This document discusses various topics related to digital footprints and online privacy. It begins by defining a digital footprint as the trail of data someone leaves when using the internet through their online activities and devices. It then discusses how digital footprints can be active, meaning data the user deliberately shares, or passive, referring to data collected without the user's awareness. The document also covers how cookies work and the role they play in digital footprints by tracking users' activities online.
This document discusses various topics related to cyber ethics and online privacy and security. It provides tips for safe browsing, discusses how websites can track users through IP addresses, cookies, and other techniques. It also outlines best practices for ensuring confidentiality of information online and defines different types of cyber crimes like cyberbullying, cyber trolls, and more.
The document provides instructions for using the writing assistance service HelpWriting.net. It outlines a 5-step process: 1) Create an account with a password and email. 2) Complete a 10-minute order form providing instructions, sources, and deadline. 3) Review bids from writers and select one based on qualifications. 4) Review the completed paper and authorize payment if satisfied. 5) Request revisions to ensure satisfaction, with a refund offered for plagiarized work.
This document discusses different types of e-commerce. It outlines business-to-consumer (B2C) e-commerce, where companies sell goods directly to consumers. It also describes business-to-business (B2B) e-commerce, where companies sell goods to other businesses, and consumer-to-consumer (C2C) e-commerce like eBay. Social e-commerce and mobile e-commerce are also defined. Unique features of e-commerce technology like ubiquity, global reach, and personalization are listed. The document then discusses cookies, including what they are, different types like session and persistent cookies, and advantages and disadvantages of cookies. Finally, internet of things is defined as connecting physical objects to
Big Data comes from a variety of sources as human activities online generate vast amounts of data every day through intentional, accidental, and unknown means. This includes activities on social media, sensors, logs, and more. Content delivery networks (CDNs) can help distribute big data by caching content on servers located closer to users. While pushing content to CDNs offloads work from origin servers and improves performance, it also segments users and requires replication strategies to maintain consistency. Techniques include pre-computing static content from dynamic sources, pushing searches and other functions to CDNs, and experimenting with different cache models. Overall, CDNs can be an effective way to distribute big data but also introduce more complexity and dependence on the CDN
This document discusses the need for social web analytics (SWA) and provides several reasons why organizations should adopt SWA. It notes that SWA allows organizations to easily monitor conversations happening online about their company, products, markets and competitors. It also discusses how SWA can help with PR, brand monitoring, measurement and evaluation, and market research and new product development. Several quotes from experts are provided that emphasize the importance of listening to online conversations and participating in social media. In summary, SWA is positioned as a critical tool for organizations to understand online discussions and conversations that are happening about their business in order to improve marketing, PR and business strategies.
The document discusses the rise of social media and how it has inverted traditional power structures. It notes that social media allows for a level playing field where small organizations can compete equally with large brands. It also provides tips on how to develop a social media strategy, including using various free tools and automating posts to maximize reach. The conclusion encourages embracing new technologies and using social media to collaborate and support others.
This document discusses various topics related to cyber ethics and online privacy and security. It provides tips for safe browsing, discusses how websites can track users through IP addresses, cookies, and other techniques. It also outlines best practices for ensuring confidentiality of information online and defines different types of cyber crimes like cyberbullying, cyber trolls, and more.
The document provides instructions for using the writing assistance service HelpWriting.net. It outlines a 5-step process: 1) Create an account with a password and email. 2) Complete a 10-minute order form providing instructions, sources, and deadline. 3) Review bids from writers and select one based on qualifications. 4) Review the completed paper and authorize payment if satisfied. 5) Request revisions to ensure satisfaction, with a refund offered for plagiarized work.
