SlideShare uma empresa Scribd logo
1 de 46
Baixar para ler offline
THE INTERNET AND YOU
OPPORTUNITIES AND CAUTION
Simeon Ayoade Adedokun
ICT Consultant | E-Learning Manager | Digital Marketer
http://fb.me/osparkle | http://lnked.in/osparkle | http://twitter.com/_osparkle
THE INTERNET AND YOU
Simeon AyoadeAdedokun 6-Oct-16
INTRODUCTION
The Internet has greatly revolutionized the world of
computers and communications—the ways we
communicate, learn, work and play. It is increasingly
becoming a vital and indispensable technology, and a very
important part of our everyday lives.
With the Internet and its infrastructure, there is virtually
no limit to what you can do, no limit to people you can
connect with around the world, no limit to resources you
can access, and no limit to opportunities you can annex.
Simeon AyoadeAdedokun 6-Oct-16
INTERNET CONNECTS US TO WORLDWIDE
OPPORTUNITIES
Simeon Adedokun
Possibilities
Internet makes it possible to quickly find
information on the world wide web, communicate
with people anywhere in the world, transact and
manage businesses, manage finances, bank from
home, shop from home, play games, listen to
music, watch videos, and much more. It is very
crucial to the survival of individuals and
businesses today.
Simeon AyoadeAdedokun 6-Oct-16
WHAT IS THE INTERNET?
INTERNETWORK
Simeon Ayoade Adedokun 6-Oct-16
INTERNET IS A GLOBAL NETWORK
Simeon AyoadeAdedokun 6-Oct-16
Internet is the shortened name for Internetwork.
Internet is a global system of interconnected
computer networks that connects billions of
users, and their computers and other electronic
devices worldwide for the purpose of
communication. Simply put, Internet is a network
of networks.
Simeon AyoadeAdedokun 6-Oct-16
WHAT IS WWW?
WORLD WIDE WEB
Simeon Ayoade Adedokun 6-Oct-16
The World Wide Web (WWW), usually called Web, is a
global collection of different websites that can be
accessed through the Internet. WWW is the most widely
used and the leading information retrieval service on the
Internet.
A website is a collection of related text, documents,
images, sounds, animations, movies, and other resources
that are logically interconnected by hyperlinks and
referenced by Uniform Resource Identifiers (URIs)/Uniform
Resource Locators (URLs).
Simeon AyoadeAdedokun 6-Oct-16
A website may be created for almost anything:
general information dissemination website,
news platform, advertisement, education,
online library, business, e-commerce, or forum
for sharing ideas.
Simeon AyoadeAdedokun 6-Oct-16
WAYS THROUGH WHICH THE
INTERNET IS USED TODAY
ONLINE SERVICES AND ACTIVITIES
Simeon Ayoade Adedokun 6-Oct-16
Information Dissemination
The Internet is a worldwide broadcasting capacity
that enables companies, organizations and online
users to share large amounts of information of
any kind. Users can also search for random
information on virtually all topics of life online
with the help of search engines and wiki sites like
Google, Bing, Ask, About and Wikipedia.
Simeon AyoadeAdedokun 6-Oct-16
E-mail
Internet is used to
send and receive
electronic mails
containing text and
attachments
(pictures and other
files). Email Service
Providers (ESPs)
include Google
(Gmail), Yahoo, AOL,
and Microsoft
(Outlook).
Simeon AyoadeAdedokun 6-Oct-16
Collaboration
and Interaction
The Internet provides
the opportunity for
individuals and their
computers to
connect and interact
without regard for
geographic location.
Simeon AyoadeAdedokun 6-Oct-16
Social Networking/Chatting
Social networks give Internet users the opportunity
to connect with family and friends in a virtual social
environment to share moments, thoughts and ideas.
Chat and instant messaging services allow users to
send and receive short messages, discuss a subject
or share ideas in real time.
Simeon AyoadeAdedokun 6-Oct-16
E-learning
Internet connects us to
electronic learning
materials, online schools
and libraries. You can
learn from anywhere
anytime and have
certificates even without
leaving your home.
Simeon AyoadeAdedokun 6-Oct-16
Career
Development
Job search and career
development are now
easy. Apart from having
the opportunity to
connect with employees
online, there are online
jobs too, that can help
you develop your career.
Simeon AyoadeAdedokun 6-Oct-16
Online Media &
Entertainment
Another widely used
service online is
entertainment. Internet
users can listen to
music & online radio,
watch movies & TV
shows, and play games
online.
Simeon AyoadeAdedokun 6-Oct-16
YouTube,Vimeo, Pandora, Netflix, Hulu, Pogo,
AddictingGames and more.
Backup Services
Online backup is the
process of copying
and archiving of
computer data to a
remote server, so it
may be used to
restore the original
after a data loss event.
Simeon AyoadeAdedokun 6-Oct-16
E-banking
The use of the Internet to
manage bank accounts,
money transfer, and
investments electronically.
E-banking includes
Internet and mobile
banking.
Simeon AyoadeAdedokun 6-Oct-16
Business
transactions—buying
and selling of goods
and services, and
marketing activities
are now being
conducted with digital
technologies online.
E-commerce &
Marketing
Simeon AyoadeAdedokun 6-Oct-16
Everyday Tasks
With the Internet, you can complete many routine
tasks, including shopping, bill payments, online
bulk SMS, Internet calls, mapping and location,
and many more at home, rather than going from
one place to another to get them done.
Simeon AyoadeAdedokun 6-Oct-16
Some Online Business Ideas And
Opportunities
• Blogging
• Affiliate Marketing
• Auction Selling e.g. Amazon
Auction and eBay
• E-Book Publishing
• Online Beading Store
• E-learning Service
• Recruitment Service
• Ad Network
• Website Flipping Business
• Taking Online Surveys
• Set up E-commerce Store
• Digital Marketing and Lead
Generation Services
• Social Media Consultancy
• Web Promotion
• E-Book Cover Design
• Logo Design
Simeon AyoadeAdedokun 6-Oct-16
Some Online Business Ideas And
Opportunities Cont’d
• Freelance Writing
• Proofreading
• Resume/CV Writing
• Desktop Publishing
• Graphic Design
• Online Video Editing
• SMS Reselling
• Online Coaching
• Web Hosting Reselling
• Membership Sites
• Web Copywriting
• Virtual Assistant
• Web Design & Application
Development
• App Development and Script
Installation
• Start a Local SEO Company
e.g. vconnect.com
• Web Appraisal
Simeon AyoadeAdedokun 6-Oct-16
CAUTION AND SAFETY
Simeon Ayoade Adedokun 6-Oct-16
