SlideShare uma empresa Scribd logo
1 de 33
L’internet pour tous Author:   http://ashesh.ramjeeawon.info Revised on 10 Sept. 09
Quels sont  les objectifs  du programme?
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],0)  Initiation
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Initiation # 0
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Sir Tim Berners Lee Inventor of the WWW http://www.w3.org/People/Berners-Lee/Longer.html
Moteur de Recherche # 1
[object Object],[object Object],[object Object],[object Object],[object Object]
# 2
[object Object],[object Object],[object Object]
Blogger # 3
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object]
Flickr # 4
[object Object]
YouTube # 5
[object Object]
Sites de Socialisation # 6
[object Object],[object Object]
Chat # 7
[object Object],[object Object]
Documents sur ligne # 8
Goo1 ,[object Object],[object Object]
Social Bookmarking # 9
[object Object],[object Object],[object Object]
Dangers de l’internet # 10
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Protect Yourself ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Plus de possibilités sur l’internet #
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Video: The Machine is Us/ing Us

Mais conteúdo relacionado

Mais procurados

Securing Word Press Blog
Securing Word Press BlogSecuring Word Press Blog
Securing Word Press BlogChetan Gole
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014B2BPlanner Ltd.
 
Bug bounty null_owasp_2k17
Bug bounty null_owasp_2k17Bug bounty null_owasp_2k17
Bug bounty null_owasp_2k17Sagar M Parmar
 
Nir goldshlager Killing a bug bounty program - twice Hack In The Box 2012
Nir goldshlager Killing a bug bounty program - twice Hack In The Box 2012Nir goldshlager Killing a bug bounty program - twice Hack In The Box 2012
Nir goldshlager Killing a bug bounty program - twice Hack In The Box 2012Nir Goldshlager
 
Web 2.0 Presentation
Web 2.0 PresentationWeb 2.0 Presentation
Web 2.0 Presentationxia_bofa
 
How to steal and modify data using Business Logic flaws - Insecure Direct Obj...
How to steal and modify data using Business Logic flaws - Insecure Direct Obj...How to steal and modify data using Business Logic flaws - Insecure Direct Obj...
How to steal and modify data using Business Logic flaws - Insecure Direct Obj...Frans Rosén
 
Thoughts on Defensive Development for Sitecore
Thoughts on Defensive Development for SitecoreThoughts on Defensive Development for Sitecore
Thoughts on Defensive Development for SitecorePINT Inc
 
B-sides Las Vegas - social network security
B-sides Las Vegas - social network securityB-sides Las Vegas - social network security
B-sides Las Vegas - social network securityDamon Cortesi
 
The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016
The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016
The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016Frans Rosén
 
Beginning WordPress Security WordCamp North Canton 2015
Beginning WordPress Security WordCamp North Canton 2015Beginning WordPress Security WordCamp North Canton 2015
Beginning WordPress Security WordCamp North Canton 2015Michele Butcher-Jones
 
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin AhmedBackup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin AhmedMazin Ahmed
 
Why Firefox
Why  FirefoxWhy  Firefox
Why FirefoxLeAnn
 
Delete fb downloader search
Delete fb downloader searchDelete fb downloader search
Delete fb downloader searchchristaldisouza1
 
Sucuri Webinar: How to Optimize Your Website for Best Performance
Sucuri Webinar: How to Optimize Your Website for Best PerformanceSucuri Webinar: How to Optimize Your Website for Best Performance
Sucuri Webinar: How to Optimize Your Website for Best PerformanceSucuri
 
Digital safety
Digital safetyDigital safety
Digital safetypsusmith
 
Bug Bounty - Hackers Job
Bug Bounty - Hackers JobBug Bounty - Hackers Job
Bug Bounty - Hackers JobArbin Godar
 
obtain additional security
obtain additional security 
obtain additional security
obtain additional security offbeatnominee633
 
Presentation michael
Presentation michaelPresentation michael
Presentation michaelaizunoinu
 
Presentation michael
Presentation michaelPresentation michael
Presentation michaelaizunoinu
 

Mais procurados (20)

Securing Word Press Blog
Securing Word Press BlogSecuring Word Press Blog
Securing Word Press Blog
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
Bug bounty null_owasp_2k17
Bug bounty null_owasp_2k17Bug bounty null_owasp_2k17
Bug bounty null_owasp_2k17
 
Nir goldshlager Killing a bug bounty program - twice Hack In The Box 2012
Nir goldshlager Killing a bug bounty program - twice Hack In The Box 2012Nir goldshlager Killing a bug bounty program - twice Hack In The Box 2012
Nir goldshlager Killing a bug bounty program - twice Hack In The Box 2012
 
Web 2.0 Presentation
Web 2.0 PresentationWeb 2.0 Presentation
Web 2.0 Presentation
 
How to steal and modify data using Business Logic flaws - Insecure Direct Obj...
How to steal and modify data using Business Logic flaws - Insecure Direct Obj...How to steal and modify data using Business Logic flaws - Insecure Direct Obj...
How to steal and modify data using Business Logic flaws - Insecure Direct Obj...
 