This document discusses different types of e-commerce. It outlines business-to-consumer (B2C) e-commerce, where companies sell goods directly to consumers. It also describes business-to-business (B2B) e-commerce, where companies sell goods to other businesses, and consumer-to-consumer (C2C) e-commerce like eBay. Social e-commerce and mobile e-commerce are also defined. Unique features of e-commerce technology like ubiquity, global reach, and personalization are listed. The document then discusses cookies, including what they are, different types like session and persistent cookies, and advantages and disadvantages of cookies. Finally, internet of things is defined as connecting physical objects to
Big Data comes from a variety of sources as human activities online generate vast amounts of data every day through intentional, accidental, and unknown means. This includes activities on social media, sensors, logs, and more. Content delivery networks (CDNs) can help distribute big data by caching content on servers located closer to users. While pushing content to CDNs offloads work from origin servers and improves performance, it also segments users and requires replication strategies to maintain consistency. Techniques include pre-computing static content from dynamic sources, pushing searches and other functions to CDNs, and experimenting with different cache models. Overall, CDNs can be an effective way to distribute big data but also introduce more complexity and dependence on the CDN
This document discusses the need for social web analytics (SWA) and provides several reasons why organizations should adopt SWA. It notes that SWA allows organizations to easily monitor conversations happening online about their company, products, markets and competitors. It also discusses how SWA can help with PR, brand monitoring, measurement and evaluation, and market research and new product development. Several quotes from experts are provided that emphasize the importance of listening to online conversations and participating in social media. In summary, SWA is positioned as a critical tool for organizations to understand online discussions and conversations that are happening about their business in order to improve marketing, PR and business strategies.
The document discusses the rise of social media and how it has inverted traditional power structures. It notes that social media allows for a level playing field where small organizations can compete equally with large brands. It also provides tips on how to develop a social media strategy, including using various free tools and automating posts to maximize reach. The conclusion encourages embracing new technologies and using social media to collaborate and support others.
Julian of Norwich was a 14th century English anchoress and mystic. She is known for her book Revelations of Divine Love, where she shares the visions God granted her and the theological insights she gained. Julian viewed God's love as unconditional, like a mother's love. She saw Christ as representing both masculinity and femininity within the Trinity. Her writings provide a spiritual template that emphasizes contemplative prayer and finding intimacy with God through suffering.
The document provides instructions for requesting writing assistance from HelpWriting.net. It outlines a 5-step process: 1) Create an account with a password and email; 2) Complete a 10-minute order form providing instructions, sources, and deadline; 3) Review bids from writers and select one; 4) Review the completed paper and authorize payment; 5) Request revisions to ensure satisfaction and get a refund if plagiarized.
Basically, a cookie is a small piece of information where data sent by the website get stored in the user’s computer while the user is browsing. Cookies vary browser to browser it means they are browser-specific. Basically, it means that your Chrome and Firefox will not be able to see each other’s cookies which are stored in them.
How Tracking Your Personal Data Really Adds Up | SoGoSurveySogolytics
The way your phone and computer know everything about you -- convenient or creepy? Keep track of the data you're giving away, because you can believe there are plenty of others tracking everything they can find out about you...
Get Someone To Write Essay For You - College Essay WrLisa Graves
This document discusses the phenomenon of sexting among teens and adults. It defines sexting as sending sexually explicit photos or messages via text, and notes that despite awareness of legal and social risks, approximately 1 in 5 teens report having sexted. The document explores reasons for sexting, such as getting attention or flirting, but also warns of serious potential consequences, including legal and emotional issues. It advocates for open communication between parents and children to curb the spread of sexting.
The document discusses the rise of social media and how it has inverted traditional power structures. It notes how social media has leveled the playing field for organizations of all sizes to promote themselves. It also provides tips on developing a social media strategy, including using various platforms to reach broad audiences and automating content sharing. Various free Google tools for social media monitoring and engagement are also highlighted.
The web has changed a lot in the last 15 years, from simple calling cards and poster-like design into a massive ecosystem full of dynamic information and personalization - but I feel most companies are not aware enough, at least not yet.
A Risks And Opportunities Framework For Archives 2.0lisbk
This document discusses developing a framework for assessing risks and opportunities when adopting Web 2.0 technologies in archives. It identifies potential concerns from technical, funding, and legal perspectives. The framework involves analyzing intended purpose, benefits and risks to stakeholders, missed opportunities, and costs to develop a balanced, evidence-based approach that addresses biases through critical evaluation and experience sharing. Examples demonstrate applying the framework to social media services like Twitter and Facebook.
