SlideShare une entreprise Scribd logo
1  sur  20
The Greek Hotline against illegal Internet Content Meltini Christodoulaki Communication Liaison meltini@ safeline.gr
SafeLine,  www.safeline.gr ,[object Object],[object Object],[object Object]
ΙΝΗΟΡΕ , www.inhope.org ,[object Object],[object Object]
Illegal Content ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Report submi ss ion ,[object Object],[object Object],[object Object],[object Object]
 
 
 
Handling of Reports ,[object Object],[object Object]
Collaboration with the Greek Police ,[object Object],[object Object]
Collaboration with other Greek authorities ,[object Object],[object Object]
Content hosted abroad ,[object Object],[object Object]
The number of reports is continuously increasing!
Illegal Content
SNSs
What else can I find on SafeLine’s webpage?  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Saferinternet, www.saferinternet.gr ,[object Object]
 
Contributing Partners ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]

Contenu connexe

Tendances

Mo fa effective use of ict tools-05-01-2015
Mo fa effective use of ict tools-05-01-2015Mo fa effective use of ict tools-05-01-2015
Mo fa effective use of ict tools-05-01-2015Mwiza Helen
 
Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012armaexen
 
Freedom of expression & censorship in thailand
Freedom of expression & censorship in thailandFreedom of expression & censorship in thailand
Freedom of expression & censorship in thailandgcanavati
 
Cybercrime in Lithuania (2011)
Cybercrime in Lithuania (2011)Cybercrime in Lithuania (2011)
Cybercrime in Lithuania (2011)Mindaugas Kiskis
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippinesian_oguis
 
Cyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButTCyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButTHamza Khalid
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and lawsAjnish Rana
 
Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-finalAldrin SuperGo
 

Tendances (11)

Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Mo fa effective use of ict tools-05-01-2015
Mo fa effective use of ict tools-05-01-2015Mo fa effective use of ict tools-05-01-2015
Mo fa effective use of ict tools-05-01-2015
 
Law of-cybercrime
Law of-cybercrimeLaw of-cybercrime
Law of-cybercrime
 
Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012
 
Freedom of expression & censorship in thailand
Freedom of expression & censorship in thailandFreedom of expression & censorship in thailand
Freedom of expression & censorship in thailand
 
Assignment 1
Assignment 1Assignment 1
Assignment 1
 
Cybercrime in Lithuania (2011)
Cybercrime in Lithuania (2011)Cybercrime in Lithuania (2011)
Cybercrime in Lithuania (2011)
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
 
Cyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButTCyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButT
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-final
 

En vedette

Ist Intermational Congress Children In ICT
Ist Intermational Congress Children In ICTIst Intermational Congress Children In ICT
Ist Intermational Congress Children In ICTCTIC Technology Centre
 
GRACIAS a todas nuestras entidades colaboradoras
GRACIAS a todas nuestras entidades colaboradorasGRACIAS a todas nuestras entidades colaboradoras
GRACIAS a todas nuestras entidades colaboradorasCTIC Technology Centre
 
Young People and Internet Literacy and Safety
Young People and Internet Literacy and SafetyYoung People and Internet Literacy and Safety
Young People and Internet Literacy and SafetyCTIC Technology Centre
 
ICT and young people... the road ahead
ICT and young people... the road aheadICT and young people... the road ahead
ICT and young people... the road aheadCTIC Technology Centre
 
Music Origins Project Educational Overview
Music Origins Project Educational OverviewMusic Origins Project Educational Overview
Music Origins Project Educational OverviewDavid Grandison Jr
 
11 1 asiria general
11 1 asiria general11 1 asiria general
11 1 asiria generalJOSE ARIAS
 
How and When to Pivot - Lean Startup Principles Applied
How and When to Pivot  - Lean Startup Principles AppliedHow and When to Pivot  - Lean Startup Principles Applied
How and When to Pivot - Lean Startup Principles AppliedDavid Binetti
 
Digital Backpacks, Pockets and Purses... New Access, Risks, and Approaches...
Digital Backpacks, Pockets and Purses... New Access, Risks, and Approaches...Digital Backpacks, Pockets and Purses... New Access, Risks, and Approaches...
Digital Backpacks, Pockets and Purses... New Access, Risks, and Approaches...CTIC Technology Centre
 
