Big t. D. A 2 . two Safeguarding the welfare of youngsters and young adults
3. 1 *identify you will of different types of child abuse
Abuse, damage or lovato of children and young people usually takes many varieties. Sometimes several form of maltreatment is experienced concurrently for example a kid may be bodily abused and also neglected.
Proven below can be described as table with examples and characteristics of abuse вЂ“
|FORM OF ABUSE |CHARACTERISTICS |SIGNS | |PHYSICAL |*hitting/kicking/throwing |*bruises/burns | | |*beaten with objects |*not planning to get improved for P. E | | |*being burnt or scolded |*heavy clothing or wearing lots of layers | | | |(to hide marks) | |SEXUAL |*viewing porn |*self-harm | | |*touching exclusive parts |*personality changes | | |*acts of transmission |*inappropriate sexual behaviours | | | |*medical concerns (urine infection) | |EMOTIONAL |*undervalued/bullied |*becoming withdrawn | | |*shouting |*under-confident | | |*negative criticism |*nervous behaviour | | |*showing no affection | | |NEGLECT |*not providing- |*tiredness | | |warmth |*hungry | | |adequate food |*frequent health issues | | |medical proper care |*not growing or extra pounds | | |education |
To. D. A 2 . two Safeguarding the welfare of children and young people
3. a couple of *describe the potential risks and conceivable consequences for youngsters and the younger generation using the internet, mobile phones and other systems
There are many dangers that kids and the younger generation may be confronted with whilst employing modern technology. The net can also be reached through mobile phones as well these days so it is made easier to receive even more messages and images.
Risks while using the internet вЂ“
*giving out personal information (at risk via building вЂfriendships' with other children who turn into adults (grooming) *accessing inappropriate info (often accidentally when ever innocent phrases are created search engine) *taking or receiving photographs over the internet that could lead to these people being used by another individual or mature
Risks via text messaging вЂ“
*unwelcome text messages that are harmful or trigger discomfort
*images sent to make the victim embarrass myself or insecure
Risks by mobile phone cell phone calls вЂ“
*stealing the sufferer phone and using it to harass others to make all of them believe that the victim is definitely responsible