SlideShare a Scribd company logo
Internet Safety  By: Jamy McClain
How can you be safe on the internet? Be nice to people on the internet.  Don’t put any personal thing about you on the internet.  Don’t use bad language and don’t break laws.
Browsers. Examples:  Google and Bing.  Browsers search the websites of the topic you type into it.
Safety tips.  Make sure no one knows your password so people can’t write stuff on your e-mail or other stuff you have.  Say nice things not bad because everything you put on the internet can be found again.  Only go to safe websites.  Don’t talk to strangers.  Ask you parents before going on the internet.

More Related Content

What's hot

Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
Leelet1121
 
Rules of netiquette
Rules of netiquetteRules of netiquette
Rules of netiquette
klknight79
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementary
jaimejoyh
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
tdsparks3
 
Chatter
ChatterChatter
Chatter
guest35533f
 
Internet safety
Internet safety Internet safety
Internet safety
bhavya mohindru
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
Pamela Moeai
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety
Kigose
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
Department of Defense
 
The 10 core rules of netiqutte
The 10 core rules of netiqutteThe 10 core rules of netiqutte
The 10 core rules of netiqutte
MudgeoTorso1091
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
alyssacarricato
 
Presentation to parents
Presentation to parentsPresentation to parents
Presentation to parents
sirchriss
 
Surfing Safe on the Net, a school project presented at #Bett Show 2015, London
Surfing Safe on the Net, a school project presented at #Bett Show 2015, LondonSurfing Safe on the Net, a school project presented at #Bett Show 2015, London
Surfing Safe on the Net, a school project presented at #Bett Show 2015, London
Eva Buyuksimkesyan
 
Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet
Queens Library
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
Candice Wimbles
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
SearchLock
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
cey.ruth
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
Arunmozhi Ramesh
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
Yash Jain
 
10things
10things10things
10things
samthedragon
 

What's hot (20)

Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
Rules of netiquette
Rules of netiquetteRules of netiquette
Rules of netiquette
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementary
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Chatter
ChatterChatter
Chatter
 
Internet safety
Internet safety Internet safety
Internet safety
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
 
The 10 core rules of netiqutte
The 10 core rules of netiqutteThe 10 core rules of netiqutte
The 10 core rules of netiqutte
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Presentation to parents
Presentation to parentsPresentation to parents
Presentation to parents
 
Surfing Safe on the Net, a school project presented at #Bett Show 2015, London
Surfing Safe on the Net, a school project presented at #Bett Show 2015, LondonSurfing Safe on the Net, a school project presented at #Bett Show 2015, London
Surfing Safe on the Net, a school project presented at #Bett Show 2015, London
 
Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
10things
10things10things
10things
 

Viewers also liked

WWII: D-Day to VE-Day
WWII: D-Day to VE-DayWWII: D-Day to VE-Day
WWII: D-Day to VE-Day
ddunsavage
 
E-safety quiz
E-safety quizE-safety quiz
E-safety quiz
tonybattista
 
Causes WWII
Causes WWIICauses WWII
Airlines - Whitney Sewell
Airlines - Whitney SewellAirlines - Whitney Sewell
Airlines - Whitney Sewell
Whitney Sewell
 
Individual sections development exercise #5
Individual sections development exercise #5Individual sections development exercise #5
Individual sections development exercise #5
tykl94
 
Open data day open data and govt
Open data day   open data and govtOpen data day   open data and govt
Open data day open data and govt
Lori Bush
 
Shabnam
ShabnamShabnam
Shabnam
Mool Chand
 
RPforEUH2031
RPforEUH2031RPforEUH2031
RPforEUH2031
FPiccirillo
 
Penerjemahan Teks Teknologi Informasi
Penerjemahan Teks Teknologi InformasiPenerjemahan Teks Teknologi Informasi
Penerjemahan Teks Teknologi Informasi
Bahtera
 
107081013李燕聪工业设计(工学)071 闹钟
107081013李燕聪工业设计(工学)071 闹钟107081013李燕聪工业设计(工学)071 闹钟
107081013李燕聪工业设计(工学)071 闹钟
zust
 
Holidays in Libraries: Rethinking Our Programming
Holidays in Libraries: Rethinking Our ProgrammingHolidays in Libraries: Rethinking Our Programming
Holidays in Libraries: Rethinking Our Programming
S Bryce Kozla
 
2010 Uni Serv Skills Session Meeting Potential Of Online Meeting Spaces
2010 Uni Serv Skills Session Meeting Potential Of Online Meeting Spaces2010 Uni Serv Skills Session Meeting Potential Of Online Meeting Spaces
2010 Uni Serv Skills Session Meeting Potential Of Online Meeting Spaces
NEA
 
