SlideShare a Scribd company logo
BY: YULIIA RADYSH
STUDENT DO-14
VASYL STEFANYK PRECARPATHIAN NATIONAL UNIVERSITY
THERE ARE SOME SIMPLE INTERNET SAFETY TIPS THAT
YOU CAN USE TO KEEP YOUR CHILDREN SAFE ON THE
WEB– SOME OF WHICH YOU WILL LIKELY FIND USEFUL AS
WELL!
1.USE THE PRIVACY SETTINGS ON SOCIAL
NETWORK PLATFORMS.
MANY SOCIAL NETWORKS HAVE COMPLETELY PUBLIC SETTINGS – MEANING
THAT ANYTHING YOUR TEEN OR CHILD POSTS, IS VISIBLE TO THE WORLD WIDE
WEB! SIT WITH YOUR CHILD AND ENSURE ALL THEIR SOCIAL ACCOUNTS UTILIZE
PRIVACY SETTINGS SO THAT THEIR PERSONAL POSTS AND INFORMATION ARE NOT
AVAILABLE TO ANY PREDATORS OR HACKERS.
REMEMBER, 1 IN 10 SOCIAL MEDIA USERS HAVE BEEN THE VICTIM OF A
CYBERATTACK!
2. NEVER POST PERSONAL INFORMATION SUCH
AS PHONE NUMBER, ADDRESS, OR LOCATION.
ESPECIALLY ON POPULAR MOBILE APPS LIKE SNAPCHAT, INSTAGRAM OR VINE.
MOBILE APPS LIKE SNAPCHAT, INSTAGRAM AND VINE ARE SOME OF THE MOST POPULAR
APPS AMONG TEENAGERS AND TWEENS. AND IT’S NO SURPRISE CONSIDERING HOW FUN
AND VIRAL THE VISUAL CONTENT ON THESE APPS CAN BE.
IN THE SAME VEIN, IT’S VERY IMPORTANT FOR YOUNGSTERS TO REMEMBER THAT ONCE
POSTED, PERSONAL INFORMATION CAN INSTANTLY BECOME PUBLIC.
WHEN A TEEN POST PERSONAL AND PRIVATE DETAILS ON THESE POPULAR APPS, THE
OPENNESS AND VIRALITY OF THESE PLATFORMS MEANS SAID INFO CAN EASILY FALL
INTO THE WRONG HANDS.
3. DON’T INCLUDE ANY PERSONAL
INFORMATION IN YOUR SCREEN NAME.
WHEN CHOOSING A SCREEN NAME OR ALIAS ON WEBSITES IT’S VERY IMPORTANT TO
REMIND YOUR CHILD NOT TO INCLUDE THEIR LAST NAME OR DATE OF BIRTH.
THEY MAY THINK DOING SO IS HARMLESS, BUT IT CAN OPEN THE DOORS TO PEOPLE
THEY DON’T KNOW, OR NO LONGER WANT TO INTERACT WITH, DISCOVERING THEIR
IDENTITY AND PRIVATE INFORMATION.
4. NEVER SHARE YOUR PASSWORDS.
YOUR CHILD OR TEEN MAY THINK IT’S HARMLESS TO SHARE THEIR ACCOUNT
PASSWORDS WITH A CLOSE FRIEND- BUT THAT’S CERTAINLY NOT THE CASE.
ONCE THEIR PASSWORD IS OUT OF THEIR HANDS AND IN SOMEONE ELSE’S, THEY HAVE
NO CONTROL OVER WHERE AND FOR HOW LONG THESE ACCOUNTS REMAIN OPEN-
NOR WHO ELSE CAN ACCESS THEM!
ALSO, ALONG THIS NOTE, REMIND YOUR CHILD TO ALWAYS LOG OUT OF THE
ACCOUNTS THEY’VE ACCESSED WHEN USING A PUBLIC COMPUTER. THE LAST THING
ANYONE WANTS IS FOR A COMPLETE STRANGER TO ACCESS THEIR PERSONAL PROFILES.
5. NEVER AGREE TO MEET IN PERSON WITH
ANYONE YOU FIRST “MET” ON THE INTERNET.
IT’S IMPORTANT TO EDUCATE YOUR CHILD THAT THERE ARE MANY FAKE ACCOUNTS
OUT THERE AND AS SUCH THERE ARE MANY POTENTIAL DANGERS IN MEETING FACE-
TO-FACE WITH SOMEONE THEY ONLY KNOW THROUGH THE ONLINE WORLD.
