SlideShare a Scribd company logo
1 of 11
Download to read offline
By: David B. Norzelin
What is Netiquette?
             
 Netiquette is plagiarism that is when you copy
  somebody’s work of the Web
 Ex: My friend copied somebody story on the web
  without giving the person who made the story credit
What is Plagiarism?
              
 Plagiarism is when you copy and paste a person’s
  information, without giving the person credit
What are the types of Plagiarism?
                       
 “The Ghost Rider”: Turning somebody work from
  the web, like it is his/hers
 “The Photocopy”: When you copy a copyright photo
Plagiarism is Lazy?
               
 It is lazy because your not using brain or not
  thinking about what could write
Netiquette of confidentiality
                         
 Don't write other's email addresses
 Never give out anything that
 Remember archiving
 Respect copyright
Netiquette of sending
            
 Use descriptive subject lines
 Stay on-topic
 Be careful sending attachments
What is Citation
               
 It is when you tell the people that are reading your
  information that contains other people work
 Ex: My friend always use citation when doesn’t feel
  like thinking
What are the Consequences for
           Plagiarism
                       
 Expulsion from school
 Suspension from school
 Penalty from the law
How to Avoid Plagiarism?
                     
 Find a photo not copyrighted
 When you use somebody’s work online remember
  to give them credit
Reference
                  
 www.plagiarism.org 2009
 http://www.livinginternet.com/i/ia_nq_conf.htm

More Related Content

What's hot

What's hot (20)

INTERNET ETIQUETTE AND NETIQUETTE
INTERNET ETIQUETTE AND NETIQUETTEINTERNET ETIQUETTE AND NETIQUETTE
INTERNET ETIQUETTE AND NETIQUETTE
 
How to avoid plagiarism on your blog {Research Paper}
How to avoid plagiarism on your blog {Research Paper}How to avoid plagiarism on your blog {Research Paper}
How to avoid plagiarism on your blog {Research Paper}
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Netiquette Rules
Netiquette RulesNetiquette Rules
Netiquette Rules
 
Proper Behavior on the Computer
Proper Behavior on the ComputerProper Behavior on the Computer
Proper Behavior on the Computer
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Netiquette
NetiquetteNetiquette
Netiquette
 
The essential rules of netiquette by Halina
The essential rules of netiquette by HalinaThe essential rules of netiquette by Halina
The essential rules of netiquette by Halina
 
Internet etiquette
Internet etiquetteInternet etiquette
Internet etiquette
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Netiquette - Basic Guidelines
Netiquette - Basic GuidelinesNetiquette - Basic Guidelines
Netiquette - Basic Guidelines
 
Netiquette stassie
Netiquette stassieNetiquette stassie
Netiquette stassie
 
Netiquette do’s & don’ts
Netiquette do’s & don’tsNetiquette do’s & don’ts
Netiquette do’s & don’ts
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Plagiarism
Plagiarism Plagiarism
Plagiarism
 
Nettiquette complete
Nettiquette completeNettiquette complete
Nettiquette complete
 
Using the internet safely
Using the internet safelyUsing the internet safely
Using the internet safely
 
Fc5 f143a 14c2-3f0d-1cda962638668b94
Fc5 f143a 14c2-3f0d-1cda962638668b94Fc5 f143a 14c2-3f0d-1cda962638668b94
Fc5 f143a 14c2-3f0d-1cda962638668b94
 
NetiquetteTutorial - Overview
NetiquetteTutorial - OverviewNetiquetteTutorial - Overview
NetiquetteTutorial - Overview
 
Safe and ethical use page
Safe and ethical use pageSafe and ethical use page
Safe and ethical use page
 

Viewers also liked

Jonathan Massey, Occupy Architecture, AHRA2012
Jonathan Massey, Occupy Architecture, AHRA2012Jonathan Massey, Occupy Architecture, AHRA2012
Jonathan Massey, Occupy Architecture, AHRA2012appallingmobile
 
Products catalouges
Products  catalougesProducts  catalouges
Products catalougesautomationa
 
Professional photography
Professional photographyProfessional photography
Professional photographyPC4812
 
Jonathan Massey, Housing Risk
Jonathan Massey, Housing RiskJonathan Massey, Housing Risk
Jonathan Massey, Housing Riskappallingmobile
 
