SlideShare a Scribd company logo
1 of 16
Staying Safe on the Internet
We LOVE the Internet!
    The internet is an amazing place! You probably use it most days at College to
     research work and at home, on your PC or phone just to have fun.

    When you imagine how many billions of people are using the Internet at any one
     time, then overall it is actually a pretty safe place. However, as with anything
     so good, there are bound to be a few things that are not so positive.

    The Internet and particularly Social Media do have a few pitfalls and you
     need to be aware of them in order to use it confidently and safely

    Email
    Websites
    Search Engines
    Moodle
    Social Media
We really LOVE Social Media!

  http://www.facebook.com/?sk=welcome#!/BurnleyCollegeALevels
How safe are you?
               Watch ‘Claire Thought She Knew’
          http://www.youtube.com/watch?v=Z5WEnqnq1Hk




    http://www.youtube.com/watch?v=qoEG7R5Len0

    http://old.digizen.org/cyberbullying/fullFilm.aspx
Have you ever….?
The A-Z(ish!) Quiz of Net Safety
A

     What A can be sent via email that could
      contain a virus?
     What A is a computer program that
      displays adverts on your computer
      screen, often installed without you
      realising?
     What A is software you should install on
      your computer before surfing the
      internet?
B

     What B should you do to anyone who
      adds you on messenger sites that you do
      not know?
     What B is a Social Networking site that
      used to be popular with teens, but has
      since lost many users to facebook?
     What B is short for weblog?
C
     What C is a place on the internet where you
      can communicate to lots of people or private
      message other users?
     What C involves the use of information and
      communication technologies to support
      deliberate, repeated, and hostile behaviour by
      an individual or group that is intended to harm
      others?
     What C is a small file that is sent to a web
      browser and stored on a user’s computer?
      These files can then be read by a server to
      remember preferences or personal details.
F

     What F is a popular social networking website
      with over 800 million registered (not
      necessarily active!) users worldwide?
     What F is a means of preventing certain types
      of material reaching your computer?
     What F is a program that checks all data
      passing between your computer and the
      internet to see if it is safe and permitted?
G & M!

    What G is the term used to describe when an adult encourages a
     youngster to meet up with them; this is often done in chat rooms?
    What G is the email service provided by a popular search
     engine?

    What M is the name for bad software like viruses, spyware etc.?
    What M is the official name of a service like Yahoo or MSN used
     to chat online?
    What M is the name of the act of supervising what goes on in a
     chatroom or other online service?
    What M is the name of a social networking site that lost popularity
     to Facebook and that Justin Timberlake recently purchased a
     stake in?
P
       What P is the name of the settings you should always
        update when on Social Networking websites?
       What P is often four digits and used to confirm
        identity, particularly at ATM machines?
       What P is a series of letters, numbers and/or symbols
        that only you should know that is used to confirm your
        identity?
       What P is an attempt to trick people into visiting
        malicious websites in order to steal personal
        information/details often via pretend emails from
        banks?
S
     What S is the name given to the act of using
      the internet to find and make friends and stay
      in touch with people?
     What S are people you do not know that you
      should not add on Social Network sites and
      Messenger services?
     What S is a program that lets you make
      phones over the internet? You can talk to
      other users of this program for free or pay to
      call ordinary telephones.
T & V!
  What T is a method of sending short messages from
   one mobile phone to another – sometimes referred to
   as SMS?
  What T is a malware program that is not what it seems
   to be? These pretend to be useful programs like word
   processors but really they install spyware or open up
   your computer to hackers?
  What V can infect your computer by deleting your
   files, stealing your data or even let hackers take
   control of your hardware?
  What V is the term used to describe a video that gets
   popular simply through internet sharing?
For more information…

 http://ceop.police.uk/

 http://www.thinkuknow.co.uk/

 http://www.youtube.com/watch?v=qoEG7R5Len0

 http://old.digizen.org/cyberbullying/fullFilm.aspx
Finally…


 If you are being bullied online by
      anyone in College, speak to
     your tutor immediately. For
   YOUR safety, online bullying is
   taken VERY seriously, and can
   lead to suspension or expulsion
             from College.

