SlideShare una empresa de Scribd logo
1 de 44
Be aResponsible

C  yber
   itizen
School
 Work
A Report on
                                                         Endangered Species
                                                           by David Humphrey
               Endangered Species
                   An endangered species is a
                   population of organisms which is
                   at risk of becoming extinct
Main Page          because it is either few in
Contents
Featured Content
                   numbers, or threatened by
Current Events     changing environmental or
Random Article     predation parameters. Also it could
                   mean that due to deforestation
                   there may be a lack of food and/or
                   water.
A Report on
                                    Endangered Species
                                    by David Humphrey
               Endangered Species
                                    An endangered species is a
                                    population of organisms which is
                                    at risk of becoming extinct
Main Page                           because it is either few in
Contents
Featured Content
                                    numbers, or threatened by
Current Events                      changing environmental or
Random Article                      predation parameters. Also it could
                                    mean that due to deforestation
                                    there may be a lack of food and/or
                                    water.
A Report on
                                          Endangered Species
                                          by David Humphrey
               Endangered Species
                                           An endangered species is a
                                           population of organisms which is
                                           at risk of becoming extinct
Main Page                                  because it is either few in
Contents
Featured Content
                                           numbers, or threatened by
Current Events                             changing environmental or
Random Article                             predation parameters. Also it could
                                           mean that due to deforestation
                                           there may be a lack of food and/or
                                           water.




                                    Plagiarism is
                             ! Cheating
A Report on
Endangered Species
 by David Humphrey




     Learn how to
          research
Use               A Report on
                         Endangered Species
        many              by David Humphrey
      sources.
       AnimalInfo.org
EndangeredSpecies.org
NationalGeographic.com




                              Learn how to
                                   research
Use               A Report on
                         Endangered Species
                                                             Write in
        many                by David Humphrey                your own
      sources.           Endangered species are
                         organisms at risk of becoming
                                                             words.
                         extinct because they are either
                         few in numbers [1], or because
                         environmental changes and
       AnimalInfo.org    predatory circumstances put
EndangeredSpecies.org    them at risk[2]. The lack of food
                         and/or water, caused by drout or
NationalGeographic.com   famine may also be culprits[3].




                                    Learn how to
                                           research
Use               A Report on
                         Endangered Species
                                                             Write in
        many                by David Humphrey                your own
      sources.           Endangered species are
                         organisms at risk of becoming
                                                             words.
                         extinct because they are either
                         few in numbers [1], or because
                         environmental changes and
       AnimalInfo.org
                                                             Mention all
                         predatory circumstances put
EndangeredSpecies.org    them at risk[2]. The lack of food
                         and/or water, caused by drout or
NationalGeographic.com   famine may also be culprits[3].
                         [1] EndageredSpecies.org
                                                             references.
                         [2] AnimalInfo.org
                         [3] NationalGeographic.com




                                     Learn how to
                                              research
Downloading ...
          Music
           Videos
          Games
         Apps
Piracyis a
! Crime
Bewarethe
!   Virus
Download from
         sites
legal
iTunes
                 Amazon
Download from    Hulu
         sites
legal
                 imeem
                 Napster
                 Zune
                 Netflix
                 Yahoo
                 Playstation
Instant
Messaging
   Email
    Social
  Networks
        SMS
facebook
           David Healy wants to be
           your friend.
              Wall           Info        Photos
           Basic Information
           Sex:            Male
           Birthday:       December 16, 1999
           Hometown:       New York, New York

           Contact Information
           Email:          David1999@gmail.com
           IM:             Dan1999

           Education Information
           School:         James H Vernon School
facebook
           David Healy wants to be
           your friend.
              Wall           Info        Photos
           Basic Information
           Sex:            Male
           Birthday:       December 16, 1999
           Hometown:       New York, New York

           Contact Information
           Email:          David1999@gmail.com
           IM:             Dan1999

           Education Information
           School:         James H Vernon School
Keepinfo
private
Don’t talk to
! Strangers
Text
responsively
Dad smashes cell
phone after teen
racks up

        texting
        bill.
          April 2009 Headline (United States)
Dad smashes cell
phone after teen

