Difference between revisions of "AY Honors/Bully Prevention II/Answer Key"
Jomegat bot (talk | contribs) m (Jomegat bot moved page AY Honor Bully Prevention II to AY Honor Bully Prevention II Answer Key: Bot: Moved page) |
Jomegat bot (talk | contribs) (Bot: Automated import of articles *** existing text overwritten ***) |
||
Line 12: | Line 12: | ||
}} | }} | ||
− | |||
− | |||
− | |||
− | |||
− | ==1. | + | <noinclude></translate></noinclude> |
+ | <section begin="Body" /> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=99}} | ||
+ | <noinclude><translate></noinclude> | ||
+ | <!-- 99. Note: Because of the sensitive nature (and prevalence) of bullying, it is suggested that this honor be taught by an individual who has recently received training or done meaningful reading/research on the topic of bully prevention (and if possible has been certified on this topic). The BEST way to earn this honor is over a series of sessions, so that the principles become a part of the participants’ nature rather than quickly learned and as quickly forgotten. <br>Note: Bully Prevention I and II were written without one being the prerequisite of the other so that the instructor could choose the honor(s) to teach that are most relevant to the group and group dynamics. --> | ||
+ | |||
+ | <noinclude></translate></noinclude> | ||
+ | {{CloseReq}} <!-- 99 --> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1}} | ||
+ | <noinclude><translate></noinclude> | ||
+ | <!-- 1. Review and explain four basic rules of bully prevention. --> | ||
− | == | + | <noinclude></translate></noinclude> |
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1a}} <!--T:5--> | ||
+ | <noinclude><translate></noinclude> | ||
− | == | + | <noinclude></translate></noinclude> |
+ | {{CloseReq}} <!-- 1a --> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1b}} <!--T:6--> | ||
+ | <noinclude><translate></noinclude> | ||
− | == | + | <noinclude></translate></noinclude> |
+ | {{CloseReq}} <!-- 1b --> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1c}} <!--T:7--> | ||
+ | <noinclude><translate></noinclude> | ||
− | + | <noinclude></translate></noinclude> | |
+ | {{CloseReq}} <!-- 1c --> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1d}} <!--T:8--> | ||
+ | <noinclude><translate></noinclude> | ||
− | ==2. Review some of the signs to look for that could determine if an individual is suffering from some form of bullying. | + | <noinclude></translate></noinclude> |
+ | {{CloseReq}} <!-- 1d --> | ||
+ | {{CloseReq}} <!-- 1 --> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2}} | ||
+ | <noinclude><translate></noinclude> | ||
+ | <!-- 2. Review some of the signs to look for that could determine if an individual is suffering from some form of bullying. --> | ||
− | ==3. Review what different roles people play when being part of a bullying situation (often described as the Bully Circle), and which roles have you witnessed happen in situations you have seen or been involved in? | + | <noinclude></translate></noinclude> |
+ | {{CloseReq}} <!-- 2 --> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3}} | ||
+ | <noinclude><translate></noinclude> | ||
+ | <!-- 3. Review what different roles people play when being part of a bullying situation (often described as the Bully Circle), and which roles have you witnessed happen in situations you have seen or been involved in? --> | ||
− | ==4. Explain the following types of bullying and evaluate ways that you would know that the following are happening within your friendship community: | + | <noinclude></translate></noinclude> |
+ | {{CloseReq}} <!-- 3 --> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=4}} | ||
+ | <noinclude><translate></noinclude> | ||
+ | <!-- 4. Explain the following types of bullying and evaluate ways that you would know that the following are happening within your friendship community: --> | ||
− | == | + | <noinclude></translate></noinclude> |
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=4a}} <!--T:12--> | ||
+ | <noinclude><translate></noinclude> | ||
<!--T:13--> | <!--T:13--> | ||
Line 43: | Line 75: | ||
(National Institute of Health - nih.gov) | (National Institute of Health - nih.gov) | ||
− | == | + | <noinclude></translate></noinclude> |
+ | {{CloseReq}} <!-- 4a --> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=4b}} <!--T:14--> | ||
