SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Downloaden Sie, um offline zu lesen
Parent Engagement ,[object Object],[object Object]
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Computer Management and Security What are the threats? What are the threats? ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object]
Social Networking
Social Networking
Social Networking What should I be aware of? What should I be aware of? ,[object Object],[object Object],[object Object],[object Object]
Online Gaming What should I be aware of? What should I be aware of? ,[object Object],[object Object],[object Object],[object Object]
Classroom Applications What’s going on in school? What’s going on in school? ,[object Object],[object Object],[object Object],[object Object]
Journeying Together ,[object Object],[object Object],[object Object],[object Object],[object Object]
Journeying Together ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Jason Eygenraam Computer Resource Teacher YRDSB Elementary, East 2011 2011 2011 2011 2011

Weitere ähnliche Inhalte

Was ist angesagt?

EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTEEMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTEAlminaVelasco
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antivirusesSarhad Baez
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteDOFJLCCDD
 
Safe and Responsible Use of ICT
Safe and Responsible Use of ICTSafe and Responsible Use of ICT
Safe and Responsible Use of ICTRolly Franco
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guidemjtheman
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of NetiquetteRochelle Nato
 
The Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyThe Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyJonathan Bacon
 
Inappropriate use of the network ppt
Inappropriate use of the network pptInappropriate use of the network ppt
Inappropriate use of the network pptKristi DeRoche
 
Promote Education Internet Security
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet SecurityZoaib Mirza
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and SafetyConor O'Neill
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technologypizonaim
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsLeelet1121
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityJFashant
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsRonalyn_Cao
 

Was ist angesagt? (20)

EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTEEMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
 
Protect
ProtectProtect
Protect
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antiviruses
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and Etiquette
 
Safe and Responsible Use of ICT
Safe and Responsible Use of ICTSafe and Responsible Use of ICT
Safe and Responsible Use of ICT
 
E safety training
E safety trainingE safety training
E safety training
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
The Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyThe Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and Privacy
 
Inappropriate use of the network ppt
Inappropriate use of the network pptInappropriate use of the network ppt
Inappropriate use of the network ppt
 
Staying safe-on-internet
Staying safe-on-internetStaying safe-on-internet
Staying safe-on-internet
 
Promote Education Internet Security
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet Security
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and Safety
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technology
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
The Dark Side
The Dark SideThe Dark Side
The Dark Side
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Viruses novice
Viruses noviceViruses novice
Viruses novice
 

Andere mochten auch

Assessment in Spec Ed
Assessment in Spec EdAssessment in Spec Ed
Assessment in Spec Edjeygenraam
 
Secondary school management
Secondary school managementSecondary school management
Secondary school managementPriyanka Nain
 
Understanding parent management training
Understanding parent management trainingUnderstanding parent management training
Understanding parent management trainingDorie Wicklund
 
SchoolTime- School Management Software
SchoolTime- School Management SoftwareSchoolTime- School Management Software
SchoolTime- School Management SoftwareSchool Time
 
Schools Supporting Teachers
Schools Supporting TeachersSchools Supporting Teachers
Schools Supporting TeachersPeter Gow
 
Elementary School Teacher
Elementary School TeacherElementary School Teacher
Elementary School TeacherAnthony A
 

Andere mochten auch (8)

Assessment in Spec Ed
Assessment in Spec EdAssessment in Spec Ed
Assessment in Spec Ed
 
Marketing Strategy and CRM
Marketing Strategy and CRMMarketing Strategy and CRM
Marketing Strategy and CRM
 
Secondary school management
Secondary school managementSecondary school management
Secondary school management
 
Understanding parent management training
Understanding parent management trainingUnderstanding parent management training
Understanding parent management training
 
SchoolTime- School Management Software
SchoolTime- School Management SoftwareSchoolTime- School Management Software
SchoolTime- School Management Software
 
Schools Supporting Teachers
Schools Supporting TeachersSchools Supporting Teachers
Schools Supporting Teachers
 
Elementary School Teacher
Elementary School TeacherElementary School Teacher
Elementary School Teacher
 
Parent contamination
Parent contaminationParent contamination
Parent contamination
 

