SlideShare a Scribd company logo
1 of 13
Safety
Made by :
Kabir Adhikari
Password Protection
Cyberbullying
Plagiarism and Copyright Protection
Search Engines
Password Protection
Page 1/2
Home
What is a Password and why it should be protected? Insert one picture
Password is a pin,pattern,words, fingerprint or facelock used to keep
our device’s information protected from external sources.
Password protection is vital to prevent unauthorized access and
secure sensitive information, guarding against potential identity theft and
privacy breaches.
Password Protection
Page 2/2
Home
Differentiate weak passwords and strong passwords in a given table.
Weak Passwords Strong Passwords
A weak password is simple and short. Strong password is complex and lengthy
A weak password is easy to guess. A strong password or pin is not easy to guess.
Weak passwords contain dictionary words and
phrases, making them more susceptible to
dictionary attacks.
Weak passwords contain dictionary words and
phrases, making them more susceptible to
dictionary attacks
Search Engines
Page 1/2
Home
What is Search Engines ? write its 3 Significance. Insert 3 pictures.
Ans :A search engine is a software program that helps people find the
information they are looking for online using keywords or phrases. A
search engine is a software program that helps people find the
information they are looking for online using keywords or
phrases. Search engines are able to return results quickly—even with
millions of websites online—by scanning the Internet continuously and
indexing every page they find.
Search Engines
Page 2/2
Home
Compare three different search engines of your choice.
Google is a brand with various tools that merge with
search and search engines.
Bing is a search engine that uses a few search modules.
Yahoo, or Yahoo.com, is a web services provider that
offers both a search engine and a directory of World
Wide Web pages organized in a hierarchy of topic
categories.
Plagiarism and Copyright Protection
Page 1/2
Home
Explanation of plagiarism in points with suitable pictures.
Plagiarism and Copyright Protection
Page 2/2
Home
Explanation of Copyright Protection in points with suitable pictures.
1. Copyright protects original works automatically.
2. Exclusive rights include reproduction, distribution, performance, display,
and derivative creation.
3. Duration varies, typically lasting the creator's lifetime plus years.
4. No formal registration required but advisable for additional benefits.
5. Fair use allows limited use without permission for specific purposes.
Cyberbullying
Page 1/2
Home
Explanation of Cyberbullying in points with suitable pictures
1. Definition: Cyberbullying involves using electronic communication to harass or intimidate others.
2. Anonymity: Perpetrators can hide behind online personas, making it difficult for victims to identify
them.
3. Scope: Cyberbullying has a wide-reaching impact, as harmful content can quickly spread online.
4. Types: It can manifest through harassment, rumors, impersonation, doxxing, exclusion, and explicit
content sharing.
5. Impact: Victims may experience emotional distress, anxiety, depression, and long-term psychological
effects.
Cyberbullying
Page 2/2
Home
List of Practical points to help kids stay safe from Cyberbullying. Include
pictures.
1. Treat others online with respect and kindness.
2. Tell a trusted adult if you experience or witness cyber bullying.
3. Use strong passwords, don't share personal info, and ask for help if something feels wrong.
4 Stress the importance of keeping personal information private and only interacting with people they
know in real life.
5. Make sure they know it's okay to ask for help from parents, teachers, or other trusted adults if they ever
feel uncomfortable or threatened online.
6. Instill the habit of thinking before posting or commenting online to avoid unintentionally hurting
someone's feelings.
Fill up these questions as well
• 1. Introduction:
• a. Give a short overview of what your project is about ?
• = This project is about safety.
• = There are 4 titles in this project.
• =Cyber bullying , plagiarism and copyright , Password protection and search engine
• 2. Objective:
• a. what is the objective of this project?
• = We will learn new things.
• = We will be careful from cyber bullying and copyright.
• = We will learn basic skills to navigate the digital world safely.
• 3. Procedure:
• c. How did you do your project? Explain . Can also add screenshots and
other resources for a clearer explanation.
• = through researches
• =through internet
• =through elderly help
• =through own knowledge
• 4. Findings:
• a. While doing the project what did you learn, how did you feel doing the
project in power point? Can also add screenshots and other resources for
a clearer result.
• =while doing the project I learned about cyber security and copyright and
also learned about the use of powerpoint.
• =I felt excited while doing the project in powerpoint.
• 5. Conclusion:
• A. write a conclusion in one sentence about the project.
• = Hence, using strong passwords, being smart with search engines,
not copying others' work, respecting copyrights, and being kind
online all help make the internet a safer and better place for
everyone.
Thank you

