SlideShare a Scribd company logo
1 of 15
BY: YULIIA RADYSH
STUDENT DO-14
VASYL STEFANYK PRECARPATHIAN NATIONAL UNIVERSITY
THERE ARE SOME SIMPLE INTERNET SAFETY TIPS THAT
YOU CAN USE TO KEEP YOUR CHILDREN SAFE ON THE
WEB– SOME OF WHICH YOU WILL LIKELY FIND USEFUL AS
WELL!
1.USE THE PRIVACY SETTINGS ON SOCIAL
NETWORK PLATFORMS.
MANY SOCIAL NETWORKS HAVE COMPLETELY PUBLIC SETTINGS – MEANING
THAT ANYTHING YOUR TEEN OR CHILD POSTS, IS VISIBLE TO THE WORLD WIDE
WEB! SIT WITH YOUR CHILD AND ENSURE ALL THEIR SOCIAL ACCOUNTS UTILIZE
PRIVACY SETTINGS SO THAT THEIR PERSONAL POSTS AND INFORMATION ARE NOT
AVAILABLE TO ANY PREDATORS OR HACKERS.
REMEMBER, 1 IN 10 SOCIAL MEDIA USERS HAVE BEEN THE VICTIM OF A
CYBERATTACK!
2. NEVER POST PERSONAL INFORMATION SUCH
AS PHONE NUMBER, ADDRESS, OR LOCATION.
ESPECIALLY ON POPULAR MOBILE APPS LIKE SNAPCHAT, INSTAGRAM OR VINE.
MOBILE APPS LIKE SNAPCHAT, INSTAGRAM AND VINE ARE SOME OF THE MOST POPULAR
APPS AMONG TEENAGERS AND TWEENS. AND IT’S NO SURPRISE CONSIDERING HOW FUN
AND VIRAL THE VISUAL CONTENT ON THESE APPS CAN BE.
IN THE SAME VEIN, IT’S VERY IMPORTANT FOR YOUNGSTERS TO REMEMBER THAT ONCE
POSTED, PERSONAL INFORMATION CAN INSTANTLY BECOME PUBLIC.
WHEN A TEEN POST PERSONAL AND PRIVATE DETAILS ON THESE POPULAR APPS, THE
OPENNESS AND VIRALITY OF THESE PLATFORMS MEANS SAID INFO CAN EASILY FALL
INTO THE WRONG HANDS.
3. DON’T INCLUDE ANY PERSONAL
INFORMATION IN YOUR SCREEN NAME.
WHEN CHOOSING A SCREEN NAME OR ALIAS ON WEBSITES IT’S VERY IMPORTANT TO
REMIND YOUR CHILD NOT TO INCLUDE THEIR LAST NAME OR DATE OF BIRTH.
THEY MAY THINK DOING SO IS HARMLESS, BUT IT CAN OPEN THE DOORS TO PEOPLE
THEY DON’T KNOW, OR NO LONGER WANT TO INTERACT WITH, DISCOVERING THEIR
IDENTITY AND PRIVATE INFORMATION.
4. NEVER SHARE YOUR PASSWORDS.
YOUR CHILD OR TEEN MAY THINK IT’S HARMLESS TO SHARE THEIR ACCOUNT
PASSWORDS WITH A CLOSE FRIEND- BUT THAT’S CERTAINLY NOT THE CASE.
ONCE THEIR PASSWORD IS OUT OF THEIR HANDS AND IN SOMEONE ELSE’S, THEY HAVE
NO CONTROL OVER WHERE AND FOR HOW LONG THESE ACCOUNTS REMAIN OPEN-
NOR WHO ELSE CAN ACCESS THEM!
ALSO, ALONG THIS NOTE, REMIND YOUR CHILD TO ALWAYS LOG OUT OF THE
ACCOUNTS THEY’VE ACCESSED WHEN USING A PUBLIC COMPUTER. THE LAST THING
ANYONE WANTS IS FOR A COMPLETE STRANGER TO ACCESS THEIR PERSONAL PROFILES.
5. NEVER AGREE TO MEET IN PERSON WITH
ANYONE YOU FIRST “MET” ON THE INTERNET.
IT’S IMPORTANT TO EDUCATE YOUR CHILD THAT THERE ARE MANY FAKE ACCOUNTS
OUT THERE AND AS SUCH THERE ARE MANY POTENTIAL DANGERS IN MEETING FACE-
TO-FACE WITH SOMEONE THEY ONLY KNOW THROUGH THE ONLINE WORLD.