As the Internet connects us to useful resources,
it is also home to certain risks, such as malware,
spyware, spam, and phishing. To stay safe online,
you’ll need to understand these risks and learn
how to avoid them.
Beware of False Information
There are no regulations or controls on the
materials that are placed on the Internet.
Therefore, don’t believe everything you see or
read online.
Simeon AyoadeAdedokun 6-Oct-16
Know What You Want Online
Internet is a unified world of systematic
processes that can dictate one’s perception of
reality. It provides access to large volumes of
information, including what you need and things
that can distract you, therefore, know what you
want on the Internet. Not everything is useful!
Simeon AyoadeAdedokun 6-Oct-16
Know Who You Relate With
Because the Internet is virtual community that enables
users to communicate and interact on variety of
platforms, it is not devoid of fraudulent activities.
Therefore, you need to know who you talk to, who you
chat with, or transact business with online. Not
everybody or business is who they seem to be!
Simeon AyoadeAdedokun 6-Oct-16
Know The Application You Install
Know the applications and browser plugins you install.
As resourceful as the Internet is, it is also home to some
dangerous software applications, such as spyware and
malware.
A spyware is a computer program that watches what
people do with their computers, and then sends that
information over the Internet. A malware is designed to
damage the way a computer works.
Simeon AyoadeAdedokun 6-Oct-16
Know The Content You Open
Not everything you see online is harmless. There
are a lot of contents online that are harmful to
you and your computer system. Open contents
from trusted sources only. Computer viruses may
be attached to a webpage and email messages.
Simeon AyoadeAdedokun 6-Oct-16
Use Firewall & Antivirus
Firewall is a software or hardware that checks
information coming from the Internet or a network
and then either turns it away or allows it to pass
through to your computer, depending on your
settings. Ensure that your firewall is turned on,
especially when you are connecting to a network, as it
can help prevent hackers and malicious software
from gaining access to your computer.
Simeon AyoadeAdedokun 6-Oct-16
Antivirus programs too are very important protective
tools for internet users. They can scan web pages,
email messages and any content you are
downloading for potential threats.
Simeon AyoadeAdedokun 6-Oct-16
Privacy Control
You are responsible for the privacy of your data and
control of the information about you that others can
see on the Internet. Ensure that you read the privacy
policy of any website you want to register with
before supplying your data; know which data they
collect, how they use them and how you can control
what you share on them, especially on social media.
Simeon AyoadeAdedokun 6-Oct-16
Create Strong Password
A strong password is one that is easy to
remember by you but difficult for an unauthorized
person to guess. It is a password that is long,
contains at least six characters, including both
uppercase and lowercase letters, numbers and
symbols.
Simeon AyoadeAdedokun 6-Oct-16
Avoid using personal information such as name
or date of birth, and words found in the dictionary
as password.
e.g. Simeon123, 123abccdd, james1990,
kate11john5, iamawinner982 are not good
enough.
Simeon AyoadeAdedokun 6-Oct-16
Don’t use the same password for many accounts.
If someone has your password for one account,
all other accounts become vulnerable.
Simeon AyoadeAdedokun 6-Oct-16
Change your password regularly—like once in six
months.
Simeon AyoadeAdedokun 6-Oct-16
Examples of strong passwords:
aYo%02@aDE!06
_feM26%i
a9QuberFuL%Bq
k#Pi142b@np!2
Simeon AyoadeAdedokun 6-Oct-16
Use Two-Factor Authentication
(2FA or TFA) Where Available
Simeon AyoadeAdedokun 6-Oct-16
Two Factor Authentication is also called Two Step
Verification or Multi-factor Authentication.
Two-factor authentication is an extra layer of security
that requires a user, after correct username and
password are supplied, to confirm a token that only
that user has on him, which may be sent to a device
such as phone or via email, or generated on a token
device before he can access an account or perform
an operation.
Simeon AyoadeAdedokun 6-Oct-16
Confirm Web Address
Ensure that you are on the right page before you
perform any operation on any website, especially on
e-commerce and e-banking websites. Malicious
websites often use deceptive web addresses to trick
users. For example, www.mtmonline.com looks
similar to www.mtnonline.com, but ‘n’ is replaced
with ‘m’ in the former address.
Simeon AyoadeAdedokun 6-Oct-16
Confirm Security Symbol
Some websites, especially e-commerce, and e-banking
websites, display a lock symbol in the address bar that
shows that they are using an HTTPS (Hypertext Transfer
Protocol Secure) connection, which makes it safe to
enter your personal information.
Simeon AyoadeAdedokun 6-Oct-16
Regular Update of Web Browser
Latest versions of web applications such as web
browsers—and most applications—usually come
with updated security features to protect you from
new viruses and malware, so it is important to
update your web browser regularly.
Simeon AyoadeAdedokun 6-Oct-16
CONCLUSION
The Internet is a remarkable world filled with inexhaustible information,
ideas and imaginative possibilities for communication, businesses,
banking, career development, entertainment and education. It is
increasingly becoming a very important part of our everyday life. Most
human-oriented tasks are now available for free or at affordable rates on
the Internet, all performed from home. The main advantages of the
Internet are increased efficiency, convenience and wide coverage with no
geographic barrier.
We all need to utilize this great opportunity that came with the 21st
century appropriately to revolutionize our lives, businesses and
relationships; and improve our operational effectiveness and efficiency. At
the same, we should learn to stay safe while exploring opportunities.
Simeon AyoadeAdedokun 6-Oct-16
Simeon Ayoade Adedokun 6-Oct-16
ABOUT THE AUTHOR
Simeon Ayoade Adedokun
http://fb.me/osparkle
https://lnked.in/osparkle
http://twitter.com/_osparkle
Read more presentations and articles by the author at
http://www.slideshare.net/Simeon Adedokun/