More Related Content

Similar to cyberbullying presentation by class 4 student

Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxNoelBuctot1
 
Cyber Safety Class 4 Computers Worksheet.pdf
Cyber Safety Class 4 Computers Worksheet.pdfCyber Safety Class 4 Computers Worksheet.pdf
Cyber Safety Class 4 Computers Worksheet.pdfTakshila Learning
 
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjrpypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjrSurajGurushetti
 
Staying safe on the internet
Staying safe on the internetStaying safe on the internet
Staying safe on the internetArthur Landry
 
Computer Science – societal impact.pptx
Computer Science – societal impact.pptxComputer Science – societal impact.pptx
Computer Science – societal impact.pptxNano894860
 
L2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxL2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxSheenaAFuentes
 
L2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxL2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxsheena711714
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquetterowenick
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquetterowenick
 
E-Tech L2 Rules of Netiquette.pptx
E-Tech L2 Rules of Netiquette.pptxE-Tech L2 Rules of Netiquette.pptx
E-Tech L2 Rules of Netiquette.pptxLeah Condina
 
Concept-And-Scope-of-Ethical-Hacking.pptx
Concept-And-Scope-of-Ethical-Hacking.pptxConcept-And-Scope-of-Ethical-Hacking.pptx
Concept-And-Scope-of-Ethical-Hacking.pptxVaibhavYadav297587
 
Concept-And-Scope-of-Ethical-Hacking.pptx
Concept-And-Scope-of-Ethical-Hacking.pptxConcept-And-Scope-of-Ethical-Hacking.pptx
Concept-And-Scope-of-Ethical-Hacking.pptxNarangYadav
 
L1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdfL1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdfJeth Cuenco
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxMdRuga
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxMustafa Amiri
 

Similar to cyberbullying presentation by class 4 student (20)

Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Cybersecurity Basics.pptx
Cybersecurity Basics.pptxCybersecurity Basics.pptx
Cybersecurity Basics.pptx
 
Cyber Safety Class 4 Computers Worksheet.pdf
Cyber Safety Class 4 Computers Worksheet.pdfCyber Safety Class 4 Computers Worksheet.pdf
Cyber Safety Class 4 Computers Worksheet.pdf
 
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjrpypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
 
Staying safe on the internet
Staying safe on the internetStaying safe on the internet
Staying safe on the internet
 
Computer Science – societal impact.pptx
Computer Science – societal impact.pptxComputer Science – societal impact.pptx
Computer Science – societal impact.pptx
 
L2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxL2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptx
 
L2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxL2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptx
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
E-Tech L2 Rules of Netiquette.pptx
E-Tech L2 Rules of Netiquette.pptxE-Tech L2 Rules of Netiquette.pptx
E-Tech L2 Rules of Netiquette.pptx
 
Cyber Ethics
Cyber Ethics  Cyber Ethics
Cyber Ethics
 
Concept-And-Scope-of-Ethical-Hacking.pptx
Concept-And-Scope-of-Ethical-Hacking.pptxConcept-And-Scope-of-Ethical-Hacking.pptx
Concept-And-Scope-of-Ethical-Hacking.pptx
 
Concept-And-Scope-of-Ethical-Hacking.pptx
Concept-And-Scope-of-Ethical-Hacking.pptxConcept-And-Scope-of-Ethical-Hacking.pptx
Concept-And-Scope-of-Ethical-Hacking.pptx
 
Darknet (ec)
Darknet (ec) Darknet (ec)
Darknet (ec)
 
L1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdfL1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdf
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
 

Recently uploaded

'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneCall girls in Ahmedabad High profile
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 

Recently uploaded (20)