6. NEVER SEND OR RESPOND TO RUDE OR MEAN
MESSAGES OR EMAILS.
REMIND YOUR CHILDREN THAT THE MESSAGES THEY SEND VIA TEXT AND
EMAIL CAN NEVER BE ERASED, AND THEY CAN EASILY BE SHARED– WITH
ANYONE.
ENCOURAGE YOUR CHILD TO ALWAYS TAKE THE HIGHER GROUND. IF THEY
EVER RECEIVE A RUDE OR INAPPROPRIATE MESSAGE, JUST IGNORE IT.
IF THE HURTFUL MESSAGES PERSISTS, YOU AND YOUR CHILD SHOULD
PROMPTLY DELETE AND BLOCK THE INDIVIDUAL HARASSING THEM TO
PREVENT ANY HURT FEELINGS OR UNNECESSARY PROVOCATION.
7. BE CAREFUL BEFORE POSTING ANY IMAGE OR
VIDEO ONLINE.
ENCOURAGE YOUR CHILD TO SHARE ANY IMAGES OR VIDEOS THE PLAN TO POST
ONLINE WITH YOU BEFORE THEY DO SO.
REMIND THEM THAT ONCE THEY DO SO, THESE IMAGES AND VIDEOS ARE NO LONGER
EXCLUSIVELY THEIRS, BUT ARE NOW PART OF THE INTERNET ECOSYSTEM -MEANING
THEY NO LONGER HAVE FULL CONTROL OVER WHO CAN SEE THEM AND/OR HOW
THEY APPEAR.
8. NEVER DOWNLOAD OR INSTALL UNKNOWN
SOFTWARE OR APPLICATIONS.
EVEN WE ADULTS ARE OFTEN DUPED BY FAKE SOFTWARE, SPAM AND APPLICATIONS!
IT’S IMPORTANT TO ADVISE YOUR KIDS AS FAR AS WHAT THEY SHOULD OR SHOULDN’T
DOWNLOAD. THE BEST PRACTICE IS TO ONLY DOWNLOAD FILES FROM TRUSTED
SOURCES AND WHEN IN DOUBT, INSTALL A SITE ADVISOR LIKE WEB OF TRUST OR
NORTON SAFE WEB, TO HELP DECIDE IF A DOWNLOAD SITE IS TRUSTWORTHY OR NOT.
9. EXERCISE EXTREME CAUTION WHEN BUYING
ONLINE.
THE INTERNET OPENS A WHOLE WORLD OF SHOPPING OPPORTUNITIES, BUT IT ALSO
REQUIRES A GREAT DEAL OF CAUTION AND SAFE SPENDING.
WHEN PURCHASING FROM A SITE, MAKE SURE THE SITE IS FROM A RELIABLE, TRUSTED
VENDOR AND UTILIZES ENCRYPTION.
10. SEARCH SAFELY WITH ‘SAFE SEARCH’
SETTINGS AND PROTECTIVE FILTERS.
11. BE CAREFUL ABOUT THE INFORMATION YOU
SHARE AND WHAT YOU ACCESS OVER PUBLIC WI-
FI.
PUBLIC WI-FI SPOTS MAY SEEM HARMLESS BUT THEY ARE GENERALLY HOTBEDS FOR
HACKING ATTACKS.
• privacy settings - налаштування
конфіденційності
• social network platforms - соціальні
мережі
• settings – налаштування
• been the victim - жертва
• location – місцезнаходження
• screen name – псевдонім
• passwords – пароль
• personal profile – персональний
профіль
• erase – стерти
• image – зображення
• download – скачати
• install – встановити
• software – програмне забезпечення
• application – програма
• trusted sources – надійні джерела
• doubt – сумнів
• site advisor – консультант сайту
• shopping opportunities – торгові
можливості
• protective filters – захисні фільтри
THANKS FOR
YOUR
ATTENTION!!!
BY: YULIIA RADYSH
STUDENT DO-14
VASYL STEFANYK PRECARPATHIAN NATIONAL UNIVERSITY