The document provides instructions for making baklava in 5 steps:
1. Mix nuts, cinnamon, and dough and layer in pan.
2. Bake until golden brown.
3. Prepare syrup by boiling sugar, water, honey, and vanilla.
4. Drizzle hot baklava with syrup to cover.
5. Allow to cool before serving or freezing extra portions.
Living Services respond by
wrapping around us, constantly
learning more about our needs,
intents and preferences, so
that they can flex and adapt to
make themselves more relevant,
engaging and useful. Consumers
demand this now as the standards
are being set by the best of
breed across the entirety of their
experiences, not restricted by
sector—hence liquid expectations.
Possibilities and perils of the data-driven world.joshuakauffman
I gave this lecture and led a discussion at the Future Insight summit in Oslo, Norway, March 13, 2014.
This was an introduction to subjects relating to the data-driven world, including a lengthier bit on the Quantified Self.
I improvised from the presenter notes.They give a pretty good sense of the contour of the talk.
In the Q and A session, people were mostly concerned about privacy implications of personal data collection.
My short answer is that I am also concerned, and think we need to broaden the discussion of privacy so that it transcends the concept of unwanted exposure and recenters itself on questions relating to the terms of exchange of personal data as they relate to social and economic value.
The document introduces Web 2.0 tools that can assist teaching and learning, including blogs, wikis, podcasting, widgets, RSS feeds, and Google Documents. It provides examples of specific websites where teachers can create avatars, magazine covers, online activities, and share other digital content and resources. The document encourages teachers to set up free accounts to explore and experiment with these Web 2.0 tools.
The document introduces Web 2.0 tools that can assist teaching and learning, including blogs, wikis, podcasting, widgets, RSS feeds, and Google Documents. It provides examples of specific websites where teachers can create avatars, magazine covers, online activities, and share other digital content and resources. The document encourages teachers to set up free accounts on these websites and have fun exploring the various Web 2.0 tools.
Rethinking Business Models in a Networked WorldThomas Samson
The document discusses how business models need to adapt to the increasingly networked world. It emphasizes that in the future, people will be connected through social networks and mobile devices. Companies will need to engage customers by rewarding their attention, understanding social networks as new market spaces, and offering value through conversation rather than traditional advertising. The emerging networked culture values open sharing and challenges restrictive property rights.
The document provides biographical information about the author of the book "Internet Privacy and Myths". It states that the author holds several degrees in fields related to networking, programming and technology management. It also lists some of the author's research areas as cyber security, networks, privacy, software development and social media. The author wrote the book to inform people about the truth regarding internet privacy. The document prohibits unauthorized publication of the book and provides basic copyright information.
Examples Of My Future Dream Career. Online assignment writing service.Katy Allen
The document discusses the steps to request a paper writing service from HelpWriting.net. It begins by having the user create an account with a password and email. They then complete a form providing instructions, sources, and deadline for their paper. Writers bid on the request and the user chooses one based on qualifications. The user then pays a deposit and the writer completes the paper. The user can request revisions if needed. The service promises original, high-quality papers with refunds for plagiarism.
The document discusses internet privacy and provides tips to protect personal information online. It defines privacy as controlling what information users reveal about themselves and who can access it. Some threats to privacy include cookies, data logging, caching emails, and posting photos publicly. The document recommends using firewalls, antivirus software, and different usernames/passwords on different sites. It also suggests being careful about sharing information and deleting emails from unknown senders. Users are directed to online quizzes about internet privacy.
Julian of Norwich was a 14th century English anchoress and mystic. She is known for her book Revelations of Divine Love, where she shares the visions God granted her and the theological insights she gained. Julian viewed God's love as unconditional, like a mother's love. She saw Christ as representing both masculinity and femininity within the Trinity. Her writings provide a spiritual template that emphasizes contemplative prayer and finding intimacy with God through suffering.
The document provides instructions for requesting writing assistance from HelpWriting.net. It outlines a 5-step process: 1) Create an account with a password and email; 2) Complete a 10-minute order form providing instructions, sources, and deadline; 3) Review bids from writers and select one; 4) Review the completed paper and authorize payment; 5) Request revisions to ensure satisfaction and get a refund if plagiarized.
