SlideShare a Scribd company logo
1 of 12
Internet Safety By: Colleen
Internet Safety The internet is a helpful resource where people can search information on any topic they want. The internet is used to search information on almost any topic. It can also be used to look for jobs and to help out with anything you want. A search engine is used for research. It can also be used for receiving information on a certain subject.
World wide info should  be  given  over the internet.  A browser is a program that allows users to find documents.  Internet Safety On the internet, you NEVER give any personal information. (address, phone number, etc.) Examples of browsers: planetweb and safari WWW stands for World Wide Web. It is different than the internet because the world wide web builds on top of the internet.
Internet Safety 3 Don’ts for the internet.
  Internet Safety One way to promote safe internet surfing is to have the children’s parents block websites that they don’t want their kids to see. They can also make their website private. Make sure you don't download programs from unusual sites because it can cause a virus.
InternetSafety By: MacKenzi Diestler
Slick the Spammer Questions What should you do if you receive spam? You should block it and prevent it by not opening your email from people you do not know. Spam is electronic junk mail or junk newsgroup postings. A mailing list is a list of names and addresses to which advertising material is mailed. Spam is like an infection. Some you can get rid of. Some you can’t. Some can have different results like some can crash your computer and some you just can’t get rid of. Spam is a big problem because it eats up a lot of network band with, and wastes people’s time.
Slick the Spammer Questions What should you do with an e-mail attachment from someone you do not know?  Do NOT open it.
Internet Safety By Katie Dellamater
Netiquette is the etiquette for cyberspace (rules for behaving on-line) The three basic rules of netiquette are: Use courtesy Use emoticons  Be brief online What is a flame, flame war  and how can you avoid them? A flame war is a posting to a news group or mailing list A flame war is when an online discussion becomes a series of personal attacks You can avoid a flame war by protecting your reputation and computer, and not going to the same level  of extreme as the enemy Netiquette Ned
You shouldn’t use all capital letters because it is like yelling. If you become uncomfortable with a topic or site that you find you should show an adult and close out of the website Do you know the difference between public and private emails? ,[object Object],A private email is confidential and can only be viewed by the person you sent it to What are emoticons? -They are a textual expression used to show your emotion ex: ;) wink  :D laughing Netiquette Net :D
1. Don’t use the internet with out adult supervision 2. Don’t talk to anyone you don’t know 3. Be responsible 4. Never say or use your name 5. Never post or send a picture of yourself 6. If you see something that makes you uncomfortable inform an adult and close out after the adult sees the site 7. Never give out personal info about you   Internet Safety rules

More Related Content

What's hot

Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of NetiquetteLeelet1121
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationcey.ruth
 
Staying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘NetStaying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘NetDaniel Owens
 
Internet Safety Final Copy
Internet Safety Final CopyInternet Safety Final Copy
Internet Safety Final Copyguestc88a00
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teensSearchLock
 
Internet Safety Final Copy
Internet Safety Final CopyInternet Safety Final Copy
Internet Safety Final Copyguest42858f
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Finalguest5a7b36
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetymcgeet
 
Rules of netiquette
Rules of netiquetteRules of netiquette
Rules of netiquetteklknight79
 
Online privacy
Online privacyOnline privacy
Online privacyjo-jo23
 
Cyber safety
Cyber safetyCyber safety
Cyber safetysmartins7
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety pptmcmullan
 

What's hot (18)

Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
Internet safety
Internet safety Internet safety
Internet safety
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Staying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘NetStaying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘Net
 
Internet Safety Final Copy
Internet Safety Final CopyInternet Safety Final Copy
Internet Safety Final Copy
 
Spam
SpamSpam
Spam
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
 
Internet Safety Final Copy
Internet Safety Final CopyInternet Safety Final Copy
Internet Safety Final Copy
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Rules of netiquette
Rules of netiquetteRules of netiquette
Rules of netiquette
 
Internet Safety!!
Internet Safety!!Internet Safety!!
Internet Safety!!
 
Online privacy
Online privacyOnline privacy
Online privacy
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
Internet safety for kids
Internet safety for kidsInternet safety for kids
Internet safety for kids
 

Viewers also liked

Stavební Bezpečnostní Sklo
Stavební Bezpečnostní SkloStavební Bezpečnostní Sklo
Stavební Bezpečnostní Skloguestefceba2
 
28F: Consultes populars sobre la independència a la Garrotxa
28F: Consultes populars sobre la independència a la Garrotxa28F: Consultes populars sobre la independència a la Garrotxa
28F: Consultes populars sobre la independència a la GarrotxaLa Garrotxa Decideix
 
3rd dialogue dwss & suspension bridge buner 18 5-14 (2)
3rd dialogue dwss & suspension bridge buner 18 5-14 (2)3rd dialogue dwss & suspension bridge buner 18 5-14 (2)
3rd dialogue dwss & suspension bridge buner 18 5-14 (2)SRSP
 