Beautiful British Landscape Photographs
Beautiful British Landscape PhotographsBeautiful British Landscape Photographs
Beautiful British Landscape Photographs
CQ Marketing Academy
 
Tourism month calendar of events [r]
Tourism month calendar of events [r]Tourism month calendar of events [r]
Tourism month calendar of events [r]
Blogatize.net
 
Gold wars - A golden renaissance presentation
Gold wars   - A golden renaissance presentationGold wars   - A golden renaissance presentation
Gold wars - A golden renaissance presentation
Hochleitner Marine
 
Comic Art
Comic ArtComic Art
Comic Art
bmoldashel
 
拆卸分析报告吴敏虹
拆卸分析报告吴敏虹拆卸分析报告吴敏虹
拆卸分析报告吴敏虹
zust
 
Proyecto Fede
Proyecto FedeProyecto Fede
Proyecto Fede
marioparedescostales
 
Tobin's q and Industrial Organization
Tobin's q and Industrial OrganizationTobin's q and Industrial Organization
Tobin's q and Industrial Organization
Trisnadi Wijaya
 

Viewers also liked (20)

WWII: D-Day to VE-Day
WWII: D-Day to VE-DayWWII: D-Day to VE-Day
WWII: D-Day to VE-Day
 
E-safety quiz
E-safety quizE-safety quiz
E-safety quiz
 
Causes WWII
Causes WWIICauses WWII
Causes WWII
 
Airlines - Whitney Sewell
Airlines - Whitney SewellAirlines - Whitney Sewell
Airlines - Whitney Sewell
 
Individual sections development exercise #5
Individual sections development exercise #5Individual sections development exercise #5
Individual sections development exercise #5
 
Open data day open data and govt
Open data day   open data and govtOpen data day   open data and govt
Open data day open data and govt
 
весна
веснавесна
весна
 
Shabnam
ShabnamShabnam
Shabnam
 
RPforEUH2031
RPforEUH2031RPforEUH2031
RPforEUH2031
 
Penerjemahan Teks Teknologi Informasi
Penerjemahan Teks Teknologi InformasiPenerjemahan Teks Teknologi Informasi
Penerjemahan Teks Teknologi Informasi
 
107081013李燕聪工业设计(工学)071 闹钟
107081013李燕聪工业设计(工学)071 闹钟107081013李燕聪工业设计(工学)071 闹钟
107081013李燕聪工业设计(工学)071 闹钟
 
Holidays in Libraries: Rethinking Our Programming
Holidays in Libraries: Rethinking Our ProgrammingHolidays in Libraries: Rethinking Our Programming
Holidays in Libraries: Rethinking Our Programming
 
2010 Uni Serv Skills Session Meeting Potential Of Online Meeting Spaces
2010 Uni Serv Skills Session Meeting Potential Of Online Meeting Spaces2010 Uni Serv Skills Session Meeting Potential Of Online Meeting Spaces
2010 Uni Serv Skills Session Meeting Potential Of Online Meeting Spaces
 
Beautiful British Landscape Photographs
Beautiful British Landscape PhotographsBeautiful British Landscape Photographs
Beautiful British Landscape Photographs
 
Tourism month calendar of events [r]
Tourism month calendar of events [r]Tourism month calendar of events [r]
Tourism month calendar of events [r]
 
Gold wars - A golden renaissance presentation
Gold wars   - A golden renaissance presentationGold wars   - A golden renaissance presentation
Gold wars - A golden renaissance presentation
 
Comic Art
Comic ArtComic Art
Comic Art
 
拆卸分析报告吴敏虹
拆卸分析报告吴敏虹拆卸分析报告吴敏虹
拆卸分析报告吴敏虹
 
Proyecto Fede
Proyecto FedeProyecto Fede
Proyecto Fede
 
Tobin's q and Industrial Organization
Tobin's q and Industrial OrganizationTobin's q and Industrial Organization
Tobin's q and Industrial Organization
 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 

Internet Safty

  • 1. Internet Safety By: Jamy McClain
  • 2. How can you be safe on the internet? Be nice to people on the internet. Don’t put any personal thing about you on the internet. Don’t use bad language and don’t break laws.
  • 3. Browsers. Examples: Google and Bing. Browsers search the websites of the topic you type into it.
  • 4. Safety tips. Make sure no one knows your password so people can’t write stuff on your e-mail or other stuff you have. Say nice things not bad because everything you put on the internet can be found again. Only go to safe websites. Don’t talk to strangers. Ask you parents before going on the internet.