Prepared by: Syahira Hazimah Sulaiman & Nooraishah Salleh.

Slides:



Advertisements
Similar presentations
Online Privacy A Module of the CYC Course – Personal Security
Advertisements

The B BB Bank Account of Life Please click for next action…
UNCONDITIONAL LOVE A story is told about a soldier who was finally coming home after having fought in Vietnam. He called his parents from San Francisco.
This is only.
Chapter 23.1 Use your Money Wisely
ITS NOT THE MONEY THAT MATTERS,ITS HOW YOU USE IT THAT DETERMINES ITS TRUE VALUE!
Digital Disasters Laura M Cyberbulling Digital Reputation Identity Theft Offensive or Illegal Content Sexting Unwanted Contact.
What is it? The use of phones or the internet to deliberately upset someone else.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
The Dangers of Identity Theft By: Hannah Wolin 7 th Grade Marshall Middle School Anderson.
 Identity theft is the taking of one’s personal information and using it for yourself. Usually for illegal reasons. Though its all illegal if you even.
You can socialise with the internet by using websites such as Facebook, twitter and MySpace. The good things about this is that you can talk to your friends.
JEM IS SCOUT’S BROTHER WHO LIKES TO SPEND TIME WITH HIS SISTER. HE LIKES TO HAVE FUN AND NEVER BACKS DOWN FROM ANYTHING. SOMETIMES HE SEPARATES HIMSELF.
15/05/ The joke that brings you luck! Copyright © Dale Carnegie & Associates, Inc.
What do I need to know?.   Instant Messages  Social Networking.
Checking Account Debit Card Safety Tips card-safety-10-tips.htm October.
Theme. Think about the last story you read and ask yourself these questions: 1. What was the story about? 2. Did the main character learn something? 3.
Created by Mr. Hemmert.  Have you ever received a mean or instant message? Have you ever sent one? This is called cyberbullying. A cyberbully uses.
Money saving tips for teens. 1. Plan Ahead Look at your future and decide what you have to do now. Plan your purchases, don’t make impulse buying decisions.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
L.Obj: to choose a best Mobile Phone deal.. How Much do you use your Mobile Phone? There are lots of ways that you use your Mobile that costs you money.
Social effect: Facebook is a site available to anyone. Many people use it in order to contact friends and relatives from all around the world, and to meet.
Needs of baby,child,adult,older adult By poppy-may lee.
Sand and Stone.
 Did You Know? 75% of students say they wish they had more help preparing for their financial future.
Everything is on English, lucky you! TD Sig, Opatija25-27 January2013 Irena Micetic, teacher-adviser in Primary school Vežica, Rijeka.
Contents  What is Cyber Bullying?   Credit Card  Social Networking Sites  Phones  End Slide.
Scams & Schemes Common Sense Media.
TELEPHONE ETIQUETTE Answering the Phone (If not done properly, can leave extremely bad impression) Before answering the phone –Discontinue other conversations.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Dumas Junior High School Advisory Lesson Integrity.
Children and teens are bullied everyday through , instant messaging, social networking and text messaging. Cyber Bullying By:Olivia Martin.
Do pictures always give truthful information? Can publishing it be hurtful??
Identity theft is one of the main problems in cyberspace increasing each year by 500%. Identity theft is when another public citizen/citizens take your.
By Kira Hall and Iliesa Sevudredre Do you guy’s know what Cyber Safety means? Well we are going to tell a story so you guys can understand what Cyber.
Internet Safety Tips Stay safe, stay smart!. This includes:  your real name,  your address,  your phone number Do not share your name, address, phone.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Is when… someone hurts, threatens or frightens you regularly by sending messages or images using the Internet, mobile phones or other forms of digital.
Presented By: Thomas Ihab Lawandi YR 7MN 1. Treat your password like your toothbru sh – keep it to yourself! 2. Only give your mobile number or personal.
How to be Safe Online. Online Access How many of you go online? What are your favorite things to do online? Who accesses the Internet from their smart.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
© 2012 Snack Music Productions. God hears our prayers, he’s every everywhere God hears our prayers, he’s every every everywhere.
The Prodigal Son Year 5 Here I Am Lesson 4. The Prodigal Son Introduction Jesus told many stories to his friends to help them understand difficult things.
Everything is on English, lucky you! IATEFL Conference Liverpool,2013 Irena Micetic, teacher-adviser in Primary school Vežica, Rijeka.
TheSecret. One day, one friend asked another, “How is it that you are always so happy? You have so much energy, and you never seem to get down.”
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
Lesson 2 . Objectives Describe Understand how to send, reply, and forward Define and send attachments.
Simple Interest. Simple Interest – * the amount of money you must pay back for borrowing money from a bank or on a credit card or * the amount of money.
1. Please turn in your BETTER DEAL page to the box. 2
Activity 4 Phone Safety Quiz. 1 You receive a picture message from a friend that makes you uncomfortable. Do you… Send back a text telling her to get.
1. Conner has $25,000 in his bank account. Every month he spends $1,500. He does not add money to the account. a. Write a linear model that shows how.
S - Stay Safe don’t give out your personal information like your address or your house number and your location. Never give your personal information.
Edit the text with your own short phrase. The animation is already done for you; just copy and paste the slide into your existing presentation.
‘ LOVE ’ STORY O NCE UPON A TIME… THERE WAS A GIRL NAMED : AM.
use mouse to advance slides
Do you think this will be good for the children in our community? A. I think this will be good for the children in our community. B. I do not think this.
 S = Stay safe  M = Meet up  A = Accepting information  R = Reliable  T = Tell someone.
Activity 1 Mobile phone Safety. Why Use a Phone? What is good about having a mobile phone? Quick communication.
Chloe Hutton. Mobile phones are a very popular piece of technology and its main use is to contact people either through ringing people up or texting.
Groups Communication Mid-exam Essay 4A 王芸萱 Emily.
E- SAFETY PRESENTATION By: Mohamed Fathy Tip 1Tip 2Tip 3Tip 4Tip 5 And the What is e safety.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
YEAR 6’S GUIDE TO STAYING SAFE ON THE INTERNET. CHATTING When you are chatting to people online, try not to give out any personal information about yourself.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Borrowing and saving Savings. about the risks and consequences of borrowing money that it’s important to think carefully and look at all of the information.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
& Google Gmail.
Phone Safety Quiz.
Appropriate Use of Technology
Cyber bullying and text bullying
Presentation transcript:

Prepared by: Syahira Hazimah Sulaiman & Nooraishah Salleh

It was a lovely day. Ali was walking through the streets thinking about his life while holding his phone...

Suddenly his phone rang and vibrated. He looked at the screen of his phone and read the text message.

The message is from an anonymous phone number. It said: ‘‘ YOU ARE A VERY LUCKY PERSON!!! YOU HAVE WON RM2000,000,000 FROM OUR COMPANY!’’

Ali felt very happy. He excitedly followed the terms and conditions from that person to get the money. One of it was to send his bank account number to the anonymous person.

He does not know that the anonymous is….

A very sly person who was willing to cheat just about anyone…

2 months later…

Ali realized that he was an UNLUCKY person. He lost all his savings in his bank account.

Moral of the story: 1.Always make sure you know the person before replying. 2.Be careful before giving out important information. 3.Don’t easily trust someone whom you don’t know.

Credits: Background music: "3 pound universe" by Jeris (feat. Doxent Zsigmond (doxent)) is licensed under a Creative Commons license: