SlideShare a Scribd company logo
1 of 2
Handout This could be your real name or nick name, be careful with whom you share your info Account/Settings This is where you adjust your privacy settings. ? Social networking Site               --    X MIA Account Profile picture Ask your self if there is anything wrong with the picture like nudity drugs  Delete any un appropriate comments, and be careful of what you post on others walls.  Comments Beach.. Kool.. Information What are you sharing about yourself , do not reveal too much information like where you live Birthday-20 April How r movies If you click on these , you are allowing companies to access your info so be careful about what you click on Friends Not Bad! Friends/Contacts Go through each of them and decide  if you really want them to be on ur list Advertisements Photos/Albums What kind of photos are you sharing, who can see them, make sure there is no nudity or alcohol or drugs
Tips For Students ,[object Object]

More Related Content

What's hot

Censorship debate
Censorship debateCensorship debate
Censorship debatewillydavisj
 
12 Things Every Woman Wants to Tell Her Mother-in-Law
12 Things Every Woman Wants to Tell Her Mother-in-Law12 Things Every Woman Wants to Tell Her Mother-in-Law
12 Things Every Woman Wants to Tell Her Mother-in-LawMulti Matrimony
 
12 Things Every Woman Wants to Tell Her Mother-in-Law
12 Things Every Woman Wants to Tell Her Mother-in-Law12 Things Every Woman Wants to Tell Her Mother-in-Law
12 Things Every Woman Wants to Tell Her Mother-in-LawMulti Matrimony
 
Internet safety
Internet safetyInternet safety
Internet safety12ROYA
 
Prilog kviz safer internet-day-2015
Prilog kviz safer internet-day-2015Prilog kviz safer internet-day-2015
Prilog kviz safer internet-day-2015Pogled kroz prozor
 
Prilog:Kviz „Daj svoj online doprinos“ s analizom odgovora
Prilog:Kviz „Daj svoj online doprinos“ s analizom odgovora Prilog:Kviz „Daj svoj online doprinos“ s analizom odgovora
Prilog:Kviz „Daj svoj online doprinos“ s analizom odgovora Pogled kroz prozor
 
Sr. master tracy lee thomas, martial arts master in virginia beach
Sr. master tracy lee thomas, martial arts master in virginia beachSr. master tracy lee thomas, martial arts master in virginia beach
Sr. master tracy lee thomas, martial arts master in virginia beachChanging Lives Martial Arts
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsEllie Simons
 
Daniel Saracoglu 7 R Power Point Quiz
Daniel Saracoglu 7 R Power Point QuizDaniel Saracoglu 7 R Power Point Quiz
Daniel Saracoglu 7 R Power Point Quiztonybattista
 
How family law lawyers and clients can avoid social media dangers: 30 Tips in...
How family law lawyers and clients can avoid social media dangers: 30 Tips in...How family law lawyers and clients can avoid social media dangers: 30 Tips in...
How family law lawyers and clients can avoid social media dangers: 30 Tips in...Dan Pinnington
 

What's hot (20)

Censorship debate
Censorship debateCensorship debate
Censorship debate
 
Dylan 11 b
Dylan   11 bDylan   11 b
Dylan 11 b
 
Empowering the Girl Child
Empowering the Girl ChildEmpowering the Girl Child
Empowering the Girl Child
 
Email 10
Email 10Email 10
Email 10
 
7th grade digital security
7th grade digital security7th grade digital security
7th grade digital security
 
12 Things Every Woman Wants to Tell Her Mother-in-Law
12 Things Every Woman Wants to Tell Her Mother-in-Law12 Things Every Woman Wants to Tell Her Mother-in-Law
12 Things Every Woman Wants to Tell Her Mother-in-Law
 
12 Things Every Woman Wants to Tell Her Mother-in-Law
12 Things Every Woman Wants to Tell Her Mother-in-Law12 Things Every Woman Wants to Tell Her Mother-in-Law
12 Things Every Woman Wants to Tell Her Mother-in-Law
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Esafety Quiz
Esafety QuizEsafety Quiz
Esafety Quiz
 
Esaftey Quiz
Esaftey QuizEsaftey Quiz
Esaftey Quiz
 
Prilog kviz safer internet-day-2015
Prilog kviz safer internet-day-2015Prilog kviz safer internet-day-2015
Prilog kviz safer internet-day-2015
 
Prilog:Kviz „Daj svoj online doprinos“ s analizom odgovora
Prilog:Kviz „Daj svoj online doprinos“ s analizom odgovora Prilog:Kviz „Daj svoj online doprinos“ s analizom odgovora
Prilog:Kviz „Daj svoj online doprinos“ s analizom odgovora
 
Sr. master tracy lee thomas, martial arts master in virginia beach
Sr. master tracy lee thomas, martial arts master in virginia beachSr. master tracy lee thomas, martial arts master in virginia beach
Sr. master tracy lee thomas, martial arts master in virginia beach
 
Cyberbully
CyberbullyCyberbully
Cyberbully
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school students
 
Daniel Saracoglu 7 R Power Point Quiz
Daniel Saracoglu 7 R Power Point QuizDaniel Saracoglu 7 R Power Point Quiz
Daniel Saracoglu 7 R Power Point Quiz
 
Cyberbullying2
Cyberbullying2Cyberbullying2
Cyberbullying2
 
BrionyLeckppquiz
BrionyLeckppquizBrionyLeckppquiz
BrionyLeckppquiz
 
How family law lawyers and clients can avoid social media dangers: 30 Tips in...
How family law lawyers and clients can avoid social media dangers: 30 Tips in...How family law lawyers and clients can avoid social media dangers: 30 Tips in...
How family law lawyers and clients can avoid social media dangers: 30 Tips in...
 
Test
TestTest
Test
 

Viewers also liked

Computer applications in business assignment
Computer applications in business assignmentComputer applications in business assignment
Computer applications in business assignmentYogesh Singla
 
Chapter 1 Introduction To Computers
Chapter 1 Introduction To ComputersChapter 1 Introduction To Computers
Chapter 1 Introduction To Computersnorzaini
 
Introduction to Computers
Introduction to ComputersIntroduction to Computers
Introduction to ComputersSamudin Kassan
 
Types and components of computer system
Types and components of computer systemTypes and components of computer system
Types and components of computer systemmkhisalg
 

Viewers also liked (7)

Lesson plan
Lesson planLesson plan
Lesson plan
 
Lesson plan 1.2
Lesson plan 1.2Lesson plan 1.2
Lesson plan 1.2
 
Lesson plan 1.2
Lesson plan 1.2Lesson plan 1.2
Lesson plan 1.2
 
Computer applications in business assignment
Computer applications in business assignmentComputer applications in business assignment
Computer applications in business assignment
 
Chapter 1 Introduction To Computers
Chapter 1 Introduction To ComputersChapter 1 Introduction To Computers
Chapter 1 Introduction To Computers
 
Introduction to Computers
Introduction to ComputersIntroduction to Computers
Introduction to Computers
 
Types and components of computer system
Types and components of computer systemTypes and components of computer system
Types and components of computer system
 

Similar to Handout

Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Queens Library
 
Internet safety for students
Internet safety for studentsInternet safety for students
Internet safety for studentsMargaret Springer
 
Dating Violence Powerpoint
Dating Violence PowerpointDating Violence Powerpoint
Dating Violence PowerpointThe REACH Center
 
E safety assembly
E safety assemblyE safety assembly
E safety assemblyapaismtic
 
Opsec for Kids
Opsec for KidsOpsec for Kids
Opsec for Kidsceiland
 
Social Media Training for Parents: Keeping Your Kids Safe Online
Social Media Training for Parents: Keeping Your Kids Safe OnlineSocial Media Training for Parents: Keeping Your Kids Safe Online
Social Media Training for Parents: Keeping Your Kids Safe OnlineHolly Solomon
 
Second Speaker
Second SpeakerSecond Speaker
Second Speakereyescloud
 
Second Speaker
Second SpeakerSecond Speaker
Second Speakereyescloud
 
Second Speaker
Second SpeakerSecond Speaker
Second Speakereyescloud
 
Pauline De Guzman
Pauline De GuzmanPauline De Guzman
Pauline De Guzmaneyescloud
 
Second Speaker
Second SpeakerSecond Speaker
Second Speakereyescloud
 

Similar to Handout (20)

Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
 
HOW SOCIAL MEDIA IS KILLING YOUR DIVORCE CASE
HOW SOCIAL MEDIA IS KILLING YOUR DIVORCE CASEHOW SOCIAL MEDIA IS KILLING YOUR DIVORCE CASE
HOW SOCIAL MEDIA IS KILLING YOUR DIVORCE CASE
 
Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet
 
Internet safety for students
Internet safety for studentsInternet safety for students
Internet safety for students
 
Dating Violence Powerpoint
Dating Violence PowerpointDating Violence Powerpoint
Dating Violence Powerpoint
 
TDVPP finalC.pptx
TDVPP finalC.pptxTDVPP finalC.pptx
TDVPP finalC.pptx
 
E safety assembly
E safety assemblyE safety assembly
E safety assembly
 
Opsec for Kids
Opsec for KidsOpsec for Kids
Opsec for Kids
 
OPSEC for Kids
OPSEC for KidsOPSEC for Kids
OPSEC for Kids
 
Social Media Training for Parents: Keeping Your Kids Safe Online
Social Media Training for Parents: Keeping Your Kids Safe OnlineSocial Media Training for Parents: Keeping Your Kids Safe Online
Social Media Training for Parents: Keeping Your Kids Safe Online
 
Social Media Smarts for Teens
Social Media Smarts for TeensSocial Media Smarts for Teens
Social Media Smarts for Teens
 
Grooming
GroomingGrooming
Grooming
 
Grooming
GroomingGrooming
Grooming
 
Digital abuse
Digital abuseDigital abuse
Digital abuse
 
Second Speaker
Second SpeakerSecond Speaker
Second Speaker
 
Second Speaker
Second SpeakerSecond Speaker
Second Speaker
 
Second Speaker
Second SpeakerSecond Speaker
Second Speaker
 
Pauline De Guzman
Pauline De GuzmanPauline De Guzman
Pauline De Guzman
 
Second Speaker
Second SpeakerSecond Speaker
Second Speaker
 
Second Speaker
Second SpeakerSecond Speaker
Second Speaker
 

Recently uploaded

Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
WomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyoneWomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyoneUiPathCommunity
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
QMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfQMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfROWELL MARQUINA
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - AvrilIvanti
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 

Recently uploaded (20)

Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
WomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyoneWomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyone
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
How Tech Giants Cut Corners to Harvest Data for A.I.
How Tech Giants Cut Corners to Harvest Data for A.I.How Tech Giants Cut Corners to Harvest Data for A.I.
How Tech Giants Cut Corners to Harvest Data for A.I.
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
QMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfQMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdf
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - Avril
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 

Handout

  • 1. Handout This could be your real name or nick name, be careful with whom you share your info Account/Settings This is where you adjust your privacy settings. ? Social networking Site -- X MIA Account Profile picture Ask your self if there is anything wrong with the picture like nudity drugs Delete any un appropriate comments, and be careful of what you post on others walls. Comments Beach.. Kool.. Information What are you sharing about yourself , do not reveal too much information like where you live Birthday-20 April How r movies If you click on these , you are allowing companies to access your info so be careful about what you click on Friends Not Bad! Friends/Contacts Go through each of them and decide if you really want them to be on ur list Advertisements Photos/Albums What kind of photos are you sharing, who can see them, make sure there is no nudity or alcohol or drugs
  • 2.
  • 3. Always tell a parent or teacher if you see any bad language or pictures on the Internet, or if anyone writes anything you don’t like.
  • 4. Do not reply to any messages or bulletin board items that are suggestive, obscene, aggressive, or distressing.
  • 5. Do not use bad language online, neither will you take part in arguments or fights online.
  • 6. Do not accept any offers of money or presents, even free offers.
  • 7. Do not order anything online or give out credit card details.
  • 8. Do not enter chat rooms and websites that you have agreed with your parents as off-limits.
  • 9. Do not arrange any face-to-face meetings with anyone you have met on the Internet unless your parents consent and they accompany you.