SlideShare a Scribd company logo
1 of 12
• Online security, safety, and ethics
• Internet threats
• Protecting reputations online
• Copyright
• Contextualized online search and
research skills
Rules of Netiquette
At the end of this lesson, the students should be able to:
1. consider one’s and others’ safety when sharing
information using the Internet;
2. consider one’s and others’ reputation when using the
Internet;
3. determine and avoid the dangers of the Internet;
4. be responsible in the use of social networking sites; and
5. browse the Internet efficiently and properly through
proper referencing.
The Internet, truly, is a powerful tool. It
can be used to promote your business,
gain new friends, and stay in touch with
the old ones. It is also a source of
entertainment. But like most things in this
world, there is always “another side of
the coin.” The Internet is one of the most
dangerous places, especially if you do
not know what you are doing.
Internet safety, or online safety is the
knowledge of maximizing the user’s
personal safety and security risks to
private information and property
associated with using the internet,
and the self-protection form
computer crime in general.
Internet Threats:
1. Malware – stands for malicious software.
a. Virus- malicious program designed to replicate
itself and transfer from one computer to
another.(flash drives,CD’s and Internet) .
b. Worm- malicious program that transfers from one
computer to another by any type of
means.(computer network).
c. Trojan- malicious program that is disguised as a
useful program but once downloaded and
installed,leaves your PC unprotected and allows
hackers to get your information.
*Rogue security software – tricks the user into
posing that is security software.
d. Spyware – a program that runs in the background without
you knowing it ”spy”. Ability to monitor what you are currently
doing and typing.
* Keyloggers – used to record the keystroke done by the
user.Done to steal password and information.
e. Adware- a program designed to send you
advertisements,mostly pop-ups.
2. Spam – unwanted email mostly from bots or advertisers. It
can be used to send malware.
3. Phishing – Its goal is to acquire sensitive personal
information like passwords and credit card details.
* Pharming – a more complicated way of phishing where it
exploits the DNS (Domain Name System)
Think Before You Click
1. Before you post something on the web, ask these questions
to yourself: Would you want your parents or grandparents to see
it? Would you want your future boss to see it? Once you post
something on the web, you have no control of who sees your
posts.
2. Your friends depend on you to protect their reputation online.
Talk to your friends about this serious responsibility.
3. Set your post to “private.” In this way, search engines will
not be able to scan that post.
4. Avoid using names. Names are easy for search engines to
scan.
5. If you feel that a post can affect you or other’s reputation, ask
the one who posted it to pull it down or report it as
inappropriate.
If you create something—an
idea, an invention, a form of
literary work, or a research, you
have the right of how it should
be used by others. This is called
intellectual property.
Fair Use
Intellectual property may be used without
a consent as long as it is used in
commentaries,criticisms,search
engines,parodies,news report,research.
Cybercrime- a crime commited or
assisted through the use of the internet.
Privacy Policy- tells the user how the
website will handle its data.

More Related Content

What's hot

Information literacy in a media-saturated world
Information literacy in a media-saturated worldInformation literacy in a media-saturated world
Information literacy in a media-saturated worldPam Wilson
 
Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104Marvin Broñoso
 
Software Applications and Platforms.pptx
Software Applications and Platforms.pptxSoftware Applications and Platforms.pptx
Software Applications and Platforms.pptxmarlonfelizardo3
 
Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Jesus Rances
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
INTRODUCTION TO PHILOSOPHY OF THE HUMAN PERSON.pptx
INTRODUCTION TO PHILOSOPHY OF THE HUMAN PERSON.pptxINTRODUCTION TO PHILOSOPHY OF THE HUMAN PERSON.pptx
INTRODUCTION TO PHILOSOPHY OF THE HUMAN PERSON.pptxDenverNDiocares
 
Opportunities ,Challenges, and Power of Media and Information.pptx
Opportunities ,Challenges, and Power of Media and Information.pptxOpportunities ,Challenges, and Power of Media and Information.pptx
Opportunities ,Challenges, and Power of Media and Information.pptxluvvprems5
 
Copyright infringement
 Copyright infringement Copyright infringement
Copyright infringementRochelle Nato
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2alicelagajino
 
L15 The Disadvantages of ICT.pptx
L15 The Disadvantages of ICT.pptxL15 The Disadvantages of ICT.pptx
L15 The Disadvantages of ICT.pptxBenjieBarlaan
 
