SlideShare a Scribd company logo
The aim of the next three learning coach sessions
• is to gain an understanding of the dangers when using technology to
communicate.
• be able to discuss the subject sensibly and responsibly.
• to know measures that can be taken to avoid the dangers.

The objectives of these sessions are to develop a deeper understanding of
the dangers of using technology to communicate and to produce an A3
poster detailing tips on how to stay safe when using technology.
Knowing the
              risks



Understanding
     the          Changing our
 technologies      behaviours
Somebody may get hold of your
                                   private details and misuse them.
                                                                       Viruses, malware, adware and
        Identity Theft.                                                          spyware.



                                                                       Cyber-bullying using various
Paedophiles using chat rooms or   What are the risks when              different technology; mobile
    other means to groom                                               phones, email, chat rooms &
         youngsters.                using technology?                     social networking sites.


                                                                       Copyright Law – illegal copying
    Indecent material being                                             and distributing of software,
         distributed.                                                    films, music and any other
                                     Sexting – the term given when                materials.
                                      someone sends a picture of
                                     themselves or explicit details.
Click on the link below to watch the video about identity theft




                        Identity Theft.




After watching the video, spend 5 minutes discussing the topic
and then write down some tips on how to avoid being a victim
of identity theft.
Click on the link below to watch the video about grooming



                   Paedophiles using chat rooms or
                       other means to groom
                            youngsters.



After watching the video, spend 5 minutes discussing the topic
and then write down some tips on how to avoid being a victim
within a chat room.
Click on the link below to watch the video about sexting



                   Sexting – the term given when
                    someone sends a picture of
                   themselves or explicit details.




After watching the video, spend 5 minutes discussing the topic
and then write down what advice you would give someone
about the topic
Click on the link below to watch the video about viruses.



                     Viruses, malware, adware and
                               spyware.




After watching the video, spend 5 minutes discussing the topic
and then write down what advice you would give someone
about the topic
Click on the link below to watch the video about copyright.


                     Copyright Law – illegal copying
                      and distributing of software,
                       films, music and any other
                                materials.



After watching the video, spend 5 minutes discussing the topic
and then write down what advice you would give someone
about the topic
After spending some time watching the videos,
        discussing and writing notes about the topics listed
        below you now need to work in small groups to create
        an A3 poster. The poster should explain the dangers and
        then give advice on how to avoid the dangers when
        using technology.


           Paedophiles using chat rooms or
                                                       Viruses, malware, adware and
               other means to groom
                                                                 spyware.
                    youngsters.



                                Sexting – the term given when
                                                                       Viruses, malware, adware and
Identity Theft.                  someone sends a picture of
                                                                                 spyware.
                                themselves or explicit details.
Present your posters to share how much you have
                       learnt about the different topics.

Take the quiz to find out what you have learnt about the
different topics.




                         Who wants to be a millionaire?

More Related Content

What's hot

L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
rowenick
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingtarab1133
 
Guillaume Lovet. Kibernetinių nusikaltimų daugėja: grėsmių įmonėms analizė
Guillaume Lovet. Kibernetinių nusikaltimų daugėja: grėsmių įmonėms analizėGuillaume Lovet. Kibernetinių nusikaltimų daugėja: grėsmių įmonėms analizė
Guillaume Lovet. Kibernetinių nusikaltimų daugėja: grėsmių įmonėms analizė
TEO LT, AB
 
An Underground education
An Underground educationAn Underground education
An Underground education
grugq
 
An Underground education
An Underground educationAn Underground education
An Underground educationgrugq
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internet
Maricrs Alfarö
 
Online safety
Online safetyOnline safety
Online safety
Jason Murray
 
Web Yourself Sew 2009
Web Yourself Sew 2009Web Yourself Sew 2009
Web Yourself Sew 2009Maegan.Slaten
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
EmmanuelaSernicul
 
Personal safety gr5 unit ppt
Personal safety gr5 unit pptPersonal safety gr5 unit ppt
Personal safety gr5 unit pptapieper
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And Kids
Sandra Fathi
 
My protection plan
My protection planMy protection plan
My protection plan
Shakena12
 
Internet safety slides
Internet safety slidesInternet safety slides
Internet safety slides
Eric Castro
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchers
vicenteDiaz_KL
 
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011Ben Woelk, CISSP, CPTC
 
Internet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersInternet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and Beginners
Rajesh Soundararajan
 
Cybersafety Version1
Cybersafety Version1Cybersafety Version1
Cybersafety Version1sabrinacotta
 
Online communication per 4
Online communication per 4Online communication per 4
Online communication per 4MsEisman
 
WALT be Cyber smart
WALT be Cyber smartWALT be Cyber smart
WALT be Cyber smartwiggit
 
