SlideShare a Scribd company logo
Web 2.0 Class Guidelines
For your safety :-)
Guidelines by
TechieHomeschoolers.com
#1- Stay safe.
Are you under 18?
• parents/adults are responsible for your safety both offline
and online, but even when we are not around- STAY
SAFE
• watch out for each other (no bad sites, offensive language-
click AWAY and tell an adult).
#2- Protect Your Name!
• Do NOT under any circumstances, use your entire name
(first and last) on any website, shared video, shared audio,
or other shared presentation.
• Instead, use a code name (like "geeksquad" or
"princess50") or, use an initial to represent your first name,
OR first name only.
#3- Protect your personal information!
• Do NOT share your address
• Do NOT share your phone number
• Do NOT share the names of your family members
Also never give away any of the following information:
• Full name
• Home address
• Phone number
• Social Security number
• Passwords
• Credit card numbers
#4- Protect Your Passwords
• Keep your password in a safe place where only you can find
it.
• Your password is information to be kept private. You should
let a parent or adult keep your password list as a backup in
case you lose it. No one else should have your password.
• Make your password difficult for others to learn and
memorize.
#5- Stay positive and clean
• All posts or comments you create online should be kept
CLEAN of all profanity.
• Your comments and posts should also stay positive
• Your comments and posts should steer clear of
cyberbullying or responding to cyberbullies
• Respect one another
Parent Resources To Try
Your parents might want to install any of the following
safeguard browsers on your computer:
• Open DNS - https://store.opendns.com/setup/computer/
This is a VERY GOOD open source program that protects
against offensive site, popups, spam, adware, and malware
scripts. You can protect one computer at a time, or a whole
network of computers in your household. (This one is
required for our class and is a FREE download).
• Buddy Browser- this is a great resource for younger
siblings. If you have younger brothers and sisters, your
parents might want to use this fun and safe browser for their
online surfing.
Any questions?
Contact me:
www.techiehomeschoolers.com

More Related Content

Viewers also liked

Waste Tour Infosheets
Waste Tour InfosheetsWaste Tour Infosheets
Waste Tour InfosheetsWORMS FEED
 
LAS ESTACIONES DEL AÑO
LAS ESTACIONES DEL AÑOLAS ESTACIONES DEL AÑO
LAS ESTACIONES DEL AÑO
guest85668b2
 
Evaluation Of The Design
Evaluation Of The DesignEvaluation Of The Design
Evaluation Of The Designspoordrie
 
Cmid Presentation 2 Concept Group F3
Cmid Presentation 2 Concept Group F3Cmid Presentation 2 Concept Group F3
Cmid Presentation 2 Concept Group F3
spoordrie
 
Cmid Presentation 1 Briefing Group F3
Cmid Presentation 1 Briefing Group F3Cmid Presentation 1 Briefing Group F3
Cmid Presentation 1 Briefing Group F3
spoordrie
 
CMID Spoor3 Detailed Design
CMID Spoor3 Detailed DesignCMID Spoor3 Detailed Design
CMID Spoor3 Detailed Design
spoordrie
 
Jalgrattasport Bmx
Jalgrattasport BmxJalgrattasport Bmx
Jalgrattasport Bmxguestfc7f75e
 

Viewers also liked (7)

Waste Tour Infosheets
Waste Tour InfosheetsWaste Tour Infosheets
Waste Tour Infosheets
 
LAS ESTACIONES DEL AÑO
LAS ESTACIONES DEL AÑOLAS ESTACIONES DEL AÑO
LAS ESTACIONES DEL AÑO
 
Evaluation Of The Design
Evaluation Of The DesignEvaluation Of The Design
Evaluation Of The Design
 
Cmid Presentation 2 Concept Group F3
Cmid Presentation 2 Concept Group F3Cmid Presentation 2 Concept Group F3
Cmid Presentation 2 Concept Group F3
 
Cmid Presentation 1 Briefing Group F3
Cmid Presentation 1 Briefing Group F3Cmid Presentation 1 Briefing Group F3
Cmid Presentation 1 Briefing Group F3
 
CMID Spoor3 Detailed Design
CMID Spoor3 Detailed DesignCMID Spoor3 Detailed Design
CMID Spoor3 Detailed Design
 
Jalgrattasport Bmx
Jalgrattasport BmxJalgrattasport Bmx
Jalgrattasport Bmx
 

Similar to Web2.0 Class Guidelines

Online Safety Lesson 5th grade
Online Safety Lesson 5th gradeOnline Safety Lesson 5th grade
Online Safety Lesson 5th grade
Belinda Larson
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayane Hazimeh
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
Marian Merritt
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayane Hazimeh
 
