SlideShare une entreprise Scribd logo
1  sur  8
Everyone should believe in being safe online. Be safe online no matter what BY: Cherokee wemmer
What is a predator? ,[object Object],[object Object]
Why do you feel safe online? ,[object Object],[object Object]
How can you be safe online? ,[object Object],[object Object]
What is the biggest mistake kids make? ,[object Object],[object Object]
What is cyber bullying? ,[object Object],[object Object]
What is sexting? ,[object Object],[object Object]
Warn your friends! ,[object Object],[object Object]

Contenu connexe

Tendances

Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsEllie Simons
 
Cyber Contacts for pupils
Cyber Contacts for pupilsCyber Contacts for pupils
Cyber Contacts for pupilsMaimoonahKhan
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety pptmcmullan
 
Cyber safety
Cyber safetyCyber safety
Cyber safetyYash Jain
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety PresentationMichael Richards
 
Cyber wellness 2
Cyber wellness 2Cyber wellness 2
Cyber wellness 2Chu Yuan
 
The ten golden rules of surfing the internet safely
The ten golden rules of surfing the internet safelyThe ten golden rules of surfing the internet safely
The ten golden rules of surfing the internet safelyelhatzist
 
Cyberwellness talk by mdm saedah 2011 160211
Cyberwellness talk by mdm saedah 2011 160211Cyberwellness talk by mdm saedah 2011 160211
Cyberwellness talk by mdm saedah 2011 160211Saedah
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety PresentationPamela Moeai
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationtdsparks3
 
Electronic safety grade 4 5
Electronic safety grade 4 5Electronic safety grade 4 5
Electronic safety grade 4 5Melissa Halcott
 
Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Queens Library
 
Blogs, Podcasts & Cybersafety
Blogs, Podcasts & CybersafetyBlogs, Podcasts & Cybersafety
Blogs, Podcasts & CybersafetySandra Foyt
 

Tendances (20)

Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school students
 
Cyber Contacts for pupils
Cyber Contacts for pupilsCyber Contacts for pupils
Cyber Contacts for pupils
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety Presentation
 
Internet safety by kiran
Internet safety by kiranInternet safety by kiran
Internet safety by kiran
 
Cyber wellness 2
Cyber wellness 2Cyber wellness 2
Cyber wellness 2
 
The ten golden rules of surfing the internet safely
The ten golden rules of surfing the internet safelyThe ten golden rules of surfing the internet safely
The ten golden rules of surfing the internet safely
 
Cyberwellness talk by mdm saedah 2011 160211
Cyberwellness talk by mdm saedah 2011 160211Cyberwellness talk by mdm saedah 2011 160211
Cyberwellness talk by mdm saedah 2011 160211
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
7th B
7th B7th B
7th B
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
7th B
7th B7th B
7th B
 
Electronic safety grade 4 5
Electronic safety grade 4 5Electronic safety grade 4 5
Electronic safety grade 4 5
 
Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet
 
Blogs, Podcasts & Cybersafety
Blogs, Podcasts & CybersafetyBlogs, Podcasts & Cybersafety
Blogs, Podcasts & Cybersafety
 
Cj internet safty
Cj internet saftyCj internet safty
Cj internet safty
 

Similaire à Cherokee int safety

E safety assembly
E safety assemblyE safety assembly
E safety assemblyapaismtic
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingAntolduvai
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safelysam31
 
E safety assembly
E safety assemblyE safety assembly
E safety assemblyJEcomputing
 
Danah morales ...
Danah morales                                                                ...Danah morales                                                                ...
Danah morales ...KokoMorales
 
Inservice cyberbullyingpwpt
Inservice cyberbullyingpwptInservice cyberbullyingpwpt
Inservice cyberbullyingpwptsooy10
 
Inservice cyberbullyingpwpt
Inservice cyberbullyingpwptInservice cyberbullyingpwpt
Inservice cyberbullyingpwptsooy10
 
Cyber bullying project
Cyber bullying projectCyber bullying project
Cyber bullying projectvolpila
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for ParentsRodolfo Salazar
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet SafetyMark Deming
 
Cyberbullying2
Cyberbullying2Cyberbullying2
Cyberbullying2bigmike18
 
CH e-safety presentation
CH e-safety presentationCH e-safety presentation
CH e-safety presentationQEwebAdmin
 
Internet safety
Internet safetyInternet safety
Internet safetyjld1018
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaAndri Priyatna
 
Internet safety
Internet safetyInternet safety
Internet safety12ROYA
 

Similaire à Cherokee int safety (20)

E safety assembly
E safety assemblyE safety assembly
E safety assembly
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Shouq jaber 11 a
Shouq jaber   11 aShouq jaber   11 a
Shouq jaber 11 a
 
Cyberbully
CyberbullyCyberbully
Cyberbully
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safely
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
E safety assembly
E safety assemblyE safety assembly
E safety assembly
 
Danah morales ...
Danah morales                                                                ...Danah morales                                                                ...
Danah morales ...
 
Inservice cyberbullyingpwpt
Inservice cyberbullyingpwptInservice cyberbullyingpwpt
Inservice cyberbullyingpwpt
 
Inservice cyberbullyingpwpt
Inservice cyberbullyingpwptInservice cyberbullyingpwpt
Inservice cyberbullyingpwpt
 
Pupil esafety
Pupil esafetyPupil esafety
Pupil esafety
 
Cyber bullying project
Cyber bullying projectCyber bullying project
Cyber bullying project
 
Cyber bully campaign
Cyber bully campaign Cyber bully campaign
Cyber bully campaign
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for Parents
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet Safety
 
Cyberbullying2
Cyberbullying2Cyberbullying2
Cyberbullying2
 
CH e-safety presentation
CH e-safety presentationCH e-safety presentation
CH e-safety presentation
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remaja
 
Internet safety
Internet safetyInternet safety
Internet safety
 

Plus de Brenda Sargent

Plus de Brenda Sargent (6)

Bd presentation 26 credits
Bd presentation 26 creditsBd presentation 26 credits
Bd presentation 26 credits
 
Shelby's i safe ppt
Shelby's i safe pptShelby's i safe ppt
Shelby's i safe ppt
 
Aryn's i safe p pt
Aryn's i safe p ptAryn's i safe p pt
Aryn's i safe p pt
 
Sonny int safety
Sonny int safetySonny int safety
Sonny int safety
 
Kirstin's i safe ppt
Kirstin's i safe pptKirstin's i safe ppt
Kirstin's i safe ppt
 
Courtney's i safe p pt
Courtney's i  safe p ptCourtney's i  safe p pt
Courtney's i safe p pt
 

Dernier

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 

Dernier (20)

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 

Cherokee int safety

  • 1. Everyone should believe in being safe online. Be safe online no matter what BY: Cherokee wemmer
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.