SlideShare a Scribd company logo
1 of 16
Staying Safe on the Internet
We LOVE the Internet!
    The internet is an amazing place! You probably use it most days at College to
     research work and at home, on your PC or phone just to have fun.

    When you imagine how many billions of people are using the Internet at any one
     time, then overall it is actually a pretty safe place. However, as with anything
     so good, there are bound to be a few things that are not so positive.

    The Internet and particularly Social Media do have a few pitfalls and you
     need to be aware of them in order to use it confidently and safely

    Email
    Websites
    Search Engines
    Moodle
    Social Media
We really LOVE Social Media!

  http://www.facebook.com/?sk=welcome#!/BurnleyCollegeALevels
How safe are you?
               Watch ‘Claire Thought She Knew’
          http://www.youtube.com/watch?v=Z5WEnqnq1Hk




    http://www.youtube.com/watch?v=qoEG7R5Len0

    http://old.digizen.org/cyberbullying/fullFilm.aspx
Have you ever….?
The A-Z(ish!) Quiz of Net Safety
A

     What A can be sent via email that could
      contain a virus?
     What A is a computer program that
      displays adverts on your computer
      screen, often installed without you
      realising?
     What A is software you should install on
      your computer before surfing the
      internet?
B

     What B should you do to anyone who
      adds you on messenger sites that you do
      not know?
     What B is a Social Networking site that
      used to be popular with teens, but has
      since lost many users to facebook?
     What B is short for weblog?
C
     What C is a place on the internet where you
      can communicate to lots of people or private
      message other users?
     What C involves the use of information and
      communication technologies to support
      deliberate, repeated, and hostile behaviour by
      an individual or group that is intended to harm
      others?
     What C is a small file that is sent to a web
      browser and stored on a user’s computer?
      These files can then be read by a server to
      remember preferences or personal details.
F

     What F is a popular social networking website
      with over 800 million registered (not
      necessarily active!) users worldwide?
     What F is a means of preventing certain types
      of material reaching your computer?
     What F is a program that checks all data
      passing between your computer and the
      internet to see if it is safe and permitted?
G & M!

    What G is the term used to describe when an adult encourages a
     youngster to meet up with them; this is often done in chat rooms?
    What G is the email service provided by a popular search
     engine?

    What M is the name for bad software like viruses, spyware etc.?
    What M is the official name of a service like Yahoo or MSN used
     to chat online?
    What M is the name of the act of supervising what goes on in a
     chatroom or other online service?
    What M is the name of a social networking site that lost popularity
     to Facebook and that Justin Timberlake recently purchased a
     stake in?
P
       What P is the name of the settings you should always
        update when on Social Networking websites?
       What P is often four digits and used to confirm
        identity, particularly at ATM machines?
       What P is a series of letters, numbers and/or symbols
        that only you should know that is used to confirm your
        identity?
       What P is an attempt to trick people into visiting
        malicious websites in order to steal personal
        information/details often via pretend emails from
        banks?
S
     What S is the name given to the act of using
      the internet to find and make friends and stay
      in touch with people?
     What S are people you do not know that you
      should not add on Social Network sites and
      Messenger services?
     What S is a program that lets you make
      phones over the internet? You can talk to
      other users of this program for free or pay to
      call ordinary telephones.
T & V!
  What T is a method of sending short messages from
   one mobile phone to another – sometimes referred to
   as SMS?
  What T is a malware program that is not what it seems
   to be? These pretend to be useful programs like word
   processors but really they install spyware or open up
   your computer to hackers?
  What V can infect your computer by deleting your
   files, stealing your data or even let hackers take
   control of your hardware?
  What V is the term used to describe a video that gets
   popular simply through internet sharing?
For more information…

 http://ceop.police.uk/

 http://www.thinkuknow.co.uk/

 http://www.youtube.com/watch?v=qoEG7R5Len0

 http://old.digizen.org/cyberbullying/fullFilm.aspx
Finally…


 If you are being bullied online by
      anyone in College, speak to
     your tutor immediately. For
   YOUR safety, online bullying is
   taken VERY seriously, and can
   lead to suspension or expulsion
             from College.

