4. A Report on
Endangered Species
by David Humphrey
Endangered Species
An endangered species is a
population of organisms which is
at risk of becoming extinct
Main Page because it is either few in
Contents
Featured Content
numbers, or threatened by
Current Events changing environmental or
Random Article predation parameters. Also it could
mean that due to deforestation
there may be a lack of food and/or
water.
5. A Report on
Endangered Species
by David Humphrey
Endangered Species
An endangered species is a
population of organisms which is
at risk of becoming extinct
Main Page because it is either few in
Contents
Featured Content
numbers, or threatened by
Current Events changing environmental or
Random Article predation parameters. Also it could
mean that due to deforestation
there may be a lack of food and/or
water.
6. A Report on
Endangered Species
by David Humphrey
Endangered Species
An endangered species is a
population of organisms which is
at risk of becoming extinct
Main Page because it is either few in
Contents
Featured Content
numbers, or threatened by
Current Events changing environmental or
Random Article predation parameters. Also it could
mean that due to deforestation
there may be a lack of food and/or
water.
Plagiarism is
! Cheating
8. Use A Report on
Endangered Species
many by David Humphrey
sources.
AnimalInfo.org
EndangeredSpecies.org
NationalGeographic.com
Learn how to
research
9. Use A Report on
Endangered Species
Write in
many by David Humphrey your own
sources. Endangered species are
organisms at risk of becoming
words.
extinct because they are either
few in numbers [1], or because
environmental changes and
AnimalInfo.org predatory circumstances put
EndangeredSpecies.org them at risk[2]. The lack of food
and/or water, caused by drout or
NationalGeographic.com famine may also be culprits[3].
Learn how to
research
10. Use A Report on
Endangered Species
Write in
many by David Humphrey your own
sources. Endangered species are
organisms at risk of becoming
words.
extinct because they are either
few in numbers [1], or because
environmental changes and
AnimalInfo.org
Mention all
predatory circumstances put
EndangeredSpecies.org them at risk[2]. The lack of food
and/or water, caused by drout or
NationalGeographic.com famine may also be culprits[3].
[1] EndageredSpecies.org
references.
[2] AnimalInfo.org
[3] NationalGeographic.com
Learn how to
research
18. facebook
David Healy wants to be
your friend.
Wall Info Photos
Basic Information
Sex: Male
Birthday: December 16, 1999
Hometown: New York, New York
Contact Information
Email: David1999@gmail.com
IM: Dan1999
Education Information
School: James H Vernon School
19. facebook
David Healy wants to be
your friend.
Wall Info Photos
Basic Information
Sex: Male
Birthday: December 16, 1999
Hometown: New York, New York
Contact Information
Email: David1999@gmail.com
IM: Dan1999
Education Information
School: James H Vernon School
29. Ever sent a hurtful message online or via
SMS?
30. Ever sent a hurtful message online or via
SMS?
Ever cursed somebody online or via SMS?
31. Ever sent a hurtful message online or via
SMS?
Ever cursed somebody online or via SMS?
Ever impersonated anyone online or via
SMS?
32. Ever sent a hurtful message online or via
SMS?
Ever cursed somebody online or via SMS?
Ever impersonated anyone online or via
SMS?
Ever embarrassed anyone online or via SMS?
33. Ever sent a hurtful message online or via
SMS?
Ever cursed somebody online or via SMS?
Ever impersonated anyone online or via
SMS?
Ever embarrassed anyone online or via SMS?
Ever insulted somebody online or via SMS?
Understanding the responsibilities of cyber citizenship. [1] Using the internet for school work\n. [2] Using the internet to download media. [3] Using the internet to deal with others.\n
Using the internet for school work.\n
Using the internet for school work.\n
What is Plagiarism? Plagiarism is passing off somebody else’s work and ideas as one’s own. \n
What is Plagiarism? Plagiarism is passing off somebody else’s work and ideas as one’s own. \n
What is Plagiarism? Plagiarism is passing off somebody else’s work and ideas as one’s own. \n
How NOT to plagiarize: (1) Use multiple sources, (2) Write it in your own words, and (3) Cite ALL sources.\n
How NOT to plagiarize: (1) Use multiple sources, (2) Write it in your own words, and (3) Cite ALL sources.\n
How NOT to plagiarize: (1) Use multiple sources, (2) Write it in your own words, and (3) Cite ALL sources.\n
How NOT to plagiarize: (1) Use multiple sources, (2) Write it in your own words, and (3) Cite ALL sources.\n
How NOT to plagiarize: (1) Use multiple sources, (2) Write it in your own words, and (3) Cite ALL sources.\n
How NOT to plagiarize: (1) Use multiple sources, (2) Write it in your own words, and (3) Cite ALL sources.\n
How NOT to plagiarize: (1) Use multiple sources, (2) Write it in your own words, and (3) Cite ALL sources.\n
How NOT to plagiarize: (1) Use multiple sources, (2) Write it in your own words, and (3) Cite ALL sources.\n
How NOT to plagiarize: (1) Use multiple sources, (2) Write it in your own words, and (3) Cite ALL sources.\n
Using the internet for entertainment.\n
Using the internet for entertainment.\n
Using the internet for entertainment.\n
Using the internet for entertainment.\n
Using the internet for entertainment.\n
Like plagiarism, copyright infringement is stealing.\n\nCopyright Infringement: Piracy is a crime. You violate copyright laws when you upload, download, copy and/or distribute copyrighted files (i.e. music, movies, books, software, etc.) without permission from the copyright owner and outside the realm of fair use. \n
Beware of downloading files from peer-to-peer applications. Some downloaded files are different from what they appear to be. They can be malicious software that pretend to be music or video files. These files are so-called Trojan Horses, which are malicious software that aim to infiltrate a host computer, either to merely corrupt the system or be used as a vehicle for crime.\n
Download from legal sites. A good rule of thumb is to be cautious if it’s free. There are many legal and established sites that offer games, music, video and applications for a minimal fee (sometimes, even for free!). Stick with these sites. If unsure about where to download legally, ask help from a responsible adult.\n
