SlideShare a Scribd company logo
BY: CJ DORAN From Huntington internet saftey  Are you safe on the internet Internet safety its better then chocolate.
Why do kids feel safe on the internet ? Kids rarely think about predators online who would try to harm them. think there a actual person is behind every computer. Some can be dangerous.
what sites are inappropriate? How to handle them? bad sites are: gambling, hate, killing, ask for personal info, bad sites, sites that ask for money. One way to take care of bad sites is to: leave the site and then tell someone best choice is a grown up.
how should you handle personal info online? Don’t give out personnel info on the computer. Info on the computer should not personnel. Try not to post a pick of you online. Use something else.
What is the biggest mistake kids make online? A huge mistake kids online make is to let strangers into their social group. Parents often don’t care what their kids are doing online, and most of the time those unsupervised kids get taken by predators.
What are Preedators trying to do online? An predator is some one who wants to kill or damage kids. Older predators are smarter and can sound like teens more easily
what is cyber bullying Instant messaging bad thing such as pictures of words trying to hurt other peoples feelings is cyber bullying. Its not just emails it could be texting or face book Twitter you name it, cyber bulling has to stop.
sexting Sexting is sending bad pictures or bad emails of you or some one else to other people. Sexting is illegal and shouldn’t be done..

More Related Content

What's hot

Trolls on social media seminar ppt
Trolls on social media seminar pptTrolls on social media seminar ppt
Trolls on social media seminar ppt
Pratiksha Rai
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
DonikaLici
 
Cyber Bullying Questionnaire Results
Cyber Bullying Questionnaire ResultsCyber Bullying Questionnaire Results
Cyber Bullying Questionnaire Resultsa2columnd12
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngmiliarguelles1
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaamiliarguelles
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaasofisalazar00
 
Mili giuly cyberbullying este
Mili giuly cyberbullying esteMili giuly cyberbullying este
Mili giuly cyberbullying estegiulimazziotti96
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
Karen Brooks
 
Digital citizenship for Students
Digital citizenship for StudentsDigital citizenship for Students
Digital citizenship for Students
Kelgator
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingkntrainer
 
Linked in
Linked inLinked in
Linked in
JyRone
 
Perils of social media
Perils of social mediaPerils of social media
Perils of social media
Inderjeet Singh
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
bmanns5816
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*Amber Dee
 
Internet safety update
Internet safety updateInternet safety update
Internet safety update
14071828
 
Stay Safe Online - Elementary School Level Public Program
Stay Safe Online - Elementary School Level Public ProgramStay Safe Online - Elementary School Level Public Program
Stay Safe Online - Elementary School Level Public Program
Daniel Hanttula
 
Online Responsibility for Teens
Online Responsibility for TeensOnline Responsibility for Teens
Online Responsibility for Teens
Stephen Curtis
 
Digital wellness and your family internet upload
Digital wellness and your family   internet uploadDigital wellness and your family   internet upload
Digital wellness and your family internet upload
Pella Christian Grade School
 

What's hot (20)

Trolls on social media seminar ppt
Trolls on social media seminar pptTrolls on social media seminar ppt
Trolls on social media seminar ppt
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber Bullying Questionnaire Results
Cyber Bullying Questionnaire ResultsCyber Bullying Questionnaire Results
Cyber Bullying Questionnaire Results
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaa
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaa
 
Mili giuly cyberbullying este
Mili giuly cyberbullying esteMili giuly cyberbullying este
Mili giuly cyberbullying este
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
Digital citizenship for Students
Digital citizenship for StudentsDigital citizenship for Students
Digital citizenship for Students
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Linked in
Linked inLinked in
Linked in
 
Perils of social media
Perils of social mediaPerils of social media
Perils of social media
 
Cyberbully
CyberbullyCyberbully
Cyberbully
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*
 
Internet safety update
Internet safety updateInternet safety update
Internet safety update
 
Stay Safe Online - Elementary School Level Public Program
Stay Safe Online - Elementary School Level Public ProgramStay Safe Online - Elementary School Level Public Program
Stay Safe Online - Elementary School Level Public Program
 
Slisn Pres1
Slisn Pres1Slisn Pres1
Slisn Pres1
 
Online Responsibility for Teens
Online Responsibility for TeensOnline Responsibility for Teens
Online Responsibility for Teens
 
