SlideShare uma empresa Scribd logo
1 de 12
Im  a chatterer  An online chat is any kind of one on one communication over the internet.
You can only give out information that won’t reveal any personal info about you, unless you are talking to one of your close friends. You should never give out information that involves your personal life such as: your real name, pictures of you, your school, address or your parents’ credit card numbers Remember, if you need a screen name to be in a chat always use a nickname!
Internet SafetyPictures from  clip art
Netiquette Ned Netiquette is the etiquette of the internet.  The basic rule of netiquette is remember the person you are talking to is a human. Which means treat them the way you want to be treated  You should stay away from using all capital letters because it is considered shouting & impolite. Picture from   
Being online A flame war is when you insult someone and when someone is angry and takes it out on other people. You do not want to insulate people because you could start a flame war.  To prevent a flame war, be polite and never give out hurtful information because people will be offended.  What you should  do if you become uncomfortable with a topic or site you find on the Internet, you should get out the chat. An emoticon is icon that shows emotions.
Internet Safety By Lyle W
Slick The Spammer Spam slows down your computer. Normally spam comes from someone using a mailing list, or many people he sends the same e-mail to. Spam is like an infection, because once you get spammed, the amount of it will keep growing as your e-mail address gets sold to other spammers.
Reducing Spam There are three ways to reduce spam. 2)       Do not give out your e-mail address (not very easy, is it?) Set your e-mail filters. It won’t stop spam, but it will reduce it. 3)       Report the      spammer’s ISP, which is not easy: it’s practically rocket science. The spammer will send his mail through many e-mail aliases.
Internet Safety
Surfer Dude The internet is a place where you can search for anything you want to. It is also a global network. Internet should be used to look up information, look for jobs, or play games that have information in them. ` Browser is a program that allows you to access all the information available on the web. Two examples of a browser are, Internet Explorer and Mozilla Firefox. WWW stands for world wide web. It is different from the internet because it builds on top of the internet.
A search engine is used to help you find something that you are looking for. Google and ask are search engines that are geared towards kids. To promote internet safety you can block websites that are not appropriate for kids.  Three benefits from joining the information super highway are to get help with homework, it increases reading skills, and to connect with places around the world. You should NEVER give out your passwords, address, telephone or credit card information over the internet. Although, you CAN give out your world wide information.

Mais conteúdo relacionado

Mais procurados

Slick The Spammer
Slick The SpammerSlick The Spammer
Slick The Spammer
guest80ad5c
 
Internet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, CalebInternet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, Caleb
guestde489f
 
Internet Safety Netiquette Ned
Internet Safety Netiquette NedInternet Safety Netiquette Ned
Internet Safety Netiquette Ned
guest7ac5b0e4
 
Rules of netiquette
Rules of netiquetteRules of netiquette
Rules of netiquette
klknight79
 
Netiquette Ned Chandler
Netiquette Ned ChandlerNetiquette Ned Chandler
Netiquette Ned Chandler
guest5fc50d1
 
Internet Safety Emmabalison
Internet Safety EmmabalisonInternet Safety Emmabalison
Internet Safety Emmabalison
guest13f93438
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
guest5a7b36
 

Mais procurados (18)

Im A Chatter Al
Im A Chatter AlIm A Chatter Al
Im A Chatter Al
 
Slick The Spammer
Slick The SpammerSlick The Spammer
Slick The Spammer
 
What Is Spam
What Is SpamWhat Is Spam
What Is Spam
 
Internet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, CalebInternet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, Caleb
 
Internet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, CalebInternet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, Caleb
 
Spam
SpamSpam
Spam
 
Internet Safety Netiquette Ned
Internet Safety Netiquette NedInternet Safety Netiquette Ned
Internet Safety Netiquette Ned
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
How to use internet safely
How to use internet safelyHow to use internet safely
How to use internet safely
 
Rules of netiquette
Rules of netiquetteRules of netiquette
Rules of netiquette
 
Internet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersInternet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and Beginners
 