More Related Content

What's hot

Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018KanelandSvihlik
 
Becybersmart
BecybersmartBecybersmart
BecybersmartVelma
 
Mark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers
 
Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devicesErnest Staats
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety SlideshareLawrence Fine
 
Cat and Mouse: A Student's Guide to Evading Parents, Teachers, and Authoritat...
Cat and Mouse: A Student's Guide to Evading Parents, Teachers, and Authoritat...Cat and Mouse: A Student's Guide to Evading Parents, Teachers, and Authoritat...
Cat and Mouse: A Student's Guide to Evading Parents, Teachers, and Authoritat...Mitch Spaulding
 
Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017KanelandSvihlik
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareNurizcka
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentationCandice Wimbles
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parentssafetyseminar
 
Lower School Social Media: Session #1
Lower School Social Media: Session #1Lower School Social Media: Session #1
Lower School Social Media: Session #1meganhowardatwalker
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of NetiquetteRochelle Nato
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint bgmartinez1971
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquetterowenick
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guidemjtheman
 
Cybersafety
CybersafetyCybersafety
Cybersafetyf3tm3
 
Rules of netiquette & cyber crimes
Rules of netiquette & cyber crimesRules of netiquette & cyber crimes
Rules of netiquette & cyber crimesmarkgernale24
 

What's hot (20)

Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018
 
Chatter
ChatterChatter
Chatter
 
Becybersmart
BecybersmartBecybersmart
Becybersmart
 
Mark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers' Social Network Presentation
Mark Rogers' Social Network Presentation
 
Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devices
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
Cat and Mouse: A Student's Guide to Evading Parents, Teachers, and Authoritat...
Cat and Mouse: A Student's Guide to Evading Parents, Teachers, and Authoritat...Cat and Mouse: A Student's Guide to Evading Parents, Teachers, and Authoritat...
Cat and Mouse: A Student's Guide to Evading Parents, Teachers, and Authoritat...
 
Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parents
 
Lower School Social Media: Session #1
Lower School Social Media: Session #1Lower School Social Media: Session #1
Lower School Social Media: Session #1
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Internet safety for kids
Internet safety for kidsInternet safety for kids
Internet safety for kids
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
 
Cybersafety
CybersafetyCybersafety
Cybersafety
 
Rules of netiquette & cyber crimes
Rules of netiquette & cyber crimesRules of netiquette & cyber crimes
Rules of netiquette & cyber crimes
 

Viewers also liked

Presentació "Entenent la xina actual a través del comportament dels nous cons...
Presentació "Entenent la xina actual a través del comportament dels nous cons...Presentació "Entenent la xina actual a través del comportament dels nous cons...
Presentació "Entenent la xina actual a través del comportament dels nous cons...Roger Nierga
 
Principales conclusiones de la mesa redonda "El fenómeno de las redes sociale...
Principales conclusiones de la mesa redonda "El fenómeno de las redes sociale...Principales conclusiones de la mesa redonda "El fenómeno de las redes sociale...
Principales conclusiones de la mesa redonda "El fenómeno de las redes sociale...Roger Nierga
 
¡El momento de emprendedores es Hoy!
¡El momento de emprendedores es Hoy!¡El momento de emprendedores es Hoy!
¡El momento de emprendedores es Hoy!Fábrica Multimedia
 
Xiii congreso i mega encuentro estetica ecuador cv
Xiii congreso i mega encuentro estetica ecuador cvXiii congreso i mega encuentro estetica ecuador cv
Xiii congreso i mega encuentro estetica ecuador cvHenry Villavicencio
 
Idol databases2
Idol databases2Idol databases2
Idol databases2Kieffala
 
Blackboard basics Hanning
Blackboard basics HanningBlackboard basics Hanning
Blackboard basics HanningKieffala
 

Viewers also liked (7)

Presentació "Entenent la xina actual a través del comportament dels nous cons...
Presentació "Entenent la xina actual a través del comportament dels nous cons...Presentació "Entenent la xina actual a través del comportament dels nous cons...
Presentació "Entenent la xina actual a través del comportament dels nous cons...
 
