SlideShare a Scribd company logo
Why it is Safe to Search on Search Engine   By Lachie, Jon and Oscar
Different Types of Search Engines. ,[object Object],[object Object]
            ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Importants of Search Engines Many people around the world need to use search engines.  Students need to use the internet to find information on the internet, for example a student need to find out about World War Two, but they don't have any books that don't have the information about it and nobody home to help him so he will need to go on a search engine to find information so search engines is so important. There are many different kinds of search engines some are safe for childrens and some for adult.   (This is a very safe search engine for children).   Here are some tips for safe searching on the web: The website has to make sense,  maybe a popular website would be best. NEVER give unnecassary personal info. Don't always choose the first website from a search. It should be up to date.    
Thank You For Watching     by Oscar, Jon and Lachie =]

More Related Content

Similar to We Are Awesome

Ict Presentation
Ict PresentationIct Presentation
Ict Presentation
guestc9c45
 
internet safty ICT presentation
internet safty ICT presentation internet safty ICT presentation
internet safty ICT presentation
guest0ab27
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
guest739ab
 
Reliable Websites
Reliable WebsitesReliable Websites
Reliable Websites
guestce63
 
Reliable Websites
Reliable WebsitesReliable Websites
Reliable Websites
guest36b79
 
Reliable Websites
Reliable WebsitesReliable Websites
Reliable Websites
guest4041d
 
Introduction to searching online
Introduction to searching onlineIntroduction to searching online
Introduction to searching online
Celia Bandelier
 
Bare bones
Bare bonesBare bones
Bare bones
bxs016
 
Welcome to internet
Welcome to  internetWelcome to  internet
Welcome to internet
Richard Rogers
 
L.O.W Reliable Sites
L.O.W Reliable SitesL.O.W Reliable Sites
L.O.W Reliable Sites
guest2d537
 
Reliable Sites, L.O.W
Reliable Sites, L.O.WReliable Sites, L.O.W
Reliable Sites, L.O.W
guestf5de384
 
L.O.W Reliable Sites
L.O.W Reliable SitesL.O.W Reliable Sites
L.O.W Reliable Sites
guest2d537
 
Our Powerpoint
Our PowerpointOur Powerpoint
Our Powerpoint
guest8b5f105
 
Helping kids learn through research
Helping kids learn through researchHelping kids learn through research
Helping kids learn through research
twhite92
 
Our Powerpoint
Our PowerpointOur Powerpoint
Our Powerpoint
gueste5b03
 
Our Powerpoint
Our PowerpointOur Powerpoint
Our Powerpoint
gueste5b03
 
Safe searchingppt
Safe searchingpptSafe searchingppt
Safe searchingppt
attwoode
 
TLA Poster 2009 Powerpoint
TLA Poster 2009 PowerpointTLA Poster 2009 Powerpoint
TLA Poster 2009 Powerpoint
Mary Bell
 
Dennett Trujillo 591 Final Project
Dennett  Trujillo 591 Final ProjectDennett  Trujillo 591 Final Project
Dennett Trujillo 591 Final Project
milliewillie
 
Reliable Resources
Reliable ResourcesReliable Resources
Reliable Resources
guest5c2a5
 

Similar to We Are Awesome (20)

Ict Presentation
Ict PresentationIct Presentation
Ict Presentation
 
internet safty ICT presentation
internet safty ICT presentation internet safty ICT presentation
internet safty ICT presentation
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Reliable Websites
Reliable WebsitesReliable Websites
Reliable Websites
 
Reliable Websites
Reliable WebsitesReliable Websites
Reliable Websites
 
Reliable Websites
Reliable WebsitesReliable Websites
Reliable Websites
 
Introduction to searching online
Introduction to searching onlineIntroduction to searching online
Introduction to searching online
 
Bare bones
Bare bonesBare bones
Bare bones
 
Welcome to internet
Welcome to  internetWelcome to  internet
Welcome to internet
 
L.O.W Reliable Sites
L.O.W Reliable SitesL.O.W Reliable Sites
L.O.W Reliable Sites
 
Reliable Sites, L.O.W
Reliable Sites, L.O.WReliable Sites, L.O.W
Reliable Sites, L.O.W
 
L.O.W Reliable Sites
L.O.W Reliable SitesL.O.W Reliable Sites
L.O.W Reliable Sites
 
Our Powerpoint
Our PowerpointOur Powerpoint
Our Powerpoint
 
Helping kids learn through research
Helping kids learn through researchHelping kids learn through research
Helping kids learn through research
 
Our Powerpoint
Our PowerpointOur Powerpoint
Our Powerpoint
 
Our Powerpoint
Our PowerpointOur Powerpoint
Our Powerpoint
 
Safe searchingppt
Safe searchingpptSafe searchingppt
Safe searchingppt
 
TLA Poster 2009 Powerpoint
TLA Poster 2009 PowerpointTLA Poster 2009 Powerpoint
TLA Poster 2009 Powerpoint
 
Dennett Trujillo 591 Final Project
Dennett  Trujillo 591 Final ProjectDennett  Trujillo 591 Final Project
Dennett Trujillo 591 Final Project
 
Reliable Resources
Reliable ResourcesReliable Resources
Reliable Resources
 

Recently uploaded

Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 

Recently uploaded (20)

Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 

We Are Awesome

  • 1. Why it is Safe to Search on Search Engine   By Lachie, Jon and Oscar
  • 2.
  • 3.
  • 4. The Importants of Search Engines Many people around the world need to use search engines. Students need to use the internet to find information on the internet, for example a student need to find out about World War Two, but they don't have any books that don't have the information about it and nobody home to help him so he will need to go on a search engine to find information so search engines is so important. There are many different kinds of search engines some are safe for childrens and some for adult.   (This is a very safe search engine for children).   Here are some tips for safe searching on the web: The website has to make sense,  maybe a popular website would be best. NEVER give unnecassary personal info. Don't always choose the first website from a search. It should be up to date.    
  • 5. Thank You For Watching     by Oscar, Jon and Lachie =]

Editor's Notes

  1.