SlideShare une entreprise Scribd logo
1  sur  7
How To Be Safe
On Your Phone
What is a Phone?
A phone is modern day
terminology for a ‘mobile
cellular phone’. It is an object
capable of contacting other
phones via a wireless
connection. Some modern day
phones are capable of taking       Various ‘apps’

photographs, storing
information and having various
applications or ‘apps’.
Safety Whilst Using A Phone’s
              Camera
Taking photo’s of a friend or
colleague is fun. Especially when you
have caught them doing something
rather embarrassing. You may then be
tempted to post that image online as a
joke, but you must always check with
the person in the photo if they don’t
mind. Because once on the computer
it can be distributed around the
internet so that even once you’ve
taken the image down there could still   Always check before
be a copy out there.                     posting an image
What Is An IMEI Number?
IMEI stands for ‘International
Mobile Equipment Identity’. It
can be used to block you’re
phone if it is lost or stolen. This is
helpful as it means no one can
pretend to be you by spending
money online with saved credit           You can also find
                                         your IMEI number
card information or send                 on then inside of
                                         your phone as
messages to people pretending to         shown above
be you. To find your IMEI number
phone *#06#.
What Are Premium Rates?
A premium rate is a number
that starts with 09 and cost
between 10p and £1.50 per
minute (or even per text
                                  Example of a premium number.
message)! Always read the         This one charges £1.53 a minute.

small print when buying
something online in case you
have to pay extra. This could
result in a massive phone bill.
Virus’
Many people believe that you can
only get virus’ on your computer
but they are wrong as it is also
possible acquire virus’ on your
phone. This is not as terrifying as it
seems though as you can easily
protect your phone by placing
filters on your internet settings.
This will filter out all the images or
websites that are potentially
dangerous.                               A virus alert on a phone.
Cyber Bullying
Cyber bullying is a key
issue on mobiles. It affects
many children so if your
child affected by it make
sure they know the
following rules: never reply    Just because it happens on
to malicious text messages      a phone doesn’t make it
                                less hurtful
; always keep a record of
the messages and always
tell an adult. If they follow
these instructions they will
be ok.

Contenu connexe

Tendances

Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedSai Srinivas Mittapalli
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloningSALMAN SHAIKH
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning sorabh2312
 
Future of Mobile Authentication
Future of Mobile AuthenticationFuture of Mobile Authentication
Future of Mobile Authenticationderektop
 
Htc S730 English Manual
Htc S730 English ManualHtc S730 English Manual
Htc S730 English Manualguest47d6ff
 
Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarRitik Nagar
 
THE MOST SECURE MESSAGING APP (information security)
THE MOST SECURE MESSAGING APP (information security)THE MOST SECURE MESSAGING APP (information security)
THE MOST SECURE MESSAGING APP (information security)umang talpara
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloninghcls
 
How to find a violation on the mobile device?
How to find a violation on the mobile device?How to find a violation on the mobile device?
How to find a violation on the mobile device?Sphere Soc
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technologymaham4569
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technologyRhithu
 

Tendances (20)

Mobile cloning paper
Mobile cloning paperMobile cloning paper
Mobile cloning paper
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermented
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile phone-cloning
Mobile phone-cloningMobile phone-cloning
Mobile phone-cloning
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Mobile Phone Cloning
 Mobile Phone Cloning Mobile Phone Cloning
Mobile Phone Cloning
 
Future of Mobile Authentication
Future of Mobile AuthenticationFuture of Mobile Authentication
Future of Mobile Authentication
 
Mobile Phone Cloning
Mobile Phone CloningMobile Phone Cloning
Mobile Phone Cloning
 
Htc S730 English Manual
Htc S730 English ManualHtc S730 English Manual
Htc S730 English Manual
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik Nagar
 
THE MOST SECURE MESSAGING APP (information security)
THE MOST SECURE MESSAGING APP (information security)THE MOST SECURE MESSAGING APP (information security)
THE MOST SECURE MESSAGING APP (information security)
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
How to find a violation on the mobile device?
How to find a violation on the mobile device?How to find a violation on the mobile device?
How to find a violation on the mobile device?
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technology
 

En vedette

Thien duong tren trai dat
Thien duong tren trai datThien duong tren trai dat
Thien duong tren trai datMây Trắng
 
