SlideShare uma empresa Scribd logo
1 de 1
Baixar para ler offline
STAY SAFE ON FACEBOOK!
1) Ask a parent’s permission before starting a Facebook account. Facebook’s rules say you must be 13 or
   older to have any account.
2) Only friend people you know. If you don’t know someone, ask your parents.
3) Never post personal information over Facebook, including address, phone number and age.
4) Look at your privacy settings. Set to “Friends Only.” Ask a parent to help you!
5) Watch out for Facebook apps. Some are spam and can ruin your computer.
6) Report cyberbullying, even if the person is not bullying you!
7) Use common sense. If something doesn’t feel right, then don’t do it!



                 N    I     U     Y     H     H    B     S     F     J     T     F    S     J        Z
                 R    O     U     P     W     Q    E     U     A     L     L     A    W     P        F
                 M    W     T     S     L     T    B     R     C     H     Q     D    C     J        V
                 M    R     V     I     T     O    T     S     E     U     Q     E    R     T        U
                 T    Q     D     I     F     S    A     V     B     E     I     Y    W     N        A
                 B    D     N     I     Y     I    Y     D     O     W     I     G    P     E        O
                 M    G     G     P     E     C    C     D     O     Y     U     D    X     M        I
                 S    N     X     I     X     U    A     A     K     L     N     E    X     M        V
                 P    H     O     T     O     S    B     V     T     E     O     K    X     O        B
                 Y    N     S     M     H     S    H     M     I     I     J     I    X     C        K
                 M    M     A     P     H     E    S     R     I     R     O     L    Z     P        V
                 S    P     T     A     P     U    F     U     D     W     P     N    T     A        G
                 S    I     R     N     B     A    W     I     Q     J     J     A    S     G        M
                 L    E     K     E     H     F    Q     A     K     G     Q     V    T     E        H
                 C    Y     B     E     R     B    U     L     L     Y     I     N    G     S        Q

        APPS                                       LIKE                                        SHARE
        COMMENT                                    NOTIFICATIONS                               SPAM
        CYBERBULLYING                              PAGES                                       TAG
        FACEBOOK                                   PHOTOS                                      UPLOAD
        FRIEND                                     PRIVACY                                     WALL
        LIKE                                       SETTINGS

                   Brought to you by Hound Dog Social Media | www.facebook.com/HoundDogSocialMedia

Mais conteúdo relacionado

Mais procurados (18)

Caça-palavras trovadorismo1 resposta
Caça-palavras trovadorismo1 respostaCaça-palavras trovadorismo1 resposta
Caça-palavras trovadorismo1 resposta
 
Sopa de letras sena
Sopa de letras senaSopa de letras sena
Sopa de letras sena
 
Sopa de letras.
Sopa de letras.Sopa de letras.
Sopa de letras.
 
Sopa
SopaSopa
Sopa
 
Sopa de letras
Sopa de letras Sopa de letras
Sopa de letras
 
Sopa de letras
Sopa de letrasSopa de letras
Sopa de letras
 
Caça-palavras classes de palavras resp
Caça-palavras classes de palavras respCaça-palavras classes de palavras resp
Caça-palavras classes de palavras resp
 
Sopa de letras
Sopa de letrasSopa de letras
Sopa de letras
 
Caça-palavras barroco1 resposta
Caça-palavras barroco1 respostaCaça-palavras barroco1 resposta
Caça-palavras barroco1 resposta
 
sopa de letras - dibujos
sopa de letras - dibujos sopa de letras - dibujos
sopa de letras - dibujos
 
Caça-palavras homonimos e paronimos1 resposta
Caça-palavras homonimos e paronimos1 respostaCaça-palavras homonimos e paronimos1 resposta
Caça-palavras homonimos e paronimos1 resposta
 
Word search
Word searchWord search
Word search
 
Caca 7 ano g cap1
Caca 7 ano g cap1Caca 7 ano g cap1
Caca 7 ano g cap1
 
Sopa de letras y plano 1
Sopa de letras y plano 1Sopa de letras y plano 1
Sopa de letras y plano 1
 
OUTPUT WORD DETECTIVE
OUTPUT WORD DETECTIVEOUTPUT WORD DETECTIVE
OUTPUT WORD DETECTIVE
 
Cari kata elektrik tahun4
Cari kata elektrik tahun4Cari kata elektrik tahun4
Cari kata elektrik tahun4
 
Sopa de letras
Sopa de letrasSopa de letras
Sopa de letras
 
Sopa de letras
Sopa de letrasSopa de letras
Sopa de letras
 

Semelhante a Facebook word search

Semelhante a Facebook word search (20)

Sopa de letras...
Sopa de letras...Sopa de letras...
Sopa de letras...
 
