SlideShare a Scribd company logo
1 of 13
Computer etiquette for Ms. Hungerford’s class.
 Netiquette is the use of proper etiquette, or
good manners, on the internet. Netiquette
covers all forms of online communications
such as email, discussion boards, instant
messaging, forums, social networking, and
text messaging.
Check out this video on
YouTube about Netiquette.
Click here
 Online communication can be difficult as you
cannot use facial expressions, body language, or
voice inflection to determine meaning.
 It is often difficult to remember that you are
interacting with real people online, and real
people have real feelings that can be hurt when
netiquette rules aren’t followed.
 According to Emily Post, “Etiquette is the
science of living.” If this is true, then netiquette
is the science of living online. Given that kids
“ages 8 to 18 spend more than seven and a half
hours a day” online, netiquette is as important
as etiquette, but not taught as frequently (Lewin
2010).
Click on the image to watch a
video about the Core Rules of
Netiquette, to learn more about
interacting with others online.
 Always be polite,
courteous, and
respectful to others.
 Avoid the use of
“ALL CAPS” as this
indicates yelling.
 Do not use
profanity.
 Do not respond to
posts or comments
when angry or
upset.
Please use email for private communications. You may email
the instructor at anytime with questions or concerns. Keep in
mind that email is considered a formal means of
communication and the following rules of netiquette apply.
Always include a descriptive subject
line.
Use proper spelling, punctuation, and
grammar.
Proofread and run spell check before
sending messages.
Avoid the use of emoticons and
acronyms.
Reply to email messages promptly.
Discussion boards are used for group communication and discussions about
course topics established by the instructor. Your participation in discussion
boards is required and the quality and quantity of posts will be graded
throughout the course. Although not all discussion posts will be graded, you
should observe the following rules of netiquette when posting to a discussion
board.
Use proper spelling, punctuation,
and grammar.
Proofread and run spell check before
submitting posts.
Keep discussion posts on topic.
Avoid the use of acronyms.
Use emoticons only when necessary
to indicate tone of voice.
Instant messaging and chats are instantaneous and are often
a more informal means of communication. Because of the
nature of this form of communication, the following are
allowed.
Use emoticons and acronyms to
establish tone of voice.
Improper spelling, punctuation and
grammar.
When communicating online, treat
others as you would like to be treated.
“The psychological and emotional outcomes of cyber bullying are similar to
real-life bullying outcomes, except for the reality that with cyber bullying
there is often no escape. School ends at 3 p.m., while the Internet is
available all the time” (http://www.dosomething.org/tipsandtools/11-facts-about-cyber-bullying).
 Nearly 43% of kids have been bullied online. One in four has had it
happen more than once.
 One in three teens has experienced cyber-threats online.
 Nine out of ten middle school students have had their feelings
hurt online.
 About 75% have visited a website bashing another student.
 Four out of ten middle school students have had their password(s)
stolen and changed by a bully who then locked them out of their
own account or sent communications posing as them.
 Over 80% of teens use a cell phone regularly, making it the most
common medium for cyber bullying.
 Girls are about twice as likely as boys to be victims and
perpetrators of cyber bullying.
 90% of victims will not inform a parent or trusted adult of their
abuse. (http://www.dosomething.org/tipsandtools/11-facts-about-cyber-bullying).
Click on the image to be connected to an
online Netiquette scavenger hunt.

