{"id":2853,"date":"2009-11-12T22:22:48","date_gmt":"2009-11-13T02:22:48","guid":{"rendered":"http:\/\/blog.dearbornschools.org\/farhoua\/?p=2853"},"modified":"2009-11-12T22:22:48","modified_gmt":"2009-11-13T02:22:48","slug":"computer-applications-111309","status":"publish","type":"post","link":"https:\/\/iblog.dearbornschools.org\/farhoud\/2009\/11\/12\/computer-applications-111309\/","title":{"rendered":"Computer Applications &#8211; 11\/13\/09"},"content":{"rendered":"<p><strong><big>I.\u00a0 Bellwork<\/big><\/strong><br \/>\nA. Go to <a href=\"https:\/\/ilearn.dearbornschools.org\/course\/view.php?id=886&amp;topic=5\" target=\"_blank\">iLearn <\/a>and review the Survey results from yesterday<br \/>\n1. List the results for your class.<br \/>\n2. Is anything surprising?<br \/>\n*Reply using the blog<\/p>\n<p><big><strong>II.\u00a0 Objectives<\/strong><\/big><br \/>\nStudents will:<\/p>\n<ul>\n<li>Identify and apply strategies to reduce their risk of being targeted by an online predator or cyberbully.<\/li>\n<li>Generate multiple solutions for dealing with situations involving an online predator or cyberbullying.<\/li>\n<li>Examine the uncomfortable feelings and physical harm that can result from some online experiences.<\/li>\n<li>Report incidents of threatening online behavior to the proper authorities.<\/li>\n<\/ul>\n<p><big><strong>III. Classwork<\/strong><\/big><\/p>\n<ul>\n<li>Complete <a href=\"https:\/\/ilearn.dearbornschools.org\/course\/view.php?id=886&amp;topic=5\" target=\"_blank\">CyberThreats &#8211; Part 2 &#8211; CyberBullying<\/a><\/li>\n<li>Read Terms of Use Agreement &amp; AUP then begin using your <a href=\"https:\/\/wiki.dearbornschools.org\/\" target=\"_blank\">Dearborn Schools wiki<\/a><\/li>\n<\/ul>\n<div><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/iblog.dearbornschools.org\/farhoud\/wp-content\/uploads\/sites\/151\/2009\/11\/cyber-bully.jpg\" alt=\"\" width=\"159\" height=\"145\" \/><\/div>\n","protected":false},"excerpt":{"rendered":"<p>I.\u00a0 Bellwork A. Go to iLearn and review the Survey results from yesterday 1. List the results for your class. 2. Is anything surprising? *Reply using the blog II.\u00a0 Objectives Students will: Identify and apply strategies to reduce their risk of being targeted by an online predator or cyberbully. Generate multiple solutions for dealing with [&hellip;]<\/p>\n","protected":false},"author":176,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17],"tags":[],"class_list":["post-2853","post","type-post","status-publish","format-standard","hentry","category-2009f-computer-applications"],"_links":{"self":[{"href":"https:\/\/iblog.dearbornschools.org\/farhoud\/wp-json\/wp\/v2\/posts\/2853","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/iblog.dearbornschools.org\/farhoud\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/iblog.dearbornschools.org\/farhoud\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/iblog.dearbornschools.org\/farhoud\/wp-json\/wp\/v2\/users\/176"}],"replies":[{"embeddable":true,"href":"https:\/\/iblog.dearbornschools.org\/farhoud\/wp-json\/wp\/v2\/comments?post=2853"}],"version-history":[{"count":0,"href":"https:\/\/iblog.dearbornschools.org\/farhoud\/wp-json\/wp\/v2\/posts\/2853\/revisions"}],"wp:attachment":[{"href":"https:\/\/iblog.dearbornschools.org\/farhoud\/wp-json\/wp\/v2\/media?parent=2853"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/iblog.dearbornschools.org\/farhoud\/wp-json\/wp\/v2\/categories?post=2853"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/iblog.dearbornschools.org\/farhoud\/wp-json\/wp\/v2\/tags?post=2853"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}