Protection of privacy on the internet
Protection of privacy on the internetProtection of privacy on the internet
Protection of privacy on the internet
Lidija Kralj
 

What's hot (20)

L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Guillaume Lovet. Kibernetinių nusikaltimų daugėja: grėsmių įmonėms analizė
Guillaume Lovet. Kibernetinių nusikaltimų daugėja: grėsmių įmonėms analizėGuillaume Lovet. Kibernetinių nusikaltimų daugėja: grėsmių įmonėms analizė
Guillaume Lovet. Kibernetinių nusikaltimų daugėja: grėsmių įmonėms analizė
 
An Underground education
An Underground educationAn Underground education
An Underground education
 
An Underground education
An Underground educationAn Underground education
An Underground education
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internet
 
Online safety
Online safetyOnline safety
Online safety
 
Web Yourself Sew 2009
Web Yourself Sew 2009Web Yourself Sew 2009
Web Yourself Sew 2009
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
Personal safety gr5 unit ppt
Personal safety gr5 unit pptPersonal safety gr5 unit ppt
Personal safety gr5 unit ppt
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And Kids
 
My protection plan
My protection planMy protection plan
My protection plan
 
Internet safety slides
Internet safety slidesInternet safety slides
Internet safety slides
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchers
 
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
 
Internet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersInternet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and Beginners
 
Cybersafety Version1
Cybersafety Version1Cybersafety Version1
Cybersafety Version1
 
Online communication per 4
Online communication per 4Online communication per 4
Online communication per 4
 
WALT be Cyber smart
WALT be Cyber smartWALT be Cyber smart
WALT be Cyber smart
 
Protection of privacy on the internet
Protection of privacy on the internetProtection of privacy on the internet
Protection of privacy on the internet
 

Viewers also liked

3.pathway plan
3.pathway plan3.pathway plan
3.pathway planjacksoc19
 
Sport On T V
Sport On  T VSport On  T V
Sport On T Vjacksoc19
 
The hollywood studios 2
The hollywood studios 2The hollywood studios 2
The hollywood studios 2jacksoc19
 
Lcd y9 me and my future
Lcd y9   me and my futureLcd y9   me and my future
Lcd y9 me and my futurejacksoc19
 
Mainstrean and independent
Mainstrean and independentMainstrean and independent
Mainstrean and independentjacksoc19
 
The film industry outside of hollywood
The film industry outside of hollywoodThe film industry outside of hollywood
The film industry outside of hollywoodjacksoc19
 
Fowles !5 basic needs
Fowles  !5 basic needsFowles  !5 basic needs
Fowles !5 basic needsjacksoc19
 
Paradigma
ParadigmaParadigma
Jobs around us
Jobs around usJobs around us
Jobs around us
Prosv
 

Viewers also liked (9)

3.pathway plan
3.pathway plan3.pathway plan
3.pathway plan
 
Sport On T V
Sport On  T VSport On  T V
Sport On T V
 
The hollywood studios 2
The hollywood studios 2The hollywood studios 2
The hollywood studios 2
 
Lcd y9 me and my future
Lcd y9   me and my futureLcd y9   me and my future
Lcd y9 me and my future
 
Mainstrean and independent
Mainstrean and independentMainstrean and independent
Mainstrean and independent
 
The film industry outside of hollywood
The film industry outside of hollywoodThe film industry outside of hollywood
The film industry outside of hollywood
 
Fowles !5 basic needs
Fowles  !5 basic needsFowles  !5 basic needs
Fowles !5 basic needs
 
Paradigma
ParadigmaParadigma
Paradigma
 
Jobs around us
Jobs around usJobs around us
Jobs around us
 

Similar to E safety lc yr10&11[2]

Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
NoelBuctot1
 
Hacking And Virus.pptx
Hacking And Virus.pptxHacking And Virus.pptx
Hacking And Virus.pptx
sahilshah476001
 
online safety, security and rules of netiquette
online safety, security and rules of netiquetteonline safety, security and rules of netiquette
online safety, security and rules of netiquette
007rgmel
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
Saurav Jha
 
Expert spam research
 Expert  spam research Expert  spam research
Expert spam research
heidirobison
 
Microsoft protect ppt_ms_final
Microsoft protect ppt_ms_finalMicrosoft protect ppt_ms_final
Microsoft protect ppt_ms_final
21_zaheer
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)
John Bosco Javellana, MAEd.
 
