SlideShare uma empresa Scribd logo
1 de 8
Internet Safety  All images from Microsoft Office Clip Art/Office Online
Chatting & Chat Rooms An online chat is when to you talk to someone through a social networking site or program using your keyboard on the worldwide web (internet). Some examples of these are Facebook, AIM and Skype. Many e-mail websites such as Yahoo!, Google, and MSN have added free chat features to your e-mail account.
Benefits, Downfalls & Risks to Chat Rooms
Spam Spam is junk email that usually comes in the form of advertisements.  It can also be an email from someone you don’t know. Spam is a big problem because it can mess up someone’s computer and bring in viruses. If you receive spam immediately delete it.  Opening it can cause your computer major problems.  You can also report this sender. If you get an email with an attachment from someone you don’t know, just ignore it.  DON’T OPEN IT!  The attachment could carry a virus.
Spam How to control spam:  Control your filter of incoming emails. Another way is to report the spam to the spammer’s ISP.  One other way is to just ignore it.
Spam
Surfer Dude Internet is  a big group of  connected computer networks that go around the globe It is use for a way to communicate and to find out information  www means World Wide Web
Internet Safety Final Copy

Mais conteúdo relacionado

Mais procurados

Staying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘NetStaying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘NetDaniel Owens
 
Mystartbyincredibar blog com
Mystartbyincredibar blog comMystartbyincredibar blog com
Mystartbyincredibar blog comIrisPhilme
 
Instant messaging-final
Instant messaging-finalInstant messaging-final
Instant messaging-finalroutbisu
 
Protecting Your PC or Laptop
Protecting Your PC or LaptopProtecting Your PC or Laptop
Protecting Your PC or LaptopSOBXTECH
 
Ppt Vinisha And Giovanna Instant Messaging 2
Ppt Vinisha And Giovanna Instant Messaging 2Ppt Vinisha And Giovanna Instant Messaging 2
Ppt Vinisha And Giovanna Instant Messaging 2viniz
 
Security on the internet volosyanko
Security on the internet volosyankoSecurity on the internet volosyanko
Security on the internet volosyankoSergiy Sydoriv
 
Slideshow Alisha Schnapper
Slideshow Alisha SchnapperSlideshow Alisha Schnapper
Slideshow Alisha Schnapperaschnapper
 
Slide share-Susan Branch
Slide share-Susan BranchSlide share-Susan Branch
Slide share-Susan BranchSusan Branch
 
Security Pp Cis
Security Pp CisSecurity Pp Cis
Security Pp CisRobC76
 

Mais procurados (20)

Staying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘NetStaying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘Net
 
Email
EmailEmail
Email
 
Instant Messaging Apps
Instant Messaging AppsInstant Messaging Apps
Instant Messaging Apps
 
Mystartbyincredibar blog com
Mystartbyincredibar blog comMystartbyincredibar blog com
Mystartbyincredibar blog com
 
Instant messaging-final
Instant messaging-finalInstant messaging-final
Instant messaging-final
 
Protect
ProtectProtect
Protect
 
Protecting Your PC or Laptop
Protecting Your PC or LaptopProtecting Your PC or Laptop
Protecting Your PC or Laptop
 
Viruses novice
Viruses noviceViruses novice
Viruses novice
 
Threats – m2
Threats – m2Threats – m2
Threats – m2
 
P7 unit 3
P7 unit 3 P7 unit 3
P7 unit 3
 
Viruses novice
Viruses noviceViruses novice
Viruses novice
 
Ppt Vinisha And Giovanna Instant Messaging 2
Ppt Vinisha And Giovanna Instant Messaging 2Ppt Vinisha And Giovanna Instant Messaging 2
Ppt Vinisha And Giovanna Instant Messaging 2
 
Security on the internet volosyanko
Security on the internet volosyankoSecurity on the internet volosyanko
Security on the internet volosyanko
 
Enumeration
EnumerationEnumeration
Enumeration
 
Slideshow Alisha Schnapper
Slideshow Alisha SchnapperSlideshow Alisha Schnapper
Slideshow Alisha Schnapper
 
Instant Messaging
Instant MessagingInstant Messaging
Instant Messaging
 
Slide share-Susan Branch
Slide share-Susan BranchSlide share-Susan Branch
Slide share-Susan Branch
 
Security Pp Cis
Security Pp CisSecurity Pp Cis
Security Pp Cis
 
Sowmya
SowmyaSowmya
Sowmya
 
Week 4 grade_4
Week 4 grade_4Week 4 grade_4
Week 4 grade_4
 

Destaque

Közpénzek, szélessávú hálózatok és digitális stratégiák - EU perspektívából. ...
Közpénzek, szélessávú hálózatok és digitális stratégiák - EU perspektívából. ...Közpénzek, szélessávú hálózatok és digitális stratégiák - EU perspektívából. ...
Közpénzek, szélessávú hálózatok és digitális stratégiák - EU perspektívából. ...gaalnorb
 
