SlideShare a Scribd company logo
• Digital Literacy is the ability to use modern day technologies
to find, evaluate, select and use information.
• It is also the ability to manipulate this kind of information
and data digitally.
• Schools all around the world are embracing this subject.
• It is necessary to have digital competence if you want to
make a good use of these technologies.
Video:
http://www.youtube.com/watch?v=FdEXijFXfD8
350000
300000
250000
200000
150000
100000
50000

0
123456

12345

123456789

Password
•By using such simple and obvious passwords you’re
putting in jeopardy your account(s).
• If you have a big digital footprint the danger is much
higher since there are more people aware of the existence
of your account.
•The act of not logging out also influences your e-safety. If
you forget to do this while using a public computer the
chances are that your account is going to be hacked.
•Digital footprint: all the traces a person leaves behind
about herself in a digital environment.
•Your digital footprint, no matter how small, is always very
hard to erase.
•The more accounts you have the bigger your digital
footprint is.
To use digital tools and technologies properly it is necessary to
know how to be safe while using them. This is e-safety. Most
sites on the Internet have security methods to protect your
privacy as well as modern anti-virus systems. But sometimes
this isn’t enough. Most people think a relatively simple
password will stop every hacker or malware out there. But they
soon find out that is not the case. According to recent studies
the number of accounts hacked that used Adobe encryption
were approximately 150 million!
Video: https://www.youtube.com/watch?v=bh20w33ptg0
• A digital citizen can be defined in only a few words, it´s
basically a person that uses the internet regularly and in
an effective way.
• A digital citizen makes use, very often, of information
technology, which is the application of computers to
manipulate, store, transmit and retrieve data, to engage
in politics government participation society among other
subjects.
• Bibliography
• http://christchurchprimaryschool.org/e-safety. (s.d.).
• http://cleach.wordpress.com/digital-literacy-in-yourclassroom/. (s.d.).
• http://writing.colostate.edu/help/account/logout.cfm. (s.d.).
• http://writingforelectronicmedia.wikispaces.com/Digital+Lite
racy. (s.d.).
• http://www.bubblews.com/news/349432-save-yourself-offacejacking. (s.d.).
• http://www.digitalcitizenship.net/. (s.d.).
• http://www.digitalfamilysummit.com/2012/safety-protectingyour-digital-footprint/. (s.d.).
• http://www.library.illinois.edu/diglit/definition.html. (s.d.).
• http://www.teachthought.com/technology/the-definition-ofdigital-citzenship/. (s.d.).
• http://www.youtube.com/watch?v=d5kW4pI_VQw. (s.d.).
• http://www.youtube.com/watch?v=X5ySocUyI7I. (s.d.).
• http://www.zdnet.com/blog/security/25-most-usedpasswords-revealed-is-yours-one-of-them/12427. (s.d.).
Work by:
Ali El-Zein No. 2
Eduardo Silva No. 13
João Pedro No. 17
Pedro Machado No. 23

More Related Content

What's hot

Help Desk Signage
Help Desk SignageHelp Desk Signage
Help Desk Signage
CMICHHELPDESK
 
Digital literacy
Digital literacyDigital literacy
Digital literacy
Educational Collaborators
 
Raising information security awareness
Raising information security awarenessRaising information security awareness
Raising information security awareness
Terranovatraining
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
Sadaf Walliyani
 
Digital citizenship andayah & rachel & emily
Digital citizenship  andayah & rachel & emilyDigital citizenship  andayah & rachel & emily
Digital citizenship andayah & rachel & emily
emily_ca
 
Module 5: Safety
Module 5: SafetyModule 5: Safety
Module 5: Safety
Karel Van Isacker
 
Technology[Advantages&Disadvantages]-ICT-Valderrama
Technology[Advantages&Disadvantages]-ICT-ValderramaTechnology[Advantages&Disadvantages]-ICT-Valderrama
Technology[Advantages&Disadvantages]-ICT-Valderrama
Norvi Grace Valderrama
 
Protect
ProtectProtect
Protect
Yamitza Rosas
 
Internet security
Internet securityInternet security
Internet security
Mohammed Adam
 
The need for effective information security awareness practices.
The need for effective information security awareness practices.The need for effective information security awareness practices.
The need for effective information security awareness practices.
CAS
 
Security and risk in a mobile world
Security and risk in a mobile worldSecurity and risk in a mobile world
Security and risk in a mobile world
Brian Katz
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
ICT Frame Magazine Pvt. Ltd.
 
