SlideShare a Scribd company logo
1 of 28
NETIQUETTES
EMPOWERMENT TECHNOLOGIES
OBJECTIVES
1. Determine the fundamental
netiquette rules.
2. Understand the significance of
online safety, security, ethics, and
etiquette guidelines.
NETIQUETTE
Netiquette, or network etiquette, is
concerned with the "proper" manner
of communication in the online
environment.
INTERNET SAFETY
It refers to the online security and
safety of people and their
information when using internet.
Core Rules of Netiquette
Rule 1: Remember the Human
When communicating electronically,
whether through email, instant
message, discussion post, text, or
another method, practice the
Golden Rule: Do unto others as
you would have others do unto
you.
Rule 2: Adhere to the same standards of behavior
online that you follow in real life
You should do your best to act within
the laws and ethical manners of
society whenever you inhabit
"cyberspace."
Rule 3: Know where you are in cyberspace
"Netiquette varies from domain to
domain." (Shea, 1994) Depending
on where you are in the virtual world,
the same written communication can
be acceptable in one area, where it
might be considered inappropriate in
another.
Rule 4: Respect other people's time and bandwidth
Electronic communication takes time:
time to read and time in which to
respond. Most people today lead busy
lives, just like you do, and don't have
time to read or respond to frivolous
emails or discussion posts.
Rule 5: Make yourself look good online
 Always check for spelling and
grammar errors
 Know what you're talking about and
state it clearly
 Be pleasant and polite
Rule 6: Share expert knowledge
The Internet offers its users many
benefits; one is the ease in which
information can be shared or accessed,
and in fact, this "information sharing"
capability is one of the reasons the
Internet was founded.
Rule 7: Help keep flame wars under control
"Flaming is what people do when they
express a strongly held opinion without
holding back any emotion
“Flame Wars," when two or three
people exchange angry posts between
one another, must be controlled, or the
camaraderie of the group could be
compromised.
Rule 8: Respect other people's privacy
Be sure to err on the side of caution
when deciding to discuss or not to
discuss virtual communication.
Rule 9: Don't abuse your power
Like in face-to-face situations, there are
people in cyberspace who have more
"power" than others. They have more
expertise in technology or have years of
experience in a particular skill or subject
matter.
Rule 10: Be forgiving of other people's mistakes
Not everyone has the same amount of experience
working in the virtual world. And not everyone knows
the rules of Netiquette. At some point, you will see a
stupid question, read an unnecessarily long
response, or encounter misspelled words; when this
happens, practice kindness and forgiveness as you
would hope someone would do if you had committed
the same offense. If it's a minor "offense," you might
want to let it slide. If you feel compelled to respond to
a mistake, do so in a private email rather than a
public forum.
Thumbs Up, if you agree with the
statement, and Thumbs Down, if
you disagree.
Remember your audience. If you
are putting something on a web
page remember that everyone in
the world will have access to it.
It is ok to constantly give our
friends e-mail or items online which
they do not need.
If someone uses offensive
language online, always respond
and not worry as no one knows
who you are online.
Letting people know your birthday
is probably a must if you want to
get as many gifts as possible. But
having it in your profile makes you
vulnerable to identity theft.
There is a danger in posting
information about a future vacation.
You are responsible for your
actions on the internet.
If someone insults and uses
offensive language towards you
online, you should reply in the
same manner.
If someone insults and uses
offensive language towards you
online, you should reply in the
same manner.
You received an email stating that
your mother's bank account is
going to be forfeited if you do not
respond to the email. Is it safe to
reply?
You and your best friend play a lot of
video games. One time, she asks you
for your password so she can help you
level up and get in-game money. She
promises to keep your password a
secret. Is it okay to give away your
password?
Let's Reflect!
Make a reflection on the importance of using Netiquette in your daily life. As a students,
what benefits can you get from it? How can you promote the use of these regulations?

More Related Content

What's hot

10 netiquette rules.pptx
10 netiquette rules.pptx10 netiquette rules.pptx
10 netiquette rules.pptxjulitolosbanos
 
Empowerment Technologies Lecture 6 (Philippines SHS)
Empowerment Technologies Lecture 6 (Philippines SHS)Empowerment Technologies Lecture 6 (Philippines SHS)
Empowerment Technologies Lecture 6 (Philippines SHS)John Bosco Javellana, MAEd.
 
