SlideShare a Scribd company logo
1 of 15
By: Emma, Hope, Ali and  Caleb
Surfer Dude…
Surfer dude… Ways that the internet should be used  Cyber security can limit the amount of material that is available to kids and you could make the home website a kid safe search engine. Talking to kids about the risks and minuses of using the internet is also a good way to promote internet safety but share with them the advantages of the internet and why it is there for them. Educational material, reading materials that interests readers, pen-pal sites, parental information and reference materials  The internet should not be used to show: inappropriate websites, addresses, phone numbers, full names and personal information and pictures.
Slick the Spammer! By Hope Sievert
What is a Spam? A spam is an unnecessary mail or newsgroup posting that you may receive. It can involve email advertizing for a certain product or just an un-asked email. How Can I Outsmart the Spammer? ,[object Object]
You should create an anonymous account while keeping in touch by Usenet groups; forums at chat rooms at somewhere like hiotmail.com
Start Fresh! Delete your old email address and create a new one!,[object Object]
What Should You do if  You receive Spam?
Netiquette Ned Netiquette is the etiquette of the internet and teaches you to always be nice and courteous. Flame Wars: 	A flame is an e-mail. A flame war is sending mean e-mails or too many emails to another internet user. You can avoid a flame war by being calm, ignoring the message or sending a polite message back asking them what they meant.
Netiquette Ned Two things to remember while being online is to be smart and always follow the rules. Stay away from all capital letter phrases because it signifies yelling or anger. If you become uncomfortable with a topic or site you find on the internet, you should click out of it or go to a new webpage.
Netiquette Ned The difference between a public and a private e-mail message is that everybody can see public e-mails but private is just between you and the receiver.  An emoticon is an icon that shows emotion and can reveal too many things that are violent, mean or impolite.  
IM a Chatter Ali
What is a chat room? *A  chat room is a current conversation on the computer between two or more people. In chat rooms, users can enter text by typing on the keyboard and entering text. Two ways you can stay safe in a chat room: *if you’re asked for a screen name for a chat room, use a nickname- never your real name *if you get an email telling you not to tell your parents about it, don’t reply and tell an adult right away
CHAT ROOM SAFETY! Chat rooms are a fun way to communicate with your friends and family!  However, it is on the internet, which means there are some safety rules you must follow. What  should I do if I read something in a chat room that makes me uncomfortable? *Leave the chat room and tell an adult immediately. What type of information can you give out in a chat room? *nicknames and  information that would not give away any personal information What type of information can’t you give out in a chat room? *your real name, passwords, telephone numbers, address, banking details, etc.
Surfer Dude…

More Related Content

What's hot

Brochure
BrochureBrochure
Brochure
jrj6819
 
Internet Saftey Final
Internet Saftey FinalInternet Saftey Final
Internet Saftey Final
guest252cc9
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
guest5a7b36
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette
dhabyahalk
 
Presentación kefalonia[1]
Presentación kefalonia[1]Presentación kefalonia[1]
Presentación kefalonia[1]
Miriam Ortega
 
Internet Safety Netiquette Ned
Internet Safety Netiquette NedInternet Safety Netiquette Ned
Internet Safety Netiquette Ned
guest7ac5b0e4
 
Netiquette hci
Netiquette hciNetiquette hci
Netiquette hci
LeonardYam
 
Internet Safety Surfer Dude
Internet Safety Surfer DudeInternet Safety Surfer Dude
Internet Safety Surfer Dude
guesta2b256
 

What's hot (18)

Brochure
BrochureBrochure
Brochure
 
Internet Saftey Final
Internet Saftey FinalInternet Saftey Final
Internet Saftey Final
 
E safety assembly
E safety assemblyE safety assembly
E safety assembly
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Digital citizenship for Elementary Students
Digital citizenship for Elementary StudentsDigital citizenship for Elementary Students
Digital citizenship for Elementary Students
 
Presentación kefalonia[1]
Presentación kefalonia[1]Presentación kefalonia[1]
Presentación kefalonia[1]
 
Internet Safety Netiquette Ned
Internet Safety Netiquette NedInternet Safety Netiquette Ned
Internet Safety Netiquette Ned
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
Netiquette hci
Netiquette hciNetiquette hci
Netiquette hci
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for students
 
Netsafety Parents
Netsafety ParentsNetsafety Parents
Netsafety Parents
 
Chatter
ChatterChatter
Chatter
 
Hungerfordnetiquette
HungerfordnetiquetteHungerfordnetiquette
Hungerfordnetiquette
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety Surfer Dude
Internet Safety Surfer DudeInternet Safety Surfer Dude
Internet Safety Surfer Dude
 