       $5,000
racks up

        texting
        bill.
          April 2009 Headline (United States)
Sextingis
 dangerous.
Sextingis
 dangerous.
     It is NOT
     cool.
Areyoua
cyberbully?
Ever sent a hurtful message online or via
SMS?
Ever sent a hurtful message online or via
SMS?
Ever cursed somebody online or via SMS?
Ever sent a hurtful message online or via
SMS?
Ever cursed somebody online or via SMS?
Ever impersonated anyone online or via
SMS?
Ever sent a hurtful message online or via
SMS?
Ever cursed somebody online or via SMS?
Ever impersonated anyone online or via
SMS?
Ever embarrassed anyone online or via SMS?
Ever sent a hurtful message online or via
SMS?
Ever cursed somebody online or via SMS?
Ever impersonated anyone online or via
SMS?
Ever embarrassed anyone online or via SMS?

Ever insulted somebody online or via SMS?
Kids who bully
other kids

       53%
online?


        2003-2004 Study by I-Safe America
SeriousDeal
Areyou
bullied?
42%  of kids
 get bullied
     online.
   2003-2004 Study by I-Safe America
Block
Document
Report
You better
watch out.
We will hurt
and hit you
if you are
not careful,
you little #$!
+*!!!
Tellthe
police
Rules of
Cyber Citizenship

Más contenido relacionado

La actualidad más candente

Biological Invasion - Ecology
Biological Invasion - EcologyBiological Invasion - Ecology
Biological Invasion - Ecologyshivamsonu
 
Invasive Species
Invasive SpeciesInvasive Species
Invasive SpeciesCHEARS
 
Invasive Species
Invasive SpeciesInvasive Species
Invasive SpeciesOhMiss
 
Invasive alien species
Invasive alien speciesInvasive alien species
Invasive alien speciesSurendra Bam
 
Invasive Alien Plant Species Assessment in Urban Ecosystem: A Case Study from...
Invasive Alien Plant Species Assessment in Urban Ecosystem: A Case Study from...Invasive Alien Plant Species Assessment in Urban Ecosystem: A Case Study from...
Invasive Alien Plant Species Assessment in Urban Ecosystem: A Case Study from...Surendra Bam
 
BIOINVASION INVASIVE SPECIES, NATIVE SPECIES, EXOTIC SPECIES
BIOINVASION INVASIVE SPECIES, NATIVE SPECIES, EXOTIC SPECIESBIOINVASION INVASIVE SPECIES, NATIVE SPECIES, EXOTIC SPECIES
BIOINVASION INVASIVE SPECIES, NATIVE SPECIES, EXOTIC SPECIESAseesAli
 
Invasive species seth knochel
Invasive species  seth knochelInvasive species  seth knochel
Invasive species seth knochelMark McGinley
 
Marine bio invasion
Marine bio invasion Marine bio invasion
Marine bio invasion zoysa89
 
Invasive species in North Carolina
Invasive species in North CarolinaInvasive species in North Carolina
Invasive species in North CarolinaKella Randolph
 
Invasive species powerpoint
Invasive species powerpointInvasive species powerpoint
Invasive species powerpointeslaq
 
Invasive species
Invasive speciesInvasive species
Invasive speciesd_jones717
 
Invasive species in Coastal Ecosystems: Causes, Impacts and Management Recomm...
Invasive species in Coastal Ecosystems: Causes, Impacts and Management Recomm...Invasive species in Coastal Ecosystems: Causes, Impacts and Management Recomm...
Invasive species in Coastal Ecosystems: Causes, Impacts and Management Recomm...Loretta Roberson
 
Endangered Species
Endangered SpeciesEndangered Species
Endangered Speciesvictorem17
 
Impact of exotic Species On Local Climate
Impact of exotic Species On Local ClimateImpact of exotic Species On Local Climate
Impact of exotic Species On Local ClimateM Nadeem Akram
 
Invasive alien plants, land degradation, and restoration
Invasive alien plants, land degradation, and restorationInvasive alien plants, land degradation, and restoration
Invasive alien plants, land degradation, and restorationGlobal Landscapes Forum (GLF)
 