Thoughts on Defensive Development for Sitecore
Thoughts on Defensive Development for SitecoreThoughts on Defensive Development for Sitecore
Thoughts on Defensive Development for Sitecore
 
B-sides Las Vegas - social network security
B-sides Las Vegas - social network securityB-sides Las Vegas - social network security
B-sides Las Vegas - social network security
 
Are You Safe From Hackers
Are You Safe From HackersAre You Safe From Hackers
Are You Safe From Hackers
 
The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016
The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016
The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016
 
Beginning WordPress Security WordCamp North Canton 2015
Beginning WordPress Security WordCamp North Canton 2015Beginning WordPress Security WordCamp North Canton 2015
Beginning WordPress Security WordCamp North Canton 2015
 
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin AhmedBackup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
 
Why Firefox
Why  FirefoxWhy  Firefox
Why Firefox
 
Delete fb downloader search
Delete fb downloader searchDelete fb downloader search
Delete fb downloader search
 
Sucuri Webinar: How to Optimize Your Website for Best Performance
Sucuri Webinar: How to Optimize Your Website for Best PerformanceSucuri Webinar: How to Optimize Your Website for Best Performance
Sucuri Webinar: How to Optimize Your Website for Best Performance
 
Digital safety
Digital safetyDigital safety
Digital safety
 
Bug Bounty - Hackers Job
Bug Bounty - Hackers JobBug Bounty - Hackers Job
Bug Bounty - Hackers Job
 
obtain additional security
obtain additional security 
obtain additional security
obtain additional security
 
Presentation michael
Presentation michaelPresentation michael
Presentation michael
 
Presentation michael
Presentation michaelPresentation michael
Presentation michael
 

Destaque

Nociones y emociones por veronica reyes
Nociones y emociones por veronica reyesNociones y emociones por veronica reyes
Nociones y emociones por veronica reyesveronica_reyes
 
Open source
Open sourceOpen source
Open sourceAshesh R
 
Sukhi parivaar web launch
Sukhi parivaar web launchSukhi parivaar web launch
Sukhi parivaar web launchAshesh R
 
Nature and me: God's precious gift
Nature and me: God's precious giftNature and me: God's precious gift
Nature and me: God's precious giftraisinbread
 

Destaque (7)

Nociones y emociones por veronica reyes
Nociones y emociones por veronica reyesNociones y emociones por veronica reyes
Nociones y emociones por veronica reyes
 
Linux
LinuxLinux
Linux
 
Open source
Open sourceOpen source
Open source
 
Web2.0
Web2.0Web2.0
Web2.0
 
Sukhi parivaar web launch
Sukhi parivaar web launchSukhi parivaar web launch
Sukhi parivaar web launch
 
Salmo 91
Salmo 91Salmo 91
Salmo 91
 
Nature and me: God's precious gift
Nature and me: God's precious giftNature and me: God's precious gift
Nature and me: God's precious gift
 

Semelhante a Internet for everyone

Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your DesktopAndy Smith
 
Creating Your Own Personal Learning Network
Creating Your Own Personal Learning NetworkCreating Your Own Personal Learning Network
Creating Your Own Personal Learning NetworkCarl Keller
 
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)Avansa Mid- en Zuidwest
 
2008 10 21 Top Ten Tech Tools Agents E Xtension
2008 10 21 Top Ten Tech Tools Agents E Xtension2008 10 21 Top Ten Tech Tools Agents E Xtension
2008 10 21 Top Ten Tech Tools Agents E Xtensiondkp205
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
Data management and office communication
Data management and office communicationData management and office communication
Data management and office communicationRomulo Lopez
 
Internet basics
Internet basicsInternet basics
Internet basicsosuchin
 
Features Of The Internet
Features Of The InternetFeatures Of The Internet
Features Of The Internetkimromero
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersMark White
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxRheamaeLiwan
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxJakeTorio1
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxEhraicaSaquing
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxDineLiwan
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxLiberty Aquino
 

