SlideShare a Scribd company logo
Internet Safety By: Kerri M.
Info.. Spam is the abuse of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately. ... The internet is a computer network consisting of a worldwide network of computer networks that use the TCP/IP network protocols to facilitate data transmission ...
How to Stay Safe On The Internet. Don’t tell a stranger or someone you are not positive about knowing any info. About your self. When you are online make sure you know exactly who you are talking to and make sure you know them if your giving any info, out. If you tell them your first name make sure that’s it. Be nice to people online because you don’t know who you are dealing with, if they send messages online just ignore them.
How to Stay Safe   It's a good idea to talk with them about computers and to stay open to their questions and curiosity. Set clear rules for Internet use.  Always sit with your kids at this age when they're online. Make very clear not share personal information such as their real name, address, phone number, or passwords with people they meet online. If a site encourages kids to submit their names to personalize the Web content, help your kids create online nicknames that don't give away personal information.
INTERNET What should the internet be used for? Looking up information. You can communicate with your friends. You should not talk to strangers. Looking up pictures. Buy things. Watch Videos Look up the news. MANY MORE The internet is a global system of consistent computer networks. WWW-World Wide Web… a collection of internet sites. Search Engine- Used for information. It matches the words given and then finds the answers. Examples are- GOOGLE, ASK.COM
Browsers A web browser is a software function for retrieving, presenting, and traversing information resources on the World Wide Web. Google Yahoo Information Super Highway digital communication systems and the internet telecommunications network. Connectivity Easy to find information It is possible to like art and entertainment made by anybody Information should be given about information such as explorers, you shouldn’t put stuff that is not true One way to promote internet safety is to not give information  about you on sites.

More Related Content

What's hot

Eskwela module 3_responsible use of ict
Eskwela module 3_responsible use of ictEskwela module 3_responsible use of ict
Eskwela module 3_responsible use of ict
Anwar Jesus Esperida
 
Dangers on the Internet
Dangers on the InternetDangers on the Internet
Dangers on the Internet
Apostolos Syropoulos
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
harriscountypubliclibrary
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
SrijanMukhopadhyay1
 
Y2 l10 esafety
Y2 l10 esafetyY2 l10 esafety
Y2 l10 esafety
Miles Berry
 
Glow Internet Safety Talk
Glow Internet Safety TalkGlow Internet Safety Talk
Glow Internet Safety Talk
Ollie Bray
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
takahe2
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Naheelah Irving
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019
KanelandSvihlik
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016
KanelandSvihlik
 
Kids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe onlineKids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe online
Ian Krieger
 
Safer internet day 2011
Safer internet day 2011Safer internet day 2011
Safer internet day 2011
letsbeginbydoing
 
digital elements
digital elementsdigital elements
digital elements
bos0ud
 
Kid Safety On The Internet
Kid Safety On The InternetKid Safety On The Internet
Kid Safety On The Internet
Jennifer Chilek
 
The internet
The internetThe internet
The internet
sevoo12
 

What's hot (15)

Eskwela module 3_responsible use of ict
Eskwela module 3_responsible use of ictEskwela module 3_responsible use of ict
Eskwela module 3_responsible use of ict
 
Dangers on the Internet
Dangers on the InternetDangers on the Internet
Dangers on the Internet
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
 
Y2 l10 esafety
Y2 l10 esafetyY2 l10 esafety
Y2 l10 esafety
 
Glow Internet Safety Talk
Glow Internet Safety TalkGlow Internet Safety Talk
Glow Internet Safety Talk
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016
 
Kids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe onlineKids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe online
 
Safer internet day 2011
Safer internet day 2011Safer internet day 2011
Safer internet day 2011
 
digital elements
digital elementsdigital elements
digital elements
 
Kid Safety On The Internet
Kid Safety On The InternetKid Safety On The Internet
Kid Safety On The Internet
 
The internet
The internetThe internet
The internet
 

Viewers also liked

The Internet
The InternetThe Internet
The Internet
NicholasGomez
 
BCSVP Major Donor Fundraising
BCSVP Major Donor FundraisingBCSVP Major Donor Fundraising
BCSVP Major Donor Fundraising
BC Social Venture Partners
 
British Empire
British EmpireBritish Empire
British Empire
history88
 
Tehtävä 2
Tehtävä 2Tehtävä 2
Tehtävä 2MMK10
 
Respiration Presentation Previsit
Respiration Presentation PrevisitRespiration Presentation Previsit
Respiration Presentation Previsit
Jonathan Nessan
 
Poesia, amor e um sentimento
Poesia, amor e um sentimentoPoesia, amor e um sentimento
Poesia, amor e um sentimento
higoroli
 