Media and Information Literacy- Introduction to Media and Information Literacy
Media and Information Literacy- Introduction to Media and Information LiteracyMedia and Information Literacy- Introduction to Media and Information Literacy
Media and Information Literacy- Introduction to Media and Information LiteracyJ Q
 
Contextualized Online Search and search skills zeng
Contextualized Online Search and search skills zengContextualized Online Search and search skills zeng
Contextualized Online Search and search skills zengRose Yanna
 
Empo Tech 11 COT 2.pptx
Empo Tech 11 COT 2.pptxEmpo Tech 11 COT 2.pptx
Empo Tech 11 COT 2.pptxPinkyFash
 
Contextualized Online Search and Research Skills
Contextualized Online Search and Research SkillsContextualized Online Search and Research Skills
Contextualized Online Search and Research SkillsAngelito Quiambao
 
Per dev career dev
Per dev career devPer dev career dev
Per dev career devshsboljoon
 

What's hot (20)

EMPOWERMENT TECHNOLOGIES - LESSON 2
EMPOWERMENT TECHNOLOGIES - LESSON 2EMPOWERMENT TECHNOLOGIES - LESSON 2
EMPOWERMENT TECHNOLOGIES - LESSON 2
 
Information literacy in a media-saturated world
Information literacy in a media-saturated worldInformation literacy in a media-saturated world
Information literacy in a media-saturated world
 
Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104
 
Emp Tech 1 introduction
Emp Tech 1 introductionEmp Tech 1 introduction
Emp Tech 1 introduction
 
Software Applications and Platforms.pptx
Software Applications and Platforms.pptxSoftware Applications and Platforms.pptx
Software Applications and Platforms.pptx
 
Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Empowerment Technologies - Module 3
Empowerment Technologies - Module 3
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
INTRODUCTION TO PHILOSOPHY OF THE HUMAN PERSON.pptx
INTRODUCTION TO PHILOSOPHY OF THE HUMAN PERSON.pptxINTRODUCTION TO PHILOSOPHY OF THE HUMAN PERSON.pptx
INTRODUCTION TO PHILOSOPHY OF THE HUMAN PERSON.pptx
 
Assistive Media
Assistive MediaAssistive Media
Assistive Media
 
Opportunities ,Challenges, and Power of Media and Information.pptx
Opportunities ,Challenges, and Power of Media and Information.pptxOpportunities ,Challenges, and Power of Media and Information.pptx
Opportunities ,Challenges, and Power of Media and Information.pptx
 
Empowerment Technology - Learning Content
Empowerment Technology -  Learning ContentEmpowerment Technology -  Learning Content
Empowerment Technology - Learning Content
 
Copyright infringement
 Copyright infringement Copyright infringement
Copyright infringement
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
L15 The Disadvantages of ICT.pptx
L15 The Disadvantages of ICT.pptxL15 The Disadvantages of ICT.pptx
L15 The Disadvantages of ICT.pptx
 
Media and Information Literacy- Introduction to Media and Information Literacy
Media and Information Literacy- Introduction to Media and Information LiteracyMedia and Information Literacy- Introduction to Media and Information Literacy
Media and Information Literacy- Introduction to Media and Information Literacy
 
Contextualized Online Search and search skills zeng
Contextualized Online Search and search skills zengContextualized Online Search and search skills zeng
Contextualized Online Search and search skills zeng
 
Trends and Fads.pptx
Trends and Fads.pptxTrends and Fads.pptx
Trends and Fads.pptx
 
Empo Tech 11 COT 2.pptx
Empo Tech 11 COT 2.pptxEmpo Tech 11 COT 2.pptx
Empo Tech 11 COT 2.pptx
 
Contextualized Online Search and Research Skills
Contextualized Online Search and Research SkillsContextualized Online Search and Research Skills
Contextualized Online Search and Research Skills
 
Per dev career dev
Per dev career devPer dev career dev
Per dev career dev
 

Similar to L2 rules of netiquette

L2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxL2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxSheenaAFuentes
 
L2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxL2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxsheena711714
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquetterowenick
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquetterowenick
 
Lesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxLesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxJoy Dugayo
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2JayMarkBandoy1
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxNoelBuctot1
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquetteEmmanuelaSernicul
 
2_Rules_of_Netiquette.pptx
2_Rules_of_Netiquette.pptx2_Rules_of_Netiquette.pptx
2_Rules_of_Netiquette.pptxDenverNDiocares
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internetMaricrs Alfarö
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxMdRuga
 
