SlideShare a Scribd company logo
By: Tyneil Phillip
Digital citizenship is the use of
technology appropriately, what is
safe and not safe to do when
using technology (ECFS3003, Unit
2,2015).
Digital citizenship is important as
it allows you to get the best use
out of the internet while keeping
yourself and others safe (Digital
Education Revolution, n.d.).
*Do not post mean or rude pictures
or messages online
*Be nice to others
*Do not put personal information
about yourself online for strangers
to see
*Do not go into someone's
personal information online.
*Nor acquire music and movies
without paying for it (internet
piracy).
*Be safe when buying things you want online ( ask
a parent first)
*Do not talk to strangers or give
your information to people
you do not know online.
*Be careful of where you get
your information from and ask an adult for
assistance when doing projects.
*Do not leave your personal device
open and unattended for others to see
and access when you are not there.
*Be aware of unfamiliar websites that
may appear.
*Do not sit or hold a device too close to
your face when using it often.
Do not let technology and the use
of the internet consume all your
time make room for outdoor play
and spending time with your family
and friends.
In today’s society where children are
born into an age where the use of
technology is a common occurrence
and becomes a natural and active part
of their lives it is important to provide
them with the knowledge they need to
appropriately and effectively use
technology.
ECFS3003 Technology and the Young Child
(2015). Unit 2:Digital Citizenship.
[Essential reading]. UWI Open
Campus.
Digital education revolution. (n.d.). Digital
citizenship. Retrieved from
http://www.digitalcitizenship.nsw.edu
.au/PrimSplash/index.htm

More Related Content

What's hot

Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
Stephen Thomas, CISSP
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
SrijanMukhopadhyay1
 
Misuse of internet - ppt
Misuse of internet - pptMisuse of internet - ppt
Misuse of internet - ppt
Jincy24
 
The internet
The internetThe internet
The internet
Donna Luna
 
CYBER BULLYING IS A SERIOUS PROBLEM
CYBER BULLYING IS A SERIOUS PROBLEMCYBER BULLYING IS A SERIOUS PROBLEM
CYBER BULLYING IS A SERIOUS PROBLEMalbert5hanafi
 
DIGITAL LITERACY Steps to Becoming a Digital Citizen
DIGITAL LITERACY Steps to Becoming a Digital CitizenDIGITAL LITERACY Steps to Becoming a Digital Citizen
DIGITAL LITERACY Steps to Becoming a Digital Citizen
Carla Hayes
 
Internet censorship by ronak
Internet censorship by ronakInternet censorship by ronak
Internet censorship by ronak
Ronak Karanpuria
 
Piracy and infringement
Piracy and infringement Piracy and infringement
Piracy and infringement HHSome
 
Digital Citizenship Presentation
Digital Citizenship PresentationDigital Citizenship Presentation
Digital Citizenship Presentation
hjhteach
 
6 8 safety ppt final copy
6 8 safety ppt final copy6 8 safety ppt final copy
6 8 safety ppt final copymarkkreiter
 
Lesson 2 jerry dennis
Lesson 2 jerry dennisLesson 2 jerry dennis
Lesson 2 jerry dennis
densio123
 
Presentationtech2
Presentationtech2Presentationtech2
Presentationtech2guest0e1ade
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
InterMediaKT
 
Digiteen By Ibrahim Soltan
Digiteen By Ibrahim SoltanDigiteen By Ibrahim Soltan
Digiteen By Ibrahim Soltanibrahim
 
How to make your mobile phone safe from hackers
How to make your mobile phone safe from hackersHow to make your mobile phone safe from hackers
How to make your mobile phone safe from hackers
David Strom
 
Final cyberbullying1
Final cyberbullying1Final cyberbullying1
Final cyberbullying1
TexasQT
 
Final cyberbullying
Final cyberbullyingFinal cyberbullying
Final cyberbullying
TexasQT
 
A v cc
A v ccA v cc
A v cc
zoobs03
 
9 elements
9 elements9 elements
9 elementsJeordias
 

What's hot (20)

Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
 
Misuse of internet - ppt
Misuse of internet - pptMisuse of internet - ppt
Misuse of internet - ppt
 
The internet
The internetThe internet
The internet
 
CYBER BULLYING IS A SERIOUS PROBLEM
CYBER BULLYING IS A SERIOUS PROBLEMCYBER BULLYING IS A SERIOUS PROBLEM
CYBER BULLYING IS A SERIOUS PROBLEM
 
