SlideShare une entreprise Scribd logo
1  sur  20
The Greek Hotline against illegal Internet Content Meltini Christodoulaki Communication Liaison meltini@ safeline.gr
SafeLine,  www.safeline.gr ,[object Object],[object Object],[object Object]
ΙΝΗΟΡΕ , www.inhope.org ,[object Object],[object Object]
Illegal Content ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Report submi ss ion ,[object Object],[object Object],[object Object],[object Object]
 
 
 
Handling of Reports ,[object Object],[object Object]
Collaboration with the Greek Police ,[object Object],[object Object]
Collaboration with other Greek authorities ,[object Object],[object Object]
Content hosted abroad ,[object Object],[object Object]
The number of reports is continuously increasing!
Illegal Content
SNSs
What else can I find on SafeLine’s webpage?  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Saferinternet, www.saferinternet.gr ,[object Object]
 
Contributing Partners ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]

Contenu connexe

Tendances

Mo fa effective use of ict tools-05-01-2015
Mo fa effective use of ict tools-05-01-2015Mo fa effective use of ict tools-05-01-2015
Mo fa effective use of ict tools-05-01-2015Mwiza Helen
 
Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012armaexen
 
Freedom of expression & censorship in thailand
Freedom of expression & censorship in thailandFreedom of expression & censorship in thailand
Freedom of expression & censorship in thailandgcanavati
 
Cybercrime in Lithuania (2011)
Cybercrime in Lithuania (2011)Cybercrime in Lithuania (2011)
Cybercrime in Lithuania (2011)Mindaugas Kiskis
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippinesian_oguis
 
Cyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButTCyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButTHamza Khalid
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and lawsAjnish Rana
 
Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-finalAldrin SuperGo
 

Tendances (11)

Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Mo fa effective use of ict tools-05-01-2015
Mo fa effective use of ict tools-05-01-2015Mo fa effective use of ict tools-05-01-2015
Mo fa effective use of ict tools-05-01-2015
 
Law of-cybercrime
Law of-cybercrimeLaw of-cybercrime
Law of-cybercrime
 
Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012
 
Freedom of expression & censorship in thailand
Freedom of expression & censorship in thailandFreedom of expression & censorship in thailand
Freedom of expression & censorship in thailand
 
Assignment 1
Assignment 1Assignment 1
Assignment 1
 
Cybercrime in Lithuania (2011)
Cybercrime in Lithuania (2011)Cybercrime in Lithuania (2011)
Cybercrime in Lithuania (2011)
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
 
Cyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButTCyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButT
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-final
 

En vedette

Ist Intermational Congress Children In ICT
Ist Intermational Congress Children In ICTIst Intermational Congress Children In ICT
Ist Intermational Congress Children In ICTCTIC Technology Centre
 
GRACIAS a todas nuestras entidades colaboradoras
GRACIAS a todas nuestras entidades colaboradorasGRACIAS a todas nuestras entidades colaboradoras
GRACIAS a todas nuestras entidades colaboradorasCTIC Technology Centre
 
Young People and Internet Literacy and Safety
Young People and Internet Literacy and SafetyYoung People and Internet Literacy and Safety
Young People and Internet Literacy and SafetyCTIC Technology Centre
 
ICT and young people... the road ahead
ICT and young people... the road aheadICT and young people... the road ahead
ICT and young people... the road aheadCTIC Technology Centre
 
Music Origins Project Educational Overview
Music Origins Project Educational OverviewMusic Origins Project Educational Overview
Music Origins Project Educational OverviewDavid Grandison Jr
 
11 1 asiria general
11 1 asiria general11 1 asiria general
11 1 asiria generalJOSE ARIAS
 
How and When to Pivot - Lean Startup Principles Applied
How and When to Pivot  - Lean Startup Principles AppliedHow and When to Pivot  - Lean Startup Principles Applied
How and When to Pivot - Lean Startup Principles AppliedDavid Binetti
 
Digital Backpacks, Pockets and Purses... New Access, Risks, and Approaches...
Digital Backpacks, Pockets and Purses... New Access, Risks, and Approaches...Digital Backpacks, Pockets and Purses... New Access, Risks, and Approaches...
Digital Backpacks, Pockets and Purses... New Access, Risks, and Approaches...CTIC Technology Centre
 
