Circle Link 1 "Know Before You Go" Web Literacy Tips:
|
|
- Jonah Nichols
- 5 years ago
- Views:
Transcription
1 5 th Grade Scavenger Hunt Content Circle Link 1 "Know Before You Go" Web Literacy Tips: You know not to talk to strangers on the street but what about on the Web? You wouldn't want strange people on the Internet to know where you live, either. Never give out your last name, address, or phone number without your parents saying its okay. Don't be fooled by free prizes! Before you enter a contest or give out any personal information, ask a parent for help. Free prizes may be a tricky way of finding out where you live so companies can sell you their products. You know that some sites are good for kids, but not all of them are safe places. If you get scared or worried by a Web site, just click "Back" or log off. It's not always best to follow instructions. Even if a club or chat room tells you to enter your address or other personal information so you can join, don't do it! Look for another kid-safe club that respects your privacy. Finder s keepers, and anyone who finds your address on the Web can use it to send you mail you don't want or to find out where you live. If you get a message from someone you don't know, tell your parents right away. The Internet is a great way to learn about other people that like the same things you do, but meeting your Internet friend in person could be dangerous. Let your parents know right away before you make any plans. Attention big brothers and sisters! You may know how to safely surf, but little ones don't. Help them out by showing them how to find Web sites that are good for kids. Did you ever hear someone tell a tale that you didn't quite believe? On the Internet, it's easy to make up stories about who you are. Remember that people you meet in chat rooms or on may not be playing safely. Trick or treat? Some sites use "cookies," or bits of recorded text, to either (1) gather information about the Web sites you like to visit, or (2) target potential buyers for their advertisers. You may block cookies through the preferences folder of your Web browser. Web sites should always tell you (1) why they are collecting personal information and (2) what they're going to do with that information. If they don't, leave and go to a Web site you and your parents trust.
2 2 Netiquette for Kids 1. Avoid hurting someone's feelings with . Sometimes, online, people can't tell that you are joking. When you write an message, make sure the person you're sending it to will know whether you are happy, sad, angry, joking, etc. You can do this by using smileys, such as :). 2. Respect other people's online rights. People on the Internet have rights just as they do in everyday life. If someone sends you a threatening letter, or makes crank phone calls to your house, it can be annoying and sometimes very scary. The same is true on the Internet. If someone sends you which threatens you or makes you feel uncomfortable, talk to a parent or other adult right away. 3. Avoid insulting someone unless you want to start a flame war. A flame war is when angry people try to punish each other with . Sometimes this can be done by sending so many messages that a mailbox gets jammed, and sometimes this is done by sending a few very nasty messages meant to hurt someone's feelings. If you insult someone with , they will probably get angry just as they would if you insulted them face to face. 4. If someone insults you, be calm. Starting a flame war is serious business on the Net. Even if you are angry with someone, you don't need to take things any further. Try being calm, ignoring the message, or sending a polite message asking for them to explain what they meant. It may have been a misunderstanding. 5. Avoid "crashing" discussion groups or forums. People on the Net frequently get together online to talk about things they may have in common. This can be done on a listserv, a bulletin board, a chat group, etc. If you join the discussion just for the fun of "crashing" it, or ruining it, people will definitely get angry. 6. Respect the privacy of other people. If someone tells you something secret, it should be kept secret. This includes passwords, full names, addresses, or interests. Sharing your own password with someone else, even someone you like, is never a good idea. Passwords and personal information are private, and are never safe to share with others. 7. Be responsible online. When you are at the computer, you are in control. Avoid using the computer to harm other people. Taking things which are not yours (such as files, passwords, or credit card numbers), spreading rumors about other people online, and infecting other computers with viruses (on purpose) are examples of harming other people online. 8. Help other people learn more about the Net. Chances are someone else taught you a lot of what you know about the Internet. The Net is growing quickly, and it's difficult to keep up. Other kids, or even your parents and teachers, may need help understanding what it's all about. Try to help them if you can. Who knows? They might show you a thing or two someday!
3 3 Cyberbullies A cyberbully uses the Internet, cell phone, or other device to send or post text or images to try to hurt or embarrass another person. It's a lot like the bullying that happens at recess or on the school bus, and it can hurt just as much. Help stop cyberbullying from happening to you: Keep your password safe! You can tell your parents about it, but not anyone else not even your best friend! Don t share secrets, photos, or anything online that might be embarrassing if someone found out (like your entire school!). Set up and instant messenger accounts with your parents. Make sure not to put your name, age, address, or phone number in your profile or screen name. Don't send messages when you're angry. Wait until you cool off so you don't say something you'll regret. Remember Scruff s steps for getting along. Let bullies know that cyberbullying is not OK. If your friends are cyberbullying, tell them that it s not funny and that cyberbullying hurts people. Be as nice online as you are offline. If a cyberbully is bothering you: Don't respond to s or messages that are mean to you or your friends. Don t forward s or messages that are mean or that spread rumors about other people. Don't open s or messages from someone you know is a bully. Block anyone who acts like a cyberbully. Save or print all messages from bullies. Show the messages to an adult you trust like a parent or a teacher and ask for help. If the first adult you tell doesn't help you, keep telling until someone does.
