Flash Player 9 (or above) is needed to view presentations.
We have detected that you do not have it on your computer. To install it, go here.

Like this presentation? Why not share!







Total Views
Views on SlideShare
Embed Views



2 Embeds 4

http://allaboutbeingajaguar-maggie.blogspot.com 3
http://www.blogger.com 1



Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment

Entrees Entrees Presentation Transcript

  • Guide to Internet Safety
    By: Maggie McPheeters
  • Internet Safety: do’s
    Choose safe sites to visit. If a pop-up appears or content is questionable, leave.
    Keep an updated version of Spyware or a similar program installed on your computer at all times
    Follow a websites rules and regulations
    Create passwords that only you would know
    Tell a parent or authoritive figure you trust if you are being cyber bullied or if you have gotten into trouble
  • Safety tips: don’ts
    Give out your personal information
    Give other people your username or password to any account
    Ignore pop-ups. Chances are they’re there for a reason
    Share photographs
    Accept foreign files
  • How to Protect Your Privacy
    Don’t give out passwords to other people
    Keep a firewall or similar program up at all times
    Don’t give out your personal information to an ad, no matter how much you want that new iPhone. It’s probably fake
    Log out of your account every time you exit the browser
    Don’t download anything unless you trust the website
  • Computer use Policy
    Students should use only their I.D. and not use only one computer to maintain security. Furthermore, a student should not try to hack another student’s account.
    Students should complete their own work. If a student gives another student their work or files, it counts as cheating.
    Students should only work in the programs assigned by the teacher. The student should not add any programs, change desktop back round, or bring any computer materials (flash drive, disks, CD’s) that would harm the computer.
    Students can only use the internet for work. It should not be used for chatting, Facebook, email, etc.
    The computer is to be used for classroom purposes. Students should not download or add on other programs.
  • Are you Threatened or Scared? What To Do If You Are
    Tell an adult or authoritive figure about it
    Stop visiting that site immediately
    Don’t provoke the person. If you leave them alone they’ll probably forget about you.
    Stop talking to the person(s)
    Report the person to an online security or management.
  • Intellectual property
    intellectual property is a property that is your own original work. It is usually patented, copyrighted, or trademarked.
    Ex: Mickey Mouse®
  • Fair Use Policy
    The fair use policy is a principle in United States copyright law that allows someone to use copyrighted material (restrictedly) without having to ask the original holder.
    Ex: Allison was doing a project on the Gulf Oil Spill and she found a news broadcast she would like to include. Because of the Fair Use Policy, she could use it without having to ask the owner.
  • Plagiarism
    Plagiarism is taking someone else’s original work and claiming it as your own.
    Ex: James was assigned a paper on Shakespeare. He was surfing the internet for information when he found a paper already done. He copy and pasted it, then printed it out. He turned it in with his name on it and did not tell the teacher it was someone else’s. PLAGIARISM.
  • Sources