You are on page 1of 10

1

EXERCISES








PREPARED BY
MAESTRANDO CSAR AUGUSTO GMEZ L
MASTERY IN EDUCATION UCM
ENGLISH GROUP IIB









PRESENTED TO:
JOSE EUGENIO POVEDA JARAMILLO
ENGLISH TEACHER












LANGUAGE DEPARTMENT
UNIVERSIDAD CATOLICA DE MANIZALES
MANIZALES CALDAS
MAYO 01 , 2012
2

How do We Battle CyberBullying? By, Claudio V. Cerullo, Ph.D.
Character Education > Bullying | By: Dr. Claudio V. Cerullo (11/24/11) Views: 543


Bullying in our world is not new concept, but thanks to the internet and technological
advancements in our global economy, teenagers are now being bullied in the comfort of their own
homes. On-line harassment, more often known as cyberbullying, is a major problem in our schools
and communities nation-wide. When bullying comes home via the internet it can leave victims
feeling helpless and hopeless. Let me repeat this, it can leave victims helpless and hopeless!


Defining Cyberbullying?

Cyberbullying is any form of harassment that occurs via the internet or other technological tool.
Vicious posts, name calling in chat rooms, blogs, facebook, Myspace, posting fake profiles on web
sites, and mean or cruel email messages and text messages are all forms of cyberbullying.


Some Examples of how cyberbullying works:

Student (A) is bombarded by anonymous threatening and taunting emails at home, even though
there is no direct harassment at school. The victim has no idea who is sending the messages and
starts to feel like everybody is against him or her. That student is now being cyberbullied.

Student (B) a school bulletin board is spammed with name-calling posts that spread vicious rumors
about this specific student. The rumors are not true, but students at school see the posts and
assume them credible. The student is then ostracized by his or her. This student is now a victim of
cyberbullying.

A nasty fake profile is posted at a social networking site such as facebook or myspace, using a
students real name, photo, and contact information. That student starts getting strange email
messages from strangers who think the profile is real. Some of the messages are crude and
defaming. Some of the messages are mean and vulgar. This is yet another example of
cyberbullying. As I have illustrated just a few examples of cuberbullying, if you are taking part in
things like this it is NOT harmless fun. You are being a cyberbully. If you are the victim of this
type of treatment you are being cyberbullied and there are things you can do to stop this form
of harassment.

Why Does Cyberbullying Occur?

Bullying has been around for over a hundred years, but cyberbullying is very different, because it
lets a bully remain anonymous, just like when people blog and do not post their real names. It is
easier to bully in cyberspace than it is to bully face to face. With cyberbullying a bully can pick on
people with much less risk of being caught, or little do they think.

3

Bullies are natural instigators and in cyberspace bullies can enlist the participation of other
students who may be unwilling to bully in the real world. Students who stand around doing
nothing in a real life bullying incident often become active participants in on-line harassment.

The detachment afforded by cyberspace makes bullies out of people who would never become
involved in a real life incident. The internet makes bullying more convenient and since the victims
reaction remains unseen people who wouldnt normally bully do not take it as seriously.

What Can You Do if You Experience Cyberbullying?

There are many things that can be done to combat cyberbullying. The most important thing a
victim of cyberbullying can do is to NOT respond to the bully. Do not play in to the bully's games.
Do not answer emails, do not respond to posts, do not engage in a chat room exchange, and do
not copy what the bully is doing. Ignore the bullying and get help from parents and teachers. Also,
please document any and all emails, post, blogs, or text messages you receive. This will be very
important later when school officials and law enforcement officials do an investigation. Internet
providers and even the police can properly deal with the bully. Cyberbullying may give bullies
anonymity but it always leaves a long trial of evidence to work with.

Can Cyberbullying Be Prevented?

Schools and communities nation-wide take all types of bullying seriously. As soon as the
cyberbullying starts go to school officials for help. Cyberbullying is often an extension or escalation
of bullying that is already happening at school. Parents should also be told what is happening.

Law enforcement officials are unlikely to become involved if the bullying is limited to an isolated
incident or a couple of mean emails or text messages. However, if you get even one
communication that includes a threat of physical harm or a threat of death, contact your local
police department right away. Be aware that urging suicide is considered a death threat and the
police will treat it accordingly under local and state statue.

When Should You Involve Your Local Police Department?

When cyberbullying is repeated and takes on excessive harassment via email, text messages,
forums or chat rooms are all forms of harassment and should involve your local police
department. Threats of violence should also be reported to the police. Very important, please save
all messages as evidence of record. The police will know what to do from there.

