Speaking Course Mobile Phones. Vocabulary advance technology portable electronic device: mobile phones, netbook, USB flash drive improve people’s lives.

Slides:



Advertisements
Similar presentations
Developed by Technology Services 1:1 Laptop Initiative
Advertisements

_Protecting Our Kids New Technology: New Pitfalls Purpose: To help families ask the right questions, and make an informed decision for their children regarding.
Think Click Presents Danny The Dragon. Danny The Dragon is here to tell you about e-safety when on the internet.
What you should understand about buying a mobile phone Developed By by.
KEEPING OUR YOUNG PEOPLE SAFE ONLINE. Nine Young Lives Lost
INTERNET SAFETY.
You can socialise with the internet by using websites such as Facebook, twitter and MySpace. The good things about this is that you can talk to your friends.
Going Places Safely Essential Question:
This week is anti-bullying week.
Cyber Bullying & E-Safety Assembly Key Stage 1 Anti-bullying Week 2009.
Internet Safety/Cyber Ethics
Inventions of Communication M. Koloži SOŠT POPRAD, Slovakia D. Pitoňák.
Created by Mr. Hemmert.  Have you ever received a mean or instant message? Have you ever sent one? This is called cyberbullying. A cyberbully uses.
Backing up data By Alicia stewart.
You can contact your parents so they know where you are and you can extend your time out. You can take photos and videos and share them with family and.
Hands-on with Web 2.0 Tools and Mobile Devices Lin Muilenburg, Ph.D. St. Mary’s College of Maryland.
P.6.
 QUESTIONNAIRE.  The QUESTIONNAIRE has been conducted to evalute how people over the age of 50 use technology.
Social The social impact may include allowing others to access your personal information, potential employers cheacking your face book page to obtain.
E-Safety Challenge College. Learning Objectives Understanding the definition of ‘cyber’ bullying and the affect it can have on the victim.
Move Pictures From Your Mobile Phone to Your PC.  You never know when a photo opportunity is going to arise, which is why having a camera phone can be.
ICT Impact on Society By Charlotte Lee 7A2. Introduction The impact on society is very great. With all the new gadgets and devices, the world cant live.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Mrs. Kinsler’s Class.  With a table partner, make a list of some of the things you do on the Internet.  Be ready to share your list with the class!
Chloe Miles IMPROVING PRODUCTIVITY USING IT. Menu Using Word Advantages Disadvantages Conclusion E-Safety Social Media Dangers of Social Media Sites Staying.
Social impacts of IT. By Joshua Hornsey.. Sky TV Mp3 Sat Nav Phone Radio waves Twitter Games console Face book.
STAY SAFE!! Don’t fall for the same old tricks !!.
Viruses, Hacking and Backups By Katie Louise Bieber!
Do pictures always give truthful information? Can publishing it be hurtful??
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Overview Internet Privacy & Safeguards Social Networking Potential Threats Cyber-bullying.
Advisory Lesson.  The internet can be a fun way to share information and “stay connected” with your friends, but bad things can happen.  The following.
LPM – Unit 1 L 4 Socialising on the internet. How do you keep in contact with your friends and family? List all of the different types of technology.
Unit 1 Living in the Digital WorldChapter 2 On the move This presentation will cover the following topic: Keeping in touch Name:
Are you a Digital Native?
You must be an E-safety Support member to use these resources in your school. © www.e-safetysupport.com Cyber Bullying.
TRENDS IN COMPUTING By Sally Allen 9M4 Candidate number:4031 Wildern School
Smartphone or Sillyphone Which one do you have?. How much are we worth as a group? How much are all the phones in the room worth?
Online Services. An online service is a service delivered from the internet.
Chloe Hutton. Mobile phones are a very popular piece of technology and its main use is to contact people either through ringing people up or texting.
Witter is where you tweet about something that is happening in the world and people can re-tweet. You can have a conversation with other people. disadvantages.
This is Facebook and twitter that you can go on when you are at home but school monitor what you go on in school so they put a ban on it other people can.
PIANO TILES One of my favourite applications is Piano Tiles. In this application people can spare their free time having fun. In this game you have to.
Internet Safety By Blair Number 1 Use a nickname not your real name.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Use of this service Checking location departure/arrival Checking time departure/arrival Benefits to the user or company Provides up to date information.
How to be E-safe Objective To know how to use Technology responsibly in today’s world. Outcome To create a Responsible use of Technology poster suitable.
Gadgets Module 5 Lesson 2 By I. Kukushkina. We should: 1.Learn how to write cinquains; 2. Plan a short report about favourite gadgets.
Module 7 Computers Unit 2 When do you use a computer?
HOW TO HACK SOMEONES CELL PHONE CAMERA. Today, mobile phone is one of the most recent things you carry with you everywhere all day dragon. It’s not just.
SARAH FRYE CEO Today, mobile phone is one of the most recent things you carry with you everywhere all day dragon. It’s not just for communication purpose.
Communication UNIT 10 Anglicize your speech –
Your good friend enjoys uploading videos to the internet sharing top tips for Minecraft. Yesterday you went to check out his latest post and.
Unit 1 Living in the Digital WorldChapter 2 Which devices should we take? This presentation will cover the following topic: Which devices should we take?
Charlie beeney. Advantages: you can talk to all your friends while you are at home. Your family and friends can see pictures you put up on the site. You.
How to Sync Android Phone to Computer (PC/Mac)? Are you a person that always has your Android phone in your hands? Nowadays, a cell phone is not just for.
St. Anne’s Baslow Online Safety Before we start… O Throughout this meeting I hope to provide information that you will find useful in keep your.
How to stay safe using the internet & App’s
Unit 1 A phone call.
How to stay safe using the internet and app’s?
E – SAFETY Being safe online
Cyberbullying BY LORD MUSHANGO.
How to use the internet safely and How to protect my personal data?
P.6 Impacts of Technology on society.
How to use the internet safely and How to protect my personal data?
What Is Bullying? Bullying is defined as the repetitive, intentional hurting of one person or group by another person or group where the relationship.
Netiquette and Online Safety
Safer computing week Create, connect and share respect.
Digital leaders Multimedia presentation
(Protection of Teenagers on the Internet)
Presentation transcript:

