SlideShare una empresa de Scribd logo
1 de 77
Internet Safety
    Mr Eric Castro
Tell a neighbor: What do you remember
  from your grammar school internet
           safety presentations?
Create a Positive Digital Footprint

       Protect Your Privacy

Protect Yourself from Identity Theft

   Protect Yourself from Bullies

 Protect Yourself from Predators

  Protect Yourself from Yourself
Create a Positive
Digital Footprint


                    1
Tell a neighbor: What are you most
proud of having produced or created
             that’s online?
Our digital footprint
is the evidence of our
online activities.
You want to
  leave positive
digital footprints.



          Lost by Stephen Nicholas
The New Yorker,
  3/22/2010
Protect Your Privacy


                       2
1) Do not inadvertently reveal
 personal information online
Block cookies
2) Keep a “clean” email
       account
3) Realize that you may be
        monitored
4) Do not reply to spammers,
            ever
5) Be conscious of web
       security
Passwords
Use a different secure password for
              each site
• Make sure your password is as long as possible

• Use as many different characters as possible

• Do not use personal information

• Do not use common words

• Do not use passwords that are easy to spot while
  you are typing them in
Come up with a sentence that is easy to remember




        Use the first letter of each word,
           including the punctuation
Come up with a sentence that is easy to remember

       Tron was a complete waste of money!

        Use the first letter of each word,
           including the punctuation

                   Twacwom!
Encryption
http://




https://
6) Be conscious of security on
      shared computers
7) Be conscious of home
   computer security
Protect Yourself from
    Identity Theft


                        3
Raise your hand: Has anyone that you
  know had their identity stolen?
IMG_4511 by John R Southern
To
  oM
    uc
       hC
         red
            it b
                yA
                  nd
                     re
                       sR
                          ue
                             da
It’s not about
     cash ...




       To
         oM
           uc

                                         it’s about
              hC
                red
                   it b
                       yA
                         nd

                                            debt
                            re
                              sR
                                 ue
                                    da
• Destroy private records and statements

• Secure your snail mail

• Safeguard your Social Security number

• Don’t leave a paper trail

• Monitor your credit report

• Review credit card statements carefully
Protect Yourself from
       Bullies


                        4
First ...
First ...




Change Begins Here by Trista Emlet
What exactly is
cyberbullying?
• IM/ Text             • Interactive gaming
  harassment
                       • Malicious code
• Stealing passwords
                       • Sending porn or
• Blogs                  junk email

• Web sites            • Impersonation

• Sending pictures     • Cyberbullying by
  through email &        proxy
  cell phones

• Internet polling
Why cyberbully?
What to do
• Don’t bully

• Don’t reciprocate

• Save evidence

• Tell a trusted adult
King on the march to Montgomery by Eliel Johnson
“In the end, we will remember not the words of
  our enemies, but the silence of our friends.”
                               King on the march to Montgomery by Eliel Johnson
Protect Yourself from
     Predators


                        5
http://i.imgur.com/cbRmA.jpg
Emotionally vulnerable

   Seeking attention


   Seeking affection

   Seeking validation
Chatroulette
Protect Yourself from
      Yourself


                        6
Tell a neighbor: What is the least
intelligent thing that you’ve seen
        someone put online?
http://failbook.failblog.org
http://failbook.failblog.org
http://failbook.failblog.org
e to his alleg ed attacker
Rocque pos    ted a messag
saying th  ey are 'done'.
                        ages can escal ate quickly.
Police   say such mess
                             the Internet  and they are
 "If a  young  person is on                 g in nature,
                ments that a  re threatenin
 mak   ing com                 e could be     looking at
    ey need     to realize w               ation because
 th
              harges, unwa  rranted retali
  cri minal c                  well as ha   mpering an
       their  comments as                      Sgt. Kelly
  of
               olice investig  ation," said
  ongoing p
         au, school res ource officer.
   Rosn
What to do?
• Remain alert

• Keep a low profile

• Trust your instincts
Control your information
Control your information
Be smart

Más contenido relacionado

Destacado

English 101. Antecedent & Referent
English 101. Antecedent & ReferentEnglish 101. Antecedent & Referent
English 101. Antecedent & ReferentJo Ål
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivAl Rowell
 
