SlideShare uma empresa Scribd logo
1 de 7
Baixar para ler offline
What can you do on
the internet?
• Communication:
•

Skype has people who can communicate with each other by
seeing the other user

•

Facebook you can communicate with other but you cant see
the actual user and you can post videos, photos and so forth.

•

Twitter is another example because you can tweet to people
meaning by talk and you can also tweet to people on live
shows like the x factor.
• Education:
•

Google has alot of websites up to one million websites.
there is many that are used for education and blogging
and so forth.

•

Blogger is another one that can be used to post what you
know about about things, i recommend you to sometimes
use this website.

•

Websites can be large and can produce you info your
lookin for, as an example a link of a wesite can be a
shortcut like this one

•

http://www.kedgley.school.nz/
Entertainment:
•
• This is a link to youtube.Youtube is a page where
you can upload videos and watch videos. I use
youtube alot of times when i am free to do
anything. http://www.youtube.com/

•

Itunes is a app that you can use for your music and
anybody elses. Choose this as your place to get your
music.

•

Spotify can be used to see and enjoy new songs that have
just been added to any web on the internet. Very
creative and a good idea to slow yourself and have some
quality time to listen to songs you havent witnessed in
your life.
What not to do?
Dont know what a wizzy wig is here is a poster
made by me that can show you what to..
Ogle can get in hold of personal info ifyou are dumb enough to sign
up for anything that is not very known.
Follow you fiona can get in touch with your personal stuff but they can
do this very differently. They can trick others to be their friend when in
fact they are lying anfd they can hurt you alot
See a real story of a boy named Tom and he has been struck by this
wizzy wig.
Search this up on youtube

Tom's Story and clik on the first one.
Sponozoid is a wizzy wig that can trick you and mistake you with a
false reward like ‘You just won 100,000$ have your chance to claim
this now.
This is called spam,
Now carefully see hear and feel how this person is acting as he got
the email

Watch what happened to James...
You should pay attention to the 3 of the wizzy wigs i have just shared with you
because they are very tricky when you dot realize it, so you better pay attention
to them and dont be those wizzy wigs.

How you can be safe on the web when you
are stuck by those nasty wizzy wigs?
SPONOZOID?
You must delete the email if so you are safe for now and repeat the
process whenever you have a random email poping up on your screen.
Also ignore the email and dont anwser unless if you anwser which is a
horrible idea , your computer will shut down by force and need some time
to build up and regenerate your chunks of websites.
HOT HEAD?
Hot head can arretate you at your emotions and will be mean to you
cyberly. The best way to deal with it is tell a teacher and they can take care
of the problem her/him self. trying to ignore it will just make it worse
For example look at this video
At a distance from youtube and find the first one on the page.
FOLLOW YOU FIONA?
Do not anwser to a stranger and dont give out personal info because from
Toms story you learnt that Tom didnt think that it was an adult, he thought it
was a kid his age and thats how bad that can happen.
OGLE?
The same as follow you fiona but dont anwser to websites that are not as
clean as the others because, signing to the website will just give the advantage
to ogle to see what you post talk like act and learn dont be this wizzy wig
NUMBUT?
Numbut is a wizzy wig who is a 24/7 person who dosent have friends in the
outside world only the internet and that can be sad. Without friend nobody
will be successful in life so the best solution is to go outside and play some
sport or play with others without saying “I need to finish my game get away
from me”.

By
Daryl Fatai
Rm28

Mais conteúdo relacionado

Mais procurados

Internet safety
Internet safetyInternet safety
Internet safetyjld1018
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpointMsCCostello
 
Tool or teen fad
Tool or teen fadTool or teen fad
Tool or teen fadbenjclark
 
203 Jevon Safty
203 Jevon  Safty203 Jevon  Safty
203 Jevon Saftysmarburg
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementaryjaimejoyh
 
The 10 core rules of netiqutte
The 10 core rules of netiqutteThe 10 core rules of netiqutte
The 10 core rules of netiqutteMudgeoTorso1091
 
Responsible social media usage
Responsible social media usageResponsible social media usage
Responsible social media usagedemiboyazis
 
Ost 284 emerging technologies final exam1
Ost 284 emerging technologies final exam1Ost 284 emerging technologies final exam1
Ost 284 emerging technologies final exam1cmnorris0911
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety PresentationMichael Richards
 
Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015Jamie Edmondson
 
How to Succeed in Social Media... For College Students
How to Succeed in Social Media... For College StudentsHow to Succeed in Social Media... For College Students
How to Succeed in Social Media... For College StudentsLogan Boggs
 
Opsec for Kids
Opsec for KidsOpsec for Kids
Opsec for Kidsceiland
 
Parenting teens in a technology age
Parenting teens in a technology ageParenting teens in a technology age
Parenting teens in a technology agejcallis06
 
