SlideShare une entreprise Scribd logo
1  sur  8
Internet Safety  All images from Microsoft Office Clip Art/Office Online
Chatting & Chat Rooms An online chat is when to you talk to someone through a social networking site or program using your keyboard on the worldwide web (internet). Some examples of these are Facebook, AIM and Skype. Many e-mail websites such as Yahoo!, Google, and MSN have added free chat features to your e-mail account.
Benefits, Downfalls & Risks to Chat Rooms
Spam Spam is junk email that usually comes in the form of advertisements.  It can also be an email from someone you don’t know. Spam is a big problem because it can mess up someone’s computer and bring in viruses. If you receive spam immediately delete it.  Opening it can cause your computer major problems.  You can also report this sender. If you get an email with an attachment from someone you don’t know, just ignore it.  DON’T OPEN IT!  The attachment could carry a virus.
Spam How to control spam:  Control your filter of incoming emails. Another way is to report the spam to the spammer’s ISP.  One other way is to just ignore it.
Spam
Surfer Dude Internet is  a big group of  connected computer networks that go around the globe It is use for a way to communicate and to find out information  www means World Wide Web
Internet Safety Final Copy

Contenu connexe

Tendances

Staying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘NetStaying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘NetDaniel Owens
 
Mystartbyincredibar blog com
Mystartbyincredibar blog comMystartbyincredibar blog com
Mystartbyincredibar blog comIrisPhilme
 
Instant messaging-final
Instant messaging-finalInstant messaging-final
Instant messaging-finalroutbisu
 
Protecting Your PC or Laptop
Protecting Your PC or LaptopProtecting Your PC or Laptop
Protecting Your PC or LaptopSOBXTECH
 
Ppt Vinisha And Giovanna Instant Messaging 2
Ppt Vinisha And Giovanna Instant Messaging 2Ppt Vinisha And Giovanna Instant Messaging 2
Ppt Vinisha And Giovanna Instant Messaging 2viniz
 
Security on the internet volosyanko
Security on the internet volosyankoSecurity on the internet volosyanko
Security on the internet volosyankoSergiy Sydoriv
 
Slideshow Alisha Schnapper
Slideshow Alisha SchnapperSlideshow Alisha Schnapper
Slideshow Alisha Schnapperaschnapper
 
Slide share-Susan Branch
Slide share-Susan BranchSlide share-Susan Branch
Slide share-Susan BranchSusan Branch
 
Security Pp Cis
Security Pp CisSecurity Pp Cis
Security Pp CisRobC76
 

Tendances (20)

Staying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘NetStaying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘Net
 
Email
EmailEmail
Email
 
Instant Messaging Apps
Instant Messaging AppsInstant Messaging Apps
Instant Messaging Apps
 
Mystartbyincredibar blog com
Mystartbyincredibar blog comMystartbyincredibar blog com
Mystartbyincredibar blog com
 
Instant messaging-final
Instant messaging-finalInstant messaging-final
Instant messaging-final
 
Protect
ProtectProtect
Protect
 
Protecting Your PC or Laptop
Protecting Your PC or LaptopProtecting Your PC or Laptop
Protecting Your PC or Laptop
 
Viruses novice
Viruses noviceViruses novice
Viruses novice
 
Threats – m2
Threats – m2Threats – m2
Threats – m2
 
P7 unit 3
P7 unit 3 P7 unit 3
P7 unit 3
 
Viruses novice
Viruses noviceViruses novice
Viruses novice
 
Ppt Vinisha And Giovanna Instant Messaging 2
Ppt Vinisha And Giovanna Instant Messaging 2Ppt Vinisha And Giovanna Instant Messaging 2
Ppt Vinisha And Giovanna Instant Messaging 2
 
Security on the internet volosyanko
Security on the internet volosyankoSecurity on the internet volosyanko
Security on the internet volosyanko
 
Enumeration
EnumerationEnumeration
Enumeration
 
Slideshow Alisha Schnapper
Slideshow Alisha SchnapperSlideshow Alisha Schnapper
Slideshow Alisha Schnapper
 
Instant Messaging
Instant MessagingInstant Messaging
Instant Messaging
 
Slide share-Susan Branch
Slide share-Susan BranchSlide share-Susan Branch
Slide share-Susan Branch
 
Security Pp Cis
Security Pp CisSecurity Pp Cis
Security Pp Cis
 
Sowmya
SowmyaSowmya
Sowmya
 
Week 4 grade_4
Week 4 grade_4Week 4 grade_4
Week 4 grade_4
 

En vedette

Közpénzek, szélessávú hálózatok és digitális stratégiák - EU perspektívából. ...
Közpénzek, szélessávú hálózatok és digitális stratégiák - EU perspektívából. ...Közpénzek, szélessávú hálózatok és digitális stratégiák - EU perspektívából. ...
Közpénzek, szélessávú hálózatok és digitális stratégiák - EU perspektívából. ...gaalnorb
 