Basically, a cookie is a small piece of information where data sent by the website get stored in the user’s computer while the user is browsing. Cookies vary browser to browser it means they are browser-specific. Basically, it means that your Chrome and Firefox will not be able to see each other’s cookies which are stored in them.
How Tracking Your Personal Data Really Adds Up | SoGoSurveySogolytics
The way your phone and computer know everything about you -- convenient or creepy? Keep track of the data you're giving away, because you can believe there are plenty of others tracking everything they can find out about you...
Get Someone To Write Essay For You - College Essay WrLisa Graves
This document discusses the phenomenon of sexting among teens and adults. It defines sexting as sending sexually explicit photos or messages via text, and notes that despite awareness of legal and social risks, approximately 1 in 5 teens report having sexted. The document explores reasons for sexting, such as getting attention or flirting, but also warns of serious potential consequences, including legal and emotional issues. It advocates for open communication between parents and children to curb the spread of sexting.
The document discusses the rise of social media and how it has inverted traditional power structures. It notes how social media has leveled the playing field for organizations of all sizes to promote themselves. It also provides tips on developing a social media strategy, including using various platforms to reach broad audiences and automating content sharing. Various free Google tools for social media monitoring and engagement are also highlighted.
The web has changed a lot in the last 15 years, from simple calling cards and poster-like design into a massive ecosystem full of dynamic information and personalization - but I feel most companies are not aware enough, at least not yet.
A Risks And Opportunities Framework For Archives 2.0lisbk
This document discusses developing a framework for assessing risks and opportunities when adopting Web 2.0 technologies in archives. It identifies potential concerns from technical, funding, and legal perspectives. The framework involves analyzing intended purpose, benefits and risks to stakeholders, missed opportunities, and costs to develop a balanced, evidence-based approach that addresses biases through critical evaluation and experience sharing. Examples demonstrate applying the framework to social media services like Twitter and Facebook.
The document provides instructions for making baklava in 5 steps:
1. Mix nuts, cinnamon, and dough and layer in pan.
2. Bake until golden brown.
3. Prepare syrup by boiling sugar, water, honey, and vanilla.
4. Drizzle hot baklava with syrup to cover.
5. Allow to cool before serving or freezing extra portions.
Living Services respond by
wrapping around us, constantly
learning more about our needs,
intents and preferences, so
that they can flex and adapt to
make themselves more relevant,
engaging and useful. Consumers
demand this now as the standards
are being set by the best of
breed across the entirety of their
experiences, not restricted by
sector—hence liquid expectations.
Possibilities and perils of the data-driven world.joshuakauffman
I gave this lecture and led a discussion at the Future Insight summit in Oslo, Norway, March 13, 2014.
This was an introduction to subjects relating to the data-driven world, including a lengthier bit on the Quantified Self.
I improvised from the presenter notes.They give a pretty good sense of the contour of the talk.
In the Q and A session, people were mostly concerned about privacy implications of personal data collection.
My short answer is that I am also concerned, and think we need to broaden the discussion of privacy so that it transcends the concept of unwanted exposure and recenters itself on questions relating to the terms of exchange of personal data as they relate to social and economic value.
The document introduces Web 2.0 tools that can assist teaching and learning, including blogs, wikis, podcasting, widgets, RSS feeds, and Google Documents. It provides examples of specific websites where teachers can create avatars, magazine covers, online activities, and share other digital content and resources. The document encourages teachers to set up free accounts to explore and experiment with these Web 2.0 tools.
The document introduces Web 2.0 tools that can assist teaching and learning, including blogs, wikis, podcasting, widgets, RSS feeds, and Google Documents. It provides examples of specific websites where teachers can create avatars, magazine covers, online activities, and share other digital content and resources. The document encourages teachers to set up free accounts on these websites and have fun exploring the various Web 2.0 tools.
Rethinking Business Models in a Networked WorldThomas Samson
The document discusses how business models need to adapt to the increasingly networked world. It emphasizes that in the future, people will be connected through social networks and mobile devices. Companies will need to engage customers by rewarding their attention, understanding social networks as new market spaces, and offering value through conversation rather than traditional advertising. The emerging networked culture values open sharing and challenges restrictive property rights.