'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 

cyberbullying presentation by class 4 student

  • 1. Safety Made by : Kabir Adhikari Password Protection Cyberbullying Plagiarism and Copyright Protection Search Engines
  • 2. Password Protection Page 1/2 Home What is a Password and why it should be protected? Insert one picture Password is a pin,pattern,words, fingerprint or facelock used to keep our device’s information protected from external sources. Password protection is vital to prevent unauthorized access and secure sensitive information, guarding against potential identity theft and privacy breaches.
  • 3. Password Protection Page 2/2 Home Differentiate weak passwords and strong passwords in a given table. Weak Passwords Strong Passwords A weak password is simple and short. Strong password is complex and lengthy A weak password is easy to guess. A strong password or pin is not easy to guess. Weak passwords contain dictionary words and phrases, making them more susceptible to dictionary attacks. Weak passwords contain dictionary words and phrases, making them more susceptible to dictionary attacks
  • 4. Search Engines Page 1/2 Home What is Search Engines ? write its 3 Significance. Insert 3 pictures. Ans :A search engine is a software program that helps people find the information they are looking for online using keywords or phrases. A search engine is a software program that helps people find the information they are looking for online using keywords or phrases. Search engines are able to return results quickly—even with millions of websites online—by scanning the Internet continuously and indexing every page they find.
  • 5. Search Engines Page 2/2 Home Compare three different search engines of your choice. Google is a brand with various tools that merge with search and search engines. Bing is a search engine that uses a few search modules. Yahoo, or Yahoo.com, is a web services provider that offers both a search engine and a directory of World Wide Web pages organized in a hierarchy of topic categories.
  • 6. Plagiarism and Copyright Protection Page 1/2 Home Explanation of plagiarism in points with suitable pictures.
  • 7. Plagiarism and Copyright Protection Page 2/2 Home Explanation of Copyright Protection in points with suitable pictures. 1. Copyright protects original works automatically. 2. Exclusive rights include reproduction, distribution, performance, display, and derivative creation. 3. Duration varies, typically lasting the creator's lifetime plus years. 4. No formal registration required but advisable for additional benefits. 5. Fair use allows limited use without permission for specific purposes.
  • 8. Cyberbullying Page 1/2 Home Explanation of Cyberbullying in points with suitable pictures 1. Definition: Cyberbullying involves using electronic communication to harass or intimidate others. 2. Anonymity: Perpetrators can hide behind online personas, making it difficult for victims to identify them. 3. Scope: Cyberbullying has a wide-reaching impact, as harmful content can quickly spread online. 4. Types: It can manifest through harassment, rumors, impersonation, doxxing, exclusion, and explicit content sharing. 5. Impact: Victims may experience emotional distress, anxiety, depression, and long-term psychological effects.
  • 9. Cyberbullying Page 2/2 Home List of Practical points to help kids stay safe from Cyberbullying. Include pictures. 1. Treat others online with respect and kindness. 2. Tell a trusted adult if you experience or witness cyber bullying. 3. Use strong passwords, don't share personal info, and ask for help if something feels wrong. 4 Stress the importance of keeping personal information private and only interacting with people they know in real life. 5. Make sure they know it's okay to ask for help from parents, teachers, or other trusted adults if they ever feel uncomfortable or threatened online. 6. Instill the habit of thinking before posting or commenting online to avoid unintentionally hurting someone's feelings.
  • 10. Fill up these questions as well • 1. Introduction: • a. Give a short overview of what your project is about ? • = This project is about safety. • = There are 4 titles in this project. • =Cyber bullying , plagiarism and copyright , Password protection and search engine • 2. Objective: • a. what is the objective of this project? • = We will learn new things. • = We will be careful from cyber bullying and copyright. • = We will learn basic skills to navigate the digital world safely.
  • 11. • 3. Procedure: • c. How did you do your project? Explain . Can also add screenshots and other resources for a clearer explanation. • = through researches • =through internet • =through elderly help • =through own knowledge • 4. Findings: • a. While doing the project what did you learn, how did you feel doing the project in power point? Can also add screenshots and other resources for a clearer result. • =while doing the project I learned about cyber security and copyright and also learned about the use of powerpoint. • =I felt excited while doing the project in powerpoint.
  • 12. • 5. Conclusion: • A. write a conclusion in one sentence about the project. • = Hence, using strong passwords, being smart with search engines, not copying others' work, respecting copyrights, and being kind online all help make the internet a safer and better place for everyone.