Emp tech q2_m12_l1_multimedia_and_ict_fv
Emp tech q2_m12_l1_multimedia_and_ict_fvEmp tech q2_m12_l1_multimedia_and_ict_fv
Emp tech q2_m12_l1_multimedia_and_ict_fvVivienPastores1
 
L15 The Disadvantages of ICT.pptx
L15 The Disadvantages of ICT.pptxL15 The Disadvantages of ICT.pptx
L15 The Disadvantages of ICT.pptxBenjieBarlaan
 
MODULE 1: INTRODUCTION TO INFORMATION AND COMMUNICATION TECHNOLOGY
MODULE 1: INTRODUCTION TO INFORMATION AND COMMUNICATION TECHNOLOGYMODULE 1: INTRODUCTION TO INFORMATION AND COMMUNICATION TECHNOLOGY
MODULE 1: INTRODUCTION TO INFORMATION AND COMMUNICATION TECHNOLOGYJayRasonable1
 
Empowerment Technologies - Module 6
Empowerment Technologies - Module 6Empowerment Technologies - Module 6
Empowerment Technologies - Module 6Jesus Rances
 
7 Imaging and Design for the Online Environment
7 Imaging and Design for the Online Environment7 Imaging and Design for the Online Environment
7 Imaging and Design for the Online EnvironmentTeodoro Llanes II
 
Netiquette
NetiquetteNetiquette
Netiquettejoapur
 
Rules of netiquette
Rules of netiquetteRules of netiquette
Rules of netiquetteklknight79
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2alicelagajino
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesMark Jhon Oxillo
 
Contextualized online-search-and-research-skills
Contextualized online-search-and-research-skillsContextualized online-search-and-research-skills
Contextualized online-search-and-research-skillsJohnBarsaga
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internetMaricrs Alfarö
 
WEB 2.0, WEB 3.0 and User Participation in the Web
WEB 2.0, WEB 3.0 and User Participation in the WebWEB 2.0, WEB 3.0 and User Participation in the Web
WEB 2.0, WEB 3.0 and User Participation in the WebRonaLouiseQuitoriano
 
ICT a Medium for Advocacy and Development Communication
ICT a Medium for Advocacy and Development CommunicationICT a Medium for Advocacy and Development Communication
ICT a Medium for Advocacy and Development CommunicationFrancineEspineda
 
Collaborative Development of ICT Content.pptx
Collaborative Development of ICT Content.pptxCollaborative Development of ICT Content.pptx
Collaborative Development of ICT Content.pptxCheeneeRivera
 
E-Tech L15 The Disadvantages of ICT.pptx
E-Tech L15 The Disadvantages of ICT.pptxE-Tech L15 The Disadvantages of ICT.pptx
E-Tech L15 The Disadvantages of ICT.pptxLeah Condina
 

What's hot (20)

10 netiquette rules.pptx
10 netiquette rules.pptx10 netiquette rules.pptx
10 netiquette rules.pptx
 
Empowerment Technologies Lecture 6 (Philippines SHS)
Empowerment Technologies Lecture 6 (Philippines SHS)Empowerment Technologies Lecture 6 (Philippines SHS)
Empowerment Technologies Lecture 6 (Philippines SHS)
 
Emp tech q2_m12_l1_multimedia_and_ict_fv
Emp tech q2_m12_l1_multimedia_and_ict_fvEmp tech q2_m12_l1_multimedia_and_ict_fv
Emp tech q2_m12_l1_multimedia_and_ict_fv
 
L15 The Disadvantages of ICT.pptx
L15 The Disadvantages of ICT.pptxL15 The Disadvantages of ICT.pptx
L15 The Disadvantages of ICT.pptx
 
Netiquette do’s & don’ts
Netiquette do’s & don’tsNetiquette do’s & don’ts
Netiquette do’s & don’ts
 
MODULE 1: INTRODUCTION TO INFORMATION AND COMMUNICATION TECHNOLOGY
MODULE 1: INTRODUCTION TO INFORMATION AND COMMUNICATION TECHNOLOGYMODULE 1: INTRODUCTION TO INFORMATION AND COMMUNICATION TECHNOLOGY
MODULE 1: INTRODUCTION TO INFORMATION AND COMMUNICATION TECHNOLOGY
 
Empowerment Technologies - Module 6
Empowerment Technologies - Module 6Empowerment Technologies - Module 6
Empowerment Technologies - Module 6
 
