SlideShare a Scribd company logo
1 of 37
SEMINAR ON:
1
WHAT IS GOOGLE WEB RANGER PROGRAMME?
 “Web Rangers equips students to become
ambassadors who will promote safe and
responsible use of the web in their schools.”
 Web Rangers provide training to help teens
create their cyber safety campaign to
enable themselves and their peers think
about their online behavior and how to keep
each other safe online.
2
CONTENTS:
1. Become an online sleuth.
2. Manage your digital foot prints
3. Cyber Bully
4. Scams
3
CHAPTER 1:-
BECOME AN ONLINE SLEUTH
 Investigate source.
 Who holds the copy right?
 What do they want you to
believe?
 Don’t be fooled by cool and
professional looking websites.
 Compare source of Information.
4
BECOME AN ONLINE SLEUTH
 Everyone’s face is hidden.
 Unless you know your
friend’s costume (Online
name), you don’t know if you
are talking to your friend or
someone you don’t know.
 Any stranger can pretend to
be a friend and you have no
way of knowing who they are
because they are behind the
mask of the computer
5
IDENTIFY FAKE PHOTO #1
6
IDENTIFY FAKE PHOTO #2
7
IDENTIFY FAKE PHOTO #3
8
IDENTIFY FAKE PHOTO #4
9
IDENTIFY FAKE PHOTO #5
10
CHAPTER 2:-
MANAGE YOUR DIGITAL FOOTPRINTS
 Think before you share.
 What you share can take on a
life of its own
 1 Share X 2.4 Billion People =?
11
STEPS TO SAFETY
 Search your name and evaluate your
reputation.
 Keep personal information private.
(User Id, Bank A/c No… etc.)
 Keep Granma Rule when posting
anything online.
12
PROTECT YOUR STUFF
 Use strong password.
 Never share your password.
 Lock your device / screen after use.
 Logout in proper way (Especially form public
computers)
 Know and use your settings. (Smartphone/
Computer)
 Use strict privacy settings. (Protect your mobile/
computer from Spyware)
 Use Incognito Mode when using a public computer.
13
TRACING DIGITAL FOOTPRINTS:
14
OPENING INCOGNITO MODE
(PRIVATE WINDOW)
15
PASSWORD :
 Use 8+ Characters.
 Mix letters, Numbers, and symbols.
 Use different passwords for different websites.
(Never use same password for every account)
 Use 2 step verification.
 Use complicated pattern lock for your smart phone
16
CHAPTER 3:-
CYBER BULLYING
The use of Internet to
bully (Hurt) a person,
typically by sending
messages of an
intimidating or
threatening nature.
17
INCASE OF BULLY:
Block and report
bully
Don’t respond or
retaliate
Reach out for help
Be civil and never bully.
Be a up stander not a by stander.
18
CHAPTER4:-
AVOID SCAMS
 Identity theft.
 Using your identity for crime
 Sell your details
 Track and steal you.
 Phishing
19
PHISHING
The luring of an internet
user to reveal personal
details (like passwords and
credit card information) on
a fake web page or e-mail.
20
PHISHING
21
TIPS:
 Don’t respond to suspicious posts/ e-mail.
 Don’t respond to request for your password.
 Ask parents.
22
QUIZ TIME: #1
If someone online tells you they are in
6th grade and their name is Katie, they
are probably how old?
 There’s no way to tell!
 12
 13
 35 23
QUIZ TIME: #2
 If you have been talking on the Internet to a
person for a long time, and they want to meet,
which is okay to do?
a) Meet them, as long as you bring a friend.
b) Ask your parent or guardian first and have
them go with you.
c) Meet them without asking elders.
d) Tell someone where you will be before you
go.
24
QUIZ TIME: #3
If someone online sends you a
message that is mean or makes you
feel uncomfortable, you should:
 Tell a responsible adult
 Erase them from your friends list.
 Delete the message.
 Insult them back
25
QUIZ TIME: #4
Which password is best to have??
a) soniyamol
b) Abcdef
c) 50niy@m0l
d) 9895646594
26
QUIZ TIME : #5
While surfing the Internet, you get an
error message from your Internet
provider, and it says it will delete your
account unless you type in your
password again, should you send the
information?
a. Yes.
b. No. 27
QUIZ TIME : #6
An example of cyber bullying is:
a) Posting your own information on the
internet.
b) Spreading rumors about someone
through e-mails or social network
sites.
c) Creating Facebook/ twitter account.
d) Responding to a harassing e-mail
28
QUIZ TIME : #7
 . When you are filling out forms or surveys
online, you should:
a) Answer all the questions truthfully.
b) Before you answer any questions, you should
get your parents' approval.
c) Make up funny answers to all the questions.
29
QUIZ TIME : #8
 When you get an email or instant message from
people you don't know, you should:
a) Ignore it and put it in your trash folder.
b) Respond with a polite how-do-you-do.
c) Forward the message to your best friends
30
QUIZ TIME : #9
 3. When someone asks for personal information
like phone numbers or addresses online, you
should:
a) Give the information to anyone who asks because it's
the polite thing to do.
b) Post the information on any public Web site like
MySpace, so anyone can find it.
c) Never give out personal information online in
emails or instant messages because you never
know who you are really communicating with. 31
QUIZ TIME : #10
 When you are making up a user name for email
and instant messaging, you should:
a) Always use your real name.
b) Use a name that does NOT reveal your true
identity.
c) Use a name that gives good clues about who you
really are.
32
QUIZ TIME :#11
Identify this person :
33
QUIZ TIME : #12
Who is the IB (information and broadcasting) minister
?
o Narendra modhi
o Manohar Parrikar
o Smriti Irani
o Arun Jaitley
34
WHAT IS YOUR DUTY?
Follow the safety guidelines
Practice it properly
Educate your friends and family.
Write an article to publish in the school
magazine, local news papers etc.
35
TIME
36
37

