e safety n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
VIDEOQWDWEDWEDE PowerPoint Presentation
Download Presentation
VIDEOQWDWEDWEDE

Loading in 2 Seconds...

play fullscreen
1 / 2

VIDEOQWDWEDWEDE - PowerPoint PPT Presentation


  • 0 Views
  • Uploaded on

SDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'VIDEOQWDWEDWEDE' - ddh


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
e safety

E-Safety

powerpoint on e-safety to help stay safe online.

By Amelia and Lina

social media
Social media

Social medias are also a platform for hackers to thrive on. If you use a social media, be sure to keep all of your information private.

Social media is a very popular and loved thing on the internet and it had a broad range of uses, such as sharing images and videos with the world and communicating with friends. Quite often they come with a built in messaging system.

Sites such as Instagram, Facebook, Twitter and others have age restrictions on them to try and reduce the risk of young children seeing inappropriate or upsetting content. However, these constraints can easily be bypassed and the amount of children using social media over their age range has been growing throughout the years.

As innocent as they may seem, social media can pose as a threat to anybody who uses it. In rare situations, the sites and applications can be used by predators in order to gain access into someone else’s life and they could potentially endanger any users of these platforms.