+ | <noinclude><translate></noinclude> | ||
<!--T:15--> | <!--T:15--> | ||
Line 68: | Line 103: | ||
* Impersonation: This tactic is among the more serious violations, which involves acquiring some form of access to a person’s email or social media account, and then using it to send derogatory or humiliating material to others under that person’s identity. | * Impersonation: This tactic is among the more serious violations, which involves acquiring some form of access to a person’s email or social media account, and then using it to send derogatory or humiliating material to others under that person’s identity. | ||
− | == | + | <noinclude></translate></noinclude> |
+ | {{CloseReq}} <!-- 4b --> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=4c}} <!--T:22--> | ||
+ | <noinclude><translate></noinclude> | ||
<!--T:23--> | <!--T:23--> | ||
Line 82: | Line 120: | ||
* the act of touching, grabbing, or pinching someone in a deliberately sexual way | * the act of touching, grabbing, or pinching someone in a deliberately sexual way | ||
− | ==5 | + | <noinclude></translate></noinclude> |
+ | {{CloseReq}} <!-- 4c --> | ||
+ | {{CloseReq}} <!-- 4 --> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=5}} | ||
+ | <noinclude><translate></noinclude> | ||
+ | <!-- 5. Briefly describe --> | ||
− | == | + | <noinclude></translate></noinclude> |
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=5a}} <!--T:26--> | ||
+ | <noinclude><translate></noinclude> | ||
<!--T:27--> | <!--T:27--> | ||
Line 92: | Line 137: | ||
Basically, flirting is a welcomed action from the individuals involved. The attention experienced while flirting serves more of appreciated attention. Harassment is attention that is unwanted or unwelcome, especially if asked to stop and it persist. | Basically, flirting is a welcomed action from the individuals involved. The attention experienced while flirting serves more of appreciated attention. Harassment is attention that is unwanted or unwelcome, especially if asked to stop and it persist. | ||
− | == | + | <noinclude></translate></noinclude> |
+ | {{CloseReq}} <!-- 5a --> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=5b}} <!--T:29--> | ||
+ | <noinclude><translate></noinclude> | ||
<!--T:30--> | <!--T:30--> | ||
Line 103: | Line 151: | ||
(National Institute of Health - nih.gov) | (National Institute of Health - nih.gov) | ||
− | ==6. Discuss with a group the following texts as each relates to bullying: | + | <noinclude></translate></noinclude> |
+ | {{CloseReq}} <!-- 5b --> | ||
+ | {{CloseReq}} <!-- 5 --> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6}} | ||
+ | <noinclude><translate></noinclude> | ||
+ | <!-- 6. Discuss with a group the following texts as each relates to bullying: --> | ||
− | = | + | <noinclude></translate></noinclude> |
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6a}} <!--T:33--> | ||
+ | <noinclude><translate></noinclude> | ||
<!--T:34--> | <!--T:34--> | ||
Line 121: | Line 176: | ||
}} | }} | ||
− | = | + | <noinclude></translate></noinclude> |
+ | {{CloseReq}} <!-- 6a --> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6b}} <!--T:37--> | ||
+ | <noinclude><translate></noinclude> | ||
<!--T:38--> | <!--T:38--> | ||
Line 137: | Line 195: | ||
}} | }} | ||
− | = | + | <noinclude></translate></noinclude> |
+ | {{CloseReq}} <!-- 6b --> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6c}} <!--T:41--> | ||
+ | <noinclude><translate></noinclude> | ||
<!--T:42--> | <!--T:42--> | ||
Line 153: | Line 214: | ||
}} | }} | ||
− | = | + | <noinclude></translate></noinclude> |
+ | {{CloseReq}} <!-- 6c --> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6d}} <!--T:45--> | ||
+ | <noinclude><translate></noinclude> | ||
<!--T:46--> | <!--T:46--> | ||
Line 169: | Line 233: | ||
}} | }} | ||
− | = | + | <noinclude></translate></noinclude> |
+ | {{CloseReq}} <!-- 6d --> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6e}} <!--T:49--> | ||
+ | <noinclude><translate></noinclude> | ||
<!--T:50--> | <!--T:50--> | ||
Line 185: | Line 252: | ||
}} | }} | ||
− | ==7. Discuss with an individual or in a group some of the ways to protect oneself from the following: | + | <noinclude></translate></noinclude> |
+ | {{CloseReq}} <!-- 6e --> | ||