The document provides biographical information about the author of the book "Internet Privacy and Myths". It states that the author holds several degrees in fields related to networking, programming and technology management. It also lists some of the author's research areas as cyber security, networks, privacy, software development and social media. The author wrote the book to inform people about the truth regarding internet privacy. The document prohibits unauthorized publication of the book and provides basic copyright information.
Examples Of My Future Dream Career. Online assignment writing service.Katy Allen
The document discusses the steps to request a paper writing service from HelpWriting.net. It begins by having the user create an account with a password and email. They then complete a form providing instructions, sources, and deadline for their paper. Writers bid on the request and the user chooses one based on qualifications. The user then pays a deposit and the writer completes the paper. The user can request revisions if needed. The service promises original, high-quality papers with refunds for plagiarism.
The document discusses internet privacy and provides tips to protect personal information online. It defines privacy as controlling what information users reveal about themselves and who can access it. Some threats to privacy include cookies, data logging, caching emails, and posting photos publicly. The document recommends using firewalls, antivirus software, and different usernames/passwords on different sites. It also suggests being careful about sharing information and deleting emails from unknown senders. Users are directed to online quizzes about internet privacy.
Discover the benefits of outsourcing SEO to Indiadavidjhones387
"Discover the benefits of outsourcing SEO to India! From cost-effective services and expert professionals to round-the-clock work advantages, learn how your business can achieve digital success with Indian SEO solutions.
Securing BGP: Operational Strategies and Best Practices for Network Defenders...APNIC
Md. Zobair Khan,
Network Analyst and Technical Trainer at APNIC, presented 'Securing BGP: Operational Strategies and Best Practices for Network Defenders' at the Phoenix Summit held in Dhaka, Bangladesh from 23 to 24 May 2024.
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...APNIC
Adli Wahid, Senior Internet Security Specialist at APNIC, delivered a presentation titled 'Honeypots Unveiled: Proactive Defense Tactics for Cyber Security' at the Phoenix Summit held in Dhaka, Bangladesh from 23 to 24 May 2024.
Integrating Physical and Cybersecurity to Lower Risks in Healthcare!Alec Kassir cozmozone
The contemporary hospital setting is witnessing a growing convergence between physical security and cybersecurity. Because of advancements in technology and the rise in cyberattacks, healthcare facilities face unique challenges.
HijackLoader Evolution: Interactive Process HollowingDonato Onofri
CrowdStrike researchers have identified a HijackLoader (aka IDAT Loader) sample that employs sophisticated evasion techniques to enhance the complexity of the threat. HijackLoader, an increasingly popular tool among adversaries for deploying additional payloads and tooling, continues to evolve as its developers experiment and enhance its capabilities.
In their analysis of a recent HijackLoader sample, CrowdStrike researchers discovered new techniques designed to increase the defense evasion capabilities of the loader. The malware developer used a standard process hollowing technique coupled with an additional trigger that was activated by the parent process writing to a pipe. This new approach, called "Interactive Process Hollowing", has the potential to make defense evasion stealthier.
2. DIGITAL FOOTPRINTS
01
How Cookies plays a crucial role in Digital Footprints
INTELLECTUAL PROPERTY RIGHT
02
Copyrights, Patent, Trademark, Violation of (IPR)
DIGITAL RIGHTS MANAGEMENT
03
A brief introduction about Digital Rights Management
TABLE OF CONTENTS
OPEN SOURCE SOFTWARE
04
Public Access and Open Source software,
Open Source, Open data, Privacy
4. —SOMEONE FAMOUS
“This is a quote, words full of
wisdom that someone
important said and inspire
anyone who reads them.”
5. INTRODUCTION
A digital footprint – sometimes called a digital shadow
or an electronic footprint – refers to the trail of data you
leave when using the internet. It includes websites you
visit, emails you send, and information you submit
online. A digital footprint can be used to track a person’s
online activities and devices. Internet users create their
digital footprint either actively or passively.