JEANSPARTYNET Thomas Wilhelm
JEANSPARTYNET Thomas WilhelmJEANSPARTYNET Thomas Wilhelm
JEANSPARTYNET Thomas Wilhelm
Thomas Wilhelm
 
Erfolgreich gewehrt gegen Negativ-PR
Erfolgreich gewehrt gegen Negativ-PRErfolgreich gewehrt gegen Negativ-PR
Erfolgreich gewehrt gegen Negativ-PR
Goldmedia Analytics GmbH
 
Institutional Presentation of the Cluster
Institutional Presentation of the ClusterInstitutional Presentation of the Cluster
Institutional Presentation of the Cluster
anne_veron
 
Geschenk
GeschenkGeschenk
Geschenk
mongolein7
 
Dr.R.Gunaseelan Inaiyamum Thamizhum
Dr.R.Gunaseelan Inaiyamum ThamizhumDr.R.Gunaseelan Inaiyamum Thamizhum
Dr.R.Gunaseelan Inaiyamum Thamizhum
aadippaavai
 
Hs Rent Control Appropriation Request
Hs Rent Control Appropriation RequestHs Rent Control Appropriation Request
Hs Rent Control Appropriation Request
Hoboken Resistance
 
Byod-Projekt GMK-Forum
Byod-Projekt GMK-ForumByod-Projekt GMK-Forum
Byod-Projekt GMK-ForumDaniel Bernsen
 
Access ohne Access: Freie Datenbank-Frontends
Access ohne Access: Freie Datenbank-FrontendsAccess ohne Access: Freie Datenbank-Frontends
Access ohne Access: Freie Datenbank-Frontends
Peter Eisentraut
 
Grief and Loss
Grief and LossGrief and Loss
Grief and Loss
NorthTec
 
Aero espaço jan 11
Aero espaço jan 11Aero espaço jan 11
Aero espaço jan 11
Lestat Vergaser
 
ED451 5 Min Slidehare
ED451 5 Min SlidehareED451 5 Min Slidehare
ED451 5 Min Slidehare
odessa10
 
Spowo 13.5.09
Spowo 13.5.09Spowo 13.5.09
Spowo 13.5.09
guest0858ea5
 
Kusa Peru Mckenzie
Kusa Peru MckenzieKusa Peru Mckenzie
Kusa Peru Mckenzie
zrhodenizer
 
Artikel Performance Management als Werkzeug des Krisenmanagements
Artikel Performance Management als Werkzeug des KrisenmanagementsArtikel Performance Management als Werkzeug des Krisenmanagements
Artikel Performance Management als Werkzeug des Krisenmanagements
strategico
 

Viewers also liked (20)

The Internet
The InternetThe Internet
The Internet
 
BCSVP Major Donor Fundraising
BCSVP Major Donor FundraisingBCSVP Major Donor Fundraising
BCSVP Major Donor Fundraising
 
British Empire
British EmpireBritish Empire
British Empire
 
Tehtävä 2
Tehtävä 2Tehtävä 2
Tehtävä 2
 
Respiration Presentation Previsit
Respiration Presentation PrevisitRespiration Presentation Previsit
Respiration Presentation Previsit
 
Poesia, amor e um sentimento
Poesia, amor e um sentimentoPoesia, amor e um sentimento
Poesia, amor e um sentimento
 
JEANSPARTYNET Thomas Wilhelm
JEANSPARTYNET Thomas WilhelmJEANSPARTYNET Thomas Wilhelm
JEANSPARTYNET Thomas Wilhelm
 
Erfolgreich gewehrt gegen Negativ-PR
Erfolgreich gewehrt gegen Negativ-PRErfolgreich gewehrt gegen Negativ-PR
Erfolgreich gewehrt gegen Negativ-PR
 
Institutional Presentation of the Cluster
Institutional Presentation of the ClusterInstitutional Presentation of the Cluster
Institutional Presentation of the Cluster
 
Geschenk
GeschenkGeschenk
Geschenk
 
Dr.R.Gunaseelan Inaiyamum Thamizhum
Dr.R.Gunaseelan Inaiyamum ThamizhumDr.R.Gunaseelan Inaiyamum Thamizhum
Dr.R.Gunaseelan Inaiyamum Thamizhum
 
Hs Rent Control Appropriation Request
Hs Rent Control Appropriation RequestHs Rent Control Appropriation Request
Hs Rent Control Appropriation Request
 
Byod-Projekt GMK-Forum
Byod-Projekt GMK-ForumByod-Projekt GMK-Forum
Byod-Projekt GMK-Forum
 
