Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged Doors

Rss Feed Group items tagged

solospiders

Front Door Wreath - 0 views

  •  
    This Front Door Wreath is very cute & well made! I have searched for a wreath like this in various stores, but this one is by far more affordable. The leaves are full & bright. It seems to durable & holds up in windy weather. The Babys Breath wreath with plastic green and pink Babys Breath leaves and sturdy plastic ring backing,UV resistant Wreath, Green Colors,realistic and natural.We use plentiful artificial Gypsophila branches with mini green leaves for the extra full look! This wreath would look beautiful against your front door or even displayed on a covered patio. It really adds a nice color & look to my front door
wasifali

Ironing Board for small space - 0 views

image

Ironing Board

started by wasifali on 18 Jun 23 no follow-up yet
wasifali

Ironing Board for small space - 0 views

image

Ironing Board

started by wasifali on 18 Jun 23 no follow-up yet
Steven Knight

The Door That's Not Locked - 8 views

  •  
    The web is a wonderful place, if you understand the dangers. While the Internet is an open door to a world of great information, communication and entertainment, it can also be a direct passageway to danger. The Canadian Centre is committed to helping parents, teachers, and anyone else who would like to better understand the good, bad, and ugly about the web. We're here to help keep kids safe while exploring and enjoying The Door that's not Locked. This website has been created to provide you with a one-stop-shop on all things related to Internet safety.
  •  
    All Web. No Net.
  •  
    This is a great site. No nonsense advice. I really like how it is broken down in age groups, which helps you to understand how children become more sophisticated in their Internet use. Thanks Steve for sharing it!
Anne Bubnic

FactCheckED.org - 0 views

  •  
    The Internet can be a rich and valuable source of information - and an even richer source of misinformation. Sorting out the valuable claims from the worthless ones is tricky, since at first glance a Web site written by an expert can look a lot like one written by your next-door neighbor. This lesson offers students background and practice in determining authority on the Internet - how to tell whether an author has expertise or not, and whether you're getting the straight story.
  •  
    The Internet can be a rich and valuable source of information - and an even richer source of misinformation. Sorting out the valuable claims from the worthless ones is tricky, since at first glance a Web site written by an expert can look a lot like one written by your next-door neighbor. This lesson offers students background and practice in determining authority on the Internet - how to tell whether an author has expertise or not, and whether you're getting the straight story.
  •  
    The Internet can be a rich and valuable source of information - and an even richer source of misinformation. Sorting out the valuable claims from the worthless ones is tricky, since at first glance a Web site written by an expert can look a lot like one written by your next-door neighbor. This lesson offers students background and practice in determining authority on the Internet - how to tell whether an author has expertise or not, and whether you're getting the straight story.
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • ...3 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Anne Bubnic

DeLand teen gets probation for threatening school assault - 0 views

  • He was originally charged with conspiracy to commit murder. On Friday, Circuit Judge Hubert L. Grimes sentenced him to probation, which could last until he turns 19. He was accused of making threats on MySpace, where his page showed a tombstone, satanic references and admiration for the shooters in the 1999 massacre at Columbine High School in Colorado, authorities said. Through instant messages on MySpace to another student, he also threatened to lock the cafeteria doors during one of the lunch periods and shoot everyone inside, authorities said.
  • boy used his MySpace page to react against the intense bullying at the middle school, which left him in fear. The boy has said that one of the bullies threatened to slit his throat.
  •  
    A 14-year old boy was accused of making threats on MySpace, where his page showed a tombstone, satanic references and admiration for the shooters in the 1999 massacre at Columbine High School in Colorado, authorities said. Through instant messages on MySpace to another student, he also threatened to lock the cafeteria doors during one of the lunch periods and shoot everyone inside, authorities said. In lieu of imprisonment, the student has been transferred to an alternative facility and is prohibited from logging onto MySpace or Facebook or making contact with students from his former school. The boy's attorney said the boy used his MySpace page to react against intense bullying at the middle school, which left him in fear. The boy has said that one of the bullies threatened to slit his throat.
Anne Bubnic

Predators use gaming consoles to 'get foot in the door' - 0 views

  •  
    Sexual predators are using gaming consoles such as the Wii, PlayStation and Xbox to meet children online. "Child predators are migrating from traditional methods to alternate media," says Detective Lt. Thomas Kish of the Michigan State Police. "They are going to places where children are." Predators view games that allow kids to access the Internet and text message other players as a "foot in the door," he says.
cpdesigns

HIA Melbourne Home Show - cpdesigns - CP Designs & Applications - 0 views

  •  
    In 2017 after a trip to Greece, Ilias a born Cretan and Cherrie an Interior Designer fell in love with the beauty and style of these never before seen Doors & Architraves, so much so that they had to introduce them to their home of Australia & to the New Zealand market. After making contact & hellip Continue reading HIA Melbourne Home Show & cpdesigns
Anne Bubnic

Letters To A Bullied Girl: Messages of Healing & Hope [New Book] - 0 views

  • Olivia Gardner, a teenager from Northern California, had been severely bullied in school. After reading of her ordeal in a local newspaper, we were shocked. Olivia had endured so much pain. Her book bag had been dragged through the mud, her schoolmates had created an "Olivia's Haters" page on the internet, and they would whisper "Die Olivia" to her in the halls. Olivia's story broke our hearts, especially when we learned that she was suicidal. We couldn't imagine such cruelty.
  • livia's story moved us, and a spark ignited between us - we both recognized that there was something that had to be done about this situation. We knew we couldn't be bystanders. We organized a letter-writing campaign and asked our friends to write letters of encouragement to Olivia. These messages of healing and hope were the least we could send to Olivia to let her know that she was not alone and that we were thinking about her and hoping she would get better.
  • Heartfelt, honest and powerful letters started pouring in. And then came the media requests. The more attention the "Olivia's Letters" project got, the more letters we received. Suddenly, we were thrust into the world of bullying, as we read the letters sent to Olivia by former bullies and targets of these bullies. We learned of the remorse adults felt having been bullies themselves in their teen years, and of the depression the targets of bullies still experience years after they have been bullied. Thousands of letters from all over the country and even the world flooded into Olivia's mailbox, each offering a unique perspective on courage and compassion.
  • ...2 more annotations...
  • We could never have predicted what a great and widespread response our little project to help one girl would receive. In a matter of a few weeks we became activists. Today, as the authors of the book Letters to a Bullied Girl: Messages of Healing and Hope, a compilation of some of the most revealing letters sent to Olivia, we are hopeful that the letter-writers' message to end the vicious cycle of bullying will continue to spread
  • As the letters in this book prove, bullying has serious consequences. We can no longer turn away or sit idly by as our peers are bullied so severely and relentlessly that they are forced to withdraw, isolate themselves and even turn to suicide. Our book is dedicated to Corinne Sides, who committed suicide as a result of bullying, and there are pages of letters from others who attempted suicide to escape their bullies.
  •  
    As teens across the country head back to school this year, far too many of them are facing the entrance doors to their schools with feelings of fear, trepidation and dread. For an increasing number of students across the nation, schooldays are filled with the never-ending cycle of taunting and abuse from their bullies. But this year, in an unprecedented display of solidarity, thousands of strangers who have been through the same harrowing experiences, are sharing their private tales of torment with these teens for the first time ever because of the story of Olivia Gardner.
Anne Bubnic

The Internet Protectors Launches First Online Cybersecurity Information Community - Tec... - 0 views

  •  
    The Internet Protectors(TM) today opened its doors to computer users looking for non-technical help in learning about and protecting themselves against the security risks that plague Internet users today. The Internet Protectors (TIP) website (http://www.TheInternetProtectors.com) provides a neutral environment where users can ask questions of topic experts, research different aspects of security in a library of podcasts, videos, and white papers, read and subscribe to blogs on multiple security topics, discuss security issues in forums, and more.
Anne Bubnic

How To Stop Cyber-Bullying - 0 views

  • Yet with so many different types of cyberbullying, ranging from online impersonation to e-mail hacking and distributing embarrassing materials about a person, it can be difficult for kids, let alone those trying to help them, to know how to respond and stop the 21st century bully in his or her tracks. "Awareness about the issue is high, but awareness about what to do when it happens is mixed," says Michele Ybarra, president and research director for Internet Solutions for Kids (ISK) and an adjunct faculty member at Johns Hopkins School of Public Health.
  • Research suggests that those on the receiving end of traditional bullying may be more likely to cyberbully as a form of retaliation. Kids involved in the more severe instances of cyberbullying also tend to have more psychosocial problems, exhibiting aggression, getting in trouble at school and having poor relationships with their parents, says Nancy Willard, an expert on cyberbullying and author of Cyberbullying and Cyberthreats. And while traditional bullying appears to peak in middle school and drop off as kids reach high school, cyberbullying tends to slightly increase among kids in high school, a trend researchers can't yet explain.
  • One of the tricky things about helping cyberbullying targets is that they aren't always willing to talk about the problem. Teens often cite a fear of having their Internet privileges revoked as a reason for keeping quiet, Agatston says. Kids who receive threatening messages in school may not divulge what's happened for fear of getting in trouble, since many schools ban use of cellphones during the day. To get around that problem, Willard recommends having a frank discussion with your children about cyberbullying before it happens.
  • ...1 more annotation...
  • Research is also beginning to show that just like traditional forms of bullying, cyberbullying can lead to anxiety, lower rates of self-esteem and higher rates of school absence, says Patti Agatston, a licensed professional counselor with the Prevention/Intervention Center, a student assistance program serving more than 100 schools in suburban Atlanta, Ga.
  •  
    Kids can be mean.\n\nIt's a fact of life we've all experienced. Gone are the days, however, when avoiding a bully meant ducking out of the back door at school. Thanks to personal computers, cellphones and instant messaging, it's now easier than ever for children to attack each other, often anonymously.
Marie Coppolaro

The Facts about Online Sex Abuse and Schools - 0 views

  •  
    We can never eliminate all risk; but there are ways to maximize our students' safety while using these incredibly powerful tools. Each tool needs to be analyzed individually to ascertain its benefits and the specific risks it might present. From there, thoughtful people can find solutions to the student safety issues that may arise.\nAs educational leaders we need \nto be safety conscious. We need to be prudent, reasonable; but we won't live in \nfear and we won't act from fear.\nIt is by opening doors, not closing \nthem that we create new possibilities for our children and new futures for \nourselves.
Anne Bubnic

Some ways to use student cell phones in class - 0 views

  • She purchased a clear, over-the-door shoe organizer for her classroom wall. She has each of her students deposit their cell phones into one of the compartments at the beginning of class and retrieve them on their way out the door at the end of class.
  •  
    Ideas for using mobile technology in the classroom.
Anne Bubnic

Back to School Tips| Americans for Technology Leadership - 0 views

  • Cyberbullying Cyberbullying or online bullying is repeated, unwanted or cruel behavior against someone through computers, cell phones, gaming consoles, or other Internet-based means. The Internet is always “on,” opening the door for 24-hour harassment. Cyberbullies can be anonymous. They never have to confront their victims, they don’t have to be physically stronger and cyberbullies may be virtually invisible to parents and adults.
  • Look for warning signs your child may be the victim of cyberbullying – depression, lack of interest in school and friends, drop in grades and subtle comments that something may be wrong. If your child is the victim of cyberbullying, take action. By filtering email, instant messages and text messages, you can cut off many of the ways the cyberbullies contact your child. By having your child avoid the sites and groups where the attacks occur, he/she can ignore the bully. If harassment continues, change your child’s email address, user names and Internet account. If these steps do not stop the cyberbullying, contact the parents of the child who is behind the bullying, contact the school, and if the situation is not resolved, involve the police. It’s important to compile copies of harassing emails and postings to have evidence for authorities or the school, so they can take action. Look for signs that your child may be the cyberbully themselves – if they sign onto the Internet under someone else’s name, if they use someone else’s password without their permission, if they posted rude or mean things about someone else online, if they use bad language online, or if they changed their profile or away message designed to embarrass or frighten someone. Talk to your kids about cyberbullying and why it’s wrong and hurtful.
  •  
    As children go back to school, many parents are concerned about how their children will be using the computer and Internet devices in the classroom. Communication is key. Parents need to talk with their children about how to use the Internet safely, potential threats and appropriate usage of the Internet. By understanding both the benefits and the risks of Internet use, families can have a safer and more secure online experience. This article includes key tips on cyberbullying, internet safety, privacy and security.
Anne Bubnic

Twitter and Plurk: What Parents Should Know - 0 views

  • While there is nothing inherently dangerous in the sites themselves, there is the risk that teens could use microblogs to reveal personal information or engage in a relationship with someone whose intentions are less than honorable. And like any other form of communication, the door is open for a teen to take risks such as talking about sex with strangers (albeit in relatively short bursts) or getting together with someone they meet through a microblog.
  •  
    Services like Twitter and Plurk let people post very short messages (140 characters or less) to their friends and acquaintances. Founded in 2006, Twitter has attracted millions of users who keep people posted about what they're doing and thinking. It can be as simple as "I'm standing in line at the grocery store" to as profound as a quick comment about a political candidate, a world event or a new book. There's even a video spin-off of this concept called 12 Seconds that allows people to post video clips no longer than 12 seconds.
Anne Bubnic

Nonprofit Distributes File Sharing Propaganda to 50,000 U.S. Students - 0 views

  • But the story line here is a miscarriage of justice at best -- even erroneously describing file sharing as a city crime punishable by up to two years in prison.
  • The purpose is basically to educate kids -- middle school and high school-aged about how the justice system operates and about what really goes on in the courtroom as opposed to what you see on television," said Lorri Montgomery, the center's communications director.
  • The piracy story has two plots. One is of the file sharer's grandmother fighting eminent domain proceedings to keep her house while Megan the criminal file sharer deals with the charges against her
  • ...1 more annotation...
  • The story is simple: Megan learns to download music from a friend. About 2,000 downloads and three months later, a police officer from the fictitious City of Arbor knocks on her door and hands her a criminal summons to appear in court.
  •  
    "The Case of Internet Piracy" was developed by judges and professors to teach students about the law and the courtroom experience.
adjustingto6figu

Insurance Adjusters and Back-Door Company Deals - 0 views

  •  
    One of the main qualities that insurance adjusters or an independent claims adjuster needs to have is to be trustworthy. Ethics play a major role in any business, and especially when it comes to insurance claims. Fraud in this industry can sometimes be written off as a "victimless" crime which is not necessarily true, as other insureds are footing the bill for the insurance companies' losses. If an adjuster is committing fraud or trying to scam the system and earn extra money, he is hurting everyone who uses that insurance company
elevencart

Best Kids Cars in india Shop Now At 11Cart.com - 1 views

Buy Kids Electric Cars Online. Biggest Range of Children's Electric Ride-On Cars, Motorbikes, Jeeps, Quads, Tractors & Scooters in India. Kids Electric Cars at Internet Prices! Welcome to 11Cart ...

social networking

started by elevencart on 29 Nov 21 no follow-up yet
1 - 20 of 21 Next ›
Showing 20 items per page