 Communicating with friends is now easier than ever, for example on Facebook you can connect with all your friends and chat to them very easily and instantly.

Slides:



Advertisements
Similar presentations
E - safety How e-safe are you?.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Be safe, Be Secure, Be Smart.... Be in Control!
Unit 1 impact of individual and the society By francis bichener.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Online Safety How to have FUN and Stay in Control.
Cyberbullying When good technology goes bad…….. Stay safe in cyberspace.
ANTI- BULLYING WEEK CYBER BULLYING 16 – 20 November 2009.
You can socialise with the internet by using websites such as Facebook, twitter and MySpace. The good things about this is that you can talk to your friends.
This week is anti-bullying week.
What is Cyber bullying? Cyber bullying is when a person, or a group of people, uses the internet, mobile phones or other digital technologies to threaten,
What do I need to know?.   Instant Messages  Social Networking.
Basics: Getting Started Uploading and Sharing Videos on YouTube. Basics: Getting Started Uploading and Sharing Videos on YouTube. 1.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Cyber Bullying BEAT BULLYING.
E-Safety Quiz Keeping safe online! A guide for parents & children.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Created by Mr. Hemmert.  Have you ever received a mean or instant message? Have you ever sent one? This is called cyberbullying. A cyberbully uses.
You can contact your parents so they know where you are and you can extend your time out. You can take photos and videos and share them with family and.
Social effect: Facebook is a site available to anyone. Many people use it in order to contact friends and relatives from all around the world, and to meet.
E safety. Ads It’s always best to not click on ads when you see them, and it’s always a good idea to ignore them, but if there are too many you can always.
Social impacts of the use of it By: Mohamed Abdalla.
P.6.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Information guide.
BRIDGE COURSE of INFORMATION & COMMUNICATION TECHNOLOGY
CYBERSAFETY Presentations Keeping Safe on the Internet.
Contents  What is Cyber Bullying?   Credit Card  Social Networking Sites  Phones  End Slide.
By: Brandee Burke.  This is an interactive slideshow that is going to teach you all about how to be safe while using the internet and also other kinds.
Social The social impact may include allowing others to access your personal information, potential employers cheacking your face book page to obtain.
Reliability & Desirability of Data
Impacts of the use of IT -Social network sites This is a site that lets you post messages, upload pictures and stories on your own personal page. You can.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
ICT in Banking.
ICT Impact on Society By Charlotte Lee 7A2. Introduction The impact on society is very great. With all the new gadgets and devices, the world cant live.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Internet Safety Mrs. Oliver Technology
Basics. 2 Professional Development Centre Class Outline Part 1 - Introduction –Explaining –Parts of an address –Types of services.
Identity theft is one of the main problems in cyberspace increasing each year by 500%. Identity theft is when another public citizen/citizens take your.
Internet Safety Blue Hills School. Internet Safety Use these Tips Don’t share your address, phone number, school name or your parents credit card number.
Unit 1 By Louise Fattizzo. Setting up an account- technical Step 1: Select the type of website that you would like to use: I am using Gmail to show.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Social impact of ICT. The local community The IT development that may effect the local community one person would start shopping online, chatting online,
Cyber Bullying Kristina 5VN. What is Cyber Bullying? Cyber Bullying is when a form of bullying, which is carried out through an internet service such.
Berkeley Unified School District Cyber Savvy social networking and netiquette.
Viruses For… What is a virus? A virus, affects your computer and damages its software. It can affect your computer, and some viruses can damage your.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Chloe Hutton. Mobile phones are a very popular piece of technology and its main use is to contact people either through ringing people up or texting.
By Jessica Parkinson. Mobile phones have allowed our generation to connect with others all over the world. However, the potential threats are numerous,
How to set up an account- Non-Technical Aimee Lilley.
Witter is where you tweet about something that is happening in the world and people can re-tweet. You can have a conversation with other people. disadvantages.
This is Facebook and twitter that you can go on when you are at home but school monitor what you go on in school so they put a ban on it other people can.
Year 10 ICT. What is it about?  This module sets out essential concepts and skills relating to the ability to understand main concepts underlying the.
Internet safety.. Dangers of the internet: Paedophiles. Cyber bullying. Money theft. Sexual harassment. Identity theft. Hacking of your accounts. Viruses.
Online services! By Amy Davis. What are online services? Online services are services provided by the internet, there are different types of online services.
What is Cyber bullying? Cyber bullying is when a person, or a group of people, uses the internet, mobile phones or other digital technologies to threaten,
IT has had a big impact social in many different ways. Facebook is a social networking site that allows people to communicate and stay in touch with friends.
How to be E-safe Objective To know how to use Technology responsibly in today’s world. Outcome To create a Responsible use of Technology poster suitable.
YEAR 6’S GUIDE TO STAYING SAFE ON THE INTERNET. CHATTING When you are chatting to people online, try not to give out any personal information about yourself.
Ecommerce Application Development For Online Selling Via Web and Mobile Application Electronic commerce, commonly known as e-commerce, is a type of industry.
E-Safety Parent Talk Helping to keep your children safe online.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
As modern children, we have a huge number of electronic devices available to us. We might use computers, tablets, mobile phones or games consoles; for.
Cyberbullying BY LORD MUSHANGO.
P.6 Impacts of Technology on society.
Safe Internet Mechatronika Budapest.
What is Cyber bullying? Cyber bullying is when a person, or a group of people, uses the internet, mobile phones or other digital technologies to threaten,
Follow safety rules so that YOU: Avoid getting HURT.
Presentation transcript:

