Print Options

Card layout: ?

← Back to notecard set|Easy Notecards home page

Instructions for Side by Side Printing
  1. Print the notecards
  2. Fold each page in half along the solid vertical line
  3. Cut out the notecards by cutting along each horizontal dotted line
  4. Optional: Glue, tape or staple the ends of each notecard together
  1. Verify Front of pages is selected for Viewing and print the front of the notecards
  2. Select Back of pages for Viewing and print the back of the notecards
    NOTE: Since the back of the pages are printed in reverse order (last page is printed first), keep the pages in the same order as they were after Step 1. Also, be sure to feed the pages in the same direction as you did in Step 1.
  3. Cut out the notecards by cutting along each horizontal and vertical dotted line
To print: Ctrl+PPrint as a list

50 notecards = 13 pages (4 cards per page)

Viewing:

Persuasive Essay Facts

front 1

If parents found something you were posting on the internet and they didn't punish you, the teenager or child(ren) may never know right from wrong decisions.

back 1

Source #1

front 2

Until you are 18 every parent should read everything you post, every message you write, and know everything you are doing online and the day your parents made you, they became responsible for everything you do until you are the age of maturity.

back 2

Source #1

front 3

If children tell their parents their passwords with respect, when they are done they could possibly go back to their room and change it immediately so their parents can't get back on your device and if your parents found out you changed your password without them knowing, they could punish you and possibly even take your device away if you won't tell them your new password.

back 3

Source #1

front 4

Most children earn their trust by responsibility and behavior but the more social media accounts the teenager has, the faster their behavior changes and they could get their social media accounts taken away.

back 4

Source #1

front 5

A mom found on Facebook that their kid is cutting themselves mom has the right to search their rooms and remove cutting devices and to physically examine their child for cuts, and to make sure old ones heal.

back 5

Source #1

front 6

Some kids end up using drugs and buying it from other kids in school.

back 6

Source #1

front 7

If the parents don't snoop, they may not have known the child could get terrible life threatening infections or they could kill themselves.

back 7

Source #1

front 8

For younger children, having their password and access to any sites they use is critical.

back 8

Source #2

front 9

Most uses of the Internet and social networking sites provide a positive atmosphere in which people can make new friends and have fun but with each beneficial aspect of these technologies comes the greater risk that criminal predators can take advantage of our children.

back 9

Source #2

front 10

For teens using social media networking sites, perhaps you could insist they add you as a friend so that you can monitor their activity on your own time.

back 10

Source #2

front 11

If you don't get access to your child's social media accounts, they could be doind harmful things to themselves or even other people.

back 11

Source #2

front 12

Some of the images that children post on social media accounts are sexually related and may include violent content that are very disturbing which need to be viewed and discussed with a mature parent/guardian.

back 12

Source #3

front 13

When illegal activities or criminally improper profiles are found to be in violation of the service agreement, the social networking site will terminate service of that profile but monitoring of every profile would be next to impossible.

back 13

Source #3

front 14

Without parental blocks (or filters) on inappropriate sites, young children can be exposed to material they do not need to be seeing and even when parents set up blocks to lock out inappropriate sites, some sites may still contain materials considered appropriate for mature audiences.

back 14

Source #3

front 15

The child may spend this unsupervised time on social networks in chats talking to friends and post that they are home alone not realizing that others could see that information who may be in danger to their safety.

back 15

Source #3

front 16

Cyberbullying, Cyberstalking, and stranger danger are very real threats to children on social networks and while there have been schoolyard bullies, it was easier to intervene because bullies were known and appropriate steps taken to end the bullying or harassment.

back 16

Source #3

front 17

Myspace, Facebook, and similar social networking sites are also used by criminals ready to prey on naive and incorrigible children, teens and young adults.

back 17

Source #3

front 18

If parents do not have their childrens passwords to their social networking sites, they may not know that the greater risk that criminal predators can take advantage of our children.

back 18

Source #3

front 19

Teenagers especially hat it when parents invade their "privacy" and then many heated arguments result angst and "trust" issues involving parental involvement in their personal lives.

back 19

Source #3

front 20

There are people out there who create fake accounts and say fake facts about themselves and they say they are nice and really they could be a child molester or a sexual predator. Would you want your 12-year old daughter talking to ,what shes thinks is, a 12-year old boy when really he is really in his 50's?

back 20

Source #3

front 21

When illegal activities or criminally improper profiles are found to be in violation of the service agreement, the social networking site will terminate service of that profile.

back 21

Source #3

front 22

Regulations set by Myspace.com and other social networking websites specify in their terms and service agreements that persons under a certain age should not be creating a profile or accessing the site.

back 22

Source #3

front 23

Maintain an open dialog with your children, and monitor the use of their cell phones. Positive parental involvement can prevent their children from being victims of crime

back 23

Source #3

front 24

If parents didn't snoop at least once a week, their children could be getting arrested or doing crimes that could get them in juvenile detention.