More Related Content

What's hot

Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety pptmcmullan
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safetyjaenjenny
 
Digital etiquette 2[1]
Digital etiquette 2[1]Digital etiquette 2[1]
Digital etiquette 2[1]putnamca
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingAntolduvai
 
Robs Power Point
Robs Power PointRobs Power Point
Robs Power Pointyusko1rj
 
The essential rules of netiquette by Halina
The essential rules of netiquette by HalinaThe essential rules of netiquette by Halina
The essential rules of netiquette by HalinaSelf-employed
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette13sh
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital EtiquetteKATRUE01
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquettedhabyahalk
 
Cyberbullying2
Cyberbullying2Cyberbullying2
Cyberbullying2bigmike18
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of NetiquetteLeelet1121
 
Cyber Wellness Power point slides
Cyber Wellness Power point slidesCyber Wellness Power point slides
Cyber Wellness Power point slidesguest7e2cdf
 
Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...
Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...
Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...Kim Wesson
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internetMaricrs Alfarö
 
Internet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, CalebInternet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, Calebguestde489f
 
Internet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, CalebInternet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, Calebguestde489f
 

What's hot (20)

Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safety
 
Uno Digital Etiquette
Uno Digital EtiquetteUno Digital Etiquette
Uno Digital Etiquette
 
Digital etiquette 2[1]
Digital etiquette 2[1]Digital etiquette 2[1]
Digital etiquette 2[1]
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Digital+safety+powerpoint
Digital+safety+powerpointDigital+safety+powerpoint
Digital+safety+powerpoint
 
Robs Power Point
Robs Power PointRobs Power Point
Robs Power Point
 
The essential rules of netiquette by Halina
The essential rules of netiquette by HalinaThe essential rules of netiquette by Halina
The essential rules of netiquette by Halina
 
Parents must know about cyber bullying 1
Parents must know about cyber bullying 1Parents must know about cyber bullying 1
Parents must know about cyber bullying 1
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying2
Cyberbullying2Cyberbullying2
Cyberbullying2
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
Cyber Wellness Power point slides
Cyber Wellness Power point slidesCyber Wellness Power point slides
Cyber Wellness Power point slides
 
Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...
Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...
Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internet
 
Internet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, CalebInternet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, Caleb
 
Internet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, CalebInternet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, Caleb
 

Similar to Ms. Hungerford's Computer Etiquette Class

Digitalcitizenship
DigitalcitizenshipDigitalcitizenship
Digitalcitizenshipcaracutaia
 
cyberbulllying presentation
cyberbulllying presentationcyberbulllying presentation
cyberbulllying presentationrenumann
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet SafetyMark Deming
 
Cyberbullying and Internet Addiction
Cyberbullying and Internet AddictionCyberbullying and Internet Addiction
Cyberbullying and Internet AddictionRossehna Mari Magtoto
 
Craig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-trCraig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-trElmer Sunga
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling finalKaren Brooks
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07E Robertson
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette13sh
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette13sh
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminartholman77
 

Similar to Ms. Hungerford's Computer Etiquette Class (20)

Do U Txt Msg
Do U Txt MsgDo U Txt Msg
Do U Txt Msg
 
Digitalcitizenship
DigitalcitizenshipDigitalcitizenship
Digitalcitizenship
 
cyberbulllying presentation
cyberbulllying presentationcyberbulllying presentation
cyberbulllying presentation
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet Safety
 
ETECH Q1 Wk2.pptx
ETECH Q1 Wk2.pptxETECH Q1 Wk2.pptx
ETECH Q1 Wk2.pptx
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Netiquettes
NetiquettesNetiquettes
Netiquettes
 
Cyberbullying and Internet Addiction
Cyberbullying and Internet AddictionCyberbullying and Internet Addiction
Cyberbullying and Internet Addiction
 
Cyber bully campaign
Cyber bully campaign Cyber bully campaign
Cyber bully campaign
 
Hot topic
Hot topicHot topic
Hot topic
 
Preventing Cyberbullying
Preventing CyberbullyingPreventing Cyberbullying
Preventing Cyberbullying
 
Craig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-trCraig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-tr
 
Cyber bullying gr8
Cyber bullying gr8Cyber bullying gr8
Cyber bullying gr8
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
 
SMS Break up
SMS Break upSMS Break up
SMS Break up
 

More from Ashley Hungerford

More from Ashley Hungerford (7)

Technologyandinquiry
TechnologyandinquiryTechnologyandinquiry
Technologyandinquiry
 