6. NEVER SEND OR RESPOND TO RUDE OR MEAN
MESSAGES OR EMAILS.
REMIND YOUR CHILDREN THAT THE MESSAGES THEY SEND VIA TEXT AND
EMAIL CAN NEVER BE ERASED, AND THEY CAN EASILY BE SHARED– WITH
ANYONE.
ENCOURAGE YOUR CHILD TO ALWAYS TAKE THE HIGHER GROUND. IF THEY
EVER RECEIVE A RUDE OR INAPPROPRIATE MESSAGE, JUST IGNORE IT.
IF THE HURTFUL MESSAGES PERSISTS, YOU AND YOUR CHILD SHOULD
PROMPTLY DELETE AND BLOCK THE INDIVIDUAL HARASSING THEM TO
PREVENT ANY HURT FEELINGS OR UNNECESSARY PROVOCATION.
7. BE CAREFUL BEFORE POSTING ANY IMAGE OR
VIDEO ONLINE.
ENCOURAGE YOUR CHILD TO SHARE ANY IMAGES OR VIDEOS THE PLAN TO POST
ONLINE WITH YOU BEFORE THEY DO SO.
REMIND THEM THAT ONCE THEY DO SO, THESE IMAGES AND VIDEOS ARE NO LONGER
EXCLUSIVELY THEIRS, BUT ARE NOW PART OF THE INTERNET ECOSYSTEM -MEANING
THEY NO LONGER HAVE FULL CONTROL OVER WHO CAN SEE THEM AND/OR HOW
THEY APPEAR.
8. NEVER DOWNLOAD OR INSTALL UNKNOWN
SOFTWARE OR APPLICATIONS.
EVEN WE ADULTS ARE OFTEN DUPED BY FAKE SOFTWARE, SPAM AND APPLICATIONS!
IT’S IMPORTANT TO ADVISE YOUR KIDS AS FAR AS WHAT THEY SHOULD OR SHOULDN’T
DOWNLOAD. THE BEST PRACTICE IS TO ONLY DOWNLOAD FILES FROM TRUSTED
SOURCES AND WHEN IN DOUBT, INSTALL A SITE ADVISOR LIKE WEB OF TRUST OR
NORTON SAFE WEB, TO HELP DECIDE IF A DOWNLOAD SITE IS TRUSTWORTHY OR NOT.
9. EXERCISE EXTREME CAUTION WHEN BUYING
ONLINE.
THE INTERNET OPENS A WHOLE WORLD OF SHOPPING OPPORTUNITIES, BUT IT ALSO
REQUIRES A GREAT DEAL OF CAUTION AND SAFE SPENDING.
WHEN PURCHASING FROM A SITE, MAKE SURE THE SITE IS FROM A RELIABLE, TRUSTED
VENDOR AND UTILIZES ENCRYPTION.
10. SEARCH SAFELY WITH ‘SAFE SEARCH’
SETTINGS AND PROTECTIVE FILTERS.
11. BE CAREFUL ABOUT THE INFORMATION YOU
SHARE AND WHAT YOU ACCESS OVER PUBLIC WI-
FI.
PUBLIC WI-FI SPOTS MAY SEEM HARMLESS BUT THEY ARE GENERALLY HOTBEDS FOR
HACKING ATTACKS.
• privacy settings - налаштування
конфіденційності
• social network platforms - соціальні
мережі
• settings – налаштування
• been the victim - жертва
• location – місцезнаходження
• screen name – псевдонім
• passwords – пароль
• personal profile – персональний
профіль
• erase – стерти
• image – зображення
• download – скачати
• install – встановити
• software – програмне забезпечення
• application – програма
• trusted sources – надійні джерела
• doubt – сумнів
• site advisor – консультант сайту
• shopping opportunities – торгові
можливості
• protective filters – захисні фільтри
THANKS FOR
YOUR
ATTENTION!!!
BY: YULIIA RADYSH
STUDENT DO-14
VASYL STEFANYK PRECARPATHIAN NATIONAL UNIVERSITY