Download from legal sites. A good rule of thumb is to be cautious if it’s free. There are many legal and established sites that offer games, music, video and applications for a minimal fee (sometimes, even for free!). Stick with these sites. If unsure about where to download legally, ask help from a responsible adult.\n
Download from legal sites. A good rule of thumb is to be cautious if it’s free. There are many legal and established sites that offer games, music, video and applications for a minimal fee (sometimes, even for free!). Stick with these sites. If unsure about where to download legally, ask help from a responsible adult.\n
Download from legal sites. A good rule of thumb is to be cautious if it’s free. There are many legal and established sites that offer games, music, video and applications for a minimal fee (sometimes, even for free!). Stick with these sites. If unsure about where to download legally, ask help from a responsible adult.\n
Download from legal sites. A good rule of thumb is to be cautious if it’s free. There are many legal and established sites that offer games, music, video and applications for a minimal fee (sometimes, even for free!). Stick with these sites. If unsure about where to download legally, ask help from a responsible adult.\n
Download from legal sites. A good rule of thumb is to be cautious if it’s free. There are many legal and established sites that offer games, music, video and applications for a minimal fee (sometimes, even for free!). Stick with these sites. If unsure about where to download legally, ask help from a responsible adult.\n
Download from legal sites. A good rule of thumb is to be cautious if it’s free. There are many legal and established sites that offer games, music, video and applications for a minimal fee (sometimes, even for free!). Stick with these sites. If unsure about where to download legally, ask help from a responsible adult.\n
Download from legal sites. A good rule of thumb is to be cautious if it’s free. There are many legal and established sites that offer games, music, video and applications for a minimal fee (sometimes, even for free!). Stick with these sites. If unsure about where to download legally, ask help from a responsible adult.\n
Download from legal sites. A good rule of thumb is to be cautious if it’s free. There are many legal and established sites that offer games, music, video and applications for a minimal fee (sometimes, even for free!). Stick with these sites. If unsure about where to download legally, ask help from a responsible adult.\n
Using the internet to connect with others.\n
What’s wrong with this picture? [1] Dan gave out his personal information.\n
Your personal information is very important. Do not give out your personal information online (your name, phone number, address and school) and NEVER give your password to anybody, not even your friends. \n
Like plagiarism, copyright infringement is stealing.\n\nCopyright Infringement: Piracy is a crime. You violate copyright laws when you upload, download, copy and/or distribute copyrighted files (i.e. music, movies, books, software, etc.) without permission from the copyright owner and outside the realm of fair use. \n
There’s a time and place for everything. Do not allow your phones to serve as distractions. Concentrate on school work when in school. Do not use your mobile phones while walking or crossing the street. Do not reply to texts or calls from strangers. Do not give out your number to anyone--do not post them in public bulletins or online. Do not Mind your texting and calling use--they can cost your parents a lot of money!\n
You don’t want this to happen to you, do you? The teen allegedly sent and received about 20,000 text messages in a month, sent mostly during school hours. Her grades dropped from A’s and B’s to F’s. After losing her mobile phone rights, her grades went up again.\n\n
Sexting, meeting up with strangers\n
\n
Cyberbullying is bullying carried out in the internet through chat, email and messages in social networking sites, AND through mobile phones (SMS or phone calls). \n
Cyberbullying is bullying carried out in the internet through chat, email and messages in social networking sites, AND through mobile phones (SMS or phone calls). \n
Cyberbullying is bullying carried out in the internet through chat, email and messages in social networking sites, AND through mobile phones (SMS or phone calls). \n
Cyberbullying is bullying carried out in the internet through chat, email and messages in social networking sites, AND through mobile phones (SMS or phone calls). \n
Cyberbullying is bullying carried out in the internet through chat, email and messages in social networking sites, AND through mobile phones (SMS or phone calls). \n
Studies have shown that more than half of kids have bullied peers online.\n
Cyberbullying is a big deal. In serious cases, it will involve law enforcement and court authorities.\n
\n
If you’re being bullied, you’re not alone. A 2003 study by I-Safe America revealed that 42% of kids get bullied online. \n
Block anyone who sends you malicious and hurtful messages. It will do you no good to reply and fight back.\n
Keep copies of all hurtful messages sent to you. This will serve as evidence of harassment.\n
Tell a responsible adult. Let your parents or guardians know at the first sign of bullying. Let your ISP (internet service provider), email provider and the abuse desk of social networking sites you are a member of about the harassment. Send them copies of the malicious messages sent to you. \nIf the harassment spills over to school, let your teacher and school authorities know.\n
But if the bully threatens bodily harm or encourages suicide, report to law enforcement authorities right away. \n
But if the bully threatens bodily harm or encourages suicide, report to law enforcement authorities right away. \n
Speak no evil. See no evil. Hear no evil.\nDo not insult anybody. Do not respond to insults. Do not read flame messages about you or about anybody else. Do not listen to or participate in gossip.\n