SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Im  a chatterer  An online chat is any kind of one on one communication over the internet.
You can only give out information that won’t reveal any personal info about you, unless you are talking to one of your close friends. You should never give out information that involves your personal life such as: your real name, pictures of you, your school, address or your parents’ credit card numbers Remember, if you need a screen name to be in a chat always use a nickname!
Internet SafetyPictures from  clip art
Netiquette Ned Netiquette is the etiquette of the internet.  The basic rule of netiquette is remember the person you are talking to is a human. Which means treat them the way you want to be treated  You should stay away from using all capital letters because it is considered shouting & impolite. Picture from   
Being online A flame war is when you insult someone and when someone is angry and takes it out on other people. You do not want to insulate people because you could start a flame war.  To prevent a flame war, be polite and never give out hurtful information because people will be offended.  What you should  do if you become uncomfortable with a topic or site you find on the Internet, you should get out the chat. An emoticon is icon that shows emotions.
Internet Safety By Lyle W
Slick The Spammer Spam slows down your computer. Normally spam comes from someone using a mailing list, or many people he sends the same e-mail to. Spam is like an infection, because once you get spammed, the amount of it will keep growing as your e-mail address gets sold to other spammers.
Reducing Spam There are three ways to reduce spam. 2)       Do not give out your e-mail address (not very easy, is it?) Set your e-mail filters. It won’t stop spam, but it will reduce it. 3)       Report the      spammer’s ISP, which is not easy: it’s practically rocket science. The spammer will send his mail through many e-mail aliases.
Internet Safety
Surfer Dude The internet is a place where you can search for anything you want to. It is also a global network. Internet should be used to look up information, look for jobs, or play games that have information in them. ` Browser is a program that allows you to access all the information available on the web. Two examples of a browser are, Internet Explorer and Mozilla Firefox. WWW stands for world wide web. It is different from the internet because it builds on top of the internet.
A search engine is used to help you find something that you are looking for. Google and ask are search engines that are geared towards kids. To promote internet safety you can block websites that are not appropriate for kids.  Three benefits from joining the information super highway are to get help with homework, it increases reading skills, and to connect with places around the world. You should NEVER give out your passwords, address, telephone or credit card information over the internet. Although, you CAN give out your world wide information.

Weitere ähnliche Inhalte

Was ist angesagt?

Slick The Spammer
Slick The SpammerSlick The Spammer
Slick The Spammerguest80ad5c
 
Internet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, CalebInternet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, Calebguestde489f
 
Internet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, CalebInternet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, Calebguestde489f
 
Internet Safety Netiquette Ned
Internet Safety Netiquette NedInternet Safety Netiquette Ned
Internet Safety Netiquette Nedguest7ac5b0e4
 
How to use internet safely
How to use internet safelyHow to use internet safely
How to use internet safelyBijoKG2
 
Rules of netiquette
Rules of netiquetteRules of netiquette
Rules of netiquetteklknight79
 
Internet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersInternet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersRajesh Soundararajan
 
Netiquette Ned Chandler
Netiquette Ned ChandlerNetiquette Ned Chandler
Netiquette Ned Chandlerguest5fc50d1
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetydpl
 
Internet Safety Emmabalison
Internet Safety EmmabalisonInternet Safety Emmabalison
Internet Safety Emmabalisonguest13f93438
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of NetiquetteLeelet1121
 
Cyber safety
Cyber safetyCyber safety
Cyber safetyYash Jain
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Finalguest5a7b36
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety PresentationMichael Richards
 

Was ist angesagt? (18)

Im A Chatter Al
Im A Chatter AlIm A Chatter Al
Im A Chatter Al
 
Slick The Spammer
Slick The SpammerSlick The Spammer
Slick The Spammer
 
What Is Spam
What Is SpamWhat Is Spam
What Is Spam
 
Internet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, CalebInternet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, Caleb
 
Internet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, CalebInternet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, Caleb
 
Spam
SpamSpam
Spam
 
Internet Safety Netiquette Ned
Internet Safety Netiquette NedInternet Safety Netiquette Ned
Internet Safety Netiquette Ned
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
How to use internet safely
How to use internet safelyHow to use internet safely
How to use internet safely
 
Rules of netiquette
Rules of netiquetteRules of netiquette
Rules of netiquette
 
Internet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersInternet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and Beginners
 
Netiquette Ned Chandler
Netiquette Ned ChandlerNetiquette Ned Chandler
Netiquette Ned Chandler
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety Emmabalison
Internet Safety EmmabalisonInternet Safety Emmabalison
Internet Safety Emmabalison
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety Presentation
 

