SlideShare a Scribd company logo
1 of 48
3
2
1
START
How to use
Technology Safely
In this report you will learn how
to:
• Stay in touch with friends and family
members,
• Do your own work on projects,
• And most importantly stay safe on the
internet.
Using Online
Templates
Why use online templates?
• Online templates provide change form the
boring old templates that are already
provided for you.
• Also using online templates will show your
teacher or professor that you are creative.
How to download online
templates.
• Go to this link and find one that pleases
you: http
://www.presentationmagazine.com/free_
powerpoint_template.htm
• Click on the template and
press download as PPT
file.
Plagiarism
The Problem
Plagiarism can
stop someone from
doing something
that they have
worked hard to do
like becoming an
author.
The Solution
• We can fix this problem if everyone would
just do their own work.
• Minor fixes like not copying and pasting
but rewriting it in your own words and
giving credit to your sources.
Charts
Why Are Charts Important?
• Charts Are an easy and quick to gather,
compare, and analyze information.
• Looking at graphs is much easier than
reading a large list of numbers or a
paragraph with instructions.
Typing Progress
Cloud Computing
What is Cloud Computing?
• Cloud computing is a way of being able to
access all of your saved hardware and
data files without having to carry around a
flash drive or SD card everywhere
Pros:
• Cloud computing provides ease of access
to your files which will show to be very
convenient.
• Also it can hook together all of our devices
so we wont need to carry around multiple
devices.
Cons:
• Cloud computing could be very harmful to
our privacy. Not only apple has access to
everything that we have but hackers can
also find that stuff.
• Also, if something better than iOS comes
along, we won’t be able to get it out.
Online Safety
5 Rules of Safety5 Rules of Safety
• Rule 1: Keep your
identity a secret
• Rule 2: Be extra
careful with
strangers
• Rule 3: Tell
somebody
• Rule 1: Keep your
identity a secret
• Rule 2: Be extra
careful with
strangers
• Rule 3: Tell
somebody
5 Rules of Safety5 Rules of Safety
• Rule 4: Protect your
passwords
• Rule 5: Be kind
• Rule 4: Protect your
passwords
• Rule 5: Be kind
Use Animation
Malware
• Slow internet.
• Too many toolbars.
• Your computer not
shutting down.
Look for:
Malware
caused me
to lose
thousands
of dollars!
Ways to Stop Malware
• Never open e-mails that say you have
Malware from people you don’t know.
They are usually e-mails that give you
Malware
• Also, never download things from sites
that you don’t know about.
Netiquette
What is Netiquette?
• Netiquette is a set of rules for being
online.
• Everyone on the internet should always
use netiquette to keep other people happy
and to not give yourself a bad reputation.
What I Think of Texting
• I think texting is a great way of easily
communicating with friends.
• Contrary to that, I do think that it is much
easier to call or talk face to face.
What Not To Do
• Don’t send other people embarrassing
photos of your friends without their
consent.
• Don’t do things that you wouldn’t do in real
life.
• Don’t try to start arguments or flamewars
with people.
Blogs
What is a blog?
• A blog is a shortened way of saying
weblog.
• We can use blogs to communicate with
others
Some popular blogs:
• Youtube
• Facebook
• Twitter
PeanutButterGamer
PBG is a semi-famous youtuber with nearly
1,000,000 subscribers. He posts short 10
minute shows about various video games
and he is ridiculously funny.
3D Printing
Chuck Hull
• Chuck Hull was the genius who invented
3D-Printing.
• Born on May 12, 1939 and still living
today, Chuck is bathing in his riches.
• He invented the machine in 1986.
How it works
3D-Printing works by printing a material in
layers. You program it to print a specific item
and it will slowly print out each layer that are
smaller than a millimeter.
Social Networking
Three reasons we like it
• You can meet new people that you
wouldn’t meet otherwise.
• You can contact some famous celebrities.
• You can easily stay in touch with most of
of your friends.
Sam Parker
May 24th
2002
Sarah Parker
Tulsa, OK
Baseball, music, basketball, and robotics
Music, television, and video games
The Beatles, Led Zeppelin, Queen, and The Who
Ferris Bueller’s Day Off, Ghostbusters, and Wayne’s World
Arrested Development, The Walking Dead, and The
Simpsons
Video Games
Hardware and Software
• Hardware is a tangible object that allows
your computer to run like a monitor which
projects the pictures.
• Software is an intangible code that is
installed into your computer for it to work.
Are video games good for
people?
Video games can be good for people but
there is a such thing as too much. As long
as you are responsible and play sparsely,
video games are just fine for you.
Conclusion
Technology is a great way to stay in touch
with friends and play online games with
them, but you have to stay safe. As long as
you follow simple rules everything will be
fine.
That’s all folks!
Sources
• https://en.wikipedia.org/wiki/Technology
• http://www.cnn.com/TECH/
• https://www.brainpop.com/
• http://www.nytimes.com/pages/technology
/index.html
• http://www.nytimes.com/pages/technology
/index.html