E safety assembly
E safety assemblyE safety assembly
E safety assemblyJEcomputing
 
Internet etiquette
Internet etiquetteInternet etiquette
Internet etiquetteAdy Setiawan
 
Internet Safety
Internet  SafetyInternet  Safety
Internet Safetyvuwildcat
 
Bullying and Cyberbullying
Bullying and CyberbullyingBullying and Cyberbullying
Bullying and CyberbullyingLidiaGon
 

Mais procurados (19)

Internet safety
Internet safetyInternet safety
Internet safety
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpoint
 
Tool or teen fad
Tool or teen fadTool or teen fad
Tool or teen fad
 
203 Jevon Safty
203 Jevon  Safty203 Jevon  Safty
203 Jevon Safty
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementary
 
The 10 core rules of netiqutte
The 10 core rules of netiqutteThe 10 core rules of netiqutte
The 10 core rules of netiqutte
 
Responsible social media usage
Responsible social media usageResponsible social media usage
Responsible social media usage
 
Ost 284 emerging technologies final exam1
Ost 284 emerging technologies final exam1Ost 284 emerging technologies final exam1
Ost 284 emerging technologies final exam1
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety Presentation
 
Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015
 
How to Succeed in Social Media... For College Students
How to Succeed in Social Media... For College StudentsHow to Succeed in Social Media... For College Students
How to Succeed in Social Media... For College Students
 
OPSEC for Kids
OPSEC for KidsOPSEC for Kids
OPSEC for Kids
 
Opsec for Kids
Opsec for KidsOpsec for Kids
Opsec for Kids
 
Parenting teens in a technology age
Parenting teens in a technology ageParenting teens in a technology age
Parenting teens in a technology age
 
E safety assembly
E safety assemblyE safety assembly
E safety assembly
 
Internet etiquette
Internet etiquetteInternet etiquette
Internet etiquette
 
Internet Safety
Internet  SafetyInternet  Safety
Internet Safety
 
Bullying and Cyberbullying
Bullying and CyberbullyingBullying and Cyberbullying
Bullying and Cyberbullying
 

Destaque

Tee Up On Your Golf Lingo
Tee Up On Your Golf LingoTee Up On Your Golf Lingo
Tee Up On Your Golf LingoJC Golf
 
10 Fantastic Golf Cities And Courses in the U.S.
10 Fantastic Golf Cities And Courses in the U.S.10 Fantastic Golf Cities And Courses in the U.S.
10 Fantastic Golf Cities And Courses in the U.S.JC Golf
 
A Guide to the Farmers Insurance Open
A Guide to the Farmers Insurance OpenA Guide to the Farmers Insurance Open
A Guide to the Farmers Insurance OpenJC Golf
 
THE MANY HEALTH BENEFITS OF GOLF (INFOGRAPHIC)
THE MANY HEALTH BENEFITS OF GOLF (INFOGRAPHIC)THE MANY HEALTH BENEFITS OF GOLF (INFOGRAPHIC)
THE MANY HEALTH BENEFITS OF GOLF (INFOGRAPHIC)JC Golf
 
ڕاپۆرتێك ده‌رباره‌ی ئه‌نتی ڤایرۆس
ڕاپۆرتێك ده‌رباره‌ی ئه‌نتی ڤایرۆس ڕاپۆرتێك ده‌رباره‌ی ئه‌نتی ڤایرۆس
ڕاپۆرتێك ده‌رباره‌ی ئه‌نتی ڤایرۆس Shwana M
 

Destaque (7)

Tee Up On Your Golf Lingo
Tee Up On Your Golf LingoTee Up On Your Golf Lingo
Tee Up On Your Golf Lingo
 
10 Fantastic Golf Cities And Courses in the U.S.
10 Fantastic Golf Cities And Courses in the U.S.10 Fantastic Golf Cities And Courses in the U.S.
10 Fantastic Golf Cities And Courses in the U.S.
 
A Guide to the Farmers Insurance Open
A Guide to the Farmers Insurance OpenA Guide to the Farmers Insurance Open
A Guide to the Farmers Insurance Open
 
THE MANY HEALTH BENEFITS OF GOLF (INFOGRAPHIC)
THE MANY HEALTH BENEFITS OF GOLF (INFOGRAPHIC)THE MANY HEALTH BENEFITS OF GOLF (INFOGRAPHIC)
THE MANY HEALTH BENEFITS OF GOLF (INFOGRAPHIC)
 
ڕاپۆرتێك ده‌رباره‌ی ئه‌نتی ڤایرۆس
ڕاپۆرتێك ده‌رباره‌ی ئه‌نتی ڤایرۆس ڕاپۆرتێك ده‌رباره‌ی ئه‌نتی ڤایرۆس
ڕاپۆرتێك ده‌رباره‌ی ئه‌نتی ڤایرۆس
 
