Whether it"s posting windy pictures, society statuses, or an individual messages, cyber bullying takes numerous forms. The most famous cyber bullying strategies are:


*

Joe and also Alec"s virtual exchange obtained angrier and also angrier. Insults were flying. Joe warned Alec to watch his earlier in school the following day.

You are watching: Which of the following is an example of safe behavior online


*

Sara report to the primary that Kayla to be bullying another student. When Sara obtained home, she had 35 angry messages in she e-mail box. The cotton cruel messages maintained coming - part from complete strangers.

Denigration

"Dissing" someone online. Sending or posting gossip or rumors around a person to damages his or her reputation or friendships.
*

Some boys produced a "We hate Joe" web site whereby they posted jokes, cartoons, gossip, and rumors, every dissing Joe.

Impersonation

Pretending to be who else and also sending or posting product to get that human being in trouble or risk or to damages that person"s call or friendships.
*

Laura watched very closely as Emma logged top top to she account and also discovered her password. Later, Laura logged on come Emma"s account and also sent a hurtful message to Emma"s boyfriend, Adam.
*

Greg, an obese high school student, was an altering in the locker room after gym class. Matt take it a photo of him through his mobile camera. Within seconds, the picture was flying around the phones in ~ school.

Trickery

talking someone into revealing secrets or awkward information, then sharing it online.
Katie sent out a post to Jessica pretending come be her friend and also asking many questions. Jessica responded, share really an individual information. Katie forwarded the article to numerous other world with her own comment, "Jessica is a loser."
Millie tries difficult to right in through a group of girl at school. She recently got on the "outs" v a leader in this group. Now Millie has been clogged from the friendship web links of every one of the girls.

Cyberstalking

Repeated, intense harassment and denigration that contains threats or creates far-reaching fear.
When Annie broke up through Sam, he sent out her many angry, threatening, pleading messages. He spread nasty rumors about her to she friends and also posted a sexually suggestive photo she had offered him in a sex-oriented conversation group, along with her e-mail address and mobile number.
Undermining confidenceCausing stress and also hurtful wellness effectsAffecting performance and attendance in schoolDepression and a feeling of loneliness
Freeware - Software found online that the writer has preferred to make available to everyone without any kind of restrictions
TEACHERS and ugandan-news.comCATORS

These four standards determine if a work-related is being used ugandan-news.comcationally:


If there will be no rugandan-news.comction in sales due to the fact that of copy or distribution, the fair use exemption is likely to apply. This is the most important of the four tests for fair use.
works CITED

An easy and also foolproof means to safely use someone else"s occupational is come cite all of your sources and also quotations and also then include a works cited in ~ the finish of your work. In a nutshell, your works cited is a short description of whereby you acquired your quote. It includes information like the author"s name, the job-related you used, the publisher, the day their occupational was created, and so on.

The many popular instances of citation styles are together follows:


APA (American psychological Association)ExampleZabar, A. (1989). . Brand-new York, NY: Stewart, Tabori, & Chang, Inc.
CSE (Council of scientific research Editors)ExampleMuir, J, Armstrong L, Hillary E. 1998. Exploring San louis Obispo and nearby areas: a guide to biking and hiking on the main Coast. San Luis Obispo, (CA): SLO walking Press. 224 p.
MLA (Modern Language Association)ExampleHoffa, James. Solid Cement Mortuary Designs. New York: eastern River Press, 2009. Print.
ChicagoExamplePollan, Michael. The Omnivore"s Dilemma: A Natural history of four Meals. Brand-new York: Penguin, 2006.

The examples given above were citing books only. Citing works in medias other than published in a publication will look at different however will follow the same structure.

PARENTHETICAL CITATIONS

Parenthetical Citations are provided in the center of your work and also are placed directly after a quotation. They refer to your works cited by summary indicating which source that particular quotation come from.

Example:


The St. Martin"s Handbook defines plagiarism together "the usage of who else"s native or ideas as own without crediting the various other person" (Lunsford and Connors 602).

