SlideShare a Scribd company logo
In this report you will learn… 
In this report you will learn about the 
various great things about computers 
and the dangers that can happen and 
how to prevent them. You will enjoy 
this because the world of technology 
is changing and this can help you 
work with these new advancements 
that will help you use your computer 
wiser. I hope you enjoy this report on 
learning technology. Have fun!
Using online templates help make your report 
look neat and different. It makes it look different 
in a good way as what you use to make it your 
own. In a way it spices it up.
Plagiarism can 
Plagiarism can 
cause 
cause 
consequences 
consequences 
such such as as losing losing a 
a 
job job or or being being kicked 
kicked 
out out of of a a school. school. 
YYaahh!!!!!!
1) Yes, use your own words. 
2) Give credit to your sources 
3) Understand when a sentence is “common 
knowledge.”
• Charts are visually appealing and make it 
easy for you to see comparisons, 
patterns, and trends in data. 
• Instead of analyzing columns of numbers, 
you can see at a glance whether your 
typing speed is falling or rising.
Tracking My Success
Advantages 
• You can share storage among multiple 
devices with one account. 
• Easy access to all of our files, 
information, and storage. 
• You can store all of your useful 
information and personal information in 
one simple account.
Disadvantages 
• If you put something up it can be hard to 
get back if you don’t want people to 
download it. 
• But people can hack your files filled with 
your information. 
• You have to pay for storage.
5 Rules 
1) Keep identity a secret 
1) Be extra careful with strangers 
2) Tell somebody 
1) Keep identity a secret 
1) Be extra careful with strangers 
2) Tell somebody
5 Rules 
4) Be nice 
5) Protect your password 
4) Be nice 
5) Protect your password
Use Clipart
Malware 
Malware is 
Malware is 
very 
very 
dangerous 
dangerous
Diagnose your computer 
1. Drains your battery very quickly 
2. Computer runs slowly 
3. Error messages displayed without cause 
1. Drains your battery very quickly 
2. Computer runs slowly 
3. Error messages displayed without cause
• Set of rules for how to 
travel online. 
• Treat others the way 
you want to be 
treated!!! 
• Set of rules for how to 
travel online. 
• Treat others the way 
you want to be 
treated!!!
What I think about texting 
Texting is a good way 
to give a message 
faster than calling 
though it can cause 
problems such as 
texting and driving 
Texting is a good way 
to give a message 
faster than calling 
though it can cause 
problems such as 
texting and driving
What not to do… 
1. Post embarrassing pictures of 
your friends.(sexting) 
2.Say things you would never 
say directly to the person. 
3.Try to start arguments which is 
called “flaming.” 
1. Post embarrassing pictures of 
your friends.(sexting) 
2.Say things you would never 
say directly to the person. 
3.Try to start arguments which is 
called “flaming.”
Things to do 
a.Meet others with same 
interests. 
b.Keep friends updated on 
activities 
c. Share only what you wouldn’t 
mind being made into a banner 
ad. 
a.Meet others with same 
interests. 
b.Keep friends updated on 
activities 
c. Share only what you wouldn’t 
mind being made into a banner 
ad.
Conclusion 
I hope your expectations 
were met and you learned 
something from this report. 
Thank you for looking at 
this. Bye! 
I hope your expectations 
were met and you learned 
something from this report. 
Thank you for looking at 
this. Bye!
About me 
Favorite movie: Happy Gilmore 
Favorite type of Music: Rock 
Favorite food: Steak 
Favorite candy: M&M’s
You can find many more free 
templates on the Presentation 
Magazine website 
www.presentationmagazine.com 
www.brainpop.com 
www.stopthinkconnect.org 
www.omgaurdonline.gov

More Related Content

What's hot

Netiquette By S Brown At Bbe
Netiquette By S Brown At BbeNetiquette By S Brown At Bbe
Netiquette By S Brown At Bbecynthia.warner
 
Netiquette for this class2017
Netiquette for this class2017Netiquette for this class2017
Netiquette for this class2017
Ron Hess
 