DIGITAL LITERACY Steps to Becoming a Digital Citizen
DIGITAL LITERACY Steps to Becoming a Digital CitizenDIGITAL LITERACY Steps to Becoming a Digital Citizen
DIGITAL LITERACY Steps to Becoming a Digital Citizen
 
Internet censorship by ronak
Internet censorship by ronakInternet censorship by ronak
Internet censorship by ronak
 
Piracy and infringement
Piracy and infringement Piracy and infringement
Piracy and infringement
 
Digital Citizenship Presentation
Digital Citizenship PresentationDigital Citizenship Presentation
Digital Citizenship Presentation
 
6 8 safety ppt final copy
6 8 safety ppt final copy6 8 safety ppt final copy
6 8 safety ppt final copy
 
Lesson 2 jerry dennis
Lesson 2 jerry dennisLesson 2 jerry dennis
Lesson 2 jerry dennis
 
Presentationtech2
Presentationtech2Presentationtech2
Presentationtech2
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Digiteen By Ibrahim Soltan
Digiteen By Ibrahim SoltanDigiteen By Ibrahim Soltan
Digiteen By Ibrahim Soltan
 
How to make your mobile phone safe from hackers
How to make your mobile phone safe from hackersHow to make your mobile phone safe from hackers
How to make your mobile phone safe from hackers
 
Final cyberbullying1
Final cyberbullying1Final cyberbullying1
Final cyberbullying1
 
Final cyberbullying
Final cyberbullyingFinal cyberbullying
Final cyberbullying
 
A v cc
A v ccA v cc
A v cc
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
9 elements
9 elements9 elements
9 elements
 

Viewers also liked

Mga Likas Na Yaman Ng Kanlurang Asya
Mga Likas Na Yaman Ng Kanlurang AsyaMga Likas Na Yaman Ng Kanlurang Asya
Mga Likas Na Yaman Ng Kanlurang Asya
Joyce Ann Lopez
 
Vector P – The paddle latch from Industrilas
Vector P – The paddle latch from IndustrilasVector P – The paddle latch from Industrilas
Vector P – The paddle latch from Industrilas
Albert Jagger
 
Sectoral policies of Russia in 'sanctions" war
Sectoral policies of Russia in 'sanctions" warSectoral policies of Russia in 'sanctions" war
Sectoral policies of Russia in 'sanctions" war
Dmitry Kirillov
 
ACO Based Routing and Euler Walks Routing of Solid Waste Management Transport...
ACO Based Routing and Euler Walks Routing of Solid Waste Management Transport...ACO Based Routing and Euler Walks Routing of Solid Waste Management Transport...
ACO Based Routing and Euler Walks Routing of Solid Waste Management Transport...
AM Publications
 
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEMRELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
AM Publications
 
Data Preparation for Assessing Impact of Climate Change on Groundwater Recharge
Data Preparation for Assessing Impact of Climate Change on Groundwater RechargeData Preparation for Assessing Impact of Climate Change on Groundwater Recharge
Data Preparation for Assessing Impact of Climate Change on Groundwater Recharge
AM Publications
 
West Podium EORM Safety Inspection 4-14-15
West Podium EORM Safety Inspection 4-14-15West Podium EORM Safety Inspection 4-14-15
West Podium EORM Safety Inspection 4-14-15Rick Sommerfeld
 
CM [013] Kung Fu
CM [013] Kung FuCM [013] Kung Fu
CM [013] Kung Fu
Stephen Kwong
 
Point Sum Average Peak Algorithm Detection of LTE
Point Sum Average Peak Algorithm Detection of LTEPoint Sum Average Peak Algorithm Detection of LTE
Point Sum Average Peak Algorithm Detection of LTE
AM Publications
 
An Investigation of the Interlayer Adhesion Strength in Deeper Layers of the ...
An Investigation of the Interlayer Adhesion Strength in Deeper Layers of the ...An Investigation of the Interlayer Adhesion Strength in Deeper Layers of the ...
An Investigation of the Interlayer Adhesion Strength in Deeper Layers of the ...
AM Publications
 
Paradise3magazine.doc
Paradise3magazine.docParadise3magazine.doc
Paradise3magazine.doc
annie steffi sydney
 
