SlideShare a Scribd company logo
1 of 17
01/27/15 Linda Rush - Notre Dame School
Internet Netiquette & Safety
• Never use the
Internet without
adult supervision.
• Never drink or eat at
a computer. Food
and drinks can
damage the
keyboard take care
of your computer
and keep it clean.
• Never use bad
language or write
hateful things about
another person.
• Never share your
password, keep
your password a
secret*******.
• Never give out
information, such as
your name, address,
telephone number,
school name or a
friend's name
• Never download
files or programs
without permission
from an adult. They
can contain viruses
or programs that
can harm your
computer.
• Do not open or click
on banners or
advertisements and
if one pops open,
click the X to close
it.
• Do not put a magnet
near your
computer's CPU this
can damage the
computer.
• Be careful handling
floppy disks, do not
play with the mental
clip this can damage
the disk
• Always use the CD-
ROM button to open
and close the CD-
ROM drive pushing
on the door can
damage it.
• Always share your
Internet knowledge
with others.
• Never respond to a
message that makes
you feel confused or
uncomfortable, tell
your teacher or
parent if you come
across any
information online
that makes you feel
uncomfortable.
• Be careful
downloading files or
programs. They can
contain viruses that
can harm your
computer
• Never agree to go
meet a person you
have met online.
You should know
everyone on your
buddy list.
• Never send your
picture to a person
you have met online.
• Remember
Spammers collect
screen names in
chat rooms.
• Do not forward
email without the
author's
permission.
• Tell your teacher or
parent if you come
across any
information online
that makes you feel
uncomfortable.
• Never use a
computer to steal or
destroy computers,
files or programs.
• Keep your email
messages short and
to the point and
always include a
subject line.
• Do not criticize
anyone online.
(Netiquette)
• Capital letters
means that you are
shouting.
(Netiquette)
• Never open an email
from a sender you
do not know
especially if it has
an attachment. This
could be a virus.
• Email Attachments
can contain
computer viruses be
careful before you
open them. You can
scan attachments
for viruses.
• Delete suspicious
email do not open
them and then
empty your deleted
folder.
• Look for the security
lock on the taskbar
before entering
private information
into the computer.
Credits
• http://bcsberlin.k12.nj.us/CPUsite/Computers/index.h
• Slim Goodbody. "Math Monsters: Computers."
unitedstreaming.
http://www.unitedstreaming.com/
– Real World Examples: Using the Internet
Other Resources
• Scholastic. "Magic School Bus Gets Programmed,
The."
unitedstreaming. http://www.unitedstreaming.com/
• http://www.brainpop.com/technology/computers/internet/
• http://www.brainpop.com/socialstudies/currentevents/o
nlinesafety/

More Related Content

What's hot

Angelique s Do Something Project
Angelique s Do Something ProjectAngelique s Do Something Project
Angelique s Do Something Projectjtiggs
 
Using the internet safely
Using the internet safelyUsing the internet safely
Using the internet safelyinsightmentors
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teensSearchLock
 
Internet safety update
Internet safety updateInternet safety update
Internet safety update14071828
 
Instant Messaging Chat Room Saftey Afnan, Hussam
Instant Messaging Chat Room Saftey   Afnan, HussamInstant Messaging Chat Room Saftey   Afnan, Hussam
Instant Messaging Chat Room Saftey Afnan, Hussamguest40f537
 
Internet safety
Internet safetyInternet safety
Internet safetydsansford
 
Lesson 2 jerry dennis
Lesson 2 jerry dennisLesson 2 jerry dennis
Lesson 2 jerry dennisdensio123
 
Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For EducatorsMaria Petropulos
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingmstenorio
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingmstenorio
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of NetiquetteLeelet1121
 

What's hot (20)

Digital+safety+powerpoint
Digital+safety+powerpointDigital+safety+powerpoint
Digital+safety+powerpoint
 
Angelique s Do Something Project
Angelique s Do Something ProjectAngelique s Do Something Project
Angelique s Do Something Project
 
Internet safety
Internet safety Internet safety
Internet safety
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet safety for kids
Internet safety for kidsInternet safety for kids
Internet safety for kids
 
Using the internet safely
Using the internet safelyUsing the internet safely
Using the internet safely
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
 
Internet safety update
Internet safety updateInternet safety update
Internet safety update
 
Pupil esafety
Pupil esafetyPupil esafety
Pupil esafety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Instant Messaging Chat Room Saftey Afnan, Hussam
Instant Messaging Chat Room Saftey   Afnan, HussamInstant Messaging Chat Room Saftey   Afnan, Hussam
Instant Messaging Chat Room Saftey Afnan, Hussam
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Lesson 2 jerry dennis
Lesson 2 jerry dennisLesson 2 jerry dennis
Lesson 2 jerry dennis
 
Surfer Dude
Surfer DudeSurfer Dude
Surfer Dude
 
Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For Educators
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Nour bassem 10 a
Nour bassem   10 aNour bassem   10 a
Nour bassem 10 a
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 

Similar to Fc5 f143a 14c2-3f0d-1cda962638668b94

Safely Traveling the Web 2015
Safely Traveling the Web 2015Safely Traveling the Web 2015
Safely Traveling the Web 2015Staci Trekles
 
E-Safety and Kite Info
E-Safety and Kite InfoE-Safety and Kite Info
E-Safety and Kite Infooneill74
 
