SlideShare a Scribd company logo
By: Emma, Hope, Ali and  Caleb
Surfer Dude…
Surfer dude… Ways that the internet should be used  Cyber security can limit the amount of material that is available to kids and you could make the home website a kid safe search engine. Talking to kids about the risks and minuses of using the internet is also a good way to promote internet safety but share with them the advantages of the internet and why it is there for them. Educational material, reading materials that interests readers, pen-pal sites, parental information and reference materials  The internet should not be used to show: inappropriate websites, addresses, phone numbers, full names and personal information and pictures.
Slick the Spammer! By Hope Sievert
What is a Spam? A spam is an unnecessary mail or newsgroup posting that you may receive. It can involve email advertizing for a certain product or just an un-asked email. How Can I Outsmart the Spammer? ,[object Object]
You should create an anonymous account while keeping in touch by Usenet groups; forums at chat rooms at somewhere like hiotmail.com
Start Fresh! Delete your old email address and create a new one!,[object Object]
What Should You do if  You receive Spam?
Netiquette Ned Netiquette is the etiquette of the internet and teaches you to always be nice and courteous. Flame Wars: 	A flame is an e-mail. A flame war is sending mean e-mails or too many emails to another internet user. You can avoid a flame war by being calm, ignoring the message or sending a polite message back asking them what they meant.
Netiquette Ned Two things to remember while being online is to be smart and always follow the rules. Stay away from all capital letter phrases because it signifies yelling or anger. If you become uncomfortable with a topic or site you find on the internet, you should click out of it or go to a new webpage.
Netiquette Ned The difference between a public and a private e-mail message is that everybody can see public e-mails but private is just between you and the receiver.  An emoticon is an icon that shows emotion and can reveal too many things that are violent, mean or impolite.  
IM a Chatter Ali
What is a chat room? *A  chat room is a current conversation on the computer between two or more people. In chat rooms, users can enter text by typing on the keyboard and entering text. Two ways you can stay safe in a chat room: *if you’re asked for a screen name for a chat room, use a nickname- never your real name *if you get an email telling you not to tell your parents about it, don’t reply and tell an adult right away
CHAT ROOM SAFETY! Chat rooms are a fun way to communicate with your friends and family!  However, it is on the internet, which means there are some safety rules you must follow. What  should I do if I read something in a chat room that makes me uncomfortable? *Leave the chat room and tell an adult immediately. What type of information can you give out in a chat room? *nicknames and  information that would not give away any personal information What type of information can’t you give out in a chat room? *your real name, passwords, telephone numbers, address, banking details, etc.
Surfer Dude…

More Related Content

What's hot

Brochure
BrochureBrochure
Brochurejrj6819
 
Internet Saftey Final
Internet Saftey FinalInternet Saftey Final
Internet Saftey Finalguest252cc9
 
E safety assembly
E safety assemblyE safety assembly
E safety assembly
JEcomputing
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Finalguest5a7b36
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquettedhabyahalk
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Naheelah Irving
 
Digital citizenship for Elementary Students
Digital citizenship for Elementary StudentsDigital citizenship for Elementary Students
Digital citizenship for Elementary Students
kgilliard13
 
Presentación kefalonia[1]
Presentación kefalonia[1]Presentación kefalonia[1]
Presentación kefalonia[1]Miriam Ortega
 
Internet Safety Netiquette Ned
Internet Safety Netiquette NedInternet Safety Netiquette Ned
Internet Safety Netiquette Nedguest7ac5b0e4
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
Leelet1121
 
Netiquette hci
Netiquette hciNetiquette hci
Netiquette hciLeonardYam
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for students
Larry Magid
 
Netsafety Parents
Netsafety ParentsNetsafety Parents
Netsafety Parents
Rachel Whalley
 
Internet Safety Surfer Dude
Internet Safety Surfer DudeInternet Safety Surfer Dude
Internet Safety Surfer Dudeguesta2b256
 
Netiquette
NetiquetteNetiquette
Netiquette
Mohd Aizat Idris
 

What's hot (18)

Brochure
BrochureBrochure
Brochure
 
Internet Saftey Final
Internet Saftey FinalInternet Saftey Final
Internet Saftey Final
 
E safety assembly
E safety assemblyE safety assembly
E safety assembly
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Digital citizenship for Elementary Students
Digital citizenship for Elementary StudentsDigital citizenship for Elementary Students
Digital citizenship for Elementary Students
 
Presentación kefalonia[1]
Presentación kefalonia[1]Presentación kefalonia[1]
Presentación kefalonia[1]
 
Internet Safety Netiquette Ned
Internet Safety Netiquette NedInternet Safety Netiquette Ned
Internet Safety Netiquette Ned
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
Netiquette hci
Netiquette hciNetiquette hci
Netiquette hci
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for students
 