Netiquette Ned Chandler
Netiquette Ned ChandlerNetiquette Ned Chandler
Netiquette Ned Chandler
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety Emmabalison
Internet Safety EmmabalisonInternet Safety Emmabalison
Internet Safety Emmabalison
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety Presentation
 

Destaque

References Letters from Previous Employers
References Letters from Previous EmployersReferences Letters from Previous Employers
References Letters from Previous Employers
ydbowen
 
Relationship 3 Holistic-Balance
Relationship 3 Holistic-BalanceRelationship 3 Holistic-Balance
Relationship 3 Holistic-Balance
Nagraj Jain
 
Fotos Graciosas 33657
Fotos Graciosas 33657Fotos Graciosas 33657
Fotos Graciosas 33657
guest73dcef1
 
Fotos Graciosas 33657
Fotos Graciosas 33657Fotos Graciosas 33657
Fotos Graciosas 33657
guest73dcef1
 
Something Wild Story Book
Something Wild Story BookSomething Wild Story Book
Something Wild Story Book
roscocker
 
Something Wild Story Book
Something Wild Story BookSomething Wild Story Book
Something Wild Story Book
roscocker
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
guest0c7b65
 
Emmit Final All For Real
Emmit Final All For RealEmmit Final All For Real
Emmit Final All For Real
guestb15460
 
Aviation Analytics Presentation
Aviation Analytics  PresentationAviation Analytics  Presentation
Aviation Analytics Presentation
Jon Soars
 

Destaque (16)

Un Passaporto per il Mare 2010
Un Passaporto per il Mare 2010Un Passaporto per il Mare 2010
Un Passaporto per il Mare 2010
 
References Letters from Previous Employers
References Letters from Previous EmployersReferences Letters from Previous Employers
References Letters from Previous Employers
 
Relationship 3 Holistic-Balance
Relationship 3 Holistic-BalanceRelationship 3 Holistic-Balance
Relationship 3 Holistic-Balance
 
Fotos Graciosas 33657
Fotos Graciosas 33657Fotos Graciosas 33657
Fotos Graciosas 33657
 
Daily Prayer
Daily PrayerDaily Prayer
Daily Prayer
 
Avatar
AvatarAvatar
Avatar
 
Fotos Graciosas 33657
Fotos Graciosas 33657Fotos Graciosas 33657
Fotos Graciosas 33657
 
Love - The Mightiest Motivator
Love - The Mightiest MotivatorLove - The Mightiest Motivator
Love - The Mightiest Motivator
 
Something Wild Story Book
Something Wild Story BookSomething Wild Story Book
Something Wild Story Book
 
Something Wild Story Book
Something Wild Story BookSomething Wild Story Book
Something Wild Story Book
 
Business Guide Final
Business Guide FinalBusiness Guide Final
Business Guide Final
 
Business Guide Final
Business Guide FinalBusiness Guide Final
Business Guide Final
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
Emmit Final All For Real
Emmit Final All For RealEmmit Final All For Real
Emmit Final All For Real
 
My Top 10
My Top 10My Top 10
My Top 10
 
Aviation Analytics Presentation
Aviation Analytics  PresentationAviation Analytics  Presentation
Aviation Analytics Presentation
 

Semelhante a Internet Safety Final

Mac Kenzi D. Group#3
Mac Kenzi D. Group#3Mac Kenzi D. Group#3
Mac Kenzi D. Group#3
guest3e462b5
 
Internet Safety Im Chatterer
Internet Safety  Im ChattererInternet Safety  Im Chatterer
Internet Safety Im Chatterer
guest4fd30d4
 
Internet Safety Surfer Dude
Internet Safety Surfer DudeInternet Safety Surfer Dude
Internet Safety Surfer Dude
guesta2b256
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
guest011ce7
 
Internet Safety Power Point
Internet Safety Power PointInternet Safety Power Point
Internet Safety Power Point
guest24931c
 
Internet Safety: I
Internet Safety: IInternet Safety: I
Internet Safety: I
mlegan31
 
The internet
The internetThe internet
The internet
sevoo12
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
cey.ruth
 
