SlideShare a Scribd company logo
01/27/15 Linda Rush - Notre Dame School
Internet Netiquette & Safety
• Never use the
Internet without
adult supervision.
• Never drink or eat at
a computer. Food
and drinks can
damage the
keyboard take care
of your computer
and keep it clean.
• Never use bad
language or write
hateful things about
another person.
• Never share your
password, keep
your password a
secret*******.
• Never give out
information, such as
your name, address,
telephone number,
school name or a
friend's name
• Never download
files or programs
without permission
from an adult. They
can contain viruses
or programs that
can harm your
computer.
• Do not open or click
on banners or
advertisements and
if one pops open,
click the X to close
it.
• Do not put a magnet
near your
computer's CPU this
can damage the
computer.
• Be careful handling
floppy disks, do not
play with the mental
clip this can damage
the disk
• Always use the CD-
ROM button to open
and close the CD-
ROM drive pushing
on the door can
damage it.
• Always share your
Internet knowledge
with others.
• Never respond to a
message that makes
you feel confused or
uncomfortable, tell
your teacher or
parent if you come
across any
information online
that makes you feel
uncomfortable.
• Be careful
downloading files or
programs. They can
contain viruses that
can harm your
computer
• Never agree to go
meet a person you
have met online.
You should know
everyone on your
buddy list.
• Never send your
picture to a person
you have met online.
• Remember
Spammers collect
screen names in
chat rooms.
• Do not forward
email without the
author's
permission.
• Tell your teacher or
parent if you come
across any
information online
that makes you feel
uncomfortable.
• Never use a
computer to steal or
destroy computers,
files or programs.
• Keep your email
messages short and
to the point and
always include a
subject line.
• Do not criticize
anyone online.
(Netiquette)
• Capital letters
means that you are
shouting.
(Netiquette)
• Never open an email
from a sender you
do not know
especially if it has
an attachment. This
could be a virus.
• Email Attachments
can contain
computer viruses be
careful before you
open them. You can
scan attachments
for viruses.
• Delete suspicious
email do not open
them and then
empty your deleted
folder.
• Look for the security
lock on the taskbar
before entering
private information
into the computer.
Credits
• http://bcsberlin.k12.nj.us/CPUsite/Computers/index.h
• Slim Goodbody. "Math Monsters: Computers."
unitedstreaming.
http://www.unitedstreaming.com/
– Real World Examples: Using the Internet
Other Resources
• Scholastic. "Magic School Bus Gets Programmed,
The."
unitedstreaming. http://www.unitedstreaming.com/
• http://www.brainpop.com/technology/computers/internet/
• http://www.brainpop.com/socialstudies/currentevents/o
nlinesafety/

More Related Content

What's hot

Digital+safety+powerpoint
Digital+safety+powerpointDigital+safety+powerpoint
Digital+safety+powerpoint
Andrew Duckworth
 
Angelique s Do Something Project
Angelique s Do Something ProjectAngelique s Do Something Project
Angelique s Do Something Project
jtiggs
 
Internet safety
Internet safety Internet safety
Internet safety
bhavya mohindru
 
Internet safety
Internet safetyInternet safety
Internet safety
Aleksandra Brmbota
 
Internet safety for kids
Internet safety for kidsInternet safety for kids
Internet safety for kids
International School Manila Elementary
 
Using the internet safely
Using the internet safelyUsing the internet safely
Using the internet safely
insightmentors
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
SearchLock
 
Internet safety update
Internet safety updateInternet safety update
Internet safety update
14071828
 
Pupil esafety
Pupil esafetyPupil esafety
Pupil esafety
Katherine Lyddon
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
jacob_denver
 
Instant Messaging Chat Room Saftey Afnan, Hussam
Instant Messaging Chat Room Saftey   Afnan, HussamInstant Messaging Chat Room Saftey   Afnan, Hussam
Instant Messaging Chat Room Saftey Afnan, Hussam
guest40f537
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
reshmimohanan
 
Internet safety
Internet safetyInternet safety
Internet safety
dsansford
 
Lesson 2 jerry dennis
Lesson 2 jerry dennisLesson 2 jerry dennis
Lesson 2 jerry dennis
densio123
 