La actualidad más candente (19)

ppt
pptppt
ppt
 
Biological Invasion - Ecology
Biological Invasion - EcologyBiological Invasion - Ecology
Biological Invasion - Ecology
 
Invasive Species
Invasive SpeciesInvasive Species
Invasive Species
 
Invasive Species
Invasive SpeciesInvasive Species
Invasive Species
 
Invasive alien species
Invasive alien speciesInvasive alien species
Invasive alien species
 
Conserving Bumble Bees
Conserving Bumble BeesConserving Bumble Bees
Conserving Bumble Bees
 
Invasive Alien Plant Species Assessment in Urban Ecosystem: A Case Study from...
Invasive Alien Plant Species Assessment in Urban Ecosystem: A Case Study from...Invasive Alien Plant Species Assessment in Urban Ecosystem: A Case Study from...
Invasive Alien Plant Species Assessment in Urban Ecosystem: A Case Study from...
 
BIOINVASION INVASIVE SPECIES, NATIVE SPECIES, EXOTIC SPECIES
BIOINVASION INVASIVE SPECIES, NATIVE SPECIES, EXOTIC SPECIESBIOINVASION INVASIVE SPECIES, NATIVE SPECIES, EXOTIC SPECIES
BIOINVASION INVASIVE SPECIES, NATIVE SPECIES, EXOTIC SPECIES
 
Invasive species seth knochel
Invasive species  seth knochelInvasive species  seth knochel
Invasive species seth knochel
 
Marine bio invasion
Marine bio invasion Marine bio invasion
Marine bio invasion
 
Invasive species in North Carolina
Invasive species in North CarolinaInvasive species in North Carolina
Invasive species in North Carolina
 
Invasive species powerpoint
Invasive species powerpointInvasive species powerpoint
Invasive species powerpoint
 
Invasive species
Invasive speciesInvasive species
Invasive species
 
Redhumped Caterpillar Integrated Pest Management
Redhumped Caterpillar Integrated Pest ManagementRedhumped Caterpillar Integrated Pest Management
Redhumped Caterpillar Integrated Pest Management
 
Invasive species in Coastal Ecosystems: Causes, Impacts and Management Recomm...
Invasive species in Coastal Ecosystems: Causes, Impacts and Management Recomm...Invasive species in Coastal Ecosystems: Causes, Impacts and Management Recomm...
Invasive species in Coastal Ecosystems: Causes, Impacts and Management Recomm...
 
Endangered Species
Endangered SpeciesEndangered Species
Endangered Species
 
Species invasion
Species invasionSpecies invasion
Species invasion
 
Impact of exotic Species On Local Climate
Impact of exotic Species On Local ClimateImpact of exotic Species On Local Climate
Impact of exotic Species On Local Climate
 
Invasive alien plants, land degradation, and restoration
Invasive alien plants, land degradation, and restorationInvasive alien plants, land degradation, and restoration
Invasive alien plants, land degradation, and restoration
 

Similar a Cyber Safety for Kids

apes_chapter_9_sustaining_biodiversity.pptx
apes_chapter_9_sustaining_biodiversity.pptxapes_chapter_9_sustaining_biodiversity.pptx
apes_chapter_9_sustaining_biodiversity.pptxChristine Elnas
 
Ian, David and Eric
Ian, David and EricIan, David and Eric
Ian, David and Ericsluguarda
 
Gabi, Sergio and Cañete. 3rd
Gabi, Sergio and Cañete. 3rdGabi, Sergio and Cañete. 3rd
Gabi, Sergio and Cañete. 3rdsluguarda
 
anthropogenicextinction-190809015258 (2).pdf
anthropogenicextinction-190809015258 (2).pdfanthropogenicextinction-190809015258 (2).pdf
anthropogenicextinction-190809015258 (2).pdfAngelle Pantig
 
Anthropogenic Extinction
Anthropogenic ExtinctionAnthropogenic Extinction
Anthropogenic ExtinctionJayArGuzman
 
Threats to biodiversity: Biodiversity
Threats to biodiversity: BiodiversityThreats to biodiversity: Biodiversity
Threats to biodiversity: BiodiversityDr. Suri Babu Golla
 