More Related Content

What's hot

Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteJuan Miguel Palero
 
Activity 1: Original or Derivative ICT Content
Activity 1: Original or Derivative ICT ContentActivity 1: Original or Derivative ICT Content
Activity 1: Original or Derivative ICT ContentJuliana Celenia A. Biazon
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of NetiquetteRochelle Nato
 
Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Queens Library
 
Securityawareness
SecurityawarenessSecurityawareness
SecurityawarenessJayfErika
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesMark Jhon Oxillo
 
Social Media Privacy
Social Media PrivacySocial Media Privacy
Social Media PrivacyLisa Turner
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet SafetyKigose
 
New Hire Information Security Awareness
New Hire Information Security AwarenessNew Hire Information Security Awareness
New Hire Information Security Awarenesshubbargf
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)John Bosco Javellana, MAEd.
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teensSearchLock
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technologypizonaim
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - EnglishData Security
 
Empowerment Technology Lesson 1
Empowerment Technology Lesson 1Empowerment Technology Lesson 1
Empowerment Technology Lesson 1alicelagajino
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness TrainingDave Monahan
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 

What's hot (20)

Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and Etiquette
 
Activity 1: Original or Derivative ICT Content
Activity 1: Original or Derivative ICT ContentActivity 1: Original or Derivative ICT Content
Activity 1: Original or Derivative ICT Content
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet
 
Securityawareness
SecurityawarenessSecurityawareness
Securityawareness
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Social Media Privacy
Social Media PrivacySocial Media Privacy
Social Media Privacy
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety
 
Database security
Database securityDatabase security
Database security
 
New Hire Information Security Awareness
New Hire Information Security AwarenessNew Hire Information Security Awareness
New Hire Information Security Awareness
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technology
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - English
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Empowerment Technology Lesson 1
Empowerment Technology Lesson 1Empowerment Technology Lesson 1
Empowerment Technology Lesson 1
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 

Similar to How to use internet safely

Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Finalguest5558240
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Finalguest0c7b65
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Finalguest0c7b65
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety PresentationLJ Henshell
 
online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdfjessa451416
 
Mac Kenzi D. Group#3
Mac Kenzi D. Group#3Mac Kenzi D. Group#3
Mac Kenzi D. Group#3guest3e462b5
 
