Antigone Anticipation Guide 1. You are with someone who decides to commit an illegal act. By staying you implicate yourself in the crime as an accomplice.

Slides:



Advertisements
Similar presentations
Internet Safety Tips Starring…..
Advertisements

All of us enjoy spending time with our pets. Its fun to take them for a walk.
Chapter 7 Resolving Conflicts and Preventing Violence Lesson 3
Cyber Time For Second Grade Personal Information  Never give out your full name.  Never give out your address while on the internet.  Never give out.
Who Wants To Be A Millionaire? Question 1 What do you do it someone sends you a nasty text? A Screenshot, block and tell an adult B Send a rude reply.
I am going to the Justice & Police Museum and this is what it looks like.
HOUSE RULES for leaving comments. Don’t give out any personal information, such as where you live, your phone number or address, your school or.
Internet safety! By: Liam, Brilee, Dinny, Shalisha.
 You are kind to people  Help each other  Standing up for someone  Letting someone play with you  Smile  Tell someone that you care about them.
Your just in time… enjoy the show! The Plumsted TownshipPolice & Plumsted Township School District presents… STRANGER DANGER.
Protecting Your Identity: What to Know, What to Do.
Fraud and Identity Theft Test Review. Who should you contact if you are a victim of identity theft?
INTERNET SAFETY FOR STUDENTS
Read this message very carefully !. Once there was a boy with a difficult character... His father gave him a bag of nails and told him to hit one in the.
Stay Safe Online Decisions Quiz 2 Your names:. You decide to use a search engine… What should you do? Stop and think! Use a child friendly search engine?
Stay safe online! Decisions Quiz 1 Your names:. You decide to use a search engine… What should you do? Stop and think! Use a child friendly search engine?
Cyber Bullying & E-Safety Assembly Key Stage 1 Anti-bullying Week 2009.
Internet Safety/Cyber Ethics
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
CYBER BULLYING Cody O’Brien. Goals for Today’s Presentation Introduce Cyber bulling Identify forms of cyber bulling Steps to prevent it What to do if.
INTERNET SAFETY FOR STUDENTS
GUIDANCE LESSON INTERNET SAFETY/NETIQUETTE IF YOU DO NOT WANT IT TO BE TOMORROW’S FRONT PAGE NEWS, DO NOT SEND IT THROUGH TECHNOLOGY!!!
Internet Safety for Families Technology Open House November 19, 2014.
E-Safety Challenge College e-safety Challenge Online Grooming.
University of New Mexico. Ray’s first computer We’ve come a long way since my first computer!!
REALTOR WATCH Presented By Pasco County Sheriff’s Office Crime Prevention Unit Bob White, Sheriff.
Teenangel Gabriella. AIM is an instant messaging system. You have to be thirteen years old to use AIM. Besides sending messages, AIM is also used to tell.
 One of the best ways to get started as a baby sitter is by word of mouth  Tell you parents, friends, or anyone who could get the word out.
Online Safety Written by: Asael Estrada. Usernames & Passwords Never give out your username or password. You shouldn’t give it out because someone might.
SAFE: Stop Abuse For Everyone A personal safety training guide for adults with disabilities and care providers Module 1: Keeping Your Money and Stuff Safe.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Reason for Cyber Crime Pursuit of fame Purely out of mischief For finance means To get revenge on someone they hate Purely to pursuit criminal.
Suzy Lamplugh was an estate agent who, in 1986, went to meet with a client, and disappeared. To this day she has never been found, and her disappearance.
Unit 9 Responsibility.
By Kira Hall and Iliesa Sevudredre Do you guy’s know what Cyber Safety means? Well we are going to tell a story so you guys can understand what Cyber.
Internet Safety Tips Stay safe, stay smart!. This includes:  your real name,  your address,  your phone number Do not share your name, address, phone.
By: Alexis Dupuy and Alyssa Chaplain. Situation 1 You see a hitchhiker on the side of the road. You feel bad for him and you want to help him out. Should.
Chapter 8, 11, 12, & 13 Unit Exam Review Guide Law in American Society Uplift Community High School Mr. Novak Test Date: Wednesday, January 12, 2011.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Looking for a Job Job Interview Form 10. A JOB INTERVIEW.
Who Wants To Be a Crime Buster ? School Community Police Officers South Wales Police.
 Don’t respond when a cyberbully is saying something mean about you online. Just block it.
Company LOGO Internet Safety By: Melissa Pinnell.
My Digital Footprint.
What is it? & What can I do to prevent it?. Cyber bullying is when somebody is teasing, taunting, or harassing someone else over the computer. Whether.
Activity 4 Protecting Ourselves. Keeping Safe There are lots of different ways we can be at risk on the Internet. How can we protect ourselves and keep.
SAFE SOCIAL NETWORKING TIPS By: Quinton Ellison.  Here's how to protect yourself: experts say you should never list your complete birthday or your address.
I’M CYBER SAFE.
E-Safety Quiz Are you cybersafe?.
 Identity theft: When someone steals another identity, usually to obtain credit or other benefits in that person’s name  Phishing: Attempting to acquire.
Safe People – Safe Places. ‘What Has Happened to Lulu?’ Find a copy of ‘What has happened to Lulu?’ Use the questions that you have been given to think.
By Arsh Sodha, and Maxim Skorodinsky A TEENAGE GIRL IS BABYSITTING TWO CHILDREN AT NIGHT TIME WHEN THE PARENTS ARE OFF AT A PARTY.
E- SAFETY PRESENTATION By: Mohamed Fathy Tip 1Tip 2Tip 3Tip 4Tip 5 And the What is e safety.
YEAR 6’S GUIDE TO STAYING SAFE ON THE INTERNET. CHATTING When you are chatting to people online, try not to give out any personal information about yourself.
#1 Community Risk Factor: Presence of Gangs in the Neighborhood Need: Safety while walking to and from school Safe Solutions: #2 Family Risk Factor: Lack.
Internet Safety Name: 1 – Safe or Unsafe Sharing your real name with someone you met online SafeUnsafe.
Safeguarding Prevent Duty- preventing radicalisation and extremism The schools duty is to build Children's Resilience to Radicalisation. Schools should.
Learning Objectives Identify Cyberbullying Use Technology Resources Responsibly Use Technology Resources Safely Use Technology Resources Respectfully.
‘Helping Each Other’ Keeping Safe from Sexual Exploitation PLUSS, Scott Business Park 16 th September 2014.
Your personal mobile phone
Protecting Your Identity:
Your personal mobile phone
TING-ELE STUDY PACK III
She was just 25 when she went missing.
Session 5: Sexting.
Welcome Your Instructor Dan Herrera
Your personal mobile phone
Viera High School August 23, – 8PM
KS3 Lesson Plan.
Presentation transcript:

Antigone Anticipation Guide 1. You are with someone who decides to commit an illegal act. By staying you implicate yourself in the crime as an accomplice. By leaving, you risk the loss of that friend and a reputation as a Judas in the eyes of your friends.

2. You are hanging out with friends at your house and playing around online. You find a site that houses stolen credit cards you could use safely for shopping online or by phone. 3. You just found out from eavesdropping on a conversation that someone here at school has AIDS. What do you do with that information? Why?

4. You are my aide and I ask you to pick up some copies in the office. While there, you see a copy of the World Civ final exam. There is no one around. What do you do? Why? 5. You are caught by the police in front of the high school on the night someone TP’d the school. You are brought into the principal’s office the next day, along with others who were also caught. The principal asks you to tell him who else was there. You know who was there. What do you do? Why?