Mais conteúdo relacionado

Mais procurados

Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace Karnika Seth
 
Internet ! BATRA COMPUTER CENTRE
Internet ! BATRA COMPUTER CENTRE Internet ! BATRA COMPUTER CENTRE
Internet ! BATRA COMPUTER CENTRE jatin batra
 
Online safety and security 7 golden rules how to save your child from cyber c...
Online safety and security 7 golden rules how to save your child from cyber c...Online safety and security 7 golden rules how to save your child from cyber c...
Online safety and security 7 golden rules how to save your child from cyber c...Rajeev Ranjan
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsIulia Porneala
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society Sumama Shakir
 
Advantages n disadvantages of intenet by harkirat
Advantages n disadvantages of intenet by harkiratAdvantages n disadvantages of intenet by harkirat
Advantages n disadvantages of intenet by harkiratGurpreet Kaur
 
Advantages and Disadvantages of internet
Advantages and Disadvantages of internetAdvantages and Disadvantages of internet
Advantages and Disadvantages of internetLeomar Bondoc
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case studyShubh Thakkar
 
Internet - InfoBarrel
Internet - InfoBarrelInternet - InfoBarrel
Internet - InfoBarrelmitzivincent5
 
Pros and cons of using internet
Pros and cons of using internetPros and cons of using internet
Pros and cons of using internetnivi88
 
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...Shawn Tuma
 
Social Media Law: The Legal Do's and Don'ts of Social Media
Social Media Law: The Legal Do's and Don'ts of Social MediaSocial Media Law: The Legal Do's and Don'ts of Social Media
Social Media Law: The Legal Do's and Don'ts of Social MediaShawn Tuma
 
Disadvantage of using internet
Disadvantage of using internetDisadvantage of using internet
Disadvantage of using internetMuhammad Nazarith
 

Mais procurados (20)

Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace
 
Internet ! BATRA COMPUTER CENTRE
Internet ! BATRA COMPUTER CENTRE Internet ! BATRA COMPUTER CENTRE
Internet ! BATRA COMPUTER CENTRE
 
advantages and disadvantages of internet
advantages and disadvantages of internet advantages and disadvantages of internet
advantages and disadvantages of internet
 
Online safety and security 7 golden rules how to save your child from cyber c...
Online safety and security 7 golden rules how to save your child from cyber c...Online safety and security 7 golden rules how to save your child from cyber c...
Online safety and security 7 golden rules how to save your child from cyber c...
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNs
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society
 
Advantages n disadvantages of intenet by harkirat
Advantages n disadvantages of intenet by harkiratAdvantages n disadvantages of intenet by harkirat
Advantages n disadvantages of intenet by harkirat
 
OLC Presentation Jipson
OLC Presentation JipsonOLC Presentation Jipson
OLC Presentation Jipson
 
Cyber crime against children
Cyber crime against childrenCyber crime against children
Cyber crime against children
 
Advantages and Disadvantages of internet
Advantages and Disadvantages of internetAdvantages and Disadvantages of internet
Advantages and Disadvantages of internet
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
Ethics in Cyber Space
Ethics in Cyber SpaceEthics in Cyber Space
Ethics in Cyber Space
 
Internet - InfoBarrel
Internet - InfoBarrelInternet - InfoBarrel
Internet - InfoBarrel
 
The Internet
The InternetThe Internet
The Internet
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Impact of computers on society
Impact of computers on societyImpact of computers on society
Impact of computers on society
 
Pros and cons of using internet
Pros and cons of using internetPros and cons of using internet
Pros and cons of using internet
 
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
 
Social Media Law: The Legal Do's and Don'ts of Social Media
Social Media Law: The Legal Do's and Don'ts of Social MediaSocial Media Law: The Legal Do's and Don'ts of Social Media
Social Media Law: The Legal Do's and Don'ts of Social Media
 
Disadvantage of using internet
Disadvantage of using internetDisadvantage of using internet
Disadvantage of using internet
 

Destaque

ELITE.BCS-Cloud-and-Mobile-Risk-Assessments
ELITE.BCS-Cloud-and-Mobile-Risk-AssessmentsELITE.BCS-Cloud-and-Mobile-Risk-Assessments
ELITE.BCS-Cloud-and-Mobile-Risk-AssessmentsJames '​-- Mckinlay
 