Netiquette
NetiquetteNetiquette
Netiquette
Rafael Balderosa
 
Rules of netiquette
Rules of netiquetteRules of netiquette
Rules of netiquetteklknight79
 
2008 Cyber Safety
2008 Cyber Safety2008 Cyber Safety
2008 Cyber Safetyreideva
 
The essential rules of netiquette by Halina
The essential rules of netiquette by HalinaThe essential rules of netiquette by Halina
The essential rules of netiquette by Halina
Self-employed
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Finalguest011ce7
 
Internet safty
Internet saftyInternet safty
Internet safty
guestce38b330
 
Evans,Vinces,Coles I.S.1
Evans,Vinces,Coles I.S.1Evans,Vinces,Coles I.S.1
Evans,Vinces,Coles I.S.1guest1d951ee
 
Copyright for 4 6th graders
Copyright for 4 6th gradersCopyright for 4 6th graders
Copyright for 4 6th gradersclayton777
 
Netiquette do’s & don’ts
Netiquette do’s & don’tsNetiquette do’s & don’ts
Netiquette do’s & don’ts
Amy Whitener, Ed.S
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Finalguest0c7b65
 
G3 Respect And Cyberbullying
G3 Respect And CyberbullyingG3 Respect And Cyberbullying
G3 Respect And CyberbullyingWeng Sison
 
Safe and ethical use
Safe and ethical useSafe and ethical use
Safe and ethical useTotowanelson
 
Universally Usable Web Forms
Universally Usable Web FormsUniversally Usable Web Forms
Universally Usable Web Forms
Julie Strothman
 

What's hot (19)

Netiquette By S Brown At Bbe
Netiquette By S Brown At BbeNetiquette By S Brown At Bbe
Netiquette By S Brown At Bbe
 
Netiquette for this class2017
Netiquette for this class2017Netiquette for this class2017
Netiquette for this class2017
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Rules of netiquette
Rules of netiquetteRules of netiquette
Rules of netiquette
 
2008 Cyber Safety
2008 Cyber Safety2008 Cyber Safety
2008 Cyber Safety
 
Netiquette
NetiquetteNetiquette
Netiquette
 
INTERNET ETIQUETTE AND NETIQUETTE
INTERNET ETIQUETTE AND NETIQUETTEINTERNET ETIQUETTE AND NETIQUETTE
INTERNET ETIQUETTE AND NETIQUETTE
 
The essential rules of netiquette by Halina
The essential rules of netiquette by HalinaThe essential rules of netiquette by Halina
The essential rules of netiquette by Halina
 
Plagiarism
PlagiarismPlagiarism
Plagiarism
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
Internet safty
Internet saftyInternet safty
Internet safty
 
Evans,Vinces,Coles I.S.1
Evans,Vinces,Coles I.S.1Evans,Vinces,Coles I.S.1
Evans,Vinces,Coles I.S.1
 
Internet Safty
Internet SaftyInternet Safty
Internet Safty
 
Copyright for 4 6th graders
Copyright for 4 6th gradersCopyright for 4 6th graders
Copyright for 4 6th graders
 
Netiquette do’s & don’ts
Netiquette do’s & don’tsNetiquette do’s & don’ts
Netiquette do’s & don’ts
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
G3 Respect And Cyberbullying
G3 Respect And CyberbullyingG3 Respect And Cyberbullying
G3 Respect And Cyberbullying
 
Safe and ethical use
Safe and ethical useSafe and ethical use
Safe and ethical use
 
Universally Usable Web Forms
Universally Usable Web FormsUniversally Usable Web Forms
Universally Usable Web Forms
 

Similar to Griffin Been technology Report

Ava Technology
Ava TechnologyAva Technology
Ava Technology
Marq2014
 
Technology Repot by Cameron Major
Technology Repot by Cameron MajorTechnology Repot by Cameron Major
Technology Repot by Cameron Major
Marq2014
 