Level2 lesson11 v2
Level2 lesson11 v2Level2 lesson11 v2
Level2 lesson11 v2Angela Wolfe
 
Successful writing. Lecture three.
Successful writing. Lecture three.Successful writing. Lecture three.
Successful writing. Lecture three.TamaraMontgomery
 
Comp I Section 33 Ppt
Comp I Section 33 PptComp I Section 33 Ppt
Comp I Section 33 Pptcasanchez
 
Cross cultural communication
Cross  cultural      communicationCross  cultural      communication
Cross cultural communicationChandan Baruah
 
Presentation1 pronoun
Presentation1 pronounPresentation1 pronoun
Presentation1 pronounEsti Ratih
 
Introduction to Internet Safety, Social Media and Blogging
Introduction to Internet Safety, Social Media and BloggingIntroduction to Internet Safety, Social Media and Blogging
Introduction to Internet Safety, Social Media and BloggingJustinsite eLearning Solutions
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notesLinda Barron
 
03. directly answered questions
03. directly answered questions03. directly answered questions
03. directly answered questionsmissfifit
 
Pronoun.antecedent
Pronoun.antecedentPronoun.antecedent
Pronoun.antecedentmsnancy
 
Pronoun Agreement - Number, Person, & Special Circumstances
Pronoun Agreement - Number, Person, & Special CircumstancesPronoun Agreement - Number, Person, & Special Circumstances
Pronoun Agreement - Number, Person, & Special CircumstancesAudrey Lynn
 
Relative pronouns presentation[1]
Relative pronouns presentation[1]Relative pronouns presentation[1]
Relative pronouns presentation[1]luisrios789
 
Internet Safety Aisa
Internet Safety AisaInternet Safety Aisa
Internet Safety AisaElsa Freire
 

Destacado (20)

English 101. Antecedent & Referent
English 101. Antecedent & ReferentEnglish 101. Antecedent & Referent
English 101. Antecedent & Referent
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
 
Level2 lesson11 v2
Level2 lesson11 v2Level2 lesson11 v2
Level2 lesson11 v2
 
Successful writing. Lecture three.
Successful writing. Lecture three.Successful writing. Lecture three.
Successful writing. Lecture three.
 
Comp I Section 33 Ppt
Comp I Section 33 PptComp I Section 33 Ppt
Comp I Section 33 Ppt
 
Cross cultural communication
Cross  cultural      communicationCross  cultural      communication
Cross cultural communication
 
pronouns
pronounspronouns
pronouns
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Presentation1 pronoun
Presentation1 pronounPresentation1 pronoun
Presentation1 pronoun
 
Problems with Pronouns
Problems with PronounsProblems with Pronouns
Problems with Pronouns
 
Introduction to Internet Safety, Social Media and Blogging
Introduction to Internet Safety, Social Media and BloggingIntroduction to Internet Safety, Social Media and Blogging
Introduction to Internet Safety, Social Media and Blogging
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notes
 
03. directly answered questions
03. directly answered questions03. directly answered questions
03. directly answered questions
 
Pronoun.antecedent
Pronoun.antecedentPronoun.antecedent
Pronoun.antecedent
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Pronoun other
Pronoun otherPronoun other
Pronoun other
 
Pronoun Agreement - Number, Person, & Special Circumstances
Pronoun Agreement - Number, Person, & Special CircumstancesPronoun Agreement - Number, Person, & Special Circumstances
Pronoun Agreement - Number, Person, & Special Circumstances
 
Relative pronouns presentation[1]
Relative pronouns presentation[1]Relative pronouns presentation[1]
Relative pronouns presentation[1]
 
Internet Safety Aisa
Internet Safety AisaInternet Safety Aisa
Internet Safety Aisa
 
Pronouns
PronounsPronouns
Pronouns
 

Similar a Internet safety slides

Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayanehaz
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingMatt Smith
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
Safety on social media
Safety on social mediaSafety on social media
Safety on social mediaChas Stephens
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...Steve Poole
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safetyjaenjenny
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerSteve Poole
 