Internet Saftey Final
Internet Saftey FinalInternet Saftey Final
Internet Saftey Finalguest252cc9
 
Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3jesusmlaz
 
Raising A Cyber Citizen
Raising A Cyber CitizenRaising A Cyber Citizen
Raising A Cyber CitizenJustin Medved
 
Digital literacy
Digital literacyDigital literacy
Digital literacyAmanda lee
 
Q3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfQ3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfBryanSmile
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingYumna Ali
 
Cyber Crime Awareness and Prevension.pdf
Cyber Crime Awareness and Prevension.pdfCyber Crime Awareness and Prevension.pdf
Cyber Crime Awareness and Prevension.pdfnisarmca
 
Tech Class Millionaire For Internet Safety
Tech Class Millionaire For Internet SafetyTech Class Millionaire For Internet Safety
Tech Class Millionaire For Internet Safetygeoffnorth
 
Internet safety
Internet safetyInternet safety
Internet safetykohlerj
 
Presentation on the optimal usage of facebook
Presentation on the optimal usage of facebookPresentation on the optimal usage of facebook
Presentation on the optimal usage of facebookShweta Agarwal
 

Similar to How to use internet safely (20)

Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety Presentation
 
online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdf
 
Mac Kenzi D. Group#3
Mac Kenzi D. Group#3Mac Kenzi D. Group#3
Mac Kenzi D. Group#3
 
Internet Saftey Final
Internet Saftey FinalInternet Saftey Final
Internet Saftey Final
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3
 
Raising A Cyber Citizen
Raising A Cyber CitizenRaising A Cyber Citizen
Raising A Cyber Citizen
 
Digital literacy
Digital literacyDigital literacy
Digital literacy
 
Q3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfQ3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdf
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber Crime Awareness and Prevension.pdf
Cyber Crime Awareness and Prevension.pdfCyber Crime Awareness and Prevension.pdf
Cyber Crime Awareness and Prevension.pdf
 
Tech Class Millionaire For Internet Safety
Tech Class Millionaire For Internet SafetyTech Class Millionaire For Internet Safety
Tech Class Millionaire For Internet Safety
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet safety
Internet safety Internet safety
Internet safety
 
Maintaining Online Privacy
Maintaining Online PrivacyMaintaining Online Privacy
Maintaining Online Privacy
 
Presentation on the optimal usage of facebook
Presentation on the optimal usage of facebookPresentation on the optimal usage of facebook
Presentation on the optimal usage of facebook
 

Recently uploaded

80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 

Recently uploaded (20)

