SlideShare uma empresa Scribd logo
1 de 10
INTERNET  SAFETY RULES By  Molly
1. Never meet someone in person who you have met on the Internet.
2. Never tell someone on-line your address.
3. Don’t share your password.
4.Never tell someone on-line your phone number.
5.Never give out your full name on –line.
6. If you pick a screen name choose one which doesn’t tell if you’re a boy or girl.
7.Don’t give out to much personal information.
8. Use common sense and be smart.
The End.

Mais conteúdo relacionado

Mais procurados

Katelyn
KatelynKatelyn
Katelynmorag
 
Kyra
KyraKyra
Kyramorag
 
Malaina
MalainaMalaina
Malainamorag
 
Miss R
Miss RMiss R
Miss Rmorag
 
Eric2
Eric2Eric2
Eric2morag
 
Top 10 Internet Safety
Top 10 Internet SafetyTop 10 Internet Safety
Top 10 Internet Safetydarrylstott1
 
Cell phone safty
Cell phone saftyCell phone safty
Cell phone saftyicecream101
 
Ten rules for teens safe Internet usage
Ten rules for teens safe Internet usageTen rules for teens safe Internet usage
Ten rules for teens safe Internet usageDaywalk3r
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Finalguest5558240
 
The World Wide Web
The World Wide WebThe World Wide Web
The World Wide WebTony L
 
Mac Kenzi D. Group#3
Mac Kenzi D. Group#3Mac Kenzi D. Group#3
Mac Kenzi D. Group#3guest3e462b5
 
Internet safety gerard and saul
Internet safety gerard and saulInternet safety gerard and saul
Internet safety gerard and saulSaul Vidal Swales
 
Internet Safety
Internet  SafetyInternet  Safety
Internet Safetyvuwildcat
 

Mais procurados (20)

Katelyn
KatelynKatelyn
Katelyn
 
Kyra
KyraKyra
Kyra
 
Malaina
MalainaMalaina
Malaina
 
Miss R
Miss RMiss R
Miss R
 
Eric2
Eric2Eric2
Eric2
 
Top 10 Internet Safety
Top 10 Internet SafetyTop 10 Internet Safety
Top 10 Internet Safety
 
George
GeorgeGeorge
George
 
Cell phone safty
Cell phone saftyCell phone safty
Cell phone safty
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Ten rules for teens safe Internet usage
Ten rules for teens safe Internet usageTen rules for teens safe Internet usage
Ten rules for teens safe Internet usage
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
The World Wide Web
The World Wide WebThe World Wide Web
The World Wide Web
 
Cell phone safty
Cell phone saftyCell phone safty
Cell phone safty
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Kirstin's i safe ppt
Kirstin's i safe pptKirstin's i safe ppt
Kirstin's i safe ppt
 
Mac Kenzi D. Group#3
Mac Kenzi D. Group#3Mac Kenzi D. Group#3
Mac Kenzi D. Group#3
 
Internet safety gerard and saul
Internet safety gerard and saulInternet safety gerard and saul
Internet safety gerard and saul
 
Internet Safety
Internet  SafetyInternet  Safety
Internet Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Nour bassem 10 a
Nour bassem   10 aNour bassem   10 a
Nour bassem 10 a
 

Destaque

St. patricks day powerpoint
St. patricks day   powerpointSt. patricks day   powerpoint
St. patricks day powerpointFlor do Norte
 
Saint Patrick’S Day
Saint Patrick’S DaySaint Patrick’S Day
Saint Patrick’S DayAnna Solà
 
A tourist leaflet of san josé andrea clavijo team
A tourist leaflet of san josé andrea clavijo teamA tourist leaflet of san josé andrea clavijo team
A tourist leaflet of san josé andrea clavijo team2englishteacher
 
Saint patrick treasure hunt
Saint patrick treasure huntSaint patrick treasure hunt
Saint patrick treasure hunt2englishteacher
 
History of St. Patrick's Day
History of St. Patrick's DayHistory of St. Patrick's Day
History of St. Patrick's Daykatiegrocholski
 
Symbols of St. Patrick's Day
Symbols of St. Patrick's DaySymbols of St. Patrick's Day
Symbols of St. Patrick's Dayfengchuishaster
 
St. patrick's day powerpoint
St. patrick's day powerpointSt. patrick's day powerpoint
St. patrick's day powerpointmariaabilleira
 

Destaque (12)

St. patricks day powerpoint
St. patricks day   powerpointSt. patricks day   powerpoint
St. patricks day powerpoint
 
St patrick’s day
St patrick’s daySt patrick’s day
St patrick’s day
 
Saint Patrick’S Day
Saint Patrick’S DaySaint Patrick’S Day
Saint Patrick’S Day
 
St Patrick's Day
St Patrick's DaySt Patrick's Day
St Patrick's Day
 
A tourist leaflet of san josé andrea clavijo team
A tourist leaflet of san josé andrea clavijo teamA tourist leaflet of san josé andrea clavijo team
A tourist leaflet of san josé andrea clavijo team
 
Saint patrick treasure hunt
Saint patrick treasure huntSaint patrick treasure hunt
Saint patrick treasure hunt
 
History of St. Patrick's Day
History of St. Patrick's DayHistory of St. Patrick's Day
History of St. Patrick's Day
 
St Patrick's Day
St Patrick's DaySt Patrick's Day
St Patrick's Day
 
Symbols of St. Patrick's Day
Symbols of St. Patrick's DaySymbols of St. Patrick's Day
Symbols of St. Patrick's Day
 
Saint Patrick's Day
Saint Patrick's DaySaint Patrick's Day
Saint Patrick's Day
 
Story of Saint Patrick
Story of Saint PatrickStory of Saint Patrick
Story of Saint Patrick
 