Technology Report By Noah Coffman
Technology Report By Noah CoffmanTechnology Report By Noah Coffman
Technology Report By Noah Coffman
Marq2014
 
Saige S. ☀😊😃
Saige S. ☀😊😃Saige S. ☀😊😃
Saige S. ☀😊😃
Marq2014
 
Meaghan technology report
Meaghan technology reportMeaghan technology report
Meaghan technology report
Marq2014
 
Ellie
Ellie Ellie
Ellie
Marq2014
 
Morgan Markus
Morgan Markus Morgan Markus
Morgan Markus
Marq2014
 
Caroline's technology powerpoint
Caroline's technology powerpointCaroline's technology powerpoint
Caroline's technology powerpoint
Marq2014
 
Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3
jesusmlaz
 
Digital student netiquette
Digital student netiquetteDigital student netiquette
Digital student netiquettelynorense
 
Internet safety guide
Internet safety guide Internet safety guide
Internet safety guide
Dee Tutino
 
The Social Safety Guide
The Social Safety GuideThe Social Safety Guide
The Social Safety Guide
Dee Tutino
 
Teens on the net
Teens on the netTeens on the net
Teens on the net
talandronmmp
 
Netiquette know how
Netiquette know howNetiquette know how
Netiquette know howAmber Morris
 
Libby naylor tech 2k14
Libby naylor tech 2k14Libby naylor tech 2k14
Libby naylor tech 2k14Marq2014
 
Corp Web Risks and Concerns
Corp Web Risks and ConcernsCorp Web Risks and Concerns
Corp Web Risks and Concerns
PINT Inc
 
Modal Verbs 2
Modal Verbs 2Modal Verbs 2
Modal Verbs 2
Cintia Santos
 
Grace's technology power point
Grace's technology power pointGrace's technology power point
Grace's technology power point
Marq2014
 

Similar to Griffin Been technology Report (20)

Ava Technology
Ava TechnologyAva Technology
Ava Technology
 
00762 4
00762 400762 4
00762 4
 
Technology Repot by Cameron Major
Technology Repot by Cameron MajorTechnology Repot by Cameron Major
Technology Repot by Cameron Major
 
Technology Report By Noah Coffman
Technology Report By Noah CoffmanTechnology Report By Noah Coffman
Technology Report By Noah Coffman
 
Cate tech
Cate techCate tech
Cate tech
 
Saige S. ☀😊😃
Saige S. ☀😊😃Saige S. ☀😊😃
Saige S. ☀😊😃
 
Meaghan technology report
Meaghan technology reportMeaghan technology report
Meaghan technology report
 
Ellie
Ellie Ellie
Ellie
 
Morgan Markus
Morgan Markus Morgan Markus
Morgan Markus
 
Caroline's technology powerpoint
Caroline's technology powerpointCaroline's technology powerpoint
Caroline's technology powerpoint
 
Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3
 
Digital student netiquette
Digital student netiquetteDigital student netiquette
Digital student netiquette
 
Internet safety guide
Internet safety guide Internet safety guide
Internet safety guide
 
The Social Safety Guide
The Social Safety GuideThe Social Safety Guide
The Social Safety Guide
 
Teens on the net
Teens on the netTeens on the net
Teens on the net
 
Netiquette know how
Netiquette know howNetiquette know how
Netiquette know how
 
Libby naylor tech 2k14
Libby naylor tech 2k14Libby naylor tech 2k14
Libby naylor tech 2k14
 
Corp Web Risks and Concerns
Corp Web Risks and ConcernsCorp Web Risks and Concerns
Corp Web Risks and Concerns
 
Modal Verbs 2
Modal Verbs 2Modal Verbs 2
Modal Verbs 2
 
Grace's technology power point
Grace's technology power pointGrace's technology power point
Grace's technology power point
 