More Related Content

What's hot

Social Media for Parents of Teens
Social Media for Parents of TeensSocial Media for Parents of Teens
Social Media for Parents of Teens
Kate Gukeisen
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015
KanelandSvihlik
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
bgmartinez1971
 
Internet safety
Internet safetyInternet safety
Internet safety
walsh008
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
mkinzie
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
Candice Wimbles
 
Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018
KanelandSvihlik
 
Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents
Jennifer Holena
 
Our Digital World - A look at E-safety issues for teenagers
Our Digital World - A look at E-safety issues for teenagersOur Digital World - A look at E-safety issues for teenagers
Our Digital World - A look at E-safety issues for teenagers
Brian Sharland
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016
KanelandSvihlik
 
mobikid_prezentacja
mobikid_prezentacjamobikid_prezentacja
mobikid_prezentacja
Ludwik Żółtowski
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
Lawrence Fine
 
Using social media responsibly
Using social media responsibly Using social media responsibly
Using social media responsibly
Donal O' Mahony
 
Mark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers' Social Network Presentation
Mark Rogers' Social Network Presentation
Mark Rogers
 
Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017
KanelandSvihlik
 
Parental Control, Internet Safety, Safe Internet for Children
Parental Control, Internet Safety, Safe Internet for ChildrenParental Control, Internet Safety, Safe Internet for Children
Parental Control, Internet Safety, Safe Internet for Children
Nugroho Gito
 
Online Social Networking 101: Monitoring Your Child's Cyber Playground
Online Social Networking 101: Monitoring Your Child's Cyber PlaygroundOnline Social Networking 101: Monitoring Your Child's Cyber Playground
Online Social Networking 101: Monitoring Your Child's Cyber Playground
Stephanie Barnhart
 
Renfrow Internet Safety
Renfrow Internet SafetyRenfrow Internet Safety
Renfrow Internet Safety
mrenfrow
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
alexfinvle
 
How to make screens and the internet safe for Children
How to make screens and the internet safe for Children How to make screens and the internet safe for Children
How to make screens and the internet safe for Children
Tharindu Weerasinghe
 

What's hot (20)

Social Media for Parents of Teens
Social Media for Parents of TeensSocial Media for Parents of Teens
Social Media for Parents of Teens
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018
 
Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents
 
Our Digital World - A look at E-safety issues for teenagers
Our Digital World - A look at E-safety issues for teenagersOur Digital World - A look at E-safety issues for teenagers
Our Digital World - A look at E-safety issues for teenagers
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016
 
mobikid_prezentacja
mobikid_prezentacjamobikid_prezentacja
mobikid_prezentacja
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
 
Using social media responsibly
Using social media responsibly Using social media responsibly
Using social media responsibly
 
Mark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers' Social Network Presentation
Mark Rogers' Social Network Presentation
 
Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017
 
Parental Control, Internet Safety, Safe Internet for Children
Parental Control, Internet Safety, Safe Internet for ChildrenParental Control, Internet Safety, Safe Internet for Children
Parental Control, Internet Safety, Safe Internet for Children
 
Online Social Networking 101: Monitoring Your Child's Cyber Playground
Online Social Networking 101: Monitoring Your Child's Cyber PlaygroundOnline Social Networking 101: Monitoring Your Child's Cyber Playground
Online Social Networking 101: Monitoring Your Child's Cyber Playground
 
Renfrow Internet Safety
Renfrow Internet SafetyRenfrow Internet Safety
Renfrow Internet Safety
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
 
How to make screens and the internet safe for Children
How to make screens and the internet safe for Children How to make screens and the internet safe for Children
How to make screens and the internet safe for Children
 

