SlideShare a Scribd company logo
Internet Safety  By: Gwen 	(all images are from clip art)
How to Stay Safe   It's a good idea to talk with them about computers and to stay open to their questions and curiosity. Set clear rules for Internet use.  Always sit with your kids at this age when they're online. Make very clear not share personal information such as their real name, address, phone number, or passwords with people they meet online. If a site encourages kids to submit their names to personalize the Web content, help your kids create online nicknames that don't give away personal information.
INTERNET What should the internet be used for? Looking up information. You can communicate with your friends. You should not talk to strangers. Looking up pictures. Buy things. Watch Videos Look up the news. MANY MORE The internet is a global system of consistent computer networks. WWW-World Wide Web… a collection of internet sites. Search Engine- Used for information. It matches the words given and then finds the answers. Examples are- GOOGLE, ASK.COM
Browsers A web browser is a software function for retrieving, presenting, and traversing information resources on the World Wide Web. Google Yahoo Information Super Highway digital communication systems and the internet telecommunications network. Connectivity Easy to find information It is possible to like art and entertainment made by anybody Information should be given about information such as explorers, you shouldn’t put stuff that is not true One way to promote internet safety is to not give information  about you on sites.
Info.. Spam is the abuse of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately. ... The internet is a computer network consisting of a worldwide network of computer networks that use the TCP/IP network protocols to facilitate data transmission ...
How to Stay Safe On The Internet. Don’t tell a stranger or someone you are not positive about knowing any info. About your self. When you are online make sure you know exactly who you are talking to and make sure you know them if your giving any info, out. If you tell them your first name make sure that’s it. Be nice to people online because you don’t know who you are dealing with, if they send messages online just ignore them.

More Related Content

What's hot

Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
guest0c7b65
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
harriscountypubliclibrary
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
Leelet1121
 
Internet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, CalebInternet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, Caleb
guestde489f
 
Internet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, CalebInternet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, Caleb
guestde489f
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
PantegoChristian
 
The essential rules of netiquette by Halina
The essential rules of netiquette by HalinaThe essential rules of netiquette by Halina
The essential rules of netiquette by Halina
Self-employed
 
Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For Educators
Maria Petropulos
 
CYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESHCYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESH
Yogesh Prajapati
 
Netiquette
NetiquetteNetiquette
Netiquette
tangytangling
 
Internet Security
Internet SecurityInternet Security
Internet Security
alookulo
 
Internet safety 2013 copy
Internet safety 2013 copyInternet safety 2013 copy
Internet safety 2013 copy
mryoe
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
rowenick
 
Safety in cyberspace
Safety in cyberspaceSafety in cyberspace
Safety in cyberspace
JanealW
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
smartins7
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & Teachers
Mark White
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Naheelah Irving
 

What's hot (17)

Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
Internet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, CalebInternet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, Caleb
 
Internet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, CalebInternet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, Caleb
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
The essential rules of netiquette by Halina
The essential rules of netiquette by HalinaThe essential rules of netiquette by Halina
The essential rules of netiquette by Halina
 
Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For Educators
 
CYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESHCYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESH
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Internet safety 2013 copy
Internet safety 2013 copyInternet safety 2013 copy
Internet safety 2013 copy
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Safety in cyberspace
Safety in cyberspaceSafety in cyberspace
Safety in cyberspace
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & Teachers
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 

Similar to Internet Safety Gwen

Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
Nurizcka
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
tholman77
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
SrijanMukhopadhyay1
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
guest400c7e0
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
guest400c7e0
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your Desktop
Andy Smith
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
guest5000f0a
 
Ctss Safe Internet For Kids
Ctss Safe Internet For KidsCtss Safe Internet For Kids
Ctss Safe Internet For Kids
kwazy
 
Presentación kefalonia[1]
Presentación kefalonia[1]Presentación kefalonia[1]
Presentación kefalonia[1]
Miriam Ortega
 
Chatter
ChatterChatter
Chatter
guest35533f
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
cpitchford
 
Internet safty
Internet saftyInternet safty
Internet safty
guestce38b330
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011
KanelandSvihlik
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
Cathleen Richardson
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks Slideshare
Ollie Bray
 
Staying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘NetStaying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘Net
Daniel Owens
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for Parents
Rodolfo Salazar
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
EmmanuelaSernicul
 
Digital literacy
Digital literacyDigital literacy
Digital literacy
Amanda lee
 
Hamad Rabban.It
Hamad Rabban.ItHamad Rabban.It
Hamad Rabban.It
HamadRabban
 

Similar to Internet Safety Gwen (20)

Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your Desktop
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
Ctss Safe Internet For Kids
Ctss Safe Internet For KidsCtss Safe Internet For Kids
Ctss Safe Internet For Kids
 
Presentación kefalonia[1]
Presentación kefalonia[1]Presentación kefalonia[1]
Presentación kefalonia[1]
 
Chatter
ChatterChatter
Chatter
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
 
Internet safty
Internet saftyInternet safty
Internet safty
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks Slideshare
 
Staying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘NetStaying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘Net
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for Parents
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
Digital literacy
Digital literacyDigital literacy
Digital literacy
 
Hamad Rabban.It
Hamad Rabban.ItHamad Rabban.It
Hamad Rabban.It
 

Recently uploaded

Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 

Recently uploaded (20)

Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 

Internet Safety Gwen

  • 1. Internet Safety By: Gwen (all images are from clip art)
  • 2. How to Stay Safe It's a good idea to talk with them about computers and to stay open to their questions and curiosity. Set clear rules for Internet use. Always sit with your kids at this age when they're online. Make very clear not share personal information such as their real name, address, phone number, or passwords with people they meet online. If a site encourages kids to submit their names to personalize the Web content, help your kids create online nicknames that don't give away personal information.
  • 3. INTERNET What should the internet be used for? Looking up information. You can communicate with your friends. You should not talk to strangers. Looking up pictures. Buy things. Watch Videos Look up the news. MANY MORE The internet is a global system of consistent computer networks. WWW-World Wide Web… a collection of internet sites. Search Engine- Used for information. It matches the words given and then finds the answers. Examples are- GOOGLE, ASK.COM
  • 4. Browsers A web browser is a software function for retrieving, presenting, and traversing information resources on the World Wide Web. Google Yahoo Information Super Highway digital communication systems and the internet telecommunications network. Connectivity Easy to find information It is possible to like art and entertainment made by anybody Information should be given about information such as explorers, you shouldn’t put stuff that is not true One way to promote internet safety is to not give information about you on sites.
  • 5. Info.. Spam is the abuse of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately. ... The internet is a computer network consisting of a worldwide network of computer networks that use the TCP/IP network protocols to facilitate data transmission ...
  • 6. How to Stay Safe On The Internet. Don’t tell a stranger or someone you are not positive about knowing any info. About your self. When you are online make sure you know exactly who you are talking to and make sure you know them if your giving any info, out. If you tell them your first name make sure that’s it. Be nice to people online because you don’t know who you are dealing with, if they send messages online just ignore them.