Similar magazines
Similar magazinesSimilar magazines
Similar magazinesPC4812
 
Tugas biologi (power point)
Tugas biologi (power point)Tugas biologi (power point)
Tugas biologi (power point)Michelleregina
 

Viewers also liked (16)

Jonathan Massey, Occupy Architecture, AHRA2012
Jonathan Massey, Occupy Architecture, AHRA2012Jonathan Massey, Occupy Architecture, AHRA2012
Jonathan Massey, Occupy Architecture, AHRA2012
 
elt leanrner
elt leanrnerelt leanrner
elt leanrner
 
Tokugawa lecture part 2
Tokugawa lecture part 2Tokugawa lecture part 2
Tokugawa lecture part 2
 
Why BP?
Why BP?Why BP?
Why BP?
 
Products catalouges
Products  catalougesProducts  catalouges
Products catalouges
 
July august 2012 cover
July august 2012 coverJuly august 2012 cover
July august 2012 cover
 
September october 2012 cover
September  october  2012 coverSeptember  october  2012 cover
September october 2012 cover
 
Toabh talents
Toabh talentsToabh talents
Toabh talents
 
Professional photography
Professional photographyProfessional photography
Professional photography
 
Tokugawa lecture part 1
Tokugawa lecture part 1Tokugawa lecture part 1
Tokugawa lecture part 1
 
Jonathan Massey, Housing Risk
Jonathan Massey, Housing RiskJonathan Massey, Housing Risk
Jonathan Massey, Housing Risk
 
Similar magazines
Similar magazinesSimilar magazines
Similar magazines
 
Tokugawa lecture part 4
Tokugawa lecture part 4Tokugawa lecture part 4
Tokugawa lecture part 4
 
Indigenous research
Indigenous researchIndigenous research
Indigenous research
 
Tokugawa lecture part 3
Tokugawa lecture part 3Tokugawa lecture part 3
Tokugawa lecture part 3
 
Tugas biologi (power point)
Tugas biologi (power point)Tugas biologi (power point)
Tugas biologi (power point)
 

Similar to Don't Be A Fool on The Web

Being wise on the internet
Being wise on the internetBeing wise on the internet
Being wise on the internet_StephanBryant_
 
Xavier Johnson Powerpoint
Xavier Johnson PowerpointXavier Johnson Powerpoint
Xavier Johnson Powerpointxavierjohnson
 
Avoiding plagiarism
Avoiding plagiarismAvoiding plagiarism
Avoiding plagiarismkcarreon
 
Avoiding plagiarism
Avoiding plagiarismAvoiding plagiarism
Avoiding plagiarismNeilfieOrit2
 
Proper behavior on the web
Proper behavior on the webProper behavior on the web
Proper behavior on the webhaleycockrell208
 
Akira simmons netiquette
Akira simmons netiquetteAkira simmons netiquette
Akira simmons netiquetteakirasimmons
 
Digital Citizenship Presentation
Digital Citizenship PresentationDigital Citizenship Presentation
Digital Citizenship Presentationhjhteach
 
Plagiaatinformatica2014 hf
Plagiaatinformatica2014 hfPlagiaatinformatica2014 hf
Plagiaatinformatica2014 hfHans Fransen
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipstephensc
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipstephensc
 
Plagiarism, Types & Consequences by Dr. Sarita Anand
Plagiarism, Types & Consequences by Dr. Sarita AnandPlagiarism, Types & Consequences by Dr. Sarita Anand
Plagiarism, Types & Consequences by Dr. Sarita AnandDr. Sarita Anand
 
How to Behave on the Web
How to Behave on the WebHow to Behave on the Web
How to Behave on the Webdpittmangravity
 
Ahmad stallings plagiarism, copyrighting and netiquette
Ahmad stallings plagiarism, copyrighting and netiquetteAhmad stallings plagiarism, copyrighting and netiquette
Ahmad stallings plagiarism, copyrighting and netiquetteAhmadLT
 
Being smart on the web jah reebarber(ms.whitaker)
Being smart on the web jah reebarber(ms.whitaker)Being smart on the web jah reebarber(ms.whitaker)
Being smart on the web jah reebarber(ms.whitaker)JahReeBarber
 
plagirism.pptx
plagirism.pptxplagirism.pptx
plagirism.pptxOsama Alam
 
Copyright netiquette__and_plagiarism
Copyright  netiquette__and_plagiarismCopyright  netiquette__and_plagiarism
Copyright netiquette__and_plagiarismanikin6000
 