Online Safety Lesson 5th grade
Online Safety Lesson 5th gradeOnline Safety Lesson 5th grade
Online Safety Lesson 5th gradeBelinda Larson
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
CH e-safety presentation
CH e-safety presentationCH e-safety presentation
CH e-safety presentationQEwebAdmin
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for ParentsMarian Merritt
 
Cyber Safety Month summary
 Cyber Safety Month summary Cyber Safety Month summary
Cyber Safety Month summaryicts-uct
 
Raising Responsible Digital Citizens
Raising Responsible Digital CitizensRaising Responsible Digital Citizens
Raising Responsible Digital CitizensJason Rushing
 
Internet Safety: I
Internet Safety: IInternet Safety: I
Internet Safety: Imlegan31
 
Using Skype, Facebook, and email to communicate with family and friends
Using Skype, Facebook, and email to communicate with family and friendsUsing Skype, Facebook, and email to communicate with family and friends
Using Skype, Facebook, and email to communicate with family and friendsSocial Status
 
Precautions to ensure safety
Precautions to ensure safetyPrecautions to ensure safety
Precautions to ensure safetybenlangley-efc
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshareMarian Merritt
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetydpl
 

Similar to Fc5 f143a 14c2-3f0d-1cda962638668b94 (20)

Web2.0 Class Guidelines
Web2.0 Class Guidelines Web2.0 Class Guidelines
Web2.0 Class Guidelines
 
Safely Traveling the Web 2015
Safely Traveling the Web 2015Safely Traveling the Web 2015
Safely Traveling the Web 2015
 
Web2.0 Class Safety Guidelines
Web2.0 Class Safety GuidelinesWeb2.0 Class Safety Guidelines
Web2.0 Class Safety Guidelines
 
E-Safety and Kite Info
E-Safety and Kite InfoE-Safety and Kite Info
E-Safety and Kite Info
 
Online Safety Lesson 5th grade
Online Safety Lesson 5th gradeOnline Safety Lesson 5th grade
Online Safety Lesson 5th grade
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
 
CH e-safety presentation
CH e-safety presentationCH e-safety presentation
CH e-safety presentation
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
Cyber Safety Month summary
 Cyber Safety Month summary Cyber Safety Month summary
Cyber Safety Month summary
 
Raising Responsible Digital Citizens
Raising Responsible Digital CitizensRaising Responsible Digital Citizens
Raising Responsible Digital Citizens
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
 
Internet security
Internet securityInternet security
Internet security
 
Internet Safety: I
Internet Safety: IInternet Safety: I
Internet Safety: I
 
Using Skype, Facebook, and email to communicate with family and friends
Using Skype, Facebook, and email to communicate with family and friendsUsing Skype, Facebook, and email to communicate with family and friends
Using Skype, Facebook, and email to communicate with family and friends
 
Precautions to ensure safety
Precautions to ensure safetyPrecautions to ensure safety
Precautions to ensure safety
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshare
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 

Recently uploaded

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 

Fc5 f143a 14c2-3f0d-1cda962638668b94

  • 1. 01/27/15 Linda Rush - Notre Dame School Internet Netiquette & Safety
  • 2.
  • 3. • Never use the Internet without adult supervision. • Never drink or eat at a computer. Food and drinks can damage the keyboard take care of your computer and keep it clean.
  • 4. • Never use bad language or write hateful things about another person. • Never share your password, keep your password a secret*******.
  • 5. • Never give out information, such as your name, address, telephone number, school name or a friend's name • Never download files or programs without permission from an adult. They can contain viruses or programs that can harm your computer.
  • 6. • Do not open or click on banners or advertisements and if one pops open, click the X to close it. • Do not put a magnet near your computer's CPU this can damage the computer.
  • 7. • Be careful handling floppy disks, do not play with the mental clip this can damage the disk • Always use the CD- ROM button to open and close the CD- ROM drive pushing on the door can damage it.
  • 8. • Always share your Internet knowledge with others. • Never respond to a message that makes you feel confused or uncomfortable, tell your teacher or parent if you come across any information online that makes you feel uncomfortable.
  • 9. • Be careful downloading files or programs. They can contain viruses that can harm your computer • Never agree to go meet a person you have met online. You should know everyone on your buddy list.
  • 10. • Never send your picture to a person you have met online. • Remember Spammers collect screen names in chat rooms.
  • 11. • Do not forward email without the author's permission. • Tell your teacher or parent if you come across any information online that makes you feel uncomfortable.
  • 12. • Never use a computer to steal or destroy computers, files or programs. • Keep your email messages short and to the point and always include a subject line.
  • 13. • Do not criticize anyone online. (Netiquette) • Capital letters means that you are shouting. (Netiquette)
  • 14. • Never open an email from a sender you do not know especially if it has an attachment. This could be a virus. • Email Attachments can contain computer viruses be careful before you open them. You can scan attachments for viruses.
  • 15. • Delete suspicious email do not open them and then empty your deleted folder. • Look for the security lock on the taskbar before entering private information into the computer.
  • 16. Credits • http://bcsberlin.k12.nj.us/CPUsite/Computers/index.h • Slim Goodbody. "Math Monsters: Computers." unitedstreaming. http://www.unitedstreaming.com/ – Real World Examples: Using the Internet
  • 17. Other Resources • Scholastic. "Magic School Bus Gets Programmed, The." unitedstreaming. http://www.unitedstreaming.com/ • http://www.brainpop.com/technology/computers/internet/ • http://www.brainpop.com/socialstudies/currentevents/o nlinesafety/