More from Marq2014

Robots (updated)
Robots (updated)Robots (updated)
Robots (updated)
Marq2014
 
The 3 D printer
The 3 D printerThe 3 D printer
The 3 D printer
Marq2014
 
Tommy project pp
Tommy project ppTommy project pp
Tommy project pp
Marq2014
 
Information Privacy
Information Privacy Information Privacy
Information Privacy
Marq2014
 
Finn delgado 3 d printing report
Finn delgado 3 d printing reportFinn delgado 3 d printing report
Finn delgado 3 d printing report
Marq2014
 
Adapting to technology by Emily !
Adapting to technology by Emily !Adapting to technology by Emily !
Adapting to technology by Emily !
Marq2014
 
Joshua Coffman and David Bryan's Computer History Project
Joshua Coffman and David Bryan's Computer History ProjectJoshua Coffman and David Bryan's Computer History Project
Joshua Coffman and David Bryan's Computer History Project
Marq2014
 
computer history
computer historycomputer history
computer history
Marq2014
 
Emoji katherine
Emoji katherineEmoji katherine
Emoji katherine
Marq2014
 
Wilburn pp4
Wilburn pp4Wilburn pp4
Wilburn pp4
Marq2014
 
Brian nguyen
Brian nguyenBrian nguyen
Brian nguyen
Marq2014
 
Plagiarism -Jadyn
Plagiarism -JadynPlagiarism -Jadyn
Plagiarism -Jadyn
Marq2014
 
mia mcpeek project in school for a grade
mia mcpeek project in school for a grademia mcpeek project in school for a grade
mia mcpeek project in school for a grade
Marq2014
 
Cyberbullying 3.0
Cyberbullying 3.0Cyberbullying 3.0
Cyberbullying 3.0
Marq2014
 
The Evolution of T.V.
The Evolution of T.V.The Evolution of T.V.
The Evolution of T.V.
Marq2014
 
Kennedy 3d printers
Kennedy  3d printers Kennedy  3d printers
Kennedy 3d printers
Marq2014
 
Quinn 3D printing project
Quinn 3D printing project Quinn 3D printing project
Quinn 3D printing project
Marq2014
 
Cyberbullying by Mia
Cyberbullying by MiaCyberbullying by Mia
Cyberbullying by Mia
Marq2014
 
Robots in Space
Robots in SpaceRobots in Space
Robots in Space
Marq2014
 
Emily emerging technology
Emily emerging technology Emily emerging technology
Emily emerging technology
Marq2014
 

More from Marq2014 (20)

Robots (updated)
Robots (updated)Robots (updated)
Robots (updated)
 
The 3 D printer
The 3 D printerThe 3 D printer
The 3 D printer
 
Tommy project pp
Tommy project ppTommy project pp
Tommy project pp
 
Information Privacy
Information Privacy Information Privacy
Information Privacy
 
Finn delgado 3 d printing report
Finn delgado 3 d printing reportFinn delgado 3 d printing report
Finn delgado 3 d printing report
 
Adapting to technology by Emily !
Adapting to technology by Emily !Adapting to technology by Emily !
Adapting to technology by Emily !
 
Joshua Coffman and David Bryan's Computer History Project
Joshua Coffman and David Bryan's Computer History ProjectJoshua Coffman and David Bryan's Computer History Project
Joshua Coffman and David Bryan's Computer History Project
 
computer history
computer historycomputer history
computer history
 
Emoji katherine
Emoji katherineEmoji katherine
Emoji katherine
 
Wilburn pp4
Wilburn pp4Wilburn pp4
Wilburn pp4
 
Brian nguyen
Brian nguyenBrian nguyen
Brian nguyen
 
Plagiarism -Jadyn
Plagiarism -JadynPlagiarism -Jadyn
Plagiarism -Jadyn
 
mia mcpeek project in school for a grade
mia mcpeek project in school for a grademia mcpeek project in school for a grade
mia mcpeek project in school for a grade
 
Cyberbullying 3.0
Cyberbullying 3.0Cyberbullying 3.0
Cyberbullying 3.0
 
The Evolution of T.V.
The Evolution of T.V.The Evolution of T.V.
The Evolution of T.V.
 
