Конспект урока

Педагогика и дидактика

Techer: Good fternoon der pupils nd our guests We re hppy to greet you t our prty devoted to Interntionl Dy for Tolernce nd problems of cyberbullying. Presenter 1: Tody were going to tlk bout bullying. Bullying occurs in every country round the globe when people especilly children ren't tolernt of ech other.



102 KB

0 чел.

Позакласний захід з теми:



Практичні:  вчити учнів обмінюватись різною інформацією, активізувати мовленнєві навички, вчити учнів отримувати, аналізувати та використовувати нові матеріали,навчити варіювати мовним матеріалом.

Освітні: сформувати більш повне уявлення студентів про толерантність та кіберхуліганство, демонструвати креатині здібності,нестандартно вирішувати завдання,вільно імпровізувати.

Розвиваючі: формувати навички само- і взаємоконтролю, розвивати пам'ять та логіку, розумові та мовленнєві здібності студентів,уміння узагальнювати факти, логічно висловлювати свої думки, погляди відповідно до ситуації.

Виховні: виховувати толерантне ставлення учнів до навколишнього світу, почуття взаємодопомоги, бажання працювати в групі з єдиним комунікативним завданням.

Teacher:  Good afternoon, dear pupils and our guests! We are happy to greet you at our party devoted to International Day for Tolerance and problems of cyberbullying. In 1996, the UN General Assembly (by resolution 51/95) invited UN Member States to observe the International Day for Tolerance on 16 November, with activities directed towards both educational establishments and the wider public. Article 1 of Declaration of Principles on Tolerance runs as follows, “Tolerance is respect, acceptance and appreciation of the rich diversity of our world's cultures, our forms of expression and ways of being human. Tolerance is harmony in difference.” Unfortunately, not all people accept and support this harmony.

Presenter 1: Today we’re going to talk about bullying. Bullying occurs in every country around the globe when people, especially children, aren't tolerant of each other. Bullying is an act of repeated aggressive behaviour in order to intentionally hurt another person, physically or mentally. Bullying is characterized by an individual behaving in a certain way to gain power over another person. It is a universal problem faced by kids of every age. It happens in schools, neighbourhoods, and homes every single day.

Presenter 2: Although definitions of bullying vary, most agree that bullying involves:

  •  Imbalance of Power: people who bully use their power to control or harm and the people being bullied may have a hard time defending themselves
  •  Intent to Cause Harm: actions done by accident are not bullying; the person bullying has a goal to cause harm
  •  Repetition: incidents of bullying happen to the same the person over and over by the same person or group

Presenter 3: Bullying can take many forms. Examples include:

  •  Verbal: name-calling, teasing
  •  Social: spreading rumours and lies, leaving people out on purpose, refusing to talk to someone, breaking up friendships 
  •  Physical: hitting, punching, shoving, stealing, hiding or ruining someone's things, making someone do things he or she don't want to do
  •  Cyberbullying: using the Internet, mobile phones or other digital technologies to harm others

An act of bullying may fit into more than one of these groups.

Presenter 4: What do all these things have in common? They're examples of ways one person can make another person feel hurt, afraid, or uncomfortable. When these are done to someone more than once, and usually over and over again for a long period of time, that's bullying. 

Presenter 5:   Anyone can be a victim, but most victims are kids who are different in some way.

  •  People who have different colour or religion.
  •  Kids who are very small or fat
  •  People who wear glasses.
  •  Kids who are new at school
  •  People who are naturally quiet or shy.
  •  Kids who prefer to be on their own rather than a part of a group.

Presenter 1: You might think that bullies are not very nice people, but that’s wrong. A recent study on bullying in London showed that a typical bully isn't a big, ugly kid that nobody likes. In fact, the opposite is often true.