 Communicating with friends is now easier than ever, for example on Facebook you can connect with all your friends and chat to them very easily and instantly.

AdvantagesDisadvantages Easy communicationEverything is public Free communicationTime consuming Keeping in touchAddiction Free gamesCyber bullying Easier to invite somebody to a birthday party etc. Hackers

 Mobile phones can do many things including online banking, addictive games and access to most social networking sites.  Nearly everyone in the UK owns a mobile phone of some sort and they are becoming more and more popular as newer versions are constantly getting released.

AdvantagesDisadvantages Don’t miss important callsCan be expensive Emergency callsAddictive Keep in touch with friend and family Might cause accident while driving Fits in your pocketCan damage ears if listening to loud music

 Electronic commerce is the buying and selling of products or services over electronic systems such as the Internet and other computer networks. Electronic commerce draws on such technologies as electronic funds transfer, supply chain management, Internet marketing etc. Modern electronic commerce typically uses the World Wide Web at least at one point in the transaction's life-cycle, although it may encompass a wider range of technologies such as , mobile devices and telephones as well.

AdvantagesDisadvantages Buying/Selling 24/7Bad sites that eat up customers money. Easy to start and manage business No guarantee for quality of product Easy to find productsHackers Low operational costs.Mechanical failures Better quality of servicesE-Commerce is not always free

 Banking is now very easy. You can do pretty much everything online like checking your balance online or sending money to someone or even paying your bills online!

AdvantagesDisadvantages Don’t have to leave your house Difficult to learn for a beginner Very convenientLack of trust Service day and nightHackers Easy transactionsIdentity theft Easy access through PCMistakes might happen

 With everything that ICT can do, there are quite a lot of threats such as- Viruses Spyware Malware Phishing Cyber Bullying

 You can prevent threats of IT quite easily by simply using an anti virus such as Norton or there are free ones like AVG you can use too.

 To prevent phishing you can look at many things that give it away For example- Look at the address. If it has lots of numbers in it then it is probably fake. Look for spelling mistakes. A real should be written formally and without any mistakes. Check if the applies to you directly. Make sure it says your full name and if its from a bank make sure its your bank.

 Don't listen to the bullies.  If you are actually upset then talk to a teacher or parents and they should help you and if needed police might be informed.

 You can make an on Gmail.com by clicking ‘Sign Up now’. On an you can send and receive s from family and friends.  s are really easy to send and read and are important because you can use them in a business to share information with your co-workers.

STEP 1 – Create an account. Website

STEP 2 – Fill out your details and READ the Terms of Service and Privacy Policy. STEP 3 – Verify your account by entering the verification code sent to you through your phone.

STEP 4 – Set up is complete! Now go and send s and stuff.

You can use your to see and receiving s from other people. It is really straight forward and you will get the hang of it in no time! You can click on it and read it and then reply to it.

You can add contacts by clicking on GMAIL -> CONTACTS -> NEW CONTACT and then enter the name of the contact you wish to add.

Click here to begin typing your message. This is where you can check your received mail. This is where you can see your added friends or family.

This is where you enter the name of the person you wish to send an to. This is where you enter the subject of the message. For example : Greetings Thomas! This is where you can type the message you would like to send. There are many useful features like Check Spelling which automatically correct your mistakes When you have finished all these steps click Send !

Firstly, make sure you are in your inbox. Then, click on the message you wish to read Now you can read it!