L1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdfL1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdfJeth Cuenco
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipjleverett
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsusxenhalo561
 
The-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfThe-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfMelchorTolentino2
 
Q3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfQ3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfBryanSmile
 

Similar to L2 rules of netiquette (20)

L2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxL2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptx
 
L2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxL2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptx
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Lesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxLesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptx
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
Internet threats
Internet threatsInternet threats
Internet threats
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
2_Rules_of_Netiquette.pptx
2_Rules_of_Netiquette.pptx2_Rules_of_Netiquette.pptx
2_Rules_of_Netiquette.pptx
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internet
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
itEraLesson3. .pptx
itEraLesson3.                       .pptxitEraLesson3.                       .pptx
itEraLesson3. .pptx
 
L1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdfL1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdf
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
The-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfThe-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdf
 
Users guide
Users guideUsers guide
Users guide
 
Q3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfQ3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdf
 

Recently uploaded

南新罕布什尔大学毕业证学位证成绩单-学历认证
南新罕布什尔大学毕业证学位证成绩单-学历认证南新罕布什尔大学毕业证学位证成绩单-学历认证
南新罕布什尔大学毕业证学位证成绩单-学历认证kbdhl05e
 
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...Authentic No 1 Amil Baba In Pakistan
 
REFLECTIONS Newsletter Jan-Jul 2024.pdf.pdf
REFLECTIONS Newsletter Jan-Jul 2024.pdf.pdfREFLECTIONS Newsletter Jan-Jul 2024.pdf.pdf
REFLECTIONS Newsletter Jan-Jul 2024.pdf.pdfssusere8ea60
 
Inspiring Through Words Power of Inspiration.pptx
Inspiring Through Words Power of Inspiration.pptxInspiring Through Words Power of Inspiration.pptx
Inspiring Through Words Power of Inspiration.pptxShubham Rawat
 
办理国外毕业证学位证《原版美国montana文凭》蒙大拿州立大学毕业证制作成绩单修改
办理国外毕业证学位证《原版美国montana文凭》蒙大拿州立大学毕业证制作成绩单修改办理国外毕业证学位证《原版美国montana文凭》蒙大拿州立大学毕业证制作成绩单修改
办理国外毕业证学位证《原版美国montana文凭》蒙大拿州立大学毕业证制作成绩单修改atducpo
 
Call Girls in Kalyan Vihar Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Kalyan Vihar Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Kalyan Vihar Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Kalyan Vihar Delhi 💯 Call Us 🔝8264348440🔝soniya singh
 
(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ Escorts
(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ Escorts(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ Escorts
(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ EscortsDelhi Escorts Service
 
Breath, Brain & Beyond_A Holistic Approach to Peak Performance.pdf
Breath, Brain & Beyond_A Holistic Approach to Peak Performance.pdfBreath, Brain & Beyond_A Holistic Approach to Peak Performance.pdf
Breath, Brain & Beyond_A Holistic Approach to Peak Performance.pdfJess Walker
 
Postal Ballot procedure for employees to utilise
Postal Ballot procedure for employees to utilisePostal Ballot procedure for employees to utilise
Postal Ballot procedure for employees to utiliseccsubcollector
 
办理西悉尼大学毕业证成绩单、制作假文凭
办理西悉尼大学毕业证成绩单、制作假文凭办理西悉尼大学毕业证成绩单、制作假文凭
办理西悉尼大学毕业证成绩单、制作假文凭o8wvnojp
 
西伦敦大学毕业证学位证成绩单-怎么样做
西伦敦大学毕业证学位证成绩单-怎么样做西伦敦大学毕业证学位证成绩单-怎么样做
西伦敦大学毕业证学位证成绩单-怎么样做j5bzwet6
 
Dhule Call Girls #9907093804 Contact Number Escorts Service Dhule
Dhule Call Girls #9907093804 Contact Number Escorts Service DhuleDhule Call Girls #9907093804 Contact Number Escorts Service Dhule
Dhule Call Girls #9907093804 Contact Number Escorts Service Dhulesrsj9000
 
Call Girls in Govindpuri Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Govindpuri Delhi 💯Call Us 🔝8264348440🔝Call Girls in Govindpuri Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Govindpuri Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Ahmedabad Escorts Girl Services For Male Tourists 9537192988
Ahmedabad Escorts Girl Services For Male Tourists 9537192988Ahmedabad Escorts Girl Services For Male Tourists 9537192988
Ahmedabad Escorts Girl Services For Male Tourists 9537192988oolala9823
 
Call Girls In Dwarka Sub City ☎️7838079806 ✅ 💯Call Girls In Delhi
Call Girls In Dwarka Sub City  ☎️7838079806 ✅ 💯Call Girls In DelhiCall Girls In Dwarka Sub City  ☎️7838079806 ✅ 💯Call Girls In Delhi
Call Girls In Dwarka Sub City ☎️7838079806 ✅ 💯Call Girls In DelhiSoniyaSingh
 
social media chat application main ppt.pptx
social media chat application main ppt.pptxsocial media chat application main ppt.pptx
social media chat application main ppt.pptxsprasad829829
 
E J Waggoner against Kellogg's Pantheism 8.pptx
E J Waggoner against Kellogg's Pantheism 8.pptxE J Waggoner against Kellogg's Pantheism 8.pptx
E J Waggoner against Kellogg's Pantheism 8.pptxJackieSparrow3
 

Recently uploaded (20)

南新罕布什尔大学毕业证学位证成绩单-学历认证
南新罕布什尔大学毕业证学位证成绩单-学历认证南新罕布什尔大学毕业证学位证成绩单-学历认证
南新罕布什尔大学毕业证学位证成绩单-学历认证
 
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
 
REFLECTIONS Newsletter Jan-Jul 2024.pdf.pdf
REFLECTIONS Newsletter Jan-Jul 2024.pdf.pdfREFLECTIONS Newsletter Jan-Jul 2024.pdf.pdf
REFLECTIONS Newsletter Jan-Jul 2024.pdf.pdf
 
Inspiring Through Words Power of Inspiration.pptx
Inspiring Through Words Power of Inspiration.pptxInspiring Through Words Power of Inspiration.pptx
Inspiring Through Words Power of Inspiration.pptx
 
办理国外毕业证学位证《原版美国montana文凭》蒙大拿州立大学毕业证制作成绩单修改
办理国外毕业证学位证《原版美国montana文凭》蒙大拿州立大学毕业证制作成绩单修改办理国外毕业证学位证《原版美国montana文凭》蒙大拿州立大学毕业证制作成绩单修改
办理国外毕业证学位证《原版美国montana文凭》蒙大拿州立大学毕业证制作成绩单修改
 
Call Girls in Kalyan Vihar Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Kalyan Vihar Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Kalyan Vihar Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Kalyan Vihar Delhi 💯 Call Us 🔝8264348440🔝
 
(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ Escorts
(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ Escorts(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ Escorts
(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ Escorts
 
Breath, Brain & Beyond_A Holistic Approach to Peak Performance.pdf
Breath, Brain & Beyond_A Holistic Approach to Peak Performance.pdfBreath, Brain & Beyond_A Holistic Approach to Peak Performance.pdf
Breath, Brain & Beyond_A Holistic Approach to Peak Performance.pdf
 
young Call girls in Neb Sarai 🔝 9953056974 🔝 Delhi escort Service
young Call girls in Neb Sarai 🔝 9953056974 🔝 Delhi escort Serviceyoung Call girls in Neb Sarai 🔝 9953056974 🔝 Delhi escort Service
young Call girls in Neb Sarai 🔝 9953056974 🔝 Delhi escort Service
 
Postal Ballot procedure for employees to utilise
Postal Ballot procedure for employees to utilisePostal Ballot procedure for employees to utilise
Postal Ballot procedure for employees to utilise
 
办理西悉尼大学毕业证成绩单、制作假文凭
办理西悉尼大学毕业证成绩单、制作假文凭办理西悉尼大学毕业证成绩单、制作假文凭
办理西悉尼大学毕业证成绩单、制作假文凭
 
西伦敦大学毕业证学位证成绩单-怎么样做
西伦敦大学毕业证学位证成绩单-怎么样做西伦敦大学毕业证学位证成绩单-怎么样做
西伦敦大学毕业证学位证成绩单-怎么样做
 
Dhule Call Girls #9907093804 Contact Number Escorts Service Dhule
Dhule Call Girls #9907093804 Contact Number Escorts Service DhuleDhule Call Girls #9907093804 Contact Number Escorts Service Dhule
Dhule Call Girls #9907093804 Contact Number Escorts Service Dhule
 
Call Girls in Govindpuri Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Govindpuri Delhi 💯Call Us 🔝8264348440🔝Call Girls in Govindpuri Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Govindpuri Delhi 💯Call Us 🔝8264348440🔝
 