Digital wellness and your family internet upload
Digital wellness and your family   internet uploadDigital wellness and your family   internet upload
Digital wellness and your family internet upload
 

Viewers also liked

Internet safty
Internet saftyInternet safty
Internet safty
guestce38b330
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Leslie Witten
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safelysam31
 
Eric2
Eric2Eric2
Eric2morag
 
Anthony
AnthonyAnthony
Anthonymorag
 
internet safty ICT presentation
internet safty ICT presentation internet safty ICT presentation
internet safty ICT presentation guest0ab27
 
The safe use of the internet posters
The safe use of the internet postersThe safe use of the internet posters
The safe use of the internet postersThinkB4UClick
 
internet ,
internet ,internet ,
internet ,
chetan handa
 
Safe Social Media educational project at a glance
Safe Social Media educational project at a glanceSafe Social Media educational project at a glance
Safe Social Media educational project at a glance
InterMedia Consulting
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
Marian Merritt
 
Internet Safety Gwen
Internet Safety GwenInternet Safety Gwen
Internet Safety Gwen
guest3d3a205b
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
LuciusonSecurity
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & Teachers
Mark White
 
Staying safe on the internet
Staying safe on the internetStaying safe on the internet
Staying safe on the internet
joshuathompson21
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
mkinzie
 
Child Internet Safety summit: online safety and inspection
Child Internet Safety summit: online safety and inspectionChild Internet Safety summit: online safety and inspection
Child Internet Safety summit: online safety and inspection
Ofsted
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
harriscountypubliclibrary
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
mcgeet
 
Road Safety / Highway Safety Tips for Parents and Teachers, How to prevent Ro...
Road Safety / Highway Safety Tips for Parents and Teachers, How to prevent Ro...Road Safety / Highway Safety Tips for Parents and Teachers, How to prevent Ro...
Road Safety / Highway Safety Tips for Parents and Teachers, How to prevent Ro...
Road Safety
 

Viewers also liked (20)

Internet safty
Internet saftyInternet safty
Internet safty
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safely
 
Eric2
Eric2Eric2
Eric2
 
Anthony
AnthonyAnthony
Anthony
 
internet safty ICT presentation
internet safty ICT presentation internet safty ICT presentation
internet safty ICT presentation
 
The safe use of the internet posters
The safe use of the internet postersThe safe use of the internet posters
The safe use of the internet posters
 
internet ,
internet ,internet ,
internet ,
 
Digital Safety
Digital SafetyDigital Safety
Digital Safety
 
Safe Social Media educational project at a glance
Safe Social Media educational project at a glanceSafe Social Media educational project at a glance
Safe Social Media educational project at a glance
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
Internet Safety Gwen
Internet Safety GwenInternet Safety Gwen
Internet Safety Gwen
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & Teachers
 
Staying safe on the internet
Staying safe on the internetStaying safe on the internet
Staying safe on the internet
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Child Internet Safety summit: online safety and inspection
Child Internet Safety summit: online safety and inspectionChild Internet Safety summit: online safety and inspection
Child Internet Safety summit: online safety and inspection
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Road Safety / Highway Safety Tips for Parents and Teachers, How to prevent Ro...
Road Safety / Highway Safety Tips for Parents and Teachers, How to prevent Ro...Road Safety / Highway Safety Tips for Parents and Teachers, How to prevent Ro...
Road Safety / Highway Safety Tips for Parents and Teachers, How to prevent Ro...
 

Similar to Cj internet safty

Internet 4 Parents
Internet 4 ParentsInternet 4 Parents
Internet 4 Parents
Iwith.org
 
Cyber wellness 2
Cyber wellness 2Cyber wellness 2
Cyber wellness 2Chu Yuan
 
Current Issues Powerpt
Current Issues PowerptCurrent Issues Powerpt
Current Issues Powerptdulud2lm
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
NiravD3
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Donna Murray
 
Social media and cyberbullying
Social media and cyberbullyingSocial media and cyberbullying
Social media and cyberbullying
21rahul1999
 
The World Wide Web
The World Wide WebThe World Wide Web
The World Wide Web
Tony L
 
