it project
The topics will be
explained
 Introduction to the project.
 Definition of the project.
 The benefits and importance of the project.
 Risks to children
 Working principle.
-- Send the record mechanism
 Project issues.
 Comparison between ancient and modern
surveillance.
 Cost project
Introduction to the project.
This project is designed to take account of
children aged between 6 to 15.
This project focused on this particular category
because it is the first category trying to learn
computer tampering in its components and at
various sites on the Internet
Definition of the project.
Child protection code:: where was working on a
project to protect children because children age can
talk that is the age required for protection, this
project aims to protect them when browsing the
Internet, the application will send the record to the
guardian to be aware of the actions of his son
The benefits and importance
of the project.
User application: is a person aged between 6 to 15 years
 Designed to protect children because they are the only
age doesn't realize what to do plus it is easy to be
dropped or messing around in his head without knowing it
 It is designed to find out what parents do their children so
parents feel comfortable and trust their children younger
Risks to children
 Visiting sites inappropriate for the age of the child
 Child luring and blackmailing
 Subjected to sexual exploitation or for the case of
usurpation of his childhood and his behavior and
pleaded not guilty.
 The exploitation and trafficking of children
 Defamation and threatening to publish photos of girls on
the Internet with the aim of harming their reputations.
Indeed, the risk of children in
Palestine
This project is used to protect children from danger
because we are against the occupation society operates the
enemy to choose children to help them and do
impressment lies through some things that don't have the
Web methods that are easy to reach anyone, whether from
the same country or in another country
Working principle.
 Project work method starts when the child opens
the Web browser and the user is prompted to enter
his mark to begin the work of the programme.
 Then follow the program to the child enters the
pages on the Web and checking if these pages do
not constitute harm to the child, it enters and
enjoys use
 If these pages constitute a danger to the child, it
works to send data to the parent of the child to tell
him what his browsing the child and then doing a
block sites automatically so as not to hurt the child
 Send the record to the Smartphone
To send log information to the guardian of the
child by text message or through a notice
 Send registry smart clock
Send true green, this indicates that the child is
safe
Or send false in red indicate that the child is in
danger
 Send log via email to guardian
Send the record mechanism
Project issues.
 Did not encounter any problems in the
project except for the problem of
identification of the way in which know
user code if a kid or not?
 But with ongoing research and the
introduction of computer teachers been
prey solve this problem through a
fingerprint scanner
Photo show fear and parental
control
The difference in the exchange
of children from harmful
websites
Cost project
‫المتطلب‬‫التكلفة‬
Microsoft access database20.00$
Smart phone14.99$
Smart clock13.99$
‫المستخدم‬ ‫بصمة‬ ‫لفحص‬ ‫جهاز‬18.75$
Users-
Gmail- or email-
‫المجموع‬76.73
it project
Team::
Bessan zead irtaish
Abdullah Ibrahim Al-Roumi
By:: Dr. Nabil hasasneh

More Related Content

PPTX
report writing
PPT
Benefitsandhazards
PPTX
Cyber saftey for parents
PPT
Protecting Your Child Online
PPTX
Student privacy and technology
PPTX
Case Study - Age Restrictions
PDF
CEDWW Albury Deanery PD day - Growing up digital
PPTX
10 questions for LAFOIP in the classroom
report writing
Benefitsandhazards
Cyber saftey for parents
Protecting Your Child Online
Student privacy and technology
Case Study - Age Restrictions
CEDWW Albury Deanery PD day - Growing up digital
10 questions for LAFOIP in the classroom

Viewers also liked (9)

PDF
2015 Upload Campaigns Calendar - SlideShare
PPTX
What to Upload to SlideShare
PDF
Getting Started With SlideShare
PPT
Computer Memory
PPTX
Computer memory
PDF
You Suck At PowerPoint!
PDF
Masters of SlideShare
PDF
10 Ways to Win at SlideShare SEO & Presentation Optimization
PDF
How To Get More From SlideShare - Super-Simple Tips For Content Marketing
2015 Upload Campaigns Calendar - SlideShare
What to Upload to SlideShare
Getting Started With SlideShare
Computer Memory
Computer memory
You Suck At PowerPoint!
Masters of SlideShare
10 Ways to Win at SlideShare SEO & Presentation Optimization
How To Get More From SlideShare - Super-Simple Tips For Content Marketing
Ad

Similar to it project (20)

PDF
Report: A Model For Remote Parental Control System Using Smartphones
PPTX
Child Safety monitoring system using php and mysql
PPTX
cse-csp batch4 review-1.1.pptx cyber security
PPTX
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
PPT
Internet Safety for Parents
PPTX
Children-safety-online-Presentation.pptx
PDF
Fife College, French Toast Mafia, Apps for Good Presentation
PPTX
Protection of children over the internet
PDF
PPTX
Privacy and protection of children in relation raudhat
PPTX
PDF
Network Project Report
PDF
Perspectives on project based teaching and “blended learning” to develop ethi...
PPTX
Age verification in real time keeping children safe online biometric solution
PPTX
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
PPT
East Lothian June Internet Safety Talks Slideshare
PDF
Cybercrimes (Against Children)
PPTX
cybercrime.pptx
PPTX
CYBER CRIME AGAINST CHILDREN_2
Report: A Model For Remote Parental Control System Using Smartphones
Child Safety monitoring system using php and mysql
cse-csp batch4 review-1.1.pptx cyber security
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
Internet Safety for Parents
Children-safety-online-Presentation.pptx
Fife College, French Toast Mafia, Apps for Good Presentation
Protection of children over the internet
Privacy and protection of children in relation raudhat
Network Project Report
Perspectives on project based teaching and “blended learning” to develop ethi...
Age verification in real time keeping children safe online biometric solution
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
East Lothian June Internet Safety Talks Slideshare
Cybercrimes (Against Children)
cybercrime.pptx
CYBER CRIME AGAINST CHILDREN_2
Ad

More from abdullah roomi (10)

PPTX
PPTX
PPTX
Emulation-based SW protection
PDF
Network File System (NFS)
PDF
RSS Application Using Dom
PPTX
Security in Windows operating system
DOCX
Wireless Sensor Networks
PPTX
Mobile Forensics
PPTX
Nginx as a Revers Proxy for Apache on Ubuntu
Emulation-based SW protection
Network File System (NFS)
RSS Application Using Dom
Security in Windows operating system
Wireless Sensor Networks
Mobile Forensics
Nginx as a Revers Proxy for Apache on Ubuntu

Recently uploaded (20)

PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
August Patch Tuesday
PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
PDF
Hindi spoken digit analysis for native and non-native speakers
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
CloudStack 4.21: First Look Webinar slides
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
Group 1 Presentation -Planning and Decision Making .pptx
O2C Customer Invoices to Receipt V15A.pptx
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
A review of recent deep learning applications in wood surface defect identifi...
August Patch Tuesday
Web Crawler for Trend Tracking Gen Z Insights.pptx
Hindi spoken digit analysis for native and non-native speakers
Chapter 5: Probability Theory and Statistics
observCloud-Native Containerability and monitoring.pptx
sustainability-14-14877-v2.pddhzftheheeeee
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Getting started with AI Agents and Multi-Agent Systems
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Module 1.ppt Iot fundamentals and Architecture
1 - Historical Antecedents, Social Consideration.pdf
CloudStack 4.21: First Look Webinar slides
Benefits of Physical activity for teenagers.pptx
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Univ-Connecticut-ChatGPT-Presentaion.pdf

it project

  • 2. The topics will be explained  Introduction to the project.  Definition of the project.  The benefits and importance of the project.  Risks to children  Working principle. -- Send the record mechanism  Project issues.  Comparison between ancient and modern surveillance.  Cost project
  • 3. Introduction to the project. This project is designed to take account of children aged between 6 to 15. This project focused on this particular category because it is the first category trying to learn computer tampering in its components and at various sites on the Internet
  • 4. Definition of the project. Child protection code:: where was working on a project to protect children because children age can talk that is the age required for protection, this project aims to protect them when browsing the Internet, the application will send the record to the guardian to be aware of the actions of his son
  • 5. The benefits and importance of the project. User application: is a person aged between 6 to 15 years  Designed to protect children because they are the only age doesn't realize what to do plus it is easy to be dropped or messing around in his head without knowing it  It is designed to find out what parents do their children so parents feel comfortable and trust their children younger
  • 6. Risks to children  Visiting sites inappropriate for the age of the child  Child luring and blackmailing  Subjected to sexual exploitation or for the case of usurpation of his childhood and his behavior and pleaded not guilty.  The exploitation and trafficking of children  Defamation and threatening to publish photos of girls on the Internet with the aim of harming their reputations.
  • 7. Indeed, the risk of children in Palestine This project is used to protect children from danger because we are against the occupation society operates the enemy to choose children to help them and do impressment lies through some things that don't have the Web methods that are easy to reach anyone, whether from the same country or in another country
  • 8. Working principle.  Project work method starts when the child opens the Web browser and the user is prompted to enter his mark to begin the work of the programme.  Then follow the program to the child enters the pages on the Web and checking if these pages do not constitute harm to the child, it enters and enjoys use  If these pages constitute a danger to the child, it works to send data to the parent of the child to tell him what his browsing the child and then doing a block sites automatically so as not to hurt the child
  • 9.  Send the record to the Smartphone To send log information to the guardian of the child by text message or through a notice  Send registry smart clock Send true green, this indicates that the child is safe Or send false in red indicate that the child is in danger  Send log via email to guardian Send the record mechanism
  • 10. Project issues.  Did not encounter any problems in the project except for the problem of identification of the way in which know user code if a kid or not?  But with ongoing research and the introduction of computer teachers been prey solve this problem through a fingerprint scanner
  • 11. Photo show fear and parental control
  • 12. The difference in the exchange of children from harmful websites
  • 13. Cost project ‫المتطلب‬‫التكلفة‬ Microsoft access database20.00$ Smart phone14.99$ Smart clock13.99$ ‫المستخدم‬ ‫بصمة‬ ‫لفحص‬ ‫جهاز‬18.75$ Users- Gmail- or email- ‫المجموع‬76.73
  • 15. Team:: Bessan zead irtaish Abdullah Ibrahim Al-Roumi By:: Dr. Nabil hasasneh