4 4 Virus Cave Computer viruses can destroy your computer and your files. Computers get viruses from infected files sent to them by other computers. You always need to be careful of viruses when receiving and downloading anything from the Internet, even if you are using a wireless device. If you get an that you weren t expecting, you should delete it right away. And you should always use an antivirus program. Sometimes computer viruses can themselves from your friend s computer to your computer. You should delete links and files sent to you by strangers, because they might contain viruses that could damage your computer Safety A few quick tips to remember about using Change your password often (and keep it in a safe place). Don t share the password with anyone. Don t open any attachments unless they are run through an antivirus program. Log off when done. Don t reply to spam, harassing, or offensive . Use common sense and keep personal information personal. Delete all s, unread, from people you don t know. Don t be caught by the spammers favorite trick, Remember me?
5 6 Adventures in the Internet Never give your name, address, phone number or the name of your school to anyone online. Never agree to meet with anyone you ve connected with online. If you feel uncomfortable about anything you see on a computer, tell a parent or adult right away. 7 What is Plagiarism? Plagiarism is when you use someone else's words or ideas and pass them off as your own. Plagiarism is not allowed in school, college, or beyond, so it's a good idea to learn the proper way to use resources, such as websites, books, and magazines. Anytime you use thoughts or ideas that aren t your own, or information you didn t know before you went to a website, you must give the author and the website credit for that information. Plagiarism is wrong because you are stealing a person's ideas or writing. Most schools are pretty strict about plagiarism. If you're caught, you can wind up suspended, you may fail the assignment and possibly even be expelled. To avoid plagiarism, always make it clear where the information comes from. If you do not cite sources, you are breaking copyright rules. A bibliography is a list of the sources you used for a project or report. To make one, you'll need to know the author, the title, and the date it was published.
6 8 Real World Smarts Some people will pretend to be a friend to try to trick you to go with them or get you to do something you don t want to do. Never leave with anyone without asking your parent or guardian first. If you are home alone or your parent is in another room, never answer the door without checking first. Remember the four rules: 1) Check first with an adult you trust. 2) Take a friend with you. 3) Tell people No. 4) Tell a trusted adult. 9 Online Predators An online predator is an internet user who exploits* people, usually for sexual or financial purposes. Online predators think of others as prey. They try to trick young people into meeting with them face to face so they can harm them. They can also try to trick people into giving them their personal information so they can steal from them. Predators will use chat rooms, peer to peer forums, and IM to find victims+. They will try to get their victims to trust them by acting like they care about the same things. Often they will bring up sexual topics and/or send pictures to their victims before asking to meet with them face to face. * exploit - to take advantage of unfairly + victim - one who is harmed by another TIPS TO PROTECT YOURSELF FROM AN ONLINE PREDATOR: When someone threatens you or asks for too much information, talk to your parents, a teacher or the local police. Chat with people you know from the real world, from school, band, community groups, your family. Keep PII (what adults call personally identifiable information) private. That's your name, school, social security number, address, age, birthday, phone number and family or friends names to yourself. Make sure your screen name doesn't say too much, don't include stuff like your name, age or hobbies that predators can use. Adapted from REPORT IT: If anyone you don't know asks you or a friend for personal information, photos or videos, tell an adult you trust and report it to the National Center for Missing & Exploited Children's CyberTipline. Reports may be made 24-hours a day, 7 days a week online at or by calling
7 10 Netiquette There are rules for proper behavior in cyberspace called Netiquette. Everything you say should be said with the understanding that others will know, sooner or later, that you said it. Nothing is ever truly anonymous online. Get to know the rules before you say or do anything on-line. Some discussion boards and chat rooms have special rules about what you can and can t say or do. Think before you type. Make sure that what you say is appropriate. Don t be critical of others, especially newbies, even if they break the rules. If you need to help or correct someone, do it by , not in a public forum like a chat room or newsgroup. Remember, everyone was a newbie once. Don t waste others time or bandwidth. Don t send chain , pass cyber rumors or hoaxes, or spam others (posting a message in many places at once). Don t carbon copy (Cc:) people just because you can. Copy only those who need to read something. Protect the privacy of others. Don t openly list someone s address in a large Cc: without their permission. Instead, use a Bcc: (blind carbon copy) to protect their privacy. Don t use anyone s password without their permission. Don t take things without paying for them, like shareware. These are all no-no's. Remember that just because you re hiding out behind a computer monitor, you aren t exempt from correct and thoughtful communications: Using ALL CAPITAL LETTERS - it s considered shouting and is hard on the eyes. Flaming - inciting or provoking an argument. Posting false or rude information about someone else. Sending a large attachment without asking if it s okay first. Referring to someone by their real name in a chat room or channel. Sending to people you don t know, advertising something. (It s another kind of spam.) Talking about something off-topic in a special topic chat room Not waiting your turn or following the chat room or channel rules in a special online event.
