SlideShare a Scribd company logo
1 of 12
Internet Safety By: Colleen
Internet Safety The internet is a helpful resource where people can search information on any topic they want. The internet is used to search information on almost any topic. It can also be used to look for jobs and to help out with anything you want. A search engine is used for research. It can also be used for receiving information on a certain subject.
World wide info should  be  given  over the internet.  A browser is a program that allows users to find documents.  Internet Safety On the internet, you NEVER give any personal information. (address, phone number, etc.) Examples of browsers: planetweb and safari WWW stands for World Wide Web. It is different than the internet because the world wide web builds on top of the internet.
Internet Safety 3 Don’ts for the internet.
  Internet Safety One way to promote safe internet surfing is to have the children’s parents block websites that they don’t want their kids to see. They can also make their website private. Make sure you don't download programs from unusual sites because it can cause a virus.
InternetSafety By: MacKenzi Diestler
Slick the Spammer Questions What should you do if you receive spam? You should block it and prevent it by not opening your email from people you do not know. Spam is electronic junk mail or junk newsgroup postings. A mailing list is a list of names and addresses to which advertising material is mailed. Spam is like an infection. Some you can get rid of. Some you can’t. Some can have different results like some can crash your computer and some you just can’t get rid of. Spam is a big problem because it eats up a lot of network band with, and wastes people’s time.
Slick the Spammer Questions What should you do with an e-mail attachment from someone you do not know?  Do NOT open it.
Internet Safety By Katie Dellamater
Netiquette is the etiquette for cyberspace (rules for behaving on-line) The three basic rules of netiquette are: Use courtesy Use emoticons  Be brief online What is a flame, flame war  and how can you avoid them? A flame war is a posting to a news group or mailing list A flame war is when an online discussion becomes a series of personal attacks You can avoid a flame war by protecting your reputation and computer, and not going to the same level  of extreme as the enemy Netiquette Ned
You shouldn’t use all capital letters because it is like yelling. If you become uncomfortable with a topic or site that you find you should show an adult and close out of the website Do you know the difference between public and private emails? ,[object Object],A private email is confidential and can only be viewed by the person you sent it to What are emoticons? -They are a textual expression used to show your emotion ex: ;) wink  :D laughing Netiquette Net :D
1. Don’t use the internet with out adult supervision 2. Don’t talk to anyone you don’t know 3. Be responsible 4. Never say or use your name 5. Never post or send a picture of yourself 6. If you see something that makes you uncomfortable inform an adult and close out after the adult sees the site 7. Never give out personal info about you   Internet Safety rules

More Related Content

What's hot

Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of NetiquetteLeelet1121
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationcey.ruth
 
Staying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘NetStaying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘NetDaniel Owens
 
Internet Safety Final Copy
Internet Safety Final CopyInternet Safety Final Copy
Internet Safety Final Copyguestc88a00
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teensSearchLock
 
Internet Safety Final Copy
Internet Safety Final CopyInternet Safety Final Copy
Internet Safety Final Copyguest42858f
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Finalguest5a7b36
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetymcgeet
 
Rules of netiquette
Rules of netiquetteRules of netiquette
Rules of netiquetteklknight79
 
Online privacy
Online privacyOnline privacy
Online privacyjo-jo23
 
Cyber safety
Cyber safetyCyber safety
Cyber safetysmartins7
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety pptmcmullan
 

What's hot (18)

Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
Internet safety
Internet safety Internet safety
Internet safety
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Staying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘NetStaying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘Net
 
Internet Safety Final Copy
Internet Safety Final CopyInternet Safety Final Copy
Internet Safety Final Copy
 
Spam
SpamSpam
Spam
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
 
Internet Safety Final Copy
Internet Safety Final CopyInternet Safety Final Copy
Internet Safety Final Copy
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Rules of netiquette
Rules of netiquetteRules of netiquette
Rules of netiquette
 
Internet Safety!!
Internet Safety!!Internet Safety!!
Internet Safety!!
 
Online privacy
Online privacyOnline privacy
Online privacy
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
Internet safety for kids
Internet safety for kidsInternet safety for kids
Internet safety for kids
 

Viewers also liked

Stavební Bezpečnostní Sklo
Stavební Bezpečnostní SkloStavební Bezpečnostní Sklo
Stavební Bezpečnostní Skloguestefceba2
 
28F: Consultes populars sobre la independència a la Garrotxa
28F: Consultes populars sobre la independència a la Garrotxa28F: Consultes populars sobre la independència a la Garrotxa
28F: Consultes populars sobre la independència a la GarrotxaLa Garrotxa Decideix
 
3rd dialogue dwss & suspension bridge buner 18 5-14 (2)
3rd dialogue dwss & suspension bridge buner 18 5-14 (2)3rd dialogue dwss & suspension bridge buner 18 5-14 (2)
3rd dialogue dwss & suspension bridge buner 18 5-14 (2)SRSP
 