Recursos temáticas en la web 2.0
Recursos temáticas en la web 2.0Recursos temáticas en la web 2.0
Recursos temáticas en la web 2.0Mellember
 

En vedette (19)

Ist Intermational Congress Children In ICT
Ist Intermational Congress Children In ICTIst Intermational Congress Children In ICT
Ist Intermational Congress Children In ICT
 
WebGUI Developers Workshop
WebGUI Developers WorkshopWebGUI Developers Workshop
WebGUI Developers Workshop
 
01. menorestic2010 richardson
01. menorestic2010 richardson01. menorestic2010 richardson
01. menorestic2010 richardson
 
The NICAM approach
The NICAM approachThe NICAM approach
The NICAM approach
 
1st Congress Speech Final
1st Congress Speech Final1st Congress Speech Final
1st Congress Speech Final
 
GRACIAS a todas nuestras entidades colaboradoras
GRACIAS a todas nuestras entidades colaboradorasGRACIAS a todas nuestras entidades colaboradoras
GRACIAS a todas nuestras entidades colaboradoras
 
Youth Privacy
Youth PrivacyYouth Privacy
Youth Privacy
 
The NICAM approach
The NICAM approachThe NICAM approach
The NICAM approach
 
Young People and Internet Literacy and Safety
Young People and Internet Literacy and SafetyYoung People and Internet Literacy and Safety
Young People and Internet Literacy and Safety
 
Children Online Protection
Children Online ProtectionChildren Online Protection
Children Online Protection
 
ICT and young people... the road ahead
ICT and young people... the road aheadICT and young people... the road ahead
ICT and young people... the road ahead
 
La Generación i
La Generación iLa Generación i
La Generación i
 
Music Origins Project Educational Overview
Music Origins Project Educational OverviewMusic Origins Project Educational Overview
Music Origins Project Educational Overview
 
11 1 asiria general
11 1 asiria general11 1 asiria general
11 1 asiria general
 
How and When to Pivot - Lean Startup Principles Applied
How and When to Pivot  - Lean Startup Principles AppliedHow and When to Pivot  - Lean Startup Principles Applied
How and When to Pivot - Lean Startup Principles Applied
 
Agnieszka Wrzesien
Agnieszka WrzesienAgnieszka Wrzesien
Agnieszka Wrzesien
 
Startup Case Study
Startup Case StudyStartup Case Study
Startup Case Study
 
Digital Backpacks, Pockets and Purses... New Access, Risks, and Approaches...
Digital Backpacks, Pockets and Purses... New Access, Risks, and Approaches...Digital Backpacks, Pockets and Purses... New Access, Risks, and Approaches...
Digital Backpacks, Pockets and Purses... New Access, Risks, and Approaches...
 
Recursos temáticas en la web 2.0
Recursos temáticas en la web 2.0Recursos temáticas en la web 2.0
Recursos temáticas en la web 2.0
 

Similaire à SafeLine: towards a safer Internet

ahmadsofiang20stcfinal-220308055846 (1).pptx
ahmadsofiang20stcfinal-220308055846 (1).pptxahmadsofiang20stcfinal-220308055846 (1).pptx
ahmadsofiang20stcfinal-220308055846 (1).pptxchiragcdbc92
 
C20 - CHILD PROTECTION ONLINE
C20 - CHILD PROTECTION ONLINEC20 - CHILD PROTECTION ONLINE
C20 - CHILD PROTECTION ONLINEECPAT Indonesia
 
Analyzing the influence of information and communication technology on the sc...
Analyzing the influence of information and communication technology on the sc...Analyzing the influence of information and communication technology on the sc...
Analyzing the influence of information and communication technology on the sc...JohnGacinya
 
Analyzing the influence of Information and communication Technology on the sc...
Analyzing the influence of Information and communication Technology on the sc...Analyzing the influence of Information and communication Technology on the sc...
Analyzing the influence of Information and communication Technology on the sc...JohnGacinya
 
Power and Leverage in the XXI Century
Power and Leverage in the XXI CenturyPower and Leverage in the XXI Century
Power and Leverage in the XXI CenturyJyrki Kasvi
 
CTO-Cybersecurity-Forum-2010-Cristina Buetti
CTO-Cybersecurity-Forum-2010-Cristina BuettiCTO-Cybersecurity-Forum-2010-Cristina Buetti
CTO-Cybersecurity-Forum-2010-Cristina Buettisegughana
 
