SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Social Networking On The Internet By: Mike Hon Social Networking on the Internet ~has exploded as a main source of mass media across the internet linking groups of people with similar interests   ~Users can go online and create a profile to where people can connect to each other sharing similar interests   ~ Boys and girls are shown to use social networking on the internet in different ways    
How Boys and Girls Use Social Networking ,[object Object],[object Object],[object Object],[object Object]
How Adults Use Social Media ,[object Object],[object Object],[object Object]
[object Object],Students use social networks in many ways
Challenges With Social Networking ,[object Object]
[object Object]
Identity Theft Among Social Networking Users ,[object Object]
[object Object],[object Object],[object Object]
Identity Theft Remedies ,[object Object]
References ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Facebook addiction
Facebook addictionFacebook addiction
Facebook addictionPrem Kumawat
 
Dangers to social media
Dangers to social mediaDangers to social media
Dangers to social mediaRyan Ward
 
Truth or Dare: How to Connect with Pros
Truth or Dare: How to Connect with ProsTruth or Dare: How to Connect with Pros
Truth or Dare: How to Connect with ProsErin Maggied
 
Community Presentation on MySpace and Social Networking
Community Presentation on MySpace and Social NetworkingCommunity Presentation on MySpace and Social Networking
Community Presentation on MySpace and Social NetworkingShotzy Paugh
 
Beginner session 1: The Appropriate Ways to Connect Online
Beginner session 1: The Appropriate Ways to Connect OnlineBeginner session 1: The Appropriate Ways to Connect Online
Beginner session 1: The Appropriate Ways to Connect OnlineScrippsPRSSA
 
Misuse of social media
Misuse of social mediaMisuse of social media
Misuse of social mediatoufiqshawon
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareNurizcka
 
Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...Alexander Larsen
 
Draft for prezi and poster
Draft for prezi and posterDraft for prezi and poster
Draft for prezi and postervictoriahoo
 
How big is your digital footprint fall 2012
How big is your digital footprint fall 2012How big is your digital footprint fall 2012
How big is your digital footprint fall 2012kschermerhorn
 
Social media privacy issues
Social media privacy issuesSocial media privacy issues
Social media privacy issuesNousheen Arshad
 
Proper use of social networking sites
Proper use of social networking sitesProper use of social networking sites
Proper use of social networking sitesner1eje
 
Misuse of personal information
Misuse of personal informationMisuse of personal information
Misuse of personal informationZev Aidikoff
 
Cohoes Jan 13 Cyberbullying
Cohoes Jan 13 CyberbullyingCohoes Jan 13 Cyberbullying
Cohoes Jan 13 Cyberbullyingkschermerhorn
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social mediaAlan Raj
 
Disadvantages of Social Networking
Disadvantages of Social NetworkingDisadvantages of Social Networking
Disadvantages of Social NetworkingAshwin Agarwal
 

Was ist angesagt? (20)

Facebook addiction
Facebook addictionFacebook addiction
Facebook addiction
 
Lis580 seminargroup3
Lis580 seminargroup3Lis580 seminargroup3
Lis580 seminargroup3
 
Dangers to social media
Dangers to social mediaDangers to social media
Dangers to social media
 
Truth or Dare: How to Connect with Pros
Truth or Dare: How to Connect with ProsTruth or Dare: How to Connect with Pros
Truth or Dare: How to Connect with Pros
 
Social media-threats
Social media-threatsSocial media-threats
Social media-threats
 
Social media-threats
Social media-threatsSocial media-threats
Social media-threats
 
Community Presentation on MySpace and Social Networking
Community Presentation on MySpace and Social NetworkingCommunity Presentation on MySpace and Social Networking
Community Presentation on MySpace and Social Networking
 
The Alexander Padilla Show
The Alexander Padilla ShowThe Alexander Padilla Show
The Alexander Padilla Show
 
Beginner session 1: The Appropriate Ways to Connect Online
Beginner session 1: The Appropriate Ways to Connect OnlineBeginner session 1: The Appropriate Ways to Connect Online
Beginner session 1: The Appropriate Ways to Connect Online
 
Misuse of social media
Misuse of social mediaMisuse of social media
Misuse of social media
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...
 
Draft for prezi and poster
Draft for prezi and posterDraft for prezi and poster
Draft for prezi and poster
 
How big is your digital footprint fall 2012
How big is your digital footprint fall 2012How big is your digital footprint fall 2012
How big is your digital footprint fall 2012
 
Social media privacy issues
Social media privacy issuesSocial media privacy issues
Social media privacy issues
 
Proper use of social networking sites
Proper use of social networking sitesProper use of social networking sites
Proper use of social networking sites
 
Misuse of personal information
Misuse of personal informationMisuse of personal information
Misuse of personal information
 
Cohoes Jan 13 Cyberbullying
Cohoes Jan 13 CyberbullyingCohoes Jan 13 Cyberbullying
Cohoes Jan 13 Cyberbullying
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
 
Disadvantages of Social Networking
Disadvantages of Social NetworkingDisadvantages of Social Networking
Disadvantages of Social Networking
 

Andere mochten auch (17)

innSend
innSendinnSend
innSend
 
VICTORY ONE Central
VICTORY ONE CentralVICTORY ONE Central
VICTORY ONE Central
 
innSend
innSendinnSend
innSend
 
Second Grade Standard Indicator 357
Second Grade Standard Indicator 357Second Grade Standard Indicator 357
Second Grade Standard Indicator 357
 