Lunsford, Andrea, and Robert Connors. St. Martin"s Handbook. 3rd. Ed. Brand-new York: St. Martin"s Press, 1995.


As you can see, the parenthetical citation constantly comes directly after the quoted material. It can contain the author"s name, the page number from where the quote come from, or both.

PARAPHRASING

Paraphrasing is when you take in an external source"s information and also put it into your job-related using your very own words. Every one of the info will remain the same, yet the sentence framework will change. Even though friend aren"t straight copying the author, you are using their details so friend still must mention them.

Example:


original work"But Frida"s outlook was vastly different from that of the Surrealists." (258)

ParaphraseAs Herrera explains, Frida"s surrealistic vision to be unlike that of the europe Surrealists. (258)

Hayden Herrera, Frida: A story of Frida Kahlo (258)


*
due to the fact that paraphrases don"t quote the author directly and they space your very own words, they carry out not require quotation marks.
COMPUTER VIRUSES
"A computer system virus is a computer program that can replicate itself and also spread native one computer system to another. The term "virus" is likewise commonly, but erroneously, offered to describe other varieties of malware, including however not limited to adware and also spyware programs that perform not have actually a reproductive ability." - Wikipedia
FILES THAT spread VIRUSES

First points first, always be mindful when downloading papers off the the internet and make sure you"re downloading documents from a reliable source. Viruses need to be executed to have any kind of effect on her computer, therefore there are a pair of record types that have actually no possibility of comprise a virus. These documents are primarily sound, image, and text paper types.

Some of this safe papers include:

*

The unsafe papers that friend do need to watch out for room as follows:

*

These are simply a couple of of the most common document types the viruses can be enclosed to. These paper types are recognized as regimen files and they space able to activate or execute viruses that might be covert in them. A virus can not be activated just by downloading it though; it must be triggered by opening the regimen file.

A full glossary and more information top top viruses deserve to be uncovered at these locations:

http://www.cai.com/virusinfo/encyclopedia/

http://vil.mcafee.com/

http://www.pspl.com/virus_info/


TROJAN steeds
*
A Trojan horse is a file that is often perplexed to it is in a computer system virus. While the is still harmful, it is not thought about a virus due to the fact that it go not spread from computer system to computer. What a Trojan horse does perform is disguise itself as another file, such together a computer system game or a indigenous document, and then activates once you open up up the file.
email VIRUSES
*
Emails have the right to contain harmful files, consisting of both computer system viruses and also Trojan horses. Viruses uncovered in emails can"t harm your computer unless they are executed, or opened. As you deserve to see there"s a template here, it is in smart as soon as you download and also only open records that you recognize are safe.
KEEPING YOUR computer system SAFE
ANTI-VIRUS software program

The an initial and ideal step you can take to protecting your computer from viruses is to install an anti-virus program.

You can find some that the height ant-virus softwares at these websites:


