SlideShare uma empresa Scribd logo
1 de 50
Cyber Safety
Keeping Our Computers Safe
Overview
Computer Protection
 Key Terms:
 Firewall – Blocks outside access to a computer
 Antivirus – Prevents most destructive programs (viruses) from accessing a computer
 Cookies – Stores and transmits information
to parent websites
 Passwords – Allows access to online accounts
Working Of A Fire Wall
Computer Protection
 Online:
 Connected to the Internet
 Disconnect when not in use
 Firewall:
 Limits the information sent to and from your computer
 Barrier from the internet
 Examples of firewall programs:
• Zonealarm
• Comodo
• Norton
Computer Protection
 Antivirus Protection:
 Prevents viruses from effecting your computer
 Can only prevent what it recognizes
 Examples of antivirus programs:
• McAfee
• Norton
• AVG Anti-virus
Computer Protection
 Cookies
 Allow companies to store information on your machine
 Collect information on your use
 Set computer to accept different level of cookies I’ve been to
this site!
Computer Protection
 Keep Your Password Safe!
 Passwords are key to your personal information.
 Increase password security by using:
• Capital letters, lowercase letters,
symbols, and numbers
• Abbreviations not whole words
Example: s0uth*ern ILL-in0is
Change your password frequently
Identity Theft
 Key Terms:
 Email – Messages sent
via the internet
 Websites - Locations on
the Internet
Identity Theft
Scamming: Tricking or
deceiving a person
or group of people to
obtain information
 Phishing Email -
 A common avenue for virtual scam artist. False
email can appear obvious or subtle.
 Phishing Website -
 Another common venue for virtual scam artist.
Attempt to gather personal information
What are the world of
warcraft scammers looking
for ???
Email Scam: Clear
Example
Email Scam: Subtle
Example
Southern Illinois Bank
Email
 Follow these guidelines
when using email:
 Sent messages are
uncontrollable.
 Do not open emails
from email addresses
you do not recognize!
 Treat online situations
the same way you would
personal situations.
Identity Theft: Websites
 Check out the legitimacy of a
website
 Key icons and web addresses
 Well-known site
 Check for misspellings
 Do not give out personal
information
 Set information to private if possible
 If you are unsure just remember
to:
Stop… Look… Call!
Communicating Online

Information you may want to consider before
sharing with others online:
Spending And Saving Online

Consider the following before buying anything online:

Do you know the store from the brick mortar world?

What is the site’s reputation?

Is the website secure?

Is the offer too good to be true?

Does the merchant collect more information than is needed to
complete the sale?

Use a payment service or credit card for payment.

Review the company's shipping method.
Spending and Saving Online

Protect yourself when banking or paying bills online:
Computing On The Go

Using public computers safely

Using mobile phones
Bullying On Line

What to do if you are “cyber-bullied.”

Safety tips to avoid or deal with online bullying.

Keep personal information private.

Use technology tools to block inappropriate or threatening behavior.

Do not answer phone calls or read messages, e-mails or comments
from “cyber-bullies.” Set them aside in case they are needed by
authorities for evidence.
When Being bullied.....
Buying Prescriptions On Line

Know your source to make sure it’s safe

Make sure a website is a state-licensed pharmacy located in the
United States.

Find a list at http://www.nabp.net and http://www.vipps.info.

Look for websites with practices that protect you.

Be sure your privacy is protected.

If you are suspicious or have complaints about a service or
transaction, report the website!
Electronic Medical Records

The advantages of Electronic Medical Records

Recommended online storage services for
Electronic Medical Records.
Socializing Online

Blogging

Social Networking

Chat discussion boards and forums

Online quizzes and surveys
Sharing Photos, Images & Video

Sharing Photos Safely

Image copyright infringement

Sharing videos online

Using webcams
Defensive Computing

Browsing and searching

Ads on search engines and sponsored search results.

Identifying secure/trusted websites

Understand the risks in sharing information.

