Safety--Day+7-10

=Day 8-10 Cyber Safety= =Culminating Activity= || What sort of things do not belong in a screen name or password? What sort of things does a cyber predator do to trick people. What kinds of information might someone give away when chatting online? What are the impacts of Cyber Bullying What are some examples of appropriate uses of internet messaging technologies? ||
 * = **LFS Lesson Plan**
 * **Unit EQ: How can you protect your safety while on the Internet.** ||
 * **LEQ: Today? What have you learned about internet safety?**
 * **Activating Strategies:** Show cartoon from this page. Discuss Unit Essential Question and Lesson Essential Questions: ||
 * **Acceleration/Previewing/Vocabulary:** stalk, groom, chat, cybersafety, Recognize, Refuse, Report, Respond, password, identity theft, username/screen name, security, predator, Instant Messenger, Cyber-Bully, empathy, harassment, email ||
 * **Teaching Strategies and Distributed Guided Practice/Summarizing Prompts:**

Develop a Public Service Announcement on Internet Safety or Cyberbullying using: media type="custom" key="3554332" Email your Toondobook to the teacher when it is done. Select publish, select view, click email link second up from bottom on right. ||
 * Assignment:**
 * Needs to have 3 pages in book.
 * Cyber bullying, or Cyber Stalking are the topics.
 * Results must be emailed to the teacher's gaggle account. ||
 * **Summarizing Strategies:**