Speaking Course Mobile Phones

Vocabulary advance technology portable electronic device: mobile phones, netbook, USB flash drive improve people’s lives /live a convenient life personal/private information being leaked/stolen hack into sb’s account unwanted phone calls install protective software serious consequences

Functions of mobile phones make phone calls send text messages remind sb of things to do check browse the Internet play games take photos listen to songs watch videos

Risks lose personal information e.g. phone numbers, SMS, s, photos, songs, games, videos  being harassed / hurt one’s reputation/feelings sexy photos being publicised lose money (the phone is worth $XXXX ) being blackmailed/disrupt sb’s lives

Dos and don’ts  delete or transfer information onto one’s computer  safe to store games and songs on one’s mobiles  install protective software  use encryption programme  take good care of our belongings

X post personal pictures and videos on blogs, Facebook and Twitter X loosely place one’s phones

Group discussion Your group wants to respond to Patrick Yeung’s entry. Discuss with your group what to include in your response. You may want to talk about: What kind of personal information people usually store on mobile phones What kind of information people should and should not store on mobile phones What will happen if other people have access to the information

Individual response question Which kind of mobile phone would you buy for your father? One with many functions or one with only basic functions?

I would buy a mobile with many functions for my father. He might not be very interested in all of the functions, but I do think some of the functions would be quite useful for him. For instance, with the photo-taking function, he could take photos with Mum or his friends. I do that quite a lot. Although the quality of the photos might not be very good, it would still be fun to record some precious moments of life in the form of a photo. He could then transfer the photos to our computer and delete the photos from the phone. The Internet browsing function would also be helpful when he wants to check the news or the weather. He could still keep track of what’s happening around the world. In addition, he could listen to his favourite music on the phone when he’s travelling a long distance. To conclude, a mobile phone with many functions would definitely be more useful to my father and therefore, I’d prefer that to the very basic kind of mobile phone. Thank you.