Browser settings and filtering software.
Safe Practices
 Remember these helpful tips when using a computer for
“web surfing” or online transactions:
 Treat your computer
like your home.
 Never give out
personal information!
 Talk to your kids about
Internet safety.
 If it sounds too good
to be true… it usually is!
The First Question
When I’m on line I should never give out:
A. My last name
B. The names of my pets
C. The names of my favorite book or TV shows
Answer 1
 Option A - My last name
Question 2
 Before I buy something online or access a site
requiring payment I should:
A. First make sure I really want it
B. Check with my parents
C. Check out store prices first.
Answer 2
 Option B - Check with my parents
Question 3
 You are in a very high post in a company. You have to
complete a project with your Senior. As you are going
on a vacation your senior asks your Email ID and
Password so that he can access files. It is an
important work. Should you give it ??
A. Give your password as it is important
B. Do not give your password as you do not care about
the work.
C. Do not give him and request your boss for some
more time
Answer 3
 Option C - Do not give him and request your
boss for some more time
Question 4
 If someone I meet online gives me his phone
number I should:
A. Call him as he is your friend and has given his
number too
B. Give him your number and request him to call
after sometime
C. Ask your Parents and check the number
Answer 4
 Option C - Ask your Parents and check the
number
Question 5
 What is Netiquette?
A. Treat others as badly as they treat you.
B. Be polite online and others will do the same
C. Call people names when they do something
you don't like.
D. Repeat messages over an over so others
don't get a chance to talk.
E. No Answer
Answer 5
 Option B - Be polite online and others will do
the same
Question 6
 Which is these is a good way to keep from being
bullied?
A.Delete messages from people you don't know, or from
those people who seem angry or mean.
B.When something doesn't seem right, stay in the site,
chat anyway and give out personal information.
C.Post all your school pictures online along with your
address, email, and phone number.
D.Send messages when you are angry and haven't had
time to think about the situation.
Answer 6
 Option A - Delete messages from people you don't
know, or from those people who seem angry or mean.
Question 7
As I travel through "Cyberspace," I should
never..
A.Take a break and have a snack.
B.Use the Internet to help me with my
homework.
C.Agree to meet someone in person who I have
met online.
Answer 7
 Option C - Agree to meet someone in person
who I have met online.
Question 8
 If someone I meet online asks me to keep a
secret from my parents I should....
A.Keep the secret because they are my "cyber
friend."
B.Tell all of my friends, because it's hard for me
to keep a secret.
C.Tell my parents, because no one should ever
ask me to keep secrets from my parents.
Answer 8
 Option C - Tell my parents, because no one
should ever ask me to keep secrets from my
parents.
Question 9
 Which of these is NOT a good way to keep from
being bullied?
A.Get back at the bullies by doing the same things they
did to you.
B.Don't give out private information .
C.Don't exchange pictures or give out email addresses to
people you meet on the Internet.
D.Don't send a message when you are angry.
Answer 9
 Option A - Get back at the bullies by doing the
same things they did to you.
Question 10
 Someone is on my E-mail "buddy list," "friend
list," or "contact list" and I only know that
person online, he or she is
A. My friend and someone I can trust
B. The Person he or she claims to be
C. Someone I should be cautious about,
because I don't know him or her well.
Answer 10
 Option C - Someone I should be cautious
about, because I don't know him or her well.
Internet safety

Mais conteúdo relacionado

Mais procurados

Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
Pamela Moeai
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
mjtheman
 

Mais procurados (20)

Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementary
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety
 
Cyber security for kids
Cyber security for kidsCyber security for kids
Cyber security for kids
 
Online safety for children
Online safety for childrenOnline safety for children
Online safety for children
 
Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety Presentation
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe online
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'ts
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe online
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Dangers on the Internet
Dangers on the InternetDangers on the Internet
Dangers on the Internet
 

Semelhante a Internet safety

Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles school
esksaints
 
Internet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, CalebInternet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, Caleb
guestde489f
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
guest5000f0a
 
Slick The Spammer
Slick The SpammerSlick The Spammer
Slick The Spammer
guest80ad5c
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
guest5558240
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
TeacherNicaPrintable
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
cey.ruth
 
Internet Safety Jeopardy Game
Internet Safety Jeopardy GameInternet Safety Jeopardy Game
Internet Safety Jeopardy Game
cynthia.warner
 

Semelhante a Internet safety (20)

online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdf
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles school
 
Im A Chatter Al
Im A Chatter AlIm A Chatter Al
Im A Chatter Al
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
Internet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, CalebInternet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, Caleb
 
Internet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, CalebInternet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, Caleb
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
Cyber peace for youth tanta
Cyber peace for youth tantaCyber peace for youth tanta
Cyber peace for youth tanta
 