First employment location and residential location decisions of TU Delft grad...
First employment location and residential location decisions of TU Delft grad...First employment location and residential location decisions of TU Delft grad...
First employment location and residential location decisions of TU Delft grad...Nicolò Wojewoda
 
Food for thought on Youth Participation @ CTE 2010
Food for thought on Youth Participation @ CTE 2010Food for thought on Youth Participation @ CTE 2010
Food for thought on Youth Participation @ CTE 2010Nicolò Wojewoda
 
The role of the United Nations in the governance of Socio-Ecological Systems
The role of the United Nations in the governance of Socio-Ecological SystemsThe role of the United Nations in the governance of Socio-Ecological Systems
The role of the United Nations in the governance of Socio-Ecological SystemsNicolò Wojewoda
 
10 (good) reasons to hire me
10 (good) reasons to hire me10 (good) reasons to hire me
10 (good) reasons to hire meNicolò Wojewoda
 
The Role Of Students In The Internationalization Of Engineering Education
The Role Of Students In The Internationalization Of Engineering EducationThe Role Of Students In The Internationalization Of Engineering Education
The Role Of Students In The Internationalization Of Engineering EducationNicolò Wojewoda
 
SRSP Humanitarian Response to Complex Emergency in Khyber Pakhtunkhwa and FATA
SRSP Humanitarian Response to Complex Emergency in Khyber Pakhtunkhwa and FATASRSP Humanitarian Response to Complex Emergency in Khyber Pakhtunkhwa and FATA
SRSP Humanitarian Response to Complex Emergency in Khyber Pakhtunkhwa and FATASRSP
 
Operations Of Integers
Operations Of IntegersOperations Of Integers
Operations Of Integersswright210
 
Ndikimi i shpenzimeve qeveritare ne inflacjon
Ndikimi i shpenzimeve qeveritare ne inflacjonNdikimi i shpenzimeve qeveritare ne inflacjon
Ndikimi i shpenzimeve qeveritare ne inflacjonbetrex
 
Entrepreneurship & creativity, a student\'s perspective
Entrepreneurship & creativity, a student\'s perspectiveEntrepreneurship & creativity, a student\'s perspective
Entrepreneurship & creativity, a student\'s perspectiveNicolò Wojewoda
 

Viewers also liked (14)

Stavební Bezpečnostní Sklo
Stavební Bezpečnostní SkloStavební Bezpečnostní Sklo
Stavební Bezpečnostní Sklo
 
28F: Consultes populars sobre la independència a la Garrotxa
28F: Consultes populars sobre la independència a la Garrotxa28F: Consultes populars sobre la independència a la Garrotxa
28F: Consultes populars sobre la independència a la Garrotxa
 
3rd dialogue dwss & suspension bridge buner 18 5-14 (2)
3rd dialogue dwss & suspension bridge buner 18 5-14 (2)3rd dialogue dwss & suspension bridge buner 18 5-14 (2)
3rd dialogue dwss & suspension bridge buner 18 5-14 (2)
 
First employment location and residential location decisions of TU Delft grad...
First employment location and residential location decisions of TU Delft grad...First employment location and residential location decisions of TU Delft grad...
First employment location and residential location decisions of TU Delft grad...
 
Food for thought on Youth Participation @ CTE 2010
Food for thought on Youth Participation @ CTE 2010Food for thought on Youth Participation @ CTE 2010
Food for thought on Youth Participation @ CTE 2010
 
The role of the United Nations in the governance of Socio-Ecological Systems
The role of the United Nations in the governance of Socio-Ecological SystemsThe role of the United Nations in the governance of Socio-Ecological Systems
The role of the United Nations in the governance of Socio-Ecological Systems
 
La Garrotxa Decideix
La Garrotxa DecideixLa Garrotxa Decideix
La Garrotxa Decideix
 
10 (good) reasons to hire me
10 (good) reasons to hire me10 (good) reasons to hire me
10 (good) reasons to hire me
 
The Role Of Students In The Internationalization Of Engineering Education
The Role Of Students In The Internationalization Of Engineering EducationThe Role Of Students In The Internationalization Of Engineering Education
The Role Of Students In The Internationalization Of Engineering Education
 
SRSP Humanitarian Response to Complex Emergency in Khyber Pakhtunkhwa and FATA
SRSP Humanitarian Response to Complex Emergency in Khyber Pakhtunkhwa and FATASRSP Humanitarian Response to Complex Emergency in Khyber Pakhtunkhwa and FATA
SRSP Humanitarian Response to Complex Emergency in Khyber Pakhtunkhwa and FATA
 
Operations Of Integers
Operations Of IntegersOperations Of Integers
Operations Of Integers
 
Ndikimi i shpenzimeve qeveritare ne inflacjon
Ndikimi i shpenzimeve qeveritare ne inflacjonNdikimi i shpenzimeve qeveritare ne inflacjon
Ndikimi i shpenzimeve qeveritare ne inflacjon
 
