SlideShare a Scribd company logo
1 of 16
Netiquette..
Introduction.
Definition of netiquette.
Basic rules of netiquette.
Types of netiquette.
Conclusion.
   Netiquette began before the 1991 start
    of the World Wide Type.

   Text-based
    email, Telnet, Usenet, Gopher, Wais, and
    FTP from educational and research
    bodies dominated Internet traffic.
DEFINITION OF NETIQUETTE..

  1.A portmanteau of network etiquette or
   internet etiquette.
   2.It is a set of conventions
   that facilitate interaction over networks, raging
   from Usenet and mailing lists to
   blogs and forums.
Research before
Help the newbie.        asking.


Remember emotion.    People aren’t
                     organizations.
1.New users on the internet
   are sometimes called
         "newbie".


     Help the newbie.

         3.Help the newbie as you
          wish you were helped.
Remember
                 emotion..

                          2. Can use
1.Don't use capitals     smiley signal
                         emotions like      3.Be particularly
  unnecessarily in                             polite when
       email           smiles, winks, sa
                       dness, surprise, e   disagreeing with
                              tc.                others.
1. check the files, search
    the internet for the
  answer to a question
 before sending email to
      a human being.
                              RESEARCH
 2.If it turns out that the    BEFORE
question was easily, you       ASKING..
  may annoy the other
 person and embarrass
          your self.
1.Many people send email from their
         work email accounts because that is
          the only email account they have.
            Never assume that a person is
           speaking for the organization that
                     they work for.

           People aren’t
           organizations.
  2.To ensure that people can
  make this distinction, some
   folks put a sentence in the
signature of their email at work.
TYPES OF NETIQUETTE

          3.NETIQUETTE OF
          CONFIDENTIALITY




                 1.NETIQUETTE OF
2.NETIQUETTE         SENDING.
OF REPLYING
Don’t
                         publicize
Remember               other’s email
archiving.              addresses.



                 Netiquette of
                 confidentiality



 Never send                Respect
what you don’t             copyright
    read.                      .
•Netiquette is very important. "when someone
makes a mistake, be kind about it.
•If you do decide to inform
someone of a mistake, point it out politely.
•Never be arrogant or self-righteous about
 the error.
REFERENCE..
http://en.wikipedia.org/wiki/Netiquette

http://www.livinginternet.com/i/ia_nq.htm

http://www.answers.com/topic/netiquette
Netiquette Rules and Guidelines

More Related Content

What's hot

Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Finalguest5a7b36
 
C Senior Presentation: The Internet
C Senior Presentation: The Internet C Senior Presentation: The Internet
C Senior Presentation: The Internet Lingua Net
 
Netiquette and code of conduct in communication
Netiquette and code of conduct in communicationNetiquette and code of conduct in communication
Netiquette and code of conduct in communicationfloresnewcastleeduau
 
The essential rules of netiquette by Halina
The essential rules of netiquette by HalinaThe essential rules of netiquette by Halina
The essential rules of netiquette by HalinaSelf-employed
 
How good are your internet manners proj.
How good are your internet manners proj.How good are your internet manners proj.
How good are your internet manners proj.XxxCelesteTxxX
 
How good are your internet manners proj. slideshare project this one
How good are your internet manners proj. slideshare project this oneHow good are your internet manners proj. slideshare project this one
How good are your internet manners proj. slideshare project this oneXxxCelesteTxxX
 
Netiquette Rules
Netiquette RulesNetiquette Rules
Netiquette RulesRaquelPG96
 
Netiquette
NetiquetteNetiquette
NetiquetteGlory
 
Nettiquette complete
Nettiquette completeNettiquette complete
Nettiquette completeyoochunjjangy
 
Using the internet safely
Using the internet safelyUsing the internet safely
Using the internet safelyinsightmentors
 

What's hot (16)

Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
C Senior Presentation: The Internet
C Senior Presentation: The Internet C Senior Presentation: The Internet
C Senior Presentation: The Internet
 
Netiquette and code of conduct in communication
Netiquette and code of conduct in communicationNetiquette and code of conduct in communication
Netiquette and code of conduct in communication
 
The essential rules of netiquette by Halina
The essential rules of netiquette by HalinaThe essential rules of netiquette by Halina
The essential rules of netiquette by Halina
 
Netiquette do’s & don’ts
Netiquette do’s & don’tsNetiquette do’s & don’ts
Netiquette do’s & don’ts
 
handout
handouthandout
handout
 
How good are your internet manners proj.
How good are your internet manners proj.How good are your internet manners proj.
How good are your internet manners proj.
 