Cyber security training
Cyber security trainingCyber security training
Cyber security training
Wilmington University
 
Digital Natives
Digital NativesDigital Natives
Digital Natives
guest5f798ca
 
E-Safety
E-SafetyE-Safety
Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...
Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...
Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...
Nicholas Davis
 
Biz miz io2 content for module 5
Biz miz io2 content for module 5Biz miz io2 content for module 5
Biz miz io2 content for module 5
EmanuelePristera
 
Information Security Awareness for everyone
Information Security Awareness for everyoneInformation Security Awareness for everyone
Information Security Awareness for everyone
Yasir Nafees
 
NHC Tips - Secure your ID Theft - By Bijay Acharya
NHC Tips - Secure your ID Theft - By Bijay AcharyaNHC Tips - Secure your ID Theft - By Bijay Acharya
NHC Tips - Secure your ID Theft - By Bijay Acharya
Bijay Acharya
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
Nader Alkeinay
 

What's hot (20)

Help Desk Signage
Help Desk SignageHelp Desk Signage
Help Desk Signage
 
Digital literacy
Digital literacyDigital literacy
Digital literacy
 
Raising information security awareness
Raising information security awarenessRaising information security awareness
Raising information security awareness
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Digital citizenship andayah & rachel & emily
Digital citizenship  andayah & rachel & emilyDigital citizenship  andayah & rachel & emily
Digital citizenship andayah & rachel & emily
 
Module 5: Safety
Module 5: SafetyModule 5: Safety
Module 5: Safety
 
Technology[Advantages&Disadvantages]-ICT-Valderrama
Technology[Advantages&Disadvantages]-ICT-ValderramaTechnology[Advantages&Disadvantages]-ICT-Valderrama
Technology[Advantages&Disadvantages]-ICT-Valderrama
 
Protect
ProtectProtect
Protect
 
Internet security
Internet securityInternet security
Internet security
 
The need for effective information security awareness practices.
The need for effective information security awareness practices.The need for effective information security awareness practices.
The need for effective information security awareness practices.
 
Security and risk in a mobile world
Security and risk in a mobile worldSecurity and risk in a mobile world
Security and risk in a mobile world
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Cyber security training
Cyber security trainingCyber security training
Cyber security training
 
Digital Natives
Digital NativesDigital Natives
Digital Natives
 
E-Safety
E-SafetyE-Safety
E-Safety
 
Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...
Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...
Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...
 
Biz miz io2 content for module 5
Biz miz io2 content for module 5Biz miz io2 content for module 5
Biz miz io2 content for module 5
 
Information Security Awareness for everyone
Information Security Awareness for everyoneInformation Security Awareness for everyone
Information Security Awareness for everyone
 
NHC Tips - Secure your ID Theft - By Bijay Acharya
NHC Tips - Secure your ID Theft - By Bijay AcharyaNHC Tips - Secure your ID Theft - By Bijay Acharya
NHC Tips - Secure your ID Theft - By Bijay Acharya
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
 

Viewers also liked

Talking turkeys2
Talking turkeys2Talking turkeys2
Talking turkeys2
Luísa Lima
 
Internet segura
Internet seguraInternet segura
Internet segura
Luísa Lima
 
Plagiarism and copyright
Plagiarism and copyrightPlagiarism and copyright
Plagiarism and copyright
Luísa Lima
 
A Cor
A Cor A Cor
A Cor
Luísa Lima
 
Internet safety eTwinning Multilateral seminar S. João da Madeira
Internet safety eTwinning Multilateral seminar S. João da MadeiraInternet safety eTwinning Multilateral seminar S. João da Madeira
Internet safety eTwinning Multilateral seminar S. João da Madeira
Luísa Lima
 
Sexting
SextingSexting
Sexting
Luísa Lima
 
Social Media - Netiquette
Social Media - NetiquetteSocial Media - Netiquette
Social Media - Netiquette
Elliot Ian Rivera
 
Ler, escrever e contar
Ler, escrever e contarLer, escrever e contar
Ler, escrever e contar
Luísa Lima
 

Viewers also liked (8)

Talking turkeys2
Talking turkeys2Talking turkeys2
Talking turkeys2
 
Internet segura
Internet seguraInternet segura
Internet segura
 
Plagiarism and copyright
Plagiarism and copyrightPlagiarism and copyright
Plagiarism and copyright
 