Computer Security
Computer SecurityComputer Security
Computer Securitytonik
 
Cybersecurity for the non-technical
Cybersecurity for the non-technicalCybersecurity for the non-technical
Cybersecurity for the non-technicalStephen Cobb
 
Protecting your devices and organization in this Cyber Age.
Protecting your devices and organization in this Cyber Age. Protecting your devices and organization in this Cyber Age.
Protecting your devices and organization in this Cyber Age. Teddy Njoroge
 
5c Digital Citizenship
5c Digital Citizenship5c Digital Citizenship
5c Digital CitizenshipAnja Junginger
 
How To Keep Safe On The Internet!
How To Keep Safe On The Internet!How To Keep Safe On The Internet!
How To Keep Safe On The Internet!alexclark-efc
 
Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3jesusmlaz
 
Internet safety
Internet safetyInternet safety
Internet safetykohlerj
 

Similar a Internet safety slides (20)

Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullying
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Safety on social media
Safety on social mediaSafety on social media
Safety on social media
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safety
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developer
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Cybersecurity for the non-technical
Cybersecurity for the non-technicalCybersecurity for the non-technical
Cybersecurity for the non-technical
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Protecting your devices and organization in this Cyber Age.
Protecting your devices and organization in this Cyber Age. Protecting your devices and organization in this Cyber Age.
Protecting your devices and organization in this Cyber Age.
 
5c Digital Citizenship
5c Digital Citizenship5c Digital Citizenship
5c Digital Citizenship
 
The internet
The internetThe internet
The internet
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
How To Keep Safe On The Internet!
How To Keep Safe On The Internet!How To Keep Safe On The Internet!
How To Keep Safe On The Internet!
 
Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3
 
Internet safety
Internet safetyInternet safety
Internet safety
 

Más de Eric Castro

Neuroscience slides, Fall 2023
Neuroscience slides, Fall 2023Neuroscience slides, Fall 2023
Neuroscience slides, Fall 2023Eric Castro
 
21st century Parenting: A brave new world
21st century Parenting: A brave new world21st century Parenting: A brave new world
21st century Parenting: A brave new worldEric Castro
 
Building and Sustaining a PLN
Building and Sustaining a PLNBuilding and Sustaining a PLN
Building and Sustaining a PLNEric Castro
 
What's after going 1:1?
What's after going 1:1?What's after going 1:1?
What's after going 1:1?Eric Castro
 
Transformative Uses of the iPad
Transformative Uses of the iPadTransformative Uses of the iPad
Transformative Uses of the iPadEric Castro
 
Google apps introduction
Google apps introductionGoogle apps introduction
Google apps introductionEric Castro
 
Draw something 2012
Draw something 2012Draw something 2012
Draw something 2012Eric Castro
 
U16 social psych 2011
U16 social psych 2011U16 social psych 2011
U16 social psych 2011Eric Castro
 
M37 Motivation at Work slides
M37 Motivation at Work slidesM37 Motivation at Work slides
M37 Motivation at Work slidesEric Castro
 
Fall Final review
Fall Final reviewFall Final review
Fall Final reviewEric Castro
 
M31 intelligence slides
M31 intelligence slidesM31 intelligence slides
M31 intelligence slidesEric Castro
 
M30 language slides
M30 language slidesM30 language slides
M30 language slidesEric Castro
 
M29 thinking slides
M29 thinking slidesM29 thinking slides
M29 thinking slidesEric Castro
 
U08 memory slides
U08 memory slidesU08 memory slides
U08 memory slidesEric Castro
 
U07 learning slides 2011
U07 learning slides 2011U07 learning slides 2011
U07 learning slides 2011Eric Castro
 
U05 Sensation slides 2011
U05 Sensation slides 2011U05 Sensation slides 2011
U05 Sensation slides 2011Eric Castro
 

Más de Eric Castro (20)

Neuroscience slides, Fall 2023
Neuroscience slides, Fall 2023Neuroscience slides, Fall 2023
Neuroscience slides, Fall 2023
 
21st century Parenting: A brave new world
21st century Parenting: A brave new world21st century Parenting: A brave new world
21st century Parenting: A brave new world
 
Building and Sustaining a PLN
Building and Sustaining a PLNBuilding and Sustaining a PLN
Building and Sustaining a PLN
 
What's after going 1:1?
What's after going 1:1?What's after going 1:1?
What's after going 1:1?
 
