SlideShare a Scribd company logo
Internet Safety Caroline
Surfer Dude The internet is a place where you can search for anything you want to. It is also a global network. Internet should be used to look up information, look for jobs, or play games that have information in them. ` Browser is a program that allows you to access all the information available on the web. Two examples of a browser are, Internet Explorer and Mozilla Firefox. WWW stands for world wide web. It is different from the internet because it builds on top of the internet.
A search engine is used to help you find something that you are looking for. Google and ask are search engines that are geared towards kids. To promote internet safety you can block websites that are not appropriate for kids.  Three benefits from joining the information super highway are to get help with homework, it increases reading skills, and to connect with places around the world. You should NEVER give out your passwords, address, telephone or credit card information over the internet. Although, you CAN give out your world wide information.
Internet SafetyPictures from  clip art
Netiquette Ned Netiquette is the etiquette of the internet.  The basic rule of netiquette is remember the person you are talking to is a human. Which means treat them the way you want to be treated  You should stay away from using all capital letters because it is considered shouting & impolite. Picture from   
Being online A flame war is when you insult someone and when someone is angry and takes it out on other people. You do not want to insulate people because you could start a flame war.  To prevent a flame war, be polite and never give out hurtful information because people will be offended.  What you should  do if you become uncomfortable with a topic or site you find on the Internet, you should get out the chat. An emoticon is icon that shows emotions.
Im  a chatterer  An online chat is any kind of one on one communication over the internet.
You can only give out information that won’t reveal any personal info about you, unless you are talking to one of your close friends. You should never give out information that involves your personal life such as: your real name, pictures of you, your school, address or your parents’ credit card numbers Remember, if you need a screen name to be in a chat always use a nickname!
Internet Safety By Lyle
Slick The Spammer Spam slows down your computer. Normally spam comes from someone using a mailing list, or many people he sends the same e-mail to. Spam is like an infection, because once you get spammed, the amount of it will keep growing as your e-mail address gets sold to other spammers.
Reducing Spam There are three ways to reduce spam. 2)       Do not give out your e-mail address (not very easy, is it?) Set your e-mail filters. It won’t stop spam, but it will reduce it. 3)       Report the      spammer’s ISP, which is not easy: it’s practically rocket science. The spammer will send his mail through many e-mail aliases.

More Related Content

What's hot

Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Finalguest011ce7
 
Internet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersInternet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and Beginners
Rajesh Soundararajan
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guidemjtheman
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Leslie Witten
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
Yash Jain
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
Arunmozhi Ramesh
 
Cyber safety by Lorraine Flores
Cyber safety by Lorraine FloresCyber safety by Lorraine Flores
Cyber safety by Lorraine Flores
lorrflores
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
harriscountypubliclibrary
 
Internet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, CalebInternet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, Caleb
guestde489f
 
Internet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, CalebInternet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, Calebguestde489f
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
Leelet1121
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
PantegoChristian
 
Internet Safety Emmabalison
Internet Safety EmmabalisonInternet Safety Emmabalison
Internet Safety Emmabalisonguest13f93438
 
Rules of netiquette
Rules of netiquetteRules of netiquette
Rules of netiquetteklknight79
 

What's hot (18)

Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
Internet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersInternet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and Beginners
 
What Is Spam
What Is SpamWhat Is Spam
What Is Spam
 
Im A Chatter Al
Im A Chatter AlIm A Chatter Al
Im A Chatter Al
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Spam
SpamSpam
Spam
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Cyber safety by Lorraine Flores
Cyber safety by Lorraine FloresCyber safety by Lorraine Flores
Cyber safety by Lorraine Flores
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, CalebInternet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, Caleb
 
Internet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, CalebInternet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, Caleb
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
Internet Safety Emmabalison
Internet Safety EmmabalisonInternet Safety Emmabalison
Internet Safety Emmabalison
 
Rules of netiquette
Rules of netiquetteRules of netiquette
Rules of netiquette
 

Viewers also liked

5th Grade Jeopardy, Civil War
5th Grade Jeopardy, Civil War5th Grade Jeopardy, Civil War
5th Grade Jeopardy, Civil War
martha_lamb
 
Shakespeare's Julius Caesar Background
Shakespeare's Julius Caesar BackgroundShakespeare's Julius Caesar Background
Shakespeare's Julius Caesar Background
mrsallen
 
Glacial Erosion
Glacial ErosionGlacial Erosion
Glacial Erosion
neilgood
 
Glaciers
GlaciersGlaciers
Glaciers
Karen Morales
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
bgmartinez1971
 
Fractions - Add, Subtract, Multiply and Divide
Fractions - Add, Subtract, Multiply and DivideFractions - Add, Subtract, Multiply and Divide
Fractions - Add, Subtract, Multiply and Divide
sondrateer
 
What is a fraction
What is a fractionWhat is a fraction
What is a fraction
olivia73
 
Elements of drama
Elements of dramaElements of drama
Elements of drama
amorenaz
 

Viewers also liked (8)

5th Grade Jeopardy, Civil War
5th Grade Jeopardy, Civil War5th Grade Jeopardy, Civil War
5th Grade Jeopardy, Civil War
 
Shakespeare's Julius Caesar Background
Shakespeare's Julius Caesar BackgroundShakespeare's Julius Caesar Background
Shakespeare's Julius Caesar Background
 