Pedagogical uses of translation
Pedagogical uses of translationPedagogical uses of translation
Pedagogical uses of translation
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 

Semelhante a Digital citizen.key

Social Media and Law Schools
Social Media and Law Schools Social Media and Law Schools
Social Media and Law Schools Michele Pistone
 
What is social media?
What is social media?What is social media?
What is social media?Adam Larter
 
Youzus episode 5
Youzus episode 5Youzus episode 5
Youzus episode 5Youzus
 
A World-Class Dating Coach
A World-Class Dating CoachA World-Class Dating Coach
A World-Class Dating CoachVimalE2
 
English 113A Rhetorical Prospectus Answer the questions .docx
English 113A Rhetorical Prospectus Answer the questions .docxEnglish 113A Rhetorical Prospectus Answer the questions .docx
English 113A Rhetorical Prospectus Answer the questions .docxYASHU40
 
From Webkinz and Club Penguin to Facebook and Myspace: Growing up Digital
From Webkinz and Club Penguin to Facebook and Myspace: Growing up DigitalFrom Webkinz and Club Penguin to Facebook and Myspace: Growing up Digital
From Webkinz and Club Penguin to Facebook and Myspace: Growing up DigitalSacha Chua
 
5 steps to_online_dating_success
5 steps to_online_dating_success5 steps to_online_dating_success
5 steps to_online_dating_successvamshikrishna938
 
5 steps to online dating success
5 steps to online dating success5 steps to online dating success
5 steps to online dating successarunchatterjee14
 
Social media parent night
Social media parent nightSocial media parent night
Social media parent nightJenny Jongste
 
Internet safety-presentation(1)
Internet safety-presentation(1)Internet safety-presentation(1)
Internet safety-presentation(1)andreburtont
 
Internet safety guide
Internet safety guide Internet safety guide
Internet safety guide Dee Tutino
 
SOCIAL MEDIA GOODBYE FOR SOMETIME!
SOCIAL MEDIA GOODBYE FOR SOMETIME!SOCIAL MEDIA GOODBYE FOR SOMETIME!
SOCIAL MEDIA GOODBYE FOR SOMETIME!Joe Simon
 
Real relationships vs virtual relationships
Real relationships vs virtual relationshipsReal relationships vs virtual relationships
Real relationships vs virtual relationshipsAbhishek Sanyal
 
Darlene ford power point
Darlene ford power pointDarlene ford power point
Darlene ford power pointdarleneford
 
Social Media Training for Youth Leaders, for York Diocese, November 2014.
Social Media Training for Youth Leaders, for York Diocese, November 2014.Social Media Training for Youth Leaders, for York Diocese, November 2014.
Social Media Training for Youth Leaders, for York Diocese, November 2014.Bex Lewis
 
Paying College Athletes Essay Intro
Paying College Athletes Essay IntroPaying College Athletes Essay Intro
Paying College Athletes Essay IntroMichelle Stefanich
 
The Social Safety Guide
The Social Safety GuideThe Social Safety Guide
The Social Safety GuideDee Tutino
 
What Apps Your children May be using slide show final with hyperlink2015
What Apps Your children May be using slide show final with hyperlink2015What Apps Your children May be using slide show final with hyperlink2015
What Apps Your children May be using slide show final with hyperlink2015Linda Beres
 

Semelhante a Digital citizen.key (20)

Social Media and Law Schools
Social Media and Law Schools Social Media and Law Schools
Social Media and Law Schools
 
What is social media?
What is social media?What is social media?
What is social media?
 
Youzus episode 5
Youzus episode 5Youzus episode 5
Youzus episode 5
 
A World-Class Dating Coach
A World-Class Dating CoachA World-Class Dating Coach
A World-Class Dating Coach
 
My Digital Life
My Digital LifeMy Digital Life
My Digital Life
 
English 113A Rhetorical Prospectus Answer the questions .docx
English 113A Rhetorical Prospectus Answer the questions .docxEnglish 113A Rhetorical Prospectus Answer the questions .docx
English 113A Rhetorical Prospectus Answer the questions .docx
 
From Webkinz and Club Penguin to Facebook and Myspace: Growing up Digital
From Webkinz and Club Penguin to Facebook and Myspace: Growing up DigitalFrom Webkinz and Club Penguin to Facebook and Myspace: Growing up Digital
From Webkinz and Club Penguin to Facebook and Myspace: Growing up Digital
 
5 steps to_online_dating_success
5 steps to_online_dating_success5 steps to_online_dating_success
5 steps to_online_dating_success
 
5 steps to online dating success
5 steps to online dating success5 steps to online dating success
5 steps to online dating success
 
Social media parent night
Social media parent nightSocial media parent night
Social media parent night
 
Internet safety-presentation(1)
Internet safety-presentation(1)Internet safety-presentation(1)
Internet safety-presentation(1)
 
Internet safety guide
Internet safety guide Internet safety guide
Internet safety guide
 
SOCIAL MEDIA GOODBYE FOR SOMETIME!
SOCIAL MEDIA GOODBYE FOR SOMETIME!SOCIAL MEDIA GOODBYE FOR SOMETIME!
SOCIAL MEDIA GOODBYE FOR SOMETIME!
 