More Related Content

What's hot

Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018KanelandSvihlik
 
Becybersmart
BecybersmartBecybersmart
BecybersmartVelma
 
Mark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers
 
Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devicesErnest Staats
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety SlideshareLawrence Fine
 
Cat and Mouse: A Student's Guide to Evading Parents, Teachers, and Authoritat...
Cat and Mouse: A Student's Guide to Evading Parents, Teachers, and Authoritat...Cat and Mouse: A Student's Guide to Evading Parents, Teachers, and Authoritat...
Cat and Mouse: A Student's Guide to Evading Parents, Teachers, and Authoritat...Mitch Spaulding
 
Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017KanelandSvihlik
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareNurizcka
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentationCandice Wimbles
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parentssafetyseminar
 
Lower School Social Media: Session #1
Lower School Social Media: Session #1Lower School Social Media: Session #1
Lower School Social Media: Session #1meganhowardatwalker
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of NetiquetteRochelle Nato
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint bgmartinez1971
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquetterowenick
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guidemjtheman
 
Cybersafety
CybersafetyCybersafety
Cybersafetyf3tm3
 
Rules of netiquette & cyber crimes
Rules of netiquette & cyber crimesRules of netiquette & cyber crimes
Rules of netiquette & cyber crimesmarkgernale24
 

What's hot (20)

Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018
 
Chatter
ChatterChatter
Chatter
 
Becybersmart
BecybersmartBecybersmart
Becybersmart
 
Mark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers' Social Network Presentation
Mark Rogers' Social Network Presentation
 
Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devices
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
Cat and Mouse: A Student's Guide to Evading Parents, Teachers, and Authoritat...
Cat and Mouse: A Student's Guide to Evading Parents, Teachers, and Authoritat...Cat and Mouse: A Student's Guide to Evading Parents, Teachers, and Authoritat...
Cat and Mouse: A Student's Guide to Evading Parents, Teachers, and Authoritat...
 
Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parents
 
Lower School Social Media: Session #1
Lower School Social Media: Session #1Lower School Social Media: Session #1
Lower School Social Media: Session #1
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Internet safety for kids
Internet safety for kidsInternet safety for kids
Internet safety for kids
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
 
Cybersafety
CybersafetyCybersafety
Cybersafety
 
Rules of netiquette & cyber crimes
Rules of netiquette & cyber crimesRules of netiquette & cyber crimes
Rules of netiquette & cyber crimes
 

Viewers also liked

Presentació "Entenent la xina actual a través del comportament dels nous cons...
Presentació "Entenent la xina actual a través del comportament dels nous cons...Presentació "Entenent la xina actual a través del comportament dels nous cons...
Presentació "Entenent la xina actual a través del comportament dels nous cons...Roger Nierga
 
Principales conclusiones de la mesa redonda "El fenómeno de las redes sociale...
Principales conclusiones de la mesa redonda "El fenómeno de las redes sociale...Principales conclusiones de la mesa redonda "El fenómeno de las redes sociale...
Principales conclusiones de la mesa redonda "El fenómeno de las redes sociale...Roger Nierga
 
¡El momento de emprendedores es Hoy!
¡El momento de emprendedores es Hoy!¡El momento de emprendedores es Hoy!
¡El momento de emprendedores es Hoy!Fábrica Multimedia
 
Xiii congreso i mega encuentro estetica ecuador cv
Xiii congreso i mega encuentro estetica ecuador cvXiii congreso i mega encuentro estetica ecuador cv
Xiii congreso i mega encuentro estetica ecuador cvHenry Villavicencio
 
Idol databases2
Idol databases2Idol databases2
Idol databases2Kieffala
 
Blackboard basics Hanning
Blackboard basics HanningBlackboard basics Hanning
Blackboard basics HanningKieffala
 

Viewers also liked (7)

Presentació "Entenent la xina actual a través del comportament dels nous cons...
Presentació "Entenent la xina actual a través del comportament dels nous cons...Presentació "Entenent la xina actual a través del comportament dels nous cons...
Presentació "Entenent la xina actual a través del comportament dels nous cons...
 