Ingles especies en extincion
Ingles especies en extincionIngles especies en extincion
Ingles especies en extincionwendymeloalic
 
Endangered ,Rare & Extinct Species
Endangered ,Rare & Extinct SpeciesEndangered ,Rare & Extinct Species
Endangered ,Rare & Extinct SpeciesUtkarsh Das
 
Silhouette Brown Bear PowerPoint Templates.pptx
Silhouette Brown Bear PowerPoint Templates.pptxSilhouette Brown Bear PowerPoint Templates.pptx
Silhouette Brown Bear PowerPoint Templates.pptxalyssamieteofilo
 
Lect_ch14-Palmer-post.ppt
Lect_ch14-Palmer-post.pptLect_ch14-Palmer-post.ppt
Lect_ch14-Palmer-post.pptStudyMega
 
Invasive species toto todor elena
Invasive species toto todor elenaInvasive species toto todor elena
Invasive species toto todor elenaMrJewett
 
Meet dory slide show
Meet dory slide showMeet dory slide show
Meet dory slide showkendra mcneil
 
Meet dory slide show
Meet dory slide showMeet dory slide show
Meet dory slide showkendra mcneil
 
Endangered species by pragyan yadav
Endangered species by pragyan yadavEndangered species by pragyan yadav
Endangered species by pragyan yadavPragyan Yadav
 

Similar a Cyber Safety for Kids (19)

apes_chapter_9_sustaining_biodiversity.pptx
apes_chapter_9_sustaining_biodiversity.pptxapes_chapter_9_sustaining_biodiversity.pptx
apes_chapter_9_sustaining_biodiversity.pptx
 
Ian, David and Eric
Ian, David and EricIan, David and Eric
Ian, David and Eric
 
Gabi, Sergio and Cañete. 3rd
Gabi, Sergio and Cañete. 3rdGabi, Sergio and Cañete. 3rd
Gabi, Sergio and Cañete. 3rd
 
anthropogenicextinction-190809015258 (2).pdf
anthropogenicextinction-190809015258 (2).pdfanthropogenicextinction-190809015258 (2).pdf
anthropogenicextinction-190809015258 (2).pdf
 
Anthropogenic Extinction
Anthropogenic ExtinctionAnthropogenic Extinction
Anthropogenic Extinction
 
Threats to biodiversity: Biodiversity
Threats to biodiversity: BiodiversityThreats to biodiversity: Biodiversity
Threats to biodiversity: Biodiversity
 
Extinction Of Animal Extinction
Extinction Of Animal ExtinctionExtinction Of Animal Extinction
Extinction Of Animal Extinction
 
Extinction of biodiversity
Extinction of biodiversityExtinction of biodiversity
Extinction of biodiversity
 
Ingles especies en extincion
Ingles especies en extincionIngles especies en extincion
Ingles especies en extincion
 
Populations Biology 2014
Populations Biology 2014Populations Biology 2014
Populations Biology 2014
 
Endangered ,Rare & Extinct Species
Endangered ,Rare & Extinct SpeciesEndangered ,Rare & Extinct Species
Endangered ,Rare & Extinct Species
 
Essay On Wildlife
Essay On WildlifeEssay On Wildlife
Essay On Wildlife
 
Silhouette Brown Bear PowerPoint Templates.pptx
Silhouette Brown Bear PowerPoint Templates.pptxSilhouette Brown Bear PowerPoint Templates.pptx
Silhouette Brown Bear PowerPoint Templates.pptx
 
Lect_ch14-Palmer-post.ppt
Lect_ch14-Palmer-post.pptLect_ch14-Palmer-post.ppt
Lect_ch14-Palmer-post.ppt
 
Evolution.ppt
Evolution.pptEvolution.ppt
Evolution.ppt
 
Invasive species toto todor elena
Invasive species toto todor elenaInvasive species toto todor elena
Invasive species toto todor elena
 
Meet dory slide show
Meet dory slide showMeet dory slide show
Meet dory slide show
 
Meet dory slide show
Meet dory slide showMeet dory slide show
Meet dory slide show
 
Endangered species by pragyan yadav
Endangered species by pragyan yadavEndangered species by pragyan yadav
Endangered species by pragyan yadav
 