6. DIGITAL FOOTPRINT
● Whenever you use the internet, you leave behind a
trail of information known as your digital footprint. A
digital footprint grows in many ways – for example,
posting on social media, subscribing to a newsletter,
leaving an online review, or shopping online.
● Sometimes you are contributing to your digital
footprint. For example, websites can track your
activity by installing cookies on your device, and apps
can collate your data without you knowing it. Once
you allow an organization to access your information,
they could sell or share your data with third parties.
Worse still, your personal information could be
compromised as part of a data breach.
● You often hear the terms ‘active’ and ‘passive’ in
relation to digital footprints:
7. TYPES OF FOOTPRINTS
ACTIVE DIGITAL FOOTPRINT:
● An active digital footprint is where the
user has deliberately shared information
about themselves – for example,
through posting or participating on
social networking sites or online forums.
● If a user is logged into a website
through a registered username or
profile, any posts they make form part of
their active digital footprint.
● Other activities that contribute to active
digital footprints include completing an
online form – such as subscribing to a
newsletter – or agreeing to accept
cookies on your browser.
PASSIVE DIGITAL FOOTPRINT:
● A passive digital footprint is created
when information is collected about the
user without them being aware that this
is happening.
● For example, this occurs when websites
collect information about how many
times users visit, where they come from,
and their IP address.
● This is a hidden process, which users
may not realize is taking place.
● Other examples of passive footprints
include social networking sites and
advertisers using your likes, shares, and
comments to profile you and target you
with specific content.
9. WHAT IS A COOKIE ?
● Cookies are text files with small pieces of data like a
username and password that are used to identify your
computer as you use a computer network. Specific
cookies known as HTTP cookies are used to identify
specific users and improve your web browsing
experience.
● Data stored in a cookie is created by the server upon
your connection. This data is labeled with an ID unique
to you and your computer.
● When the cookie is exchanged between your
computer and the network server, the server reads the
ID and knows what information to specifically serve to
you.
10. WHAT IS A HTTP COOKIE
● HTTP cookies, or internet cookies, are
built specifically for Internet web
browsers to track, personalize, and save
information about each user’s session. A
“session” just refers to the time you
spend on a site.
● Cookies are created to identify you
when you visit a new website. The web
server which stores the website’s data
sends a short stream of identifying info
to your web browser.
● Browser cookies are identified and read
by “name-value” pairs. These tell cookies
where to be sent and what data to
recall.
● The server only sends the cookie when it
wants the web browser to save it. If
you’re wondering “where are cookies
stored,” it’s simple: your web browser
will store it locally to remember the
“name-value pair” that identifies you.
● If a user returns to that site in the future,
the web browser returns that data to
the web server in the form of a cookie.
This is when your browser will send it
back to the server to recall data from
your previous sessions.
11. TYPES OF COOKIES
MAGIC COOKIES:
● "Magic cookies" are an old computing
term that refers to packets of
information that are sent and received
without changes.
● Commonly, this would be used for a
login to computer database systems,
such as a business internal network. This
concept predates the modern “cookie”
we use today.
HTTP COOKIES:
● HTTP cookies are a repurposed version
of the “magic cookie” built for internet
browsing. Web browser programmer
Lou Montulli used the “magic cookie” as
inspiration in 1994.
● He recreated this concept for browsers
when he helped an online shopping
store fix their overloaded servers.
● The HTTP cookie is what we currently
use to manage our online experiences. It
is also what some malicious people can
use to spy on your online activity and
steal your personal info.
12. HOW COOKIES WORK ?
To put it simply, cookies are a bit like getting a ticket for a
coat check:
● You hand over your “coat” to the cloak desk. In this
case, a pocket of data is linked to you on the website
server when you connect. This data can be your
personal account, your shopping cart, or even just
what pages you’ve visited.
● You get a “ticket” to identify you as the “coat” owner.
The cookie for the website is given to you and stored
in your web browser. It has a unique ID especially for
you.
● If you leave and return, you can get the “coat” with
your “ticket”. Your browser gives the website your
cookie. It reads the unique ID in the cookie to
assemble your activity data and recall your visit just as
you left it.
