topic: Cyber Bullying
Time Line of Lesson: 45 Minutes
Content Area: Technology Application
TEKS: Digital citizenship
The student practices safe, responsible, legal, and ethical behavior while using technology tools
and resources. The student is expected to:
(A) understand copyright principles, including current laws, fair use guidelines, creative
commons, open source, and public domain;
(B) practice ethical acquisition of information and standard methods for citing sources;
(C) practice safe and appropriate online behavior, personal security guidelines, digital identity,
digital etiquette, and acceptable use of technology; and
(D) understand the negative impact of inappropriate technology use, including online bullying
and harassment, hacking, intentional virus setting, invasion of privacy, and piracy such as
software, music, video, and other media.
TEKS Review Committee Recommendations for Technology Applications (October 2010) from
http://tea.texas.gov/
ELPs Standards (Statutory Authority: The provisions of this 74.5 issued under the Texas
Education Code, 7.102(c)(4), 28.002, and 28.025.)
http://ritter.tea.state.tx.us/rules/tac/chapter074/ch074a.html#74.4
Lesson Objectives
In this lesson, we will discuss how to prevent negative communications and how to respond to
cyber harassment and cyberstalking.
Students learn to prevent, stop, and not participate in cyber bullying. This tutorial will discuss the
threats students may encounter while online, and it will show you how to protect them and talk
to them about being safe and responsible.
Such as:
Student learns that a cyber bully is someone that repeatedly uses technology to hurt another
person, individually or as part of a group.
The student learns that some ways that cyber bullies may hurt another person is by harassing
them, impersonating them, intimidating them, isolating them, stalking, creating or helping to
spread false rumors, extortion, name calling and flaming, tricking or terrorizing them.

Student learns that some types of technology that are used by cyber bullies are social
networking sites, text messages, camera phones, instant messages, email, malicious Websites,
chat rooms, blogs, and phones.
Materials:

An operating system (OS) they will be able to use Windows 7 operating system.
When I can use net support school I will able to monitor students
assignments. They cannot play games.
oftware and online tools, students will need access to
the desktop computers in order to use these tools.

Introduction (Set Induction/Anticipatory Set + Specific Content to be taught)


Prepare the environment. The teacher will ensure that the computer are working before the
period. Teacher will also need to check that any power and connectivity issues have been
solved.
Prepare the learners. The Teacher will need to ensure that students have their usernames and
passwords to access the online digital tools. They should also know how to log into the desktop.
Provide the learning experience. The plan is to have several lessons in which students will be
introduced to the digital tools in question, shown how to use them, and given the opportunity to
explore how they might decide which one to use
Introduce the idea of cyberbullying. The teacher will need to ensure that students sign
Appropriate Uses and Digital Citizenship school handbook pages and explain about
consequences.
Student learns that some ways that cyber bullies may hurt another person is by harassing them,
impersonating them, intimidating them, isolating them, stalking, creating or helping to spread
false rumors,
-up
The students will watch a video about cyber bullying and then a 5-minute review will be done
about what students should be learning from the lesson.
Instructional Activities and Procedures:
Divide the class into two groups. One of them will start a discussion about cyber bullying. One of
the groups will explain what cyberbullying is, and the other group will explain how to prevent
cyber bullying

From Learning.com and then students need to log in to learning.com, then complete their
assignment related to cyberbullying.

Modifications/Differentiated Instruction
My classroom has 21 students. They are 13 years old. There are 11 males and ten females.
There are different learning style (estimate % of students) visual:% 40, Auditory : 20 % and
kinesthetic : % 40. I modified lesson for ESL and SPED students because I have two students
with ADHD and one of them dyslexia. Also, I have several ESL students. I have diverse
students - 3 of them Asian, 10 Mexican, 5 African American, and 3 Caucasian.
- I am going to give more time for SPED students and additional vocabulary for ESL students.
- For the GT students given not extra assignment but we can provide advance level content.

Evaluation:
Student Performance
I will see how many of my students learned the material well. Observe them on how they are
doing with this new knowledge and also see if I can improve anything.

Closure:
Assessment will be done throughout the project as well as, when the final project is completed.
Students will be assessed for accuracy, completeness, quality of information received, and
quality of presentations to determine skill level achieved.
The lesson will be improved in the future.

Das könnte Ihnen auch gefallen