SlideShare a Scribd company logo
2
Most read
3
Most read
6
Most read
MISUSE
OF
INTERNET
NAME:- VAISHNAVI SHARAD PALKAR
STD:- S.Y.Bcom DIV:- A
COLLEGE:- Bharat College of Arts and
Commerce
WHAT IS INTERNET
The Internet is the biggest world-wide
communication network of computers. The
Internet has millions of smaller domestic,
academic, business, and government networks,
which together carry many different kinds of
information. The short form of internet is the
'net'. ... It is used by billions of people all over the
world.
 INCREASING CONTROL OF TECHNOLOGY
OVER OUR LIFE
Our overdependence on technology has led to
several problems. Mobile phones and the Internet are
two good example. People spend too much time on
the net, doing nothing. Also, the Internet and the
Mobile phones make people spend less time talking
face to face. This can be a serious problem because
people get used to talking via Mobile phones or
Internet every time and later they can have problems
to express themselves in person.
INTERNET SERVICES
• WWW
• Webpage / Homepage
• Web Publishing
• Web Browser
• Search Engine
• Protocol
• Internet Protocol
• DNS
• HTTP
• URL
• HTML
• ISP
• E-mail
• Newsgroup
• Video Conferencing
• FTP
• Telnet
• Forum
USES OF INTERNET
Some Important current strategic of the internet are :
• On-line communication.
• Software sharing.
• Exchange of views on topics of
common interest.
• Posting of information of general
interest.
• Organization promotion.
• Product promotion and feedback
about products.
• Customer support service.
• Online Journals, Magazines, encyclopedia, and Dictionary.
• Online Shopping.
• World-wide Conferencing.
MISUSES OF INTERNET
Piracy
Identity Theft
Cyber Bullying
Fake Advertisements
Hacker
Time Wastage
Cybercrime
Online piracy is the practice of downloading and distributing
copyrighted content digitally without permission, such as
music or software. The principle behind piracy has predated
the creation of the Internet, but its online popularity
arose alongside the internet.
PIRACY
Identity theft occurs when an unauthorized party uses your
personally identifying information, such as your name,
address, Social Security Number (SSN), or credit card or
bank account information to assume your identity in
order to commit fraud or other criminal acts .
IDENTITY THEFT
Cyber bullying is bullying that takes place over
digital devices like cell phones, computers, and
tablets. ... Cyber bullying includes sending, posting,
or sharing negative, harmful, false, or mean
content about someone else.
CYBER BULLYING
FAKE ADVERTISEMENTS
Hackers use fake advertisements to get your bank
details . etc
A hacker is an individual who uses computer,
networking or other skills to overcome a technical
problem. The term hacker may refer to anyone with
technical skills, but it often refers to a person who
uses his or her abilities to gain unauthorized
access to systems or networks in order to
commit crimes.
HACKER
Technology may have made many tasks simpler, but it has
also increased distractions You've probably noticed that
while you can get many things done faster than ever, you
spend a great deal of time doing nothing of worth. It's called
“cyber loafing”—the act of wasting time on the Internet
TIME WASTAGE
CYBERCRIME
Any Criminal activity that uses a computer either as
an instrumentality, target means for perpetuating
further crimes come within the ambit of cyber crime.
It includes hacking, cyber Frauds, phishing,
spamming, computer virus.
CONCLUSION
• On one hand make best use of internet with careful
planning and proper management, putting a
business on the internet can make it more effective
and productive.
• However understanding and knowing how the rapid
changes and various complex issues that can be
encounter in getting the business on to the net is
imperative to its success.
QUOTE
“The Internet is like alcohol in some sense. It
accentuates what you would do anyway. If
you want to be a loner, you can be more
alone. If you want to connect , it makes it
easier to connect.”
-Esther Dyson
THANKYOU

More Related Content

PPTX
How to stay safe online
PPT
Social Media Safety Presentation
PPT
Social media & cyber crime
PPTX
Cyber Crime Awareness.pptx
PDF
Cyber safety tips
PPTX
Social Media Awareness
PPS
Internet safety
PPTX
Digital privacy
How to stay safe online
Social Media Safety Presentation
Social media & cyber crime
Cyber Crime Awareness.pptx
Cyber safety tips
Social Media Awareness
Internet safety
Digital privacy