Empowerment lesson 2.ppt
Empowerment lesson 2.pptEmpowerment lesson 2.ppt
Empowerment lesson 2.ppt
Andrew_Braza
 
Securityguide
SecurityguideSecurityguide
Securityguide
Oleg Kostyukevich
 
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjrpypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
SurajGurushetti
 
Deepfake Videos on the Rise: Examining the Alarming Concerns
Deepfake Videos on the Rise: Examining the Alarming ConcernsDeepfake Videos on the Rise: Examining the Alarming Concerns
Deepfake Videos on the Rise: Examining the Alarming Concerns
bluetroyvictorVinay
 
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfW3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
ExtremelyDarkness2
 
Rules of netiquette & cyber crimes
Rules of netiquette & cyber crimesRules of netiquette & cyber crimes
Rules of netiquette & cyber crimes
markgernale24
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
Jesus Rances
 
Legal, Ethical, and Societal Issues in Media and Information.pdf
Legal, Ethical, and Societal Issues in Media and Information.pdfLegal, Ethical, and Societal Issues in Media and Information.pdf
Legal, Ethical, and Societal Issues in Media and Information.pdf
kenneth218994
 
Digital citizenship project
Digital citizenship projectDigital citizenship project
Digital citizenship projectfig2381
 
Users guide
Users guideUsers guide
Users guide
Darren Thomas
 
Soft piracy
Soft piracySoft piracy
Soft piracy
Vibhor Raut
 
Cybersecurity Basics.pptx
Cybersecurity Basics.pptxCybersecurity Basics.pptx
Cybersecurity Basics.pptx
LineshiDharamraj1
 

Similar to E safety lc yr10&11[2] (20)

Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
Hacking And Virus.pptx
Hacking And Virus.pptxHacking And Virus.pptx
Hacking And Virus.pptx
 
online safety, security and rules of netiquette
online safety, security and rules of netiquetteonline safety, security and rules of netiquette
online safety, security and rules of netiquette
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
 
Expert spam research
 Expert  spam research Expert  spam research
Expert spam research
 
Microsoft protect ppt_ms_final
Microsoft protect ppt_ms_finalMicrosoft protect ppt_ms_final
Microsoft protect ppt_ms_final
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)
 
Empowerment lesson 2.ppt
Empowerment lesson 2.pptEmpowerment lesson 2.ppt
Empowerment lesson 2.ppt
 
Securityguide
SecurityguideSecurityguide
Securityguide
 
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjrpypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
 
Deepfake Videos on the Rise: Examining the Alarming Concerns
Deepfake Videos on the Rise: Examining the Alarming ConcernsDeepfake Videos on the Rise: Examining the Alarming Concerns
Deepfake Videos on the Rise: Examining the Alarming Concerns
 
Spyware
SpywareSpyware
Spyware
 
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfW3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
 
Rules of netiquette & cyber crimes
Rules of netiquette & cyber crimesRules of netiquette & cyber crimes
Rules of netiquette & cyber crimes
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Legal, Ethical, and Societal Issues in Media and Information.pdf
Legal, Ethical, and Societal Issues in Media and Information.pdfLegal, Ethical, and Societal Issues in Media and Information.pdf
Legal, Ethical, and Societal Issues in Media and Information.pdf
 
Digital citizenship project
Digital citizenship projectDigital citizenship project
Digital citizenship project
 
Users guide
Users guideUsers guide
Users guide
 
Soft piracy
Soft piracySoft piracy
Soft piracy
 
Cybersecurity Basics.pptx
Cybersecurity Basics.pptxCybersecurity Basics.pptx
Cybersecurity Basics.pptx
 

More from jacksoc19

The hollywood studios
The hollywood studiosThe hollywood studios
The hollywood studiosjacksoc19
 
Caption competition christmas activity
Caption competition christmas activityCaption competition christmas activity
Caption competition christmas activityjacksoc19
 
Making decisions lcd y9
Making decisions lcd y9Making decisions lcd y9
Making decisions lcd y9jacksoc19
 
Starter happy and successful
Starter   happy and successfulStarter   happy and successful
Starter happy and successfuljacksoc19
 
Independent learning year 9
Independent learning year 9Independent learning year 9
Independent learning year 9jacksoc19
 
Media jobs presentation
Media jobs presentationMedia jobs presentation
Media jobs presentationjacksoc19
 
The film industry
The film industryThe film industry
The film industryjacksoc19
 
Narrativeflip
NarrativeflipNarrativeflip
Narrativeflipjacksoc19
 
Onershiip and film
Onershiip and filmOnershiip and film
Onershiip and filmjacksoc19
 
Reps + music hce
Reps + music hceReps + music hce
Reps + music hcejacksoc19
 
Institutions tv
Institutions tvInstitutions tv
Institutions tvjacksoc19
 
Representation of violence in the media complete
Representation of violence in the media   completeRepresentation of violence in the media   complete
Representation of violence in the media completejacksoc19
 

More from jacksoc19 (20)