Recursos temáticas en la web 2.0
Recursos temáticas en la web 2.0Recursos temáticas en la web 2.0
Recursos temáticas en la web 2.0Mellember
 

En vedette (19)

Ist Intermational Congress Children In ICT
Ist Intermational Congress Children In ICTIst Intermational Congress Children In ICT
Ist Intermational Congress Children In ICT
 
WebGUI Developers Workshop
WebGUI Developers WorkshopWebGUI Developers Workshop
WebGUI Developers Workshop
 
01. menorestic2010 richardson
01. menorestic2010 richardson01. menorestic2010 richardson
01. menorestic2010 richardson
 
The NICAM approach
The NICAM approachThe NICAM approach
The NICAM approach
 
1st Congress Speech Final
1st Congress Speech Final1st Congress Speech Final
1st Congress Speech Final
 
GRACIAS a todas nuestras entidades colaboradoras
GRACIAS a todas nuestras entidades colaboradorasGRACIAS a todas nuestras entidades colaboradoras
GRACIAS a todas nuestras entidades colaboradoras
 
Youth Privacy
Youth PrivacyYouth Privacy
Youth Privacy
 
The NICAM approach
The NICAM approachThe NICAM approach
The NICAM approach
 
Young People and Internet Literacy and Safety
Young People and Internet Literacy and SafetyYoung People and Internet Literacy and Safety
Young People and Internet Literacy and Safety
 
Children Online Protection
Children Online ProtectionChildren Online Protection
Children Online Protection
 
ICT and young people... the road ahead
ICT and young people... the road aheadICT and young people... the road ahead
ICT and young people... the road ahead
 
La Generación i
La Generación iLa Generación i
La Generación i
 
Music Origins Project Educational Overview
Music Origins Project Educational OverviewMusic Origins Project Educational Overview
Music Origins Project Educational Overview
 
11 1 asiria general
11 1 asiria general11 1 asiria general
11 1 asiria general
 
How and When to Pivot - Lean Startup Principles Applied
How and When to Pivot  - Lean Startup Principles AppliedHow and When to Pivot  - Lean Startup Principles Applied
How and When to Pivot - Lean Startup Principles Applied
 
Agnieszka Wrzesien
Agnieszka WrzesienAgnieszka Wrzesien
Agnieszka Wrzesien
 
Startup Case Study
Startup Case StudyStartup Case Study
Startup Case Study
 
Digital Backpacks, Pockets and Purses... New Access, Risks, and Approaches...
Digital Backpacks, Pockets and Purses... New Access, Risks, and Approaches...Digital Backpacks, Pockets and Purses... New Access, Risks, and Approaches...
Digital Backpacks, Pockets and Purses... New Access, Risks, and Approaches...
 
Recursos temáticas en la web 2.0
Recursos temáticas en la web 2.0Recursos temáticas en la web 2.0
Recursos temáticas en la web 2.0
 

Similaire à SafeLine: towards a safer Internet

ahmadsofiang20stcfinal-220308055846 (1).pptx
ahmadsofiang20stcfinal-220308055846 (1).pptxahmadsofiang20stcfinal-220308055846 (1).pptx
ahmadsofiang20stcfinal-220308055846 (1).pptxchiragcdbc92
 
C20 - CHILD PROTECTION ONLINE
C20 - CHILD PROTECTION ONLINEC20 - CHILD PROTECTION ONLINE
C20 - CHILD PROTECTION ONLINEECPAT Indonesia
 
Analyzing the influence of information and communication technology on the sc...
Analyzing the influence of information and communication technology on the sc...Analyzing the influence of information and communication technology on the sc...
Analyzing the influence of information and communication technology on the sc...JohnGacinya
 
Analyzing the influence of Information and communication Technology on the sc...
Analyzing the influence of Information and communication Technology on the sc...Analyzing the influence of Information and communication Technology on the sc...
Analyzing the influence of Information and communication Technology on the sc...JohnGacinya
 
Power and Leverage in the XXI Century
Power and Leverage in the XXI CenturyPower and Leverage in the XXI Century
Power and Leverage in the XXI CenturyJyrki Kasvi
 