What's hot (20)

PPT
Misuse of Internet
PPTX
Cyber Security in Society
PPTX
Misuse of internet - ppt
PPTX
Cyber crime presentation school level
PPTX
advantages and disadvantages of internet
PPT
Cyber Crime and Security
PPTX
Cyber Crime and Security
PPTX
Cyber crime and security
PPTX
Cybercrime & Security
PPTX
Cybercrime Awareness
PPTX
cyber security
PPSX
Internet ,merits demerits, features
PPTX
Internet safety
PPTX
Cyber Security
PPTX
Cyber Crime
PPTX
Cyber crime and security ppt
PPTX
Cyber crime
PPTX
Cyber crime ppt
PPTX
Cybercrime and security
PPT
Cyber Wars And Cyber Terrorism
Misuse of Internet
Cyber Security in Society
Misuse of internet - ppt
Cyber crime presentation school level
advantages and disadvantages of internet
Cyber Crime and Security
Cyber Crime and Security
Cyber crime and security
Cybercrime & Security
Cybercrime Awareness
cyber security
Internet ,merits demerits, features
Internet safety
Cyber Security
Cyber Crime
Cyber crime and security ppt
Cyber crime
Cyber crime ppt
Cybercrime and security
Cyber Wars And Cyber Terrorism
Ad

Similar to Misuse of Internet (20)

PPTX
Internet cybercrime,ebanking and security
PPTX
cyber safety_grade11cse_afsheen,vishal.pptx
PPTX
Exploring the Internet Advantages, Disadvantages, and Cybercrime Awareness.pptx
PPTX
The disadvantages of ict
PDF
ICT, the Self, and Society.pdf
PPTX
Cyber Safety ppt.pptx
PPTX
The disadvantage of ict.pptx
PDF
cybersecurityawareness-presentation-170627121043.pdf
PPSX
Cyber security awareness presentation
PPTX
Cyber Safety Class 9
PDF
Cyber Crime Types & Tips
PPTX
cyber-crimghgirrif8eieifififejwjdjes.pptx
PPTX
Cyber Safety & Cyber Crimes by me.pptx
PPTX
Empowerment Technology, Laws and codes. Lesson 2.pptx
PPTX
Cyber Crime & Precautions
PPTX
Empowerment Technology Lesson 15aSWQEFRCWAZCFgftsadddddfweweczf
PPTX
Cyber crime
PPT
cyber ethics
PPT
L2 Rules of Netiquette in Empowerment technology
PPTX
Cyber Crime
Internet cybercrime,ebanking and security
cyber safety_grade11cse_afsheen,vishal.pptx
Exploring the Internet Advantages, Disadvantages, and Cybercrime Awareness.pptx
The disadvantages of ict
ICT, the Self, and Society.pdf
Cyber Safety ppt.pptx
The disadvantage of ict.pptx
cybersecurityawareness-presentation-170627121043.pdf
Cyber security awareness presentation
Cyber Safety Class 9
Cyber Crime Types & Tips
cyber-crimghgirrif8eieifififejwjdjes.pptx
Cyber Safety & Cyber Crimes by me.pptx
Empowerment Technology, Laws and codes. Lesson 2.pptx
Cyber Crime & Precautions
Empowerment Technology Lesson 15aSWQEFRCWAZCFgftsadddddfweweczf
Cyber crime
cyber ethics
L2 Rules of Netiquette in Empowerment technology
Cyber Crime
Ad

Recently uploaded (20)