Ldp workbook - viet
Ldp   workbook - vietLdp   workbook - viet
Ldp workbook - vietMây Trắng
 
Group project
Group projectGroup project
Group projectShellnic
 
Cisco Security Agent - Theory, Practice, and Policy
Cisco Security Agent - Theory, Practice, and PolicyCisco Security Agent - Theory, Practice, and Policy
Cisco Security Agent - Theory, Practice, and PolicyMike Pruett
 
Posicionamiento en buscadores | Webinar Huelva Inteligente
Posicionamiento en buscadores | Webinar Huelva InteligentePosicionamiento en buscadores | Webinar Huelva Inteligente
Posicionamiento en buscadores | Webinar Huelva InteligenteSergio Redondo
 
FRSA Flash week ending 31 May
FRSA Flash week ending 31 MayFRSA Flash week ending 31 May
FRSA Flash week ending 31 MaySquadron FRSA
 
June 18 2012 family and mwr coming attractions[1]
June 18 2012 family and mwr coming attractions[1]June 18 2012 family and mwr coming attractions[1]
June 18 2012 family and mwr coming attractions[1]Squadron FRSA
 

En vedette (9)

PRO Plus 3PH
PRO Plus 3PHPRO Plus 3PH
PRO Plus 3PH
 
Noel2012
Noel2012Noel2012
Noel2012
 
Thien duong tren trai dat
Thien duong tren trai datThien duong tren trai dat
Thien duong tren trai dat
 
Ldp workbook - viet
Ldp   workbook - vietLdp   workbook - viet
Ldp workbook - viet
 
Group project
Group projectGroup project
Group project
 
Cisco Security Agent - Theory, Practice, and Policy
Cisco Security Agent - Theory, Practice, and PolicyCisco Security Agent - Theory, Practice, and Policy
Cisco Security Agent - Theory, Practice, and Policy
 
Posicionamiento en buscadores | Webinar Huelva Inteligente
Posicionamiento en buscadores | Webinar Huelva InteligentePosicionamiento en buscadores | Webinar Huelva Inteligente
Posicionamiento en buscadores | Webinar Huelva Inteligente
 
FRSA Flash week ending 31 May
FRSA Flash week ending 31 MayFRSA Flash week ending 31 May
FRSA Flash week ending 31 May
 
June 18 2012 family and mwr coming attractions[1]
June 18 2012 family and mwr coming attractions[1]June 18 2012 family and mwr coming attractions[1]
June 18 2012 family and mwr coming attractions[1]
 

Similaire à Phone Safety presentation

8 steps to smartphone security for android
8 steps to smartphone security for android8 steps to smartphone security for android
8 steps to smartphone security for androidiYogi
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World CupLookout
 
Protect smartphone from hackers
Protect smartphone from hackersProtect smartphone from hackers
Protect smartphone from hackersAndrew
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)RaniPatil11
 
Protecting yourself against debit card fraud
Protecting yourself against debit card fraudProtecting yourself against debit card fraud
Protecting yourself against debit card fraudkredx
 
Steps to Follow in Case of Phone Theft or Loss
Steps to Follow in Case of Phone Theft or LossSteps to Follow in Case of Phone Theft or Loss
Steps to Follow in Case of Phone Theft or LossWireless Solutions NY
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101Lookout
 
Digital Banking Fraud
Digital Banking FraudDigital Banking Fraud
Digital Banking FraudVictoria Cao
 
FNC Personal Protect Workshop
FNC Personal Protect WorkshopFNC Personal Protect Workshop
FNC Personal Protect Workshopforensicsnation
 
Rwanda - Smartphone Afavantages and Disadvantages.pptx
Rwanda - Smartphone Afavantages and Disadvantages.pptxRwanda - Smartphone Afavantages and Disadvantages.pptx
Rwanda - Smartphone Afavantages and Disadvantages.pptxBinyamMeles
 
10 Reasons to Choose Connect Safe Antivirus
10 Reasons to Choose Connect Safe Antivirus10 Reasons to Choose Connect Safe Antivirus
10 Reasons to Choose Connect Safe Antivirusconnectsafe
 
mobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptxmobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptxvrandmandora1
 
