SlideShare a Scribd company logo
1 of 15
Download to read offline
Topic 3




INTERNET TECHNOLOGY

    3.5 NETIQUETTE
Learning Outcome

• At the end of this lesson, students should
  be able to:
  1. Identify the rules of Netiquette
Netiquette - Internet etiquette
Definition:Is the code of acceptable behaviours
  users should follow while on the internet.
1.Is the term for politeness when using the
  Internet.
1.Netiquette, or net etiquette, refers to
  etiquette on the Internet. Good netiquette involves
  respecting others' privacy and not doing anything online that
  will annoy or frustrate other people.
Netiquette

• The areas where good netiquette is highly
  stressed are :
      • World Wide Web
      • E-mail
      • Online Chat (IM or Chat Rooms)
      • Newsgroups and Message Boards
Rules of netiquette

• Rules of netiquette on social interaction and
  communication electronically.

1. Keep messages brief.
• Do not send uncompressed attachment

2. Be clear.
• Make sure subject lines (e-mail) or page title
  (web page) reflects your content.
Subject line must be clear to makesure
receiver want to open that e-mail
Page title must be clear
Rules of netiquette

3. Use appropriate language.
     • Use proper grammar, spelling and punctuation
     • Do not use capital letter.
       (it's equal to shouting or screaming)
     • Use abbreviations and acronym for phrases

      btw          By the way
      imho         In my humble opinion
      fyi          For your information
      tyvm         Thank You Very Much
Rules of netiquette

3. Use appropriate language.
     • Be polite, avoid offensive language
     • Make a good impression – review / edit words
       and images before sending.
Rules of netiquette
4. Be careful when using sarcasm and humor.
      • It might be misinterpreted.
      • Use emotions to express emotion

   :) Smile       :| Indifference   :O Surprised

   :( Frown       : Undecided



5. Avoid sending SPAM
EXAMPLE OF EMOTION FACE
Rules of netiquette
6. Avoid forward chain letter.




7. Avoid sending or posting flames.
8. Never read someone's private email.
9. Clearly identify a spoiler which is a message
  that reveals a solution to a game or ending to a
  movie or program.
Rules of netiquette
10. Read the FAQ (frequently asked questions)
11. Do not assume material is accurate or up to
   date. Be forgiving of others’ mistake.
12. Obey copyright laws
     • Don't use others' images, content, etc without
       permission.
     • Don't forward email, or use website content without
       permission.
13. Cite others' work you use.
Summary
What you have learned:
     Definition of Netiquette                         Rules of Netiquette

Netiquette, which                     Netiquette rules include:
is short for Internet etiquette, is   • Keep messages short,
the code of acceptable behaviors      • Be polite,
users should follow while on the      • Avoid sending flames or spam,
Internet.                             • Use emoticons and acronyms,
                                      • Clearly identify a spoiler,
                                      • Read the Frequently Ask Question(FAQ),
                                      • Do not assume material is accurate or up- to-date,
                                      • Never read someone’s private e-mail.

More Related Content

What's hot

Cyberbullying presentation
Cyberbullying presentationCyberbullying presentation
Cyberbullying presentationclifforddyyy
 
Admshs emp tech_q1_m1_l1-ict
Admshs emp tech_q1_m1_l1-ictAdmshs emp tech_q1_m1_l1-ict
Admshs emp tech_q1_m1_l1-ictDexter Dizon
 
Region4 a-CALABARZON.FESTIVALS,TOURIST SPOTS
Region4 a-CALABARZON.FESTIVALS,TOURIST SPOTSRegion4 a-CALABARZON.FESTIVALS,TOURIST SPOTS
Region4 a-CALABARZON.FESTIVALS,TOURIST SPOTSmekinglove
 
Modifications-to-Mendels-Classic-Ratios.pdf
Modifications-to-Mendels-Classic-Ratios.pdfModifications-to-Mendels-Classic-Ratios.pdf
Modifications-to-Mendels-Classic-Ratios.pdfDyamesTV1
 
Cyber bullying presentation intro
Cyber bullying presentation   introCyber bullying presentation   intro
Cyber bullying presentation introkscheidy
 
Fake news: Identifying, debunking and discussing false narratives with learners
Fake news: Identifying, debunking and discussing false narratives with learnersFake news: Identifying, debunking and discussing false narratives with learners
Fake news: Identifying, debunking and discussing false narratives with learnersLearningandTeaching
 
Love on the web presentation
Love on the web presentationLove on the web presentation
Love on the web presentationValirie Morgan
 
Music Publishing & Copyright Administration In The Internet Age
Music Publishing & Copyright Administration In The Internet AgeMusic Publishing & Copyright Administration In The Internet Age
Music Publishing & Copyright Administration In The Internet AgeDae Bogan
 
Research Design and Methodology, Dr. W.A. Kritsonis
Research Design and Methodology, Dr. W.A. KritsonisResearch Design and Methodology, Dr. W.A. Kritsonis
Research Design and Methodology, Dr. W.A. Kritsonisguestcc1ebaf
 
Totino's Pizza Rolls - Campaign
Totino's Pizza Rolls - CampaignTotino's Pizza Rolls - Campaign
Totino's Pizza Rolls - CampaignLilly Shapiro
 
The 50 most common interview questions
The 50 most common interview questionsThe 50 most common interview questions
The 50 most common interview questionsGabriela Gomez
 
Responsible social media usage
Responsible social media usageResponsible social media usage
Responsible social media usagedemiboyazis
 
Media and information sources
Media and information sourcesMedia and information sources
Media and information sourcesHuggermugger Eran
 
The 9 elements of digital citizenship
The 9 elements of digital citizenshipThe 9 elements of digital citizenship
The 9 elements of digital citizenshipJimPowers
 
Questionnaire Social media as educational tool
Questionnaire Social media as educational toolQuestionnaire Social media as educational tool
Questionnaire Social media as educational toolAnis Safiah
 

What's hot (20)

A SURVEY OF THE PROBLEMS AND CHALLENGES FACED BY UNIVERSITY STUDENTS With par...
A SURVEY OF THE PROBLEMS AND CHALLENGES FACED BY UNIVERSITY STUDENTS With par...A SURVEY OF THE PROBLEMS AND CHALLENGES FACED BY UNIVERSITY STUDENTS With par...
A SURVEY OF THE PROBLEMS AND CHALLENGES FACED BY UNIVERSITY STUDENTS With par...
 
Cyberbullying presentation
Cyberbullying presentationCyberbullying presentation
Cyberbullying presentation
 
Admshs emp tech_q1_m1_l1-ict
Admshs emp tech_q1_m1_l1-ictAdmshs emp tech_q1_m1_l1-ict
Admshs emp tech_q1_m1_l1-ict
 
Region4 a-CALABARZON.FESTIVALS,TOURIST SPOTS
Region4 a-CALABARZON.FESTIVALS,TOURIST SPOTSRegion4 a-CALABARZON.FESTIVALS,TOURIST SPOTS
Region4 a-CALABARZON.FESTIVALS,TOURIST SPOTS
 
Modifications-to-Mendels-Classic-Ratios.pdf
Modifications-to-Mendels-Classic-Ratios.pdfModifications-to-Mendels-Classic-Ratios.pdf
Modifications-to-Mendels-Classic-Ratios.pdf
 
Cyber bullying presentation intro
Cyber bullying presentation   introCyber bullying presentation   intro
Cyber bullying presentation intro
 
Fake news: Identifying, debunking and discussing false narratives with learners
Fake news: Identifying, debunking and discussing false narratives with learnersFake news: Identifying, debunking and discussing false narratives with learners
Fake news: Identifying, debunking and discussing false narratives with learners
 
Reference survey questionnaire
Reference survey questionnaireReference survey questionnaire
Reference survey questionnaire
 
Love on the web presentation
Love on the web presentationLove on the web presentation
Love on the web presentation
 
Music Publishing & Copyright Administration In The Internet Age
Music Publishing & Copyright Administration In The Internet AgeMusic Publishing & Copyright Administration In The Internet Age
Music Publishing & Copyright Administration In The Internet Age
 
Research Design and Methodology, Dr. W.A. Kritsonis
Research Design and Methodology, Dr. W.A. KritsonisResearch Design and Methodology, Dr. W.A. Kritsonis
Research Design and Methodology, Dr. W.A. Kritsonis
 
Research chapters 1 3
Research chapters 1 3Research chapters 1 3
Research chapters 1 3
 
Totino's Pizza Rolls - Campaign
Totino's Pizza Rolls - CampaignTotino's Pizza Rolls - Campaign
Totino's Pizza Rolls - Campaign
 