Surfer Dude
Surfer DudeSurfer Dude
Surfer Dude
guest800498
 
Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For Educators
Maria Petropulos
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
mstenorio
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
mstenorio
 
Nour bassem 10 a
Nour bassem   10 aNour bassem   10 a
Nour bassem 10 a
Anumod E Nair
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
Leelet1121
 

What's hot (20)

Digital+safety+powerpoint
Digital+safety+powerpointDigital+safety+powerpoint
Digital+safety+powerpoint
 
Angelique s Do Something Project
Angelique s Do Something ProjectAngelique s Do Something Project
Angelique s Do Something Project
 
Internet safety
Internet safety Internet safety
Internet safety
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet safety for kids
Internet safety for kidsInternet safety for kids
Internet safety for kids
 
Using the internet safely
Using the internet safelyUsing the internet safely
Using the internet safely
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
 
Internet safety update
Internet safety updateInternet safety update
Internet safety update
 
Pupil esafety
Pupil esafetyPupil esafety
Pupil esafety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Instant Messaging Chat Room Saftey Afnan, Hussam
Instant Messaging Chat Room Saftey   Afnan, HussamInstant Messaging Chat Room Saftey   Afnan, Hussam
Instant Messaging Chat Room Saftey Afnan, Hussam
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Lesson 2 jerry dennis
Lesson 2 jerry dennisLesson 2 jerry dennis
Lesson 2 jerry dennis
 
Surfer Dude
Surfer DudeSurfer Dude
Surfer Dude
 
Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For Educators
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Nour bassem 10 a
Nour bassem   10 aNour bassem   10 a
Nour bassem 10 a
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 

Similar to Fc5 f143a 14c2-3f0d-1cda962638668b94

Web2.0 Class Guidelines
Web2.0 Class Guidelines Web2.0 Class Guidelines
Web2.0 Class Guidelines
Web Success Coaching
 
Safely Traveling the Web 2015
Safely Traveling the Web 2015Safely Traveling the Web 2015
Safely Traveling the Web 2015
Staci Trekles
 
Web2.0 Class Safety Guidelines
Web2.0 Class Safety GuidelinesWeb2.0 Class Safety Guidelines
Web2.0 Class Safety Guidelines
Web Success Coaching
 
E-Safety and Kite Info
E-Safety and Kite InfoE-Safety and Kite Info
E-Safety and Kite Info
oneill74
 
Online Safety Lesson 5th grade
Online Safety Lesson 5th gradeOnline Safety Lesson 5th grade
Online Safety Lesson 5th grade
Belinda Larson
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayane Hazimeh
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
Marian Merritt
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
Cathleen Richardson
 
CH e-safety presentation
CH e-safety presentationCH e-safety presentation
CH e-safety presentation
QEwebAdmin
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
Marian Merritt
 
Cyber Safety Month summary
 Cyber Safety Month summary Cyber Safety Month summary
Cyber Safety Month summary
icts-uct
 
Raising Responsible Digital Citizens
Raising Responsible Digital CitizensRaising Responsible Digital Citizens
Raising Responsible Digital Citizens
Jason Rushing
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
Sanil Shrivastava
 
Internet security
Internet securityInternet security
Internet security
Carmen Gorda
 
Internet Safety: I
Internet Safety: IInternet Safety: I
Internet Safety: I
mlegan31
 
Using Skype, Facebook, and email to communicate with family and friends
Using Skype, Facebook, and email to communicate with family and friendsUsing Skype, Facebook, and email to communicate with family and friends
Using Skype, Facebook, and email to communicate with family and friends
Social Status
 
Precautions to ensure safety
Precautions to ensure safetyPrecautions to ensure safety
Precautions to ensure safety
benlangley-efc
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
TeacherNicaPrintable
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshare
Marian Merritt
 

Similar to Fc5 f143a 14c2-3f0d-1cda962638668b94 (20)

Web2.0 Class Guidelines
Web2.0 Class Guidelines Web2.0 Class Guidelines
Web2.0 Class Guidelines
 
Safely Traveling the Web 2015
Safely Traveling the Web 2015Safely Traveling the Web 2015
Safely Traveling the Web 2015
 
