SlideShare a Scribd company logo
Work done by: 
André Cantarrilha, Carolina Pardal, Frederica Pinto, Mariana 
Costa, Tiago Felício 
11th B 
Escola Profissional do Vale do Tejo 
Comunicação - Marketing, Relações Públicas e 
Publicidade 
English 
Teacher Inês Leitão
Cyber Crime is a term for any illegal activity that uses a 
computer as it´s primary means of commission.
Hackers are computer experts who spend enormous 
amounts of time trying to breach the security of 
networks, Web servers and email servers.
 Movies 
 Games 
 Images 
 Musics 
 Works done
We don’t agree with illegal 
downloads because the copyright 
should be respect.
Yes, we usually do downloads of new songs, 
games, recent movies and images for 
schoolworks.
Thank you for your 
attention!

More Related Content

What's hot

Internet Ethics
Internet EthicsInternet Ethics
Internet Ethics
vincentl33
 
computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slides
thothakhail
 
Legal issues in technology
Legal issues in technologyLegal issues in technology
Legal issues in technology
KobieJones1
 
Internet tech lessons
Internet tech lessonsInternet tech lessons
Internet tech lessons
learnt
 
Digital Etiquette
Digital Etiquette Digital Etiquette
Digital Etiquette
EMCox02
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
RanaAbuHuraira
 
6 8 safety ppt final copy
6 8 safety ppt final copy6 8 safety ppt final copy
6 8 safety ppt final copy
markkreiter
 
Computer Lab Management and Ethics in Using Computer
Computer Lab Management and Ethics in Using ComputerComputer Lab Management and Ethics in Using Computer
Computer Lab Management and Ethics in Using Computer
Nur Azlina
 
Digital rights and responsibilities ppt
Digital rights and responsibilities pptDigital rights and responsibilities ppt
Digital rights and responsibilities ppt
Maddiecarter5
 
Educational Technology 2
Educational Technology 2Educational Technology 2
Educational Technology 2
EN NA
 
secureIoT Presentation #2
secureIoT Presentation #2secureIoT Presentation #2
secureIoT Presentation #2
Mel Savich
 
secureIoT Presentation #2 redo
secureIoT Presentation #2 redosecureIoT Presentation #2 redo
secureIoT Presentation #2 redo
Mel Savich
 
Social moral ethical
Social moral ethicalSocial moral ethical
Social moral ethical
Jimmy Edwards
 
computer ethics
computer ethicscomputer ethics
computer ethics
sdrhr
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
jonathan2134
 
Erasmus+ group 2
Erasmus+ group 2Erasmus+ group 2
Erasmus+ group 2
Maria Rosaria Grasso
 
Responsible Use
Responsible UseResponsible Use
Responsible Use
Andrea Tejedor
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette
dhabyahalk
 
Harvard.dean
Harvard.deanHarvard.dean
Harvard.dean
Andrey Smirnov
 
Internet Safety Keypoints Handout
Internet Safety Keypoints HandoutInternet Safety Keypoints Handout
Internet Safety Keypoints Handout
Ollie Bray
 

What's hot (20)

Internet Ethics
Internet EthicsInternet Ethics
Internet Ethics
 
computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slides
 
Legal issues in technology
Legal issues in technologyLegal issues in technology
Legal issues in technology
 
Internet tech lessons
Internet tech lessonsInternet tech lessons
Internet tech lessons
 
Digital Etiquette
Digital Etiquette Digital Etiquette
Digital Etiquette
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
6 8 safety ppt final copy
6 8 safety ppt final copy6 8 safety ppt final copy
6 8 safety ppt final copy
 
Computer Lab Management and Ethics in Using Computer
Computer Lab Management and Ethics in Using ComputerComputer Lab Management and Ethics in Using Computer
Computer Lab Management and Ethics in Using Computer
 
Digital rights and responsibilities ppt
Digital rights and responsibilities pptDigital rights and responsibilities ppt
Digital rights and responsibilities ppt
 
Educational Technology 2
Educational Technology 2Educational Technology 2
Educational Technology 2
 
secureIoT Presentation #2
secureIoT Presentation #2secureIoT Presentation #2
secureIoT Presentation #2
 
secureIoT Presentation #2 redo
secureIoT Presentation #2 redosecureIoT Presentation #2 redo
secureIoT Presentation #2 redo
 
Social moral ethical
Social moral ethicalSocial moral ethical
Social moral ethical
 
computer ethics
computer ethicscomputer ethics
computer ethics
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Erasmus+ group 2
Erasmus+ group 2Erasmus+ group 2
Erasmus+ group 2
 
Responsible Use
Responsible UseResponsible Use
Responsible Use
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette
 
Harvard.dean
Harvard.deanHarvard.dean
Harvard.dean
 
Internet Safety Keypoints Handout
Internet Safety Keypoints HandoutInternet Safety Keypoints Handout
Internet Safety Keypoints Handout
 

More from Carolina Pardal

Portuguese teenagers
Portuguese teenagersPortuguese teenagers
Portuguese teenagers
Carolina Pardal
 
Iberian wolf
Iberian wolfIberian wolf
Iberian wolf
Carolina Pardal
 
Os loucos anos 20
Os loucos anos 20Os loucos anos 20
Os loucos anos 20
Carolina Pardal
 