The 50 most common interview questions
The 50 most common interview questionsThe 50 most common interview questions
The 50 most common interview questions
 
Responsible social media usage
Responsible social media usageResponsible social media usage
Responsible social media usage
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Chapter 4 presentation of data
Chapter 4 presentation of dataChapter 4 presentation of data
Chapter 4 presentation of data
 
Media and information sources
Media and information sourcesMedia and information sources
Media and information sources
 
The 9 elements of digital citizenship
The 9 elements of digital citizenshipThe 9 elements of digital citizenship
The 9 elements of digital citizenship
 
Questionnaire Social media as educational tool
Questionnaire Social media as educational toolQuestionnaire Social media as educational tool
Questionnaire Social media as educational tool
 

Viewers also liked

4.1.1 netiquette 2016
4.1.1 netiquette 20164.1.1 netiquette 2016
4.1.1 netiquette 2016dilahkmpk
 
10 Rules of Netiquette
10 Rules of Netiquette10 Rules of Netiquette
10 Rules of NetiquetteSakuta Riwsie
 
Netiquette
NetiquetteNetiquette
Netiquettepafafo
 
Netiquette - Basic Guidelines
Netiquette - Basic GuidelinesNetiquette - Basic Guidelines
Netiquette - Basic Guidelinesjosbor61
 
Netiquette Rules
Netiquette RulesNetiquette Rules
Netiquette RulesRaquelPG96
 
Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Fizaril Amzari Omar
 

Viewers also liked (7)

4.1.1 netiquette 2016
4.1.1 netiquette 20164.1.1 netiquette 2016
4.1.1 netiquette 2016
 
10 Rules of Netiquette
10 Rules of Netiquette10 Rules of Netiquette
10 Rules of Netiquette
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Netiquette - Basic Guidelines
Netiquette - Basic GuidelinesNetiquette - Basic Guidelines
Netiquette - Basic Guidelines
 
Netiquette Rules
Netiquette RulesNetiquette Rules
Netiquette Rules
 
Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security
 
Netiquette
NetiquetteNetiquette
Netiquette
 

Similar to 2.5 Netiquette

Email and Net Etiquette
Email and Net EtiquetteEmail and Net Etiquette
Email and Net EtiquetteSanu Subham
 
NETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxNETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxCatherineBagaan
 
Netiquitte Slideshow
Netiquitte SlideshowNetiquitte Slideshow
Netiquitte Slideshowalaginess
 
Digital citizenship for Elementary Students
Digital citizenship for Elementary StudentsDigital citizenship for Elementary Students
Digital citizenship for Elementary Studentskgilliard13
 
10 netiquette rules.pptx
10 netiquette rules.pptx10 netiquette rules.pptx
10 netiquette rules.pptxjulitolosbanos
 
Syahira punye
Syahira punyeSyahira punye
Syahira punyeTJKU
 
Netiquette by matthew clower
Netiquette by matthew clowerNetiquette by matthew clower
Netiquette by matthew clowerMarq2014
 
nur syahira nabila
nur syahira nabilanur syahira nabila
nur syahira nabilaTJKU
 

Similar to 2.5 Netiquette (20)

Email and Net Etiquette
Email and Net EtiquetteEmail and Net Etiquette
Email and Net Etiquette
 
NETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxNETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptx
 
Netiquette2
Netiquette2Netiquette2
Netiquette2
 
Netiquitte Slideshow
Netiquitte SlideshowNetiquitte Slideshow
Netiquitte Slideshow
 
Netiquettes
NetiquettesNetiquettes
Netiquettes
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Digital citizenship for Elementary Students
Digital citizenship for Elementary StudentsDigital citizenship for Elementary Students
Digital citizenship for Elementary Students
 
Netiquette_2
Netiquette_2Netiquette_2
Netiquette_2
 
Netiquette
NetiquetteNetiquette
Netiquette
 
10 netiquette rules.pptx
10 netiquette rules.pptx10 netiquette rules.pptx
10 netiquette rules.pptx
 
Syahira punye
Syahira punyeSyahira punye
Syahira punye
 
social-ethics.pptx
social-ethics.pptxsocial-ethics.pptx
social-ethics.pptx
 
Netiquette
NetiquetteNetiquette
Netiquette
 
digicom.pptx
digicom.pptxdigicom.pptx
digicom.pptx
 
Netiquette by matthew clower
Netiquette by matthew clowerNetiquette by matthew clower
Netiquette by matthew clower
 