Netsafety Parents
Netsafety ParentsNetsafety Parents
Netsafety Parents
 
Chatter
ChatterChatter
Chatter
 
Hungerfordnetiquette
HungerfordnetiquetteHungerfordnetiquette
Hungerfordnetiquette
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety Surfer Dude
Internet Safety Surfer DudeInternet Safety Surfer Dude
Internet Safety Surfer Dude
 
Netiquette
NetiquetteNetiquette
Netiquette
 

Viewers also liked

Synopsis reverby 'normal exposure'
Synopsis reverby 'normal exposure'Synopsis reverby 'normal exposure'
Synopsis reverby 'normal exposure'bueno buono good
 
2013 cpi brochure_en
2013 cpi brochure_en2013 cpi brochure_en
2013 cpi brochure_en
bueno buono good
 
LIBERTÀ STAMPA 2014
LIBERTÀ STAMPA 2014LIBERTÀ STAMPA 2014
LIBERTÀ STAMPA 2014
bueno buono good
 
Privacy facebook 2015
Privacy facebook 2015Privacy facebook 2015
Privacy facebook 2015
bueno buono good
 
Health Care Reform
Health Care ReformHealth Care Reform
Health Care Reformabudfulo
 
KÜR Klub
KÜR KlubKÜR Klub
KÜR Klub
Vereb István
 
36 VtåRum Svenska Två
36 VtåRum Svenska Två36 VtåRum Svenska Två
36 VtåRum Svenska Tvåguestc9e8137
 
Rexona1
Rexona1Rexona1
Rexona1
songmekong
 
Citas Con Write N Cite.
Citas Con Write N Cite.Citas Con Write N Cite.
Citas Con Write N Cite.mariajmp
 
Boschee CI5475 Final Project-Poetry Unit
Boschee CI5475 Final Project-Poetry UnitBoschee CI5475 Final Project-Poetry Unit
Boschee CI5475 Final Project-Poetry Unit
Dixie Boschee
 
FILE SYNCHRONIZATION SYSTEMS SURVEY
FILE SYNCHRONIZATION SYSTEMS SURVEYFILE SYNCHRONIZATION SYSTEMS SURVEY
FILE SYNCHRONIZATION SYSTEMS SURVEY
csandit
 

Viewers also liked (20)

Anonplus project plan
Anonplus project planAnonplus project plan
Anonplus project plan
 
Partecipanti marsone
Partecipanti marsonePartecipanti marsone
Partecipanti marsone
 
Synopsis reverby 'normal exposure'
Synopsis reverby 'normal exposure'Synopsis reverby 'normal exposure'
Synopsis reverby 'normal exposure'
 
2013 cpi brochure_en
2013 cpi brochure_en2013 cpi brochure_en
2013 cpi brochure_en
 
Piano nyc cigni 2014
Piano nyc cigni 2014Piano nyc cigni 2014
Piano nyc cigni 2014
 
Minsud 2014
Minsud 2014Minsud 2014
Minsud 2014
 
LIBERTÀ STAMPA 2014
LIBERTÀ STAMPA 2014LIBERTÀ STAMPA 2014
LIBERTÀ STAMPA 2014
 
Privacy facebook 2015
Privacy facebook 2015Privacy facebook 2015
Privacy facebook 2015
 
Health Care Reform
Health Care ReformHealth Care Reform
Health Care Reform
 
KÜR Klub
KÜR KlubKÜR Klub
KÜR Klub
 
36 VtåRum Svenska Två
36 VtåRum Svenska Två36 VtåRum Svenska Två
36 VtåRum Svenska Två
 
Rexona1
Rexona1Rexona1
Rexona1
 
MELVAY ALLENS WILLIAM
MELVAY ALLENS WILLIAMMELVAY ALLENS WILLIAM
MELVAY ALLENS WILLIAM
 
Citas Con Write N Cite.
Citas Con Write N Cite.Citas Con Write N Cite.
Citas Con Write N Cite.
 
Ppt ova
Ppt ovaPpt ova
Ppt ova
 
2RQThruster
2RQThruster2RQThruster
2RQThruster
 
Capa 4
Capa  4Capa  4
Capa 4
 
Lokesh 2016
Lokesh 2016Lokesh 2016
Lokesh 2016
 
Boschee CI5475 Final Project-Poetry Unit
Boschee CI5475 Final Project-Poetry UnitBoschee CI5475 Final Project-Poetry Unit
Boschee CI5475 Final Project-Poetry Unit
 
FILE SYNCHRONIZATION SYSTEMS SURVEY
FILE SYNCHRONIZATION SYSTEMS SURVEYFILE SYNCHRONIZATION SYSTEMS SURVEY
FILE SYNCHRONIZATION SYSTEMS SURVEY
 

Similar to Internet Safety Hope, Emma, Ali, Caleb

Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Finalguest0c7b65
 
Internet Safety: I
Internet Safety: IInternet Safety: I
Internet Safety: Imlegan31
 