  •  Bullies are usually popular and have a lot of friends.
  •  They aren't stupid. In fact, bullies are often very clever. They can find their victims´ weak points very easily, and they’re very good at hiding what they do from teachers.
  •  They are usually good-looking and popular with the opposite sex.
  •  They were fashionable clothes. Bullies are often the fashion leaders in a school.

Presenter 2: If we looked more inside a person's head, we'd probably find some reasons why he or she is acting like a bully.

  •  She's having problems in other parts of her life, like something going on in her family or struggling with school.
  •  He may not feel like he's getting enough attention from parents or teachers.
  •  She's watched her parents or older siblings get their way by being angry or pushing other people around.
  •  He's being bullied himself, maybe by another kid or a brother or sister...or even his own parents.
  •  Her parents have spoiled her or haven't taught her about not hurting others.
  •  He's getting exposed to a lot of violence in movies, TV, and video games.

Presenter 3: Today young people all over the world use the Internet and mobile phones. When these technologies are used to harm other people or make them feel bad about themselves, then it becomes cyberbullying. Cyberbullying can happen at home, school or in your community. It peaks around the end of middle school and the beginning of high school. Examples of cyberbullying include:

  •  Sending hurtful, rude, or mean text messages to others
  •  Spreading rumors or lies about others by e-mail or on social networks
  •  Creating websites, videos or social media profiles that embarrass, humiliate, or make fun of others

Presenter 4: Bullying online is very different from face-to-face bullying because messages and images can be: 

  •  Sent 24 hours a day, 7 days a week, 365 days a year
  •  Shared to a very wide audience
  •  Sent anonymously

Presenter 5: For example, a student in your school might get your number and keep calling you. This may be only irritating at first, but it might turn scary at night, and can get very stressful over time. Other cyberbullies might send messages to others saying mean things about you. One of the things about bullying on a mobile phone is that you can tell who is calling and inform the teacher or other adult.
           E-mail bullying may not be limited to saying nasty things. All that the bully needs to do is to send you a large e-mail message many times over. This clogs up your inbox and prevents you from receiving other e-mail. One of the most dangerous pranks a bully can play is to send out offensive e-mails pretending to be you. People who receive such e-mail get angry with you.
           Even on your blog, a cyberbully can leave nasty comments about you. Many visitors to your blog might see it before you get a chance to clean it up.
           Thus there are many types of cyberbullying, all of which are harassment. Sometimes the victims are also threatened face-to-face and forced to give up their lunch money or private information.

Presenter 1: Bullying has obvious disastrous effects on children. Research on cyberbullying has found that students involved are more likely to:

  •  Be unwilling to attend school
  •  Receive poor grades
  •  Have lower self-esteem
  •  Have more health problems
  •  Use alcohol and drugs

There is a strong correlation between bullying and suicide. Bullying leads to several suicides every year. It is estimated that between 15 and 25 children commit suicide every year in the UK alone, because they are being bullied.

Presenter 2: What can you do to stop it? 

  •  The best advice is to avoid the methods used by cyberbullies. That means staying away from websites The they use and blocking email addresses or mobile numbers that send nasty messages.
  •  Regularly check and clean your 'friends' lists on social networking sites too.
  •  Find the 'report abuse' or 'block sender' options on your favourite websites.
  •  Changing your username may also help and don't give out personal details such as your mobile number, address or email online.
  •  Protect your password too to keep your files and information safe.

Presenter 3:

  •  If you are sent a message that makes you feel uneasy, don’t reply to it. For one thing, it could prove to the bully that their message has upset you, and they may send more. Plus, if the situation resolves in you complaining to your network provider, it can slow up the process if you reply. This is mainly to ensure that it wasn’t a two-sided case, even if all you said was, “Do I know you?”
  •  Don’t feel pressured to give out your number to everyone who asks - just tell trusted friends and family.

Presenter 4: When you're feeling lonely because the bullies have taken your friends away, you might think of looking in an internet chatroom to find some new ones. When you join a chatroom you'll find people are very friendly but how do you know that Roman aged 15 who wants to be your new best friend really is a teenager and not Dmytro aged 45? People can pretend to be your age. You don't know - nobody does - and unfortunately there have been cases where adults have pretended to be teenagers and lured young people into meeting them in dangerous situations.