Tecla News - Fevereiro/2010
Tecla News - Fevereiro/2010Tecla News - Fevereiro/2010
Tecla News - Fevereiro/2010Tecla Internet
 
Stupid Things In Product Management
Stupid Things In Product ManagementStupid Things In Product Management
Stupid Things In Product ManagementJon Gatrell
 
historia del internet
historia del internethistoria del internet
historia del internetdaniel sport
 
Clipping Tecla O Globo JAN 2011
Clipping Tecla O Globo JAN 2011Clipping Tecla O Globo JAN 2011
Clipping Tecla O Globo JAN 2011Tecla Internet
 

En vedette (6)

Közpénzek, szélessávú hálózatok és digitális stratégiák - EU perspektívából. ...
Közpénzek, szélessávú hálózatok és digitális stratégiák - EU perspektívából. ...Közpénzek, szélessávú hálózatok és digitális stratégiák - EU perspektívából. ...
Közpénzek, szélessávú hálózatok és digitális stratégiák - EU perspektívából. ...
 
Evolution of end-to-end: why the Internet is not like any other network
Evolution of end-to-end: why the Internet is not like any other networkEvolution of end-to-end: why the Internet is not like any other network
Evolution of end-to-end: why the Internet is not like any other network
 
Tecla News - Fevereiro/2010
Tecla News - Fevereiro/2010Tecla News - Fevereiro/2010
Tecla News - Fevereiro/2010
 
Stupid Things In Product Management
Stupid Things In Product ManagementStupid Things In Product Management
Stupid Things In Product Management
 
historia del internet
historia del internethistoria del internet
historia del internet
 
Clipping Tecla O Globo JAN 2011
Clipping Tecla O Globo JAN 2011Clipping Tecla O Globo JAN 2011
Clipping Tecla O Globo JAN 2011
 

Similaire à Internet Safety Final Copy

Lets fight the self-appointed Spam Lords
Lets fight the self-appointed Spam LordsLets fight the self-appointed Spam Lords
Lets fight the self-appointed Spam Lordsjgnetworks
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSedrianrheine
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesMark Jhon Oxillo
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
Features Of The Internet
Features Of The InternetFeatures Of The Internet
Features Of The Internetkimromero
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Finalguest5000f0a
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammerguest2e06031d
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammerguest2e06031d
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is DangerousGihan Dias
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSlesteraporado16
 
Symptoms of aol and remove
Symptoms of aol and removeSymptoms of aol and remove
Symptoms of aol and removejreidmichele
 
Spamming Ict
Spamming   IctSpamming   Ict
Spamming Ictsiewying
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of NetiquetteRochelle Nato
 

Similaire à Internet Safety Final Copy (20)

Spam
SpamSpam
Spam
 
What Is Spam
What Is SpamWhat Is Spam
What Is Spam
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Lets fight the self-appointed Spam Lords
Lets fight the self-appointed Spam LordsLets fight the self-appointed Spam Lords
Lets fight the self-appointed Spam Lords
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Features Of The Internet
Features Of The InternetFeatures Of The Internet
Features Of The Internet
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammer
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammer
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
Avoiding email viruses
Avoiding email virusesAvoiding email viruses
Avoiding email viruses
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
 
Symptoms of aol and remove
Symptoms of aol and removeSymptoms of aol and remove
Symptoms of aol and remove
 
Spam!
Spam!Spam!
Spam!
 
Spamming Ict
Spamming   IctSpamming   Ict
Spamming Ict
 
email_
email_email_
email_
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
 

Dernier

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Dernier (20)

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

Internet Safety Final Copy

  • 1. Internet Safety All images from Microsoft Office Clip Art/Office Online
  • 2. Chatting & Chat Rooms An online chat is when to you talk to someone through a social networking site or program using your keyboard on the worldwide web (internet). Some examples of these are Facebook, AIM and Skype. Many e-mail websites such as Yahoo!, Google, and MSN have added free chat features to your e-mail account.
  • 3. Benefits, Downfalls & Risks to Chat Rooms
  • 4. Spam Spam is junk email that usually comes in the form of advertisements. It can also be an email from someone you don’t know. Spam is a big problem because it can mess up someone’s computer and bring in viruses. If you receive spam immediately delete it. Opening it can cause your computer major problems. You can also report this sender. If you get an email with an attachment from someone you don’t know, just ignore it. DON’T OPEN IT! The attachment could carry a virus.
  • 5. Spam How to control spam: Control your filter of incoming emails. Another way is to report the spam to the spammer’s ISP. One other way is to just ignore it.
  • 7. Surfer Dude Internet is a big group of connected computer networks that go around the globe It is use for a way to communicate and to find out information www means World Wide Web