13. WHAT ARE COOKIES USED FOR ?
Here’s how cookie are intended to be used:
● Session management. For example,
cookies let websites recognize users and
recall their individual login information
and preferences, such as sports news
versus politics.
● Personalization. Customized advertising
is the main way cookies are used to
personalize your sessions. You may view
certain items or parts of a site, and
cookies use this data to help build
targeted ads that you might enjoy.
● Tracking. Shopping sites use cookies to
track items users previously viewed,
allowing the sites to suggest other
goods they might like and keep items in
shopping carts while they continue
shopping.
15. OUR TEACHING METHOD
Mercury is the closest
planet to the Sun
FEEDBACK
GOALS
Jupiter is the biggest
planet of them all
ACTIVITIES
Saturn is a gas giant
and has several rings
17. Jupiter is a gas giant
and the biggest planet
in the Solar System
Venus has a beautiful
name and is the
second planet from the
Sun
WHAT SETS US APART
VENUS MARS
Mars is full of iron
oxide dust, which gives
the planet its reddish
cast
JUPITER
18. THE CURRICULUM
INTRODUCTION
Mercury is the closest planet to the
Sun and the smallest one in System
2XXX Jupiter is a big planet
2XXX Earth is where all live
2XXX Mars is a cold place
2XXX Saturn has several rings
ADVANTAGES
75% 80% 95%
EARTH VENUS SATURN
FEATURES
NEPTUNE
MERCURY
55%
75%
19. Earth is the only
planet that harbors
life
Saturn is a gas giant
and has several rings
Jupiter is the biggest
planet of them all
Despite being red,
Mars is a cold place
Venus is the second
planet from the Sun
MARS
MERCURY
Mercury is the closest
planet to the Sun
VENUS
JUPITER
SATURN EARTH
OUR ACADEMIC AREAS
20. VISION
Venus has a beautiful name
and is the second planet
from the Sun. It’s terribly hot,
even hotter than Mercury
MISSION
Saturn is composed mostly
of hydrogen and helium. It
was named after the Roman
god of wealth and
agriculture
MISSION AND VISION
21. Venus is the second
planet from the Sun
OUR VALUES
SATURN
Saturn is a gas giant
and has several rings
EARTH
Earth is the only
planet that harbors
life
JUPITER
Jupiter is the biggest
planet of them all
VENUS
22. MERCURY
Mercury is the
closest planet to the
Sun
JUPITER
Jupiter is the biggest
planet of them all
VENUS
Venus is the second
planet from the Sun
OUR SUCCESS
75% 90%
85%
SATURN
Saturn is a gas giant
and has several rings
95%
24. STATISTICS
VENUS
Venus is the second
planet from the Sun
MARS
Despite being red,
Mars is a cold place
Follow the link in the graph to modify its data and then paste the new one here. For more info, click
here
25. You can speak a bit about
this person here
You can speak a bit about
this person here
OUR TEACHERS
JENNA DOE TIMMY JIMMY
26. OUR GOALS
SATURN
Saturn is a gas giant
and has several rings
JUPITER
Jupiter is the biggest
planet of them all
VENUS
Venus is the second
planet from the Sun
2XXX
2XXX
2XXX
28. STUDENT PROGRESS
2ND TERM
Jupiter is the biggest
planet of them all
4TH TERM
Venus is the second
planet from the Sun
1ST TERM
Saturn is a gas giant
and has several rings
3RD TERM
Earth is the only
planet that harbors
life
29. ENROLLMENT PROCESS
STEP 1
Saturn is a gas giant
and has several rings
STEP 3
Jupiter is the biggest
planet of them all
STEP 2
Venus is the second
planet from the Sun
31. SPECIAL REMINDERS
● Mercury is the closest planet to the Sun and
the smallest one in the Solar System
● Mars is a cold place. It's full of iron oxide dust,
which gives the planet its reddish cast
● Saturn is a gas giant and has several rings. It's
composed mostly of hydrogen and helium
● Earth is the third planet from the Sun and the
only one that harbors life in the Solar System
● Venus is terribly hot, even hotter than
Mercury, and its atmosphere is extremely
poisonous
33. LAPTOP
MOCKUP
You can replace the image on
the screen with your own
work. Just right-click on it and
select “Replace image”
34. CREDITS: This presentation template was
created by Slidesgo, including icons by
Flaticon, infographics & images by Freepik
THANKS!