Último

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Último (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Cyber Safety for Kids

  • 1. Be aResponsible C yber itizen
  • 2.
  • 4. A Report on Endangered Species by David Humphrey Endangered Species An endangered species is a population of organisms which is at risk of becoming extinct Main Page because it is either few in Contents Featured Content numbers, or threatened by Current Events changing environmental or Random Article predation parameters. Also it could mean that due to deforestation there may be a lack of food and/or water.
  • 5. A Report on Endangered Species by David Humphrey Endangered Species An endangered species is a population of organisms which is at risk of becoming extinct Main Page because it is either few in Contents Featured Content numbers, or threatened by Current Events changing environmental or Random Article predation parameters. Also it could mean that due to deforestation there may be a lack of food and/or water.
  • 6. A Report on Endangered Species by David Humphrey Endangered Species An endangered species is a population of organisms which is at risk of becoming extinct Main Page because it is either few in Contents Featured Content numbers, or threatened by Current Events changing environmental or Random Article predation parameters. Also it could mean that due to deforestation there may be a lack of food and/or water. Plagiarism is ! Cheating
  • 7. A Report on Endangered Species by David Humphrey Learn how to research
  • 8. Use A Report on Endangered Species many by David Humphrey sources. AnimalInfo.org EndangeredSpecies.org NationalGeographic.com Learn how to research
  • 9. Use A Report on Endangered Species Write in many by David Humphrey your own sources. Endangered species are organisms at risk of becoming words. extinct because they are either few in numbers [1], or because environmental changes and AnimalInfo.org predatory circumstances put EndangeredSpecies.org them at risk[2]. The lack of food and/or water, caused by drout or NationalGeographic.com famine may also be culprits[3]. Learn how to research
  • 10. Use A Report on Endangered Species Write in many by David Humphrey your own sources. Endangered species are organisms at risk of becoming words. extinct because they are either few in numbers [1], or because environmental changes and AnimalInfo.org Mention all predatory circumstances put EndangeredSpecies.org them at risk[2]. The lack of food and/or water, caused by drout or NationalGeographic.com famine may also be culprits[3]. [1] EndageredSpecies.org references. [2] AnimalInfo.org [3] NationalGeographic.com Learn how to research
  • 11.
  • 12. Downloading ... Music Videos Games Apps
  • 14. Bewarethe ! Virus
  • 15. Download from sites legal
  • 16. iTunes Amazon Download from Hulu sites legal imeem Napster Zune Netflix Yahoo Playstation
  • 17. Instant Messaging Email Social Networks SMS
  • 18. facebook David Healy wants to be your friend. Wall Info Photos Basic Information Sex: Male Birthday: December 16, 1999 Hometown: New York, New York Contact Information Email: David1999@gmail.com IM: Dan1999 Education Information School: James H Vernon School
  • 19. facebook David Healy wants to be your friend. Wall Info Photos Basic Information Sex: Male Birthday: December 16, 1999 Hometown: New York, New York Contact Information Email: David1999@gmail.com IM: Dan1999 Education Information School: James H Vernon School
  • 21. Don’t talk to ! Strangers
  • 23. Dad smashes cell phone after teen racks up texting bill. April 2009 Headline (United States)
  • 24. Dad smashes cell phone after teen $5,000 racks up texting bill. April 2009 Headline (United States)
  • 26. Sextingis dangerous. It is NOT cool.
  • 28.
  • 29. Ever sent a hurtful message online or via SMS?
  • 30. Ever sent a hurtful message online or via SMS? Ever cursed somebody online or via SMS?
  • 31. Ever sent a hurtful message online or via SMS? Ever cursed somebody online or via SMS? Ever impersonated anyone online or via SMS?
  • 32. Ever sent a hurtful message online or via SMS? Ever cursed somebody online or via SMS? Ever impersonated anyone online or via SMS? Ever embarrassed anyone online or via SMS?
  • 33. Ever sent a hurtful message online or via SMS? Ever cursed somebody online or via SMS? Ever impersonated anyone online or via SMS? Ever embarrassed anyone online or via SMS? Ever insulted somebody online or via SMS?
  • 34. Kids who bully other kids 53% online? 2003-2004 Study by I-Safe America
  • 37. 42% of kids get bullied online. 2003-2004 Study by I-Safe America
  • 38. Block
  • 41.
  • 42. You better watch out. We will hurt and hit you if you are not careful, you little #$! +*!!!