Transformative Uses of the iPad
Transformative Uses of the iPadTransformative Uses of the iPad
Transformative Uses of the iPad
 
1600 iPads
1600 iPads1600 iPads
1600 iPads
 
Google apps introduction
Google apps introductionGoogle apps introduction
Google apps introduction
 
Draw something 2012
Draw something 2012Draw something 2012
Draw something 2012
 
U16 social psych 2011
U16 social psych 2011U16 social psych 2011
U16 social psych 2011
 
M37 Motivation at Work slides
M37 Motivation at Work slidesM37 Motivation at Work slides
M37 Motivation at Work slides
 
Fall Final review
Fall Final reviewFall Final review
Fall Final review
 
M31 intelligence slides
M31 intelligence slidesM31 intelligence slides
M31 intelligence slides
 
M30 language slides
M30 language slidesM30 language slides
M30 language slides
 
M29 thinking slides
M29 thinking slidesM29 thinking slides
M29 thinking slides
 
U08 memory slides
U08 memory slidesU08 memory slides
U08 memory slides
 
U07 learning slides 2011
U07 learning slides 2011U07 learning slides 2011
U07 learning slides 2011
 
M18 slides
M18 slidesM18 slides
M18 slides
 
m19 Hypnosis
m19 Hypnosism19 Hypnosis
m19 Hypnosis
 
M20 drugs
M20 drugsM20 drugs
M20 drugs
 
U05 Sensation slides 2011
U05 Sensation slides 2011U05 Sensation slides 2011
U05 Sensation slides 2011
 

Último

HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 

Último (20)

HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 

Internet safety slides

Notas del editor

  1. \n
  2. \n
  3. 6 things\n
  4. \n
  5. In an interview with the Harvard admissions committee, what could you show them online?\n
  6. Think of every web service you use, or are associated with.\nWhat is there?\nPictures? Video? Poetry? Stories? Reflections on life?\n
  7. \n
  8. For college and for jobs\n
  9. \n
  10. 82% of 16—18 year-olds use FB daily\n
  11. There is NO privacy on the internet.\nWhat’s there is there forever\n
  12. NEVER your Social Security number\nBeware that cookies store information and share it automatically w/ websites you visit\n
  13. \n
  14. \n
  15. \n
  16. \n
  17. \n
  18. \n
  19. \n
  20. \n
  21. \n
  22. \n
  23. and don’t SHARE passwords\n
  24. \n
  25. \n
  26. \n
  27. \n
  28. \n
  29. \n
  30. \n
  31. \n
  32. \n
  33. \n
  34. Do NOT have your computer save passwords\n
  35. More likely to be hit by lightening, or the victim of identity theft?\n750,000 new cases of identity fraud each year in the US\n
  36. \n
  37. More likely to be hit by lightning, or affected by a computer security problem?\n70% of computer users have been hacked, phished, or the victim of a virus — compared to 0.000102% chance of being struck by lightning?\n
  38. \n
  39. \n
  40. Most materials for identity theft are stolen from trash cans\n
  41. \n
  42. \n
  43. FIRST: Don’t be a bully\nMost bullies were victims\n
  44. \n
  45. do not SHARE passwords either\n
  46. Anger, revenge, frustration\nEntertainment; bored, laughs, to get a reaction, \nBolster or remind ppl of their social standing \nSometimes by accident\n
  47. \n
  48. \n
  49. \n
  50. \n
  51. Not much harm that a predator can do to you like this\nit’s when you meet IRL …\nIt’s not all men ...\n
  52. \n
  53. \n
  54. \n
  55. \n
  56. In an interview with the Harvard admissions committee, what could you show them online?\n
  57. \n
  58. “Her offense: Posting on Facebook a photograph of herself posing with a human placenta in class.”\n
  59. \n
  60. \n
  61. \n
  62. \n
  63. \n
  64. \n
  65. Scheduled for same day as Omaha, NB teen shot principal & assistant principal\n
  66. \n
  67. \n
  68. \n
  69. \n
  70. \n
  71. \n
  72. \n