Netiquette
NetiquetteNetiquette
Netiquette
 
nur syahira nabila
nur syahira nabilanur syahira nabila
nur syahira nabila
 
Netiquette
NetiquetteNetiquette
Netiquette
 

More from hazirma

2.4 and 2.5 types of websites & netiquette
2.4 and 2.5 types of websites & netiquette2.4 and 2.5 types of websites & netiquette
2.4 and 2.5 types of websites & netiquettehazirma
 
2.3 internet service 2.4 types of website
2.3 internet service 2.4 types of website2.3 internet service 2.4 types of website
2.3 internet service 2.4 types of websitehazirma
 
2.2.1.4,2.2.2.2 until2.2.2.4
2.2.1.4,2.2.2.2 until2.2.2.42.2.1.4,2.2.2.2 until2.2.2.4
2.2.1.4,2.2.2.2 until2.2.2.4hazirma
 
2.2.1.2 internet connection and 2.2.1.3 isp
2.2.1.2 internet connection and 2.2.1.3 isp2.2.1.2 internet connection and 2.2.1.3 isp
2.2.1.2 internet connection and 2.2.1.3 isphazirma
 
2.2.1.1 evolution of internet
2.2.1.1 evolution of internet2.2.1.1 evolution of internet
2.2.1.1 evolution of internethazirma
 
2.1.1 network topology
2.1.1 network topology2.1.1 network topology
2.1.1 network topologyhazirma
 
2.4 types of website
2.4 types of website2.4 types of website
2.4 types of websitehazirma
 
Tutorial pdt sem 1
Tutorial pdt sem 1Tutorial pdt sem 1
Tutorial pdt sem 1hazirma
 
3.1.1 computer ethics
3.1.1 computer ethics3.1.1 computer ethics
3.1.1 computer ethicshazirma
 
3.2.2 security measures
3.2.2 security measures3.2.2 security measures
3.2.2 security measureshazirma
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security riskshazirma
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security riskshazirma
 
2.3 the internet services
2.3 the internet services2.3 the internet services
2.3 the internet serviceshazirma
 
2.4 types of website
2.4 types of website2.4 types of website
2.4 types of websitehazirma
 
C topic 3.3 the internet services 2
C topic 3.3 the internet services 2C topic 3.3 the internet services 2
C topic 3.3 the internet services 2hazirma
 
2.2.2.4 Information Searching
2.2.2.4 Information Searching2.2.2.4 Information Searching
2.2.2.4 Information Searchinghazirma
 
2.2.2.2 Web Address
2.2.2.2 Web Address2.2.2.2 Web Address
2.2.2.2 Web Addresshazirma
 
2.2.2.1 Web Browser
2.2.2.1 Web Browser2.2.2.1 Web Browser
2.2.2.1 Web Browserhazirma
 
2.2.1.4 internet address amrizah
2.2.1.4 internet address amrizah2.2.1.4 internet address amrizah
2.2.1.4 internet address amrizahhazirma
 
2.2.2.3 Web Page Navigation
2.2.2.3 Web Page Navigation2.2.2.3 Web Page Navigation
2.2.2.3 Web Page Navigationhazirma
 

More from hazirma (20)

2.4 and 2.5 types of websites & netiquette
2.4 and 2.5 types of websites & netiquette2.4 and 2.5 types of websites & netiquette
2.4 and 2.5 types of websites & netiquette
 
2.3 internet service 2.4 types of website
2.3 internet service 2.4 types of website2.3 internet service 2.4 types of website
2.3 internet service 2.4 types of website
 
2.2.1.4,2.2.2.2 until2.2.2.4
2.2.1.4,2.2.2.2 until2.2.2.42.2.1.4,2.2.2.2 until2.2.2.4
2.2.1.4,2.2.2.2 until2.2.2.4
 
2.2.1.2 internet connection and 2.2.1.3 isp
2.2.1.2 internet connection and 2.2.1.3 isp2.2.1.2 internet connection and 2.2.1.3 isp
2.2.1.2 internet connection and 2.2.1.3 isp
 
2.2.1.1 evolution of internet
2.2.1.1 evolution of internet2.2.1.1 evolution of internet
2.2.1.1 evolution of internet
 