  •  Be careful not to give out your full name or address if you use text chat and don’t arrange to meet someone you chat to without checking with your parents first. Only send texts when you’re in a good mood and think about whether you would like to receive a message like that before you hit send.
  •  Only meet someone from a chatroom in a public place with one of your parents or another adult. If they are genuinely who they say they are they will be happy to do this. Never agree to meet anyone from a chatroom on your own
  •  You should also report the bullying to the people running the website, technology service or your mobile phone service provider.
  •  Keep evidence - callers and mailers can be traced. But also remember that sites you've created and emails you've sent can be traced back to you months or years later too.

Presenter 5: There are some dander signs that must alert you:

  •  If the person tries to insist on having your address or phone number
  •  If the person emails you pictures which make you feel uncomfortable and which you would not want to show to anyone else
  •  If the person wants to keep their chats with you secret
  •  If the person tells you that you will get into trouble if you tell an adult what has been going on
  •  If the person emails you pictures which make you feel uncomfortable and which you would not want to show to anyone else
  •  If the person wants you to email them pictures of yourself or use a webcam in a way which makes you feel uncomfortable
  •  If the person shares information with you and tells you not to tell anyone else about it
  •  If the person wants to meet you and tells you not to let anyone know

If you find any of these danger signs it's important that you TELL YOUR PARENTS or another adult.

Teacher:  One thing about all bullies, both physical and verbal, is that they expect you are too afraid to tell. But telling someone you trust about your problem is always the best option. Remember, a problem shared is a problem halved. Cyberbullying is likely to be a major form of bullying in the 21st century, so we should all fight this together. The more you know about bullying, the more you can do to stop it. 



  1.  Besag, V. E. (1989) Bullies and Victims in Schools. Milton Keynes, England: Open University Press
    1.  Stop Cyberbullying   An International Conference to Address Cyberbullying, Solutions and Industry Best Practices Wired Safety, Pace University Program, June 2008.
    2.  Cyberbullying Common, More So At Facebook And MySpace by Thomas Claburn, Information week; June 27, 2007

External links:








In media and pop culture:

  •  Adina's Deck— a film about three 8th-graders who help their friend who's been cyber-bullied.
  •  Let's Fight It Together— a film produced by Childnet International to be used in schools to support discussion and awareness-raising around cyber-bullying.
  •  Odd Girl Out— a film about a girl who is bullied at school and online.
  •  At a Distance— a short film produced by NetSafe for the 8-12-year-old audience. It highlights forms and effects of cyber-bullying and the importance of bystanders.
  •  Cyberbully (film)— an TV movie broadcast July 17, 2011 on ABC Family. Similar to Odd Girl Out, it too depicts a girl who is bullied at school and online.