You do not need or deserve to put up with cyberbullying. Help is out there and your self-esteem
and life are far too valuable to be placed in harms way by a coward using technology in a bad way.
Cyberbullying leaves a clear trail of evidence and this can work to the advantage of the victim.

Cyberbullies are just bullies with a new weapon in their arsenal of bad behavior; treat them like
you would any bully and they will not only lose their power, but also face criminal charges
depending on the form the cyberbullying was rendered to the victim.


4


CYBERBULLYING - EXERCISES

EXERCISE I: MATCH THE WORDS WITH THEIR DEFINITIONS

1. HARASSMENT ____ To distribute over a surface or area; to extend

2. THREATEN ____ At once, immediately

3. TAUNT ____ To be an indication of potential danger, harm, etc.

4. SPREAD ____ A person who deliberately intimidates those who are weaker

5. MEAN ____ Behavior that is threatening or offensive to other people

6. BULLY ____ To treat someone in a way, that is not kind

7. ENGAGE ____ To try to make someone angry by saying something unkind

8. RIGHT AWAY ____ Having knowledge or perception of a situation or fact

9. BE AWARE ____ Cruel, not kind, not pleasant

10. PICK ON ____ Participate or become involved in








5


EXERCISE II: COMPLETE THE CHART

VERB NOUN ADJECTIVE
1. Death
2. Threaten
3. Funny
4. Repetitive
5. Involvement
6. Saving / Savable
7. Recorder / Record
8. Valuation
9. Useful / Usable
10. Treat
11. Lose
12. Criminalize /
Criminate


EXERCISE III: ALL OF THE FOLLOWING ARE MENTIONED IN THE READING EXCEPT:

A) 1) You should report the threats of violence to the police
2) Bullying is not a new topic
3) The victim of bullying must ask for medical appointment

B) 1) Cyberbullying occurs via the Internet or other technological devices
2) To combat cyberbullying the victim should answer to the bully
3) Bullies are instigators

C) 1) The victim should save all messages as evidence
2) A bully is a coward who uses technology in a bad way
3) As a general rule, cyberbullies are not anonymous

EXERCISE IV: TRANSLATE THE SPECIFIC PARAGRAPHS IN YELLOW COLOR

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
6

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________


EXERCISE V. busque 8 oraciones que estn en voz pasiva y subraye en ellas el auxiliar y el verbo
principal. Luego tradzcalas al espaol.


Oraciones en espaol.
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
7

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

8


TRADUCCION (LECTURA Y REVISION POR EL ESTUDIANTE)
Cmo Combatimos Ciberintimidacin? Por, Claudio V. Cerullo, Caracteristicas de la educacin
Ph.D. > Intimidando | Por: Doctor Claudio V. Cerullo (11/24/11) Vistas: 543

La intimidacin en nuestro mundo no es un nuevo concepto, sinembargo gracias a los avances
de Internet y tecnolgicos en nuestra economa global, los adolescentes ahora estn siendo
intimidados en la comodidad de sus propias casas. El hostigamiento en lnea, ms a menudo
conocido como ciberintimidacin, es un problema principal en nuestras escuelas y comunidades
nacionales. Cuando la intimidacin llega a casa va la Internet esto puede dejar a las vctimas
que sienten desvalido y desesperado. Djeme repetir esto, esto puede abandonar a vctimas
desvalidas y desesperadas!

Definicin Ciberintimidacion?

La ciberintimidacin es cualquier forma de hostigamiento que ocurre va Internet u otro
instrumento tecnolgico. Publicaciones crueles, nombre con los que se llama en espacios de
charla, blogs, facebook, Myspace, fijando perfiles falsos en sitios web, correos electrnicos
mezquinos o crueles y mensajes de texto son todas formas de ciberintimidacin.

Algunos Ejemplos de cmo funciona de ciberintimidacin:

El estudiante (A) es bombardeado por amenazas annimas y correos electrnico de burla en
casa, aun cuando no haya ningn hostigamiento directo en la escuela. La vctima no tiene ni idea
quien enva los mensajes y comienza a sentir que todos estn contra l o ella. Aquel estudiante
ahora est siendo ciberintimidado.


El estudiante (B) un tabln de anuncios de la escuela es spammed (bombardeado) con los
publicaciones de insultos que extienden rumores mezquinos sobre este estudiante especfico.
Los rumores no son verdaderos, pero los estudiantes en la escuela ven las publiaciones y los
asumen crebles. El estudiante entonces es condenado al ostracismo por ellos o ellas. Este
estudiante es ahora una vctima de ciberintimidacin.