Aladdin expertise Systems www.esafe.com Phone: 1-206-524-9159

Computer Associates International, Inc. www.cai.com Phone: 1-516-342-4100

McAfee www.mcafee.com Phone: 1-972-855-7044

Norman Data Defense Systems www.norman.com Phone: 1-703-267-6109

Symantec Corporation www.symantec.com Phone: 1-514-465-8420


Norton Australia au.norton.com Phone: 1-877-484-9540

Frisk software program International www.f-prot.com Phone: 354-540-7400

Network Associates, Inc. www.nai.com Phone: 1-408-988-3832

Panda Software www.pandasoftware.com Phone: 1-415-392-5950

Trend Micro, Inc. www.trendmicro.com Phone: 1-408-257-1500


rapid TIPS
Update your software application frequently.There are new types the viruses coming the end every day and if your anti-virus program can not record them if it"s too old.
Always it is in careful, even if you have an anti-virus software. The is common for part programs to miss Trojan horses so girlfriend watch the end for suspicious files.
Backup your computer regularly. This is a great habit to get into in case any fatal errors occur.
Be aware of everything you download. This task might seem mundane but it"s one of the most important steps you deserve to take.
Scan any brand-new files you might download. You deserve to perform a virus scan v your anti-virus software application as one extra protection measure.
dealing with AN infection
*
before you perform anything, make sure your computer system isn"t having minor malfunctions. Try restarting or powering down your computer prior to taking any kind of anti-virus measures, if the trouble persists follow these steps:
*
Relax, making any rash decisions have the right to land girlfriend in even much more hot water. Don"t continue to usage the computer system if girlfriend feel that you cannot manage removing the virus, it"s just not worth it.
*
If friend haven"t download an anti-virus program, perform that first. The software program will contain instructions on just how to clean up your computer.
*
Disconnect your computer system from the internet and also all gadgets that it share with. This will stop the virus from dispersing further.
*
Hopefully, you"ve developed backup files for her computer. Usage those backups to restore the documents that have actually been infected. Prior to restoring make certain the backups weren"t also infected.
GENERAL internet SAFETY

It"s always great to be cautious while on the internet. Over there are world in the cyber human being who want to do injury to friend or her computer.

These space some an excellent tips to store in mind while you space surfing:


Be careful around what you put on the web.
It"s on there forever and can be offered to trace earlier to friend at any time.
Keep track of who you communicate with ~ above the internet.
Some human being may not be who they seem come be.
Know the privacy is simply an illusion.
Even an individual information on social networks have the right to be conveniently recovered through anyone.
Don"t open any links in emails or chat rooms the look suspiciously or unfamiliar.
Also, never ever open any type of strange records that your computer system may have actually downloaded from an email or a website.
SOCIAL NETWORKS
*
The best way on the net to save in touch v friends, share pictures and also memories, and meet brand-new people is by making use of a social network.

Some of the most popular social networks as these days are:


Social networks space great, but just like everything rather on the web, you have to be careful when utilizing them. What you put on your social networking site specifies you. Anyone and everyone ~ above the web will have the ability to see what you placed up. Always think before posting a status or picture that could come ago to haunt you.


your PRIVACY
*
It might be unnerving to hear this but you virtually have actually no privacy on a social network. By joining Facebook, girlfriend agree to their regards to Use the state that they can use any, or all, that your personal information to offer to service providers for your marketing schemes. Not to point out people with malicious intent deserve to view any information that you post.

Anyone viewing her information deserve to use it for:


Advertising to you personal on www.facebook.com.
Use your email to placed you on massive emailing lists.
Stalking, if your resolve or physical ar is posted.
KIDS and PARENTS
youngsters
*

The net is a fun place to be, but it can additionally be dangerous. Monitor these actions to safely have actually fun top top the web!


Always ask for her parents" permission prior to going online.
Never talk to anyone digital that you don"t know.
Tell your parents if anyone ever before asks to accomplish you somewhere.
Don"t let anyone understand your name, phone number, address, or any kind of other an individual information.
If you uncover yourself ~ above a website the you don"t think you should be on, girlfriend should exit the page.
Keep images of yourself off the net unless it"s ok with your parents.
Be respectful the other people on the internet and never to speak anything mean.
QUIZ because that KIDS!

(Answers found after quiz)
1
"Jimmy" writes come you indigenous a conversation room:
"Hi -- my name is Jimmy -- i live in Santa Barbara, and I"m 9. Ns love come swim, but I can"t usage the pool right now, even though the weather is great (I live in California) since I have the measles. I have a pet lizard called Nelix. What"s her name? do you have any pets? Where perform you live?"

You should:


A
tell him her name and the name of your pet and where girlfriend live, since he seems really friendly, and also he"s sick.
B
give him only the same details that he offered to you in his message.
C
call him that you aren"t enabled to offer out personal or identifying information.
2
You simply told "Jimmy" the you can"t offer out an individual information. "Jimmy" writes ago to you:
"Aw, come on...those rule are just for babies. Ns stopped following those stupid rules periods ago. Anyway, what room you afraid of?"