Web2.0 Class Safety Guidelines
Web2.0 Class Safety GuidelinesWeb2.0 Class Safety Guidelines
Web2.0 Class Safety Guidelines
 
E-Safety and Kite Info
E-Safety and Kite InfoE-Safety and Kite Info
E-Safety and Kite Info
 
Online Safety Lesson 5th grade
Online Safety Lesson 5th gradeOnline Safety Lesson 5th grade
Online Safety Lesson 5th grade
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
 
CH e-safety presentation
CH e-safety presentationCH e-safety presentation
CH e-safety presentation
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
Cyber Safety Month summary
 Cyber Safety Month summary Cyber Safety Month summary
Cyber Safety Month summary
 
Raising Responsible Digital Citizens
Raising Responsible Digital CitizensRaising Responsible Digital Citizens
Raising Responsible Digital Citizens
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
 
Internet security
Internet securityInternet security
Internet security
 
Internet Safety: I
Internet Safety: IInternet Safety: I
Internet Safety: I
 
Using Skype, Facebook, and email to communicate with family and friends
Using Skype, Facebook, and email to communicate with family and friendsUsing Skype, Facebook, and email to communicate with family and friends
Using Skype, Facebook, and email to communicate with family and friends
 
Precautions to ensure safety
Precautions to ensure safetyPrecautions to ensure safety
Precautions to ensure safety
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshare
 

Recently uploaded

AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
FilipTomaszewski5
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
UiPathCommunity
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
DianaGray10
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
UiPathCommunity
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
Fwdays
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 

Recently uploaded (20)

AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 

Fc5 f143a 14c2-3f0d-1cda962638668b94

  • 1. 01/27/15 Linda Rush - Notre Dame School Internet Netiquette & Safety
  • 2.
  • 3. • Never use the Internet without adult supervision. • Never drink or eat at a computer. Food and drinks can damage the keyboard take care of your computer and keep it clean.
  • 4. • Never use bad language or write hateful things about another person. • Never share your password, keep your password a secret*******.
  • 5. • Never give out information, such as your name, address, telephone number, school name or a friend's name • Never download files or programs without permission from an adult. They can contain viruses or programs that can harm your computer.
  • 6. • Do not open or click on banners or advertisements and if one pops open, click the X to close it. • Do not put a magnet near your computer's CPU this can damage the computer.
  • 7. • Be careful handling floppy disks, do not play with the mental clip this can damage the disk • Always use the CD- ROM button to open and close the CD- ROM drive pushing on the door can damage it.
  • 8. • Always share your Internet knowledge with others. • Never respond to a message that makes you feel confused or uncomfortable, tell your teacher or parent if you come across any information online that makes you feel uncomfortable.
  • 9. • Be careful downloading files or programs. They can contain viruses that can harm your computer • Never agree to go meet a person you have met online. You should know everyone on your buddy list.
  • 10. • Never send your picture to a person you have met online. • Remember Spammers collect screen names in chat rooms.
  • 11. • Do not forward email without the author's permission. • Tell your teacher or parent if you come across any information online that makes you feel uncomfortable.
  • 12. • Never use a computer to steal or destroy computers, files or programs. • Keep your email messages short and to the point and always include a subject line.
  • 13. • Do not criticize anyone online. (Netiquette) • Capital letters means that you are shouting. (Netiquette)
  • 14. • Never open an email from a sender you do not know especially if it has an attachment. This could be a virus. • Email Attachments can contain computer viruses be careful before you open them. You can scan attachments for viruses.
  • 15. • Delete suspicious email do not open them and then empty your deleted folder. • Look for the security lock on the taskbar before entering private information into the computer.
  • 16. Credits • http://bcsberlin.k12.nj.us/CPUsite/Computers/index.h • Slim Goodbody. "Math Monsters: Computers." unitedstreaming. http://www.unitedstreaming.com/ – Real World Examples: Using the Internet
  • 17. Other Resources • Scholastic. "Magic School Bus Gets Programmed, The." unitedstreaming. http://www.unitedstreaming.com/ • http://www.brainpop.com/technology/computers/internet/ • http://www.brainpop.com/socialstudies/currentevents/o nlinesafety/