+ | {{CloseReq}} <!-- 6 --> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=7}} | ||
+ | <noinclude><translate></noinclude> | ||
+ | <!-- 7. Discuss with an individual or in a group some of the ways to protect oneself from the following: --> | ||
− | == | + | <noinclude></translate></noinclude> |
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=7a}} <!--T:54--> | ||
+ | <noinclude><translate></noinclude> | ||
− | == | + | <noinclude></translate></noinclude> |
+ | {{CloseReq}} <!-- 7a --> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=7b}} <!--T:55--> | ||
+ | <noinclude><translate></noinclude> | ||
− | == | + | <noinclude></translate></noinclude> |
+ | {{CloseReq}} <!-- 7b --> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=7c}} <!--T:56--> | ||
+ | <noinclude><translate></noinclude> | ||
− | ==8. Reflect on a moment when you or someone you know experienced being a target of relational aggression. As a first-hand witness or from a close acquaintance, briefly answer the following: | + | <noinclude></translate></noinclude> |
+ | {{CloseReq}} <!-- 7c --> | ||
+ | {{CloseReq}} <!-- 7 --> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=8}} | ||
+ | <noinclude><translate></noinclude> | ||
+ | <!-- 8. Reflect on a moment when you or someone you know experienced being a target of relational aggression. As a first-hand witness or from a close acquaintance, briefly answer the following: --> | ||
− | == | + | <noinclude></translate></noinclude> |
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=8a}} <!--T:58--> | ||
+ | <noinclude><translate></noinclude> | ||
− | == | + | <noinclude></translate></noinclude> |
+ | {{CloseReq}} <!-- 8a --> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=8b}} <!--T:59--> | ||
+ | <noinclude><translate></noinclude> | ||
− | == | + | <noinclude></translate></noinclude> |
+ | {{CloseReq}} <!-- 8b --> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=8c}} <!--T:60--> | ||
+ | <noinclude><translate></noinclude> | ||
− | ==9. Demonstrate a profound understanding of the vulnerabilities, accountabilities, and pitfalls of spreading rumors by doing one of the following: | + | <noinclude></translate></noinclude> |
+ | {{CloseReq}} <!-- 8c --> | ||
+ | {{CloseReq}} <!-- 8 --> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=9}} | ||
+ | <noinclude><translate></noinclude> | ||
+ | <!-- 9. Demonstrate a profound understanding of the vulnerabilities, accountabilities, and pitfalls of spreading rumors by doing one of the following: --> | ||
− | == | + | <noinclude></translate></noinclude> |
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=9a}} <!--T:62--> | ||
+ | <noinclude><translate></noinclude> | ||
− | == | + | <noinclude></translate></noinclude> |
+ | {{CloseReq}} <!-- 9a --> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=9b}} <!--T:63--> | ||
+ | <noinclude><translate></noinclude> | ||
− | + | <noinclude></translate></noinclude> | |
+ | {{CloseReq}} <!-- 9b --> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=9c}} <!--T:64--> | ||
+ | <noinclude><translate></noinclude> | ||
− | ==10. Cyberbullying often includes elements that endanger the life and safety of someone else, and thus may require reporting to officials. Determine what steps or actions are needed at each stage listed below to work to resolve cyber bullying situations. | + | <noinclude></translate></noinclude> |
+ | {{CloseReq}} <!-- 9c --> | ||
+ | {{CloseReq}} <!-- 9 --> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=10}} | ||
+ | <noinclude><translate></noinclude> | ||
+ | <!-- 10. Cyberbullying often includes elements that endanger the life and safety of someone else, and thus may require reporting to officials. Determine what steps or actions are needed at each stage listed below to work to resolve cyber bullying situations. --> | ||
− | == | + | <noinclude></translate></noinclude> |
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=10a}} <!--T:66--> | ||
+ | <noinclude><translate></noinclude> | ||
− | + | <noinclude></translate></noinclude> | |
+ | {{CloseReq}} <!-- 10a --> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=10b}} <!--T:67--> | ||
+ | <noinclude><translate></noinclude> | ||
− | == | + | <noinclude></translate></noinclude> |
+ | {{CloseReq}} <!-- 10b --> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=10c}} <!--T:68--> | ||