EADS up. stop think connect
EADS up stop think connect You text, you play games, you share photos and video. You update your status, you post comments, you probably spend some time in a virtual world. Being online connected through
More informationAnti-Cyber Bullying Policy.
Anti-Cyber Bullying Policy. Bullying, in any form, is an issue that we all take very seriously at Bredon School. We accept that victims can become depressed and suicidal, and even take their own lives.
More informationNetiquette. IT Engineering II. IT Engineering II Instructor: Ali B. Hashemi
Netiquette IT Engineering II IT Engineering II Instructor: Ali B. Hashemi 1 1 Netiquette "Netiquette" is network etiquette, the do's and don'ts of online communication. Netiquette covers both common courtesy
More informationNetiquette. IT Engineering II Instructor: Ali B. Hashemi
Netiquette IT Engineering II Instructor: Ali B. Hashemi 1 1 Ethics in Networking!? 2 2 Netiquette Etiquette: the formal rules for polite behaviour in society or in a particular group. Netiquette is network
More informationWhat is epals SchoolMail? Student Accounts. Passwords. Safety. Flag Attachment
What is epals SchoolMail? http://www.epals.com/ epals Schoolmail is a complete, Internet-based email solution and collaborative toolset designed for the education environment. Student Accounts Students
More informationONLINE SAFETY. Messaging, , Vlogging and Sexting
ONLINE SAFETY Messaging, email, Vlogging and Sexting www.eitts.co.uk Contents WhatsApp & Messaging Email Vlogging Sexting THE RISKS People online are not necessarily who they say they are or seem to be.
More informationDigital Safety and Digital Citizenship
Digital Safety and Digital Citizenship A Guide for Students The laptop has been given to you as a tool for learning. Use it for that. While doing so, here are some important rules for keeping yourself
More information(c) IKSC 2010 Copying allowed for incidental, classroom purposes. Workshop 2: Playing and Staying Safe Online Student Handouts
Workshop 2: Playing and Staying Safe Online Student Handouts Table of Contents Lesson 1: I Know/I Want to Know 1 Lesson 1: Video Summary: Staying Safe Online, Part 1 2 Lesson 1: Guidelines for Creating
More informationA GUIDE TO CYBERBULLYING THINK BEFORE YOU POST
A GUIDE TO CYBERBULLYING THINK BEFORE YOU POST WHAT IS BULLYING? Bullying is repeated aggression, verbal, psychological or physical conduct by an individual or a group against others. Bullying is always
More informationOnline Dangers. According to the National Center for Missing and Exploited Children.
Online Dangers One in five youths say they have received a sexual approach or solicitation. One in 33 had received an aggressive sexual solicitation. One in four had unwanted exposure to sexually explicit
More informationBring in several pieces of junk mail that have been opened and spread the mail around the classroom.
LESSON PLAN You ve Won a Prize! GRADES 3-5 UNIT 2 Essential Question What is spam, and what can you do about it? Lesson Overview Students learn what spam is, the forms it takes, and then identify strategies
More informationDuplication and/or selling of the i-safe copyrighted materials, or any other form of unauthorized use of this material, is against the law.
Thank you for your interest in e-safety, and for teaching safe and responsible Internet use to your students. Educators are invited to access and download i-safe curriculum AT NO CHARGE under the following
More informationStudent E-Safety Induction
Central College Nottingham Student E-Safety Induction Academic Year 2015-16 Training & Learning Technologies September 2015 E-Safety It is important to the College that all students know how to stay safe
More informationOnline Communication. Chat Rooms Instant Messaging Blogging Social Media
Online Communication E-mail Chat Rooms Instant Messaging Blogging Social Media Advantages: Reduces cost of postage Fast and convenient Eliminates phone charges Disadvantages: May be difficult to understand
More informationLambton Primary School
Lambton Primary School Advice to pupils on Cyber Bullying For pupils If you re being bullied by phone or the internet Remember, bullying is never your fault. It can be stopped, and it can usually be traced.