Junta batiente dubló
Junta batiente dublóJunta batiente dubló
Junta batiente dubló
 
Principales conclusiones de la mesa redonda "El fenómeno de las redes sociale...
Principales conclusiones de la mesa redonda "El fenómeno de las redes sociale...Principales conclusiones de la mesa redonda "El fenómeno de las redes sociale...
Principales conclusiones de la mesa redonda "El fenómeno de las redes sociale...
 
¡El momento de emprendedores es Hoy!
¡El momento de emprendedores es Hoy!¡El momento de emprendedores es Hoy!
¡El momento de emprendedores es Hoy!
 
Xiii congreso i mega encuentro estetica ecuador cv
Xiii congreso i mega encuentro estetica ecuador cvXiii congreso i mega encuentro estetica ecuador cv
Xiii congreso i mega encuentro estetica ecuador cv
 
Idol databases2
Idol databases2Idol databases2
Idol databases2
 
Blackboard basics Hanning
Blackboard basics HanningBlackboard basics Hanning
Blackboard basics Hanning
 

Similar to Using the Internet Safely

Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your DesktopAndy Smith
 
Empowerment lesson 2.ppt
Empowerment lesson 2.pptEmpowerment lesson 2.ppt
Empowerment lesson 2.pptAndrew_Braza
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminartholman77
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your DesktopAndy Smith
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
Facebook for Parents
Facebook for ParentsFacebook for Parents
Facebook for Parentsamelialouise
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Childcpitchford
 
Parent engagement cvps
Parent engagement cvpsParent engagement cvps
Parent engagement cvpsjeygenraam
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threatsmkinzie
 
The use of internet web 120
The use of internet web 120The use of internet web 120
The use of internet web 120jram2113
 
Evans on Being Smart with Social Media
Evans on Being Smart with Social MediaEvans on Being Smart with Social Media
Evans on Being Smart with Social MediaDr. Joel Evans
 

Similar to Using the Internet Safely (20)

Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your Desktop
 
Empowerment lesson 2.ppt
Empowerment lesson 2.pptEmpowerment lesson 2.ppt
Empowerment lesson 2.ppt
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
 
EMPOWERMENT.pptx
EMPOWERMENT.pptxEMPOWERMENT.pptx
EMPOWERMENT.pptx
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your Desktop
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
 
Tot edu eng.
Tot edu eng.Tot edu eng.
Tot edu eng.
 
INTERNET
INTERNETINTERNET
INTERNET
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Facebook for Parents
Facebook for ParentsFacebook for Parents
Facebook for Parents
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
 
Hamad Rabban.It
Hamad Rabban.ItHamad Rabban.It
Hamad Rabban.It
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
 
Digital Citizenship Flash Card Deck - A Platform for Good
Digital Citizenship Flash Card Deck - A Platform for GoodDigital Citizenship Flash Card Deck - A Platform for Good
Digital Citizenship Flash Card Deck - A Platform for Good
 
Internet Safety - Parents
Internet Safety - ParentsInternet Safety - Parents
Internet Safety - Parents
 
Internet safty
Internet saftyInternet safty
Internet safty
 
Parent engagement cvps
Parent engagement cvpsParent engagement cvps
Parent engagement cvps
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
The use of internet web 120
The use of internet web 120The use of internet web 120
The use of internet web 120
 
Evans on Being Smart with Social Media
Evans on Being Smart with Social MediaEvans on Being Smart with Social Media
Evans on Being Smart with Social Media
 