Entrepreneurship & creativity, a student\'s perspective
Entrepreneurship & creativity, a student\'s perspectiveEntrepreneurship & creativity, a student\'s perspective
Entrepreneurship & creativity, a student\'s perspective
 
Ibilbideak/TRAYECTORIAS world cafe
Ibilbideak/TRAYECTORIAS world cafe Ibilbideak/TRAYECTORIAS world cafe
Ibilbideak/TRAYECTORIAS world cafe
 

Similar to Internet Safety Final

Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Finalguest0c7b65
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Finalguest5000f0a
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammerguest2e06031d
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammerguest2e06031d
 
Internet Safety Im Chatterer
Internet Safety  Im ChattererInternet Safety  Im Chatterer
Internet Safety Im Chattererguest4fd30d4
 
Internet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, CalebInternet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, Calebguestde489f
 
Internet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, CalebInternet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, Calebguestde489f
 
online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdfjessa451416
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2JayMarkBandoy1
 
Internet Safety Emmabalison
Internet Safety EmmabalisonInternet Safety Emmabalison
Internet Safety Emmabalisonguest13f93438
 
Slick The Spammer
Slick The SpammerSlick The Spammer
Slick The Spammerguest80ad5c
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquetteEmmanuelaSernicul
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Finalguest011ce7
 
Internet Safety Surfer Dude
Internet Safety Surfer DudeInternet Safety Surfer Dude
Internet Safety Surfer Dudeguesta2b256
 
Netiquette Ned Chandler
Netiquette Ned ChandlerNetiquette Ned Chandler
Netiquette Ned Chandlerguest5fc50d1
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of NetiquetteRochelle Nato
 

Similar to Internet Safety Final (20)

Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammer
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammer
 
What Is Spam
What Is SpamWhat Is Spam
What Is Spam
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety Im Chatterer
Internet Safety  Im ChattererInternet Safety  Im Chatterer
Internet Safety Im Chatterer
 
Internet safty
Internet saftyInternet safty
Internet safty
 
Internet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, CalebInternet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, Caleb
 
Internet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, CalebInternet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, Caleb
 
online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdf
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
Internet Safety Emmabalison
Internet Safety EmmabalisonInternet Safety Emmabalison
Internet Safety Emmabalison
 
Slick The Spammer
Slick The SpammerSlick The Spammer
Slick The Spammer
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
Internet Safety Surfer Dude
Internet Safety Surfer DudeInternet Safety Surfer Dude
Internet Safety Surfer Dude
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
 
Netiquette Ned Chandler
Netiquette Ned ChandlerNetiquette Ned Chandler
Netiquette Ned Chandler
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 

Recently uploaded

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Recently uploaded (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Internet Safety Final

  • 2. Internet Safety The internet is a helpful resource where people can search information on any topic they want. The internet is used to search information on almost any topic. It can also be used to look for jobs and to help out with anything you want. A search engine is used for research. It can also be used for receiving information on a certain subject.
  • 3. World wide info should be given over the internet. A browser is a program that allows users to find documents. Internet Safety On the internet, you NEVER give any personal information. (address, phone number, etc.) Examples of browsers: planetweb and safari WWW stands for World Wide Web. It is different than the internet because the world wide web builds on top of the internet.
  • 4. Internet Safety 3 Don’ts for the internet.
  • 5.   Internet Safety One way to promote safe internet surfing is to have the children’s parents block websites that they don’t want their kids to see. They can also make their website private. Make sure you don't download programs from unusual sites because it can cause a virus.
  • 7. Slick the Spammer Questions What should you do if you receive spam? You should block it and prevent it by not opening your email from people you do not know. Spam is electronic junk mail or junk newsgroup postings. A mailing list is a list of names and addresses to which advertising material is mailed. Spam is like an infection. Some you can get rid of. Some you can’t. Some can have different results like some can crash your computer and some you just can’t get rid of. Spam is a big problem because it eats up a lot of network band with, and wastes people’s time.
  • 8. Slick the Spammer Questions What should you do with an e-mail attachment from someone you do not know? Do NOT open it.
  • 9. Internet Safety By Katie Dellamater
  • 10. Netiquette is the etiquette for cyberspace (rules for behaving on-line) The three basic rules of netiquette are: Use courtesy Use emoticons Be brief online What is a flame, flame war and how can you avoid them? A flame war is a posting to a news group or mailing list A flame war is when an online discussion becomes a series of personal attacks You can avoid a flame war by protecting your reputation and computer, and not going to the same level of extreme as the enemy Netiquette Ned
  • 11.
  • 12. 1. Don’t use the internet with out adult supervision 2. Don’t talk to anyone you don’t know 3. Be responsible 4. Never say or use your name 5. Never post or send a picture of yourself 6. If you see something that makes you uncomfortable inform an adult and close out after the adult sees the site 7. Never give out personal info about you Internet Safety rules