Similar to Safety online radysh do14

September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
jaurisch
 
Cyber crime awareness
Cyber crime awarenessCyber crime awareness
Cyber crime awareness
Arjun Chetry
 
Protecting Your Children's Online Experience
Protecting Your Children's Online Experience  Protecting Your Children's Online Experience
Protecting Your Children's Online Experience
Lisa McKenzie ★
 
10 Rules To Keep Your Child Safe
10 Rules To Keep Your Child Safe10 Rules To Keep Your Child Safe
10 Rules To Keep Your Child Safe
Shaun Bent
 
10 Rules To Keep Your Child Safe
10 Rules To Keep Your Child Safe10 Rules To Keep Your Child Safe
10 Rules To Keep Your Child Safe
Shaun Bent
 
Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014
- Mark - Fullbright
 
Social networking leaflet
Social networking leafletSocial networking leaflet
Social networking leaflet
Katherine Lyddon
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remaja
Andri Priyatna
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents Presentation
Toby Treacher
 
Internet Safety Keypoints Handout
Internet Safety Keypoints HandoutInternet Safety Keypoints Handout
Internet Safety Keypoints Handout
Ollie Bray
 
Top ten-tips
Top ten-tipsTop ten-tips
Top ten-tips
Amit Pal Singh
 
6 Ways to Become a Better Digital Parent
6 Ways to Become a Better Digital Parent6 Ways to Become a Better Digital Parent
6 Ways to Become a Better Digital Parent
Your eKavach
 
Safety advice from Vodaphone
Safety advice from VodaphoneSafety advice from Vodaphone
Safety advice from Vodaphone
Katherine Lyddon
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
amulhall
 
Safer internet day mo i cpc 2 feb 2014sb
Safer internet day  mo i cpc 2 feb 2014sbSafer internet day  mo i cpc 2 feb 2014sb
Safer internet day mo i cpc 2 feb 2014sb
SafeChildUAE1
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
cpitchford
 
Internet safety
Internet safetyInternet safety
Internet safety
dsansford
 
Cyber Security Tips for Parents.pdf
Cyber Security Tips for Parents.pdfCyber Security Tips for Parents.pdf
Cyber Security Tips for Parents.pdf
infosec train
 
Cyber Security Tips for Parents
Cyber Security Tips for ParentsCyber Security Tips for Parents
Cyber Security Tips for Parents
priyanshamadhwal2
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
tholman77
 

Similar to Safety online radysh do14 (20)

September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
 
Cyber crime awareness
Cyber crime awarenessCyber crime awareness
Cyber crime awareness
 
Protecting Your Children's Online Experience
Protecting Your Children's Online Experience  Protecting Your Children's Online Experience
Protecting Your Children's Online Experience
 
10 Rules To Keep Your Child Safe
10 Rules To Keep Your Child Safe10 Rules To Keep Your Child Safe
10 Rules To Keep Your Child Safe
 
10 Rules To Keep Your Child Safe
10 Rules To Keep Your Child Safe10 Rules To Keep Your Child Safe
10 Rules To Keep Your Child Safe
 
Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014
 
Social networking leaflet
Social networking leafletSocial networking leaflet
Social networking leaflet
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remaja
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents Presentation
 
Internet Safety Keypoints Handout
Internet Safety Keypoints HandoutInternet Safety Keypoints Handout
Internet Safety Keypoints Handout
 
Top ten-tips
Top ten-tipsTop ten-tips
Top ten-tips
 
6 Ways to Become a Better Digital Parent
6 Ways to Become a Better Digital Parent6 Ways to Become a Better Digital Parent
6 Ways to Become a Better Digital Parent
 
Safety advice from Vodaphone
Safety advice from VodaphoneSafety advice from Vodaphone
Safety advice from Vodaphone
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
 
Safer internet day mo i cpc 2 feb 2014sb
Safer internet day  mo i cpc 2 feb 2014sbSafer internet day  mo i cpc 2 feb 2014sb
Safer internet day mo i cpc 2 feb 2014sb
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Cyber Security Tips for Parents.pdf
Cyber Security Tips for Parents.pdfCyber Security Tips for Parents.pdf
Cyber Security Tips for Parents.pdf
 