А также другие работы, которые могут Вас заинтересовать

33646. Атаки на протокол ARP 38 KB
  Атаки на протокол RP Протокол разрешения адресов RP. Функционально протокол RP состоит из двух частей. Одна часть протокола определяет физические адреса другая отвечает на запросы при определении физических адресов. Протокол RP работает различным образом в зависимости от того какой протокол канального уровня работает в данной сети протокол локальной сети Ethernet Token Ring FDDI с возможностью широковещательного доступа одновременно ко всем узлам сети или же протокол глобальной сети Х.
  Если маршрутизатор обнаруживает ошибку он уничтожает дейтаграмму но одновременно с помощью ICMP отсылает сообщение об ошибке отправителю для принятия мер по ее устранению. 8бит тип сообщение 8 бит поле кода конкретизирует назначение сообщения 16 бит контрольная сумма. Сообщение Получатель недостижим посылается маршрутизатором если он не может доставить IPдейтаграмму по назначению. В это сообщение включается IPзаголовок отвергнутой IPдейтаграммы и ее первые 64 бита.
33648. Атаки сетевого уровня на протокол IP и его защита 119 KB
  В качестве примера можно привести известную утилиту Nmp некоторые режимы которой позволяют задать поддельные адреса отправителя пакетов. Посылка специфических пакетов где определённым образом заполнены поля заголовка отвечающие за фрагментацию может приводить к зависанию или понижению производительности узла. Исправление этих ошибок это установка пакетов обновления программного обеспечения. Большое число одинаковых фрагментированных пакетов вызывают замораживание машины на время атаки.
33649. Атаки на протокол ICMP и его защита 27.5 KB
  Атаки на протокол ICMP и его защита Поскольку протокол ICMP служит для передачи различных управляющих служебных сообщений поэтому всегда был популярной мишенью для атаки. Атака Sping Jolt Атака состоит в посылке нескольких дефрагментированных пакетов ICMP IСМР_ЕСНО больших размеров по частям. Для устранения уязвимости необходимо применить патч icmpfix который зависит от версии Windows NT и установленного пакета обновления. Атака ICMP Request Атака заключается в посылке пакета ICMP Subnet Msk ddress Request по адресу сетевого интерфейса...
33650. Протокол IPSec 43.5 KB
  Протокол IPSec Шифрование данных на сетевом уровне представлено группой протоколов IPSec основанных на современных технологиях электронной цифровой подписи и шифрования данных. Протокол IPSec включает в себя: протокол аутентификации uthentiction Heder АН который привязывает данные в составе пакета к своеобразной подписи позволяющей удостовериться как в подлинности отправителя так и в целостности принятых от него данных; протокол Encpsulted Security Pylod ESP отвечающий за шифрование содержимого отдельных пакетов и даже...
33651. Протокол ESP 42 KB
  Протокол IKE Протокол IKE обеспечивает распределение ключей и согласование протоколов между участниками обмена. Протокол IKE решает три задачи: согласование алгоритмов шифрования и характеристик ключей которые будут использоваться в защищенном сеансе; непосредственный обмен ключами в том числе возможность их частой смены; контроль выполнения всех достигнутых соглашений. Протокол IKE функционирует в два этапа: Установление защищенного соединения для процедуры обмена IKE S. Два из них основной и агрессивный относятся к первому...
33652. Режимы работы IPSec 30 KB
  Каждое из них определяет различные параметры IPSecсоединения такие как алгоритмы шифрования и аутентификации которые будут использованы при обмене информацией между системами сеансовые ключи шифрования и т. Алгоритмы шифрования IPSec это набор протоколов в которых используются алгоритмы аутентификации и шифрования. На сегодня определены два алгоритма аутентификации и семь алгоритмов шифрования. Алгоритм шифрования DES Dt Encryption Stndrd с явно заданным вектором инициализации Initiliztion Vector IV применяют в протоколе ESP по...
33653. Виртуальные частные сети 30.5 KB
  Виртуальные частные сети Виртуальная частная сеть VPN это технология обеспечивающая безопасную связь по открытой общей сети. Истинная частная сеть принадлежность оборудования сети предприятия и гарантия конфиденциальности информации передаваемой по этой сети. Такие сети не очень распространены. Корпоративные данные практически не доступны для абонентов не являющихся пользователями корпоративной сети или сотрудниками провайдера.
33654. Типы VPN-устройств 31 KB
  Типы VPNустройств Существует несколько основных типов VPNустройств: отдельное аппаратное устройство VPN на основе специализированной ОС реального времени имеющее 2 или более сетевых интерфейса и аппаратную криптографическую поддержку так называемый черный ящик; отдельное программное решение которое дополняет стандартную операционную систему функциями VPN; расширение межсетевого экрана за счет дополнительных функций защищенного канала; средства VPN встроенные в маршрутизатор. Устройства VPN могут играть роль шлюза или клиента...