First employment location and residential location decisions of TU Delft grad...
First employment location and residential location decisions of TU Delft grad...First employment location and residential location decisions of TU Delft grad...
First employment location and residential location decisions of TU Delft grad...Nicolò Wojewoda
 
Food for thought on Youth Participation @ CTE 2010
Food for thought on Youth Participation @ CTE 2010Food for thought on Youth Participation @ CTE 2010
Food for thought on Youth Participation @ CTE 2010Nicolò Wojewoda
 
The role of the United Nations in the governance of Socio-Ecological Systems
The role of the United Nations in the governance of Socio-Ecological SystemsThe role of the United Nations in the governance of Socio-Ecological Systems
The role of the United Nations in the governance of Socio-Ecological SystemsNicolò Wojewoda
 
10 (good) reasons to hire me
10 (good) reasons to hire me10 (good) reasons to hire me
10 (good) reasons to hire meNicolò Wojewoda
 
The Role Of Students In The Internationalization Of Engineering Education
The Role Of Students In The Internationalization Of Engineering EducationThe Role Of Students In The Internationalization Of Engineering Education
The Role Of Students In The Internationalization Of Engineering EducationNicolò Wojewoda
 
SRSP Humanitarian Response to Complex Emergency in Khyber Pakhtunkhwa and FATA
SRSP Humanitarian Response to Complex Emergency in Khyber Pakhtunkhwa and FATASRSP Humanitarian Response to Complex Emergency in Khyber Pakhtunkhwa and FATA
SRSP Humanitarian Response to Complex Emergency in Khyber Pakhtunkhwa and FATASRSP
 
Operations Of Integers
Operations Of IntegersOperations Of Integers
Operations Of Integersswright210
 
Ndikimi i shpenzimeve qeveritare ne inflacjon
Ndikimi i shpenzimeve qeveritare ne inflacjonNdikimi i shpenzimeve qeveritare ne inflacjon
Ndikimi i shpenzimeve qeveritare ne inflacjonbetrex
 
Entrepreneurship & creativity, a student\'s perspective
Entrepreneurship & creativity, a student\'s perspectiveEntrepreneurship & creativity, a student\'s perspective
Entrepreneurship & creativity, a student\'s perspectiveNicolò Wojewoda
 

Viewers also liked (14)

Stavební Bezpečnostní Sklo
Stavební Bezpečnostní SkloStavební Bezpečnostní Sklo
Stavební Bezpečnostní Sklo
 
28F: Consultes populars sobre la independència a la Garrotxa
28F: Consultes populars sobre la independència a la Garrotxa28F: Consultes populars sobre la independència a la Garrotxa
28F: Consultes populars sobre la independència a la Garrotxa
 
3rd dialogue dwss & suspension bridge buner 18 5-14 (2)
3rd dialogue dwss & suspension bridge buner 18 5-14 (2)3rd dialogue dwss & suspension bridge buner 18 5-14 (2)
3rd dialogue dwss & suspension bridge buner 18 5-14 (2)
 
First employment location and residential location decisions of TU Delft grad...
First employment location and residential location decisions of TU Delft grad...First employment location and residential location decisions of TU Delft grad...
First employment location and residential location decisions of TU Delft grad...
 
Food for thought on Youth Participation @ CTE 2010
Food for thought on Youth Participation @ CTE 2010Food for thought on Youth Participation @ CTE 2010
Food for thought on Youth Participation @ CTE 2010
 
The role of the United Nations in the governance of Socio-Ecological Systems
The role of the United Nations in the governance of Socio-Ecological SystemsThe role of the United Nations in the governance of Socio-Ecological Systems
The role of the United Nations in the governance of Socio-Ecological Systems
 
La Garrotxa Decideix
La Garrotxa DecideixLa Garrotxa Decideix
La Garrotxa Decideix
 
10 (good) reasons to hire me
10 (good) reasons to hire me10 (good) reasons to hire me
10 (good) reasons to hire me
 
The Role Of Students In The Internationalization Of Engineering Education
The Role Of Students In The Internationalization Of Engineering EducationThe Role Of Students In The Internationalization Of Engineering Education
The Role Of Students In The Internationalization Of Engineering Education
 
SRSP Humanitarian Response to Complex Emergency in Khyber Pakhtunkhwa and FATA
SRSP Humanitarian Response to Complex Emergency in Khyber Pakhtunkhwa and FATASRSP Humanitarian Response to Complex Emergency in Khyber Pakhtunkhwa and FATA
SRSP Humanitarian Response to Complex Emergency in Khyber Pakhtunkhwa and FATA
 
Operations Of Integers
Operations Of IntegersOperations Of Integers
Operations Of Integers
 
Ndikimi i shpenzimeve qeveritare ne inflacjon
Ndikimi i shpenzimeve qeveritare ne inflacjonNdikimi i shpenzimeve qeveritare ne inflacjon
Ndikimi i shpenzimeve qeveritare ne inflacjon
 