Cyber Security Tips for Parents
Cyber Security Tips for ParentsCyber Security Tips for Parents
Cyber Security Tips for Parents
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
 

More from Sergiy Sydoriv

Distance learming menyuk ivanna pee-34_2
Distance learming menyuk ivanna pee-34_2Distance learming menyuk ivanna pee-34_2
Distance learming menyuk ivanna pee-34_2
Sergiy Sydoriv
 
Developing early learning nekhay
Developing early learning nekhayDeveloping early learning nekhay
Developing early learning nekhay
Sergiy Sydoriv
 
Entertainment in great britain & ivano frankivsk
Entertainment in great britain & ivano frankivskEntertainment in great britain & ivano frankivsk
Entertainment in great britain & ivano frankivsk
Sergiy Sydoriv
 
Health wth havrylo pee 26
Health wth havrylo pee 26Health wth havrylo pee 26
Health wth havrylo pee 26
Sergiy Sydoriv
 
Without borders project grand report
Without borders project grand reportWithout borders project grand report
Without borders project grand report
Sergiy Sydoriv
 
Pimsler method shcherbyuk
Pimsler method shcherbyukPimsler method shcherbyuk
Pimsler method shcherbyuk
Sergiy Sydoriv
 
Method shekhter feduik
Method shekhter feduikMethod shekhter feduik
Method shekhter feduik
Sergiy Sydoriv
 
Distance learning english in if college by ira osadtsa
Distance learning english in if college by ira osadtsaDistance learning english in if college by ira osadtsa
Distance learning english in if college by ira osadtsa
Sergiy Sydoriv
 
Skulte osadtsa
Skulte osadtsaSkulte osadtsa
Skulte osadtsa
Sergiy Sydoriv
 
Method of illya frank mykhailiv
Method of illya frank mykhailivMethod of illya frank mykhailiv
Method of illya frank mykhailiv
Sergiy Sydoriv
 
Method of suggestion leibyuk
Method of suggestion leibyukMethod of suggestion leibyuk
Method of suggestion leibyuk
Sergiy Sydoriv
 
Methods of games voloshchuk
Methods of games voloshchukMethods of games voloshchuk
Methods of games voloshchuk
Sergiy Sydoriv
 
Jolly phonics kaniuk
Jolly phonics kaniukJolly phonics kaniuk
Jolly phonics kaniuk
Sergiy Sydoriv
 
Presentation practice-production method kozak
Presentation practice-production method kozakPresentation practice-production method kozak
Presentation practice-production method kozak
Sergiy Sydoriv
 
Phenomenon based learning kovalska
Phenomenon based learning kovalskaPhenomenon based learning kovalska
Phenomenon based learning kovalska
Sergiy Sydoriv
 
Helen doron hrynishak pee-35
Helen doron hrynishak pee-35Helen doron hrynishak pee-35
Helen doron hrynishak pee-35
Sergiy Sydoriv
 
Computer software methods portetska
Computer software methods portetskaComputer software methods portetska
Computer software methods portetska
Sergiy Sydoriv
 
West method shpytko
West method shpytkoWest method shpytko
West method shpytko
Sergiy Sydoriv
 
Flipped learning sribnyak
Flipped learning sribnyakFlipped learning sribnyak
Flipped learning sribnyak
Sergiy Sydoriv
 
Kazachiner sysak
Kazachiner sysakKazachiner sysak
Kazachiner sysak
Sergiy Sydoriv
 

More from Sergiy Sydoriv (20)

Distance learming menyuk ivanna pee-34_2
Distance learming menyuk ivanna pee-34_2Distance learming menyuk ivanna pee-34_2
Distance learming menyuk ivanna pee-34_2
 
Developing early learning nekhay
Developing early learning nekhayDeveloping early learning nekhay
Developing early learning nekhay
 
Entertainment in great britain & ivano frankivsk
Entertainment in great britain & ivano frankivskEntertainment in great britain & ivano frankivsk
Entertainment in great britain & ivano frankivsk
 
