Print

Student Handout 3 - Quiz: Cyber Bullying Recognition

Name:  ______________________________________________________

 

1. Cyber bullying is the use of technology to

a. humiliate or embarrass someone.

b. cause someone to feel alone and friendless.

c. frighten or belittle someone.

d. All of the above.

2. The four traits of bullying behavior are

a. anger, revenge, jealousy, fear

b. aggression, intention, ongoing cycle, unequal power

c. lonely, depressed, nervous, afraid

d. None of the above.

3. A cyber bully is usually someone who

a. is popular at school.

b. enjoys making people upset.

c. is easily hurt and shy.

d. All of the above.

4. A victim of cyber bullying

a. can do nothing to stop the cycle.

b. feels unable to defend him or herself against the cyber bully or group.

c. is more likely to become a cyber-bully.

d. b and c

5. List the three roles in a cyber-bullying situation:



Lesson Plan - Understanding the Cycle: A Lesson on Cyber Bullying Recognition (Digital)

Students come to understand that cyber bullying is a cyclical pattern of behavior initiated and perpetuated through electronic means. They closely examine a scholarly definition in order to identify the roles in a cyber bullying situation, distinguish cyber bullying from social conflict, and determine the power of the upstander in breaking the cycle.

Teacher Reference Page - Quick Guide to Digital Programming: Delivery Methods & Instructions

Students closely follow the story and interactive lesson about text message etiquette featuring Dot & i. Students tje practice digital etiquette through follow-up activities and discussion. This lesson includes a lesson plan, printable activity pages, and interactive multimedia resources.

Teacher Reference Page - Answer Key to Understanding the Cycle Activities

Students come to understand that cyber bullying is a cyclical pattern of behavior initiated and perpetuated through electronic means. They closely examine a scholarly definition in order to identify the roles in a cyber bullying situation, distinguish cyber bullying from social conflict, and determine the power of the upstander in breaking the cycle.

Student Handout 1 - Worksheet: Think About It:Cyber Bullying Cycle

Students come to understand that cyber bullying is a cyclical pattern of behavior initiated and perpetuated through electronic means. They closely examine a scholarly definition in order to identify the roles in a cyber bullying situation, distinguish cyber bullying from social conflict, and determine the power of the upstander in breaking the cycle.

Student Handout 2 - Worksheet: Guided Practice: Positive vs. Negative Technology Use

Students come to understand that cyber bullying is a cyclical pattern of behavior initiated and perpetuated through electronic means. They closely examine a scholarly definition in order to identify the roles in a cyber bullying situation, distinguish cyber bullying from social conflict, and determine the power of the upstander in breaking the cycle.

Student Handout 4 - Empowerment: Persuasive Writing Template

Students come to understand that cyber bullying is a cyclical pattern of behavior initiated and perpetuated through electronic means. They closely examine a scholarly definition in order to identify the roles in a cyber bullying situation, distinguish cyber bullying from social conflict, and determine the power of the upstander in breaking the cycle.

Student Handout 5 - Empowerment: STRR Avatar Storyboard Template

Students come to understand that cyber bullying is a cyclical pattern of behavior initiated and perpetuated through electronic means. They closely examine a scholarly definition in order to identify the roles in a cyber bullying situation, distinguish cyber bullying from social conflict, and determine the power of the upstander in breaking the cycle.

Terms of Use

ISAFE Digital Learning© content may NOT be shared with other educators (e.g., faculty or staff) in any school or district which is not currently covered by your school’s or district’s Subscription and License Agreement; may NOT be duplicated or published (e.g., websites, blogs or other means of public display) for any reason except for your classroom use; may ONLY be used for students to in your current classroom.

Duplication, sale, resale and any other form of unauthorized use of ISAFE Digital Learning copyrighted materials is prohibited and, therefore, a violation of law.