Tecla News - Fevereiro/2010
Tecla News - Fevereiro/2010Tecla News - Fevereiro/2010
Tecla News - Fevereiro/2010Tecla Internet
 
Stupid Things In Product Management
Stupid Things In Product ManagementStupid Things In Product Management
Stupid Things In Product ManagementJon Gatrell
 
historia del internet
historia del internethistoria del internet
historia del internetdaniel sport
 
Clipping Tecla O Globo JAN 2011
Clipping Tecla O Globo JAN 2011Clipping Tecla O Globo JAN 2011
Clipping Tecla O Globo JAN 2011Tecla Internet
 

Destaque (6)

Közpénzek, szélessávú hálózatok és digitális stratégiák - EU perspektívából. ...
Közpénzek, szélessávú hálózatok és digitális stratégiák - EU perspektívából. ...Közpénzek, szélessávú hálózatok és digitális stratégiák - EU perspektívából. ...
Közpénzek, szélessávú hálózatok és digitális stratégiák - EU perspektívából. ...
 
Evolution of end-to-end: why the Internet is not like any other network
Evolution of end-to-end: why the Internet is not like any other networkEvolution of end-to-end: why the Internet is not like any other network
Evolution of end-to-end: why the Internet is not like any other network
 
Tecla News - Fevereiro/2010
Tecla News - Fevereiro/2010Tecla News - Fevereiro/2010
Tecla News - Fevereiro/2010
 
Stupid Things In Product Management
Stupid Things In Product ManagementStupid Things In Product Management
Stupid Things In Product Management
 
historia del internet
historia del internethistoria del internet
historia del internet
 
Clipping Tecla O Globo JAN 2011
Clipping Tecla O Globo JAN 2011Clipping Tecla O Globo JAN 2011
Clipping Tecla O Globo JAN 2011
 

Semelhante a Internet Safety Final Copy

Lets fight the self-appointed Spam Lords
Lets fight the self-appointed Spam LordsLets fight the self-appointed Spam Lords
Lets fight the self-appointed Spam Lordsjgnetworks
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSedrianrheine
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesMark Jhon Oxillo
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
Features Of The Internet
Features Of The InternetFeatures Of The Internet
Features Of The Internetkimromero
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Finalguest5000f0a
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammerguest2e06031d
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammerguest2e06031d
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is DangerousGihan Dias
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSlesteraporado16
 
Symptoms of aol and remove
Symptoms of aol and removeSymptoms of aol and remove
Symptoms of aol and removejreidmichele
 
Spamming Ict
Spamming   IctSpamming   Ict
Spamming Ictsiewying
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of NetiquetteRochelle Nato
 

Semelhante a Internet Safety Final Copy (20)

Spam
SpamSpam
Spam
 
What Is Spam
What Is SpamWhat Is Spam
What Is Spam
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Lets fight the self-appointed Spam Lords
Lets fight the self-appointed Spam LordsLets fight the self-appointed Spam Lords
Lets fight the self-appointed Spam Lords
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Features Of The Internet
Features Of The InternetFeatures Of The Internet
Features Of The Internet
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammer
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammer
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
Avoiding email viruses
Avoiding email virusesAvoiding email viruses
Avoiding email viruses
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
 
Symptoms of aol and remove
Symptoms of aol and removeSymptoms of aol and remove
Symptoms of aol and remove
 
Spam!
Spam!Spam!
Spam!
 
Spamming Ict
Spamming   IctSpamming   Ict
Spamming Ict
 
email_
email_email_
email_
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
 

Último

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 

Último (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

Internet Safety Final Copy

  • 1. Internet Safety All images from Microsoft Office Clip Art/Office Online
  • 2. Chatting & Chat Rooms An online chat is when to you talk to someone through a social networking site or program using your keyboard on the worldwide web (internet). Some examples of these are Facebook, AIM and Skype. Many e-mail websites such as Yahoo!, Google, and MSN have added free chat features to your e-mail account.
  • 3. Benefits, Downfalls & Risks to Chat Rooms
  • 4. Spam Spam is junk email that usually comes in the form of advertisements. It can also be an email from someone you don’t know. Spam is a big problem because it can mess up someone’s computer and bring in viruses. If you receive spam immediately delete it. Opening it can cause your computer major problems. You can also report this sender. If you get an email with an attachment from someone you don’t know, just ignore it. DON’T OPEN IT! The attachment could carry a virus.
  • 5. Spam How to control spam: Control your filter of incoming emails. Another way is to report the spam to the spammer’s ISP. One other way is to just ignore it.
  • 7. Surfer Dude Internet is a big group of connected computer networks that go around the globe It is use for a way to communicate and to find out information www means World Wide Web