More informationOnline Communication. Chat Rooms Instant Messaging Blogging Social Media
Online Communication E-mail Chat Rooms Instant Messaging Blogging Social Media { Advantages: { Reduces cost of postage Fast and convenient Need an email address to sign up for other online accounts. Eliminates
More information2.4.2 List out the Dos and Don ts while communicating online.
NOTES 2.4 Netiquette 2.4.1 Explain the meaning of Netiquette. Netiquette is etiquette on the Internet. Since the Internet changes rapidly, its netiquette does too, but it's still usually based on the Golden
More informationSocial Media and Cyber Safety
Social Media and Cyber Safety Social Media Apps/Sites Middle School Students May Be Using Facebook Twitter Instagram Ask.fm Kik Messenger SnapChat Tumblr Web-based games Group Chats Facebook and Twitter
More informationCyber Safety Awareness in Schools. A Delhi Police Initiative
Cyber Safety Awareness in Schools A Delhi Police Initiative 1 INTRODUCTION Concerns: You all are very inquisitive; The Internet offers a world of opportunities to you; But it is also full of risks: Inappropriate
More informationUnit 9 Tech savvy? Tech support. 1 I have no idea why... Lesson A. A Unscramble the questions. Do you know which battery I should buy?
Unit 9 Tech savvy? Lesson A Tech support 1 I have no idea why... A Unscramble the questions. 1. which battery / Do you know / should / buy / I? Do you know which battery I should buy? 2. they / where /
More informationIntroduction to
Introduction to Email gcflearnfree.org/print/email101/introduction-to-email Introduction Do you ever feel like the only person who doesn't use email? You don't have to feel left out. If you're just getting
More information(electronic mail) is the exchange of computer-stored messages by telecommunication.
What is email? E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication. E-mail is one of the protocols included with the Transport Control Protocol/Internet Protocol (TCP/IP)
More informationINTERNET SAFETY* GALEN GARRETSON RASCAL MARCH 2-3, * Sources include learnfree.org, PC World, wikpedia.com, techterms.com
INTERNET SAFETY* GALEN GARRETSON RASCAL MARCH 2-3, 2016 * Sources include learnfree.org, PC World, wikpedia.com, techterms.com SOME QUESTIONS TO ASK YOURSELF. HAVE YOU.. 1. Googled yourself to see what
More informationThe purchaser of the ebook is licensed to copy ebook for use with immediate family members only.
Copyright 2017 Leah Nieman www.leahnieman.com All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form by any means, electronic, mechanical,
More informationSo, you re child wants to sign up for Myspace...
So, you re child wants to sign up for Myspace... Social networking is a brilliant concept that has sadly been tainted by several nefarious individuals. The term simply means a website that allows its users
More informationDigital Marketing Manager, Marketing Manager, Agency Owner. Bachelors in Marketing, Advertising, Communications, or equivalent experience
Persona name Amanda Industry, geographic or other segments B2B Roles Digital Marketing Manager, Marketing Manager, Agency Owner Reports to VP Marketing or Agency Owner Education Bachelors in Marketing,
More informationSpam. Time: five years from now Place: England
Spam Time: five years from now Place: England Oh no! said Joe Turner. When I go on the computer, all I get is spam email that nobody wants. It s all from people who are trying to sell you things. Email
More informationCyber Smarts Using Social Media Wisely
Cyber Smarts Using Social Media Wisely Posted on March 24, 2016 by Shridevi Stock Photo You have access to the world s largest museum, art gallery, library and social group ever created. You also have
More informationNetiquette Vocabulary
Flame Spam Mail Bomb Newbie Lurk Shouting FAQ Netiquette Vocabulary To send an insulting or derogatory message to another person or people. Consider any message that comments on another person or their
More informationGlossary
Glossary www.cybersmart.gov.au/cyberquoll CyberQuoll Internet Safety Education for Primary School Students, Parents Guide Website: www.cybersmart.gov.au/cyberquoll Source: Commonwealth of Australia 2009
More informationMeet our Example Buyer Persona Adele Revella, CEO
Meet our Example Buyer Persona Adele Revella, CEO 685 SPRING STREET, NO. 200 FRIDAY HARBOR, WA 98250 W WW.BUYERPERSONA.COM You need to hear your buyer s story Take me back to the day when you first started
More informationIt is my great pleasure to inform that you have won the latest model of Ferrari Car and 4 Bed Room Villa in Palm Jumeirah for attending this Seminar
You Won!!! It is my great pleasure to inform that you have won the latest model of Ferrari Car and 4 Bed Room Villa in Palm Jumeirah for attending this Seminar To Process and deliver your Car and Villa
More informationThe Basics of Netiquette
The Basics of Netiquette Etiquette is a code of social behavior. It includes behavior expectations or norms within a society, social class, or group. Netiquette is how our social codes of behavior look
More informationETIQUETTE TIPS. Traci Kasten. Executive Assistant Chief Operations Office x179
EMAIL ETIQUETTE TIPS Traci Kasten Executive Assistant Chief Operations Office 896-0667 x179 tkasten@rrps.net SENDING EMAILS Make sure your email contains a courteous greeting and closing. Address your
More informationASKnLearn Learning Management System Parents Talk Punggol Green Primary School 2 & 3 Jan 2014
ASKnLearn Learning Management System Parents Talk Punggol Green Primary School 2 & 3 Jan 2014 Agenda 1. Cyberwellness Talk 2. How to Login to LMS Cyberwellness Talk 1. Internet & Gaming Addiction 2. Netiquette
More informationFacebook Guide. How many Facebook friends should I have?