Mobile phone security advisory for parents
Mobile phone security advisory for parentsMobile phone security advisory for parents
Mobile phone security advisory for parentsbryan
 

Similaire à Phone Safety presentation (20)

Cell phone hacking
Cell phone hackingCell phone hacking
Cell phone hacking
 
Smartphone apps
Smartphone appsSmartphone apps
Smartphone apps
 
8 steps to smartphone security for android
8 steps to smartphone security for android8 steps to smartphone security for android
8 steps to smartphone security for android
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World Cup
 
Mobile phone security
Mobile phone securityMobile phone security
Mobile phone security
 
Mobile security
Mobile security Mobile security
Mobile security
 
Protect smartphone from hackers
Protect smartphone from hackersProtect smartphone from hackers
Protect smartphone from hackers
 
Fonegard
FonegardFonegard
Fonegard
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)
 
AMMU
AMMUAMMU
AMMU
 
Protecting yourself against debit card fraud
Protecting yourself against debit card fraudProtecting yourself against debit card fraud
Protecting yourself against debit card fraud
 
Steps to Follow in Case of Phone Theft or Loss
Steps to Follow in Case of Phone Theft or LossSteps to Follow in Case of Phone Theft or Loss
Steps to Follow in Case of Phone Theft or Loss
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
Digital Banking Fraud
Digital Banking FraudDigital Banking Fraud
Digital Banking Fraud
 
FNC Personal Protect Workshop
FNC Personal Protect WorkshopFNC Personal Protect Workshop
FNC Personal Protect Workshop
 
Rwanda - Smartphone Afavantages and Disadvantages.pptx
Rwanda - Smartphone Afavantages and Disadvantages.pptxRwanda - Smartphone Afavantages and Disadvantages.pptx
Rwanda - Smartphone Afavantages and Disadvantages.pptx
 
10 Reasons to Choose Connect Safe Antivirus
10 Reasons to Choose Connect Safe Antivirus10 Reasons to Choose Connect Safe Antivirus
10 Reasons to Choose Connect Safe Antivirus
 
Cloning. (4)
Cloning. (4)Cloning. (4)
Cloning. (4)
 
mobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptxmobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptx
 
Mobile phone security advisory for parents
Mobile phone security advisory for parentsMobile phone security advisory for parents
Mobile phone security advisory for parents
 

Dernier

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 

Dernier (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 

Phone Safety presentation

  • 1. How To Be Safe On Your Phone
  • 2. What is a Phone? A phone is modern day terminology for a ‘mobile cellular phone’. It is an object capable of contacting other phones via a wireless connection. Some modern day phones are capable of taking Various ‘apps’ photographs, storing information and having various applications or ‘apps’.
  • 3. Safety Whilst Using A Phone’s Camera Taking photo’s of a friend or colleague is fun. Especially when you have caught them doing something rather embarrassing. You may then be tempted to post that image online as a joke, but you must always check with the person in the photo if they don’t mind. Because once on the computer it can be distributed around the internet so that even once you’ve taken the image down there could still Always check before be a copy out there. posting an image
  • 4. What Is An IMEI Number? IMEI stands for ‘International Mobile Equipment Identity’. It can be used to block you’re phone if it is lost or stolen. This is helpful as it means no one can pretend to be you by spending money online with saved credit You can also find your IMEI number card information or send on then inside of your phone as messages to people pretending to shown above be you. To find your IMEI number phone *#06#.
  • 5. What Are Premium Rates? A premium rate is a number that starts with 09 and cost between 10p and £1.50 per minute (or even per text Example of a premium number. message)! Always read the This one charges £1.53 a minute. small print when buying something online in case you have to pay extra. This could result in a massive phone bill.
  • 6. Virus’ Many people believe that you can only get virus’ on your computer but they are wrong as it is also possible acquire virus’ on your phone. This is not as terrifying as it seems though as you can easily protect your phone by placing filters on your internet settings. This will filter out all the images or websites that are potentially dangerous. A virus alert on a phone.
  • 7. Cyber Bullying Cyber bullying is a key issue on mobiles. It affects many children so if your child affected by it make sure they know the following rules: never reply Just because it happens on to malicious text messages a phone doesn’t make it less hurtful ; always keep a record of the messages and always tell an adult. If they follow these instructions they will be ok.