EEmployers check your Facebook or twitter page to look at way you talk about colleges or customer. they are looking at your privy and binness. And never.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

INTERNET SURVEY RESULTS Class: Grade 4. Do you use the internet?
Developed by Technology Services 1:1 Laptop Initiative
Be safe, Be Secure, Be Smart.... Be in Control!
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Implications and Security Issues of the Internet By Neelesh Patel.
INTERNET SAFETY.
What is identity theft, and how can you protect yourself from it?
You can socialise with the internet by using websites such as Facebook, twitter and MySpace. The good things about this is that you can talk to your friends.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
By Lauren Holdsworth Menu : 1.VideoVideo 2.Online bullying figuresOnline bullying figures 3.Using your mobileUsing your mobile 4.Social networking sitesSocial.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
You can contact your parents so they know where you are and you can extend your time out. You can take photos and videos and share them with family and.
 Communicating with friends is now easier than ever, for example on Facebook you can connect with all your friends and chat to them very easily and instantly.
Threats to I.T Internet security By Cameron Mundy.
Issues Raised by ICT.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Digital Citizenship By Bhavna. Plagiarism Plagiarism is illegal and can get you arrested. If a teacher finds out you used plagiarism he/she can fail you.
Social impacts of the use of it By: Mohamed Abdalla.
Digital Citizenship By Web Design.  It is a system to teach students and teachers the way to use technology correctly. As new technology appears we all.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Contents  What is Cyber Bullying?   Credit Card  Social Networking Sites  Phones  End Slide.
Social The social impact may include allowing others to access your personal information, potential employers cheacking your face book page to obtain.
Impacts of the use of IT -Social network sites This is a site that lets you post messages, upload pictures and stories on your own personal page. You can.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
ICT Impact on Society By Charlotte Lee 7A2. Introduction The impact on society is very great. With all the new gadgets and devices, the world cant live.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Keeping Safe While Using the Internet. We live in a community. What are some safety rules we have in our community? Cyberspace is also a community. What.
Chloe Miles IMPROVING PRODUCTIVITY USING IT. Menu Using Word Advantages Disadvantages Conclusion E-Safety Social Media Dangers of Social Media Sites Staying.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
Agenda Last class: Internet Literacy Lab Today: Internet Safety.
STAY SAFE!! Don’t fall for the same old tricks !!.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Social Impacts of IT. IT allows others to access information about you through social networking sites. Potential employers can check through Facebook.
By Demi Gardiner 8P Who’s been on your computer??
Virus hacking Stuxnet Backups. Computer SecurityComputer Security Catch it, kill it, bin it.
Social impact of ICT. The local community The IT development that may effect the local community one person would start shopping online, chatting online,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
INTERNET SAFETY & POWERFUL PASSWORDS For Grades 3-5 WOLFTEVER CREEK ELEMENTARY.
Internet Safety Internet Safety LPM
BY JESSICA SCHOLEY p1. Id Fraud Is When Someone Pretends To Be Someone Else Using There Address, Birthday And Other Information. People Also Use Id Fraud.
 people will go through your trash to get credit card numbers. Like old mail that you threw away, had your number on it a lot of the time its with.
Activity 3 Identifying the Risks. Questions What do you do online? What sort of sites do you visit? Have you ever had a bad experience online?
The social impacts of IT: Spending more time on the computer, laptop, phone, tab etc. than going outside. Negative effect on health. Negative effect on.
By: Austin Kellogg. What’s the difference Phishing Scam where frauds send pop-up messages to lure personal information.
Witter is where you tweet about something that is happening in the world and people can re-tweet. You can have a conversation with other people. disadvantages.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
This is Facebook and twitter that you can go on when you are at home but school monitor what you go on in school so they put a ban on it other people can.
Social impacts of IT By Lewis dancocks. Social impacts Due to IT people around the world can commutate with each other anywhere at any time, this is due.
Internet safety.. Dangers of the internet: Paedophiles. Cyber bullying. Money theft. Sexual harassment. Identity theft. Hacking of your accounts. Viruses.
IT has had a big impact social in many different ways. Facebook is a social networking site that allows people to communicate and stay in touch with friends.
Online Banking. Learning Objectives To learn how society has been affected by online banking.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
“Doing the Right thing online” Online Safety. Questions How many of you have like to go off by yourself and get on the internet? What do you like to use.
Employers Employers could check your Facebook. There may be things on there that you might not want them to see, or things that they may see that would.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
What it is and how to stop it.  What spam is.  Why it can be dangerous.  How to handle it.
Safety.
How to use the internet safely and How to protect my personal data?
Safer computing week Create, connect and share respect.
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

EEmployers check your Facebook or twitter page to look at way you talk about colleges or customer. they are looking at your privy and binness. And never give them your password out because some people can hag in to your computer and rub your money, binness. IIf you texting as you are working they can get detracted by texting other people can look at parasol things. IIf you spend all day on a computer you will get bad eyes or you could risk or damage the computer or the other people might get your details and also they don’t get enough exercise. IIt is just wasting your time making and getting to make social friends and it a addictive it also give you blood clot.

SSocial networking is where you can follow famous celebrities and your friends and you can talk to them by or twitter and Facebook. On the other hand you can play games with your friends and your stars. EEconomic is where you can shop on the internet for example eBay and amazon. You can shop in your own home and not to get someplace where the shops are and save the time and money. And you can do all the things that you wonted to like make a cup of tea and do some housework. YYou can put your bank account details and you can also put your pay pall details on the shops like eBay and amazon. So you can not with searching for the money and credit card in your parses.  pay pall is where all your bank details is where is in one area so you don’t have to pull the details up in one every time you buy something.

VViruses- they stop your computer from working or make it go really slow. You can make this from ante viruses software. SSpam- these are junk mail on your computer and there just telling you what's on. You can make a folder that stop’s the mail. PPhishing-Social networking sites are now a prime target of phishing, since the personal details in such sites can be used in identity theft. IIdentity theft- its where someone is steeling your bank details and many more. TThreats, viruses, hackers affect laptops, notepad, ipad, mobile phone, mp3 players, mp4 players, games consoles, TV's, and also social networking sites. They can make it go slow or even stop completely or also delete all you're memory.

MMobile phones are a good use of kit you can send a messages and make a calls. YYou can also connect to the internet at home so if you go on the internet it will not take credit money off you. CCredit is the most used on your phone like making calls and sending messages but you can along use so much of it but it can run out. BBattery is the key that runs your phone it can also run out but you can prevent this by charging it. MMP3 players are similar to mobile phones but they are different. Some of them have to charge them on the computer devise. MMP3 player don’t have no internet on the devise they also have no credit on it. Some of them have crammers but some don’t like the apple player & they have some of them they have long lasting battery. MMP3 players have long lasting battery's but the battery's don’t last for 2 days but some of them do but.

GGames consoles are very friendly but to much games consoles they will give you brain damage. TThey can also have internet contended to the consoles like YouTube, and s. They can also have extras games on it online games like make your own town. TThey can also be damages like hacks, brakes and extras but they have no battery's to charge them. SSocial networking sites are very friendly to students, teachers and many more like Facebook, twitter and many more. They can have there problems like vireos and hacks on the sites but they can be help on the vireos can be stopped. SSocial networking sites have a downloading site where they can download the site to there mobile phones, I pads and many more. YYou can also have there can have sites that lead you to the site like bbc I player also they have there little games like blue nose's friends and farm ward, And still keep in torch with your friends.