To Friend or Not to Friend How many Facebook friends should I have? Facebook is a great way to stay in connected with your friends when you are not in direct contact with them. As soon as you add a friend
More information2013 edition (version 1.1)
2013 edition (version 1.1) Contents 1 Introduction... 3 2 Signing in to your Office 365 account... 3 2.1 Acceptable Use Policy and Terms of Use... 4 3 Setting your profile and options... 4 3.1 Settings:
More informationGetting started with social media and comping
Getting started with social media and comping Promotors are taking a leap further into the digital age, and we are finding that more and more competitions are migrating to Facebook and Twitter. If you
More informationSocial Media E-Safety Guide. For more help and advice visit:
Social Media E-Safety Guide For more help and advice visit: https://www.net-aware.org.uk/ https://www.thinkuknow.co.uk/ https://www.ceop.police.uk/ Twitter https://www.net-aware.org.uk/networks/twitter/
More informationWhat is netiquette? K34#%^**(11`IJN+}}C>ET34KH<D>Q!:DL=+szd$R4457DGFG^U%*%&^YDFG#$CV%&58w[SRSBFy>
Let's Talk About... Bad Netiquette Stinks" Use these questions to help children engage more critically with the themes in Bad Netiquette Stinks. As they answer each question, use the guide to prompt a
More informationOnline Scams. Ready to get started? Click on the green button to continue.
Online Scams Hi, I m Kate. We re here to learn how to protect ourselves from online scams. We ll follow along with Kevin to learn what types of scams are out there, how to recognize the warning signs,
More informationYour message is sent from your computer to a server (like the post office) where the
E-mail it s convenient, cheap and easy. Today, it is the most rapidly growing means of communication. All e-mail programs are slightly different. Gmail, Hotmail, and Yahoo! are some popular e-mail programs.
More informationSpam Protection Guide
Spam Email Protection Guide Version 1.0 Last Modified 5/29/2014 by Mike Copening Contents Overview of Spam at RTS... 1 Types of Spam... 1 Spam Tricks... 2 Imitation of 3 rd Party Email Template... 2 Spoofed
More informationText 1 Cell Phones Raise Security Concerns at School
Text 1 Cell Phones Raise Security Concerns at School Many people think that students having cell phones in school is a great idea 1 idea. Many parents feel that they don t have to worry as much about their
More informationNETIQUETTE GUIDE FOR ONLINE LEARNING GADSDEN STATE COMMUNITY COLLEGE TEACHING & LEARNING CENTER
NETIQUETTE GUIDE FOR ONLINE LEARNING GADSDEN STATE COMMUNITY COLLEGE TEACHING & LEARNING CENTER WHAT IS NETTIQUETTE? According to the BBC s WebWise Team (2012), the word netiquette is a combination of
More informationSTUDENT ICT ACCEPTABLE USE POLICY
The Olive School, Blackburn This policy is in line with the Mission Statement of the School To promote a culture of educational excellence, from within a caring and secure Islamic environment enriched
More informationConveying Emotion. Chapter 12: Computers In Polite Society: Social Implications of IT. Improving the Effectiveness of . Problems with
Chapter 12: Computers In Polite Society: Social Implications of IT Fluency with Information Technology Third Edition by Lawrence Snyder Improving the Effectiveness of Email Problems with email: Conveying
More informationThe ICT4me Curriculum
The ICT4me Curriculum About ICT4me ICT4me is an after school and summer curriculum for middle school youth to develop ICT fluency, interest in mathematics, and knowledge of information, communication,
More informationThe ICT4me Curriculum
The ICT4me Curriculum About ICT4me ICT4me is an after school and summer curriculum for middle school youth to develop ICT fluency, interest in mathematics, and knowledge of information, communication,
More informationWalsall Adult and Community College
Employer Engagement; use of on-line technology to reduce environmental impact and maximise social capital - Skype booklet Use of on-line Technology to Reduce Environmental Impact and Maximise Social Impact.
