SlideShare uma empresa Scribd logo
1 de 10
Cyberbullying
Doaa Hussain 9C
Digital Access


Digital access is the full electronic
participation in society. This shows us how
internet is used daily. For example, laptops
ipods and computers. This tells us how
technology is important to us and used a lot
in the society. It is about how everyone now
uses technology everyday and how importnat
it is.
Digital Commerce

Digital commerce is the buying and selling of
goods online. This means that you can buy or
sell anything online. For example, clothes,
books, toys, etc. There are many websites
such as e bay and amazon that is full of
things you can buy. This is easier than
actually going to shop for things that are
available online.
Digital Communications

Digital Communications is the electronic
exchange of information. This means the way
of communicating with other people around
the world. For example, msn, hotmail, and
facebook. These are examples of how you can
communicate with many people around the
world. People use these sources to talk to
their friends and to get to know new people.
Digital Literacy

Digital literacy is the capability to use digital
technology and knowing when and how to
use it. This means how people use internet
sources and if they know how to use it. For
examples many people now have laptops and
are getting more educated. Many people now
know how to use computers and laptops
because they are available at schools.
Digital Etiquette

Digital Etiquette is the standards of conduct
expected by other digital technology users.
Responsibility is an important aspect in
digital etiquette. It shows how responsible
someone can be by using the internet. There
are many different ways of using the
internet. It can be in a positive way and it
can be in a negative way.
Digital Law

Digital law is the legal rights and
restrictions governing technology use. This
tells us that there are many internet laws.
Many people don’t follow these laws. For
example it’s not allowed to bully someone
online, but some people still do it. This shows
us that many people don’t follow these laws.
Digital rights and
    responsibilities
Digital rights and responsibilities is the
privileges and freedoms extended to all
digital technology users, and behavioral
expectations that come with them. I think
that there are still some people that are not
responsible enough to use the internet
properly. This means that some people use
the internet just to have fun or to make fun
and waste their time with other people.
Digital Health and
       Wellness
Digital health and wellness is the elements
of physical and psychological well-being
related to digital technology use.This means
that internet can actually affect someone’s
health and wellness, and this is possible
because some people can come addicted to
the internet. I think that people becoming
addicted to the internet is a problem and can
affect the whole world.
Digital Security


Digital security is the precautions that all
technology users must take to guarantee
their personal safety and the security of
their network. Which means that security is
very important when using internet.

Mais conteúdo relacionado

Destaque

The wolf marshall guitar method (basic 2)
The wolf marshall guitar method (basic 2)The wolf marshall guitar method (basic 2)
The wolf marshall guitar method (basic 2)
Saulo Gomes
 
Benvinguda d'Elna by Dinas ÒMNIA
Benvinguda d'Elna by Dinas ÒMNIABenvinguda d'Elna by Dinas ÒMNIA
Benvinguda d'Elna by Dinas ÒMNIA
cesk gasulla ramon
 
Best of the 70's and 80's dan coates (piano)(book)
Best of the 70's and 80's  dan coates (piano)(book)Best of the 70's and 80's  dan coates (piano)(book)
Best of the 70's and 80's dan coates (piano)(book)
Saulo Gomes
 
Alfred's premier piano course - performance book 2 b
Alfred's   premier piano course - performance book 2 bAlfred's   premier piano course - performance book 2 b
Alfred's premier piano course - performance book 2 b
Saulo Gomes
 
Popular piano solos book 2
Popular piano solos   book 2Popular piano solos   book 2
Popular piano solos book 2
Saulo Gomes
 
the-student-violinist-bach
 the-student-violinist-bach the-student-violinist-bach
the-student-violinist-bach
Saulo Gomes
 

Destaque (14)

The wolf marshall guitar method (basic 2)
The wolf marshall guitar method (basic 2)The wolf marshall guitar method (basic 2)
The wolf marshall guitar method (basic 2)
 