Lourenço Médicis
Lourenço MédicisLourenço Médicis
Lourenço Médicis
Carolina Pardal
 
Jean Jacques Rousseau
Jean Jacques RousseauJean Jacques Rousseau
Jean Jacques Rousseau
Carolina Pardal
 
Estratégia de comunicação Keep Ice
Estratégia de comunicação Keep IceEstratégia de comunicação Keep Ice
Estratégia de comunicação Keep Ice
Carolina Pardal
 
Criação de produto e estratégia de comunicação - Chocapic Caramelo (3ª fase)
Criação de produto e estratégia de comunicação - Chocapic Caramelo (3ª fase)Criação de produto e estratégia de comunicação - Chocapic Caramelo (3ª fase)
Criação de produto e estratégia de comunicação - Chocapic Caramelo (3ª fase)
Carolina Pardal
 
Criação de produto e estratégia de comunicação - Chocapic Caramelo (2ª fase)
Criação de produto e estratégia de comunicação - Chocapic Caramelo (2ª fase)Criação de produto e estratégia de comunicação - Chocapic Caramelo (2ª fase)
Criação de produto e estratégia de comunicação - Chocapic Caramelo (2ª fase)
Carolina Pardal
 
Criação de produto e estratégia de comunicação - Chocapic Caramelo (1ª fase)
Criação de produto e estratégia de comunicação - Chocapic Caramelo (1ª fase)Criação de produto e estratégia de comunicação - Chocapic Caramelo (1ª fase)
Criação de produto e estratégia de comunicação - Chocapic Caramelo (1ª fase)
Carolina Pardal
 
Campanha Eleitoral Juventude Marijuanita
Campanha Eleitoral Juventude MarijuanitaCampanha Eleitoral Juventude Marijuanita
Campanha Eleitoral Juventude Marijuanita
Carolina Pardal
 
Cesário verde - Humilhações
Cesário verde - HumilhaçõesCesário verde - Humilhações
Cesário verde - Humilhações
Carolina Pardal
 

More from Carolina Pardal (11)

Portuguese teenagers
Portuguese teenagersPortuguese teenagers
Portuguese teenagers
 
Iberian wolf
Iberian wolfIberian wolf
Iberian wolf
 
Os loucos anos 20
Os loucos anos 20Os loucos anos 20
Os loucos anos 20
 
Lourenço Médicis
Lourenço MédicisLourenço Médicis
Lourenço Médicis
 
Jean Jacques Rousseau
Jean Jacques RousseauJean Jacques Rousseau
Jean Jacques Rousseau
 
Estratégia de comunicação Keep Ice
Estratégia de comunicação Keep IceEstratégia de comunicação Keep Ice
Estratégia de comunicação Keep Ice
 
Criação de produto e estratégia de comunicação - Chocapic Caramelo (3ª fase)
Criação de produto e estratégia de comunicação - Chocapic Caramelo (3ª fase)Criação de produto e estratégia de comunicação - Chocapic Caramelo (3ª fase)
Criação de produto e estratégia de comunicação - Chocapic Caramelo (3ª fase)
 
Criação de produto e estratégia de comunicação - Chocapic Caramelo (2ª fase)
Criação de produto e estratégia de comunicação - Chocapic Caramelo (2ª fase)Criação de produto e estratégia de comunicação - Chocapic Caramelo (2ª fase)
Criação de produto e estratégia de comunicação - Chocapic Caramelo (2ª fase)
 
Criação de produto e estratégia de comunicação - Chocapic Caramelo (1ª fase)
Criação de produto e estratégia de comunicação - Chocapic Caramelo (1ª fase)Criação de produto e estratégia de comunicação - Chocapic Caramelo (1ª fase)
Criação de produto e estratégia de comunicação - Chocapic Caramelo (1ª fase)
 
Campanha Eleitoral Juventude Marijuanita
Campanha Eleitoral Juventude MarijuanitaCampanha Eleitoral Juventude Marijuanita
Campanha Eleitoral Juventude Marijuanita
 
Cesário verde - Humilhações
Cesário verde - HumilhaçõesCesário verde - Humilhações
Cesário verde - Humilhações
 

Recently uploaded

Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
maazsz111
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 

Recently uploaded (20)

Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 

Cyber crime

  • 1. Work done by: André Cantarrilha, Carolina Pardal, Frederica Pinto, Mariana Costa, Tiago Felício 11th B Escola Profissional do Vale do Tejo Comunicação - Marketing, Relações Públicas e Publicidade English Teacher Inês Leitão
  • 2. Cyber Crime is a term for any illegal activity that uses a computer as it´s primary means of commission.
  • 3.
  • 4. Hackers are computer experts who spend enormous amounts of time trying to breach the security of networks, Web servers and email servers.
  • 5.  Movies  Games  Images  Musics  Works done
  • 6. We don’t agree with illegal downloads because the copyright should be respect.
  • 7. Yes, we usually do downloads of new songs, games, recent movies and images for schoolworks.
  • 8. Thank you for your attention!

Editor's Notes

  1. Mariana
  2. André
  3. Fred
  4. Mariana
  5. André
  6. Mariana
  7. Fred
  8. Fred