Tomasz Czajkowski
Tomasz CzajkowskiTomasz Czajkowski
Tomasz Czajkowskisegughana
 
Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues Fahad Saleem
 
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptxRAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptxRahuljain40418
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxOlusegun Mosugu
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwkamalbhatt9229
 
Projektfuzet angol-web
Projektfuzet angol-webProjektfuzet angol-web
Projektfuzet angol-webOmbodi Gábor
 

Similaire à SafeLine: towards a safer Internet (20)

ahmadsofiang20stcfinal-220308055846 (1).pptx
ahmadsofiang20stcfinal-220308055846 (1).pptxahmadsofiang20stcfinal-220308055846 (1).pptx
ahmadsofiang20stcfinal-220308055846 (1).pptx
 
C20 - CHILD PROTECTION ONLINE
C20 - CHILD PROTECTION ONLINEC20 - CHILD PROTECTION ONLINE
C20 - CHILD PROTECTION ONLINE
 
Child protection system in ict of thailand
Child protection system in ict of thailandChild protection system in ict of thailand
Child protection system in ict of thailand
 
Child protection system in ict of thailand
Child protection system in ict of thailandChild protection system in ict of thailand
Child protection system in ict of thailand
 
Analyzing the influence of information and communication technology on the sc...
Analyzing the influence of information and communication technology on the sc...Analyzing the influence of information and communication technology on the sc...
Analyzing the influence of information and communication technology on the sc...
 
Analyzing the influence of Information and communication Technology on the sc...
Analyzing the influence of Information and communication Technology on the sc...Analyzing the influence of Information and communication Technology on the sc...
Analyzing the influence of Information and communication Technology on the sc...
 
Power and Leverage in the XXI Century
Power and Leverage in the XXI CenturyPower and Leverage in the XXI Century
Power and Leverage in the XXI Century
 
Cyber security
Cyber securityCyber security
Cyber security
 
CTO-Cybersecurity-Forum-2010-Cristina Buetti
CTO-Cybersecurity-Forum-2010-Cristina BuettiCTO-Cybersecurity-Forum-2010-Cristina Buetti
CTO-Cybersecurity-Forum-2010-Cristina Buetti
 
Child Focus - Prevention of sexual abuse: vision and practices
Child Focus - Prevention of sexual abuse: vision and practicesChild Focus - Prevention of sexual abuse: vision and practices
Child Focus - Prevention of sexual abuse: vision and practices
 
Tomasz Czajkowski
Tomasz CzajkowskiTomasz Czajkowski
Tomasz Czajkowski
 
Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues
 
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptxRAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptx
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Projektfuzet angol-web
Projektfuzet angol-webProjektfuzet angol-web
Projektfuzet angol-web
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
European Cyber Crime Centre EC3
European Cyber Crime Centre EC3European Cyber Crime Centre EC3
European Cyber Crime Centre EC3
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Plus de CTIC Technology Centre

Estudio tecnologias cientificos futuro
Estudio tecnologias cientificos futuroEstudio tecnologias cientificos futuro
Estudio tecnologias cientificos futuroCTIC Technology Centre
 
Identidad digital, datos personales y redes sociales
Identidad digital, datos personales y redes socialesIdentidad digital, datos personales y redes sociales
Identidad digital, datos personales y redes socialesCTIC Technology Centre
 
Experiencias integrales de introducción de las TIC en el aula y el hogar. (Fe...
Experiencias integrales de introducción de las TIC en el aula y el hogar. (Fe...Experiencias integrales de introducción de las TIC en el aula y el hogar. (Fe...
Experiencias integrales de introducción de las TIC en el aula y el hogar. (Fe...CTIC Technology Centre
 
Radiografía de Riesgos (Informática64)
Radiografía de Riesgos (Informática64)Radiografía de Riesgos (Informática64)
Radiografía de Riesgos (Informática64)CTIC Technology Centre
 
Contribuyendo a la ciudadanía digital: el rol de la industria
Contribuyendo a la ciudadanía digital: el rol de la industriaContribuyendo a la ciudadanía digital: el rol de la industria
Contribuyendo a la ciudadanía digital: el rol de la industriaCTIC Technology Centre
 
