Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
cyberbullying presentation by class 4 student
1. Safety
Made by :
Kabir Adhikari
Password Protection
Cyberbullying
Plagiarism and Copyright Protection
Search Engines
2. Password Protection
Page 1/2
Home
What is a Password and why it should be protected? Insert one picture
Password is a pin,pattern,words, fingerprint or facelock used to keep
our device’s information protected from external sources.
Password protection is vital to prevent unauthorized access and
secure sensitive information, guarding against potential identity theft and
privacy breaches.
3. Password Protection
Page 2/2
Home
Differentiate weak passwords and strong passwords in a given table.
Weak Passwords Strong Passwords
A weak password is simple and short. Strong password is complex and lengthy
A weak password is easy to guess. A strong password or pin is not easy to guess.
Weak passwords contain dictionary words and
phrases, making them more susceptible to
dictionary attacks.
Weak passwords contain dictionary words and
phrases, making them more susceptible to
dictionary attacks
4. Search Engines
Page 1/2
Home
What is Search Engines ? write its 3 Significance. Insert 3 pictures.
Ans :A search engine is a software program that helps people find the
information they are looking for online using keywords or phrases. A
search engine is a software program that helps people find the
information they are looking for online using keywords or
phrases. Search engines are able to return results quickly—even with
millions of websites online—by scanning the Internet continuously and
indexing every page they find.
5. Search Engines
Page 2/2
Home
Compare three different search engines of your choice.
Google is a brand with various tools that merge with
search and search engines.
Bing is a search engine that uses a few search modules.
Yahoo, or Yahoo.com, is a web services provider that
offers both a search engine and a directory of World
Wide Web pages organized in a hierarchy of topic
categories.
6. Plagiarism and Copyright Protection
Page 1/2
Home
Explanation of plagiarism in points with suitable pictures.
7. Plagiarism and Copyright Protection
Page 2/2
Home
Explanation of Copyright Protection in points with suitable pictures.
1. Copyright protects original works automatically.
2. Exclusive rights include reproduction, distribution, performance, display,
and derivative creation.
3. Duration varies, typically lasting the creator's lifetime plus years.
4. No formal registration required but advisable for additional benefits.
5. Fair use allows limited use without permission for specific purposes.
8. Cyberbullying
Page 1/2
Home
Explanation of Cyberbullying in points with suitable pictures
1. Definition: Cyberbullying involves using electronic communication to harass or intimidate others.
2. Anonymity: Perpetrators can hide behind online personas, making it difficult for victims to identify
them.
3. Scope: Cyberbullying has a wide-reaching impact, as harmful content can quickly spread online.
4. Types: It can manifest through harassment, rumors, impersonation, doxxing, exclusion, and explicit
content sharing.
5. Impact: Victims may experience emotional distress, anxiety, depression, and long-term psychological
effects.
9. Cyberbullying
Page 2/2
Home
List of Practical points to help kids stay safe from Cyberbullying. Include
pictures.
1. Treat others online with respect and kindness.
2. Tell a trusted adult if you experience or witness cyber bullying.
3. Use strong passwords, don't share personal info, and ask for help if something feels wrong.
4 Stress the importance of keeping personal information private and only interacting with people they
know in real life.
5. Make sure they know it's okay to ask for help from parents, teachers, or other trusted adults if they ever
feel uncomfortable or threatened online.
6. Instill the habit of thinking before posting or commenting online to avoid unintentionally hurting
someone's feelings.
10. Fill up these questions as well
• 1. Introduction:
• a. Give a short overview of what your project is about ?
• = This project is about safety.
• = There are 4 titles in this project.
• =Cyber bullying , plagiarism and copyright , Password protection and search engine
• 2. Objective:
• a. what is the objective of this project?
• = We will learn new things.
• = We will be careful from cyber bullying and copyright.
• = We will learn basic skills to navigate the digital world safely.
11. • 3. Procedure:
• c. How did you do your project? Explain . Can also add screenshots and
other resources for a clearer explanation.
• = through researches
• =through internet
• =through elderly help
• =through own knowledge
• 4. Findings:
• a. While doing the project what did you learn, how did you feel doing the
project in power point? Can also add screenshots and other resources for
a clearer result.
• =while doing the project I learned about cyber security and copyright and
also learned about the use of powerpoint.
• =I felt excited while doing the project in powerpoint.
12. • 5. Conclusion:
• A. write a conclusion in one sentence about the project.
• = Hence, using strong passwords, being smart with search engines,
not copying others' work, respecting copyrights, and being kind
online all help make the internet a safer and better place for
everyone.