2.1.1 network topology
2.1.1 network topology2.1.1 network topology
2.1.1 network topology
 
2.4 types of website
2.4 types of website2.4 types of website
2.4 types of website
 
Tutorial pdt sem 1
Tutorial pdt sem 1Tutorial pdt sem 1
Tutorial pdt sem 1
 
3.1.1 computer ethics
3.1.1 computer ethics3.1.1 computer ethics
3.1.1 computer ethics
 
3.2.2 security measures
3.2.2 security measures3.2.2 security measures
3.2.2 security measures
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
 
2.3 the internet services
2.3 the internet services2.3 the internet services
2.3 the internet services
 
2.4 types of website
2.4 types of website2.4 types of website
2.4 types of website
 
C topic 3.3 the internet services 2
C topic 3.3 the internet services 2C topic 3.3 the internet services 2
C topic 3.3 the internet services 2
 
2.2.2.4 Information Searching
2.2.2.4 Information Searching2.2.2.4 Information Searching
2.2.2.4 Information Searching
 
2.2.2.2 Web Address
2.2.2.2 Web Address2.2.2.2 Web Address
2.2.2.2 Web Address
 
2.2.2.1 Web Browser
2.2.2.1 Web Browser2.2.2.1 Web Browser
2.2.2.1 Web Browser
 
2.2.1.4 internet address amrizah
2.2.1.4 internet address amrizah2.2.1.4 internet address amrizah
2.2.1.4 internet address amrizah
 
2.2.2.3 Web Page Navigation
2.2.2.3 Web Page Navigation2.2.2.3 Web Page Navigation
2.2.2.3 Web Page Navigation
 

2.5 Netiquette

  • 2. Learning Outcome • At the end of this lesson, students should be able to: 1. Identify the rules of Netiquette
  • 3. Netiquette - Internet etiquette Definition:Is the code of acceptable behaviours users should follow while on the internet. 1.Is the term for politeness when using the Internet. 1.Netiquette, or net etiquette, refers to etiquette on the Internet. Good netiquette involves respecting others' privacy and not doing anything online that will annoy or frustrate other people.
  • 4. Netiquette • The areas where good netiquette is highly stressed are : • World Wide Web • E-mail • Online Chat (IM or Chat Rooms) • Newsgroups and Message Boards
  • 5.
  • 6. Rules of netiquette • Rules of netiquette on social interaction and communication electronically. 1. Keep messages brief. • Do not send uncompressed attachment 2. Be clear. • Make sure subject lines (e-mail) or page title (web page) reflects your content.
  • 7. Subject line must be clear to makesure receiver want to open that e-mail
  • 8. Page title must be clear
  • 9. Rules of netiquette 3. Use appropriate language. • Use proper grammar, spelling and punctuation • Do not use capital letter. (it's equal to shouting or screaming) • Use abbreviations and acronym for phrases btw By the way imho In my humble opinion fyi For your information tyvm Thank You Very Much
  • 10. Rules of netiquette 3. Use appropriate language. • Be polite, avoid offensive language • Make a good impression – review / edit words and images before sending.
  • 11. Rules of netiquette 4. Be careful when using sarcasm and humor. • It might be misinterpreted. • Use emotions to express emotion :) Smile :| Indifference :O Surprised :( Frown : Undecided 5. Avoid sending SPAM
  • 13. Rules of netiquette 6. Avoid forward chain letter. 7. Avoid sending or posting flames. 8. Never read someone's private email. 9. Clearly identify a spoiler which is a message that reveals a solution to a game or ending to a movie or program.
  • 14. Rules of netiquette 10. Read the FAQ (frequently asked questions) 11. Do not assume material is accurate or up to date. Be forgiving of others’ mistake. 12. Obey copyright laws • Don't use others' images, content, etc without permission. • Don't forward email, or use website content without permission. 13. Cite others' work you use.
  • 15. Summary What you have learned: Definition of Netiquette Rules of Netiquette Netiquette, which Netiquette rules include: is short for Internet etiquette, is • Keep messages short, the code of acceptable behaviors • Be polite, users should follow while on the • Avoid sending flames or spam, Internet. • Use emoticons and acronyms, • Clearly identify a spoiler, • Read the Frequently Ask Question(FAQ), • Do not assume material is accurate or up- to-date, • Never read someone’s private e-mail.