Slick The Spammer
Slick The SpammerSlick The Spammer
Slick The Spammer
 
Ass3 Sum
Ass3 SumAss3 Sum
Ass3 Sum
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
10things
10things10things
10things
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Internet Safety Jeopardy Game
Internet Safety Jeopardy GameInternet Safety Jeopardy Game
Internet Safety Jeopardy Game
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 

Mais de bhavya mohindru

Mais de bhavya mohindru (12)

India - My Motherland, My Country
India - My Motherland, My CountryIndia - My Motherland, My Country
India - My Motherland, My Country
 
William Shakespeare - To be or not to be
William Shakespeare - To be or not to beWilliam Shakespeare - To be or not to be
William Shakespeare - To be or not to be
 
Global warming - Let's save our Earth
Global warming - Let's save our EarthGlobal warming - Let's save our Earth
Global warming - Let's save our Earth
 
Air Around Us Edited
Air Around Us EditedAir Around Us Edited
Air Around Us Edited
 
Fun With Magnets
Fun With MagnetsFun With Magnets
Fun With Magnets
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Air Around Us
Air Around UsAir Around Us
Air Around Us
 
Earthquakes - It's Causes And Effects
Earthquakes - It's Causes And EffectsEarthquakes - It's Causes And Effects
Earthquakes - It's Causes And Effects
 
Health and hygiene with Bhavya Mohindru
Health and hygiene with Bhavya Mohindru Health and hygiene with Bhavya Mohindru
Health and hygiene with Bhavya Mohindru
 
Lamborghini
Lamborghini Lamborghini
Lamborghini
 
Lamborghini 10 best cars
Lamborghini 10 best carsLamborghini 10 best cars
Lamborghini 10 best cars
 

Último

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
SoniaTolstoy
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
fonyou31
 

Último (20)

Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 

Internet safety

  • 1. Cyber Safety Keeping Our Computers Safe
  • 3. Computer Protection  Key Terms:  Firewall – Blocks outside access to a computer  Antivirus – Prevents most destructive programs (viruses) from accessing a computer  Cookies – Stores and transmits information to parent websites  Passwords – Allows access to online accounts
  • 4. Working Of A Fire Wall
  • 5. Computer Protection  Online:  Connected to the Internet  Disconnect when not in use  Firewall:  Limits the information sent to and from your computer  Barrier from the internet  Examples of firewall programs: • Zonealarm • Comodo • Norton
  • 6. Computer Protection  Antivirus Protection:  Prevents viruses from effecting your computer  Can only prevent what it recognizes  Examples of antivirus programs: • McAfee • Norton • AVG Anti-virus
  • 7. Computer Protection  Cookies  Allow companies to store information on your machine  Collect information on your use  Set computer to accept different level of cookies I’ve been to this site!
  • 8. Computer Protection  Keep Your Password Safe!  Passwords are key to your personal information.  Increase password security by using: • Capital letters, lowercase letters, symbols, and numbers • Abbreviations not whole words Example: s0uth*ern ILL-in0is Change your password frequently
  • 9. Identity Theft  Key Terms:  Email – Messages sent via the internet  Websites - Locations on the Internet
  • 10. Identity Theft Scamming: Tricking or deceiving a person or group of people to obtain information  Phishing Email -  A common avenue for virtual scam artist. False email can appear obvious or subtle.  Phishing Website -  Another common venue for virtual scam artist. Attempt to gather personal information
  • 11. What are the world of warcraft scammers looking for ???
  • 15. Email  Follow these guidelines when using email:  Sent messages are uncontrollable.  Do not open emails from email addresses you do not recognize!  Treat online situations the same way you would personal situations.
  • 16. Identity Theft: Websites  Check out the legitimacy of a website  Key icons and web addresses  Well-known site  Check for misspellings  Do not give out personal information  Set information to private if possible  If you are unsure just remember to: Stop… Look… Call!
  • 17. Communicating Online  Information you may want to consider before sharing with others online:
  • 18. Spending And Saving Online  Consider the following before buying anything online:  Do you know the store from the brick mortar world?  What is the site’s reputation?  Is the website secure?  Is the offer too good to be true?  Does the merchant collect more information than is needed to complete the sale?  Use a payment service or credit card for payment.  Review the company's shipping method.
  • 19. Spending and Saving Online  Protect yourself when banking or paying bills online:
  • 20. Computing On The Go  Using public computers safely  Using mobile phones
  • 21. Bullying On Line  What to do if you are “cyber-bullied.”  Safety tips to avoid or deal with online bullying.  Keep personal information private.  Use technology tools to block inappropriate or threatening behavior.  Do not answer phone calls or read messages, e-mails or comments from “cyber-bullies.” Set them aside in case they are needed by authorities for evidence.
  • 23. Buying Prescriptions On Line  Know your source to make sure it’s safe  Make sure a website is a state-licensed pharmacy located in the United States.  Find a list at http://www.nabp.net and http://www.vipps.info.  Look for websites with practices that protect you.  Be sure your privacy is protected.  If you are suspicious or have complaints about a service or transaction, report the website!
  • 24. Electronic Medical Records  The advantages of Electronic Medical Records  Recommended online storage services for Electronic Medical Records.
  • 25. Socializing Online  Blogging  Social Networking  Chat discussion boards and forums  Online quizzes and surveys
  • 26. Sharing Photos, Images & Video  Sharing Photos Safely  Image copyright infringement  Sharing videos online  Using webcams
  • 27. Defensive Computing  Browsing and searching  Ads on search engines and sponsored search results.  Identifying secure/trusted websites  Understand the risks in sharing information.  Browser settings and filtering software.
  • 28. Safe Practices  Remember these helpful tips when using a computer for “web surfing” or online transactions:  Treat your computer like your home.  Never give out personal information!  Talk to your kids about Internet safety.  If it sounds too good to be true… it usually is!
  • 29.
  • 30. The First Question When I’m on line I should never give out: A. My last name B. The names of my pets C. The names of my favorite book or TV shows
  • 31. Answer 1  Option A - My last name
  • 32. Question 2  Before I buy something online or access a site requiring payment I should: A. First make sure I really want it B. Check with my parents C. Check out store prices first.
  • 33. Answer 2  Option B - Check with my parents
  • 34. Question 3  You are in a very high post in a company. You have to complete a project with your Senior. As you are going on a vacation your senior asks your Email ID and Password so that he can access files. It is an important work. Should you give it ?? A. Give your password as it is important B. Do not give your password as you do not care about the work. C. Do not give him and request your boss for some more time
  • 35. Answer 3  Option C - Do not give him and request your boss for some more time
  • 36. Question 4  If someone I meet online gives me his phone number I should: A. Call him as he is your friend and has given his number too B. Give him your number and request him to call after sometime C. Ask your Parents and check the number
  • 37. Answer 4  Option C - Ask your Parents and check the number
  • 38. Question 5  What is Netiquette? A. Treat others as badly as they treat you. B. Be polite online and others will do the same C. Call people names when they do something you don't like. D. Repeat messages over an over so others don't get a chance to talk. E. No Answer
  • 39. Answer 5  Option B - Be polite online and others will do the same
  • 40. Question 6  Which is these is a good way to keep from being bullied? A.Delete messages from people you don't know, or from those people who seem angry or mean. B.When something doesn't seem right, stay in the site, chat anyway and give out personal information. C.Post all your school pictures online along with your address, email, and phone number. D.Send messages when you are angry and haven't had time to think about the situation.
  • 41. Answer 6  Option A - Delete messages from people you don't know, or from those people who seem angry or mean.
  • 42. Question 7 As I travel through "Cyberspace," I should never.. A.Take a break and have a snack. B.Use the Internet to help me with my homework. C.Agree to meet someone in person who I have met online.
  • 43. Answer 7  Option C - Agree to meet someone in person who I have met online.
  • 44. Question 8  If someone I meet online asks me to keep a secret from my parents I should.... A.Keep the secret because they are my "cyber friend." B.Tell all of my friends, because it's hard for me to keep a secret. C.Tell my parents, because no one should ever ask me to keep secrets from my parents.
  • 45. Answer 8  Option C - Tell my parents, because no one should ever ask me to keep secrets from my parents.
  • 46. Question 9  Which of these is NOT a good way to keep from being bullied? A.Get back at the bullies by doing the same things they did to you. B.Don't give out private information . C.Don't exchange pictures or give out email addresses to people you meet on the Internet. D.Don't send a message when you are angry.
  • 47. Answer 9  Option A - Get back at the bullies by doing the same things they did to you.
  • 48. Question 10  Someone is on my E-mail "buddy list," "friend list," or "contact list" and I only know that person online, he or she is A. My friend and someone I can trust B. The Person he or she claims to be C. Someone I should be cautious about, because I don't know him or her well.
  • 49. Answer 10  Option C - Someone I should be cautious about, because I don't know him or her well.