You should:


A
end the conversation there is no replying come his message, and tell her parents around the conversation.
B
tell him the you"re not a baby, and also that that isn"t being an extremely smart if that isn"t complying with the online safety rules.
C
phone call him the you"re sorry you made the mad, and answer his questions.
3
You met "Jenny" v a conversation room a couple of main ago, and also after talking to her parents, they gave you permission come tell Jenny what city and also state you live in. It transforms out the Jenny resides in a adjacent town in the exact same state. "Jenny" sends you the complying with message:
"Hey -- guess what? My birthday is two weeks from now, and also my mom says I have the right to invite a pair of friend over for cake and ice cream. Deserve to you come? I"d really love that if friend can� ns really, really desire to meet you, "cause we choose so many of the very same things. Mine mom have the right to even involved pick girlfriend up!"

You should:


A
call her that you can"t wait to accomplish her too, and give her your resolve so the her Mom have the right to pick you up.
B
phone call her that you hope she has a an excellent birthday, however that you and your parents have safety rules for conference an "online buddy" because that the an initial time.
C
Tell she you"ll ask your mom or Dad, and also if they speak yes, that you"d love come come.
4
You didn"t to visit "Jenny"s" birthday party, yet your parents did species a looked after meeting through "Jenny" and also her "mom", which is an alleged to take ar the adhering to week in ~ the regional library. One week prior to you meet, Jenny emails girlfriend a digital copy of her class picture, and also says:
"How execute you choose my picture? currently you have the right to recognize me when we meet at the library! can you send a photo of you, too, so the I"ll recognize what friend look like? I"m yes, really worried that we won"t acknowledge one another."

You should:


A
Tell her you"re looking front to meeting her too, and email she a current picture.
B
Tell she you"ll get earlier to her v your answer later, and ask your parents even if it is or no you deserve to send she a picture.
C
tell her that you don"t have a digital snapshot to email to her, yet that you"ll send her one through the regular postal mail.
5
You space chatting online through "Jimmy" and also "Jenny" when "Sammy" joins her chat room. Sammy offers a oath word, and when "Jenny" speak him he must not usage words like that online, "Sammy" beginning writing things that are mean and also insulting come you and your online buddies.

You should:


A
protect yourself and your digital buddies by violation "Sammy" best back!
B
overlook "Sammy" and hope that he will get bored and also leave the chat room.
C
finish the conversation, and tell your parents.
ANSWER KEY
1. C / 2. A / 3. B 4. B / 5. C
parental
*
The internet is the one of the best resources for learning and also entertainment and your kids have the at your fingertips! It"s vital for you to teach them to use the internet due to the fact that they"re going come be using it because that the rest of their lives.


*

Some advice to assist your child surf the web safely are:


Monitor the web page your child goes ~ above before allowing them come surf freely.
Create rules because that the internet. Your child needs to know what"s OK and what"s no OK in terms of what they have the right to do on what sites. rule like:

• No talking to strangers.

• No providing out personal information.


Look for a privacy plan on the sites your son visits.
Build your child"s confidence. They need to know exactly how to use the internet and also like utilizing it!
WATCH the end FOR
*

Unfortunately, over there are risks when it comes to the internet and also kids. Your child"s safety could be in risk if one or more of the adhering to happen:


Your kid spends large amounts the time online, especially at night
You find pornography on your child"s computer
Your boy receives phone calls from human being you don"t know.
Your child receives mail, gifts, or packages form someone friend don"t know.
Your boy turns the monitor turn off or alters the display screen quickly when you walk right into the room
*

If you doubt your kid is interacting with an online sex-related predator you should:


First, speak to your boy openly around it. Tell lock you"re worried and also have a conversation about online safety.
Review what is on your child"s computer, either with the history or by other means.
Check the caller ID to make certain your child hasn"t to be calling any kind of numbers friend don"t recognize.
Monitor any chat rooms or instant message websites her child has been using.

See more: View Solutions For Math Matters 2, Mathmatters 2


If you discover evidence the your kid HAS been connecting with a sexual predator automatically call the FBI and the National facility for lacking and Exploited Children.


If you favored this guide, please share it through your friends and also fellow students!