презентация жк казанское подворье торговля
презентация жк казанское подворье торговляпрезентация жк казанское подворье торговля
презентация жк казанское подворье торговляarenda-servis-kazan
 
Oil and gas CEOs jointly declare action on climate change
Oil and gas CEOs jointly declare action on climate changeOil and gas CEOs jointly declare action on climate change
Oil and gas CEOs jointly declare action on climate changeRepsol
 
Apresentação Institucional Casa da Borracha Foz
Apresentação Institucional Casa da Borracha FozApresentação Institucional Casa da Borracha Foz
Apresentação Institucional Casa da Borracha FozCasa da Borracha
 
Repsol: Líneas estratégicas 2016-2020
Repsol: Líneas estratégicas 2016-2020 Repsol: Líneas estratégicas 2016-2020
Repsol: Líneas estratégicas 2016-2020 Repsol
 
Masy cząsteczkowe i sposoby ich wyznaczania
Masy cząsteczkowe i sposoby ich wyznaczaniaMasy cząsteczkowe i sposoby ich wyznaczania
Masy cząsteczkowe i sposoby ich wyznaczaniaMałgorzata Zaitz
 
#SoMe Mobile Marketing Proposal
#SoMe Mobile Marketing Proposal#SoMe Mobile Marketing Proposal
#SoMe Mobile Marketing Proposalsarahstrick
 
Repsol: Fourth Quarter 2014 Results
Repsol: Fourth Quarter 2014 ResultsRepsol: Fourth Quarter 2014 Results
Repsol: Fourth Quarter 2014 ResultsRepsol
 
User Requirement Specification for Tender Alert Website
User Requirement Specification for Tender Alert WebsiteUser Requirement Specification for Tender Alert Website
User Requirement Specification for Tender Alert WebsiteMakeNET
 
Application Modernization meets Cloud and Mobile ... Where to Start?
Application Modernization meets Cloud and Mobile ... Where to Start?Application Modernization meets Cloud and Mobile ... Where to Start?
Application Modernization meets Cloud and Mobile ... Where to Start?John Head
 
Anatomical principles of intraperitoneal drain placement
Anatomical principles of intraperitoneal drain placementAnatomical principles of intraperitoneal drain placement
Anatomical principles of intraperitoneal drain placementKETAN VAGHOLKAR
 
Clinic SEO: El subdominio ha mu-er-to + HTTPs Uvinum
Clinic SEO: El subdominio ha mu-er-to + HTTPs UvinumClinic SEO: El subdominio ha mu-er-to + HTTPs Uvinum
Clinic SEO: El subdominio ha mu-er-to + HTTPs UvinumClinic Seo
 
The fork in the road - the Application Modernization Roadmap for Notes/Domin...
The fork in the road -  the Application Modernization Roadmap for Notes/Domin...The fork in the road -  the Application Modernization Roadmap for Notes/Domin...
The fork in the road - the Application Modernization Roadmap for Notes/Domin...John Head
 

Destaque (19)

ELITE.BCS-Cloud-and-Mobile-Risk-Assessments
ELITE.BCS-Cloud-and-Mobile-Risk-AssessmentsELITE.BCS-Cloud-and-Mobile-Risk-Assessments
ELITE.BCS-Cloud-and-Mobile-Risk-Assessments
 
1/21イベント1)13:00〜 展望とチャレンジ
1/21イベント1)13:00〜 展望とチャレンジ1/21イベント1)13:00〜 展望とチャレンジ
1/21イベント1)13:00〜 展望とチャレンジ
 
презентация жк казанское подворье торговля
презентация жк казанское подворье торговляпрезентация жк казанское подворье торговля
презентация жк казанское подворье торговля
 
Pei colegio metropolitano
Pei colegio metropolitanoPei colegio metropolitano
Pei colegio metropolitano
 
L2C_catalog
L2C_catalogL2C_catalog
L2C_catalog
 
Oil and gas CEOs jointly declare action on climate change
Oil and gas CEOs jointly declare action on climate changeOil and gas CEOs jointly declare action on climate change
Oil and gas CEOs jointly declare action on climate change
 
Apresentação Institucional Casa da Borracha Foz
Apresentação Institucional Casa da Borracha FozApresentação Institucional Casa da Borracha Foz
Apresentação Institucional Casa da Borracha Foz
 
Repsol: Líneas estratégicas 2016-2020
Repsol: Líneas estratégicas 2016-2020 Repsol: Líneas estratégicas 2016-2020
Repsol: Líneas estratégicas 2016-2020
 
Elaf資料dk吉田20161028
Elaf資料dk吉田20161028Elaf資料dk吉田20161028
Elaf資料dk吉田20161028
 
Masy cząsteczkowe i sposoby ich wyznaczania
Masy cząsteczkowe i sposoby ich wyznaczaniaMasy cząsteczkowe i sposoby ich wyznaczania
Masy cząsteczkowe i sposoby ich wyznaczania
 
#SoMe Mobile Marketing Proposal
#SoMe Mobile Marketing Proposal#SoMe Mobile Marketing Proposal
#SoMe Mobile Marketing Proposal
 
Repsol: Fourth Quarter 2014 Results
Repsol: Fourth Quarter 2014 ResultsRepsol: Fourth Quarter 2014 Results
Repsol: Fourth Quarter 2014 Results
 
User Requirement Specification for Tender Alert Website
User Requirement Specification for Tender Alert WebsiteUser Requirement Specification for Tender Alert Website
User Requirement Specification for Tender Alert Website
 
Application Modernization meets Cloud and Mobile ... Where to Start?
Application Modernization meets Cloud and Mobile ... Where to Start?Application Modernization meets Cloud and Mobile ... Where to Start?
Application Modernization meets Cloud and Mobile ... Where to Start?
 