80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 

How to use internet safely

  • 2. WHAT IS GOOGLE WEB RANGER PROGRAMME?  “Web Rangers equips students to become ambassadors who will promote safe and responsible use of the web in their schools.”  Web Rangers provide training to help teens create their cyber safety campaign to enable themselves and their peers think about their online behavior and how to keep each other safe online. 2
  • 3. CONTENTS: 1. Become an online sleuth. 2. Manage your digital foot prints 3. Cyber Bully 4. Scams 3
  • 4. CHAPTER 1:- BECOME AN ONLINE SLEUTH  Investigate source.  Who holds the copy right?  What do they want you to believe?  Don’t be fooled by cool and professional looking websites.  Compare source of Information. 4
  • 5. BECOME AN ONLINE SLEUTH  Everyone’s face is hidden.  Unless you know your friend’s costume (Online name), you don’t know if you are talking to your friend or someone you don’t know.  Any stranger can pretend to be a friend and you have no way of knowing who they are because they are behind the mask of the computer 5
  • 11. CHAPTER 2:- MANAGE YOUR DIGITAL FOOTPRINTS  Think before you share.  What you share can take on a life of its own  1 Share X 2.4 Billion People =? 11
  • 12. STEPS TO SAFETY  Search your name and evaluate your reputation.  Keep personal information private. (User Id, Bank A/c No… etc.)  Keep Granma Rule when posting anything online. 12
  • 13. PROTECT YOUR STUFF  Use strong password.  Never share your password.  Lock your device / screen after use.  Logout in proper way (Especially form public computers)  Know and use your settings. (Smartphone/ Computer)  Use strict privacy settings. (Protect your mobile/ computer from Spyware)  Use Incognito Mode when using a public computer. 13
  • 16. PASSWORD :  Use 8+ Characters.  Mix letters, Numbers, and symbols.  Use different passwords for different websites. (Never use same password for every account)  Use 2 step verification.  Use complicated pattern lock for your smart phone 16
  • 17. CHAPTER 3:- CYBER BULLYING The use of Internet to bully (Hurt) a person, typically by sending messages of an intimidating or threatening nature. 17
  • 18. INCASE OF BULLY: Block and report bully Don’t respond or retaliate Reach out for help Be civil and never bully. Be a up stander not a by stander. 18
  • 19. CHAPTER4:- AVOID SCAMS  Identity theft.  Using your identity for crime  Sell your details  Track and steal you.  Phishing 19
  • 20. PHISHING The luring of an internet user to reveal personal details (like passwords and credit card information) on a fake web page or e-mail. 20
  • 22. TIPS:  Don’t respond to suspicious posts/ e-mail.  Don’t respond to request for your password.  Ask parents. 22
  • 23. QUIZ TIME: #1 If someone online tells you they are in 6th grade and their name is Katie, they are probably how old?  There’s no way to tell!  12  13  35 23
  • 24. QUIZ TIME: #2  If you have been talking on the Internet to a person for a long time, and they want to meet, which is okay to do? a) Meet them, as long as you bring a friend. b) Ask your parent or guardian first and have them go with you. c) Meet them without asking elders. d) Tell someone where you will be before you go. 24
  • 25. QUIZ TIME: #3 If someone online sends you a message that is mean or makes you feel uncomfortable, you should:  Tell a responsible adult  Erase them from your friends list.  Delete the message.  Insult them back 25
  • 26. QUIZ TIME: #4 Which password is best to have?? a) soniyamol b) Abcdef c) 50niy@m0l d) 9895646594 26
  • 27. QUIZ TIME : #5 While surfing the Internet, you get an error message from your Internet provider, and it says it will delete your account unless you type in your password again, should you send the information? a. Yes. b. No. 27
  • 28. QUIZ TIME : #6 An example of cyber bullying is: a) Posting your own information on the internet. b) Spreading rumors about someone through e-mails or social network sites. c) Creating Facebook/ twitter account. d) Responding to a harassing e-mail 28
  • 29. QUIZ TIME : #7  . When you are filling out forms or surveys online, you should: a) Answer all the questions truthfully. b) Before you answer any questions, you should get your parents' approval. c) Make up funny answers to all the questions. 29
  • 30. QUIZ TIME : #8  When you get an email or instant message from people you don't know, you should: a) Ignore it and put it in your trash folder. b) Respond with a polite how-do-you-do. c) Forward the message to your best friends 30
  • 31. QUIZ TIME : #9  3. When someone asks for personal information like phone numbers or addresses online, you should: a) Give the information to anyone who asks because it's the polite thing to do. b) Post the information on any public Web site like MySpace, so anyone can find it. c) Never give out personal information online in emails or instant messages because you never know who you are really communicating with. 31
  • 32. QUIZ TIME : #10  When you are making up a user name for email and instant messaging, you should: a) Always use your real name. b) Use a name that does NOT reveal your true identity. c) Use a name that gives good clues about who you really are. 32
  • 33. QUIZ TIME :#11 Identify this person : 33
  • 34. QUIZ TIME : #12 Who is the IB (information and broadcasting) minister ? o Narendra modhi o Manohar Parrikar o Smriti Irani o Arun Jaitley 34
  • 35. WHAT IS YOUR DUTY? Follow the safety guidelines Practice it properly Educate your friends and family. Write an article to publish in the school magazine, local news papers etc. 35
  • 37. 37