Using Skype, Facebook, and email to communicate with family and friends
Using Skype, Facebook, and email to communicate with family and friendsUsing Skype, Facebook, and email to communicate with family and friends
Using Skype, Facebook, and email to communicate with family and friends
Social Status
 
Safely Traveling the Web 2015
Safely Traveling the Web 2015Safely Traveling the Web 2015
Safely Traveling the Web 2015
Staci Trekles
 
Internet safety
Internet safetyInternet safety
Internet safety
Aleksandra Brmbota
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
JayMarkBandoy1
 
Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02
Velma
 
Riverview
RiverviewRiverview
Riverview
Kathy Schrock
 
Computer / Internet Security
Computer / Internet SecurityComputer / Internet Security
Computer / Internet Security
David Cirella
 
E security
E securityE security
E security
Sue Black
 
Internet safety update
Internet safety updateInternet safety update
Internet safety update
14071828
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayanehaz
 
LibraryOrientation2011
LibraryOrientation2011 LibraryOrientation2011
LibraryOrientation2011
ldennis02
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminars
Emmanuel Arthur
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminars
Emmanuel Arthur
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
Lori Lee Mickelson
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
Lori Lee Mickelson
 
Internet safety power_point
Internet safety power_pointInternet safety power_point
Internet safety power_point
Amit Pal Singh
 

Similar to Web2.0 Class Guidelines (20)

Online Safety Lesson 5th grade
Online Safety Lesson 5th gradeOnline Safety Lesson 5th grade
Online Safety Lesson 5th grade
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Using Skype, Facebook, and email to communicate with family and friends
Using Skype, Facebook, and email to communicate with family and friendsUsing Skype, Facebook, and email to communicate with family and friends
Using Skype, Facebook, and email to communicate with family and friends
 
Safely Traveling the Web 2015
Safely Traveling the Web 2015Safely Traveling the Web 2015
Safely Traveling the Web 2015
 
Internet safety
Internet safetyInternet safety
Internet safety
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02
 
Riverview
RiverviewRiverview
Riverview
 
Computer / Internet Security
Computer / Internet SecurityComputer / Internet Security
Computer / Internet Security
 
E security
E securityE security
E security
 
Internet safety update
Internet safety updateInternet safety update
Internet safety update
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
LibraryOrientation2011
LibraryOrientation2011 LibraryOrientation2011
LibraryOrientation2011
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminars
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminars
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Internet safety power_point
Internet safety power_pointInternet safety power_point
Internet safety power_point
 

Recently uploaded

Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 

Recently uploaded (20)

Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 

Web2.0 Class Guidelines

  • 1. Web 2.0 Class Guidelines For your safety :-) Guidelines by TechieHomeschoolers.com
  • 2. #1- Stay safe. Are you under 18? • parents/adults are responsible for your safety both offline and online, but even when we are not around- STAY SAFE • watch out for each other (no bad sites, offensive language- click AWAY and tell an adult).
  • 3. #2- Protect Your Name! • Do NOT under any circumstances, use your entire name (first and last) on any website, shared video, shared audio, or other shared presentation. • Instead, use a code name (like "geeksquad" or "princess50") or, use an initial to represent your first name, OR first name only.
  • 4. #3- Protect your personal information! • Do NOT share your address • Do NOT share your phone number • Do NOT share the names of your family members Also never give away any of the following information: • Full name • Home address • Phone number • Social Security number • Passwords • Credit card numbers
  • 5. #4- Protect Your Passwords • Keep your password in a safe place where only you can find it. • Your password is information to be kept private. You should let a parent or adult keep your password list as a backup in case you lose it. No one else should have your password. • Make your password difficult for others to learn and memorize.
  • 6. #5- Stay positive and clean • All posts or comments you create online should be kept CLEAN of all profanity. • Your comments and posts should also stay positive • Your comments and posts should steer clear of cyberbullying or responding to cyberbullies • Respect one another
  • 7. Parent Resources To Try Your parents might want to install any of the following safeguard browsers on your computer: • Open DNS - https://store.opendns.com/setup/computer/ This is a VERY GOOD open source program that protects against offensive site, popups, spam, adware, and malware scripts. You can protect one computer at a time, or a whole network of computers in your household. (This one is required for our class and is a FREE download). • Buddy Browser- this is a great resource for younger siblings. If you have younger brothers and sisters, your parents might want to use this fun and safe browser for their online surfing.