Recently uploaded

DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 

Recently uploaded (20)

DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 

Using the Internet Safely

  • 1. Staying Safe on the Internet
  • 2. We LOVE the Internet!  The internet is an amazing place! You probably use it most days at College to research work and at home, on your PC or phone just to have fun.  When you imagine how many billions of people are using the Internet at any one time, then overall it is actually a pretty safe place. However, as with anything so good, there are bound to be a few things that are not so positive.  The Internet and particularly Social Media do have a few pitfalls and you need to be aware of them in order to use it confidently and safely  Email  Websites  Search Engines  Moodle  Social Media
  • 3. We really LOVE Social Media! http://www.facebook.com/?sk=welcome#!/BurnleyCollegeALevels
  • 4. How safe are you? Watch ‘Claire Thought She Knew’ http://www.youtube.com/watch?v=Z5WEnqnq1Hk http://www.youtube.com/watch?v=qoEG7R5Len0 http://old.digizen.org/cyberbullying/fullFilm.aspx
  • 6. The A-Z(ish!) Quiz of Net Safety
  • 7. A  What A can be sent via email that could contain a virus?  What A is a computer program that displays adverts on your computer screen, often installed without you realising?  What A is software you should install on your computer before surfing the internet?
  • 8. B  What B should you do to anyone who adds you on messenger sites that you do not know?  What B is a Social Networking site that used to be popular with teens, but has since lost many users to facebook?  What B is short for weblog?
  • 9. C  What C is a place on the internet where you can communicate to lots of people or private message other users?  What C involves the use of information and communication technologies to support deliberate, repeated, and hostile behaviour by an individual or group that is intended to harm others?  What C is a small file that is sent to a web browser and stored on a user’s computer? These files can then be read by a server to remember preferences or personal details.
  • 10. F  What F is a popular social networking website with over 800 million registered (not necessarily active!) users worldwide?  What F is a means of preventing certain types of material reaching your computer?  What F is a program that checks all data passing between your computer and the internet to see if it is safe and permitted?
  • 11. G & M!  What G is the term used to describe when an adult encourages a youngster to meet up with them; this is often done in chat rooms?  What G is the email service provided by a popular search engine?  What M is the name for bad software like viruses, spyware etc.?  What M is the official name of a service like Yahoo or MSN used to chat online?  What M is the name of the act of supervising what goes on in a chatroom or other online service?  What M is the name of a social networking site that lost popularity to Facebook and that Justin Timberlake recently purchased a stake in?
  • 12. P  What P is the name of the settings you should always update when on Social Networking websites?  What P is often four digits and used to confirm identity, particularly at ATM machines?  What P is a series of letters, numbers and/or symbols that only you should know that is used to confirm your identity?  What P is an attempt to trick people into visiting malicious websites in order to steal personal information/details often via pretend emails from banks?
  • 13. S  What S is the name given to the act of using the internet to find and make friends and stay in touch with people?  What S are people you do not know that you should not add on Social Network sites and Messenger services?  What S is a program that lets you make phones over the internet? You can talk to other users of this program for free or pay to call ordinary telephones.
  • 14. T & V!  What T is a method of sending short messages from one mobile phone to another – sometimes referred to as SMS?  What T is a malware program that is not what it seems to be? These pretend to be useful programs like word processors but really they install spyware or open up your computer to hackers?  What V can infect your computer by deleting your files, stealing your data or even let hackers take control of your hardware?  What V is the term used to describe a video that gets popular simply through internet sharing?
  • 15. For more information… http://ceop.police.uk/ http://www.thinkuknow.co.uk/ http://www.youtube.com/watch?v=qoEG7R5Len0 http://old.digizen.org/cyberbullying/fullFilm.aspx
  • 16. Finally… If you are being bullied online by anyone in College, speak to your tutor immediately. For YOUR safety, online bullying is taken VERY seriously, and can lead to suspension or expulsion from College.