Reference no: EM131376766
Topic of the paper:
QUESTION 1: Bullying is not only seen in person (in the classroom) but unfortunately seen online. What are the best ways for parents and teachers to handle these situations when children are going through a case of cyber-bullying?
QUESTION 2: Not only am I interested in knowing about the one being bullied but also the one doing the bullying. Kids are not the only ones doing the bullying but also adults so why do we see so many adults on social media taking part in posting/"saying" horrible things to and about other social media users?
QUESTION 3: Bullying and cyber-bullying have serious negative effects on those who are the victim in that type of situation. What are the negative effects that could happen to the victim and how difficult is it for them to move on from it?
QUESTION 4: A question I have always had was how can we properly intervene without making things worse for the child/individual being bullied? Online I often seen many people stepping up and defending the one being bullied just for the bully to lash out on that person as well so how can we prevent that as well?
The introduction section should:
1) Include an introduction that introduces your reader to the topic,
2) Give background information about your topic,
3) State the problem and your purpose for the proposal (clear and focused thesis statement),
4) Address the key audience,
5) Be at least 3 pages in length, and
6) Include a Reference page in proper APA format - this must include at least 5 credible sources.
Discuss about the attention-deficit-hyperactivity disorder
: The most common childhood disorders tend to fall into one of two categories: behavioral disorders or emotional disorders. This assignment will focus on the behavioral disorders of childhood, which include the following:Attention-deficit/hyperactiv..
|
What failure percentage would be expected in service
: If the maximum load encountered in various applications is normally distributed with a standard deviation of 2 kN, and if part strength is normally distributed with a standard deviation of 1.5 kN, what failure percentage would be expected in servi..
|
Website is compatible with most browsers
: Imagine that you are Web designer for a company of your choice (travel, bank, pet food, hair salon, high school, college, landscaper, retail store, etc.). Identify the company and describe what you would check to ensure that a Website is compatibl..
|
What security concerns are associated with the thumb drive
: What security concerns are associated with the thumb drive? How could information security policies or an information security plan help your business with this type of situation?
|
Who are the victim in that type of situation
: Bullying and cyber-bullying have serious negative effects on those who are the victim in that type of situation. What are the negative effects that could happen to the victim and how difficult is it for them to move on from it
|
Information security policy and an information security plan
: Develop a document discussing the importance of creating information security polices and an information security plan.
|
Which fields in the tcp protocol provide reliability
: 1. Which fields in the TCP protocol provide reliability? 2. Why do you think that the version field is in the very first field on the header? Notice that is located in the same place in the IPV6 IP header as well.
|
How do you feel about having your fingerprints
: How do you feel about having your fingerprints, facial features, and perhaps more of your biometric features encoded in documents such as your passport? Explain your answer.
|
Analyze the information presented on microexpressions
: Discuss how body language and facial expressions can be critical in determining someone's actions and inner states. Analyze the information presented on microexpressions and lying, and explain how understanding these concepts can influence your pe..
|