Internet Safety Im Chatterer
Internet Safety  Im ChattererInternet Safety  Im Chatterer
Internet Safety Im Chattererguest4fd30d4
 
Internet safty
Internet saftyInternet safty
Internet safty
guestce38b330
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Finalguest5558240
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Finalguest5000f0a
 
online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdf
jessa451416
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Finalguest011ce7
 
Internet Safety Power Point
Internet Safety Power PointInternet Safety Power Point
Internet Safety Power Pointguest24931c
 
Mac Kenzi D. Group#3
Mac Kenzi D. Group#3Mac Kenzi D. Group#3
Mac Kenzi D. Group#3guest3e462b5
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammerguest2e06031d
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammerguest2e06031d
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminartholman77
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
Cathleen Richardson
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationcey.ruth
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
TeacherNicaPrintable
 
Netiquettes
NetiquettesNetiquettes
Netiquettes
Sonal Bharal
 
CyBeR sAfEtY
CyBeR sAfEtYCyBeR sAfEtY
CyBeR sAfEtY
'Atheana' mmmmmhumm
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
JayMarkBandoy1
 
Q3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfQ3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdf
BryanSmile
 

Similar to Internet Safety Hope, Emma, Ali, Caleb (20)

Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
Internet Safety: I
Internet Safety: IInternet Safety: I
Internet Safety: I
 
Internet Safety Im Chatterer
Internet Safety  Im ChattererInternet Safety  Im Chatterer
Internet Safety Im Chatterer
 
Internet safty
Internet saftyInternet safty
Internet safty
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdf
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
Internet Safety Power Point
Internet Safety Power PointInternet Safety Power Point
Internet Safety Power Point
 
Mac Kenzi D. Group#3
Mac Kenzi D. Group#3Mac Kenzi D. Group#3
Mac Kenzi D. Group#3
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammer
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammer
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
 
Netiquettes
NetiquettesNetiquettes
Netiquettes
 
CyBeR sAfEtY
CyBeR sAfEtYCyBeR sAfEtY
CyBeR sAfEtY
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
Q3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfQ3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdf
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 

Internet Safety Hope, Emma, Ali, Caleb

  • 1. By: Emma, Hope, Ali and Caleb
  • 3. Surfer dude… Ways that the internet should be used Cyber security can limit the amount of material that is available to kids and you could make the home website a kid safe search engine. Talking to kids about the risks and minuses of using the internet is also a good way to promote internet safety but share with them the advantages of the internet and why it is there for them. Educational material, reading materials that interests readers, pen-pal sites, parental information and reference materials The internet should not be used to show: inappropriate websites, addresses, phone numbers, full names and personal information and pictures.
  • 4. Slick the Spammer! By Hope Sievert
  • 5.
  • 6. You should create an anonymous account while keeping in touch by Usenet groups; forums at chat rooms at somewhere like hiotmail.com
  • 7.
  • 8. What Should You do if You receive Spam?
  • 9. Netiquette Ned Netiquette is the etiquette of the internet and teaches you to always be nice and courteous. Flame Wars: A flame is an e-mail. A flame war is sending mean e-mails or too many emails to another internet user. You can avoid a flame war by being calm, ignoring the message or sending a polite message back asking them what they meant.
  • 10. Netiquette Ned Two things to remember while being online is to be smart and always follow the rules. Stay away from all capital letter phrases because it signifies yelling or anger. If you become uncomfortable with a topic or site you find on the internet, you should click out of it or go to a new webpage.
  • 11. Netiquette Ned The difference between a public and a private e-mail message is that everybody can see public e-mails but private is just between you and the receiver. An emoticon is an icon that shows emotion and can reveal too many things that are violent, mean or impolite.  
  • 13. What is a chat room? *A chat room is a current conversation on the computer between two or more people. In chat rooms, users can enter text by typing on the keyboard and entering text. Two ways you can stay safe in a chat room: *if you’re asked for a screen name for a chat room, use a nickname- never your real name *if you get an email telling you not to tell your parents about it, don’t reply and tell an adult right away
  • 14. CHAT ROOM SAFETY! Chat rooms are a fun way to communicate with your friends and family! However, it is on the internet, which means there are some safety rules you must follow. What should I do if I read something in a chat room that makes me uncomfortable? *Leave the chat room and tell an adult immediately. What type of information can you give out in a chat room? *nicknames and information that would not give away any personal information What type of information can’t you give out in a chat room? *your real name, passwords, telephone numbers, address, banking details, etc.
  • 16. Surfer dude… Ways that the internet should be used Cyber security can limit the amount of material that is available to kids and you could make the home website a kid safe search engine. Talking to kids about the risks and minuses of using the internet is also a good way to promote internet safety but share with them the advantages of the internet and why it is there for them. Educational material, reading materials that interests readers, pen-pal sites, parental information and reference materials The internet should not be used to show: inappropriate websites, addresses, phone numbers, full names and personal information and pictures.