Anatomical principles of intraperitoneal drain placement
Anatomical principles of intraperitoneal drain placementAnatomical principles of intraperitoneal drain placement
Anatomical principles of intraperitoneal drain placement
 
Clinic SEO: El subdominio ha mu-er-to + HTTPs Uvinum
Clinic SEO: El subdominio ha mu-er-to + HTTPs UvinumClinic SEO: El subdominio ha mu-er-to + HTTPs Uvinum
Clinic SEO: El subdominio ha mu-er-to + HTTPs Uvinum
 
15.12 йосип
15.12 йосип15.12 йосип
15.12 йосип
 
The fork in the road - the Application Modernization Roadmap for Notes/Domin...
The fork in the road -  the Application Modernization Roadmap for Notes/Domin...The fork in the road -  the Application Modernization Roadmap for Notes/Domin...
The fork in the road - the Application Modernization Roadmap for Notes/Domin...
 
Ζώα υπό εξαφάνιση
Ζώα υπό εξαφάνισηΖώα υπό εξαφάνιση
Ζώα υπό εξαφάνιση
 

Semelhante a THE INTERNET AND YOU: OPPORTUNITIES AND CAUTION

Ethical & Effective Use of Smartphones and Tablets
Ethical & Effective Use of Smartphones and TabletsEthical & Effective Use of Smartphones and Tablets
Ethical & Effective Use of Smartphones and TabletsSimeon Adedokun
 
Web browsing and communication using Outlook
Web browsing and communication using OutlookWeb browsing and communication using Outlook
Web browsing and communication using OutlookMichael Lew
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your DesktopAndy Smith
 
Securing, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-HSecuring, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-Hjmoore55
 
Advantages and disadvantages of internet
Advantages and disadvantages of internetAdvantages and disadvantages of internet
Advantages and disadvantages of internetSai Sreeram
 
Protecting yourself online - second edition - booklet
Protecting yourself online - second edition - bookletProtecting yourself online - second edition - booklet
Protecting yourself online - second edition - bookletprestamonster
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptxSSPTRGCELL
 
Cyber Safety & Cyber Crimes by me.pptx
Cyber Safety & Cyber Crimes by me.pptxCyber Safety & Cyber Crimes by me.pptx
Cyber Safety & Cyber Crimes by me.pptxTejasSingh70
 
What's Next for Technology? Mansfield Senior Center 2014
What's Next for Technology? Mansfield Senior Center 2014What's Next for Technology? Mansfield Senior Center 2014
What's Next for Technology? Mansfield Senior Center 2014Steve Sokoloski
 
The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation guest9e3d59
 
The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation guestc2627d
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things The Center for Identity
 

Semelhante a THE INTERNET AND YOU: OPPORTUNITIES AND CAUTION (20)

Debate
DebateDebate
Debate
 
Judy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 PresentationJudy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 Presentation
 
Ethical & Effective Use of Smartphones and Tablets
Ethical & Effective Use of Smartphones and TabletsEthical & Effective Use of Smartphones and Tablets
Ethical & Effective Use of Smartphones and Tablets
 
Internet working
Internet workingInternet working
Internet working
 
Web browsing and communication using Outlook
Web browsing and communication using OutlookWeb browsing and communication using Outlook
Web browsing and communication using Outlook
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your Desktop
 
Securing, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-HSecuring, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-H
 
Internet
InternetInternet
Internet
 
Advantages and disadvantages of internet
Advantages and disadvantages of internetAdvantages and disadvantages of internet
Advantages and disadvantages of internet
 
Protecting yourself online - second edition - booklet
Protecting yourself online - second edition - bookletProtecting yourself online - second edition - booklet
Protecting yourself online - second edition - booklet
 
Cyber Safety
Cyber Safety Cyber Safety
Cyber Safety
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx
 
Cyber Safety & Cyber Crimes by me.pptx
Cyber Safety & Cyber Crimes by me.pptxCyber Safety & Cyber Crimes by me.pptx
Cyber Safety & Cyber Crimes by me.pptx
 
What's Next for Technology? Mansfield Senior Center 2014
What's Next for Technology? Mansfield Senior Center 2014What's Next for Technology? Mansfield Senior Center 2014
What's Next for Technology? Mansfield Senior Center 2014
 
The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation
 
The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation
 
Safer internet day 2011
Safer internet day 2011Safer internet day 2011
Safer internet day 2011
 
Safer internet day 2011
Safer internet day 2011Safer internet day 2011
Safer internet day 2011
 
Internet
InternetInternet
Internet
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 

Mais de Simeon Adedokun

Maximizing your Productivity Through Ethical & Innovative Use of Smartphones
Maximizing your Productivity Through Ethical & Innovative Use of SmartphonesMaximizing your Productivity Through Ethical & Innovative Use of Smartphones
Maximizing your Productivity Through Ethical & Innovative Use of SmartphonesSimeon Adedokun
 
ICT and Journalists: Enhancing Journalism Using Digital Tools
ICT and Journalists: Enhancing Journalism Using Digital ToolsICT and Journalists: Enhancing Journalism Using Digital Tools
ICT and Journalists: Enhancing Journalism Using Digital ToolsSimeon Adedokun
 
Youth, ICT and Enterprise Development
Youth, ICT and Enterprise DevelopmentYouth, ICT and Enterprise Development
Youth, ICT and Enterprise DevelopmentSimeon Adedokun
 