More informationUnderstanding the digital world: LEVEL 1
Understanding the digital world: LEVEL 1 Let s find out what you already know about the digital world with this short quiz. Read each sentence and choose if you think it is TRUE or FALSE. 1. It is a good
More informationWelcome to the world of .
Welcome to the world of e-mail. E-mail, short for electronic mail, allows computer users to easily send messages back and forth between acquaintances around the world. There are a variety of ways to do
More informationNewcomer Finances Toolkit. Fraud. Worksheets
Newcomer Finances Toolkit Fraud Worksheets Ottawa Community Loan Fund Fonds d emprunt Communautaire d Ottawa 22 O Meara St., Causeway Work Centre, Ottawa, ON K1Y 4N6 Tel: 613-594-3535 Fax: 613-594-8118
More informationInternet Safety by Kathy Staugler Illustrated by Travis Schaeffer
Internet Safety by Kathy Staugler Illustrated by Travis Schaeffer 1997-2013 n2y, Inc. Unique Learning System Leveled Book, Internet Safety, Level J/K Table of Contents Chapter 1: What Is the Internet?...pg
More informationNews English.com Ready-to-use ESL / EFL Lessons
www.breaking News English.com Ready-to-use ESL / EFL Lessons 1,000 IDEAS & ACTIVITIES FOR LANGUAGE TEACHERS The Breaking News English.com Resource Book http://www.breakingnewsenglish.com/book.html Top
More informationStudent Portal. A guide for students. Department of Education and Training, Western Australia,
Student Portal A guide for students Department of Education and Training, Western Australia, 2009 1 Table of Contents What is the Portal?...3 What will I need to access the portal?...3 Safety and responsibility
More informationPUPIL ICT ACCEPTABLE USE POLICY
PUPIL ICT ACCEPTABLE USE POLICY Document control This document has been approved for operation within: All Trust Schools Date of last review August 2018 Date of next review August 2020 Review period Status
More informationComputer Foundation Skills. Internet Webmail
Computer Foundation Skills Internet Webmail Table of Contents Contents Webmail... 4 Gmail Create an account... 5 Gmail - Passwords... 6 Gmail - Inbox... 7 Gmail View message... 7 Gmail Compose mail...
More informationBrochure for Information Security
福山大学 Application of Tools for Information Security for a fulfilling Life at University Brochure for Information Security Raising the Quality of Learning Fukuyama University Information Service Promoting
More informationThe Benefits of SMS as a Marketing and Communications Channel From The Chat Bubble written by Michael
The Benefits of SMS as a Marketing and Communications Channel 1 Why companies and organizations should do SMS. We re going to talk through from an organization or marketers point of view, what SMS is good
More information(Photos and Instructions Based on Microsoft Outlook 2007, Gmail, Yahoo! Mail, and Hotmail)
Specific instructions on how to compose a professional e-mail using send and reply options, basic e-mail components, appropriate wording, content, tone, and examples of what not to do. (Photos and Instructions
More informationAges Donʼt Fall for Fake: Activity 1 Don t bite that phishing hook! Goals for children. Letʼs talk
Ages 11-14 Donʼt Fall for : Activity 1 Don t bite that phishing hook! Children play a game where they study various emails and texts and try to decide which messages are legit and which are phishing scams.
More informationSlide 1 Hello, I m Jason Borgen, Program Coordinator for the TICAL project and a Google Certified Teacher. This Quick Take will show you a variety of ways to search Google to maximize your research and
More informationSecurity Awareness. Presented by OSU Institute of Technology
Security Awareness Presented by OSU Institute of Technology Information Technologies Division Security Awareness Topics Social Engineering Phishing Social Networks Displaying Sensitive Information Wireless
More informationSouth Central Power Stop Scams
Don t get tricked. People around the country have been receiving emails and phone calls from scammers. South Central Power wants to help you keep your money and prevent scams. Review the helpful tips below.