Ahmedabad Escorts Girl Services For Male Tourists 9537192988
Ahmedabad Escorts Girl Services For Male Tourists 9537192988Ahmedabad Escorts Girl Services For Male Tourists 9537192988
Ahmedabad Escorts Girl Services For Male Tourists 9537192988
 
Call Girls In Dwarka Sub City ☎️7838079806 ✅ 💯Call Girls In Delhi
Call Girls In Dwarka Sub City  ☎️7838079806 ✅ 💯Call Girls In DelhiCall Girls In Dwarka Sub City  ☎️7838079806 ✅ 💯Call Girls In Delhi
Call Girls In Dwarka Sub City ☎️7838079806 ✅ 💯Call Girls In Delhi
 
Cheap Rate ➥8448380779 ▻Call Girls In Mg Road Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Mg Road GurgaonCheap Rate ➥8448380779 ▻Call Girls In Mg Road Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Mg Road Gurgaon
 
Model Call Girl in Lado Sarai Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Lado Sarai Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Lado Sarai Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Lado Sarai Delhi reach out to us at 🔝9953056974🔝
 
social media chat application main ppt.pptx
social media chat application main ppt.pptxsocial media chat application main ppt.pptx
social media chat application main ppt.pptx
 
E J Waggoner against Kellogg's Pantheism 8.pptx
E J Waggoner against Kellogg's Pantheism 8.pptxE J Waggoner against Kellogg's Pantheism 8.pptx
E J Waggoner against Kellogg's Pantheism 8.pptx
 

L2 rules of netiquette

  • 1. • Online security, safety, and ethics • Internet threats • Protecting reputations online • Copyright • Contextualized online search and research skills Rules of Netiquette
  • 2. At the end of this lesson, the students should be able to: 1. consider one’s and others’ safety when sharing information using the Internet; 2. consider one’s and others’ reputation when using the Internet; 3. determine and avoid the dangers of the Internet; 4. be responsible in the use of social networking sites; and 5. browse the Internet efficiently and properly through proper referencing.
  • 3. The Internet, truly, is a powerful tool. It can be used to promote your business, gain new friends, and stay in touch with the old ones. It is also a source of entertainment. But like most things in this world, there is always “another side of the coin.” The Internet is one of the most dangerous places, especially if you do not know what you are doing.
  • 4. Internet safety, or online safety is the knowledge of maximizing the user’s personal safety and security risks to private information and property associated with using the internet, and the self-protection form computer crime in general.
  • 5.
  • 6.
  • 7.
  • 8. Internet Threats: 1. Malware – stands for malicious software. a. Virus- malicious program designed to replicate itself and transfer from one computer to another.(flash drives,CD’s and Internet) . b. Worm- malicious program that transfers from one computer to another by any type of means.(computer network). c. Trojan- malicious program that is disguised as a useful program but once downloaded and installed,leaves your PC unprotected and allows hackers to get your information. *Rogue security software – tricks the user into posing that is security software.
  • 9. d. Spyware – a program that runs in the background without you knowing it ”spy”. Ability to monitor what you are currently doing and typing. * Keyloggers – used to record the keystroke done by the user.Done to steal password and information. e. Adware- a program designed to send you advertisements,mostly pop-ups. 2. Spam – unwanted email mostly from bots or advertisers. It can be used to send malware. 3. Phishing – Its goal is to acquire sensitive personal information like passwords and credit card details. * Pharming – a more complicated way of phishing where it exploits the DNS (Domain Name System)
  • 10. Think Before You Click 1. Before you post something on the web, ask these questions to yourself: Would you want your parents or grandparents to see it? Would you want your future boss to see it? Once you post something on the web, you have no control of who sees your posts. 2. Your friends depend on you to protect their reputation online. Talk to your friends about this serious responsibility. 3. Set your post to “private.” In this way, search engines will not be able to scan that post. 4. Avoid using names. Names are easy for search engines to scan. 5. If you feel that a post can affect you or other’s reputation, ask the one who posted it to pull it down or report it as inappropriate.
  • 11. If you create something—an idea, an invention, a form of literary work, or a research, you have the right of how it should be used by others. This is called intellectual property.
  • 12. Fair Use Intellectual property may be used without a consent as long as it is used in commentaries,criticisms,search engines,parodies,news report,research. Cybercrime- a crime commited or assisted through the use of the internet. Privacy Policy- tells the user how the website will handle its data.