CTO-Cybersecurity-Forum-2010-Cristina Buetti
CTO-Cybersecurity-Forum-2010-Cristina BuettiCTO-Cybersecurity-Forum-2010-Cristina Buetti
CTO-Cybersecurity-Forum-2010-Cristina Buettisegughana
 
Tomasz Czajkowski
Tomasz CzajkowskiTomasz Czajkowski
Tomasz Czajkowskisegughana
 
Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues Fahad Saleem
 
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptxRAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptxRahuljain40418
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxOlusegun Mosugu
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwkamalbhatt9229
 
Projektfuzet angol-web
Projektfuzet angol-webProjektfuzet angol-web
Projektfuzet angol-webOmbodi Gábor
 

Similaire à SafeLine: towards a safer Internet (20)

ahmadsofiang20stcfinal-220308055846 (1).pptx
ahmadsofiang20stcfinal-220308055846 (1).pptxahmadsofiang20stcfinal-220308055846 (1).pptx
ahmadsofiang20stcfinal-220308055846 (1).pptx
 
C20 - CHILD PROTECTION ONLINE
C20 - CHILD PROTECTION ONLINEC20 - CHILD PROTECTION ONLINE
C20 - CHILD PROTECTION ONLINE
 
Child protection system in ict of thailand
Child protection system in ict of thailandChild protection system in ict of thailand
Child protection system in ict of thailand
 
Child protection system in ict of thailand
Child protection system in ict of thailandChild protection system in ict of thailand
Child protection system in ict of thailand
 
Analyzing the influence of information and communication technology on the sc...
Analyzing the influence of information and communication technology on the sc...Analyzing the influence of information and communication technology on the sc...
Analyzing the influence of information and communication technology on the sc...
 
Analyzing the influence of Information and communication Technology on the sc...
Analyzing the influence of Information and communication Technology on the sc...Analyzing the influence of Information and communication Technology on the sc...
Analyzing the influence of Information and communication Technology on the sc...
 
Power and Leverage in the XXI Century
Power and Leverage in the XXI CenturyPower and Leverage in the XXI Century
Power and Leverage in the XXI Century
 
Cyber security
Cyber securityCyber security
Cyber security
 
CTO-Cybersecurity-Forum-2010-Cristina Buetti
CTO-Cybersecurity-Forum-2010-Cristina BuettiCTO-Cybersecurity-Forum-2010-Cristina Buetti
CTO-Cybersecurity-Forum-2010-Cristina Buetti
 
Child Focus - Prevention of sexual abuse: vision and practices
Child Focus - Prevention of sexual abuse: vision and practicesChild Focus - Prevention of sexual abuse: vision and practices
Child Focus - Prevention of sexual abuse: vision and practices
 
Tomasz Czajkowski
Tomasz CzajkowskiTomasz Czajkowski
Tomasz Czajkowski
 
Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues
 
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptxRAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptx
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Projektfuzet angol-web
Projektfuzet angol-webProjektfuzet angol-web
Projektfuzet angol-web
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
European Cyber Crime Centre EC3
European Cyber Crime Centre EC3European Cyber Crime Centre EC3
European Cyber Crime Centre EC3
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Plus de CTIC Technology Centre

Estudio tecnologias cientificos futuro
Estudio tecnologias cientificos futuroEstudio tecnologias cientificos futuro
Estudio tecnologias cientificos futuroCTIC Technology Centre
 
Identidad digital, datos personales y redes sociales
Identidad digital, datos personales y redes socialesIdentidad digital, datos personales y redes sociales
Identidad digital, datos personales y redes socialesCTIC Technology Centre
 
Experiencias integrales de introducción de las TIC en el aula y el hogar. (Fe...
Experiencias integrales de introducción de las TIC en el aula y el hogar. (Fe...Experiencias integrales de introducción de las TIC en el aula y el hogar. (Fe...
Experiencias integrales de introducción de las TIC en el aula y el hogar. (Fe...CTIC Technology Centre
 
Radiografía de Riesgos (Informática64)
Radiografía de Riesgos (Informática64)Radiografía de Riesgos (Informática64)
Radiografía de Riesgos (Informática64)CTIC Technology Centre
 
Contribuyendo a la ciudadanía digital: el rol de la industria
Contribuyendo a la ciudadanía digital: el rol de la industriaContribuyendo a la ciudadanía digital: el rol de la industria
Contribuyendo a la ciudadanía digital: el rol de la industriaCTIC Technology Centre
 
