Presentation is loading. Please wait.

Presentation is loading. Please wait.

3.02 Rememberl the rules of online safety. Slide 1 AGENDA – OCTOBER 10, 2011 Lesson 3.2 – Online Safety (Read the Lesson) CW #14a – Vocabulary Matrix CW.

Similar presentations


Presentation on theme: "3.02 Rememberl the rules of online safety. Slide 1 AGENDA – OCTOBER 10, 2011 Lesson 3.2 – Online Safety (Read the Lesson) CW #14a – Vocabulary Matrix CW."— Presentation transcript:

1 3.02 Rememberl the rules of online safety. Slide 1 AGENDA – OCTOBER 10, 2011 Lesson 3.2 – Online Safety (Read the Lesson) CW #14a – Vocabulary Matrix CW #14b – Staying Safe Online Worksheet Note: For CW#14a, fill out the vocabulary matrix and print it. For CW #14b, write the answer on a piece of paper. Turn in both class work to the substitute teacher before class is over. If you turn them in tomorrow, you will get only a grade of 60%. You will get the Agenda paper tomorrow. View the article at http://www.edweek.org/ew/articles/2007/12/19/16applicants.h27.html?tmp=582024897http://www.edweek.org/ew/articles/2007/12/19/16applicants.h27.html?tmp=582024897

2 Online Safety 3.02 Remember the rules of online safety.

3 3.02 Rememberl the rules of online safety. Slide 3 Never disclose personal information Full name Home address Phone number Social security number Passwords Names of family members Credit card numbers Your photograph Watch the video “Tracking Teresa” at http://www.netsmartz.org/resources/reallife.htm http://www.netsmartz.org/resources/reallife.htm Watch the video Teens PSA: “Promises” at http://www.netsmartz.org/resources/psas.htm.http://www.netsmartz.org/resources/psas.htm Why?

4 3.02 Rememberl the rules of online safety. Slide 4 Do you have a My Space account? According to the article published by Scott J. Cech, “..., a significant percentage of colleges and universities sometimes dig into would-be undergraduates’ social networking profiles.” The article describes how some college admissions officers research a potential student’s Internet information to assist in the careful and limited selection of students. “No school wants to give a very prestigious scholarship to some [student] who’s going to show up in the newspaper the next day with pictures of [student] standing on a beer keg.” Employers are also investigating social networking profiles of potential employees. View the article at http://www.edweek.org/ew/articles/2007/12/19/16applicants.h27.html?tmp=582024897http://www.edweek.org/ew/articles/2007/12/19/16applicants.h27.html?tmp=582024897

5 2.02 Rememberl the rules of online safety. Slide 5 Personal Safety – Warning Signs What does online yelling look like? What should you do if someone is yelling at you online? What is a cyberbully? What should you do if you are bullied online? What should you do if someone sends you explicit materials? Watch the cyberbullying videos at http://www.netsmartz.org/resources/reallife.htmhttp://www.netsmartz.org/resources/reallife.htm View the article about the fatal result of bullying at http://stcharlesjournal.stltoday.com/articles/2007/11/26/news/sj2tn20071110-1111stc_pokin_1.ii1.txt http://stcharlesjournal.stltoday.com/articles/2007/11/26/news/sj2tn20071110-1111stc_pokin_1.ii1.txt

6 3.02 Rememberl the rules of online safety. Slide 6 Safeguard against financial risk If purchasing something online, make sure that the site is secure. The URL should begin with https: A lock icon is displayed and is interactive – not just a graphic image. Does the site contain a site seal? Many, but not all sites will contain a seal that is highly visible and difficult to copy which indicates a safe site.

7 3.02 Rememberl the rules of online safety. Slide 7 What are computer hazards? Viruses – software that attaches to programs installed on a computer or that are programmed to load when an email is opened. Spam – unwanted emails from advertisers and users that contain malicious and explicit material or try to sell products or services. Spyware – malicious software designed to take partial control of a computer’s operation without the knowledge or consent of the user. Often used to track a user’s browsing and spending habits while online and also to mine for personal information.

8 2.02 Rememberl the rules of online safety. Slide 8 Protect against online hazards Beware of any emails or sites that promise you will get rich quick. These emails are usually a way for hackers to mine your computer for personal or financial information. Never open an email from someone you do not know. Never download programs unless you know they are safe and contain no hidden files.

9 3.02 Rememberl the rules of online safety. Slide 9 The End


Download ppt "3.02 Rememberl the rules of online safety. Slide 1 AGENDA – OCTOBER 10, 2011 Lesson 3.2 – Online Safety (Read the Lesson) CW #14a – Vocabulary Matrix CW."

Similar presentations


Ads by Google