Access ohne Access: Freie Datenbank-Frontends
Access ohne Access: Freie Datenbank-FrontendsAccess ohne Access: Freie Datenbank-Frontends
Access ohne Access: Freie Datenbank-Frontends
 
Grief and Loss
Grief and LossGrief and Loss
Grief and Loss
 
Aero espaço jan 11
Aero espaço jan 11Aero espaço jan 11
Aero espaço jan 11
 
ED451 5 Min Slidehare
ED451 5 Min SlidehareED451 5 Min Slidehare
ED451 5 Min Slidehare
 
Spowo 13.5.09
Spowo 13.5.09Spowo 13.5.09
Spowo 13.5.09
 
Kusa Peru Mckenzie
Kusa Peru MckenzieKusa Peru Mckenzie
Kusa Peru Mckenzie
 
Artikel Performance Management als Werkzeug des Krisenmanagements
Artikel Performance Management als Werkzeug des KrisenmanagementsArtikel Performance Management als Werkzeug des Krisenmanagements
Artikel Performance Management als Werkzeug des Krisenmanagements
 

Similar to Internet Safety

Internet Safety Gwen
Internet Safety GwenInternet Safety Gwen
Internet Safety Gwen
guest3d3a205b
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
tholman77
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
guest400c7e0
 
Ctss Safe Internet For Kids
Ctss Safe Internet For KidsCtss Safe Internet For Kids
Ctss Safe Internet For Kids
kwazy
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
cpitchford
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your Desktop
Andy Smith
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011
KanelandSvihlik
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
guest5000f0a
 
Chatter
ChatterChatter
Chatter
guest35533f
 
Internet safty
Internet saftyInternet safty
Internet safty
guestce38b330
 
Presentación kefalonia[1]
Presentación kefalonia[1]Presentación kefalonia[1]
Presentación kefalonia[1]
Miriam Ortega
 
Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009
Ollie Bray
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
EmmanuelaSernicul
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks Slideshare
Ollie Bray
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
kirshee
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Jeff Dungan
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
Cathleen Richardson
 
Secure social networking
Secure social networkingSecure social networking
Secure social networking
Osaid To'meh
 
Presentation to parents
Presentation to parentsPresentation to parents
Presentation to parents
sirchriss
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
JayMarkBandoy1
 

Similar to Internet Safety (20)

Internet Safety Gwen
Internet Safety GwenInternet Safety Gwen
Internet Safety Gwen
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Ctss Safe Internet For Kids
Ctss Safe Internet For KidsCtss Safe Internet For Kids
Ctss Safe Internet For Kids
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your Desktop
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
Chatter
ChatterChatter
Chatter
 
Internet safty
Internet saftyInternet safty
Internet safty
 
Presentación kefalonia[1]
Presentación kefalonia[1]Presentación kefalonia[1]
Presentación kefalonia[1]
 
Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks Slideshare
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
 
Secure social networking
Secure social networkingSecure social networking
Secure social networking
 
Presentation to parents
Presentation to parentsPresentation to parents
Presentation to parents
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 

Recently uploaded

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 

Recently uploaded (20)

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 

Internet Safety

  • 2. Info.. Spam is the abuse of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately. ... The internet is a computer network consisting of a worldwide network of computer networks that use the TCP/IP network protocols to facilitate data transmission ...
  • 3. How to Stay Safe On The Internet. Don’t tell a stranger or someone you are not positive about knowing any info. About your self. When you are online make sure you know exactly who you are talking to and make sure you know them if your giving any info, out. If you tell them your first name make sure that’s it. Be nice to people online because you don’t know who you are dealing with, if they send messages online just ignore them.
  • 4. How to Stay Safe It's a good idea to talk with them about computers and to stay open to their questions and curiosity. Set clear rules for Internet use. Always sit with your kids at this age when they're online. Make very clear not share personal information such as their real name, address, phone number, or passwords with people they meet online. If a site encourages kids to submit their names to personalize the Web content, help your kids create online nicknames that don't give away personal information.
  • 5. INTERNET What should the internet be used for? Looking up information. You can communicate with your friends. You should not talk to strangers. Looking up pictures. Buy things. Watch Videos Look up the news. MANY MORE The internet is a global system of consistent computer networks. WWW-World Wide Web… a collection of internet sites. Search Engine- Used for information. It matches the words given and then finds the answers. Examples are- GOOGLE, ASK.COM
  • 6. Browsers A web browser is a software function for retrieving, presenting, and traversing information resources on the World Wide Web. Google Yahoo Information Super Highway digital communication systems and the internet telecommunications network. Connectivity Easy to find information It is possible to like art and entertainment made by anybody Information should be given about information such as explorers, you shouldn’t put stuff that is not true One way to promote internet safety is to not give information about you on sites.