Tuba
TubaTuba
Tuba
 
Power studies 2
Power studies 2Power studies 2
Power studies 2
 
Gospel piano
Gospel piano  Gospel piano
Gospel piano
 
Benvinguda d'Elna by Dinas ÒMNIA
Benvinguda d'Elna by Dinas ÒMNIABenvinguda d'Elna by Dinas ÒMNIA
Benvinguda d'Elna by Dinas ÒMNIA
 
Chicabana
ChicabanaChicabana
Chicabana
 
Strong Readers
Strong ReadersStrong Readers
Strong Readers
 
Best of the 70's and 80's dan coates (piano)(book)
Best of the 70's and 80's  dan coates (piano)(book)Best of the 70's and 80's  dan coates (piano)(book)
Best of the 70's and 80's dan coates (piano)(book)
 
Alfred's premier piano course - performance book 2 b
Alfred's   premier piano course - performance book 2 bAlfred's   premier piano course - performance book 2 b
Alfred's premier piano course - performance book 2 b
 
Popular piano solos book 2
Popular piano solos   book 2Popular piano solos   book 2
Popular piano solos book 2
 
Lucianaoliveira
LucianaoliveiraLucianaoliveira
Lucianaoliveira
 
Presentacion1ejemplo
Presentacion1ejemploPresentacion1ejemplo
Presentacion1ejemplo
 
Piano chords
Piano chordsPiano chords
Piano chords
 
the-student-violinist-bach
 the-student-violinist-bach the-student-violinist-bach
the-student-violinist-bach
 

Último

Último (20)

Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
The UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, OcadoThe UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, Ocado
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAK
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 

Doaa Powerpoint.Key

  • 2. Digital Access Digital access is the full electronic participation in society. This shows us how internet is used daily. For example, laptops ipods and computers. This tells us how technology is important to us and used a lot in the society. It is about how everyone now uses technology everyday and how importnat it is.
  • 3. Digital Commerce Digital commerce is the buying and selling of goods online. This means that you can buy or sell anything online. For example, clothes, books, toys, etc. There are many websites such as e bay and amazon that is full of things you can buy. This is easier than actually going to shop for things that are available online.
  • 4. Digital Communications Digital Communications is the electronic exchange of information. This means the way of communicating with other people around the world. For example, msn, hotmail, and facebook. These are examples of how you can communicate with many people around the world. People use these sources to talk to their friends and to get to know new people.
  • 5. Digital Literacy Digital literacy is the capability to use digital technology and knowing when and how to use it. This means how people use internet sources and if they know how to use it. For examples many people now have laptops and are getting more educated. Many people now know how to use computers and laptops because they are available at schools.
  • 6. Digital Etiquette Digital Etiquette is the standards of conduct expected by other digital technology users. Responsibility is an important aspect in digital etiquette. It shows how responsible someone can be by using the internet. There are many different ways of using the internet. It can be in a positive way and it can be in a negative way.
  • 7. Digital Law Digital law is the legal rights and restrictions governing technology use. This tells us that there are many internet laws. Many people don’t follow these laws. For example it’s not allowed to bully someone online, but some people still do it. This shows us that many people don’t follow these laws.
  • 8. Digital rights and responsibilities Digital rights and responsibilities is the privileges and freedoms extended to all digital technology users, and behavioral expectations that come with them. I think that there are still some people that are not responsible enough to use the internet properly. This means that some people use the internet just to have fun or to make fun and waste their time with other people.
  • 9. Digital Health and Wellness Digital health and wellness is the elements of physical and psychological well-being related to digital technology use.This means that internet can actually affect someone’s health and wellness, and this is possible because some people can come addicted to the internet. I think that people becoming addicted to the internet is a problem and can affect the whole world.
  • 10. Digital Security Digital security is the precautions that all technology users must take to guarantee their personal safety and the security of their network. Which means that security is very important when using internet.

Notas do Editor