Internet manners
Internet mannersInternet manners
Internet manners
 
How good are your internet manners proj. slideshare project this one
How good are your internet manners proj. slideshare project this oneHow good are your internet manners proj. slideshare project this one
How good are your internet manners proj. slideshare project this one
 
Netiquette Rules
Netiquette RulesNetiquette Rules
Netiquette Rules
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Nettiquette complete
Nettiquette completeNettiquette complete
Nettiquette complete
 
Using the internet safely
Using the internet safelyUsing the internet safely
Using the internet safely
 
CyBeR sAfEtY
CyBeR sAfEtYCyBeR sAfEtY
CyBeR sAfEtY
 
Netiquette
NetiquetteNetiquette
Netiquette
 

Similar to Netiquette Rules and Guidelines

Netiquette office 2007
Netiquette office 2007Netiquette office 2007
Netiquette office 2007left4future
 
2.5 Netiquette
2.5 Netiquette2.5 Netiquette
2.5 Netiquettehazirma
 
FirstQuizITWS01.pptx
FirstQuizITWS01.pptxFirstQuizITWS01.pptx
FirstQuizITWS01.pptxJairoAmigable
 
NETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxNETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxCatherineBagaan
 
The-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfThe-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfMelchorTolentino2
 
L2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxL2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxSheenaAFuentes
 
L2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxL2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxsheena711714
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquetterowenick
 
E-Tech L2 Rules of Netiquette.pptx
E-Tech L2 Rules of Netiquette.pptxE-Tech L2 Rules of Netiquette.pptx
E-Tech L2 Rules of Netiquette.pptxLeah Condina
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquetterowenick
 
L1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdfL1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdfJeth Cuenco
 
1st quiz 250
1st quiz 2501st quiz 250
1st quiz 250jj17ns
 
Digital etiquette for wiki presentation
Digital etiquette for wiki presentationDigital etiquette for wiki presentation
Digital etiquette for wiki presentationDebra Duncan
 
4.1.1 netiquette 2016
4.1.1 netiquette 20164.1.1 netiquette 2016
4.1.1 netiquette 2016dilahkmpk
 

Similar to Netiquette Rules and Guidelines (20)

Netiquette office 2007
Netiquette office 2007Netiquette office 2007
Netiquette office 2007
 
2.5 Netiquette
2.5 Netiquette2.5 Netiquette
2.5 Netiquette
 
FirstQuizITWS01.pptx
FirstQuizITWS01.pptxFirstQuizITWS01.pptx
FirstQuizITWS01.pptx
 
NETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxNETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptx
 
The-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfThe-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdf
 
L2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxL2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptx
 
L2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxL2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptx
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
E-Tech L2 Rules of Netiquette.pptx
E-Tech L2 Rules of Netiquette.pptxE-Tech L2 Rules of Netiquette.pptx
E-Tech L2 Rules of Netiquette.pptx
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
L1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdfL1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdf
 
ETECH Q1 Wk2.pptx
ETECH Q1 Wk2.pptxETECH Q1 Wk2.pptx
ETECH Q1 Wk2.pptx
 
Netiquette2
Netiquette2Netiquette2
Netiquette2
 
Teens on the net
Teens on the netTeens on the net
Teens on the net
 
Netiquette_2
Netiquette_2Netiquette_2
Netiquette_2
 
Film 260
Film 260Film 260
Film 260
 
1st quiz 250
1st quiz 2501st quiz 250
1st quiz 250
 
Digital etiquette for wiki presentation
Digital etiquette for wiki presentationDigital etiquette for wiki presentation
Digital etiquette for wiki presentation
 
Netiquettes
NetiquettesNetiquettes
Netiquettes
 
4.1.1 netiquette 2016
4.1.1 netiquette 20164.1.1 netiquette 2016
4.1.1 netiquette 2016
 

Recently uploaded

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 

Recently uploaded (20)

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 

Netiquette Rules and Guidelines

  • 1.
  • 2. Netiquette.. Introduction. Definition of netiquette. Basic rules of netiquette. Types of netiquette. Conclusion.
  • 3. Netiquette began before the 1991 start of the World Wide Type.  Text-based email, Telnet, Usenet, Gopher, Wais, and FTP from educational and research bodies dominated Internet traffic.
  • 4. DEFINITION OF NETIQUETTE.. 1.A portmanteau of network etiquette or internet etiquette. 2.It is a set of conventions that facilitate interaction over networks, raging from Usenet and mailing lists to blogs and forums.
  • 5. Research before Help the newbie. asking. Remember emotion. People aren’t organizations.
  • 6. 1.New users on the internet are sometimes called "newbie". Help the newbie. 3.Help the newbie as you wish you were helped.
  • 7. Remember emotion.. 2. Can use 1.Don't use capitals smiley signal emotions like 3.Be particularly unnecessarily in polite when email smiles, winks, sa dness, surprise, e disagreeing with tc. others.
  • 8. 1. check the files, search the internet for the answer to a question before sending email to a human being. RESEARCH 2.If it turns out that the BEFORE question was easily, you ASKING.. may annoy the other person and embarrass your self.
  • 9. 1.Many people send email from their work email accounts because that is the only email account they have. Never assume that a person is speaking for the organization that they work for. People aren’t organizations. 2.To ensure that people can make this distinction, some folks put a sentence in the signature of their email at work.
  • 10. TYPES OF NETIQUETTE 3.NETIQUETTE OF CONFIDENTIALITY 1.NETIQUETTE OF 2.NETIQUETTE SENDING. OF REPLYING
  • 11.
  • 12.
  • 13. Don’t publicize Remember other’s email archiving. addresses. Netiquette of confidentiality Never send Respect what you don’t copyright read. .
  • 14. •Netiquette is very important. "when someone makes a mistake, be kind about it. •If you do decide to inform someone of a mistake, point it out politely. •Never be arrogant or self-righteous about the error.