Por un uso seguro y responsable de las TIC en Canarias
Por un uso seguro y responsable de las TIC en CanariasPor un uso seguro y responsable de las TIC en Canarias
Por un uso seguro y responsable de las TIC en CanariasCTIC Technology Centre
 
Las TIC y la Seguridad en la Comunidad Educativa: Producciones didácticas
Las TIC y la Seguridad en la Comunidad Educativa: Producciones didácticasLas TIC y la Seguridad en la Comunidad Educativa: Producciones didácticas
Las TIC y la Seguridad en la Comunidad Educativa: Producciones didácticasCTIC Technology Centre
 

Plus de CTIC Technology Centre (20)

Estudio tecnologias cientificos futuro
Estudio tecnologias cientificos futuroEstudio tecnologias cientificos futuro
Estudio tecnologias cientificos futuro
 
Comunidad de aprendizaje
Comunidad de aprendizajeComunidad de aprendizaje
Comunidad de aprendizaje
 
Escuela 2.0
Escuela 2.0Escuela 2.0
Escuela 2.0
 
Aprender a comunicar en la red
Aprender a comunicar en la redAprender a comunicar en la red
Aprender a comunicar en la red
 
Corresponsabilidad
CorresponsabilidadCorresponsabilidad
Corresponsabilidad
 
Educar Comunicando
Educar ComunicandoEducar Comunicando
Educar Comunicando
 
Identidad digital, datos personales y redes sociales
Identidad digital, datos personales y redes socialesIdentidad digital, datos personales y redes sociales
Identidad digital, datos personales y redes sociales
 
Habbo
HabboHabbo
Habbo
 
Privacidad en Tuenti
Privacidad en TuentiPrivacidad en Tuenti
Privacidad en Tuenti
 
Inclusión digital en el aula
Inclusión digital en el aulaInclusión digital en el aula
Inclusión digital en el aula
 
Experiencias integrales de introducción de las TIC en el aula y el hogar. (Fe...
Experiencias integrales de introducción de las TIC en el aula y el hogar. (Fe...Experiencias integrales de introducción de las TIC en el aula y el hogar. (Fe...
Experiencias integrales de introducción de las TIC en el aula y el hogar. (Fe...
 
05. identidad digitalmenorestic (1)
05. identidad digitalmenorestic (1)05. identidad digitalmenorestic (1)
05. identidad digitalmenorestic (1)
 
Radiografía de Riesgos (Informática64)
Radiografía de Riesgos (Informática64)Radiografía de Riesgos (Informática64)
Radiografía de Riesgos (Informática64)
 
Radiografía de Riesgos (Protégeles)
Radiografía de Riesgos (Protégeles)Radiografía de Riesgos (Protégeles)
Radiografía de Riesgos (Protégeles)
 
Radiografía de los riesgos.
Radiografía de los riesgos.Radiografía de los riesgos.
Radiografía de los riesgos.
 
Salud, cine y pantallas sanas
Salud, cine y pantallas sanasSalud, cine y pantallas sanas
Salud, cine y pantallas sanas
 
Salud, cine y pantallas sanas
Salud, cine y pantallas sanasSalud, cine y pantallas sanas
Salud, cine y pantallas sanas
 
Contribuyendo a la ciudadanía digital: el rol de la industria
Contribuyendo a la ciudadanía digital: el rol de la industriaContribuyendo a la ciudadanía digital: el rol de la industria
Contribuyendo a la ciudadanía digital: el rol de la industria
 
Por un uso seguro y responsable de las TIC en Canarias
Por un uso seguro y responsable de las TIC en CanariasPor un uso seguro y responsable de las TIC en Canarias
Por un uso seguro y responsable de las TIC en Canarias
 
Las TIC y la Seguridad en la Comunidad Educativa: Producciones didácticas
Las TIC y la Seguridad en la Comunidad Educativa: Producciones didácticasLas TIC y la Seguridad en la Comunidad Educativa: Producciones didácticas
Las TIC y la Seguridad en la Comunidad Educativa: Producciones didácticas
 

Dernier

Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17Celine George
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxMichelleTuguinay1
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfChristalin Nelson
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17Celine George
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvRicaMaeCastro1
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 

Dernier (20)

Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdf
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 

SafeLine: towards a safer Internet