ICT: A Limitless Technology for Entrepreneurship
ICT: A Limitless Technology for Entrepreneurship ICT: A Limitless Technology for Entrepreneurship
ICT: A Limitless Technology for Entrepreneurship Simeon Adedokun
 
Achieving Better Results — Increasing Your Productivity for Greatness
Achieving Better Results — Increasing Your Productivity for GreatnessAchieving Better Results — Increasing Your Productivity for Greatness
Achieving Better Results — Increasing Your Productivity for GreatnessSimeon Adedokun
 
Change Your Thought, Change Your World
Change Your Thought, Change Your WorldChange Your Thought, Change Your World
Change Your Thought, Change Your WorldSimeon Adedokun
 
ICT AS A SURVIVAL TOOL IN ECONOMIC RECESSION
ICT AS A SURVIVAL TOOL IN ECONOMIC RECESSIONICT AS A SURVIVAL TOOL IN ECONOMIC RECESSION
ICT AS A SURVIVAL TOOL IN ECONOMIC RECESSIONSimeon Adedokun
 
The Church and Social Media
The Church and Social MediaThe Church and Social Media
The Church and Social MediaSimeon Adedokun
 
Computer Based Test (CBT) by Simeon Ayoade Adedokun
Computer Based Test (CBT) by Simeon Ayoade AdedokunComputer Based Test (CBT) by Simeon Ayoade Adedokun
Computer Based Test (CBT) by Simeon Ayoade AdedokunSimeon Adedokun
 
What Causes Laziness? - By Simeon Adedokun
What Causes Laziness? - By Simeon AdedokunWhat Causes Laziness? - By Simeon Adedokun
What Causes Laziness? - By Simeon AdedokunSimeon Adedokun
 
Elements of A Working Relationship - By Simeon Adedokun
Elements of A Working Relationship - By Simeon AdedokunElements of A Working Relationship - By Simeon Adedokun
Elements of A Working Relationship - By Simeon AdedokunSimeon Adedokun
 

Mais de Simeon Adedokun (11)

Maximizing your Productivity Through Ethical & Innovative Use of Smartphones
Maximizing your Productivity Through Ethical & Innovative Use of SmartphonesMaximizing your Productivity Through Ethical & Innovative Use of Smartphones
Maximizing your Productivity Through Ethical & Innovative Use of Smartphones
 
ICT and Journalists: Enhancing Journalism Using Digital Tools
ICT and Journalists: Enhancing Journalism Using Digital ToolsICT and Journalists: Enhancing Journalism Using Digital Tools
ICT and Journalists: Enhancing Journalism Using Digital Tools
 
Youth, ICT and Enterprise Development
Youth, ICT and Enterprise DevelopmentYouth, ICT and Enterprise Development
Youth, ICT and Enterprise Development
 
ICT: A Limitless Technology for Entrepreneurship
ICT: A Limitless Technology for Entrepreneurship ICT: A Limitless Technology for Entrepreneurship
ICT: A Limitless Technology for Entrepreneurship
 
Achieving Better Results — Increasing Your Productivity for Greatness
Achieving Better Results — Increasing Your Productivity for GreatnessAchieving Better Results — Increasing Your Productivity for Greatness
Achieving Better Results — Increasing Your Productivity for Greatness
 
Change Your Thought, Change Your World
Change Your Thought, Change Your WorldChange Your Thought, Change Your World
Change Your Thought, Change Your World
 
ICT AS A SURVIVAL TOOL IN ECONOMIC RECESSION
ICT AS A SURVIVAL TOOL IN ECONOMIC RECESSIONICT AS A SURVIVAL TOOL IN ECONOMIC RECESSION
ICT AS A SURVIVAL TOOL IN ECONOMIC RECESSION
 
The Church and Social Media
The Church and Social MediaThe Church and Social Media
The Church and Social Media
 
Computer Based Test (CBT) by Simeon Ayoade Adedokun
Computer Based Test (CBT) by Simeon Ayoade AdedokunComputer Based Test (CBT) by Simeon Ayoade Adedokun
Computer Based Test (CBT) by Simeon Ayoade Adedokun
 
What Causes Laziness? - By Simeon Adedokun
What Causes Laziness? - By Simeon AdedokunWhat Causes Laziness? - By Simeon Adedokun
What Causes Laziness? - By Simeon Adedokun
 
Elements of A Working Relationship - By Simeon Adedokun
Elements of A Working Relationship - By Simeon AdedokunElements of A Working Relationship - By Simeon Adedokun
Elements of A Working Relationship - By Simeon Adedokun
 