Health wth havrylo pee 26
Health wth havrylo pee 26Health wth havrylo pee 26
Health wth havrylo pee 26
 
Without borders project grand report
Without borders project grand reportWithout borders project grand report
Without borders project grand report
 
Pimsler method shcherbyuk
Pimsler method shcherbyukPimsler method shcherbyuk
Pimsler method shcherbyuk
 
Method shekhter feduik
Method shekhter feduikMethod shekhter feduik
Method shekhter feduik
 
Distance learning english in if college by ira osadtsa
Distance learning english in if college by ira osadtsaDistance learning english in if college by ira osadtsa
Distance learning english in if college by ira osadtsa
 
Skulte osadtsa
Skulte osadtsaSkulte osadtsa
Skulte osadtsa
 
Method of illya frank mykhailiv
Method of illya frank mykhailivMethod of illya frank mykhailiv
Method of illya frank mykhailiv
 
Method of suggestion leibyuk
Method of suggestion leibyukMethod of suggestion leibyuk
Method of suggestion leibyuk
 
Methods of games voloshchuk
Methods of games voloshchukMethods of games voloshchuk
Methods of games voloshchuk
 
Jolly phonics kaniuk
Jolly phonics kaniukJolly phonics kaniuk
Jolly phonics kaniuk
 
Presentation practice-production method kozak
Presentation practice-production method kozakPresentation practice-production method kozak
Presentation practice-production method kozak
 
Phenomenon based learning kovalska
Phenomenon based learning kovalskaPhenomenon based learning kovalska
Phenomenon based learning kovalska
 
Helen doron hrynishak pee-35
Helen doron hrynishak pee-35Helen doron hrynishak pee-35
Helen doron hrynishak pee-35
 
Computer software methods portetska
Computer software methods portetskaComputer software methods portetska
Computer software methods portetska
 
West method shpytko
West method shpytkoWest method shpytko
West method shpytko
 
Flipped learning sribnyak
Flipped learning sribnyakFlipped learning sribnyak
Flipped learning sribnyak
 
Kazachiner sysak
Kazachiner sysakKazachiner sysak
Kazachiner sysak
 

Recently uploaded

skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
Mohammad Al-Dhahabi
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
deepaannamalai16
 
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
Payaamvohra1
 
Information and Communication Technology in Education
Information and Communication Technology in EducationInformation and Communication Technology in Education
Information and Communication Technology in Education
MJDuyan
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
indexPub
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
Steve Thomason
 
adjectives.ppt for class 1 to 6, grammar
adjectives.ppt for class 1 to 6, grammaradjectives.ppt for class 1 to 6, grammar
adjectives.ppt for class 1 to 6, grammar
7DFarhanaMohammed
 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
Kalna College
 
220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science
Kalna College
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
zuzanka
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
zuzanka
 
Skimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S EliotSkimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S Eliot
nitinpv4ai
 
220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology
Kalna College
 
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxxSimple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
RandolphRadicy
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
Nguyen Thanh Tu Collection
 
Observational Learning
Observational Learning Observational Learning
Observational Learning
sanamushtaq922
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
سمير بسيوني
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
Prof. Dr. K. Adisesha
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
Celine George
 
How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17
Celine George
 

Recently uploaded (20)

skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
 
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
 
Information and Communication Technology in Education
Information and Communication Technology in EducationInformation and Communication Technology in Education
Information and Communication Technology in Education
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
 
adjectives.ppt for class 1 to 6, grammar
adjectives.ppt for class 1 to 6, grammaradjectives.ppt for class 1 to 6, grammar
adjectives.ppt for class 1 to 6, grammar
 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
 
220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
 
Skimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S EliotSkimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S Eliot
 
220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology
 
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxxSimple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
 
Observational Learning
Observational Learning Observational Learning
Observational Learning
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
 