A Cor
A Cor A Cor
A Cor
 
Internet safety eTwinning Multilateral seminar S. João da Madeira
Internet safety eTwinning Multilateral seminar S. João da MadeiraInternet safety eTwinning Multilateral seminar S. João da Madeira
Internet safety eTwinning Multilateral seminar S. João da Madeira
 
Sexting
SextingSexting
Sexting
 
Social Media - Netiquette
Social Media - NetiquetteSocial Media - Netiquette
Social Media - Netiquette
 
Ler, escrever e contar
Ler, escrever e contarLer, escrever e contar
Ler, escrever e contar
 

Similar to Digital literacy

Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Commonwealth Telecommunications Organisation
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
OoXair
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
MansoorAhmed57263
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
Kazi Sarwar Hossain
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging Technologies
Smart Assessment
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging Technologies
Praveen Vackayil
 
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
TechSoup
 
Internal social networks
Internal social networksInternal social networks
Internal social networks
Prof. Jacques Folon (Ph.D)
 
Digital Security and Hygiene.pptx
Digital Security and Hygiene.pptxDigital Security and Hygiene.pptx
Digital Security and Hygiene.pptx
Ultimate Multimedia Consult
 
Judy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 PresentationJudy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 Presentation
Greater Cleveland PC Users Group
 
Cyber security
Cyber securityCyber security
Cyber security
Sannith Reddy
 
Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship pp
Katie Ward
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
Stephen Thomas, CISSP
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
Stephen Thomas, CISSP
 
IAll 2013 Conference
IAll 2013 ConferenceIAll 2013 Conference
IAll 2013 Conference
JoAnn Corley
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
apyn
 
Enhancing the User Experience with ​Smart Technologies
Enhancing the User Experience with ​Smart TechnologiesEnhancing the User Experience with ​Smart Technologies
Enhancing the User Experience with ​Smart Technologies
Justin Denton
 
Team black
Team blackTeam black
Team black
hetvi naik
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moima
Theko Moima
 
Secure Coding - Are we doing it wrong
Secure Coding - Are we doing it wrongSecure Coding - Are we doing it wrong
Secure Coding - Are we doing it wrong
bryns
 

Similar to Digital literacy (20)

Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging Technologies
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging Technologies
 
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
 
Internal social networks
Internal social networksInternal social networks
Internal social networks
 
Digital Security and Hygiene.pptx
Digital Security and Hygiene.pptxDigital Security and Hygiene.pptx
Digital Security and Hygiene.pptx
 
Judy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 PresentationJudy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 Presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship pp
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
IAll 2013 Conference
IAll 2013 ConferenceIAll 2013 Conference
IAll 2013 Conference
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
 
Enhancing the User Experience with ​Smart Technologies
Enhancing the User Experience with ​Smart TechnologiesEnhancing the User Experience with ​Smart Technologies
Enhancing the User Experience with ​Smart Technologies
 
Team black
Team blackTeam black
Team black
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moima
 
Secure Coding - Are we doing it wrong
Secure Coding - Are we doing it wrongSecure Coding - Are we doing it wrong
Secure Coding - Are we doing it wrong
 

More from Luísa Lima

Projeto besafe
Projeto  besafeProjeto  besafe
Projeto besafe
Luísa Lima
 
Kahoot socrative plickers
Kahoot socrative plickersKahoot socrative plickers
Kahoot socrative plickers
Luísa Lima
 
Your online habits
Your online habitsYour online habits
Your online habits
Luísa Lima
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Luísa Lima
 
Information overload and search techniques
Information overload and search techniquesInformation overload and search techniques
Information overload and search techniques
Luísa Lima
 
Segurança na internet
Segurança na internetSegurança na internet
Segurança na internet
Luísa Lima
 
Madness
MadnessMadness
Madness
Luísa Lima
 
The daily hay
The daily hayThe daily hay
The daily hay
Luísa Lima
 

More from Luísa Lima (11)

Projeto besafe
Projeto  besafeProjeto  besafe
Projeto besafe
 
Kahoot socrative plickers
Kahoot socrative plickersKahoot socrative plickers
Kahoot socrative plickers
 
Your online habits
Your online habitsYour online habits
Your online habits
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Information overload and search techniques
Information overload and search techniquesInformation overload and search techniques
Information overload and search techniques
 
Segurança na internet
Segurança na internetSegurança na internet
Segurança na internet
 
Talking turkeys
Talking turkeysTalking turkeys
Talking turkeys
 
Cube creator
Cube creatorCube creator
Cube creator
 
Slampenzu
SlampenzuSlampenzu
Slampenzu
 
Madness
MadnessMadness
Madness
 
The daily hay
The daily hayThe daily hay
The daily hay
 

Recently uploaded

RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
zuzanka
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
Prof. Dr. K. Adisesha
 
CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
blueshagoo1
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
danielkiash986
 
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptxContiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Kalna College
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
indexPub
 
How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17
Celine George
 
skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
Mohammad Al-Dhahabi
 
Skimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S EliotSkimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S Eliot
nitinpv4ai
 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
Kalna College
 
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxxSimple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
RandolphRadicy
 
Observational Learning
Observational Learning Observational Learning
Observational Learning
sanamushtaq922
 
Creative Restart 2024: Mike Martin - Finding a way around “no”
Creative Restart 2024: Mike Martin - Finding a way around “no”Creative Restart 2024: Mike Martin - Finding a way around “no”
Creative Restart 2024: Mike Martin - Finding a way around “no”
Taste
 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Henry Hollis
 
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGHKHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
shreyassri1208
 
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
Payaamvohra1
 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
TechSoup
 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
nitinpv4ai
 
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT KanpurDiversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
Quiz Club IIT Kanpur
 
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapitolTechU
 

Recently uploaded (20)

RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
 
CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
 
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptxContiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptx
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
 
How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17
 
skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
 
Skimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S EliotSkimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S Eliot
 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
 
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxxSimple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
 
Observational Learning
Observational Learning Observational Learning
Observational Learning
 
Creative Restart 2024: Mike Martin - Finding a way around “no”
Creative Restart 2024: Mike Martin - Finding a way around “no”Creative Restart 2024: Mike Martin - Finding a way around “no”
Creative Restart 2024: Mike Martin - Finding a way around “no”
 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
 
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGHKHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
 
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
 
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT KanpurDiversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
 
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
 

Digital literacy

  • 1.
  • 2.
  • 3. • Digital Literacy is the ability to use modern day technologies to find, evaluate, select and use information. • It is also the ability to manipulate this kind of information and data digitally. • Schools all around the world are embracing this subject. • It is necessary to have digital competence if you want to make a good use of these technologies.
  • 5.
  • 7. •By using such simple and obvious passwords you’re putting in jeopardy your account(s). • If you have a big digital footprint the danger is much higher since there are more people aware of the existence of your account. •The act of not logging out also influences your e-safety. If you forget to do this while using a public computer the chances are that your account is going to be hacked.
  • 8. •Digital footprint: all the traces a person leaves behind about herself in a digital environment. •Your digital footprint, no matter how small, is always very hard to erase. •The more accounts you have the bigger your digital footprint is.
  • 9.
  • 10. To use digital tools and technologies properly it is necessary to know how to be safe while using them. This is e-safety. Most sites on the Internet have security methods to protect your privacy as well as modern anti-virus systems. But sometimes this isn’t enough. Most people think a relatively simple password will stop every hacker or malware out there. But they soon find out that is not the case. According to recent studies the number of accounts hacked that used Adobe encryption were approximately 150 million!
  • 12.
  • 13. • A digital citizen can be defined in only a few words, it´s basically a person that uses the internet regularly and in an effective way. • A digital citizen makes use, very often, of information technology, which is the application of computers to manipulate, store, transmit and retrieve data, to engage in politics government participation society among other subjects.
  • 14. • Bibliography • http://christchurchprimaryschool.org/e-safety. (s.d.). • http://cleach.wordpress.com/digital-literacy-in-yourclassroom/. (s.d.). • http://writing.colostate.edu/help/account/logout.cfm. (s.d.). • http://writingforelectronicmedia.wikispaces.com/Digital+Lite racy. (s.d.). • http://www.bubblews.com/news/349432-save-yourself-offacejacking. (s.d.). • http://www.digitalcitizenship.net/. (s.d.). • http://www.digitalfamilysummit.com/2012/safety-protectingyour-digital-footprint/. (s.d.). • http://www.library.illinois.edu/diglit/definition.html. (s.d.). • http://www.teachthought.com/technology/the-definition-ofdigital-citzenship/. (s.d.). • http://www.youtube.com/watch?v=d5kW4pI_VQw. (s.d.). • http://www.youtube.com/watch?v=X5ySocUyI7I. (s.d.). • http://www.zdnet.com/blog/security/25-most-usedpasswords-revealed-is-yours-one-of-them/12427. (s.d.).
  • 15. Work by: Ali El-Zein No. 2 Eduardo Silva No. 13 João Pedro No. 17 Pedro Machado No. 23