More informationSky Social Media Guidelines for Contributors
Sky Social Media Guidelines for Contributors Social chatter around TV shows is inevitable and, for the most part, positive. However, contributors are advised that people have a tendency to publish things
More informationTaking Control of Your . Terry Stewart Lowell Williamson AHS Computing Monday, March 20, 2006
Taking Control of Your E-Mail Terry Stewart Lowell Williamson AHS Computing Monday, March 20, 2006 Overview Setting up a system that works for you Types of e-mail Creating appointments, contacts and tasks
More informationLEARNER I.T. ACCEPTABLE USE POLICY. Learner I.T. Acceptable Use Policy [Type text] Updated November Authorised by ILT Board/Executive.
LEARNER I.T. ACCEPTABLE USE POLICY Learner I.T. Acceptable Use Policy 2012-13 [Type text] Updated November 2011. Authorised by ILT Board/Executive. Learner I.T. Acceptable Use Policy Table of Contents
More informationThe Table Privacy Policy Last revised on August 22, 2012
The Table Privacy Policy Last revised on August 22, 2012 The Table, an online venue through which your organization and its members/employees can connect to better fulfill its mission respects and is committed
More informationEach member of the St. Margaret s Community has the privilege to access Google Apps provided by the school s network
NETWORK APPROPRIATE USE AGREEMENT 2018-2019 We are pleased to offer students of St. Margaret s School access to our computer network for electronic mail and the Internet. To gain access to e-mail and the
More informationComputer Basics 4 Basics Revision 3 ( )
Computer Basics 4 E-mail Basics Revision 3 (1-10-2014) E-MAIL E-mail or electronic mail allows you to send and receive messages from anyone in the world with an e-mail address. To access e-mail you need
More informationDumas ISD. Acceptable Use Policy
Dumas ISD Acceptable Use Policy Introduction Dumas ISD is excited to offer our staff and students access to modern technologies and mobile devices in conjunction with access to the Internet. Use of the
More informationSuccessful Implementation
Academic Integrity What Is Plagiarism? In instructional settings, plagiarism is a multifaceted and ethically complex problem. However, if any definition of plagiarism is to be helpful to administrators,
More informationNews English.com Ready-to-use ESL / EFL Lessons
www.breaking News English.com Ready-to-use ESL / EFL Lessons The Breaking News English.com Resource Book 1,000 Ideas & Activities For Language Teachers http://www.breakingnewsenglish.com/book.html Self-destructing
More informationAgenda. 1. Cyberwellness Talk 2. How to Login to LMS
Agenda 1. Cyberwellness Talk 2. How to Login to LMS Cyberwellness Talk 1. Internet & Gaming Addiction 2. Netiquette 3. Danger of Cyber Contacts 4. Dangers of Facebook Internet & Gaming Addiction Definition
More informationPARENT & TEACHER GUIDE TO THE INTE. This book belongs to:
& his book belongs to: !. magine all the computers in the world linked together like a huge spider web. hen these computers connect, they form a network. n a network of computers, information about anything
More informationSession Booklet Facebook part 2
Session Booklet Facebook part 2 Facebook, like any online or offline meeting place, carries with it some risks. Remember that you should apply the same common sense and safety rules as you do when you
More informationCommunication using
Lesson 7 A m In this lesson you will learn: How to communicate by using email. How to create email accounts. Communication using E-mail Tejas: Today we made a poster on Communication old and new. Tejas
More informationUsing Gmail. Created by the Columbia Basin Alliance for Literacy. Margaret Sutherland
Created by the Columbia Basin Alliance for Literacy This project is funded by Government of Canada s New Horizons for Seniors Program and is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike
More informationpoetry.com Web Safety Ratings from McAfee SiteAdvisor What our inbox looked like after we signed up here:
Page 1 of 6 Privacy policy Terms of service Contact us McAfee Home Want to add your comments? Log in or Register. HOME DOWNLOAD ANALYSIS SUPPORT BLOG ABOUT US Look up a site report: poetry.com Advertisement
More informationHOW TO CONFIGURE SOCIAL MEDIA PRIVACY SETTINGS
HOW TO CONFIGURE SOCIAL MEDIA PRIVACY SETTINGS The right settings are critical when it comes to keeping your kids safe on social media. Here s a quick guide to safe settings for some of the most popular
More informationGETTING STARTED PAGE 2 Prerequisites You Will Be Able To. INTRODUCTION PAGE 3 What is ? Pros, Cons and Tips Text Speak Dictionary
E-MAIL Basics GETTING STARTED PAGE 2 Prerequisites You Will Be Able To INTRODUCTION PAGE 3 What is E-mail? Pros, Cons and Tips Text Speak Dictionary SETTING UP AN ACCOUNT PAGE 5 Setting up your E-mail
More information101 Etiquette Tips