back 24

Source #3

front 25

The teen has a history of, or is suspected of making poor choices, such as drug use, involvement in gang activity, underage drinking, failing grades in school, unexcused absences, or skipping of school classes

back 25

Source #3

front 26

Aside from the previously discussed risk from Internet predators, prospective employers and those evaluating a student’s worth for college admittance might not be impressed.

back 26

Source #3

front 27

Sometimes teens have accessed and created web communication accounts using a computer not available to the parent.

back 27

Source #3

front 28

The parent may be the last, or the only barrier that stops a child from being victimized by a sexual predator.

back 28

Source #3

front 29

It is a parent's duty to watch over and protect their children- sometimes that means being the parent, and no necessarily the child's best friend.

back 29

Source #3

front 30

Teens should not be posting details like their date of birth, hair color and style, favorite hobbies or after-school activities, where they attend school, names of their best friends, etc. and if so parents need to tell them not to.

back 30

Source #3

front 31

Your children may be getting followers that they do not know and they follow them anyways, allowing the stranger to see your childs posts and the stranger may be sexually interested in your child and could do anything to get to you which would lead to harm.

back 31

Source #3

front 32

The content that some children may post on their social media accounts often contains talk about drinking alcohol and using illegal drugs and it might use sexual overtones, use dark undertones related to suicidal thoughts or suggest violent deeds.

back 32

Source #3

front 33

Two most common incidents reported to police are:

1.) Children that have been victimized by sexual predators.

2.) Bad Behavior of teenagers harassing others through text-messaging, and verbal threats of harm.

back 33

Source #3

front 34

In evaluating a person’s readiness to enter the professional world, many businesses and schools check what kind of Internet social sites a person visits, the content of blog conversations, and with whom that person associates.

back 34

Source #3

front 35

Although on some phones aren't smartphones and can only text and call, people can still send dirty texts and sext and that's one reason why parents should especially check their children's phones even though your children act nice about it.

back 35

Source #3

front 36

Maintain an open dialog with your children, and monitor the use of their cell phones and have positive parental involvement can prevent their children from being victims of crime.

back 36

Source #3

front 37

Not only can inappropriate use of a cellular phone be reason for school suspension or expulsion, in certain circumstances threatening text-messages, sharing of sexually explicit digital images, or those containing evidence of a crime may be grounds for a criminal investigation and subsequent arrest.

back 37

Source #3

front 38

Internet concerns it is highly recommended that parents discuss use of internet technologies, impressing upon their children the dangers involved in using websites such as Myspace or Facebook.

back 38

Source #3

front 39

It is suggested that if parents allow their children to create a Myspace or other account, that the parents have full access to monitor the content and conduct within that account.

back 39

Source #3

front 40

The child may be naively continuing contact with someone intent on sexually abusing him/her at a later date and most incidents of non-family related abuse is by a sexual predator that spends an enormous amount of time grooming a child for future suxual abuse.

back 40

Source #3

front 41

Social approval is especially craved by teens because they are beginning to shift focus from family to peers.

back 41

Source #4

front 42

One important way to make this guidance more effective would be if parents chose to monitor their children’s digital behavior by acquiring their passwords and paying close attention to their social network activity such as Facebook and chat rooms, even if it means skimming through their private messages.

back 42

Source #4

front 43

One important way to make this guideline more effective would be if parents chose to monitor their children's digital behavior by acquiring their passwords and paying close attention to their social network activity such as Facebook and chat rooms, even if it means skimming through their private messages.

back 43

Source #4

front 44

While cyberbullying is indeed a danger to children, it is not an excuse to invade their personal life-world.

back 44

Source #4

front 45

As online spaces are not inherently more dangerous than those offline, it seems reasonable to suggest that similar limitations and restrictions on invasions of privacy that apply online should also apply offline.

back 45

Source #4

front 46

Moreover in less traditional ‘offline’ spaces children have far greater ability to choose which information they share with their parents and what they do not.

back 46

Source #4

front 47

Responsible parents need to be one step ahead because at these relevant stages, cognitive abilities are advancing, but morals are lagging behind, meaning children are morally unequipped in making informed decisions in cyberspace.

back 47

Source #4

front 48

They should also spend time surfing the Internet together with them to discuss their issues and problems. But the child should always also have the opportunity to have his or her own protected and private space that is outside the every watchful surveilant eye of the parent.

back 48

Source #4

front 49

The UNCRC clearly states that “No child shall be subjected to arbitrary or unlawful interference with his or her privacy, family, home or correspondence, nor to unlawful attacks on his or her honour and reputation."

back 49

Source #4

front 50

Also if the parents searched their stuff, they could be trying to send a message to the people out in the open that somebody is threatening them or hurting them and maybe they didn't want to tell anybody in person because possibly the person hurting them could be stalking them or watching over them to make sure they don't tell on them.

back 50

Source #4