7 Imaging and Design for the Online Environment
7 Imaging and Design for the Online Environment7 Imaging and Design for the Online Environment
7 Imaging and Design for the Online Environment
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Rules of netiquette
Rules of netiquetteRules of netiquette
Rules of netiquette
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
ICT_Q2_WEEK 1.pptx
ICT_Q2_WEEK 1.pptxICT_Q2_WEEK 1.pptx
ICT_Q2_WEEK 1.pptx
 
Contextualized online-search-and-research-skills
Contextualized online-search-and-research-skillsContextualized online-search-and-research-skills
Contextualized online-search-and-research-skills
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internet
 
WEB 2.0, WEB 3.0 and User Participation in the Web
WEB 2.0, WEB 3.0 and User Participation in the WebWEB 2.0, WEB 3.0 and User Participation in the Web
WEB 2.0, WEB 3.0 and User Participation in the Web
 
ICT a Medium for Advocacy and Development Communication
ICT a Medium for Advocacy and Development CommunicationICT a Medium for Advocacy and Development Communication
ICT a Medium for Advocacy and Development Communication
 
Collaborative Development of ICT Content.pptx
Collaborative Development of ICT Content.pptxCollaborative Development of ICT Content.pptx
Collaborative Development of ICT Content.pptx
 
E-Tech L15 The Disadvantages of ICT.pptx
E-Tech L15 The Disadvantages of ICT.pptxE-Tech L15 The Disadvantages of ICT.pptx
E-Tech L15 The Disadvantages of ICT.pptx
 

Similar to Netiquettes.pptx

Presentation (2).pptx e-tech
Presentation (2).pptx e-techPresentation (2).pptx e-tech
Presentation (2).pptx e-techTrexie9
 
CAS110 Netiquette PPT when using the internet
CAS110 Netiquette PPT when using the internetCAS110 Netiquette PPT when using the internet
CAS110 Netiquette PPT when using the internetHendrixAntonniAmante
 
The 10 commandments of the common computer (1)
The 10 commandments of the common computer (1)The 10 commandments of the common computer (1)
The 10 commandments of the common computer (1)MudgeoTorso1091
 
Media and Information Literacy Netiquette
Media and Information Literacy NetiquetteMedia and Information Literacy Netiquette
Media and Information Literacy NetiquetteJPAballe
 
Internet etiquette
Internet etiquetteInternet etiquette
Internet etiquetteAdy Setiawan
 
Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104Marvin Broñoso
 
The-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfThe-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfMelchorTolentino2
 
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdfW3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdfCedLinc
 
Digital etiquette for wiki presentation
Digital etiquette for wiki presentationDigital etiquette for wiki presentation
Digital etiquette for wiki presentationDebra Duncan
 
online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdfjessa451416
 
Netiquette
NetiquetteNetiquette
Netiquettejcdmce
 
Lesson 2 jerry dennis
Lesson 2 jerry dennisLesson 2 jerry dennis
Lesson 2 jerry dennisdensio123
 
The Do's and DONT's of Internet
The Do's and DONT's of InternetThe Do's and DONT's of Internet
The Do's and DONT's of Internetjoy santos
 

Similar to Netiquettes.pptx (20)

Netiquette
NetiquetteNetiquette
Netiquette
 
Netiquette mine
Netiquette mineNetiquette mine
Netiquette mine
 
ETECH Q1 Wk2.pptx
ETECH Q1 Wk2.pptxETECH Q1 Wk2.pptx
ETECH Q1 Wk2.pptx
 
Presentation (2).pptx e-tech
Presentation (2).pptx e-techPresentation (2).pptx e-tech
Presentation (2).pptx e-tech
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Netiquettes
NetiquettesNetiquettes
Netiquettes
 
CAS110 Netiquette PPT when using the internet
CAS110 Netiquette PPT when using the internetCAS110 Netiquette PPT when using the internet
CAS110 Netiquette PPT when using the internet
 
The 10 commandments of the common computer (1)
The 10 commandments of the common computer (1)The 10 commandments of the common computer (1)
The 10 commandments of the common computer (1)
 
Netiquette.ppt
Netiquette.pptNetiquette.ppt
Netiquette.ppt
 
Media and Information Literacy Netiquette
Media and Information Literacy NetiquetteMedia and Information Literacy Netiquette
Media and Information Literacy Netiquette
 
Internet etiquette
Internet etiquetteInternet etiquette
Internet etiquette
 
Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104
 
The-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfThe-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdf
 