101 Email Etiquette Tips It is important that whether for business or personal use that you follow the basics of email etiquette. This document covers for you the top tips for email etiquette that everyone
More informationFamily Technology Boundaries:
General questions to answer Family Technology Boundaries: How much time per day/week will various technologies be allowed? Can social media be accessed from all devices? What should children do if they
More informationSubject Cooperative activities. Explain the commands of HTML Use the HTML commands. Add textbox-radio button
Name: Class :.. The week Subject Cooperative activities 1 Unit 1 The form- Form tools Explain the commands of HTML Use the HTML commands. Add textbox-radio button 2 Form tools Explain some of HTML elements
More informationHow to Open a Free Yahoo! Account & Basics
How to Open a Free Yahoo! Email Account & Email Basics Opening a Yahoo! Email Account Yahoo! Email is one of the many types of free email systems out there. This tutorial will teach you how to set up a
More informationSECURITY ON PUBLIC WI-FI New Zealand. A guide to help you stay safe online while using public Wi-Fi
SECURITY ON PUBLIC WI-FI New Zealand A guide to help you stay safe online while using public Wi-Fi WHAT S YOUR WI-FI PASSWORD? Enter password for the COFFEE_TIME Wi-Fi network An all too common question
More informationReview Ch. 3 Connecting to the World s Information. 2010, 2006 South-Western, Cengage Learning
Review Ch. 3 Connecting to the World s Information 2010, 2006 South-Western, Cengage Learning Networks Two linked computers is a network A network of computers located within a short distance is called
More informationICT Acceptable Use Policy for Students
ICT Acceptable Use Policy for Students a 52 Eurobin Avenue, Manly NSW 2095 t +61 2 9977 5144 f +61 2 9976 2753 cricos 03290E e administration@stellamaris.nsw.edu.au w www.stellamaris.nsw.edu.au abn 88
More informationRecipes. Marketing For Bloggers. List Building, Traffic, Money & More. A Free Guide by The Social Ms Page! 1 of! 24
16 Recipes Email Marketing For Bloggers List Building, Traffic, Money & More A Free Guide by The Social Ms Page 1 of 24 Brought to you by: Jonathan Gebauer, Susanna Gebauer INTRODUCTION Email Marketing
More information2016 All Rights Reserved
2016 All Rights Reserved Table of Contents Chapter 1: The Truth About Safelists What is a Safelist Safelist myths busted Chapter 2: Getting Started What to look for before you join a Safelist Best Safelists
More informationINTERNET SAFETY IS IMPORTANT
INTERNET SAFETY IS IMPORTANT Internet safety is not just the ability to avoid dangerous websites, scams, or hacking. It s the idea that knowledge of how the internet works is just as important as being
More informationSocial Networking Applied
Social Networking Applied 1 I. Facebook Social Networking Applied Uses: An address book: Facebook users can share their current city, e-mail address, phone number, screen name, street address, and birthday
More informationDER GOBBLE. Good Secure Crypto Wallet Practices. What is your wallet?
DER GOBBLE Good Secure Crypto Wallet Practices When it comes to crypto currencies and securing your money, the absolute best 99% guaranteed security for your wallets is YOU. You are the one that will expose
More information3.5 SECURITY. How can you reduce the risk of getting a virus?
3.5 SECURITY 3.5.4 MALWARE WHAT IS MALWARE? Malware, short for malicious software, is any software used to disrupt the computer s operation, gather sensitive information without your knowledge, or gain
More informationUsing web-based
Using web-based Email 1. When you want to send a letter to a friend you write it, put it in an envelope, stamp it and put it in the post box. From there the postman picks it up, takes it to a sorting office
More informationDoctorate of Commissioner Science Thesis on Starting an Online Commissioner Forum. Jim Gray
Doctorate of Commissioner Science Thesis on Starting an Online Commissioner Forum Jim Gray Abstract This Paper is on how to start a Commissioner Forum. The steps I include in here are the ones I used.
More informationOriginal photo by Jonathan Fadden
Original photo by Jonathan Fadden Part 1: The Basics The City is a social network designed to help your church stay connected throughout the week. You'll know who to pray for, what to study, how to serve,
More informationContributing to a Community
Contributing to a Community Contents 2 Contents Contributing to a Community...3 I'm Contributing to a Community, Where Do I Begin?...3 Set Up Your Profile... 4 What Else Can I Do Here?...4 What's My Role
More informationStaying Safe on the Internet. Mark Schulman
Staying Safe on the Internet Mark Schulman 1 Your Presenter Mark Schulman IT professional for almost 40 years No affiliation with any product 2 What We ll Talk About Passwords Email Safety Staying Safe
More information