Un perfil repugnante falso es publicado en un sitio social conectado a una red como facebook o
myspace, usando el verdadero nombre de un estudiante, la foto, y la informacin de contacto.
Aquel estudiante comienza a recibir mensajes electrnicos extraos de los forasteros que
piensan que el perfil es verdadero. Algunos mensajes son ordinarios y difamatorios. Algunos
mensajes son mezquinos y vulgares. Esto es an otro ejemplo de ciberintimidacin. Como he
ilustrado solamente unos pocos ejemplos de ciberintimidacin, si usted participa en cosas como
esta esto no es diversin inofensiva. Usted esta seindo cibermatn. Si usted es la vctima de este
tipo de tratamiento usted est siendo ciberintimidado y hay cosas que usted puede hacer para
detener esta forma de hostigamiento.

Por qu ocurre la Ciberintimidacin?

La intimidacin ha estado alrededor durante ms de cien aos, pero la ciberintimidacin es muy
diferente, porque esto deja a un abusador permanecer annimo, as como cuando las
9

personas blogean y no colocan sus verdaderos nombres. Es ms fcil intimidar en el ciberespacio
que ello intimidar cara a cara. Con la ciberintimidacin un matn puede meterse con la gente
con mucho menos riesgo de ser capturado, o ellos creen que hay poco que hacer.

Los matones son instigadores naturales y los matones ciberespaciales puede reclutar la
participacin de otros estudiantes que pueden estar indispuestos a intimidar en el mundo real.
Los estudiantes que estn de pie alrededor en un incidente de matoneo sin hacer nada en la vida
real a menudo se hacen participantes activos en el hostigamiento en lnea.

La separacin permitida por el ciberespacio hace matones de la gente que nunca se hara
participes en un incidente de la vida real. La Internet hace la intimidacin ms conveniente ya
que la reaccin de la vctima deja de ser vista por la gente quien normalmente podra no
intimidar de tomar esto seriamente.


Qu puede hacer Usted experimenta la Ciberintimidacin?

Hay muchas cosas que pueden ser hechas para combatir la ciberintimidacin. La cosa ms
importante que una vctima de ciberintimidacin puede hacer es NO responder al matn. No
juegue a los juegos del matn. No conteste correos electrnicos, no responda a publicaciones,
no ingrese en un espacio de charla de intercambios, y no copie lo que el matn hace. No haga
caso de la intimidacin y consiga la ayuda de padres y profesores. Y tambin, por favor
documento alguno y todos los correos electrnico, publicaciones, blogs, o mensajes de texto que
usted recibe. Esto ser muy importante ms tarde cuando los funcionarios de la escuela y
funcionarios policiales hagan una investigacin. Proveedores de Internet y an la polica
adecuadamente puedan tratar con el matn. La ciberintimidacin puede dar el anonimato a los
matones pero esto siempre deja una larga lista de pruebas con la que se puede trabajar.

Puede la ciberintimidacin ser prevenida?

Instruye y las comunidades nacional toman todos los tipos de intimidacin en serio. Tan pronto
como la ciberintimidacin comienza funcionarios de la escuela van a prestar ayuda. La
ciberintimidacin es a menudo una extensin o la escalada de intimidacin que ya ocurre en la
escuela. Los padres tambin deberan decir que esta ocurriendo.

Los esfuerzos de los funcionarios son improbables y llegan a ser complicados si la intimidacin es
limitada a un incidente aislado o un par de correos electrnico o mensajes de texto mezquinos.
Sin embargo, si usted consigue an una comunicacin que incluya una amenaza de dao fsico o
una amenaza de muerte, pnganse en contacto con su departamento local de polica enseguida.
Est consciente que el impulso del suicidio es considerado una amenaza de muerte y la polica lo
tratarn en consecuencia bajo estatutos del estado.

Cundo debera Usted involucrar su Departamento Local de polica?

Cuando la ciberintimidacin es repetida y toma el hostigamiento excesivo va el correo
electrnico, mensajes de texto, foros o los espacios de charla son todas las formas de
hostigamiento y deberan involucrar su departamento local de polica. Las amenazas de
10

violencia tambin deberan ser reportadas a la polica. Muy importante, por favor guarde todos
los mensajes como evidencias grabadas. La polica sabr que hacer desde all.

Usted no necesita o merece aguantar la ciberintimidacin. La ayuda est ah, su amor propio y la
vida es demasiado valiosa para ser puesta en formas de dao por un cobarde que usa la
tecnologa de un mala forma. Ciberintimidando deja un rastro claro de evidencias y esto puede
trabajar en provecho de la vctima.

Los cibermatones son solamente matones con una nueva arma en su arsenal de mal
comportamiento; trtelos como usted cualquier matn y ellos no slo perdern su poder, pero
tambin afrontarn cargos criminales dependiendo de la forma de ciberintimidacin que fue
dada a la vctima.

You might also like