PPTX
Lesson notes of climatology university.
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
Classroom Observation Tools for Teachers
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
RMMM.pdf make it easy to upload and study
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
Cell Types and Its function , kingdom of life
PPTX
Presentation on HIE in infants and its manifestations
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
Institutional Correction lecture only . . .
PDF
Complications of Minimal Access Surgery at WLH
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
O7-L3 Supply Chain Operations - ICLT Program
Lesson notes of climatology university.
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Anesthesia in Laparoscopic Surgery in India
Classroom Observation Tools for Teachers
VCE English Exam - Section C Student Revision Booklet
RMMM.pdf make it easy to upload and study
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Cell Types and Its function , kingdom of life
Presentation on HIE in infants and its manifestations
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Institutional Correction lecture only . . .
Complications of Minimal Access Surgery at WLH
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Microbial disease of the cardiovascular and lymphatic systems
Supply Chain Operations Speaking Notes -ICLT Program
Module 4: Burden of Disease Tutorial Slides S2 2025
O7-L3 Supply Chain Operations - ICLT Program

Misuse of Internet

  • 1. MISUSE OF INTERNET NAME:- VAISHNAVI SHARAD PALKAR STD:- S.Y.Bcom DIV:- A COLLEGE:- Bharat College of Arts and Commerce
  • 2. WHAT IS INTERNET The Internet is the biggest world-wide communication network of computers. The Internet has millions of smaller domestic, academic, business, and government networks, which together carry many different kinds of information. The short form of internet is the 'net'. ... It is used by billions of people all over the world.
  • 3.  INCREASING CONTROL OF TECHNOLOGY OVER OUR LIFE Our overdependence on technology has led to several problems. Mobile phones and the Internet are two good example. People spend too much time on the net, doing nothing. Also, the Internet and the Mobile phones make people spend less time talking face to face. This can be a serious problem because people get used to talking via Mobile phones or Internet every time and later they can have problems to express themselves in person.
  • 4. INTERNET SERVICES • WWW • Webpage / Homepage • Web Publishing • Web Browser • Search Engine • Protocol • Internet Protocol • DNS • HTTP • URL • HTML • ISP • E-mail • Newsgroup • Video Conferencing • FTP • Telnet • Forum
  • 5. USES OF INTERNET Some Important current strategic of the internet are : • On-line communication. • Software sharing. • Exchange of views on topics of common interest. • Posting of information of general interest. • Organization promotion. • Product promotion and feedback about products. • Customer support service. • Online Journals, Magazines, encyclopedia, and Dictionary. • Online Shopping. • World-wide Conferencing.
  • 6. MISUSES OF INTERNET Piracy Identity Theft Cyber Bullying Fake Advertisements Hacker Time Wastage Cybercrime
  • 7. Online piracy is the practice of downloading and distributing copyrighted content digitally without permission, such as music or software. The principle behind piracy has predated the creation of the Internet, but its online popularity arose alongside the internet. PIRACY
  • 8. Identity theft occurs when an unauthorized party uses your personally identifying information, such as your name, address, Social Security Number (SSN), or credit card or bank account information to assume your identity in order to commit fraud or other criminal acts . IDENTITY THEFT
  • 9. Cyber bullying is bullying that takes place over digital devices like cell phones, computers, and tablets. ... Cyber bullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone else. CYBER BULLYING
  • 10. FAKE ADVERTISEMENTS Hackers use fake advertisements to get your bank details . etc
  • 11. A hacker is an individual who uses computer, networking or other skills to overcome a technical problem. The term hacker may refer to anyone with technical skills, but it often refers to a person who uses his or her abilities to gain unauthorized access to systems or networks in order to commit crimes. HACKER
  • 12. Technology may have made many tasks simpler, but it has also increased distractions You've probably noticed that while you can get many things done faster than ever, you spend a great deal of time doing nothing of worth. It's called “cyber loafing”—the act of wasting time on the Internet TIME WASTAGE
  • 13. CYBERCRIME Any Criminal activity that uses a computer either as an instrumentality, target means for perpetuating further crimes come within the ambit of cyber crime. It includes hacking, cyber Frauds, phishing, spamming, computer virus.
  • 14. CONCLUSION • On one hand make best use of internet with careful planning and proper management, putting a business on the internet can make it more effective and productive. • However understanding and knowing how the rapid changes and various complex issues that can be encounter in getting the business on to the net is imperative to its success.
  • 15. QUOTE “The Internet is like alcohol in some sense. It accentuates what you would do anyway. If you want to be a loner, you can be more alone. If you want to connect , it makes it easier to connect.” -Esther Dyson