Beruflich Dokumente
Kultur Dokumente
Date: 04/01/2016
Grade: 7
Lesson Topic: Cyber Bullying
Time Line of Lesson: 45 Minutes
Content Area: Technology Application
TEKS: Digital citizenship
The student practices safe, responsible, legal, and ethical behavior while using technology tools
and resources. The student is expected to:
(A) understand copyright principles, including current laws, fair use guidelines, creative
commons, open source, and public domain;
(B) practice ethical acquisition of information and standard methods for citing sources;
(C) practice safe and appropriate online behavior, personal security guidelines, digital identity,
digital etiquette, and acceptable use of technology; and
(D) understand the negative impact of inappropriate technology use, including online bullying
and harassment, hacking, intentional virus setting, invasion of privacy, and piracy such as
software, music, video, and other media.
TEKS Review Committee Recommendations for Technology Applications (October 2010) from
http://tea.texas.gov/
ELPs Standards (Statutory Authority: The provisions of this 74.5 issued under the Texas
Education Code, 7.102(c)(4), 28.002, and 28.025.)
http://ritter.tea.state.tx.us/rules/tac/chapter074/ch074a.html#74.4
Lesson Objectives
In this lesson, we will discuss how to prevent negative communications and how to respond to
cyber harassment and cyberstalking.
Students learn to prevent, stop, and not participate in cyber bullying. This tutorial will discuss the
threats students may encounter while online, and it will show you how to protect them and talk
to them about being safe and responsible.
Such as:
Student learns that a cyber bully is someone that repeatedly uses technology to hurt another
person, individually or as part of a group.
The student learns that some ways that cyber bullies may hurt another person is by harassing
them, impersonating them, intimidating them, isolating them, stalking, creating or helping to
spread false rumors, extortion, name calling and flaming, tricking or terrorizing them.
Student learns that some types of technology that are used by cyber bullies are social
networking sites, text messages, camera phones, instant messages, email, malicious Websites,
chat rooms, blogs, and phones.
Materials:
An operating system (OS) they will be able to use Windows 7 operating system.
When I can use net support school I will able to monitor students
assignments. They cannot play games.
oftware and online tools, students will need access to
the desktop computers in order to use these tools.
From Learning.com and then students need to log in to learning.com, then complete their
assignment related to cyberbullying.
Modifications/Differentiated Instruction
My classroom has 21 students. They are 13 years old. There are 11 males and ten females.
There are different learning style (estimate % of students) visual:% 40, Auditory : 20 % and
kinesthetic : % 40. I modified lesson for ESL and SPED students because I have two students
with ADHD and one of them dyslexia. Also, I have several ESL students. I have diverse
students - 3 of them Asian, 10 Mexican, 5 African American, and 3 Caucasian.
- I am going to give more time for SPED students and additional vocabulary for ESL students.
- For the GT students given not extra assignment but we can provide advance level content.
Evaluation:
Student Performance
I will see how many of my students learned the material well. Observe them on how they are
doing with this new knowledge and also see if I can improve anything.
Closure:
Assessment will be done throughout the project as well as, when the final project is completed.
Students will be assessed for accuracy, completeness, quality of information received, and
quality of presentations to determine skill level achieved.
The lesson will be improved in the future.