Kennedy 3d printers
Kennedy  3d printers Kennedy  3d printers
Kennedy 3d printers
 
Quinn 3D printing project
Quinn 3D printing project Quinn 3D printing project
Quinn 3D printing project
 
Cyberbullying by Mia
Cyberbullying by MiaCyberbullying by Mia
Cyberbullying by Mia
 
Robots in Space
Robots in SpaceRobots in Space
Robots in Space
 
Emily emerging technology
Emily emerging technology Emily emerging technology
Emily emerging technology
 

Recently uploaded

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 

Recently uploaded (20)

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 

Griffin Been technology Report

  • 1.
  • 2. In this report you will learn… In this report you will learn about the various great things about computers and the dangers that can happen and how to prevent them. You will enjoy this because the world of technology is changing and this can help you work with these new advancements that will help you use your computer wiser. I hope you enjoy this report on learning technology. Have fun!
  • 3. Using online templates help make your report look neat and different. It makes it look different in a good way as what you use to make it your own. In a way it spices it up.
  • 4.
  • 5. Plagiarism can Plagiarism can cause cause consequences consequences such such as as losing losing a a job job or or being being kicked kicked out out of of a a school. school. YYaahh!!!!!!
  • 6. 1) Yes, use your own words. 2) Give credit to your sources 3) Understand when a sentence is “common knowledge.”
  • 7. • Charts are visually appealing and make it easy for you to see comparisons, patterns, and trends in data. • Instead of analyzing columns of numbers, you can see at a glance whether your typing speed is falling or rising.
  • 9.
  • 10. Advantages • You can share storage among multiple devices with one account. • Easy access to all of our files, information, and storage. • You can store all of your useful information and personal information in one simple account.
  • 11. Disadvantages • If you put something up it can be hard to get back if you don’t want people to download it. • But people can hack your files filled with your information. • You have to pay for storage.
  • 12.
  • 13. 5 Rules 1) Keep identity a secret 1) Be extra careful with strangers 2) Tell somebody 1) Keep identity a secret 1) Be extra careful with strangers 2) Tell somebody
  • 14. 5 Rules 4) Be nice 5) Protect your password 4) Be nice 5) Protect your password
  • 16. Malware Malware is Malware is very very dangerous dangerous
  • 17. Diagnose your computer 1. Drains your battery very quickly 2. Computer runs slowly 3. Error messages displayed without cause 1. Drains your battery very quickly 2. Computer runs slowly 3. Error messages displayed without cause
  • 18. • Set of rules for how to travel online. • Treat others the way you want to be treated!!! • Set of rules for how to travel online. • Treat others the way you want to be treated!!!
  • 19. What I think about texting Texting is a good way to give a message faster than calling though it can cause problems such as texting and driving Texting is a good way to give a message faster than calling though it can cause problems such as texting and driving
  • 20. What not to do… 1. Post embarrassing pictures of your friends.(sexting) 2.Say things you would never say directly to the person. 3.Try to start arguments which is called “flaming.” 1. Post embarrassing pictures of your friends.(sexting) 2.Say things you would never say directly to the person. 3.Try to start arguments which is called “flaming.”
  • 21.
  • 22. Things to do a.Meet others with same interests. b.Keep friends updated on activities c. Share only what you wouldn’t mind being made into a banner ad. a.Meet others with same interests. b.Keep friends updated on activities c. Share only what you wouldn’t mind being made into a banner ad.
  • 23. Conclusion I hope your expectations were met and you learned something from this report. Thank you for looking at this. Bye! I hope your expectations were met and you learned something from this report. Thank you for looking at this. Bye!
  • 24. About me Favorite movie: Happy Gilmore Favorite type of Music: Rock Favorite food: Steak Favorite candy: M&M’s
  • 25. You can find many more free templates on the Presentation Magazine website www.presentationmagazine.com www.brainpop.com www.stopthinkconnect.org www.omgaurdonline.gov