Por un uso seguro y responsable de las TIC en Canarias
Por un uso seguro y responsable de las TIC en CanariasPor un uso seguro y responsable de las TIC en Canarias
Por un uso seguro y responsable de las TIC en CanariasCTIC Technology Centre
 
Las TIC y la Seguridad en la Comunidad Educativa: Producciones didácticas
Las TIC y la Seguridad en la Comunidad Educativa: Producciones didácticasLas TIC y la Seguridad en la Comunidad Educativa: Producciones didácticas
Las TIC y la Seguridad en la Comunidad Educativa: Producciones didácticasCTIC Technology Centre
 

Plus de CTIC Technology Centre (20)

Estudio tecnologias cientificos futuro
Estudio tecnologias cientificos futuroEstudio tecnologias cientificos futuro
Estudio tecnologias cientificos futuro
 
Comunidad de aprendizaje
Comunidad de aprendizajeComunidad de aprendizaje
Comunidad de aprendizaje
 
Escuela 2.0
Escuela 2.0Escuela 2.0
Escuela 2.0
 
Aprender a comunicar en la red
Aprender a comunicar en la redAprender a comunicar en la red
Aprender a comunicar en la red
 
Corresponsabilidad
CorresponsabilidadCorresponsabilidad
Corresponsabilidad
 
Educar Comunicando
Educar ComunicandoEducar Comunicando
Educar Comunicando
 
Identidad digital, datos personales y redes sociales
Identidad digital, datos personales y redes socialesIdentidad digital, datos personales y redes sociales
Identidad digital, datos personales y redes sociales
 
Habbo
HabboHabbo
Habbo
 
Privacidad en Tuenti
Privacidad en TuentiPrivacidad en Tuenti
Privacidad en Tuenti
 
Inclusión digital en el aula
Inclusión digital en el aulaInclusión digital en el aula
Inclusión digital en el aula
 
Experiencias integrales de introducción de las TIC en el aula y el hogar. (Fe...
Experiencias integrales de introducción de las TIC en el aula y el hogar. (Fe...Experiencias integrales de introducción de las TIC en el aula y el hogar. (Fe...
Experiencias integrales de introducción de las TIC en el aula y el hogar. (Fe...
 
05. identidad digitalmenorestic (1)
05. identidad digitalmenorestic (1)05. identidad digitalmenorestic (1)
05. identidad digitalmenorestic (1)
 
Radiografía de Riesgos (Informática64)
Radiografía de Riesgos (Informática64)Radiografía de Riesgos (Informática64)
Radiografía de Riesgos (Informática64)
 
Radiografía de Riesgos (Protégeles)
Radiografía de Riesgos (Protégeles)Radiografía de Riesgos (Protégeles)
Radiografía de Riesgos (Protégeles)
 
Radiografía de los riesgos.
Radiografía de los riesgos.Radiografía de los riesgos.
Radiografía de los riesgos.
 
Salud, cine y pantallas sanas
Salud, cine y pantallas sanasSalud, cine y pantallas sanas
Salud, cine y pantallas sanas
 
Salud, cine y pantallas sanas
Salud, cine y pantallas sanasSalud, cine y pantallas sanas
Salud, cine y pantallas sanas
 
Contribuyendo a la ciudadanía digital: el rol de la industria
Contribuyendo a la ciudadanía digital: el rol de la industriaContribuyendo a la ciudadanía digital: el rol de la industria
Contribuyendo a la ciudadanía digital: el rol de la industria
 
Por un uso seguro y responsable de las TIC en Canarias
Por un uso seguro y responsable de las TIC en CanariasPor un uso seguro y responsable de las TIC en Canarias
Por un uso seguro y responsable de las TIC en Canarias
 
Las TIC y la Seguridad en la Comunidad Educativa: Producciones didácticas
Las TIC y la Seguridad en la Comunidad Educativa: Producciones didácticasLas TIC y la Seguridad en la Comunidad Educativa: Producciones didácticas
Las TIC y la Seguridad en la Comunidad Educativa: Producciones didácticas
 

Dernier

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 

Dernier (20)

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 

SafeLine: towards a safer Internet