Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Transcript of DIGITAL WORLD
by Phoebe Quin Crittall and
Maya Lily Payne
When you use the internet you should always be aware of the dangers that could harm you . For example you should always keep your personal information private by clicking the private settings, if you don't, then people can trace your address and could come and find you. You should also never meet up with someone that you met online unless you have evidence that they are real. You should also avoid sending messages that you wouldn't say to someone in real life. For example you would not say 'I hate you' Even if you were saying it in a jokey way because would not be able to tell as they are reading it and don't know how you are saying it. You should also never post any images that you wouldn't want your mum to see. You should avoid sexting and sending nude photos as the people you might send them to could send them on to friends and put them on social media. You should also avoid websites that pop up on your screen saying for example, ' you have won 1000000 pounds!!' but actually it could be a virus or a dodgy website.
If used responsibly, these sites can be a positive and beneficial resource for youth. Too often, however, adolescents include too much personal information, discuss inappropriate behaviors that could get them into trouble, or otherwise place themselves at risk by what they share on their online profiles. You can do this by exposing your personal information out for everyone to comment and read. You can keep all this private information by putting your profile on privet so you are the one that is in control of who can go and look on your profile and pictures.
PIN stands for 'Personal identification Numbers'.
A PIN number is a numeric password shared between a user and a system, that can be used to authenticate the user to the system. Upon receiving the user ID and PIN, the system looks up the PIN based upon the user ID and compares the looked-up PIN with the received PIN. The user is granted access only when the number entered matches with the number stored in the system.
What should you avoid doing?
How can you use social networks safely and responsibly?
Fingerprint scans convert people's
fingerprints into digital codes or numerical
data that can be recorded in a database.
There are many possible biometrics,
including DNA, odor,gait, height,
handwriting, and speech, but
vision-based biometrics use
image sensors and algorithms
derived from machine vision. Applications
for biometrics include controlling access
to a building,authenticating
a user to allow access to some
resource,and identifying a person from
among others (for example, looking
for terrorists at airports).
Encryption is the process of encoding
messages or information in such a waythat only authorized parties can read it.
Encryption does not of itself prevent
interception, but denies the message
content to the interceptor. In public-key encryption schemes, the encryption key is published for anyone to use and encrypt messages. However, only the
receiving party has access to the
decryption key that enablesmessages
to be read.
What are your rights and responsibilities
in a digital world?
Here is a video to see some of the things that you should not do online.
Computer forensics is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the digital information.
Cloud computing means storing and accessing data and programs over the Internet instead of your computer's hard drive. The cloud is just a metaphor for the Internet. It goes back to the days of flowcharts and presentations that would represent the gigantic server-farm infrastructure of the Internet as nothing but a puffy, white cumulonimbus cloud, accepting connections and doling out information as it floats. The 3 most common uses of the cloud is File Storage and Sharing,Cloud Database and CRM( Customer Relationship Management )
The cloud video
How to safe online vidio
This is a course on how to keep your children safe online and what to do if anything happens to your child.
The digital world is a great place. However it is only great if you use it responsibly. You should always use your common sense when you are posting a picture of someone and think whether that person will like you posting it. You also have rights on the internet. If you post something without that persons permission then you could be sent to prison if you are over the age of 10. Data controllers are required to inform their consumers when they collect personal data about them.
Individuals have the right to know the name of the controller, the intended use of the data processing, and to whom the data may be transferred;
Individuals are entitled to ask the data controller whether he is processing personal data about them;
Individuals have the right to receive a copy of the data that relates to them in intelligible form;
Individuals have the right to ask for the deletion, blocking or erasing of the data if it is incomplete, inaccurate or obtained unlawfully. Individuals have the right to object to the processing of personal data.
So stay safe and check twice before you put something online. Remember once something is online it will always be online. be careful you never know who may be watching you
Goodbye and remember