More Related Content

What's hot

Social Media for Parents of Teens
Social Media for Parents of TeensSocial Media for Parents of Teens
Social Media for Parents of TeensKate Gukeisen
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015KanelandSvihlik
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint bgmartinez1971
 
Internet safety
Internet safetyInternet safety
Internet safetywalsh008
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threatsmkinzie
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentationCandice Wimbles
 
Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018KanelandSvihlik
 
Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents Jennifer Holena
 
Our Digital World - A look at E-safety issues for teenagers
Our Digital World - A look at E-safety issues for teenagersOur Digital World - A look at E-safety issues for teenagers
Our Digital World - A look at E-safety issues for teenagersBrian Sharland
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016KanelandSvihlik
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety SlideshareLawrence Fine
 
Using social media responsibly
Using social media responsibly Using social media responsibly
Using social media responsibly Donal O' Mahony
 
Mark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers
 
Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017KanelandSvihlik
 
Parental Control, Internet Safety, Safe Internet for Children
Parental Control, Internet Safety, Safe Internet for ChildrenParental Control, Internet Safety, Safe Internet for Children
Parental Control, Internet Safety, Safe Internet for ChildrenNugroho Gito
 
Online Social Networking 101: Monitoring Your Child's Cyber Playground
Online Social Networking 101: Monitoring Your Child's Cyber PlaygroundOnline Social Networking 101: Monitoring Your Child's Cyber Playground
Online Social Networking 101: Monitoring Your Child's Cyber PlaygroundStephanie Barnhart
 
Renfrow Internet Safety
Renfrow Internet SafetyRenfrow Internet Safety
Renfrow Internet Safetymrenfrow
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentationalexfinvle
 
How to make screens and the internet safe for Children
How to make screens and the internet safe for Children How to make screens and the internet safe for Children
How to make screens and the internet safe for Children Tharindu Weerasinghe
 

What's hot (20)

Social Media for Parents of Teens
Social Media for Parents of TeensSocial Media for Parents of Teens
Social Media for Parents of Teens
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018
 
Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents
 
Our Digital World - A look at E-safety issues for teenagers
Our Digital World - A look at E-safety issues for teenagersOur Digital World - A look at E-safety issues for teenagers
Our Digital World - A look at E-safety issues for teenagers
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016
 
mobikid_prezentacja
mobikid_prezentacjamobikid_prezentacja
mobikid_prezentacja
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
 
Using social media responsibly
Using social media responsibly Using social media responsibly
Using social media responsibly
 
Mark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers' Social Network Presentation
Mark Rogers' Social Network Presentation
 
Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017
 
Parental Control, Internet Safety, Safe Internet for Children
Parental Control, Internet Safety, Safe Internet for ChildrenParental Control, Internet Safety, Safe Internet for Children
Parental Control, Internet Safety, Safe Internet for Children
 
Online Social Networking 101: Monitoring Your Child's Cyber Playground
Online Social Networking 101: Monitoring Your Child's Cyber PlaygroundOnline Social Networking 101: Monitoring Your Child's Cyber Playground
Online Social Networking 101: Monitoring Your Child's Cyber Playground
 
Renfrow Internet Safety
Renfrow Internet SafetyRenfrow Internet Safety
Renfrow Internet Safety
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
 
How to make screens and the internet safe for Children
How to make screens and the internet safe for Children How to make screens and the internet safe for Children
How to make screens and the internet safe for Children
 

Similar to Safety online radysh do14

September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentationjaurisch
 
Cyber crime awareness
Cyber crime awarenessCyber crime awareness
Cyber crime awarenessArjun Chetry
 
Protecting Your Children's Online Experience
Protecting Your Children's Online Experience  Protecting Your Children's Online Experience
Protecting Your Children's Online Experience Lisa McKenzie ★
 
10 Rules To Keep Your Child Safe
10 Rules To Keep Your Child Safe10 Rules To Keep Your Child Safe
10 Rules To Keep Your Child SafeShaun Bent
 
10 Rules To Keep Your Child Safe
10 Rules To Keep Your Child Safe10 Rules To Keep Your Child Safe
10 Rules To Keep Your Child SafeShaun Bent
 
Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014- Mark - Fullbright
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaAndri Priyatna
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents PresentationToby Treacher
 