10 slide computer industry project
10 slide computer industry project10 slide computer industry project
10 slide computer industry projectalexismoss
 

Similar to Don't Be A Fool on The Web (20)

Being wise on the internet
Being wise on the internetBeing wise on the internet
Being wise on the internet
 
How To Check If An Essay Is Plagiarized
How To Check If An Essay Is PlagiarizedHow To Check If An Essay Is Plagiarized
How To Check If An Essay Is Plagiarized
 
Xavier Johnson Powerpoint
Xavier Johnson PowerpointXavier Johnson Powerpoint
Xavier Johnson Powerpoint
 
Avoiding plagiarism
Avoiding plagiarismAvoiding plagiarism
Avoiding plagiarism
 
Avoiding plagiarism
Avoiding plagiarismAvoiding plagiarism
Avoiding plagiarism
 
Proper behavior on the web
Proper behavior on the webProper behavior on the web
Proper behavior on the web
 
Akira simmons netiquette
Akira simmons netiquetteAkira simmons netiquette
Akira simmons netiquette
 
Digital Citizenship Presentation
Digital Citizenship PresentationDigital Citizenship Presentation
Digital Citizenship Presentation
 
Plagiarism 202
Plagiarism 202 Plagiarism 202
Plagiarism 202
 
Plagiaatinformatica2014 hf
Plagiaatinformatica2014 hfPlagiaatinformatica2014 hf
Plagiaatinformatica2014 hf
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Plagiarism, Types & Consequences by Dr. Sarita Anand
Plagiarism, Types & Consequences by Dr. Sarita AnandPlagiarism, Types & Consequences by Dr. Sarita Anand
Plagiarism, Types & Consequences by Dr. Sarita Anand
 
How to Behave on the Web
How to Behave on the WebHow to Behave on the Web
How to Behave on the Web
 
Ahmad stallings plagiarism, copyrighting and netiquette
Ahmad stallings plagiarism, copyrighting and netiquetteAhmad stallings plagiarism, copyrighting and netiquette
Ahmad stallings plagiarism, copyrighting and netiquette
 
Essay About What Is Plagiarism
Essay About What Is PlagiarismEssay About What Is Plagiarism
Essay About What Is Plagiarism
 
Being smart on the web jah reebarber(ms.whitaker)
Being smart on the web jah reebarber(ms.whitaker)Being smart on the web jah reebarber(ms.whitaker)
Being smart on the web jah reebarber(ms.whitaker)
 
plagirism.pptx
plagirism.pptxplagirism.pptx
plagirism.pptx
 
Copyright netiquette__and_plagiarism
Copyright  netiquette__and_plagiarismCopyright  netiquette__and_plagiarism
Copyright netiquette__and_plagiarism
 
10 slide computer industry project
10 slide computer industry project10 slide computer industry project
10 slide computer industry project
 

Recently uploaded

20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 

Recently uploaded (20)

20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 

Don't Be A Fool on The Web

  • 1. By: David B. Norzelin
  • 2. What is Netiquette?   Netiquette is plagiarism that is when you copy somebody’s work of the Web  Ex: My friend copied somebody story on the web without giving the person who made the story credit
  • 3. What is Plagiarism?   Plagiarism is when you copy and paste a person’s information, without giving the person credit
  • 4. What are the types of Plagiarism?   “The Ghost Rider”: Turning somebody work from the web, like it is his/hers  “The Photocopy”: When you copy a copyright photo
  • 5. Plagiarism is Lazy?   It is lazy because your not using brain or not thinking about what could write
  • 6. Netiquette of confidentiality   Don't write other's email addresses  Never give out anything that  Remember archiving  Respect copyright
  • 7. Netiquette of sending   Use descriptive subject lines  Stay on-topic  Be careful sending attachments
  • 8. What is Citation   It is when you tell the people that are reading your information that contains other people work  Ex: My friend always use citation when doesn’t feel like thinking
  • 9. What are the Consequences for Plagiarism   Expulsion from school  Suspension from school  Penalty from the law
  • 10. How to Avoid Plagiarism?   Find a photo not copyrighted  When you use somebody’s work online remember to give them credit
  • 11. Reference   www.plagiarism.org 2009  http://www.livinginternet.com/i/ia_nq_conf.htm