505 rfp
505 rfp505 rfp
505 rfp
 
504synthesispaper
504synthesispaper504synthesispaper
504synthesispaper
 
505ashleyfinalevalreport
505ashleyfinalevalreport505ashleyfinalevalreport
505ashleyfinalevalreport
 
Reading quiz2
Reading quiz2Reading quiz2
Reading quiz2
 
Final id project hungerford
Final id project hungerfordFinal id project hungerford
Final id project hungerford
 
Communication plan 523
Communication plan 523Communication plan 523
Communication plan 523
 

Recently uploaded

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Recently uploaded (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

Ms. Hungerford's Computer Etiquette Class

  • 1. Computer etiquette for Ms. Hungerford’s class.
  • 2.  Netiquette is the use of proper etiquette, or good manners, on the internet. Netiquette covers all forms of online communications such as email, discussion boards, instant messaging, forums, social networking, and text messaging. Check out this video on YouTube about Netiquette. Click here
  • 3.  Online communication can be difficult as you cannot use facial expressions, body language, or voice inflection to determine meaning.  It is often difficult to remember that you are interacting with real people online, and real people have real feelings that can be hurt when netiquette rules aren’t followed.  According to Emily Post, “Etiquette is the science of living.” If this is true, then netiquette is the science of living online. Given that kids “ages 8 to 18 spend more than seven and a half hours a day” online, netiquette is as important as etiquette, but not taught as frequently (Lewin 2010).
  • 4. Click on the image to watch a video about the Core Rules of Netiquette, to learn more about interacting with others online.
  • 5.
  • 6.  Always be polite, courteous, and respectful to others.  Avoid the use of “ALL CAPS” as this indicates yelling.  Do not use profanity.  Do not respond to posts or comments when angry or upset.
  • 7. Please use email for private communications. You may email the instructor at anytime with questions or concerns. Keep in mind that email is considered a formal means of communication and the following rules of netiquette apply. Always include a descriptive subject line. Use proper spelling, punctuation, and grammar. Proofread and run spell check before sending messages. Avoid the use of emoticons and acronyms. Reply to email messages promptly.
  • 8. Discussion boards are used for group communication and discussions about course topics established by the instructor. Your participation in discussion boards is required and the quality and quantity of posts will be graded throughout the course. Although not all discussion posts will be graded, you should observe the following rules of netiquette when posting to a discussion board. Use proper spelling, punctuation, and grammar. Proofread and run spell check before submitting posts. Keep discussion posts on topic. Avoid the use of acronyms. Use emoticons only when necessary to indicate tone of voice.
  • 9. Instant messaging and chats are instantaneous and are often a more informal means of communication. Because of the nature of this form of communication, the following are allowed. Use emoticons and acronyms to establish tone of voice. Improper spelling, punctuation and grammar.
  • 10.
  • 11. When communicating online, treat others as you would like to be treated.
  • 12. “The psychological and emotional outcomes of cyber bullying are similar to real-life bullying outcomes, except for the reality that with cyber bullying there is often no escape. School ends at 3 p.m., while the Internet is available all the time” (http://www.dosomething.org/tipsandtools/11-facts-about-cyber-bullying).  Nearly 43% of kids have been bullied online. One in four has had it happen more than once.  One in three teens has experienced cyber-threats online.  Nine out of ten middle school students have had their feelings hurt online.  About 75% have visited a website bashing another student.  Four out of ten middle school students have had their password(s) stolen and changed by a bully who then locked them out of their own account or sent communications posing as them.  Over 80% of teens use a cell phone regularly, making it the most common medium for cyber bullying.  Girls are about twice as likely as boys to be victims and perpetrators of cyber bullying.  90% of victims will not inform a parent or trusted adult of their abuse. (http://www.dosomething.org/tipsandtools/11-facts-about-cyber-bullying).
  • 13. Click on the image to be connected to an online Netiquette scavenger hunt.