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdfW3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
 
Net project
Net projectNet project
Net project
 
Digital etiquette for wiki presentation
Digital etiquette for wiki presentationDigital etiquette for wiki presentation
Digital etiquette for wiki presentation
 
online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdf
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Lesson 2 jerry dennis
Lesson 2 jerry dennisLesson 2 jerry dennis
Lesson 2 jerry dennis
 
The Do's and DONT's of Internet
The Do's and DONT's of InternetThe Do's and DONT's of Internet
The Do's and DONT's of Internet
 

Recently uploaded

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 

Recently uploaded (20)

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 

Netiquettes.pptx

  • 2. OBJECTIVES 1. Determine the fundamental netiquette rules. 2. Understand the significance of online safety, security, ethics, and etiquette guidelines.
  • 3.
  • 4. NETIQUETTE Netiquette, or network etiquette, is concerned with the "proper" manner of communication in the online environment.
  • 5. INTERNET SAFETY It refers to the online security and safety of people and their information when using internet.
  • 6. Core Rules of Netiquette
  • 7. Rule 1: Remember the Human When communicating electronically, whether through email, instant message, discussion post, text, or another method, practice the Golden Rule: Do unto others as you would have others do unto you.
  • 8. Rule 2: Adhere to the same standards of behavior online that you follow in real life You should do your best to act within the laws and ethical manners of society whenever you inhabit "cyberspace."
  • 9. Rule 3: Know where you are in cyberspace "Netiquette varies from domain to domain." (Shea, 1994) Depending on where you are in the virtual world, the same written communication can be acceptable in one area, where it might be considered inappropriate in another.
  • 10. Rule 4: Respect other people's time and bandwidth Electronic communication takes time: time to read and time in which to respond. Most people today lead busy lives, just like you do, and don't have time to read or respond to frivolous emails or discussion posts.
  • 11. Rule 5: Make yourself look good online  Always check for spelling and grammar errors  Know what you're talking about and state it clearly  Be pleasant and polite
  • 12. Rule 6: Share expert knowledge The Internet offers its users many benefits; one is the ease in which information can be shared or accessed, and in fact, this "information sharing" capability is one of the reasons the Internet was founded.
  • 13. Rule 7: Help keep flame wars under control "Flaming is what people do when they express a strongly held opinion without holding back any emotion “Flame Wars," when two or three people exchange angry posts between one another, must be controlled, or the camaraderie of the group could be compromised.
  • 14. Rule 8: Respect other people's privacy Be sure to err on the side of caution when deciding to discuss or not to discuss virtual communication.
  • 15. Rule 9: Don't abuse your power Like in face-to-face situations, there are people in cyberspace who have more "power" than others. They have more expertise in technology or have years of experience in a particular skill or subject matter.
  • 16. Rule 10: Be forgiving of other people's mistakes Not everyone has the same amount of experience working in the virtual world. And not everyone knows the rules of Netiquette. At some point, you will see a stupid question, read an unnecessarily long response, or encounter misspelled words; when this happens, practice kindness and forgiveness as you would hope someone would do if you had committed the same offense. If it's a minor "offense," you might want to let it slide. If you feel compelled to respond to a mistake, do so in a private email rather than a public forum.
  • 17. Thumbs Up, if you agree with the statement, and Thumbs Down, if you disagree.
  • 18. Remember your audience. If you are putting something on a web page remember that everyone in the world will have access to it.
  • 19. It is ok to constantly give our friends e-mail or items online which they do not need.
  • 20. If someone uses offensive language online, always respond and not worry as no one knows who you are online.
  • 21. Letting people know your birthday is probably a must if you want to get as many gifts as possible. But having it in your profile makes you vulnerable to identity theft.
  • 22. There is a danger in posting information about a future vacation.
  • 23. You are responsible for your actions on the internet.
  • 24. If someone insults and uses offensive language towards you online, you should reply in the same manner.
  • 25. If someone insults and uses offensive language towards you online, you should reply in the same manner.
  • 26. You received an email stating that your mother's bank account is going to be forfeited if you do not respond to the email. Is it safe to reply?
  • 27. You and your best friend play a lot of video games. One time, she asks you for your password so she can help you level up and get in-game money. She promises to keep your password a secret. Is it okay to give away your password?
  • 28. Let's Reflect! Make a reflection on the importance of using Netiquette in your daily life. As a students, what benefits can you get from it? How can you promote the use of these regulations?