Ähnlich wie Parent engagement cvps

Implementation Of Ict ( Information And Communication...
Implementation Of Ict ( Information And Communication...Implementation Of Ict ( Information And Communication...
Implementation Of Ict ( Information And Communication...Ashley Thomas
 
International Mixing Rising Up Out Is The Interchange Of...
International Mixing Rising Up Out Is The Interchange Of...International Mixing Rising Up Out Is The Interchange Of...
International Mixing Rising Up Out Is The Interchange Of...Holly Aguilar
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your DesktopAndy Smith
 
Computer Security Case Study
Computer Security Case StudyComputer Security Case Study
Computer Security Case StudyPatricia Adams
 
Empowerment lesson 2.ppt
Empowerment lesson 2.pptEmpowerment lesson 2.ppt
Empowerment lesson 2.pptAndrew_Braza
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
Computer Is A Multi Tasking, Gaming Computer
Computer Is A Multi Tasking, Gaming ComputerComputer Is A Multi Tasking, Gaming Computer
Computer Is A Multi Tasking, Gaming ComputerJennifer Slattery
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityAshley Zimmerman
 
Life In The Information Age
Life In The Information AgeLife In The Information Age
Life In The Information AgeDonna Kuhns
 
Using the Internet Safely
Using the Internet SafelyUsing the Internet Safely
Using the Internet SafelyJoanne Hewitt
 
Dangers Of The Internet Essay
Dangers Of The Internet EssayDangers Of The Internet Essay
Dangers Of The Internet EssaySheena Crouch
 
Persuasive Essay On Cyber Warfare
Persuasive Essay On Cyber WarfarePersuasive Essay On Cyber Warfare
Persuasive Essay On Cyber WarfareTiffany Sandoval
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfSoo Chin Hock
 

Ähnlich wie Parent engagement cvps (20)

Implementation Of Ict ( Information And Communication...
Implementation Of Ict ( Information And Communication...Implementation Of Ict ( Information And Communication...
Implementation Of Ict ( Information And Communication...
 
International Mixing Rising Up Out Is The Interchange Of...
International Mixing Rising Up Out Is The Interchange Of...International Mixing Rising Up Out Is The Interchange Of...
International Mixing Rising Up Out Is The Interchange Of...
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your Desktop
 
Computer Security Case Study
Computer Security Case StudyComputer Security Case Study
Computer Security Case Study
 
Empowerment lesson 2.ppt
Empowerment lesson 2.pptEmpowerment lesson 2.ppt
Empowerment lesson 2.ppt
 
Hotfix Essay
Hotfix EssayHotfix Essay
Hotfix Essay
 
Home Internet Security Essay Example
Home Internet Security Essay ExampleHome Internet Security Essay Example
Home Internet Security Essay Example
 
Internet Safety And Young Children Essays
Internet Safety And Young Children EssaysInternet Safety And Young Children Essays
Internet Safety And Young Children Essays
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Internet Security Threats Essay
Internet Security Threats EssayInternet Security Threats Essay
Internet Security Threats Essay
 
Internet Security Overview
Internet Security OverviewInternet Security Overview
Internet Security Overview
 
Computer Is A Multi Tasking, Gaming Computer
Computer Is A Multi Tasking, Gaming ComputerComputer Is A Multi Tasking, Gaming Computer
Computer Is A Multi Tasking, Gaming Computer
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Life In The Information Age
Life In The Information AgeLife In The Information Age
Life In The Information Age
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Using the Internet Safely
Using the Internet SafelyUsing the Internet Safely
Using the Internet Safely
 
Dangers Of The Internet Essay
Dangers Of The Internet EssayDangers Of The Internet Essay
Dangers Of The Internet Essay
 
Persuasive Essay On Cyber Warfare
Persuasive Essay On Cyber WarfarePersuasive Essay On Cyber Warfare
Persuasive Essay On Cyber Warfare
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
 

Kürzlich hochgeladen

Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 

Kürzlich hochgeladen (20)

Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 

Parent engagement cvps

Hinweis der Redaktion

  1. It is a new way of interacting. Yes, changes are necessary, and there are changes in the way people relate to each other - not always for the better.