Entrepreneurship & creativity, a student\'s perspective
Entrepreneurship & creativity, a student\'s perspectiveEntrepreneurship & creativity, a student\'s perspective
Entrepreneurship & creativity, a student\'s perspective
 
Ibilbideak/TRAYECTORIAS world cafe
Ibilbideak/TRAYECTORIAS world cafe Ibilbideak/TRAYECTORIAS world cafe
Ibilbideak/TRAYECTORIAS world cafe
 

Similar to Internet Safety Final

Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Finalguest0c7b65
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Finalguest5000f0a
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammerguest2e06031d
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammerguest2e06031d
 
Internet Safety Im Chatterer
Internet Safety  Im ChattererInternet Safety  Im Chatterer
Internet Safety Im Chattererguest4fd30d4
 
Internet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, CalebInternet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, Calebguestde489f
 
Internet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, CalebInternet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, Calebguestde489f
 
online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdfjessa451416
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2JayMarkBandoy1
 
Internet Safety Emmabalison
Internet Safety EmmabalisonInternet Safety Emmabalison
Internet Safety Emmabalisonguest13f93438
 
Slick The Spammer
Slick The SpammerSlick The Spammer
Slick The Spammerguest80ad5c
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquetteEmmanuelaSernicul
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Finalguest011ce7
 
Internet Safety Surfer Dude
Internet Safety Surfer DudeInternet Safety Surfer Dude
Internet Safety Surfer Dudeguesta2b256
 
Netiquette Ned Chandler
Netiquette Ned ChandlerNetiquette Ned Chandler
Netiquette Ned Chandlerguest5fc50d1
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of NetiquetteRochelle Nato
 

Similar to Internet Safety Final (20)

Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammer
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammer
 
What Is Spam
What Is SpamWhat Is Spam
What Is Spam
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety Im Chatterer
Internet Safety  Im ChattererInternet Safety  Im Chatterer
Internet Safety Im Chatterer
 
Internet safty
Internet saftyInternet safty
Internet safty
 
Internet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, CalebInternet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, Caleb
 
Internet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, CalebInternet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, Caleb
 
online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdf
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
Internet Safety Emmabalison
Internet Safety EmmabalisonInternet Safety Emmabalison
Internet Safety Emmabalison
 
Slick The Spammer
Slick The SpammerSlick The Spammer
Slick The Spammer
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
Internet Safety Surfer Dude
Internet Safety Surfer DudeInternet Safety Surfer Dude
Internet Safety Surfer Dude
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
 
Netiquette Ned Chandler
Netiquette Ned ChandlerNetiquette Ned Chandler
Netiquette Ned Chandler
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 

Recently uploaded

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

Internet Safety Final

  • 2. Internet Safety The internet is a helpful resource where people can search information on any topic they want. The internet is used to search information on almost any topic. It can also be used to look for jobs and to help out with anything you want. A search engine is used for research. It can also be used for receiving information on a certain subject.
  • 3. World wide info should be given over the internet. A browser is a program that allows users to find documents. Internet Safety On the internet, you NEVER give any personal information. (address, phone number, etc.) Examples of browsers: planetweb and safari WWW stands for World Wide Web. It is different than the internet because the world wide web builds on top of the internet.
  • 4. Internet Safety 3 Don’ts for the internet.
  • 5.   Internet Safety One way to promote safe internet surfing is to have the children’s parents block websites that they don’t want their kids to see. They can also make their website private. Make sure you don't download programs from unusual sites because it can cause a virus.
  • 7. Slick the Spammer Questions What should you do if you receive spam? You should block it and prevent it by not opening your email from people you do not know. Spam is electronic junk mail or junk newsgroup postings. A mailing list is a list of names and addresses to which advertising material is mailed. Spam is like an infection. Some you can get rid of. Some you can’t. Some can have different results like some can crash your computer and some you just can’t get rid of. Spam is a big problem because it eats up a lot of network band with, and wastes people’s time.
  • 8. Slick the Spammer Questions What should you do with an e-mail attachment from someone you do not know? Do NOT open it.
  • 9. Internet Safety By Katie Dellamater
  • 10. Netiquette is the etiquette for cyberspace (rules for behaving on-line) The three basic rules of netiquette are: Use courtesy Use emoticons Be brief online What is a flame, flame war and how can you avoid them? A flame war is a posting to a news group or mailing list A flame war is when an online discussion becomes a series of personal attacks You can avoid a flame war by protecting your reputation and computer, and not going to the same level of extreme as the enemy Netiquette Ned
  • 11.
  • 12. 1. Don’t use the internet with out adult supervision 2. Don’t talk to anyone you don’t know 3. Be responsible 4. Never say or use your name 5. Never post or send a picture of yourself 6. If you see something that makes you uncomfortable inform an adult and close out after the adult sees the site 7. Never give out personal info about you Internet Safety rules