How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17
 

Safety online radysh do14

  • 1. BY: YULIIA RADYSH STUDENT DO-14 VASYL STEFANYK PRECARPATHIAN NATIONAL UNIVERSITY
  • 2. THERE ARE SOME SIMPLE INTERNET SAFETY TIPS THAT YOU CAN USE TO KEEP YOUR CHILDREN SAFE ON THE WEB– SOME OF WHICH YOU WILL LIKELY FIND USEFUL AS WELL!
  • 3. 1.USE THE PRIVACY SETTINGS ON SOCIAL NETWORK PLATFORMS. MANY SOCIAL NETWORKS HAVE COMPLETELY PUBLIC SETTINGS – MEANING THAT ANYTHING YOUR TEEN OR CHILD POSTS, IS VISIBLE TO THE WORLD WIDE WEB! SIT WITH YOUR CHILD AND ENSURE ALL THEIR SOCIAL ACCOUNTS UTILIZE PRIVACY SETTINGS SO THAT THEIR PERSONAL POSTS AND INFORMATION ARE NOT AVAILABLE TO ANY PREDATORS OR HACKERS. REMEMBER, 1 IN 10 SOCIAL MEDIA USERS HAVE BEEN THE VICTIM OF A CYBERATTACK!
  • 4. 2. NEVER POST PERSONAL INFORMATION SUCH AS PHONE NUMBER, ADDRESS, OR LOCATION. ESPECIALLY ON POPULAR MOBILE APPS LIKE SNAPCHAT, INSTAGRAM OR VINE. MOBILE APPS LIKE SNAPCHAT, INSTAGRAM AND VINE ARE SOME OF THE MOST POPULAR APPS AMONG TEENAGERS AND TWEENS. AND IT’S NO SURPRISE CONSIDERING HOW FUN AND VIRAL THE VISUAL CONTENT ON THESE APPS CAN BE. IN THE SAME VEIN, IT’S VERY IMPORTANT FOR YOUNGSTERS TO REMEMBER THAT ONCE POSTED, PERSONAL INFORMATION CAN INSTANTLY BECOME PUBLIC. WHEN A TEEN POST PERSONAL AND PRIVATE DETAILS ON THESE POPULAR APPS, THE OPENNESS AND VIRALITY OF THESE PLATFORMS MEANS SAID INFO CAN EASILY FALL INTO THE WRONG HANDS.
  • 5. 3. DON’T INCLUDE ANY PERSONAL INFORMATION IN YOUR SCREEN NAME. WHEN CHOOSING A SCREEN NAME OR ALIAS ON WEBSITES IT’S VERY IMPORTANT TO REMIND YOUR CHILD NOT TO INCLUDE THEIR LAST NAME OR DATE OF BIRTH. THEY MAY THINK DOING SO IS HARMLESS, BUT IT CAN OPEN THE DOORS TO PEOPLE THEY DON’T KNOW, OR NO LONGER WANT TO INTERACT WITH, DISCOVERING THEIR IDENTITY AND PRIVATE INFORMATION.
  • 6. 4. NEVER SHARE YOUR PASSWORDS. YOUR CHILD OR TEEN MAY THINK IT’S HARMLESS TO SHARE THEIR ACCOUNT PASSWORDS WITH A CLOSE FRIEND- BUT THAT’S CERTAINLY NOT THE CASE. ONCE THEIR PASSWORD IS OUT OF THEIR HANDS AND IN SOMEONE ELSE’S, THEY HAVE NO CONTROL OVER WHERE AND FOR HOW LONG THESE ACCOUNTS REMAIN OPEN- NOR WHO ELSE CAN ACCESS THEM! ALSO, ALONG THIS NOTE, REMIND YOUR CHILD TO ALWAYS LOG OUT OF THE ACCOUNTS THEY’VE ACCESSED WHEN USING A PUBLIC COMPUTER. THE LAST THING ANYONE WANTS IS FOR A COMPLETE STRANGER TO ACCESS THEIR PERSONAL PROFILES.
  • 7. 5. NEVER AGREE TO MEET IN PERSON WITH ANYONE YOU FIRST “MET” ON THE INTERNET. IT’S IMPORTANT TO EDUCATE YOUR CHILD THAT THERE ARE MANY FAKE ACCOUNTS OUT THERE AND AS SUCH THERE ARE MANY POTENTIAL DANGERS IN MEETING FACE- TO-FACE WITH SOMEONE THEY ONLY KNOW THROUGH THE ONLINE WORLD.