Cyberstalking dangers
Cyberstalking dangersCyberstalking dangers
Cyberstalking dangers
rangashree
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
catherinelibranda
 
cyber safety
cyber safetycyber safety
cyber safety
all0004
 
Cyberbulling
CyberbullingCyberbulling
Cyberbullingeliasfiad
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingst josephs
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentationSally Garza
 
Can You ‘Cyber’ Safely
Can You ‘Cyber’ SafelyCan You ‘Cyber’ Safely
Can You ‘Cyber’ Safely
timryan7
 
Article writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxArticle writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptx
abhinandnam9997
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
alyssacarricato
 

Similar to Cj internet safty (20)

Kealie int safe
Kealie int safeKealie int safe
Kealie int safe
 
Internet 4 Parents
Internet 4 ParentsInternet 4 Parents
Internet 4 Parents
 
Cyber wellness 2
Cyber wellness 2Cyber wellness 2
Cyber wellness 2
 
Current Issues Powerpt
Current Issues PowerptCurrent Issues Powerpt
Current Issues Powerpt
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber bulling
Cyber bullingCyber bulling
Cyber bulling
 
Social media and cyberbullying
Social media and cyberbullyingSocial media and cyberbullying
Social media and cyberbullying
 
The World Wide Web
The World Wide WebThe World Wide Web
The World Wide Web
 
Cyberstalking dangers
Cyberstalking dangersCyberstalking dangers
Cyberstalking dangers
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
cyber safety
cyber safetycyber safety
cyber safety
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyberbulling
CyberbullingCyberbulling
Cyberbulling
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentation
 
Can You ‘Cyber’ Safely
Can You ‘Cyber’ SafelyCan You ‘Cyber’ Safely
Can You ‘Cyber’ Safely
 
Article writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxArticle writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptx
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 

More from Brenda Sargent

Bd presentation 26 credits
Bd presentation 26 creditsBd presentation 26 credits
Bd presentation 26 credits
Brenda Sargent
 
Courtney's i safe p pt
Courtney's i  safe p ptCourtney's i  safe p pt
Courtney's i safe p ptBrenda Sargent
 

More from Brenda Sargent (6)

Bd presentation 26 credits
Bd presentation 26 creditsBd presentation 26 credits
Bd presentation 26 credits
 
Shelby's i safe ppt
Shelby's i safe pptShelby's i safe ppt
Shelby's i safe ppt
 
Aryn's i safe p pt
Aryn's i safe p ptAryn's i safe p pt
Aryn's i safe p pt
 
Cherokee int safety
Cherokee int safetyCherokee int safety
Cherokee int safety
 
Kirstin's i safe ppt
Kirstin's i safe pptKirstin's i safe ppt
Kirstin's i safe ppt
 
Courtney's i safe p pt
Courtney's i  safe p ptCourtney's i  safe p pt
Courtney's i safe p pt
 

Recently uploaded

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 

Recently uploaded (20)

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 

Cj internet safty

  • 1. BY: CJ DORAN From Huntington internet saftey Are you safe on the internet Internet safety its better then chocolate.
  • 2. Why do kids feel safe on the internet ? Kids rarely think about predators online who would try to harm them. think there a actual person is behind every computer. Some can be dangerous.
  • 3. what sites are inappropriate? How to handle them? bad sites are: gambling, hate, killing, ask for personal info, bad sites, sites that ask for money. One way to take care of bad sites is to: leave the site and then tell someone best choice is a grown up.
  • 4. how should you handle personal info online? Don’t give out personnel info on the computer. Info on the computer should not personnel. Try not to post a pick of you online. Use something else.
  • 5. What is the biggest mistake kids make online? A huge mistake kids online make is to let strangers into their social group. Parents often don’t care what their kids are doing online, and most of the time those unsupervised kids get taken by predators.
  • 6. What are Preedators trying to do online? An predator is some one who wants to kill or damage kids. Older predators are smarter and can sound like teens more easily
  • 7. what is cyber bullying Instant messaging bad thing such as pictures of words trying to hurt other peoples feelings is cyber bullying. Its not just emails it could be texting or face book Twitter you name it, cyber bulling has to stop.
  • 8. sexting Sexting is sending bad pictures or bad emails of you or some one else to other people. Sexting is illegal and shouldn’t be done..