Andere mochten auch

Un Passaporto per il Mare 2010
Un Passaporto per il Mare 2010Un Passaporto per il Mare 2010
Un Passaporto per il Mare 2010giusante
 
References Letters from Previous Employers
References Letters from Previous EmployersReferences Letters from Previous Employers
References Letters from Previous Employersydbowen
 
Relationship 3 Holistic-Balance
Relationship 3 Holistic-BalanceRelationship 3 Holistic-Balance
Relationship 3 Holistic-BalanceNagraj Jain
 
Fotos Graciosas 33657
Fotos Graciosas 33657Fotos Graciosas 33657
Fotos Graciosas 33657guest73dcef1
 
Fotos Graciosas 33657
Fotos Graciosas 33657Fotos Graciosas 33657
Fotos Graciosas 33657guest73dcef1
 
Love - The Mightiest Motivator
Love - The Mightiest MotivatorLove - The Mightiest Motivator
Love - The Mightiest MotivatorNagraj Jain
 
Something Wild Story Book
Something Wild Story BookSomething Wild Story Book
Something Wild Story Bookroscocker
 
Something Wild Story Book
Something Wild Story BookSomething Wild Story Book
Something Wild Story Bookroscocker
 
Business Guide Final
Business Guide FinalBusiness Guide Final
Business Guide FinalNYCOEM
 
Business Guide Final
Business Guide FinalBusiness Guide Final
Business Guide FinalNYCOEM
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Finalguest0c7b65
 
Emmit Final All For Real
Emmit Final All For RealEmmit Final All For Real
Emmit Final All For Realguestb15460
 
Aviation Analytics Presentation
Aviation Analytics  PresentationAviation Analytics  Presentation
Aviation Analytics PresentationJon Soars
 

Andere mochten auch (16)

Un Passaporto per il Mare 2010
Un Passaporto per il Mare 2010Un Passaporto per il Mare 2010
Un Passaporto per il Mare 2010
 
References Letters from Previous Employers
References Letters from Previous EmployersReferences Letters from Previous Employers
References Letters from Previous Employers
 
Relationship 3 Holistic-Balance
Relationship 3 Holistic-BalanceRelationship 3 Holistic-Balance
Relationship 3 Holistic-Balance
 
Fotos Graciosas 33657
Fotos Graciosas 33657Fotos Graciosas 33657
Fotos Graciosas 33657
 
Daily Prayer
Daily PrayerDaily Prayer
Daily Prayer
 
Avatar
AvatarAvatar
Avatar
 
Fotos Graciosas 33657
Fotos Graciosas 33657Fotos Graciosas 33657
Fotos Graciosas 33657
 
Love - The Mightiest Motivator
Love - The Mightiest MotivatorLove - The Mightiest Motivator
Love - The Mightiest Motivator
 
Something Wild Story Book
Something Wild Story BookSomething Wild Story Book
Something Wild Story Book
 
Something Wild Story Book
Something Wild Story BookSomething Wild Story Book
Something Wild Story Book
 
Business Guide Final
Business Guide FinalBusiness Guide Final
Business Guide Final
 
Business Guide Final
Business Guide FinalBusiness Guide Final
Business Guide Final
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
Emmit Final All For Real
Emmit Final All For RealEmmit Final All For Real
Emmit Final All For Real
 
My Top 10
My Top 10My Top 10
My Top 10
 
Aviation Analytics Presentation
Aviation Analytics  PresentationAviation Analytics  Presentation
Aviation Analytics Presentation
 

Ähnlich wie Internet Safety Final

Mac Kenzi D. Group#3
Mac Kenzi D. Group#3Mac Kenzi D. Group#3
Mac Kenzi D. Group#3guest3e462b5
 
Internet Safety Im Chatterer
Internet Safety  Im ChattererInternet Safety  Im Chatterer
Internet Safety Im Chattererguest4fd30d4
 
Internet Safety Surfer Dude
Internet Safety Surfer DudeInternet Safety Surfer Dude
Internet Safety Surfer Dudeguesta2b256
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Finalguest011ce7
 
Internet Safety Power Point
Internet Safety Power PointInternet Safety Power Point
Internet Safety Power Pointguest24931c
 
online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdfjessa451416
 
Internet Safety: I
Internet Safety: IInternet Safety: I
Internet Safety: Imlegan31
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2JayMarkBandoy1
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquetteEmmanuelaSernicul
 
The internet
The internetThe internet
The internetsevoo12
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationcey.ruth
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareNurizcka
 