Internet Safety Keypoints Handout
Internet Safety Keypoints HandoutInternet Safety Keypoints Handout
Internet Safety Keypoints HandoutOllie Bray
 
6 Ways to Become a Better Digital Parent
6 Ways to Become a Better Digital Parent6 Ways to Become a Better Digital Parent
6 Ways to Become a Better Digital ParentYour eKavach
 
Safety advice from Vodaphone
Safety advice from VodaphoneSafety advice from Vodaphone
Safety advice from VodaphoneKatherine Lyddon
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe onlineamulhall
 
Safer internet day mo i cpc 2 feb 2014sb
Safer internet day  mo i cpc 2 feb 2014sbSafer internet day  mo i cpc 2 feb 2014sb
Safer internet day mo i cpc 2 feb 2014sbSafeChildUAE1
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Childcpitchford
 
Internet safety
Internet safetyInternet safety
Internet safetydsansford
 
Cyber Security Tips for Parents.pdf
Cyber Security Tips for Parents.pdfCyber Security Tips for Parents.pdf
Cyber Security Tips for Parents.pdfinfosec train
 
Cyber Security Tips for Parents
Cyber Security Tips for ParentsCyber Security Tips for Parents
Cyber Security Tips for Parentspriyanshamadhwal2
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminartholman77
 

Similar to Safety online radysh do14 (20)

September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
 
Cyber crime awareness
Cyber crime awarenessCyber crime awareness
Cyber crime awareness
 
Protecting Your Children's Online Experience
Protecting Your Children's Online Experience  Protecting Your Children's Online Experience
Protecting Your Children's Online Experience
 
10 Rules To Keep Your Child Safe
10 Rules To Keep Your Child Safe10 Rules To Keep Your Child Safe
10 Rules To Keep Your Child Safe
 
10 Rules To Keep Your Child Safe
10 Rules To Keep Your Child Safe10 Rules To Keep Your Child Safe
10 Rules To Keep Your Child Safe
 
Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014
 
Social networking leaflet
Social networking leafletSocial networking leaflet
Social networking leaflet
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remaja
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents Presentation
 
Internet Safety Keypoints Handout
Internet Safety Keypoints HandoutInternet Safety Keypoints Handout
Internet Safety Keypoints Handout
 
Top ten-tips
Top ten-tipsTop ten-tips
Top ten-tips
 
6 Ways to Become a Better Digital Parent
6 Ways to Become a Better Digital Parent6 Ways to Become a Better Digital Parent
6 Ways to Become a Better Digital Parent
 
Safety advice from Vodaphone
Safety advice from VodaphoneSafety advice from Vodaphone
Safety advice from Vodaphone
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
 
Safer internet day mo i cpc 2 feb 2014sb
Safer internet day  mo i cpc 2 feb 2014sbSafer internet day  mo i cpc 2 feb 2014sb
Safer internet day mo i cpc 2 feb 2014sb
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Cyber Security Tips for Parents.pdf
Cyber Security Tips for Parents.pdfCyber Security Tips for Parents.pdf
Cyber Security Tips for Parents.pdf
 
Cyber Security Tips for Parents
Cyber Security Tips for ParentsCyber Security Tips for Parents
Cyber Security Tips for Parents
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
 

More from Sergiy Sydoriv

Distance learming menyuk ivanna pee-34_2
Distance learming menyuk ivanna pee-34_2Distance learming menyuk ivanna pee-34_2
Distance learming menyuk ivanna pee-34_2Sergiy Sydoriv
 
Developing early learning nekhay
Developing early learning nekhayDeveloping early learning nekhay
Developing early learning nekhaySergiy Sydoriv
 
Entertainment in great britain & ivano frankivsk
Entertainment in great britain & ivano frankivskEntertainment in great britain & ivano frankivsk
Entertainment in great britain & ivano frankivskSergiy Sydoriv
 
Health wth havrylo pee 26
Health wth havrylo pee 26Health wth havrylo pee 26
Health wth havrylo pee 26Sergiy Sydoriv
 
Without borders project grand report
Without borders project grand reportWithout borders project grand report
Without borders project grand reportSergiy Sydoriv
 
Pimsler method shcherbyuk
Pimsler method shcherbyukPimsler method shcherbyuk
Pimsler method shcherbyukSergiy Sydoriv
 