Notas del editor

  1. Understanding the responsibilities of cyber citizenship. [1] Using the internet for school work\n. [2] Using the internet to download media. [3] Using the internet to deal with others.\n
  2. Using the internet for school work.\n
  3. Using the internet for school work.\n
  4. What is Plagiarism? Plagiarism is passing off somebody else’s work and ideas as one’s own. \n
  5. What is Plagiarism? Plagiarism is passing off somebody else’s work and ideas as one’s own. \n
  6. What is Plagiarism? Plagiarism is passing off somebody else’s work and ideas as one’s own. \n
  7. How NOT to plagiarize: (1) Use multiple sources, (2) Write it in your own words, and (3) Cite ALL sources.\n
  8. How NOT to plagiarize: (1) Use multiple sources, (2) Write it in your own words, and (3) Cite ALL sources.\n
  9. How NOT to plagiarize: (1) Use multiple sources, (2) Write it in your own words, and (3) Cite ALL sources.\n
  10. How NOT to plagiarize: (1) Use multiple sources, (2) Write it in your own words, and (3) Cite ALL sources.\n
  11. How NOT to plagiarize: (1) Use multiple sources, (2) Write it in your own words, and (3) Cite ALL sources.\n
  12. How NOT to plagiarize: (1) Use multiple sources, (2) Write it in your own words, and (3) Cite ALL sources.\n
  13. How NOT to plagiarize: (1) Use multiple sources, (2) Write it in your own words, and (3) Cite ALL sources.\n
  14. How NOT to plagiarize: (1) Use multiple sources, (2) Write it in your own words, and (3) Cite ALL sources.\n
  15. How NOT to plagiarize: (1) Use multiple sources, (2) Write it in your own words, and (3) Cite ALL sources.\n
  16. Using the internet for entertainment.\n
  17. Using the internet for entertainment.\n
  18. Using the internet for entertainment.\n
  19. Using the internet for entertainment.\n
  20. Using the internet for entertainment.\n
  21. Like plagiarism, copyright infringement is stealing.\n\nCopyright Infringement: Piracy is a crime. You violate copyright laws when you upload, download, copy and/or distribute copyrighted files (i.e. music, movies, books, software, etc.) without permission from the copyright owner and outside the realm of fair use. \n
  22. Beware of downloading files from peer-to-peer applications. Some downloaded files are different from what they appear to be. They can be malicious software that pretend to be music or video files. These files are so-called Trojan Horses, which are malicious software that aim to infiltrate a host computer, either to merely corrupt the system or be used as a vehicle for crime.\n
  23. Download from legal sites. A good rule of thumb is to be cautious if it’s free. There are many legal and established sites that offer games, music, video and applications for a minimal fee (sometimes, even for free!). Stick with these sites. If unsure about where to download legally, ask help from a responsible adult.\n
  24. Download from legal sites. A good rule of thumb is to be cautious if it’s free. There are many legal and established sites that offer games, music, video and applications for a minimal fee (sometimes, even for free!). Stick with these sites. If unsure about where to download legally, ask help from a responsible adult.\n
  25. Download from legal sites. A good rule of thumb is to be cautious if it’s free. There are many legal and established sites that offer games, music, video and applications for a minimal fee (sometimes, even for free!). Stick with these sites. If unsure about where to download legally, ask help from a responsible adult.\n
  26. Download from legal sites. A good rule of thumb is to be cautious if it’s free. There are many legal and established sites that offer games, music, video and applications for a minimal fee (sometimes, even for free!). Stick with these sites. If unsure about where to download legally, ask help from a responsible adult.\n
  27. Download from legal sites. A good rule of thumb is to be cautious if it’s free. There are many legal and established sites that offer games, music, video and applications for a minimal fee (sometimes, even for free!). Stick with these sites. If unsure about where to download legally, ask help from a responsible adult.\n
  28. Download from legal sites. A good rule of thumb is to be cautious if it’s free. There are many legal and established sites that offer games, music, video and applications for a minimal fee (sometimes, even for free!). Stick with these sites. If unsure about where to download legally, ask help from a responsible adult.\n