More Related Content

More from Marq2014

Emoji katherine
Emoji katherineEmoji katherine
Emoji katherineMarq2014
 
Wilburn pp4
Wilburn pp4Wilburn pp4
Wilburn pp4Marq2014
 
Brian nguyen
Brian nguyenBrian nguyen
Brian nguyenMarq2014
 
Plagiarism -Jadyn
Plagiarism -JadynPlagiarism -Jadyn
Plagiarism -JadynMarq2014
 
mia mcpeek project in school for a grade
mia mcpeek project in school for a grademia mcpeek project in school for a grade
mia mcpeek project in school for a gradeMarq2014
 
Cyberbullying 3.0
Cyberbullying 3.0Cyberbullying 3.0
Cyberbullying 3.0Marq2014
 
The Evolution of T.V.
The Evolution of T.V.The Evolution of T.V.
The Evolution of T.V.Marq2014
 
Kennedy 3d printers
Kennedy  3d printers Kennedy  3d printers
Kennedy 3d printers Marq2014
 
Quinn 3D printing project
Quinn 3D printing project Quinn 3D printing project
Quinn 3D printing project Marq2014
 
Cyberbullying by Mia
Cyberbullying by MiaCyberbullying by Mia
Cyberbullying by MiaMarq2014
 
Robots in Space
Robots in SpaceRobots in Space
Robots in SpaceMarq2014
 
Emily emerging technology
Emily emerging technology Emily emerging technology
Emily emerging technology Marq2014
 
Bella robots revised
Bella robots revisedBella robots revised
Bella robots revisedMarq2014
 
Emerging Technology by Reid J. and Kaleb G.
Emerging Technology by Reid J. and Kaleb G.Emerging Technology by Reid J. and Kaleb G.
Emerging Technology by Reid J. and Kaleb G.Marq2014
 
social networking
social networking social networking
social networking Marq2014
 
WD GL AI Presentation mk2
WD GL  AI Presentation mk2WD GL  AI Presentation mk2
WD GL AI Presentation mk2Marq2014
 
Computer history
Computer historyComputer history
Computer historyMarq2014
 
computer history
computer historycomputer history
computer historyMarq2014
 
Ben computer games
Ben computer gamesBen computer games
Ben computer gamesMarq2014
 
3D printing
3D printing3D printing
3D printingMarq2014
 

More from Marq2014 (20)

Emoji katherine
Emoji katherineEmoji katherine
Emoji katherine
 
Wilburn pp4
Wilburn pp4Wilburn pp4
Wilburn pp4
 
Brian nguyen
Brian nguyenBrian nguyen
Brian nguyen
 
Plagiarism -Jadyn
Plagiarism -JadynPlagiarism -Jadyn
Plagiarism -Jadyn
 
mia mcpeek project in school for a grade
mia mcpeek project in school for a grademia mcpeek project in school for a grade
mia mcpeek project in school for a grade
 
Cyberbullying 3.0
Cyberbullying 3.0Cyberbullying 3.0
Cyberbullying 3.0
 
The Evolution of T.V.
The Evolution of T.V.The Evolution of T.V.
The Evolution of T.V.
 
Kennedy 3d printers
Kennedy  3d printers Kennedy  3d printers
Kennedy 3d printers
 
Quinn 3D printing project
Quinn 3D printing project Quinn 3D printing project
Quinn 3D printing project
 
Cyberbullying by Mia
Cyberbullying by MiaCyberbullying by Mia
Cyberbullying by Mia
 
Robots in Space
Robots in SpaceRobots in Space
Robots in Space
 
Emily emerging technology
Emily emerging technology Emily emerging technology
Emily emerging technology
 
Bella robots revised
Bella robots revisedBella robots revised
Bella robots revised
 
Emerging Technology by Reid J. and Kaleb G.
Emerging Technology by Reid J. and Kaleb G.Emerging Technology by Reid J. and Kaleb G.
Emerging Technology by Reid J. and Kaleb G.
 
social networking
social networking social networking
social networking
 
WD GL AI Presentation mk2
WD GL  AI Presentation mk2WD GL  AI Presentation mk2
WD GL AI Presentation mk2
 
Computer history
Computer historyComputer history
Computer history
 
computer history
computer historycomputer history
computer history
 
Ben computer games
Ben computer gamesBen computer games
Ben computer games
 
3D printing
3D printing3D printing
3D printing
 

Recently uploaded

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 

Recently uploaded (20)