Último

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 

Último (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

THE INTERNET AND YOU: OPPORTUNITIES AND CAUTION

  • 1. THE INTERNET AND YOU OPPORTUNITIES AND CAUTION Simeon Ayoade Adedokun ICT Consultant | E-Learning Manager | Digital Marketer http://fb.me/osparkle | http://lnked.in/osparkle | http://twitter.com/_osparkle
  • 2. THE INTERNET AND YOU Simeon AyoadeAdedokun 6-Oct-16
  • 3. INTRODUCTION The Internet has greatly revolutionized the world of computers and communications—the ways we communicate, learn, work and play. It is increasingly becoming a vital and indispensable technology, and a very important part of our everyday lives. With the Internet and its infrastructure, there is virtually no limit to what you can do, no limit to people you can connect with around the world, no limit to resources you can access, and no limit to opportunities you can annex. Simeon AyoadeAdedokun 6-Oct-16
  • 4. INTERNET CONNECTS US TO WORLDWIDE OPPORTUNITIES Simeon Adedokun
  • 5. Possibilities Internet makes it possible to quickly find information on the world wide web, communicate with people anywhere in the world, transact and manage businesses, manage finances, bank from home, shop from home, play games, listen to music, watch videos, and much more. It is very crucial to the survival of individuals and businesses today. Simeon AyoadeAdedokun 6-Oct-16
  • 6. WHAT IS THE INTERNET? INTERNETWORK Simeon Ayoade Adedokun 6-Oct-16
  • 7. INTERNET IS A GLOBAL NETWORK Simeon AyoadeAdedokun 6-Oct-16
  • 8. Internet is the shortened name for Internetwork. Internet is a global system of interconnected computer networks that connects billions of users, and their computers and other electronic devices worldwide for the purpose of communication. Simply put, Internet is a network of networks. Simeon AyoadeAdedokun 6-Oct-16
  • 9. WHAT IS WWW? WORLD WIDE WEB Simeon Ayoade Adedokun 6-Oct-16
  • 10. The World Wide Web (WWW), usually called Web, is a global collection of different websites that can be accessed through the Internet. WWW is the most widely used and the leading information retrieval service on the Internet. A website is a collection of related text, documents, images, sounds, animations, movies, and other resources that are logically interconnected by hyperlinks and referenced by Uniform Resource Identifiers (URIs)/Uniform Resource Locators (URLs). Simeon AyoadeAdedokun 6-Oct-16
  • 11. A website may be created for almost anything: general information dissemination website, news platform, advertisement, education, online library, business, e-commerce, or forum for sharing ideas. Simeon AyoadeAdedokun 6-Oct-16
  • 12. WAYS THROUGH WHICH THE INTERNET IS USED TODAY ONLINE SERVICES AND ACTIVITIES Simeon Ayoade Adedokun 6-Oct-16
  • 13. Information Dissemination The Internet is a worldwide broadcasting capacity that enables companies, organizations and online users to share large amounts of information of any kind. Users can also search for random information on virtually all topics of life online with the help of search engines and wiki sites like Google, Bing, Ask, About and Wikipedia. Simeon AyoadeAdedokun 6-Oct-16
  • 14. E-mail Internet is used to send and receive electronic mails containing text and attachments (pictures and other files). Email Service Providers (ESPs) include Google (Gmail), Yahoo, AOL, and Microsoft (Outlook). Simeon AyoadeAdedokun 6-Oct-16
  • 15. Collaboration and Interaction The Internet provides the opportunity for individuals and their computers to connect and interact without regard for geographic location. Simeon AyoadeAdedokun 6-Oct-16
  • 16. Social Networking/Chatting Social networks give Internet users the opportunity to connect with family and friends in a virtual social environment to share moments, thoughts and ideas. Chat and instant messaging services allow users to send and receive short messages, discuss a subject or share ideas in real time. Simeon AyoadeAdedokun 6-Oct-16
  • 17. E-learning Internet connects us to electronic learning materials, online schools and libraries. You can learn from anywhere anytime and have certificates even without leaving your home. Simeon AyoadeAdedokun 6-Oct-16
  • 18. Career Development Job search and career development are now easy. Apart from having the opportunity to connect with employees online, there are online jobs too, that can help you develop your career. Simeon AyoadeAdedokun 6-Oct-16
  • 19. Online Media & Entertainment Another widely used service online is entertainment. Internet users can listen to music & online radio, watch movies & TV shows, and play games online. Simeon AyoadeAdedokun 6-Oct-16 YouTube,Vimeo, Pandora, Netflix, Hulu, Pogo, AddictingGames and more.
  • 20. Backup Services Online backup is the process of copying and archiving of computer data to a remote server, so it may be used to restore the original after a data loss event. Simeon AyoadeAdedokun 6-Oct-16
  • 21. E-banking The use of the Internet to manage bank accounts, money transfer, and investments electronically. E-banking includes Internet and mobile banking. Simeon AyoadeAdedokun 6-Oct-16
  • 22. Business transactions—buying and selling of goods and services, and marketing activities are now being conducted with digital technologies online. E-commerce & Marketing Simeon AyoadeAdedokun 6-Oct-16
  • 23. Everyday Tasks With the Internet, you can complete many routine tasks, including shopping, bill payments, online bulk SMS, Internet calls, mapping and location, and many more at home, rather than going from one place to another to get them done. Simeon AyoadeAdedokun 6-Oct-16
  • 24. Some Online Business Ideas And Opportunities • Blogging • Affiliate Marketing • Auction Selling e.g. Amazon Auction and eBay • E-Book Publishing • Online Beading Store • E-learning Service • Recruitment Service • Ad Network • Website Flipping Business • Taking Online Surveys • Set up E-commerce Store • Digital Marketing and Lead Generation Services • Social Media Consultancy • Web Promotion • E-Book Cover Design • Logo Design Simeon AyoadeAdedokun 6-Oct-16
  • 25. Some Online Business Ideas And Opportunities Cont’d • Freelance Writing • Proofreading • Resume/CV Writing • Desktop Publishing • Graphic Design • Online Video Editing • SMS Reselling • Online Coaching • Web Hosting Reselling • Membership Sites • Web Copywriting • Virtual Assistant • Web Design & Application Development • App Development and Script Installation • Start a Local SEO Company e.g. vconnect.com • Web Appraisal Simeon AyoadeAdedokun 6-Oct-16