+ | <noinclude><translate></noinclude> | ||
− | == | + | <noinclude></translate></noinclude> |
+ | {{CloseReq}} <!-- 10c --> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=10d}} <!--T:69--> | ||
+ | <noinclude><translate></noinclude> | ||
− | ==11. Discuss each of the following scenarios as a group. 1) Read the situation, 2) evaluate whether sexual bullying is taking place, and 3) based on your observation, discuss potentially appropriate responses. | + | <noinclude></translate></noinclude> |
+ | {{CloseReq}} <!-- 10d --> | ||
+ | {{CloseReq}} <!-- 10 --> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=11}} | ||
+ | <noinclude><translate></noinclude> | ||
+ | <!-- 11. Discuss each of the following scenarios as a group. 1) Read the situation, 2) evaluate whether sexual bullying is taking place, and 3) based on your observation, discuss potentially appropriate responses. --> | ||
− | == | + | <noinclude></translate></noinclude> |
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=11a}} <!--T:71--> | ||
+ | <noinclude><translate></noinclude> | ||
− | == | + | <noinclude></translate></noinclude> |
+ | {{CloseReq}} <!-- 11a --> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=11b}} <!--T:72--> | ||
+ | <noinclude><translate></noinclude> | ||
− | == | + | <noinclude></translate></noinclude> |
+ | {{CloseReq}} <!-- 11b --> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=11c}} <!--T:73--> | ||
+ | <noinclude><translate></noinclude> | ||
− | == | + | <noinclude></translate></noinclude> |
+ | {{CloseReq}} <!-- 11c --> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=11d}} <!--T:74--> | ||
+ | <noinclude><translate></noinclude> | ||
− | == | + | <noinclude></translate></noinclude> |
+ | {{CloseReq}} <!-- 11d --> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=11e}} <!--T:75--> | ||
+ | <noinclude><translate></noinclude> | ||
− | == | + | <noinclude></translate></noinclude> |
+ | {{CloseReq}} <!-- 11e --> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=11f}} <!--T:76--> | ||
+ | <noinclude><translate></noinclude> | ||
− | ==12. Discuss from a Christian's perspective how bullying has been and continues to be used as a means to hinder spreading the gospel of Christ. | + | <noinclude></translate></noinclude> |
+ | {{CloseReq}} <!-- 11f --> | ||
+ | {{CloseReq}} <!-- 11 --> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=12}} | ||
+ | <noinclude><translate></noinclude> | ||
+ | <!-- 12. Discuss from a Christian's perspective how bullying has been and continues to be used as a means to hinder spreading the gospel of Christ. --> | ||
+ | <noinclude></translate></noinclude> | ||
+ | {{CloseReq}} <!-- 12 --> | ||
+ | <noinclude><translate></noinclude> | ||
==References== <!--T:78--> | ==References== <!--T:78--> | ||
Line 240: | Line 392: | ||
[[Category:Adventist Youth Honors Answer Book|{{SUBPAGENAME}}]] | [[Category:Adventist Youth Honors Answer Book|{{SUBPAGENAME}}]] | ||
<noinclude></translate></noinclude> | <noinclude></translate></noinclude> | ||
+ | <section end="Body" /> |
Revision as of 18:55, 26 December 2020
99
1
1a
1b
1c
1d
2
3
4
4a
Refers to damage relationships between friends that destroy status in groups to hurt or upset someone. Over and over again some children in a social setting:
- Get deliberately left out of get-togethers, parties, trips or groups
- Have others ignore them, not wanting to be their friend anymore, or not wanting them around in their group
- Have nasty lies, rumors or stories told about them
(National Institute of Health - nih.gov)
4b
This is when someone tries to upset and harm a person using electronic means (eg, mobile phones, text messages, instant messaging, blogs, websites [eg, Facebook, YouTube] or emails; or have their private email, instant mail or text messages forwarded to someone else or have them posted where others can see them; or have rumors spread about them online; or get threatening or aggressive emails, instant messages or text messages; or have embarrassing pictures posted online without their permission (National Institute of Health - nih.gov)
Types of Cyberbullying
- Prohibiting: This tactic used the art of alienation, where information is made known about a special group to a particular person, or the target, and then intentionally barring that person from the group, as a form of exclusion.