The hollywood studios
The hollywood studiosThe hollywood studios
The hollywood studios
 
Caption competition christmas activity
Caption competition christmas activityCaption competition christmas activity
Caption competition christmas activity
 
Making decisions lcd y9
Making decisions lcd y9Making decisions lcd y9
Making decisions lcd y9
 
Starter happy and successful
Starter   happy and successfulStarter   happy and successful
Starter happy and successful
 
Stereotypes
StereotypesStereotypes
Stereotypes
 
Independent learning year 9
Independent learning year 9Independent learning year 9
Independent learning year 9
 
Media jobs presentation
Media jobs presentationMedia jobs presentation
Media jobs presentation
 
Webshareeg
WebshareegWebshareeg
Webshareeg
 
The film industry
The film industryThe film industry
The film industry
 
Narrativeflip
NarrativeflipNarrativeflip
Narrativeflip
 
Job roles 1
Job roles 1Job roles 1
Job roles 1
 
Job roles
Job rolesJob roles
Job roles
 
Audience
AudienceAudience
Audience
 
Onershiip and film
Onershiip and filmOnershiip and film
Onershiip and film
 
Referencing
ReferencingReferencing
Referencing
 
Reps + music hce
Reps + music hceReps + music hce
Reps + music hce
 
Institutions tv
Institutions tvInstitutions tv
Institutions tv
 
Ben a
Ben aBen a
Ben a
 
Year 11
Year 11Year 11
Year 11
 
Representation of violence in the media complete
Representation of violence in the media   completeRepresentation of violence in the media   complete
Representation of violence in the media complete
 

Recently uploaded

How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 

Recently uploaded (20)

How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 

E safety lc yr10&11[2]

  • 1.
  • 2. The aim of the next three learning coach sessions • is to gain an understanding of the dangers when using technology to communicate. • be able to discuss the subject sensibly and responsibly. • to know measures that can be taken to avoid the dangers. The objectives of these sessions are to develop a deeper understanding of the dangers of using technology to communicate and to produce an A3 poster detailing tips on how to stay safe when using technology.
  • 3. Knowing the risks Understanding the Changing our technologies behaviours
  • 4. Somebody may get hold of your private details and misuse them. Viruses, malware, adware and Identity Theft. spyware. Cyber-bullying using various Paedophiles using chat rooms or What are the risks when different technology; mobile other means to groom phones, email, chat rooms & youngsters. using technology? social networking sites. Copyright Law – illegal copying Indecent material being and distributing of software, distributed. films, music and any other Sexting – the term given when materials. someone sends a picture of themselves or explicit details.
  • 5. Click on the link below to watch the video about identity theft Identity Theft. After watching the video, spend 5 minutes discussing the topic and then write down some tips on how to avoid being a victim of identity theft.
  • 6. Click on the link below to watch the video about grooming Paedophiles using chat rooms or other means to groom youngsters. After watching the video, spend 5 minutes discussing the topic and then write down some tips on how to avoid being a victim within a chat room.
  • 7. Click on the link below to watch the video about sexting Sexting – the term given when someone sends a picture of themselves or explicit details. After watching the video, spend 5 minutes discussing the topic and then write down what advice you would give someone about the topic
  • 8. Click on the link below to watch the video about viruses. Viruses, malware, adware and spyware. After watching the video, spend 5 minutes discussing the topic and then write down what advice you would give someone about the topic
  • 9. Click on the link below to watch the video about copyright. Copyright Law – illegal copying and distributing of software, films, music and any other materials. After watching the video, spend 5 minutes discussing the topic and then write down what advice you would give someone about the topic
  • 10. After spending some time watching the videos, discussing and writing notes about the topics listed below you now need to work in small groups to create an A3 poster. The poster should explain the dangers and then give advice on how to avoid the dangers when using technology. Paedophiles using chat rooms or Viruses, malware, adware and other means to groom spyware. youngsters. Sexting – the term given when Viruses, malware, adware and Identity Theft. someone sends a picture of spyware. themselves or explicit details.
  • 11. Present your posters to share how much you have learnt about the different topics. Take the quiz to find out what you have learnt about the different topics. Who wants to be a millionaire?

Editor's Notes

  1. When using digital technology, you need to make sure that you keep up to date with the changes in technology and understand the growing risks. When using digital technology make sure that you change your behaviour accordingly to ensure that you are not at risk.
  2. Ask students what they believe are the risks when using technology? See how many they come up with.
  3. Watch the video, discuss as a whole group and make notes
  4. Watch the video, discuss as a whole group and make notes
  5. Watch the video, discuss as a whole group and make notes
  6. Watch the video, discuss as a whole group and make notes
  7. Watch the video, discuss as a whole group and make notes