SH003 Lesson 2_ Netiquette using the Internet.pptx
SH003 Lesson 2_ Netiquette using the Internet.pptxSH003 Lesson 2_ Netiquette using the Internet.pptx
SH003 Lesson 2_ Netiquette using the Internet.pptxMarkAnthonyAurellano
 
Evans,Vinces,Coles I.S.1
Evans,Vinces,Coles I.S.1Evans,Vinces,Coles I.S.1
Evans,Vinces,Coles I.S.1guest1d951ee
 
Digital etiquette for wiki presentation
Digital etiquette for wiki presentationDigital etiquette for wiki presentation
Digital etiquette for wiki presentationDebra Duncan
 

Ähnlich wie Internet Safety Final (19)

Mac Kenzi D. Group#3
Mac Kenzi D. Group#3Mac Kenzi D. Group#3
Mac Kenzi D. Group#3
 
Internet Safety Im Chatterer
Internet Safety  Im ChattererInternet Safety  Im Chatterer
Internet Safety Im Chatterer
 
Internet Safety Surfer Dude
Internet Safety Surfer DudeInternet Safety Surfer Dude
Internet Safety Surfer Dude
 
Internet safty
Internet saftyInternet safty
Internet safty
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
Internet Safety Power Point
Internet Safety Power PointInternet Safety Power Point
Internet Safety Power Point
 
online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdf
 
Internet Safety: I
Internet Safety: IInternet Safety: I
Internet Safety: I
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
The internet
The internetThe internet
The internet
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
SH003 Lesson 2_ Netiquette using the Internet.pptx
SH003 Lesson 2_ Netiquette using the Internet.pptxSH003 Lesson 2_ Netiquette using the Internet.pptx
SH003 Lesson 2_ Netiquette using the Internet.pptx
 
Evans,Vinces,Coles I.S.1
Evans,Vinces,Coles I.S.1Evans,Vinces,Coles I.S.1
Evans,Vinces,Coles I.S.1
 
Digital etiquette for wiki presentation
Digital etiquette for wiki presentationDigital etiquette for wiki presentation
Digital etiquette for wiki presentation
 
10things
10things10things
10things
 

Kürzlich hochgeladen

Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Paige Cruz
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!Memoori
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdfMuhammad Subhan
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...FIDO Alliance
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 

Kürzlich hochgeladen (20)

Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 

Internet Safety Final

  • 1. Im a chatterer An online chat is any kind of one on one communication over the internet.
  • 2.
  • 3. You can only give out information that won’t reveal any personal info about you, unless you are talking to one of your close friends. You should never give out information that involves your personal life such as: your real name, pictures of you, your school, address or your parents’ credit card numbers Remember, if you need a screen name to be in a chat always use a nickname!
  • 5. Netiquette Ned Netiquette is the etiquette of the internet.  The basic rule of netiquette is remember the person you are talking to is a human. Which means treat them the way you want to be treated You should stay away from using all capital letters because it is considered shouting & impolite. Picture from  
  • 6. Being online A flame war is when you insult someone and when someone is angry and takes it out on other people. You do not want to insulate people because you could start a flame war. To prevent a flame war, be polite and never give out hurtful information because people will be offended.  What you should do if you become uncomfortable with a topic or site you find on the Internet, you should get out the chat. An emoticon is icon that shows emotions.
  • 8. Slick The Spammer Spam slows down your computer. Normally spam comes from someone using a mailing list, or many people he sends the same e-mail to. Spam is like an infection, because once you get spammed, the amount of it will keep growing as your e-mail address gets sold to other spammers.
  • 9. Reducing Spam There are three ways to reduce spam. 2) Do not give out your e-mail address (not very easy, is it?) Set your e-mail filters. It won’t stop spam, but it will reduce it. 3) Report the spammer’s ISP, which is not easy: it’s practically rocket science. The spammer will send his mail through many e-mail aliases.
  • 11. Surfer Dude The internet is a place where you can search for anything you want to. It is also a global network. Internet should be used to look up information, look for jobs, or play games that have information in them. ` Browser is a program that allows you to access all the information available on the web. Two examples of a browser are, Internet Explorer and Mozilla Firefox. WWW stands for world wide web. It is different from the internet because it builds on top of the internet.
  • 12. A search engine is used to help you find something that you are looking for. Google and ask are search engines that are geared towards kids. To promote internet safety you can block websites that are not appropriate for kids. Three benefits from joining the information super highway are to get help with homework, it increases reading skills, and to connect with places around the world. You should NEVER give out your passwords, address, telephone or credit card information over the internet. Although, you CAN give out your world wide information.