  • 26. CAUTION AND SAFETY Simeon Ayoade Adedokun 6-Oct-16 As the Internet connects us to useful resources, it is also home to certain risks, such as malware, spyware, spam, and phishing. To stay safe online, you’ll need to understand these risks and learn how to avoid them.
  • 27. Beware of False Information There are no regulations or controls on the materials that are placed on the Internet. Therefore, don’t believe everything you see or read online. Simeon AyoadeAdedokun 6-Oct-16
  • 28. Know What You Want Online Internet is a unified world of systematic processes that can dictate one’s perception of reality. It provides access to large volumes of information, including what you need and things that can distract you, therefore, know what you want on the Internet. Not everything is useful! Simeon AyoadeAdedokun 6-Oct-16
  • 29. Know Who You Relate With Because the Internet is virtual community that enables users to communicate and interact on variety of platforms, it is not devoid of fraudulent activities. Therefore, you need to know who you talk to, who you chat with, or transact business with online. Not everybody or business is who they seem to be! Simeon AyoadeAdedokun 6-Oct-16
  • 30. Know The Application You Install Know the applications and browser plugins you install. As resourceful as the Internet is, it is also home to some dangerous software applications, such as spyware and malware. A spyware is a computer program that watches what people do with their computers, and then sends that information over the Internet. A malware is designed to damage the way a computer works. Simeon AyoadeAdedokun 6-Oct-16
  • 31. Know The Content You Open Not everything you see online is harmless. There are a lot of contents online that are harmful to you and your computer system. Open contents from trusted sources only. Computer viruses may be attached to a webpage and email messages. Simeon AyoadeAdedokun 6-Oct-16
  • 32. Use Firewall & Antivirus Firewall is a software or hardware that checks information coming from the Internet or a network and then either turns it away or allows it to pass through to your computer, depending on your settings. Ensure that your firewall is turned on, especially when you are connecting to a network, as it can help prevent hackers and malicious software from gaining access to your computer. Simeon AyoadeAdedokun 6-Oct-16
  • 33. Antivirus programs too are very important protective tools for internet users. They can scan web pages, email messages and any content you are downloading for potential threats. Simeon AyoadeAdedokun 6-Oct-16
  • 34. Privacy Control You are responsible for the privacy of your data and control of the information about you that others can see on the Internet. Ensure that you read the privacy policy of any website you want to register with before supplying your data; know which data they collect, how they use them and how you can control what you share on them, especially on social media. Simeon AyoadeAdedokun 6-Oct-16
  • 35. Create Strong Password A strong password is one that is easy to remember by you but difficult for an unauthorized person to guess. It is a password that is long, contains at least six characters, including both uppercase and lowercase letters, numbers and symbols. Simeon AyoadeAdedokun 6-Oct-16
  • 36. Avoid using personal information such as name or date of birth, and words found in the dictionary as password. e.g. Simeon123, 123abccdd, james1990, kate11john5, iamawinner982 are not good enough. Simeon AyoadeAdedokun 6-Oct-16
  • 37. Don’t use the same password for many accounts. If someone has your password for one account, all other accounts become vulnerable. Simeon AyoadeAdedokun 6-Oct-16
  • 38. Change your password regularly—like once in six months. Simeon AyoadeAdedokun 6-Oct-16
  • 39. Examples of strong passwords: aYo%02@aDE!06 _feM26%i a9QuberFuL%Bq k#Pi142b@np!2 Simeon AyoadeAdedokun 6-Oct-16
  • 40. Use Two-Factor Authentication (2FA or TFA) Where Available Simeon AyoadeAdedokun 6-Oct-16
  • 41. Two Factor Authentication is also called Two Step Verification or Multi-factor Authentication. Two-factor authentication is an extra layer of security that requires a user, after correct username and password are supplied, to confirm a token that only that user has on him, which may be sent to a device such as phone or via email, or generated on a token device before he can access an account or perform an operation. Simeon AyoadeAdedokun 6-Oct-16
  • 42. Confirm Web Address Ensure that you are on the right page before you perform any operation on any website, especially on e-commerce and e-banking websites. Malicious websites often use deceptive web addresses to trick users. For example, www.mtmonline.com looks similar to www.mtnonline.com, but ‘n’ is replaced with ‘m’ in the former address. Simeon AyoadeAdedokun 6-Oct-16
  • 43. Confirm Security Symbol Some websites, especially e-commerce, and e-banking websites, display a lock symbol in the address bar that shows that they are using an HTTPS (Hypertext Transfer Protocol Secure) connection, which makes it safe to enter your personal information. Simeon AyoadeAdedokun 6-Oct-16
  • 44. Regular Update of Web Browser Latest versions of web applications such as web browsers—and most applications—usually come with updated security features to protect you from new viruses and malware, so it is important to update your web browser regularly. Simeon AyoadeAdedokun 6-Oct-16
  • 45. CONCLUSION The Internet is a remarkable world filled with inexhaustible information, ideas and imaginative possibilities for communication, businesses, banking, career development, entertainment and education. It is increasingly becoming a very important part of our everyday life. Most human-oriented tasks are now available for free or at affordable rates on the Internet, all performed from home. The main advantages of the Internet are increased efficiency, convenience and wide coverage with no geographic barrier. We all need to utilize this great opportunity that came with the 21st century appropriately to revolutionize our lives, businesses and relationships; and improve our operational effectiveness and efficiency. At the same, we should learn to stay safe while exploring opportunities. Simeon AyoadeAdedokun 6-Oct-16
  • 46. Simeon Ayoade Adedokun 6-Oct-16 ABOUT THE AUTHOR Simeon Ayoade Adedokun http://fb.me/osparkle https://lnked.in/osparkle http://twitter.com/_osparkle Read more presentations and articles by the author at http://www.slideshare.net/Simeon Adedokun/