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 

Sam parker Technology PowerPoint

  • 1.
  • 2. 3
  • 3. 2
  • 4. 1
  • 5.
  • 6.
  • 9. In this report you will learn how to: • Stay in touch with friends and family members, • Do your own work on projects, • And most importantly stay safe on the internet.
  • 11. Why use online templates? • Online templates provide change form the boring old templates that are already provided for you. • Also using online templates will show your teacher or professor that you are creative.
  • 12. How to download online templates. • Go to this link and find one that pleases you: http ://www.presentationmagazine.com/free_ powerpoint_template.htm • Click on the template and press download as PPT file.
  • 14. The Problem Plagiarism can stop someone from doing something that they have worked hard to do like becoming an author.
  • 15. The Solution • We can fix this problem if everyone would just do their own work. • Minor fixes like not copying and pasting but rewriting it in your own words and giving credit to your sources.
  • 17. Why Are Charts Important? • Charts Are an easy and quick to gather, compare, and analyze information. • Looking at graphs is much easier than reading a large list of numbers or a paragraph with instructions.
  • 20. What is Cloud Computing? • Cloud computing is a way of being able to access all of your saved hardware and data files without having to carry around a flash drive or SD card everywhere
  • 21. Pros: • Cloud computing provides ease of access to your files which will show to be very convenient. • Also it can hook together all of our devices so we wont need to carry around multiple devices.
  • 22. Cons: • Cloud computing could be very harmful to our privacy. Not only apple has access to everything that we have but hackers can also find that stuff. • Also, if something better than iOS comes along, we won’t be able to get it out.
  • 24. 5 Rules of Safety5 Rules of Safety • Rule 1: Keep your identity a secret • Rule 2: Be extra careful with strangers • Rule 3: Tell somebody • Rule 1: Keep your identity a secret • Rule 2: Be extra careful with strangers • Rule 3: Tell somebody
  • 25. 5 Rules of Safety5 Rules of Safety • Rule 4: Protect your passwords • Rule 5: Be kind • Rule 4: Protect your passwords • Rule 5: Be kind
  • 27. Malware • Slow internet. • Too many toolbars. • Your computer not shutting down. Look for: Malware caused me to lose thousands of dollars!
  • 28. Ways to Stop Malware • Never open e-mails that say you have Malware from people you don’t know. They are usually e-mails that give you Malware • Also, never download things from sites that you don’t know about.
  • 30. What is Netiquette? • Netiquette is a set of rules for being online. • Everyone on the internet should always use netiquette to keep other people happy and to not give yourself a bad reputation.
  • 31. What I Think of Texting • I think texting is a great way of easily communicating with friends. • Contrary to that, I do think that it is much easier to call or talk face to face.
  • 32. What Not To Do • Don’t send other people embarrassing photos of your friends without their consent. • Don’t do things that you wouldn’t do in real life. • Don’t try to start arguments or flamewars with people.
  • 33. Blogs
  • 34. What is a blog? • A blog is a shortened way of saying weblog. • We can use blogs to communicate with others
  • 35. Some popular blogs: • Youtube • Facebook • Twitter
  • 36. PeanutButterGamer PBG is a semi-famous youtuber with nearly 1,000,000 subscribers. He posts short 10 minute shows about various video games and he is ridiculously funny.
  • 38. Chuck Hull • Chuck Hull was the genius who invented 3D-Printing. • Born on May 12, 1939 and still living today, Chuck is bathing in his riches. • He invented the machine in 1986.
  • 39. How it works 3D-Printing works by printing a material in layers. You program it to print a specific item and it will slowly print out each layer that are smaller than a millimeter.
  • 41. Three reasons we like it • You can meet new people that you wouldn’t meet otherwise. • You can contact some famous celebrities. • You can easily stay in touch with most of of your friends.
  • 42. Sam Parker May 24th 2002 Sarah Parker Tulsa, OK Baseball, music, basketball, and robotics Music, television, and video games The Beatles, Led Zeppelin, Queen, and The Who Ferris Bueller’s Day Off, Ghostbusters, and Wayne’s World Arrested Development, The Walking Dead, and The Simpsons
  • 44. Hardware and Software • Hardware is a tangible object that allows your computer to run like a monitor which projects the pictures. • Software is an intangible code that is installed into your computer for it to work.
  • 45. Are video games good for people? Video games can be good for people but there is a such thing as too much. As long as you are responsible and play sparsely, video games are just fine for you.
  • 46. Conclusion Technology is a great way to stay in touch with friends and play online games with them, but you have to stay safe. As long as you follow simple rules everything will be fine.
  • 48. Sources • https://en.wikipedia.org/wiki/Technology • http://www.cnn.com/TECH/ • https://www.brainpop.com/ • http://www.nytimes.com/pages/technology /index.html • http://www.nytimes.com/pages/technology /index.html