St. patrick's day powerpoint
St. patrick's day powerpointSt. patrick's day powerpoint
St. patrick's day powerpoint
 

Mais de morag

Travel Club Meeting Dec 2021
Travel Club Meeting Dec 2021Travel Club Meeting Dec 2021
Travel Club Meeting Dec 2021morag
 
Peer Editing Oct 2020
Peer Editing Oct 2020Peer Editing Oct 2020
Peer Editing Oct 2020morag
 
Big Box of Cards
Big Box of CardsBig Box of Cards
Big Box of Cardsmorag
 
Bifocal - Chapter 28
Bifocal - Chapter 28Bifocal - Chapter 28
Bifocal - Chapter 28morag
 
Bifocal - Chapters 26 & 27
Bifocal - Chapters 26 & 27Bifocal - Chapters 26 & 27
Bifocal - Chapters 26 & 27morag
 
Student & Worker Roles - Careers 7
Student & Worker Roles - Careers 7Student & Worker Roles - Careers 7
Student & Worker Roles - Careers 7morag
 
Bifocal - Chapters 24 & 25
Bifocal - Chapters 24 & 25Bifocal - Chapters 24 & 25
Bifocal - Chapters 24 & 25morag
 
Bifocal - Chapter 23
Bifocal - Chapter 23Bifocal - Chapter 23
Bifocal - Chapter 23morag
 
Bifocal - Chapter 22
Bifocal - Chapter 22Bifocal - Chapter 22
Bifocal - Chapter 22morag
 
Bifocal - Chapter 21
Bifocal - Chapter 21Bifocal - Chapter 21
Bifocal - Chapter 21morag
 
The Outsiders - Chapters 11 & 12
The Outsiders -  Chapters 11 & 12The Outsiders -  Chapters 11 & 12
The Outsiders - Chapters 11 & 12morag
 
Bifocal Chapter 20
Bifocal Chapter 20Bifocal Chapter 20
Bifocal Chapter 20morag
 
Bifocal Chapter 19
Bifocal Chapter 19Bifocal Chapter 19
Bifocal Chapter 19morag
 
Bifocal Chapter 18
Bifocal Chapter 18Bifocal Chapter 18
Bifocal Chapter 18morag
 
Bifocal - Chapter 17
Bifocal - Chapter 17Bifocal - Chapter 17
Bifocal - Chapter 17morag
 
Computers 7
Computers 7 Computers 7
Computers 7 morag
 
Bifocal Chapter 16
Bifocal Chapter 16Bifocal Chapter 16
Bifocal Chapter 16morag
 
Bifocal Chapter 15
Bifocal Chapter 15Bifocal Chapter 15
Bifocal Chapter 15morag
 
Bifocal - Chapter 14
Bifocal - Chapter 14Bifocal - Chapter 14
Bifocal - Chapter 14morag
 
Bifocal - Chapter 12 & 13
Bifocal - Chapter 12 & 13Bifocal - Chapter 12 & 13
Bifocal - Chapter 12 & 13morag
 

Mais de morag (20)

Travel Club Meeting Dec 2021
Travel Club Meeting Dec 2021Travel Club Meeting Dec 2021
Travel Club Meeting Dec 2021
 
Peer Editing Oct 2020
Peer Editing Oct 2020Peer Editing Oct 2020
Peer Editing Oct 2020
 
Big Box of Cards
Big Box of CardsBig Box of Cards
Big Box of Cards
 
Bifocal - Chapter 28
Bifocal - Chapter 28Bifocal - Chapter 28
Bifocal - Chapter 28
 
Bifocal - Chapters 26 & 27
Bifocal - Chapters 26 & 27Bifocal - Chapters 26 & 27
Bifocal - Chapters 26 & 27
 
Student & Worker Roles - Careers 7
Student & Worker Roles - Careers 7Student & Worker Roles - Careers 7
Student & Worker Roles - Careers 7
 
Bifocal - Chapters 24 & 25
Bifocal - Chapters 24 & 25Bifocal - Chapters 24 & 25
Bifocal - Chapters 24 & 25
 
Bifocal - Chapter 23
Bifocal - Chapter 23Bifocal - Chapter 23
Bifocal - Chapter 23
 
Bifocal - Chapter 22
Bifocal - Chapter 22Bifocal - Chapter 22
Bifocal - Chapter 22
 
Bifocal - Chapter 21
Bifocal - Chapter 21Bifocal - Chapter 21
Bifocal - Chapter 21
 
The Outsiders - Chapters 11 & 12
The Outsiders -  Chapters 11 & 12The Outsiders -  Chapters 11 & 12
The Outsiders - Chapters 11 & 12
 
Bifocal Chapter 20
Bifocal Chapter 20Bifocal Chapter 20
Bifocal Chapter 20
 
Bifocal Chapter 19
Bifocal Chapter 19Bifocal Chapter 19
Bifocal Chapter 19
 
Bifocal Chapter 18
Bifocal Chapter 18Bifocal Chapter 18
Bifocal Chapter 18
 
Bifocal - Chapter 17
Bifocal - Chapter 17Bifocal - Chapter 17
Bifocal - Chapter 17
 
Computers 7
Computers 7 Computers 7
Computers 7
 
Bifocal Chapter 16
Bifocal Chapter 16Bifocal Chapter 16
Bifocal Chapter 16
 
Bifocal Chapter 15
Bifocal Chapter 15Bifocal Chapter 15
Bifocal Chapter 15
 
Bifocal - Chapter 14
Bifocal - Chapter 14Bifocal - Chapter 14
Bifocal - Chapter 14
 
Bifocal - Chapter 12 & 13
Bifocal - Chapter 12 & 13Bifocal - Chapter 12 & 13
Bifocal - Chapter 12 & 13
 

Último

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 

Último (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Molly