SlideShare una empresa de Scribd logo
1 de 14
Internet Safety
Netiquette Netiquette is the etiquette for the internet, a.k.a the rules of the internet The basic rule of netiquette is to have respect and be well mannered on the internet Some rules I would like to include is don’t use all caps, it can be mistaken as shouting and it is impolite, And to never give your personal info to anyone. Remember in most Chat rooms you have to agree to the terms and conditions, and you have to follow them.
Flame Wars
E-mail safety  Be sure to change your password often, this prevents people from hacking into your account. A lot of spammers use the quote “remember me?” , don’t be fooled by it, ask an adult if they know who it is and if they don’t delete the e-mail. Delete all e-mails from people you don’t know
Emoticons A lot of people, to save time and explanation, use emoticons. Emoticons are a selection of symbols on the keyboard that people use to show feelings such as , , :P, :D, and ;) Or they use abbreviations such as TTYL (talk to you later), G2G (got to go), BRB (be right back) and LOL(laugh out loud) 
How can you be safe on the internet? Be nice to people on the internet.  Don’t put any personal thing about you on the internet.  Don’t use bad language and don’t break laws.
Browsers. Examples:  Google and Bing.  Browsers search the websites of the topic you type into it.
Safety tips.  Make sure no one knows your password so people can’t write stuff on your e-mail or other stuff you have.  Say nice things not bad because everything you put on the internet can be found again.  Only go to safe websites.  Don’t talk to strangers.  Ask you parents before going on the internet.
What is spam? -  Spam is the online spread of messages that people would not normally want.
Why is spam such a problem? -  Spam is a problem because spam can be dangerous and result in viruses when you answer the message.
What should you do if you receive spam? -  You should get a firewall or a security system that blocks the spam.  You could also report the spam.
How can a person reduce the amount of spam they receive? ,[object Object]
  Reduce the amount of unwanted e-mail.
  Do not post your e-mail account anywhere. ,[object Object]

Más contenido relacionado

La actualidad más candente

Internet Safety Power Point
Internet Safety Power PointInternet Safety Power Point
Internet Safety Power Pointguest24931c
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of NetiquetteLeelet1121
 
Netiquette - Basic Guidelines
Netiquette - Basic GuidelinesNetiquette - Basic Guidelines
Netiquette - Basic Guidelinesjosbor61
 
Rules of netiquette
Rules of netiquetteRules of netiquette
Rules of netiquetteklknight79
 
Internet Safety Emmabalison
Internet Safety EmmabalisonInternet Safety Emmabalison
Internet Safety Emmabalisonguest13f93438
 
E safety assembly
E safety assemblyE safety assembly
E safety assemblyJEcomputing
 
Online privacy
Online privacyOnline privacy
Online privacyjo-jo23
 
Cyber safety
Cyber safetyCyber safety
Cyber safetyYash Jain
 
The 10 core rules of netiqutte
The 10 core rules of netiqutteThe 10 core rules of netiqutte
The 10 core rules of netiqutteMudgeoTorso1091
 
Being Smart In Cyber Space
Being Smart In Cyber SpaceBeing Smart In Cyber Space
Being Smart In Cyber Spacekirahlee
 

La actualidad más candente (17)

Internet Safty
Internet SaftyInternet Safty
Internet Safty
 
Internet Safety Power Point
Internet Safety Power PointInternet Safety Power Point
Internet Safety Power Point
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Netiquette - Basic Guidelines
Netiquette - Basic GuidelinesNetiquette - Basic Guidelines
Netiquette - Basic Guidelines
 
Rules of netiquette
Rules of netiquetteRules of netiquette
Rules of netiquette
 
Internet Safety Emmabalison
Internet Safety EmmabalisonInternet Safety Emmabalison
Internet Safety Emmabalison
 
E safety assembly
E safety assemblyE safety assembly
E safety assembly
 
10things
10things10things
10things
 
Online privacy
Online privacyOnline privacy
Online privacy
 
6. netiquette day 8
6. netiquette day 86. netiquette day 8
6. netiquette day 8
 
Internet safety
Internet safety Internet safety
Internet safety
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
The 10 core rules of netiqutte
The 10 core rules of netiqutteThe 10 core rules of netiqutte
The 10 core rules of netiqutte
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Being Smart In Cyber Space
Being Smart In Cyber SpaceBeing Smart In Cyber Space
Being Smart In Cyber Space
 