Junta batiente dubló
Junta batiente dublóJunta batiente dubló
Junta batiente dubló
 
Principales conclusiones de la mesa redonda "El fenómeno de las redes sociale...
Principales conclusiones de la mesa redonda "El fenómeno de las redes sociale...Principales conclusiones de la mesa redonda "El fenómeno de las redes sociale...
Principales conclusiones de la mesa redonda "El fenómeno de las redes sociale...
 
¡El momento de emprendedores es Hoy!
¡El momento de emprendedores es Hoy!¡El momento de emprendedores es Hoy!
¡El momento de emprendedores es Hoy!
 
Xiii congreso i mega encuentro estetica ecuador cv
Xiii congreso i mega encuentro estetica ecuador cvXiii congreso i mega encuentro estetica ecuador cv
Xiii congreso i mega encuentro estetica ecuador cv
 
Idol databases2
Idol databases2Idol databases2
Idol databases2
 
Blackboard basics Hanning
Blackboard basics HanningBlackboard basics Hanning
Blackboard basics Hanning
 

Similar to Using the Internet Safely

Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your DesktopAndy Smith
 
Empowerment lesson 2.ppt
Empowerment lesson 2.pptEmpowerment lesson 2.ppt
Empowerment lesson 2.pptAndrew_Braza
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminartholman77
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your DesktopAndy Smith
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
Facebook for Parents
Facebook for ParentsFacebook for Parents
Facebook for Parentsamelialouise
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Childcpitchford
 
Parent engagement cvps
Parent engagement cvpsParent engagement cvps
Parent engagement cvpsjeygenraam
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threatsmkinzie
 
The use of internet web 120
The use of internet web 120The use of internet web 120
The use of internet web 120jram2113
 
Evans on Being Smart with Social Media
Evans on Being Smart with Social MediaEvans on Being Smart with Social Media
Evans on Being Smart with Social MediaDr. Joel Evans
 

Similar to Using the Internet Safely (20)

Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your Desktop
 
Empowerment lesson 2.ppt
Empowerment lesson 2.pptEmpowerment lesson 2.ppt
Empowerment lesson 2.ppt
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
 
EMPOWERMENT.pptx
EMPOWERMENT.pptxEMPOWERMENT.pptx
EMPOWERMENT.pptx
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your Desktop
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
 
Tot edu eng.
Tot edu eng.Tot edu eng.
Tot edu eng.
 
INTERNET
INTERNETINTERNET
INTERNET
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Facebook for Parents
Facebook for ParentsFacebook for Parents
Facebook for Parents
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
 
Hamad Rabban.It
Hamad Rabban.ItHamad Rabban.It
Hamad Rabban.It
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
 
Digital Citizenship Flash Card Deck - A Platform for Good
Digital Citizenship Flash Card Deck - A Platform for GoodDigital Citizenship Flash Card Deck - A Platform for Good
Digital Citizenship Flash Card Deck - A Platform for Good
 
Internet Safety - Parents
Internet Safety - ParentsInternet Safety - Parents
Internet Safety - Parents
 
Internet safty
Internet saftyInternet safty
Internet safty
 
Parent engagement cvps
Parent engagement cvpsParent engagement cvps
Parent engagement cvps
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
The use of internet web 120
The use of internet web 120The use of internet web 120
The use of internet web 120
 
Evans on Being Smart with Social Media
Evans on Being Smart with Social MediaEvans on Being Smart with Social Media
Evans on Being Smart with Social Media
 