Sopa --de--letras
Sopa --de--letrasSopa --de--letras
Sopa --de--letras
 
Sopa de letras #1
Sopa de letras #1Sopa de letras #1
Sopa de letras #1
 
Sopa de letras vale
Sopa de letras valeSopa de letras vale
Sopa de letras vale
 
Sopa De Letras
Sopa De Letras Sopa De Letras
Sopa De Letras
 
Sopa --de--letras
Sopa --de--letrasSopa --de--letras
Sopa --de--letras
 
Sopa de letras
Sopa de letras Sopa de letras
Sopa de letras
 
ANCARES
ANCARESANCARES
ANCARES
 
SOPA DE LETRAS
SOPA DE LETRASSOPA DE LETRAS
SOPA DE LETRAS
 
Sopa --de--letras
Sopa --de--letrasSopa --de--letras
Sopa --de--letras
 
Sopa --de--letras (1)
Sopa --de--letras (1)Sopa --de--letras (1)
Sopa --de--letras (1)
 
Sopa --de--letras
Sopa --de--letrasSopa --de--letras
Sopa --de--letras
 
Sopa --de--letras (1)
Sopa --de--letras (1)Sopa --de--letras (1)
Sopa --de--letras (1)
 
Sopa --de--letras
Sopa --de--letrasSopa --de--letras
Sopa --de--letras
 
SOPA DE LETRAS
SOPA DE LETRASSOPA DE LETRAS
SOPA DE LETRAS
 
SOPA DE LETRAS
SOPA DE LETRASSOPA DE LETRAS
SOPA DE LETRAS
 
Sopa --de--letras
Sopa --de--letrasSopa --de--letras
Sopa --de--letras
 
Sopa de Letras
Sopa  de LetrasSopa  de Letras
Sopa de Letras
 
Sopa --de--letras (1)
Sopa --de--letras (1)Sopa --de--letras (1)
Sopa --de--letras (1)
 
Sopa --de--letras-4
Sopa --de--letras-4Sopa --de--letras-4
Sopa --de--letras-4
 

Último

Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 

Último (20)

Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 

Facebook word search

  • 1. STAY SAFE ON FACEBOOK! 1) Ask a parent’s permission before starting a Facebook account. Facebook’s rules say you must be 13 or older to have any account. 2) Only friend people you know. If you don’t know someone, ask your parents. 3) Never post personal information over Facebook, including address, phone number and age. 4) Look at your privacy settings. Set to “Friends Only.” Ask a parent to help you! 5) Watch out for Facebook apps. Some are spam and can ruin your computer. 6) Report cyberbullying, even if the person is not bullying you! 7) Use common sense. If something doesn’t feel right, then don’t do it! N I U Y H H B S F J T F S J Z R O U P W Q E U A L L A W P F M W T S L T B R C H Q D C J V M R V I T O T S E U Q E R T U T Q D I F S A V B E I Y W N A B D N I Y I Y D O W I G P E O M G G P E C C D O Y U D X M I S N X I X U A A K L N E X M V P H O T O S B V T E O K X O B Y N S M H S H M I I J I X C K M M A P H E S R I R O L Z P V S P T A P U F U D W P N T A G S I R N B A W I Q J J A S G M L E K E H F Q A K G Q V T E H C Y B E R B U L L Y I N G S Q APPS LIKE SHARE COMMENT NOTIFICATIONS SPAM CYBERBULLYING PAGES TAG FACEBOOK PHOTOS UPLOAD FRIEND PRIVACY WALL LIKE SETTINGS Brought to you by Hound Dog Social Media | www.facebook.com/HoundDogSocialMedia