  29. Download from legal sites. A good rule of thumb is to be cautious if it’s free. There are many legal and established sites that offer games, music, video and applications for a minimal fee (sometimes, even for free!). Stick with these sites. If unsure about where to download legally, ask help from a responsible adult.\n
  30. Download from legal sites. A good rule of thumb is to be cautious if it’s free. There are many legal and established sites that offer games, music, video and applications for a minimal fee (sometimes, even for free!). Stick with these sites. If unsure about where to download legally, ask help from a responsible adult.\n
  31. Download from legal sites. A good rule of thumb is to be cautious if it’s free. There are many legal and established sites that offer games, music, video and applications for a minimal fee (sometimes, even for free!). Stick with these sites. If unsure about where to download legally, ask help from a responsible adult.\n
  32. Using the internet to connect with others.\n
  33. What’s wrong with this picture? [1] Dan gave out his personal information.\n
  34. Your personal information is very important. Do not give out your personal information online (your name, phone number, address and school) and NEVER give your password to anybody, not even your friends. \n
  35. Like plagiarism, copyright infringement is stealing.\n\nCopyright Infringement: Piracy is a crime. You violate copyright laws when you upload, download, copy and/or distribute copyrighted files (i.e. music, movies, books, software, etc.) without permission from the copyright owner and outside the realm of fair use. \n
  36. There’s a time and place for everything. Do not allow your phones to serve as distractions. Concentrate on school work when in school. Do not use your mobile phones while walking or crossing the street. Do not reply to texts or calls from strangers. Do not give out your number to anyone--do not post them in public bulletins or online. Do not Mind your texting and calling use--they can cost your parents a lot of money!\n
  37. You don’t want this to happen to you, do you? The teen allegedly sent and received about 20,000 text messages in a month, sent mostly during school hours. Her grades dropped from A’s and B’s to F’s. After losing her mobile phone rights, her grades went up again.\n\n
  38. Sexting, meeting up with strangers\n
  39. \n
  40. Cyberbullying is bullying carried out in the internet through chat, email and messages in social networking sites, AND through mobile phones (SMS or phone calls). \n
  41. Cyberbullying is bullying carried out in the internet through chat, email and messages in social networking sites, AND through mobile phones (SMS or phone calls). \n
  42. Cyberbullying is bullying carried out in the internet through chat, email and messages in social networking sites, AND through mobile phones (SMS or phone calls). \n
  43. Cyberbullying is bullying carried out in the internet through chat, email and messages in social networking sites, AND through mobile phones (SMS or phone calls). \n
  44. Cyberbullying is bullying carried out in the internet through chat, email and messages in social networking sites, AND through mobile phones (SMS or phone calls). \n
  45. Studies have shown that more than half of kids have bullied peers online.\n
  46. Cyberbullying is a big deal. In serious cases, it will involve law enforcement and court authorities.\n
  47. \n
  48. If you’re being bullied, you’re not alone. A 2003 study by I-Safe America revealed that 42% of kids get bullied online. \n
  49. Block anyone who sends you malicious and hurtful messages. It will do you no good to reply and fight back.\n
  50. Keep copies of all hurtful messages sent to you. This will serve as evidence of harassment.\n
  51. Tell a responsible adult. Let your parents or guardians know at the first sign of bullying. Let your ISP (internet service provider), email provider and the abuse desk of social networking sites you are a member of about the harassment. Send them copies of the malicious messages sent to you. \nIf the harassment spills over to school, let your teacher and school authorities know.\n
  52. But if the bully threatens bodily harm or encourages suicide, report to law enforcement authorities right away. \n
  53. But if the bully threatens bodily harm or encourages suicide, report to law enforcement authorities right away. \n
  54. Speak no evil. See no evil. Hear no evil.\nDo not insult anybody. Do not respond to insults. Do not read flame messages about you or about anybody else. Do not listen to or participate in gossip.\n