© mr s haughton 2009. complete this table. digital communication tools/websites ways the...
TRANSCRIPT
![Page 1: © Mr S Haughton 2009. Complete this table. Digital Communication Tools/Websites Ways the Communication Tools are Used](https://reader035.vdocument.in/reader035/viewer/2022062806/5697bfc71a28abf838ca7ee3/html5/thumbnails/1.jpg)
© Mr S Haughton 2009
![Page 2: © Mr S Haughton 2009. Complete this table. Digital Communication Tools/Websites Ways the Communication Tools are Used](https://reader035.vdocument.in/reader035/viewer/2022062806/5697bfc71a28abf838ca7ee3/html5/thumbnails/2.jpg)
Complete this table.
Digital Communication Tools/Websites
Ways the Communication Tools
are Used
![Page 3: © Mr S Haughton 2009. Complete this table. Digital Communication Tools/Websites Ways the Communication Tools are Used](https://reader035.vdocument.in/reader035/viewer/2022062806/5697bfc71a28abf838ca7ee3/html5/thumbnails/3.jpg)
There can be many risks with using digital communication devices. Can you match up each hazard with its definition?
A nasty program that can damage your computer and
files on it.People sending unkind or nasty
messages.
A message trying to sell you products or persuade you to
visit their website.
People logging onto a site pretending to be you (e.g. to
steal or change your information).
Identity FraudCyber-BullyingSpamVirus
![Page 4: © Mr S Haughton 2009. Complete this table. Digital Communication Tools/Websites Ways the Communication Tools are Used](https://reader035.vdocument.in/reader035/viewer/2022062806/5697bfc71a28abf838ca7ee3/html5/thumbnails/4.jpg)
Which conversation do you think it is safer to trust?
Face-to-FaceConversations
Internet Conversations
Both
Sort the statements to compare an online and offline conversation.
![Page 5: © Mr S Haughton 2009. Complete this table. Digital Communication Tools/Websites Ways the Communication Tools are Used](https://reader035.vdocument.in/reader035/viewer/2022062806/5697bfc71a28abf838ca7ee3/html5/thumbnails/5.jpg)
Ways I can keep safe online.