Semelhante a Internet for everyone (20)

Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your Desktop
 
Creating Your Own Personal Learning Network
Creating Your Own Personal Learning NetworkCreating Your Own Personal Learning Network
Creating Your Own Personal Learning Network
 
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
 
2008 10 21 Top Ten Tech Tools Agents E Xtension
2008 10 21 Top Ten Tech Tools Agents E Xtension2008 10 21 Top Ten Tech Tools Agents E Xtension
2008 10 21 Top Ten Tech Tools Agents E Xtension
 
web2.0 forum presentation
web2.0 forum presentationweb2.0 forum presentation
web2.0 forum presentation
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Tech Tools
Tech ToolsTech Tools
Tech Tools
 
Data management and office communication
Data management and office communicationData management and office communication
Data management and office communication
 
Internet basics
Internet basicsInternet basics
Internet basics
 
Features Of The Internet
Features Of The InternetFeatures Of The Internet
Features Of The Internet
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & Teachers
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER ETECH
REVIEWER ETECHREVIEWER ETECH
REVIEWER ETECH
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
Empowerment Technology
Empowerment Technology Empowerment Technology
Empowerment Technology
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
Pad 750 podcast
Pad 750 podcastPad 750 podcast
Pad 750 podcast
 

Mais de Ashesh R

Managing onlinebusiness
Managing onlinebusinessManaging onlinebusiness
Managing onlinebusinessAshesh R
 
Presentation on Gifts
Presentation on GiftsPresentation on Gifts
Presentation on GiftsAshesh R
 
Influenza A H1 N1 Mexa
Influenza A H1 N1 MexaInfluenza A H1 N1 Mexa
Influenza A H1 N1 MexaAshesh R
 
Internet Pour Tous
Internet Pour TousInternet Pour Tous
Internet Pour TousAshesh R
 
Intellectual Property Rights - Mauritian Legislation
Intellectual Property Rights - Mauritian LegislationIntellectual Property Rights - Mauritian Legislation
Intellectual Property Rights - Mauritian LegislationAshesh R
 
Activity Diagram
Activity DiagramActivity Diagram
Activity DiagramAshesh R
 
Use Case Diagram
Use Case DiagramUse Case Diagram
Use Case DiagramAshesh R
 
UML Case Tools
UML Case ToolsUML Case Tools
UML Case ToolsAshesh R
 
Pascal Programming Session 1
Pascal Programming Session 1Pascal Programming Session 1
Pascal Programming Session 1Ashesh R
 
Problem Solving Techniques
Problem Solving TechniquesProblem Solving Techniques
Problem Solving TechniquesAshesh R
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesAshesh R
 
National Geographic
National GeographicNational Geographic
National GeographicAshesh R
 
E Recruitment
E RecruitmentE Recruitment
E RecruitmentAshesh R
 
Reflections
ReflectionsReflections
ReflectionsAshesh R
 

Mais de Ashesh R (14)

Managing onlinebusiness
Managing onlinebusinessManaging onlinebusiness
Managing onlinebusiness
 
Presentation on Gifts
Presentation on GiftsPresentation on Gifts
Presentation on Gifts
 
Influenza A H1 N1 Mexa
Influenza A H1 N1 MexaInfluenza A H1 N1 Mexa
Influenza A H1 N1 Mexa
 
Internet Pour Tous
Internet Pour TousInternet Pour Tous
Internet Pour Tous
 
Intellectual Property Rights - Mauritian Legislation
Intellectual Property Rights - Mauritian LegislationIntellectual Property Rights - Mauritian Legislation
Intellectual Property Rights - Mauritian Legislation
 
Activity Diagram
Activity DiagramActivity Diagram
Activity Diagram
 
Use Case Diagram
Use Case DiagramUse Case Diagram
Use Case Diagram
 
UML Case Tools
UML Case ToolsUML Case Tools
UML Case Tools
 
Pascal Programming Session 1
Pascal Programming Session 1Pascal Programming Session 1
Pascal Programming Session 1
 
Problem Solving Techniques
Problem Solving TechniquesProblem Solving Techniques
Problem Solving Techniques
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse Cases
 
National Geographic
National GeographicNational Geographic
National Geographic
 
E Recruitment
E RecruitmentE Recruitment
E Recruitment
 
Reflections
ReflectionsReflections
Reflections
 

Último

Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 

Último (20)

Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 

Internet for everyone