Recently uploaded

Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 

Recently uploaded (20)

Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 

Using the Internet Safely

  • 1. Staying Safe on the Internet
  • 2. We LOVE the Internet!  The internet is an amazing place! You probably use it most days at College to research work and at home, on your PC or phone just to have fun.  When you imagine how many billions of people are using the Internet at any one time, then overall it is actually a pretty safe place. However, as with anything so good, there are bound to be a few things that are not so positive.  The Internet and particularly Social Media do have a few pitfalls and you need to be aware of them in order to use it confidently and safely  Email  Websites  Search Engines  Moodle  Social Media
  • 3. We really LOVE Social Media! http://www.facebook.com/?sk=welcome#!/BurnleyCollegeALevels
  • 4. How safe are you? Watch ‘Claire Thought She Knew’ http://www.youtube.com/watch?v=Z5WEnqnq1Hk http://www.youtube.com/watch?v=qoEG7R5Len0 http://old.digizen.org/cyberbullying/fullFilm.aspx
  • 6. The A-Z(ish!) Quiz of Net Safety
  • 7. A  What A can be sent via email that could contain a virus?  What A is a computer program that displays adverts on your computer screen, often installed without you realising?  What A is software you should install on your computer before surfing the internet?
  • 8. B  What B should you do to anyone who adds you on messenger sites that you do not know?  What B is a Social Networking site that used to be popular with teens, but has since lost many users to facebook?  What B is short for weblog?
  • 9. C  What C is a place on the internet where you can communicate to lots of people or private message other users?  What C involves the use of information and communication technologies to support deliberate, repeated, and hostile behaviour by an individual or group that is intended to harm others?  What C is a small file that is sent to a web browser and stored on a user’s computer? These files can then be read by a server to remember preferences or personal details.
  • 10. F  What F is a popular social networking website with over 800 million registered (not necessarily active!) users worldwide?  What F is a means of preventing certain types of material reaching your computer?  What F is a program that checks all data passing between your computer and the internet to see if it is safe and permitted?
  • 11. G & M!  What G is the term used to describe when an adult encourages a youngster to meet up with them; this is often done in chat rooms?  What G is the email service provided by a popular search engine?  What M is the name for bad software like viruses, spyware etc.?  What M is the official name of a service like Yahoo or MSN used to chat online?  What M is the name of the act of supervising what goes on in a chatroom or other online service?  What M is the name of a social networking site that lost popularity to Facebook and that Justin Timberlake recently purchased a stake in?
  • 12. P  What P is the name of the settings you should always update when on Social Networking websites?  What P is often four digits and used to confirm identity, particularly at ATM machines?  What P is a series of letters, numbers and/or symbols that only you should know that is used to confirm your identity?  What P is an attempt to trick people into visiting malicious websites in order to steal personal information/details often via pretend emails from banks?
  • 13. S  What S is the name given to the act of using the internet to find and make friends and stay in touch with people?  What S are people you do not know that you should not add on Social Network sites and Messenger services?  What S is a program that lets you make phones over the internet? You can talk to other users of this program for free or pay to call ordinary telephones.
  • 14. T & V!  What T is a method of sending short messages from one mobile phone to another – sometimes referred to as SMS?  What T is a malware program that is not what it seems to be? These pretend to be useful programs like word processors but really they install spyware or open up your computer to hackers?  What V can infect your computer by deleting your files, stealing your data or even let hackers take control of your hardware?  What V is the term used to describe a video that gets popular simply through internet sharing?
  • 15. For more information… http://ceop.police.uk/ http://www.thinkuknow.co.uk/ http://www.youtube.com/watch?v=qoEG7R5Len0 http://old.digizen.org/cyberbullying/fullFilm.aspx
  • 16. Finally… If you are being bullied online by anyone in College, speak to your tutor immediately. For YOUR safety, online bullying is taken VERY seriously, and can lead to suspension or expulsion from College.