  • 8. 6. NEVER SEND OR RESPOND TO RUDE OR MEAN MESSAGES OR EMAILS. REMIND YOUR CHILDREN THAT THE MESSAGES THEY SEND VIA TEXT AND EMAIL CAN NEVER BE ERASED, AND THEY CAN EASILY BE SHARED– WITH ANYONE. ENCOURAGE YOUR CHILD TO ALWAYS TAKE THE HIGHER GROUND. IF THEY EVER RECEIVE A RUDE OR INAPPROPRIATE MESSAGE, JUST IGNORE IT. IF THE HURTFUL MESSAGES PERSISTS, YOU AND YOUR CHILD SHOULD PROMPTLY DELETE AND BLOCK THE INDIVIDUAL HARASSING THEM TO PREVENT ANY HURT FEELINGS OR UNNECESSARY PROVOCATION.
  • 9. 7. BE CAREFUL BEFORE POSTING ANY IMAGE OR VIDEO ONLINE. ENCOURAGE YOUR CHILD TO SHARE ANY IMAGES OR VIDEOS THE PLAN TO POST ONLINE WITH YOU BEFORE THEY DO SO. REMIND THEM THAT ONCE THEY DO SO, THESE IMAGES AND VIDEOS ARE NO LONGER EXCLUSIVELY THEIRS, BUT ARE NOW PART OF THE INTERNET ECOSYSTEM -MEANING THEY NO LONGER HAVE FULL CONTROL OVER WHO CAN SEE THEM AND/OR HOW THEY APPEAR.
  • 10. 8. NEVER DOWNLOAD OR INSTALL UNKNOWN SOFTWARE OR APPLICATIONS. EVEN WE ADULTS ARE OFTEN DUPED BY FAKE SOFTWARE, SPAM AND APPLICATIONS! IT’S IMPORTANT TO ADVISE YOUR KIDS AS FAR AS WHAT THEY SHOULD OR SHOULDN’T DOWNLOAD. THE BEST PRACTICE IS TO ONLY DOWNLOAD FILES FROM TRUSTED SOURCES AND WHEN IN DOUBT, INSTALL A SITE ADVISOR LIKE WEB OF TRUST OR NORTON SAFE WEB, TO HELP DECIDE IF A DOWNLOAD SITE IS TRUSTWORTHY OR NOT.
  • 11. 9. EXERCISE EXTREME CAUTION WHEN BUYING ONLINE. THE INTERNET OPENS A WHOLE WORLD OF SHOPPING OPPORTUNITIES, BUT IT ALSO REQUIRES A GREAT DEAL OF CAUTION AND SAFE SPENDING. WHEN PURCHASING FROM A SITE, MAKE SURE THE SITE IS FROM A RELIABLE, TRUSTED VENDOR AND UTILIZES ENCRYPTION.
  • 12. 10. SEARCH SAFELY WITH ‘SAFE SEARCH’ SETTINGS AND PROTECTIVE FILTERS.
  • 13. 11. BE CAREFUL ABOUT THE INFORMATION YOU SHARE AND WHAT YOU ACCESS OVER PUBLIC WI- FI. PUBLIC WI-FI SPOTS MAY SEEM HARMLESS BUT THEY ARE GENERALLY HOTBEDS FOR HACKING ATTACKS.
  • 14. • privacy settings - налаштування конфіденційності • social network platforms - соціальні мережі • settings – налаштування • been the victim - жертва • location – місцезнаходження • screen name – псевдонім • passwords – пароль • personal profile – персональний профіль • erase – стерти • image – зображення • download – скачати • install – встановити • software – програмне забезпечення • application – програма • trusted sources – надійні джерела • doubt – сумнів • site advisor – консультант сайту • shopping opportunities – торгові можливості • protective filters – захисні фільтри
  • 15. THANKS FOR YOUR ATTENTION!!! BY: YULIIA RADYSH STUDENT DO-14 VASYL STEFANYK PRECARPATHIAN NATIONAL UNIVERSITY