Using Social Media Professionally
Using Social Media ProfessionallyUsing Social Media Professionally
Using Social Media Professionally
 
Real relationships vs virtual relationships
Real relationships vs virtual relationshipsReal relationships vs virtual relationships
Real relationships vs virtual relationships
 
Darlene ford power point
Darlene ford power pointDarlene ford power point
Darlene ford power point
 
Social Media Training for Youth Leaders, for York Diocese, November 2014.
Social Media Training for Youth Leaders, for York Diocese, November 2014.Social Media Training for Youth Leaders, for York Diocese, November 2014.
Social Media Training for Youth Leaders, for York Diocese, November 2014.
 
Paying College Athletes Essay Intro
Paying College Athletes Essay IntroPaying College Athletes Essay Intro
Paying College Athletes Essay Intro
 
The Social Safety Guide
The Social Safety GuideThe Social Safety Guide
The Social Safety Guide
 
What Apps Your children May be using slide show final with hyperlink2015
What Apps Your children May be using slide show final with hyperlink2015What Apps Your children May be using slide show final with hyperlink2015
What Apps Your children May be using slide show final with hyperlink2015
 

Último

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Último (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Digital citizen.key

  • 1.
  • 2. What can you do on the internet? • Communication: • Skype has people who can communicate with each other by seeing the other user • Facebook you can communicate with other but you cant see the actual user and you can post videos, photos and so forth. • Twitter is another example because you can tweet to people meaning by talk and you can also tweet to people on live shows like the x factor.
  • 3. • Education: • Google has alot of websites up to one million websites. there is many that are used for education and blogging and so forth. • Blogger is another one that can be used to post what you know about about things, i recommend you to sometimes use this website. • Websites can be large and can produce you info your lookin for, as an example a link of a wesite can be a shortcut like this one • http://www.kedgley.school.nz/
  • 4. Entertainment: • • This is a link to youtube.Youtube is a page where you can upload videos and watch videos. I use youtube alot of times when i am free to do anything. http://www.youtube.com/ • Itunes is a app that you can use for your music and anybody elses. Choose this as your place to get your music. • Spotify can be used to see and enjoy new songs that have just been added to any web on the internet. Very creative and a good idea to slow yourself and have some quality time to listen to songs you havent witnessed in your life.
  • 5. What not to do? Dont know what a wizzy wig is here is a poster made by me that can show you what to.. Ogle can get in hold of personal info ifyou are dumb enough to sign up for anything that is not very known. Follow you fiona can get in touch with your personal stuff but they can do this very differently. They can trick others to be their friend when in fact they are lying anfd they can hurt you alot See a real story of a boy named Tom and he has been struck by this wizzy wig. Search this up on youtube Tom's Story and clik on the first one. Sponozoid is a wizzy wig that can trick you and mistake you with a false reward like ‘You just won 100,000$ have your chance to claim this now. This is called spam, Now carefully see hear and feel how this person is acting as he got the email Watch what happened to James...
  • 6. You should pay attention to the 3 of the wizzy wigs i have just shared with you because they are very tricky when you dot realize it, so you better pay attention to them and dont be those wizzy wigs. How you can be safe on the web when you are stuck by those nasty wizzy wigs? SPONOZOID? You must delete the email if so you are safe for now and repeat the process whenever you have a random email poping up on your screen. Also ignore the email and dont anwser unless if you anwser which is a horrible idea , your computer will shut down by force and need some time to build up and regenerate your chunks of websites. HOT HEAD? Hot head can arretate you at your emotions and will be mean to you cyberly. The best way to deal with it is tell a teacher and they can take care of the problem her/him self. trying to ignore it will just make it worse For example look at this video At a distance from youtube and find the first one on the page.
  • 7. FOLLOW YOU FIONA? Do not anwser to a stranger and dont give out personal info because from Toms story you learnt that Tom didnt think that it was an adult, he thought it was a kid his age and thats how bad that can happen. OGLE? The same as follow you fiona but dont anwser to websites that are not as clean as the others because, signing to the website will just give the advantage to ogle to see what you post talk like act and learn dont be this wizzy wig NUMBUT? Numbut is a wizzy wig who is a 24/7 person who dosent have friends in the outside world only the internet and that can be sad. Without friend nobody will be successful in life so the best solution is to go outside and play some sport or play with others without saying “I need to finish my game get away from me”. By Daryl Fatai Rm28