Netiquette
NetiquetteNetiquette
Netiquette
 

Similar to Internet Safety Hope Sievert, Emma Balison, Caleb

Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
guest0c7b65
 
Internet Safety: I
Internet Safety: IInternet Safety: I
Internet Safety: I
mlegan31
 
Internet Safety Im Chatterer
Internet Safety  Im ChattererInternet Safety  Im Chatterer
Internet Safety Im Chatterer
guest4fd30d4
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
guest5558240
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
guest5000f0a
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
guest011ce7
 
Internet Safety Power Point
Internet Safety Power PointInternet Safety Power Point
Internet Safety Power Point
guest24931c
 
Mac Kenzi D. Group#3
Mac Kenzi D. Group#3Mac Kenzi D. Group#3
Mac Kenzi D. Group#3
guest3e462b5
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammer
guest2e06031d
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammer
guest2e06031d
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
tholman77
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
cey.ruth
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
TeacherNicaPrintable
 
Q3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfQ3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdf
BryanSmile
 

Similar to Internet Safety Hope Sievert, Emma Balison, Caleb (20)

Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
Internet Safety: I
Internet Safety: IInternet Safety: I
Internet Safety: I
 
Internet Safety Im Chatterer
Internet Safety  Im ChattererInternet Safety  Im Chatterer
Internet Safety Im Chatterer
 
Internet safty
Internet saftyInternet safty
Internet safty
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdf
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
Internet Safety Power Point
Internet Safety Power PointInternet Safety Power Point
Internet Safety Power Point
 
Mac Kenzi D. Group#3
Mac Kenzi D. Group#3Mac Kenzi D. Group#3
Mac Kenzi D. Group#3
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammer
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammer
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
 
Netiquettes
NetiquettesNetiquettes
Netiquettes
 
CyBeR sAfEtY
CyBeR sAfEtYCyBeR sAfEtY
CyBeR sAfEtY
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
Q3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfQ3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdf
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 

Internet Safety Hope Sievert, Emma Balison, Caleb

  • 1. By: Emma, Hope, Ali and Caleb
  • 3. Surfer dude… Ways that the internet should be used Cyber security can limit the amount of material that is available to kids and you could make the home website a kid safe search engine. Talking to kids about the risks and minuses of using the internet is also a good way to promote internet safety but share with them the advantages of the internet and why it is there for them. Educational material, reading materials that interests readers, pen-pal sites, parental information and reference materials The internet should not be used to show: inappropriate websites, addresses, phone numbers, full names and personal information and pictures.
  • 4. Slick the Spammer! By Hope Sievert
  • 5.
  • 6. You should create an anonymous account while keeping in touch by Usenet groups; forums at chat rooms at somewhere like hiotmail.com
  • 7.
  • 8. What Should You do if You receive Spam?
  • 9. Netiquette Ned Netiquette is the etiquette of the internet and teaches you to always be nice and courteous. Flame Wars: A flame is an e-mail. A flame war is sending mean e-mails or too many emails to another internet user. You can avoid a flame war by being calm, ignoring the message or sending a polite message back asking them what they meant.
  • 10. Netiquette Ned Two things to remember while being online is to be smart and always follow the rules. Stay away from all capital letter phrases because it signifies yelling or anger. If you become uncomfortable with a topic or site you find on the internet, you should click out of it or go to a new webpage.
  • 11. Netiquette Ned The difference between a public and a private e-mail message is that everybody can see public e-mails but private is just between you and the receiver. An emoticon is an icon that shows emotion and can reveal too many things that are violent, mean or impolite.  
  • 13. What is a chat room? *A chat room is a current conversation on the computer between two or more people. In chat rooms, users can enter text by typing on the keyboard and entering text. Two ways you can stay safe in a chat room: *if you’re asked for a screen name for a chat room, use a nickname- never your real name *if you get an email telling you not to tell your parents about it, don’t reply and tell an adult right away
  • 14. CHAT ROOM SAFETY! Chat rooms are a fun way to communicate with your friends and family! However, it is on the internet, which means there are some safety rules you must follow. What should I do if I read something in a chat room that makes me uncomfortable? *Leave the chat room and tell an adult immediately. What type of information can you give out in a chat room? *nicknames and information that would not give away any personal information What type of information can’t you give out in a chat room? *your real name, passwords, telephone numbers, address, banking details, etc.
  • 16. Surfer dude… Ways that the internet should be used Cyber security can limit the amount of material that is available to kids and you could make the home website a kid safe search engine. Talking to kids about the risks and minuses of using the internet is also a good way to promote internet safety but share with them the advantages of the internet and why it is there for them. Educational material, reading materials that interests readers, pen-pal sites, parental information and reference materials The internet should not be used to show: inappropriate websites, addresses, phone numbers, full names and personal information and pictures.