SlideShare a Scribd company logo
1 of 6
ONLINE SAFETY 
BY: PEYTON POWELL & BRADY STRAIN
DON’T GIVE OUT PERSONAL INFORMATION 
DON’T GIVE ANYONE YOU DON’T KNOW YOUR LAST NAME, YOUR ADDRESS,YOUR PHONE 
NUMBER,WHERE YOU GO TO SCHOOL,OR ANYWHERE YOU GO OFTEN.
DON’T OPEN ANYTHING YOU DON’T RECOGNIZE RIGHT OFF THE BAT 
• DON’T OPEN E-MAIL ATTACHMENTS OR A WEB SITE IN AN E-MAIL IF YOU DON’T KNOW 
EXACTLY WHAT IT IS.
DON’T SEND PICTURES TO RANDOM PEOPLE
• It’s a good idea to just stay away from the internet because you never know 
who’s out or watching you.
Online safety by lee & conrad [[[[[;

More Related Content

More from bigblueteacher (20)

Avoiding online creeps
Avoiding online creepsAvoiding online creeps
Avoiding online creeps
 
Online safety
Online safety Online safety
Online safety
 
Online safety
Online safetyOnline safety
Online safety
 
Be safe all the time, or get offline
Be safe all the time, or get offlineBe safe all the time, or get offline
Be safe all the time, or get offline
 
Are you really safe online?
Are you really safe online?Are you really safe online?
Are you really safe online?
 
Staying private
Staying privateStaying private
Staying private
 
Online Safety
Online SafetyOnline Safety
Online Safety
 
Online safety
Online safetyOnline safety
Online safety
 
Online Safety!
Online Safety!Online Safety!
Online Safety!
 
Online safety 2014
Online safety 2014Online safety 2014
Online safety 2014
 
Staying safe online- Emilie Hoelscher and Kaci Newton
Staying safe online- Emilie Hoelscher and Kaci NewtonStaying safe online- Emilie Hoelscher and Kaci Newton
Staying safe online- Emilie Hoelscher and Kaci Newton
 
Be smart online!
Be smart online!Be smart online!
Be smart online!
 
Avoiding online creeps
Avoiding online creepsAvoiding online creeps
Avoiding online creeps
 
Be safe online
Be safe onlineBe safe online
Be safe online
 
online safety
online safetyonline safety
online safety
 
Online safety by lee & conrad [[[[[;
Online safety by lee & conrad [[[[[;Online safety by lee & conrad [[[[[;
Online safety by lee & conrad [[[[[;
 
Be safe online
Be safe onlineBe safe online
Be safe online
 
Network Basics
Network BasicsNetwork Basics
Network Basics
 
Networks
NetworksNetworks
Networks
 
Phishing
PhishingPhishing
Phishing
 

Recently uploaded

Recently uploaded (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Online safety by lee & conrad [[[[[;

  • 1. ONLINE SAFETY BY: PEYTON POWELL & BRADY STRAIN
  • 2. DON’T GIVE OUT PERSONAL INFORMATION DON’T GIVE ANYONE YOU DON’T KNOW YOUR LAST NAME, YOUR ADDRESS,YOUR PHONE NUMBER,WHERE YOU GO TO SCHOOL,OR ANYWHERE YOU GO OFTEN.
  • 3. DON’T OPEN ANYTHING YOU DON’T RECOGNIZE RIGHT OFF THE BAT • DON’T OPEN E-MAIL ATTACHMENTS OR A WEB SITE IN AN E-MAIL IF YOU DON’T KNOW EXACTLY WHAT IT IS.
  • 4. DON’T SEND PICTURES TO RANDOM PEOPLE
  • 5. • It’s a good idea to just stay away from the internet because you never know who’s out or watching you.