Standard Indicator 2
Standard Indicator 2Standard Indicator 2
Standard Indicator 2
 
Pioneer Days
Pioneer DaysPioneer Days
Pioneer Days
 
innSend - How It Works
innSend - How It WorksinnSend - How It Works
innSend - How It Works
 
результаты анализа анкет 3
результаты анализа анкет 3результаты анализа анкет 3
результаты анализа анкет 3
 
innSend - How It Works
innSend - How It WorksinnSend - How It Works
innSend - How It Works
 
Sai Farm Noida Expressway
Sai Farm Noida ExpresswaySai Farm Noida Expressway
Sai Farm Noida Expressway
 
Rock
RockRock
Rock
 
Community Project
Community ProjectCommunity Project
Community Project
 
The Pledge of Allegience
The Pledge of AllegienceThe Pledge of Allegience
The Pledge of Allegience
 
Kent Resume Rev12 09
Kent Resume Rev12 09Kent Resume Rev12 09
Kent Resume Rev12 09
 
351 Cultural Presentation
351 Cultural Presentation351 Cultural Presentation
351 Cultural Presentation
 
Johnny Appleseed
Johnny AppleseedJohnny Appleseed
Johnny Appleseed
 
Modals of necessity
Modals of necessityModals of necessity
Modals of necessity
 

Ähnlich wie Social Networking On The Internet

Encyclomedia 2007 Internet Safety Presentation
Encyclomedia 2007 Internet Safety PresentationEncyclomedia 2007 Internet Safety Presentation
Encyclomedia 2007 Internet Safety Presentationqgecko
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)Pat Sine
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0Larry Magid
 
Teen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety InstitueTeen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety InstitueMindMake - Parenting & Education
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet SafetyEric Cedo
 
Glenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensGlenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensAndrew Kohl
 
Digital literacy skills for social workers - North West London ASYE Programme
Digital literacy skills for social workers - North West London ASYE ProgrammeDigital literacy skills for social workers - North West London ASYE Programme
Digital literacy skills for social workers - North West London ASYE ProgrammeClaudia Megele
 
Myspace Or Yours
Myspace Or YoursMyspace Or Yours
Myspace Or Yourstbiggs6
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivAl Rowell
 
Social media presentation final
Social media presentation finalSocial media presentation final
Social media presentation finalkherman90
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
Growing Up Digital - Cyberbullying in Schools
Growing Up Digital - Cyberbullying in SchoolsGrowing Up Digital - Cyberbullying in Schools
Growing Up Digital - Cyberbullying in SchoolsWebbed Marketing
 
Social Networking and Chilton
Social Networking and ChiltonSocial Networking and Chilton
Social Networking and Chiltonelizkeren
 
Web 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected ConsequencesWeb 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected ConsequencesFrances Harris
 
Digital dangers pp1
Digital dangers pp1Digital dangers pp1
Digital dangers pp1YanelysRuiz1
 

Ähnlich wie Social Networking On The Internet (20)

Encyclomedia 2007 Internet Safety Presentation
Encyclomedia 2007 Internet Safety PresentationEncyclomedia 2007 Internet Safety Presentation
Encyclomedia 2007 Internet Safety Presentation
 
102009
102009102009
102009
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
 
Teen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety InstitueTeen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety Institue
 
It’s Personal: Similarities and Differences in Online Social Network Use Betw...
It’s Personal: Similarities and Differences in Online Social Network Use Betw...It’s Personal: Similarities and Differences in Online Social Network Use Betw...
It’s Personal: Similarities and Differences in Online Social Network Use Betw...
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet Safety
 
Glenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensGlenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital Citizens
 
Growing Up Online
Growing Up OnlineGrowing Up Online
Growing Up Online
 
Digital literacy skills for social workers - North West London ASYE Programme
Digital literacy skills for social workers - North West London ASYE ProgrammeDigital literacy skills for social workers - North West London ASYE Programme
Digital literacy skills for social workers - North West London ASYE Programme
 
Myspace Or Yours
Myspace Or YoursMyspace Or Yours
Myspace Or Yours
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
 
Social media presentation final
Social media presentation finalSocial media presentation final
Social media presentation final
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
102008 A
102008 A102008 A
102008 A
 
Growing Up Digital - Cyberbullying in Schools
Growing Up Digital - Cyberbullying in SchoolsGrowing Up Digital - Cyberbullying in Schools
Growing Up Digital - Cyberbullying in Schools
 
Social Networking and Chilton
Social Networking and ChiltonSocial Networking and Chilton
Social Networking and Chilton
 
Web 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected ConsequencesWeb 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected Consequences
 
Digital dangers pp1
Digital dangers pp1Digital dangers pp1
Digital dangers pp1
 

Kürzlich hochgeladen

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 

Kürzlich hochgeladen (20)

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 

Social Networking On The Internet

  • 1. Social Networking On The Internet By: Mike Hon Social Networking on the Internet ~has exploded as a main source of mass media across the internet linking groups of people with similar interests   ~Users can go online and create a profile to where people can connect to each other sharing similar interests   ~ Boys and girls are shown to use social networking on the internet in different ways    
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.