Pedal on the Pier
Pedal on the PierPedal on the Pier
Pedal on the Pier
Canyon Creek Summer Camp
 
Ortho conf
Ortho confOrtho conf
Matt Kapral Resume
Matt Kapral ResumeMatt Kapral Resume
Matt Kapral ResumeMatt Kapral
 
Analysis of Media Graphs and Significant Sense
Analysis of Media Graphs and Significant SenseAnalysis of Media Graphs and Significant Sense
Analysis of Media Graphs and Significant Sense
AM Publications
 

Viewers also liked (17)

Mga Likas Na Yaman Ng Kanlurang Asya
Mga Likas Na Yaman Ng Kanlurang AsyaMga Likas Na Yaman Ng Kanlurang Asya
Mga Likas Na Yaman Ng Kanlurang Asya
 
Vector P – The paddle latch from Industrilas
Vector P – The paddle latch from IndustrilasVector P – The paddle latch from Industrilas
Vector P – The paddle latch from Industrilas
 
Sectoral policies of Russia in 'sanctions" war
Sectoral policies of Russia in 'sanctions" warSectoral policies of Russia in 'sanctions" war
Sectoral policies of Russia in 'sanctions" war
 
ACO Based Routing and Euler Walks Routing of Solid Waste Management Transport...
ACO Based Routing and Euler Walks Routing of Solid Waste Management Transport...ACO Based Routing and Euler Walks Routing of Solid Waste Management Transport...
ACO Based Routing and Euler Walks Routing of Solid Waste Management Transport...
 
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEMRELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
 
Data Preparation for Assessing Impact of Climate Change on Groundwater Recharge
Data Preparation for Assessing Impact of Climate Change on Groundwater RechargeData Preparation for Assessing Impact of Climate Change on Groundwater Recharge
Data Preparation for Assessing Impact of Climate Change on Groundwater Recharge
 
Pradeep Dhakad Cv
Pradeep Dhakad CvPradeep Dhakad Cv
Pradeep Dhakad Cv
 
West Podium EORM Safety Inspection 4-14-15
West Podium EORM Safety Inspection 4-14-15West Podium EORM Safety Inspection 4-14-15
West Podium EORM Safety Inspection 4-14-15
 
CM [013] Kung Fu
CM [013] Kung FuCM [013] Kung Fu
CM [013] Kung Fu
 
Point Sum Average Peak Algorithm Detection of LTE
Point Sum Average Peak Algorithm Detection of LTEPoint Sum Average Peak Algorithm Detection of LTE
Point Sum Average Peak Algorithm Detection of LTE
 
An Investigation of the Interlayer Adhesion Strength in Deeper Layers of the ...
An Investigation of the Interlayer Adhesion Strength in Deeper Layers of the ...An Investigation of the Interlayer Adhesion Strength in Deeper Layers of the ...
An Investigation of the Interlayer Adhesion Strength in Deeper Layers of the ...
 
Paradise3magazine.doc
Paradise3magazine.docParadise3magazine.doc
Paradise3magazine.doc
 
Pedal on the Pier
Pedal on the PierPedal on the Pier
Pedal on the Pier
 
Ortho conf
Ortho confOrtho conf
Ortho conf
 
Matt Kapral Resume
Matt Kapral ResumeMatt Kapral Resume
Matt Kapral Resume
 
Analysis of Media Graphs and Significant Sense
Analysis of Media Graphs and Significant SenseAnalysis of Media Graphs and Significant Sense
Analysis of Media Graphs and Significant Sense
 
Need of Health Care At Home in India
Need of Health Care At Home in IndiaNeed of Health Care At Home in India
Need of Health Care At Home in India
 

Similar to Digital citizenship

Digital Citizenship2
Digital Citizenship2Digital Citizenship2
Digital Citizenship2groot83
 
Digital literacy
Digital literacyDigital literacy
Digital literacy
Amanda lee
 
Rules on the road to netique
Rules on the road to netiqueRules on the road to netique
Rules on the road to netiqueC_Warrick
 
InfraGard Cyber Tips: October, 2015
InfraGard Cyber Tips: October, 2015InfraGard Cyber Tips: October, 2015
InfraGard Cyber Tips: October, 2015
Ryan Renicker CFA
 
Presentationtech2
Presentationtech2Presentationtech2
Presentationtech2guest0e1ade
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
Simon McKenzie
 
