{"id":2851,"date":"2009-11-11T22:13:55","date_gmt":"2009-11-12T02:13:55","guid":{"rendered":"http:\/\/blog.dearbornschools.org\/farhoua\/?p=2851"},"modified":"2009-11-11T22:13:55","modified_gmt":"2009-11-12T02:13:55","slug":"computer-applications-111209","status":"publish","type":"post","link":"https:\/\/iblog.dearbornschools.org\/farhoud\/2009\/11\/11\/computer-applications-111209\/","title":{"rendered":"Computer Applications &#8211; 11\/12\/09"},"content":{"rendered":"<p><strong><big>I.\u00a0 Bellwork<\/big><\/strong><br \/>\nA. Go to <a href=\"https:\/\/ilearn.dearbornschools.org\/course\/view.php?id=886&amp;topic=5\" target=\"_blank\">iLearn <\/a>and review the Internet Predator Statistics in the Cyber Threat Lesson<br \/>\n1. Is there any statistic that surprises you?\u00a0 List it and the reason you are surprised.<br \/>\nReply using the blog<\/p>\n<p><big><strong>II.\u00a0 Objectives<\/strong><\/big><br \/>\nStudents will:<\/p>\n<ul>\n<li>Recognize inappropriate advances and techniques used by online predators.<\/li>\n<li>Identify and apply strategies to reduce their risk of being targeted by an online predator or cyberbully.<\/li>\n<li>Generate multiple solutions for dealing with situations involving an online predator or cyberbullying.<\/li>\n<li>Examine the uncomfortable feelings and physical harm that can result from some online experiences.<\/li>\n<li>Report incidents of threatening online behavior to the proper authorities.<\/li>\n<\/ul>\n<p><big><strong>III. Classwork<\/strong><\/big><\/p>\n<ul>\n<li>Complete <a href=\"https:\/\/ilearn.dearbornschools.org\/course\/view.php?id=886&amp;topic=5\" target=\"_blank\">CyberThreats &#8211; Part I &#8211; Protecting Against Online Predators<\/a><\/li>\n<li>Finish yesterday&#8217;s MicroType Pro<\/li>\n<\/ul>\n<div style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/iblog.dearbornschools.org\/farhoud\/wp-content\/uploads\/sites\/151\/2009\/11\/112200855880.jpg\" alt=\"\" width=\"127\" height=\"116\" \/><\/div>\n","protected":false},"excerpt":{"rendered":"<p>I.\u00a0 Bellwork A. Go to iLearn and review the Internet Predator Statistics in the Cyber Threat Lesson 1. Is there any statistic that surprises you?\u00a0 List it and the reason you are surprised. Reply using the blog II.\u00a0 Objectives Students will: Recognize inappropriate advances and techniques used by online predators. Identify and apply strategies to [&hellip;]<\/p>\n","protected":false},"author":176,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17],"tags":[],"class_list":["post-2851","post","type-post","status-publish","format-standard","hentry","category-2009f-computer-applications"],"_links":{"self":[{"href":"https:\/\/iblog.dearbornschools.org\/farhoud\/wp-json\/wp\/v2\/posts\/2851","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/iblog.dearbornschools.org\/farhoud\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/iblog.dearbornschools.org\/farhoud\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/iblog.dearbornschools.org\/farhoud\/wp-json\/wp\/v2\/users\/176"}],"replies":[{"embeddable":true,"href":"https:\/\/iblog.dearbornschools.org\/farhoud\/wp-json\/wp\/v2\/comments?post=2851"}],"version-history":[{"count":0,"href":"https:\/\/iblog.dearbornschools.org\/farhoud\/wp-json\/wp\/v2\/posts\/2851\/revisions"}],"wp:attachment":[{"href":"https:\/\/iblog.dearbornschools.org\/farhoud\/wp-json\/wp\/v2\/media?parent=2851"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/iblog.dearbornschools.org\/farhoud\/wp-json\/wp\/v2\/categories?post=2851"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/iblog.dearbornschools.org\/farhoud\/wp-json\/wp\/v2\/tags?post=2851"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}