Method shekhter feduik
Method shekhter feduikMethod shekhter feduik
Method shekhter feduikSergiy Sydoriv
 
Distance learning english in if college by ira osadtsa
Distance learning english in if college by ira osadtsaDistance learning english in if college by ira osadtsa
Distance learning english in if college by ira osadtsaSergiy Sydoriv
 
Method of illya frank mykhailiv
Method of illya frank mykhailivMethod of illya frank mykhailiv
Method of illya frank mykhailivSergiy Sydoriv
 
Method of suggestion leibyuk
Method of suggestion leibyukMethod of suggestion leibyuk
Method of suggestion leibyukSergiy Sydoriv
 
Methods of games voloshchuk
Methods of games voloshchukMethods of games voloshchuk
Methods of games voloshchukSergiy Sydoriv
 
Presentation practice-production method kozak
Presentation practice-production method kozakPresentation practice-production method kozak
Presentation practice-production method kozakSergiy Sydoriv
 
Phenomenon based learning kovalska
Phenomenon based learning kovalskaPhenomenon based learning kovalska
Phenomenon based learning kovalskaSergiy Sydoriv
 
Helen doron hrynishak pee-35
Helen doron hrynishak pee-35Helen doron hrynishak pee-35
Helen doron hrynishak pee-35Sergiy Sydoriv
 
Computer software methods portetska
Computer software methods portetskaComputer software methods portetska
Computer software methods portetskaSergiy Sydoriv
 
Flipped learning sribnyak
Flipped learning sribnyakFlipped learning sribnyak
Flipped learning sribnyakSergiy Sydoriv
 

More from Sergiy Sydoriv (20)

Distance learming menyuk ivanna pee-34_2
Distance learming menyuk ivanna pee-34_2Distance learming menyuk ivanna pee-34_2
Distance learming menyuk ivanna pee-34_2
 
Developing early learning nekhay
Developing early learning nekhayDeveloping early learning nekhay
Developing early learning nekhay
 
Entertainment in great britain & ivano frankivsk
Entertainment in great britain & ivano frankivskEntertainment in great britain & ivano frankivsk
Entertainment in great britain & ivano frankivsk
 
Health wth havrylo pee 26
Health wth havrylo pee 26Health wth havrylo pee 26
Health wth havrylo pee 26
 
Without borders project grand report
Without borders project grand reportWithout borders project grand report
Without borders project grand report
 
Pimsler method shcherbyuk
Pimsler method shcherbyukPimsler method shcherbyuk
Pimsler method shcherbyuk
 
Method shekhter feduik
Method shekhter feduikMethod shekhter feduik
Method shekhter feduik
 
Distance learning english in if college by ira osadtsa
Distance learning english in if college by ira osadtsaDistance learning english in if college by ira osadtsa
Distance learning english in if college by ira osadtsa
 
Skulte osadtsa
Skulte osadtsaSkulte osadtsa
Skulte osadtsa
 
Method of illya frank mykhailiv
Method of illya frank mykhailivMethod of illya frank mykhailiv
Method of illya frank mykhailiv
 
Method of suggestion leibyuk
Method of suggestion leibyukMethod of suggestion leibyuk
Method of suggestion leibyuk
 
Methods of games voloshchuk
Methods of games voloshchukMethods of games voloshchuk
Methods of games voloshchuk
 
Jolly phonics kaniuk
Jolly phonics kaniukJolly phonics kaniuk
Jolly phonics kaniuk
 
Presentation practice-production method kozak
Presentation practice-production method kozakPresentation practice-production method kozak
Presentation practice-production method kozak
 
Phenomenon based learning kovalska
Phenomenon based learning kovalskaPhenomenon based learning kovalska
Phenomenon based learning kovalska
 
Helen doron hrynishak pee-35
Helen doron hrynishak pee-35Helen doron hrynishak pee-35
Helen doron hrynishak pee-35
 
Computer software methods portetska
Computer software methods portetskaComputer software methods portetska
Computer software methods portetska
 
West method shpytko
West method shpytkoWest method shpytko
West method shpytko
 
Flipped learning sribnyak
Flipped learning sribnyakFlipped learning sribnyak
Flipped learning sribnyak
 
Kazachiner sysak
Kazachiner sysakKazachiner sysak
Kazachiner sysak
 

Recently uploaded

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 

Recently uploaded (20)

Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 

Safety online radysh do14

  • 1. BY: YULIIA RADYSH STUDENT DO-14 VASYL STEFANYK PRECARPATHIAN NATIONAL UNIVERSITY
  • 2. THERE ARE SOME SIMPLE INTERNET SAFETY TIPS THAT YOU CAN USE TO KEEP YOUR CHILDREN SAFE ON THE WEB– SOME OF WHICH YOU WILL LIKELY FIND USEFUL AS WELL!
  • 3. 1.USE THE PRIVACY SETTINGS ON SOCIAL NETWORK PLATFORMS. MANY SOCIAL NETWORKS HAVE COMPLETELY PUBLIC SETTINGS – MEANING THAT ANYTHING YOUR TEEN OR CHILD POSTS, IS VISIBLE TO THE WORLD WIDE WEB! SIT WITH YOUR CHILD AND ENSURE ALL THEIR SOCIAL ACCOUNTS UTILIZE PRIVACY SETTINGS SO THAT THEIR PERSONAL POSTS AND INFORMATION ARE NOT AVAILABLE TO ANY PREDATORS OR HACKERS. REMEMBER, 1 IN 10 SOCIAL MEDIA USERS HAVE BEEN THE VICTIM OF A CYBERATTACK!
  • 4. 2. NEVER POST PERSONAL INFORMATION SUCH AS PHONE NUMBER, ADDRESS, OR LOCATION. ESPECIALLY ON POPULAR MOBILE APPS LIKE SNAPCHAT, INSTAGRAM OR VINE. MOBILE APPS LIKE SNAPCHAT, INSTAGRAM AND VINE ARE SOME OF THE MOST POPULAR APPS AMONG TEENAGERS AND TWEENS. AND IT’S NO SURPRISE CONSIDERING HOW FUN AND VIRAL THE VISUAL CONTENT ON THESE APPS CAN BE. IN THE SAME VEIN, IT’S VERY IMPORTANT FOR YOUNGSTERS TO REMEMBER THAT ONCE POSTED, PERSONAL INFORMATION CAN INSTANTLY BECOME PUBLIC. WHEN A TEEN POST PERSONAL AND PRIVATE DETAILS ON THESE POPULAR APPS, THE OPENNESS AND VIRALITY OF THESE PLATFORMS MEANS SAID INFO CAN EASILY FALL INTO THE WRONG HANDS.
  • 5. 3. DON’T INCLUDE ANY PERSONAL INFORMATION IN YOUR SCREEN NAME. WHEN CHOOSING A SCREEN NAME OR ALIAS ON WEBSITES IT’S VERY IMPORTANT TO REMIND YOUR CHILD NOT TO INCLUDE THEIR LAST NAME OR DATE OF BIRTH. THEY MAY THINK DOING SO IS HARMLESS, BUT IT CAN OPEN THE DOORS TO PEOPLE THEY DON’T KNOW, OR NO LONGER WANT TO INTERACT WITH, DISCOVERING THEIR IDENTITY AND PRIVATE INFORMATION.
  • 6. 4. NEVER SHARE YOUR PASSWORDS. YOUR CHILD OR TEEN MAY THINK IT’S HARMLESS TO SHARE THEIR ACCOUNT PASSWORDS WITH A CLOSE FRIEND- BUT THAT’S CERTAINLY NOT THE CASE. ONCE THEIR PASSWORD IS OUT OF THEIR HANDS AND IN SOMEONE ELSE’S, THEY HAVE NO CONTROL OVER WHERE AND FOR HOW LONG THESE ACCOUNTS REMAIN OPEN- NOR WHO ELSE CAN ACCESS THEM! ALSO, ALONG THIS NOTE, REMIND YOUR CHILD TO ALWAYS LOG OUT OF THE ACCOUNTS THEY’VE ACCESSED WHEN USING A PUBLIC COMPUTER. THE LAST THING ANYONE WANTS IS FOR A COMPLETE STRANGER TO ACCESS THEIR PERSONAL PROFILES.
  • 7. 5. NEVER AGREE TO MEET IN PERSON WITH ANYONE YOU FIRST “MET” ON THE INTERNET. IT’S IMPORTANT TO EDUCATE YOUR CHILD THAT THERE ARE MANY FAKE ACCOUNTS OUT THERE AND AS SUCH THERE ARE MANY POTENTIAL DANGERS IN MEETING FACE- TO-FACE WITH SOMEONE THEY ONLY KNOW THROUGH THE ONLINE WORLD.