Media presentation
Media presentationMedia presentation
Media presentation
Bayes11
 
How to protect yourself in e world?
How to protect yourself in e world? How to protect yourself in e world?
How to protect yourself in e world?
Dipak Parmar
 
Nour bassem 10 a
Nour bassem   10 aNour bassem   10 a
Nour bassem 10 a
Anumod E Nair
 
Your e image presentation 2
Your e image presentation 2Your e image presentation 2
Your e image presentation 2opiedog1
 
For schoolchildren1
For schoolchildren1For schoolchildren1
For schoolchildren1
Vinay Kumar
 
Digi teen
Digi teenDigi teen
Digi teen13aaa
 
cyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptxcyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptx
JoelGautham
 
Power point presentation digital citizenship
Power point presentation digital citizenshipPower point presentation digital citizenship
Power point presentation digital citizenship
Sharda Mohamed
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
RoshanMaharjan13
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_otherslisamholden
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_otherslisamholden
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_otherslisamholden
 
INTERNET SECUIRTY TIPS
INTERNET SECUIRTY TIPSINTERNET SECUIRTY TIPS
INTERNET SECUIRTY TIPS
Santosh Khadsare
 

Similar to Digital citizenship (20)

Digital Citizenship2
Digital Citizenship2Digital Citizenship2
Digital Citizenship2
 
Digital literacy
Digital literacyDigital literacy
Digital literacy
 
Rules on the road to netique
Rules on the road to netiqueRules on the road to netique
Rules on the road to netique
 
InfraGard Cyber Tips: October, 2015
InfraGard Cyber Tips: October, 2015InfraGard Cyber Tips: October, 2015
InfraGard Cyber Tips: October, 2015
 
Presentationtech2
Presentationtech2Presentationtech2
Presentationtech2
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Media presentation
Media presentationMedia presentation
Media presentation
 
How to protect yourself in e world?
How to protect yourself in e world? How to protect yourself in e world?
How to protect yourself in e world?
 
Nour bassem 10 a
Nour bassem   10 aNour bassem   10 a
Nour bassem 10 a
 
Your e image presentation 2
Your e image presentation 2Your e image presentation 2
Your e image presentation 2
 
For schoolchildren1
For schoolchildren1For schoolchildren1
For schoolchildren1
 
trial
trialtrial
trial
 
Digi teen
Digi teenDigi teen
Digi teen
 
cyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptxcyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptx
 
Power point presentation digital citizenship
Power point presentation digital citizenshipPower point presentation digital citizenship
Power point presentation digital citizenship
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
 
INTERNET SECUIRTY TIPS
INTERNET SECUIRTY TIPSINTERNET SECUIRTY TIPS
INTERNET SECUIRTY TIPS
 

Recently uploaded

Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
DhatriParmar
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 

Recently uploaded (20)

Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 

Digital citizenship

  • 2. Digital citizenship is the use of technology appropriately, what is safe and not safe to do when using technology (ECFS3003, Unit 2,2015).
  • 3. Digital citizenship is important as it allows you to get the best use out of the internet while keeping yourself and others safe (Digital Education Revolution, n.d.).
  • 4. *Do not post mean or rude pictures or messages online *Be nice to others *Do not put personal information about yourself online for strangers to see
  • 5. *Do not go into someone's personal information online. *Nor acquire music and movies without paying for it (internet piracy).
  • 6. *Be safe when buying things you want online ( ask a parent first) *Do not talk to strangers or give your information to people you do not know online. *Be careful of where you get your information from and ask an adult for assistance when doing projects.
  • 7. *Do not leave your personal device open and unattended for others to see and access when you are not there. *Be aware of unfamiliar websites that may appear. *Do not sit or hold a device too close to your face when using it often.
  • 8. Do not let technology and the use of the internet consume all your time make room for outdoor play and spending time with your family and friends.
  • 9. In today’s society where children are born into an age where the use of technology is a common occurrence and becomes a natural and active part of their lives it is important to provide them with the knowledge they need to appropriately and effectively use technology.
  • 10. ECFS3003 Technology and the Young Child (2015). Unit 2:Digital Citizenship. [Essential reading]. UWI Open Campus. Digital education revolution. (n.d.). Digital citizenship. Retrieved from http://www.digitalcitizenship.nsw.edu .au/PrimSplash/index.htm