Do you have any questions?
youremail@freepik.com
+91 620 421 838
yourwebsite.com
Please keep this slide for attribution
35. ALTERNATIVE RESOURCES
Here’s an assortment of alternative resources
whose style fits the one of this template:
VECTORS
● Flat design data privacy invoice
● Flat design data privacy instagram
stories
● Flat design data privacy letterhead
36. RESOURCES
Did you like the resources on this template?
Get them for free at our other websites:
VECTORS
● Flat design data privacy landing page
● Flat design data privacy infographic
● Flat design data privacy id card
● Flat design data privacy annual report
● Flat design data privacy instagram
stories
● Flat design data privacy instagram post
PHOTOS
● Team working together on project
● Team working together on project
● Business people in conference room
medium shot
● Business people in conference room
37. Instructions for use
If you have a free account, in order to use this template, you must credit Slidesgo by keeping the Thanks slide. Please
refer to the next slide to read the instructions for premium users.
As a Free user, you are allowed to:
● Modify this template.
● Use it for both personal and commercial projects.
You are not allowed to:
● Sublicense, sell or rent any of Slidesgo Content (or a modified version of Slidesgo Content).
● Distribute Slidesgo Content unless it has been expressly authorized by Slidesgo.
● Include Slidesgo Content in an online or offline database or file.
● Offer Slidesgo templates (or modified versions of Slidesgo templates) for download.
● Acquire the copyright of Slidesgo Content.
For more information about editing slides, please read our FAQs or visit our blog:
https://slidesgo.com/faqs and https://slidesgo.com/slidesgo-school
38. As a Premium user, you can use this template without attributing Slidesgo or keeping the Thanks slide.
You are allowed to:
● Modify this template.
● Use it for both personal and commercial purposes.
● Hide or delete the “Thanks” slide and the mention to Slidesgo in the credits.
● Share this template in an editable format with people who are not part of your team.
You are not allowed to:
● Sublicense, sell or rent this Slidesgo Template (or a modified version of this Slidesgo Template).
● Distribute this Slidesgo Template (or a modified version of this Slidesgo Template) or include it in a database or in
any other product or service that offers downloadable images, icons or presentations that may be subject to
distribution or resale.
● Use any of the elements that are part of this Slidesgo Template in an isolated and separated way from this
Template.
● Register any of the elements that are part of this template as a trademark or logo, or register it as a work in an
intellectual property registry or similar.
For more information about editing slides, please read our FAQs or visit our blog:
https://slidesgo.com/faqs and https://slidesgo.com/slidesgo-school
Instructions for use (premium users)
39. This presentation has been made using the following fonts:
Montserrat
(https://fonts.google.com/specimen/Montserrat)
#666466 #005d77 #399bd8 #84c4f4
#d9f1ff #ec6f09 #f78a2f #ffffff
#c2e9ff
Fonts & colors used
40. Create your Story with our illustrated concepts. Choose the style you like the most, edit its colors, pick the background
and layers you want to show and bring them to life with the animator panel! It will boost your presentation. Check out how
it works.
Storyset
Pana Amico Bro Rafiki Cuate
41. You can easily resize these resources without losing quality. To change the color, just ungroup the resource and click
on the object you want to change. Then, click on the paint bucket and select the color you want. Group the resource again
when you’re done. You can also look for more infographics on Slidesgo.
Use our editable graphic resources...
42.
43.
44. JANUARY FEBRUARY MARCH APRIL MAY JUNE
PHASE 1
PHASE 2
Task 1
Task 2
Task 1
Task 2
JANUARY FEBRUARY MARCH APRIL
PHASE 1
Task 1
Task 2
45.
46.
47. You can resize these icons without losing quality.
You can change the stroke and fill color; just select the icon and click on the paint bucket/pen.
In Google Slides, you can also use Flaticon’s extension, allowing you to customize and add even more icons.
...and our sets of editable icons