  • 8. 6. NEVER SEND OR RESPOND TO RUDE OR MEAN MESSAGES OR EMAILS. REMIND YOUR CHILDREN THAT THE MESSAGES THEY SEND VIA TEXT AND EMAIL CAN NEVER BE ERASED, AND THEY CAN EASILY BE SHARED– WITH ANYONE. ENCOURAGE YOUR CHILD TO ALWAYS TAKE THE HIGHER GROUND. IF THEY EVER RECEIVE A RUDE OR INAPPROPRIATE MESSAGE, JUST IGNORE IT. IF THE HURTFUL MESSAGES PERSISTS, YOU AND YOUR CHILD SHOULD PROMPTLY DELETE AND BLOCK THE INDIVIDUAL HARASSING THEM TO PREVENT ANY HURT FEELINGS OR UNNECESSARY PROVOCATION.
  • 9. 7. BE CAREFUL BEFORE POSTING ANY IMAGE OR VIDEO ONLINE. ENCOURAGE YOUR CHILD TO SHARE ANY IMAGES OR VIDEOS THE PLAN TO POST ONLINE WITH YOU BEFORE THEY DO SO. REMIND THEM THAT ONCE THEY DO SO, THESE IMAGES AND VIDEOS ARE NO LONGER EXCLUSIVELY THEIRS, BUT ARE NOW PART OF THE INTERNET ECOSYSTEM -MEANING THEY NO LONGER HAVE FULL CONTROL OVER WHO CAN SEE THEM AND/OR HOW THEY APPEAR.
  • 10. 8. NEVER DOWNLOAD OR INSTALL UNKNOWN SOFTWARE OR APPLICATIONS. EVEN WE ADULTS ARE OFTEN DUPED BY FAKE SOFTWARE, SPAM AND APPLICATIONS! IT’S IMPORTANT TO ADVISE YOUR KIDS AS FAR AS WHAT THEY SHOULD OR SHOULDN’T DOWNLOAD. THE BEST PRACTICE IS TO ONLY DOWNLOAD FILES FROM TRUSTED SOURCES AND WHEN IN DOUBT, INSTALL A SITE ADVISOR LIKE WEB OF TRUST OR NORTON SAFE WEB, TO HELP DECIDE IF A DOWNLOAD SITE IS TRUSTWORTHY OR NOT.
  • 11. 9. EXERCISE EXTREME CAUTION WHEN BUYING ONLINE. THE INTERNET OPENS A WHOLE WORLD OF SHOPPING OPPORTUNITIES, BUT IT ALSO REQUIRES A GREAT DEAL OF CAUTION AND SAFE SPENDING. WHEN PURCHASING FROM A SITE, MAKE SURE THE SITE IS FROM A RELIABLE, TRUSTED VENDOR AND UTILIZES ENCRYPTION.
  • 12. 10. SEARCH SAFELY WITH ‘SAFE SEARCH’ SETTINGS AND PROTECTIVE FILTERS.
  • 13. 11. BE CAREFUL ABOUT THE INFORMATION YOU SHARE AND WHAT YOU ACCESS OVER PUBLIC WI- FI. PUBLIC WI-FI SPOTS MAY SEEM HARMLESS BUT THEY ARE GENERALLY HOTBEDS FOR HACKING ATTACKS.
  • 14. • privacy settings - налаштування конфіденційності • social network platforms - соціальні мережі • settings – налаштування • been the victim - жертва • location – місцезнаходження • screen name – псевдонім • passwords – пароль • personal profile – персональний профіль • erase – стерти • image – зображення • download – скачати • install – встановити • software – програмне забезпечення • application – програма • trusted sources – надійні джерела • doubt – сумнів • site advisor – консультант сайту • shopping opportunities – торгові можливості • protective filters – захисні фільтри
  • 15. THANKS FOR YOUR ATTENTION!!! BY: YULIIA RADYSH STUDENT DO-14 VASYL STEFANYK PRECARPATHIAN NATIONAL UNIVERSITY