Glacial Erosion
Glacial ErosionGlacial Erosion
Glacial Erosion
 
Glaciers
GlaciersGlaciers
Glaciers
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
Fractions - Add, Subtract, Multiply and Divide
Fractions - Add, Subtract, Multiply and DivideFractions - Add, Subtract, Multiply and Divide
Fractions - Add, Subtract, Multiply and Divide
 
What is a fraction
What is a fractionWhat is a fraction
What is a fraction
 
Elements of drama
Elements of dramaElements of drama
Elements of drama
 

Similar to Internet Saftey Final

Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Finalguest0c7b65
 
Internet Safety Im Chatterer
Internet Safety  Im ChattererInternet Safety  Im Chatterer
Internet Safety Im Chattererguest4fd30d4
 
Slick The Spammer
Slick The SpammerSlick The Spammer
Slick The Spammerguest80ad5c
 
Internet Safety Surfer Dude
Internet Safety Surfer DudeInternet Safety Surfer Dude
Internet Safety Surfer Dudeguesta2b256
 
Internet safty
Internet saftyInternet safty
Internet safty
guestce38b330
 
Internet Safety: I
Internet Safety: IInternet Safety: I
Internet Safety: Imlegan31
 
Netiquette Ned Chandler
Netiquette Ned ChandlerNetiquette Ned Chandler
Netiquette Ned Chandlerguest5fc50d1
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationcey.ruth
 
Internet Safety Power Point
Internet Safety Power PointInternet Safety Power Point
Internet Safety Power Pointguest24931c
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
JayMarkBandoy1
 
online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdf
jessa451416
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
EmmanuelaSernicul
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
Cathleen Richardson
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
Nurizcka
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
catherinelibranda
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Finalguest5a7b36
 
SH003 Lesson 2_ Netiquette using the Internet.pptx
SH003 Lesson 2_ Netiquette using the Internet.pptxSH003 Lesson 2_ Netiquette using the Internet.pptx
SH003 Lesson 2_ Netiquette using the Internet.pptx
MarkAnthonyAurellano
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
dpl
 
The internet
The internetThe internet
The internetsevoo12
 

Similar to Internet Saftey Final (20)

Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
Internet Safety Im Chatterer
Internet Safety  Im ChattererInternet Safety  Im Chatterer
Internet Safety Im Chatterer
 
Slick The Spammer
Slick The SpammerSlick The Spammer
Slick The Spammer
 
Internet Safety Surfer Dude
Internet Safety Surfer DudeInternet Safety Surfer Dude
Internet Safety Surfer Dude
 
Internet safty
Internet saftyInternet safty
Internet safty
 
Internet Safety: I
Internet Safety: IInternet Safety: I
Internet Safety: I
 
Netiquette Ned Chandler
Netiquette Ned ChandlerNetiquette Ned Chandler
Netiquette Ned Chandler
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Internet Safety Power Point
Internet Safety Power PointInternet Safety Power Point
Internet Safety Power Point
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdf
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
SH003 Lesson 2_ Netiquette using the Internet.pptx
SH003 Lesson 2_ Netiquette using the Internet.pptxSH003 Lesson 2_ Netiquette using the Internet.pptx
SH003 Lesson 2_ Netiquette using the Internet.pptx
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
The internet
The internetThe internet
The internet
 
10things
10things10things
10things
 

Recently uploaded

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 

Recently uploaded (20)

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 

Internet Saftey Final

  • 2. Surfer Dude The internet is a place where you can search for anything you want to. It is also a global network. Internet should be used to look up information, look for jobs, or play games that have information in them. ` Browser is a program that allows you to access all the information available on the web. Two examples of a browser are, Internet Explorer and Mozilla Firefox. WWW stands for world wide web. It is different from the internet because it builds on top of the internet.
  • 3. A search engine is used to help you find something that you are looking for. Google and ask are search engines that are geared towards kids. To promote internet safety you can block websites that are not appropriate for kids. Three benefits from joining the information super highway are to get help with homework, it increases reading skills, and to connect with places around the world. You should NEVER give out your passwords, address, telephone or credit card information over the internet. Although, you CAN give out your world wide information.
  • 5. Netiquette Ned Netiquette is the etiquette of the internet.  The basic rule of netiquette is remember the person you are talking to is a human. Which means treat them the way you want to be treated You should stay away from using all capital letters because it is considered shouting & impolite. Picture from  
  • 6. Being online A flame war is when you insult someone and when someone is angry and takes it out on other people. You do not want to insulate people because you could start a flame war. To prevent a flame war, be polite and never give out hurtful information because people will be offended.  What you should do if you become uncomfortable with a topic or site you find on the Internet, you should get out the chat. An emoticon is icon that shows emotions.
  • 7. Im a chatterer An online chat is any kind of one on one communication over the internet.
  • 8.
  • 9. You can only give out information that won’t reveal any personal info about you, unless you are talking to one of your close friends. You should never give out information that involves your personal life such as: your real name, pictures of you, your school, address or your parents’ credit card numbers Remember, if you need a screen name to be in a chat always use a nickname!
  • 11. Slick The Spammer Spam slows down your computer. Normally spam comes from someone using a mailing list, or many people he sends the same e-mail to. Spam is like an infection, because once you get spammed, the amount of it will keep growing as your e-mail address gets sold to other spammers.
  • 12. Reducing Spam There are three ways to reduce spam. 2) Do not give out your e-mail address (not very easy, is it?) Set your e-mail filters. It won’t stop spam, but it will reduce it. 3) Report the spammer’s ISP, which is not easy: it’s practically rocket science. The spammer will send his mail through many e-mail aliases.