School presentation
School presentationSchool presentation
School presentation
 

Similar a Internet Safety Final

Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammerguest2e06031d
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammerguest2e06031d
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Finalguest5558240
 
Mac Kenzi D. Group#3
Mac Kenzi D. Group#3Mac Kenzi D. Group#3
Mac Kenzi D. Group#3guest3e462b5
 
Internet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, CalebInternet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, Calebguestde489f
 
Internet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, CalebInternet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, Calebguestde489f
 
Internet Saftey Final
Internet Saftey FinalInternet Saftey Final
Internet Saftey Finalguest252cc9
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Finalguest0c7b65
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Finalguest5000f0a
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationcey.ruth
 
Internet Safety Surfer Dude
Internet Safety Surfer DudeInternet Safety Surfer Dude
Internet Safety Surfer Dudeguesta2b256
 
online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdfjessa451416
 
Internet Safety Im Chatterer
Internet Safety  Im ChattererInternet Safety  Im Chatterer
Internet Safety Im Chattererguest4fd30d4
 
A Quick Email Etiquette Education
A Quick Email Etiquette EducationA Quick Email Etiquette Education
A Quick Email Etiquette EducationChelse Benham
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Finalguest5a7b36
 

Similar a Internet Safety Final (20)

Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammer
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammer
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
Mac Kenzi D. Group#3
Mac Kenzi D. Group#3Mac Kenzi D. Group#3
Mac Kenzi D. Group#3
 
Internet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, CalebInternet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, Caleb
 
Internet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, CalebInternet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, Caleb
 
Im A Chatter Al
Im A Chatter AlIm A Chatter Al
Im A Chatter Al
 
Internet Saftey Final
Internet Saftey FinalInternet Saftey Final
Internet Saftey Final
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
Chatter
ChatterChatter
Chatter
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
What Is Spam
What Is SpamWhat Is Spam
What Is Spam
 
Internet Safety Surfer Dude
Internet Safety Surfer DudeInternet Safety Surfer Dude
Internet Safety Surfer Dude
 
Netiquette
NetiquetteNetiquette
Netiquette
 
online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdf
 
Internet Safety Im Chatterer
Internet Safety  Im ChattererInternet Safety  Im Chatterer
Internet Safety Im Chatterer
 
Netiquette
NetiquetteNetiquette
Netiquette
 
A Quick Email Etiquette Education
A Quick Email Etiquette EducationA Quick Email Etiquette Education
A Quick Email Etiquette Education
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 

Último

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Último (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

Internet Safety Final

  • 2. Netiquette Netiquette is the etiquette for the internet, a.k.a the rules of the internet The basic rule of netiquette is to have respect and be well mannered on the internet Some rules I would like to include is don’t use all caps, it can be mistaken as shouting and it is impolite, And to never give your personal info to anyone. Remember in most Chat rooms you have to agree to the terms and conditions, and you have to follow them.
  • 4. E-mail safety Be sure to change your password often, this prevents people from hacking into your account. A lot of spammers use the quote “remember me?” , don’t be fooled by it, ask an adult if they know who it is and if they don’t delete the e-mail. Delete all e-mails from people you don’t know
  • 5. Emoticons A lot of people, to save time and explanation, use emoticons. Emoticons are a selection of symbols on the keyboard that people use to show feelings such as , , :P, :D, and ;) Or they use abbreviations such as TTYL (talk to you later), G2G (got to go), BRB (be right back) and LOL(laugh out loud) 
  • 6. How can you be safe on the internet? Be nice to people on the internet. Don’t put any personal thing about you on the internet. Don’t use bad language and don’t break laws.
  • 7. Browsers. Examples: Google and Bing. Browsers search the websites of the topic you type into it.
  • 8. Safety tips. Make sure no one knows your password so people can’t write stuff on your e-mail or other stuff you have. Say nice things not bad because everything you put on the internet can be found again. Only go to safe websites. Don’t talk to strangers. Ask you parents before going on the internet.
  • 9. What is spam? - Spam is the online spread of messages that people would not normally want.
  • 10. Why is spam such a problem? - Spam is a problem because spam can be dangerous and result in viruses when you answer the message.
  • 11. What should you do if you receive spam? - You should get a firewall or a security system that blocks the spam. You could also report the spam.
  • 12.
  • 13. Reduce the amount of unwanted e-mail.
  • 14.
  • 15.