Upload
guesta49bcf
View
446
Download
1
Embed Size (px)
DESCRIPTION
Cyber Bullying by Mark Carandang of Grade 4 A, DLSZ
Citation preview
Lab RulesPlaying of computer games of any kind is
prohibited unless instructed by the teacherAccessing of websites not related to the day’s
lesson is prohibited unless instructed by the teacher
No eating and drinking inside the labNobody is allowed inside the lab outside class
hours
Grading ComponentsHands-on 30%Seatworks 20%Quizzes 20%Long Tests 20%Assignment 10% Total 100%
Course Outline – Grade 4FIRST TERM SECOND TERM THIRD TERM
Microsoft PowerPoint
I. Introduction· Use and Importance· Terminologies· PowerPoint Software
InterfaceII. Creating a presentation
· Creating, saving, closing a presentation
III. Editing a presentation· Opening a presentation· Inserting Common
Microsoft Components· Undo and Redo· Applying Animations
IV. Formatting a Presentation· Modifying common
Microsoft Components· Slideshows
Microsoft Word Basics I. Introduction
a. Use and Importanceb. Terminologiesc. Menus & Commandsd. Toolbars & Shortcuts
II. Creating a Document
a. Creating a Blank Documentb. Writing onto a Documentc. Saving a Documentd. Closing a Documente. Printing a Document
III. Editing a Document
a. Inserting, Selecting & Deleting Text
b. Formatting Texts c. Formatting Toolbar commands
1. Bold, Italicized, and Underline
2. Indentions, Alignmentd. Standard Toolbar commands
1. Cut, Copy & Paste2. Undo & Redo3. Columns
e. Find & Replace
Advanced Microsoft Word I. Formatting a Document
a. Formatting Paragraphsb. Header & Footerc. Borders, Bullets & Numberingd. Inserting…
1. Pictures2. AutoShapes3. WordArt4. Textbox5. Symbols6. Tables7. Charts
Course Outline – Grade 5FIRST TERM SECOND TERM THIRD TERM
Microsoft PowerPoint Advance I. Refresher Coursea.Creating, Saving, and Closing a Presentationb.Editing a Presentationc.Formatting a Presentation II. Task Pane Functions III. Hyperlink IV. Creating Effective Presentations
a. Effective font sizeb. Background color combinationsc. Effective use of soundsd. Effective use of animations
V. Presentation skills
e. Reading and Explainingf. Practicing Timed Presentations
VI. Applications
a. Subject Integrations:A. Math ProblemsB. Science TopicsC. Physical Education skillsD. English and Filipino
Topics
Microsoft Excel Basic I. Introduction
a. Use and Importanceb. Terminologiesc. Menus & Commandsd. Toolbars & Shortcuts
II. Creating a Workbooka.Creating a workbook and worksheetsb.Saving and Closing a workbook III. Formatting Cells in a workbook/worksheetc.Ways of inserting texts in a celld.Formatting Texts and Cellse.Ways of Copying, Cutting and Pasting data into a cell IV. Working with Charts a. Relationship with data b. Creating charts c. Formatting Charts
Microsoft Excel Advance I. Basic Formula
a. Addingb. Subtractingc. Multiplyingd. Dividing
II. Using Functions
a. Sumb. Averagec. Maximum and Minimumd. Count
III. More Features
a. Inserting Commentsb. AutoFilter
Grade 5
Tech NewsFirst ten minutes of class will be devoted to
our Tech NewsEvery meeting, two students (by CN) should
bring a news clip about any interesting computer-related news
Cyber Bullying
TECHNOLOGY HOW IS IT USED TO BULLY OTHERS?
Ex: Cellphones Sending rude messages
What is cyberbullying for you?
OthersHurt others’ feelings
Effects of Cyberbullying
What do you think you can do to prevent cyber bullying?
What will you do when you encounter cyber bullying? What do you think are possible actions that you can do to educate cyber bullies?
What do you think can a victim do about cyber bullying
Cyber BullyingCyber bullying can occur 24/7 and invade
home/personal spaceThe audience can be very large and reached
rapidlyPeople who cyberbully may attempt to remain
anonymous
Cyber BullyingSome cyber bullying is unintentionalMany cyber bullying incidents can
themselves act as evidence
Understanding the TechnologyTECHNOLOGY ACTIVITIES POSSIBLE CYBER
BULLYING
Cellphones Talking, texting, sending images
Sending nasty calls and messagesTaking and sharing humiliating images
Instant Messaging (YM, Skype, etc.)
Chatting, sending images
Hacking into someone else’s accountSending rude messages
Email Sending messages and images
Sending unwanted mail and rude messages
Webcam Record photographs or videos
Persuading someone to do something against his or her will
Understanding the TechnologyTECHNOLOGY ACTIVITIES POSSIBLE CYBER
BULLYING
Social Networking Sites (Facebook, Multiply, Friendster, etc.)
Keep in touch with friends
Posting nasty commentsHacking into someone else’s accountCreating a fake profile to pretend he or she is somebody else
Video Hosting Sites (Youtube, Google Video, etc)
Sharing video clips Posting inappropriate and embarrassing video clips
Gaming Sites Gaming with friends Name callingAbusive remarksNasty messages
Preventing Cyber BullyingAlways respect othersThink before you sendTreat your password like your toothbrush
Responding to Cyber BullyingBlock the bullyDon’t retaliate or replySave the evidenceMake sure you tell
TeachersParentsService providers
RecapWhat is cyber bullying?How do you prevent cyber bullying?How do you respond to cyber bullying?