- Deception: This tactic involves befriending an individual for the purpose of acquiring information that can be used against them by forwarding it to others.
- Denigration: This tactic involves attacking an individual’s character by deliberately sending messages or posting false information or rumors about the person for the purpose of inflicting damage to the person's reputation or their relationships with their peers.
- Cyberstalking: Since we use our message devices on a consistent basis, undesirable messages are something that we do not want on a regular basis. This tactic uses repetitive messaging tools to send painful, malicious and/or false information or threatening messages for the purposes of bullying without face to face contact.
- Flaming: This is a common tactic where fights between individuals are conducted online by via e-mail, text messaging, or some form of social media using strong, harsh and ill-mannered language.
- Impersonation: This tactic is among the more serious violations, which involves acquiring some form of access to a person’s email or social media account, and then using it to send derogatory or humiliating material to others under that person’s identity.
4c
Sexual bullying involves the usage of hurtful and demeaning acts that target an individual sexually. This may involve sexually oriented name calling, comments, gestures, and unwelcome touching.
Some examples:
- making sexual jokes, comments, or gestures to or about someone
- using various online or face to face methods to spread unwelcomed rumors
- writing sexual messages about people in public areas
- showing inappropriate sexual pictures or videos to someone of themselves or another person
- posting sexual comments online of videos or pictures on social networks
- the act of touching, grabbing, or pinching someone in a deliberately sexual way
5
5a
This is an open question designed for self-reflection.
Basically, flirting is a welcomed action from the individuals involved. The attention experienced while flirting serves more of appreciated attention. Harassment is attention that is unwanted or unwelcome, especially if asked to stop and it persist.
5b
- Have their private email, instant mail or text messages forwarded to someone else or have them posted where others can see them
- Have rumors spread about them online
- Get threatening or aggressive emails, instant messages or text messages
- Have embarrassing pictures posted online without their permission
(National Institute of Health - nih.gov)
6
6a
Be strong and of good courage, do not fear nor be afraid of them; for the Lord your God, He is the One who goes with you. He will not leave you nor forsake you.”
6b
There is one who speaks like the piercings of a sword, but the tongue of the wise promotes health.
6c
My brethren, let not many of you become teachers, knowing that we shall receive a stricter judgment. For we all stumble in many things. If anyone does not stumble in word, he is a perfect man, able also to bridle the whole body. Indeed, we put bits in horses’ mouths that they may obey us, and we turn their whole body. Look also at ships: although they are so large and are driven by fierce winds, they are turned by a very small rudder wherever the pilot desires. Even so the tongue is a little member and boasts great things. See how great a forest a little fire kindles! And the tongue is a fire, a world of iniquity. The tongue is so set among our members that it defiles the whole body, and sets on fire the course of nature; and it is set on fire by hell. For every kind of beast and bird, of reptile and creature of the sea, is tamed and has been tamed by mankind. But no man can tame the tongue. It is an unruly evil, full of deadly poison. With it we bless our God and Father, and with it we curse men, who have been made in the similitude of God. Out of the same mouth proceed blessing and cursing. My brethren, these things ought not to be so. Does a spring send forth fresh water and bitter from the same opening?
6d
Let no corrupt word proceed out of your mouth, but what is good for necessary edification, that it may impart grace to the hearers.
6e
And the second, like it, is this: ‘You shall love your neighbor as yourself.’ There is no other commandment greater than these.”
7
7a
7b
7c
8
8a
8b
8c
9
9a
9b
9c
10
10a
10b
10c
10d
11
11a
11b
11c
11d
11e
11f
12
References