Evans,Vinces,Coles I.S.1
Evans,Vinces,Coles I.S.1Evans,Vinces,Coles I.S.1
Evans,Vinces,Coles I.S.1
guest1d951ee
 
Digital etiquette for wiki presentation
Digital etiquette for wiki presentationDigital etiquette for wiki presentation
Digital etiquette for wiki presentation
Debra Duncan
 

Semelhante a Internet Safety Final (19)

Mac Kenzi D. Group#3
Mac Kenzi D. Group#3Mac Kenzi D. Group#3
Mac Kenzi D. Group#3
 
Internet Safety Im Chatterer
Internet Safety  Im ChattererInternet Safety  Im Chatterer
Internet Safety Im Chatterer
 
Internet Safety Surfer Dude
Internet Safety Surfer DudeInternet Safety Surfer Dude
Internet Safety Surfer Dude
 
Internet safty
Internet saftyInternet safty
Internet safty
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
Internet Safety Power Point
Internet Safety Power PointInternet Safety Power Point
Internet Safety Power Point
 
online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdf
 
Internet Safety: I
Internet Safety: IInternet Safety: I
Internet Safety: I
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
The internet
The internetThe internet
The internet
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
SH003 Lesson 2_ Netiquette using the Internet.pptx
SH003 Lesson 2_ Netiquette using the Internet.pptxSH003 Lesson 2_ Netiquette using the Internet.pptx
SH003 Lesson 2_ Netiquette using the Internet.pptx
 
Evans,Vinces,Coles I.S.1
Evans,Vinces,Coles I.S.1Evans,Vinces,Coles I.S.1
Evans,Vinces,Coles I.S.1
 
Digital etiquette for wiki presentation
Digital etiquette for wiki presentationDigital etiquette for wiki presentation
Digital etiquette for wiki presentation
 
10things
10things10things
10things
 

Último

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 

Último (20)

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 

Internet Safety Final

  • 1. Im a chatterer An online chat is any kind of one on one communication over the internet.
  • 2.
  • 3. You can only give out information that won’t reveal any personal info about you, unless you are talking to one of your close friends. You should never give out information that involves your personal life such as: your real name, pictures of you, your school, address or your parents’ credit card numbers Remember, if you need a screen name to be in a chat always use a nickname!
  • 5. Netiquette Ned Netiquette is the etiquette of the internet.  The basic rule of netiquette is remember the person you are talking to is a human. Which means treat them the way you want to be treated You should stay away from using all capital letters because it is considered shouting & impolite. Picture from  
  • 6. Being online A flame war is when you insult someone and when someone is angry and takes it out on other people. You do not want to insulate people because you could start a flame war. To prevent a flame war, be polite and never give out hurtful information because people will be offended.  What you should do if you become uncomfortable with a topic or site you find on the Internet, you should get out the chat. An emoticon is icon that shows emotions.
  • 8. Slick The Spammer Spam slows down your computer. Normally spam comes from someone using a mailing list, or many people he sends the same e-mail to. Spam is like an infection, because once you get spammed, the amount of it will keep growing as your e-mail address gets sold to other spammers.
  • 9. Reducing Spam There are three ways to reduce spam. 2) Do not give out your e-mail address (not very easy, is it?) Set your e-mail filters. It won’t stop spam, but it will reduce it. 3) Report the spammer’s ISP, which is not easy: it’s practically rocket science. The spammer will send his mail through many e-mail aliases.
  • 11. Surfer Dude The internet is a place where you can search for anything you want to. It is also a global network. Internet should be used to look up information, look for jobs, or play games that have information in them. ` Browser is a program that allows you to access all the information available on the web. Two examples of a browser are, Internet Explorer and Mozilla Firefox. WWW stands for world wide web. It is different from the internet because it builds on top of the internet.
  • 12. A search engine is used to help you find something that you are looking for. Google and ask are search engines that are geared towards kids. To promote internet safety you can block websites that are not appropriate for kids. Three benefits from joining the information super highway are to get help with homework, it increases reading skills, and to connect with places around the world. You should NEVER give out your passwords, address, telephone or credit card information over the internet. Although, you CAN give out your world wide information.