SlideShare a Scribd company logo
1 of 15
Netiquette
Definition

Commandments

Guidelines

Task
Netiquette
 also called as the proper use of internet.
 It covers not only the rules of behavior during
discussion but also guidelines that reflect a
unique electronic nature of the medium.
Guidelines
Proper use of internet guidelines:
1. Be clear
2. Use Appropriate language

3. Be brief
4. Make a good impression

5. Be selective on what information you put in an
e-mail or in a website.
5. Be selective on what information you put in
an email or in a website.
6. Forward e-mail messages you receive only
with the permission of the sender.

7. Remember you are not anonymous.
8. Consider others.

9. Obey copyright laws and cite other’s work
you use.
10. Do not send SPAM.
11. Don’t forward chain letters.
12. Don’t respond to “flames” or personal
attack.
13. Use common abbreviations.
14. Use appropriate emoticons.
10 commandments
of
Computer Ethics
Ten Commandments of Computer Ethics
1. Thou shalt not use a computer to harm other people.
2. Thou shalt not interfere with other people’s computer
work.
3. Thou shalt not snoop around in other peoples files.
4. Thou shalt not use computer to steal.
5.

Thou shalt not use computer to bear false witness.
6. Thou shalt not copy or use proprietary software for which
you have not paid.
7. Thou shalt not use other peoples computer resources
without authorization or proper compensation.

8. Thou shalt not appropriate other people’s intellectual
output.
9. Thou shalt think about the social consequences of the
program you write or the system you design.
10. Thou shalt use a computer in ways that show consideration
of and respect for your fellow humans.
Task
¼ sheet of paper
Why is it important to learn netiquette/ proper use of
internet?
(3-5 sentences only)

(5 minutes)
Assignment:
- - By pair
- - in a ½ crosswise
Formulate your own rules/ guidelines on how to use
internet properly
(5 rules/ guidelines only).
Scratch Project :

My Greeting Card
(20 points)

That would contain the following features:
•
•
•
•
•

There are at least three different sprites.
There must a change in costumes.
It must also have a text (which would serve as your
message/s).
It should have an appropriate background/s.
It should have an appropriate sounds/music.
_end of Slide Presentation_

More Related Content

What's hot

Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentationmlw32785
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of NetiquetteLeelet1121
 
Internet and World Wide Web
Internet and World Wide WebInternet and World Wide Web
Internet and World Wide WebSamudin Kassan
 
Netiquette stassie
Netiquette stassieNetiquette stassie
Netiquette stassieJill Stassie
 
Advantages and Disadvantages Of Social Media
 Advantages and Disadvantages Of Social Media Advantages and Disadvantages Of Social Media
Advantages and Disadvantages Of Social MediaDilna DV
 
Rules of netiquette
Rules of netiquetteRules of netiquette
Rules of netiquetteklknight79
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safetySarah K Miller
 
The Pros and Cons of using Social Network
The Pros and Cons of using Social NetworkThe Pros and Cons of using Social Network
The Pros and Cons of using Social NetworkChanny Leang
 
The Do's and DONT's of Internet
The Do's and DONT's of InternetThe Do's and DONT's of Internet
The Do's and DONT's of Internetjoy santos
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security Arah Louise
 
Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & securitynadikari123
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social mediaAlan Raj
 
Contextualized online search and research skills
Contextualized online search and research skillsContextualized online search and research skills
Contextualized online search and research skillsJonathan Jr Marcelino
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety PresentationLJ Henshell
 
Cyber security for children
Cyber security for childrenCyber security for children
Cyber security for childrenAvanzo net
 
CSS L11 INTRODUCTION TO COMPUTER NETWORKING
CSS L11 INTRODUCTION TO COMPUTER NETWORKINGCSS L11 INTRODUCTION TO COMPUTER NETWORKING
CSS L11 INTRODUCTION TO COMPUTER NETWORKINGMarvin Bronoso
 

What's hot (20)

INTERNET ETIQUETTE AND NETIQUETTE
INTERNET ETIQUETTE AND NETIQUETTEINTERNET ETIQUETTE AND NETIQUETTE
INTERNET ETIQUETTE AND NETIQUETTE
 
7 computer ethics
7 computer ethics7 computer ethics
7 computer ethics
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
Netiquette2
Netiquette2Netiquette2
Netiquette2
 
Internet and World Wide Web
Internet and World Wide WebInternet and World Wide Web
Internet and World Wide Web
 
Netiquette stassie
Netiquette stassieNetiquette stassie
Netiquette stassie
 
Advantages and Disadvantages Of Social Media
 Advantages and Disadvantages Of Social Media Advantages and Disadvantages Of Social Media
Advantages and Disadvantages Of Social Media
 
Rules of netiquette
Rules of netiquetteRules of netiquette
Rules of netiquette
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safety
 
The Pros and Cons of using Social Network
The Pros and Cons of using Social NetworkThe Pros and Cons of using Social Network
The Pros and Cons of using Social Network
 
The Do's and DONT's of Internet
The Do's and DONT's of InternetThe Do's and DONT's of Internet
The Do's and DONT's of Internet
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
 
Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & security
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
 
Contextualized online search and research skills
Contextualized online search and research skillsContextualized online search and research skills
Contextualized online search and research skills
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety Presentation
 
Cyber security for children
Cyber security for childrenCyber security for children
Cyber security for children
 
CSS L11 INTRODUCTION TO COMPUTER NETWORKING
CSS L11 INTRODUCTION TO COMPUTER NETWORKINGCSS L11 INTRODUCTION TO COMPUTER NETWORKING
CSS L11 INTRODUCTION TO COMPUTER NETWORKING
 

Similar to Netiquette

the lesson about the information and communication to technology
the lesson about the information and communication to technologythe lesson about the information and communication to technology
the lesson about the information and communication to technologylcnemedez
 
Netiquette
NetiquetteNetiquette
NetiquetteGlory
 
CAS110 Netiquette PPT when using the internet
CAS110 Netiquette PPT when using the internetCAS110 Netiquette PPT when using the internet
CAS110 Netiquette PPT when using the internetHendrixAntonniAmante
 
4.1.1 netiquette 2016
4.1.1 netiquette 20164.1.1 netiquette 2016
4.1.1 netiquette 2016dilahkmpk
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computerFatin Izzaty
 
Media and Information Literacy Netiquette
Media and Information Literacy NetiquetteMedia and Information Literacy Netiquette
Media and Information Literacy NetiquetteJPAballe
 
Ten commandments
Ten commandmentsTen commandments
Ten commandmentslsanford84
 
Responsible Digital Citizenship
Responsible Digital CitizenshipResponsible Digital Citizenship
Responsible Digital CitizenshipAlex Noudelman
 
Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104Marvin Broñoso
 
COT 2- EMP. TECH NOLOGY(Netiquettes).pptx
COT 2- EMP. TECH NOLOGY(Netiquettes).pptxCOT 2- EMP. TECH NOLOGY(Netiquettes).pptx
COT 2- EMP. TECH NOLOGY(Netiquettes).pptxacademicjfurio
 

Similar to Netiquette (20)

the lesson about the information and communication to technology
the lesson about the information and communication to technologythe lesson about the information and communication to technology
the lesson about the information and communication to technology
 
Netiquette
NetiquetteNetiquette
Netiquette
 
CAS110 Netiquette PPT when using the internet
CAS110 Netiquette PPT when using the internetCAS110 Netiquette PPT when using the internet
CAS110 Netiquette PPT when using the internet
 
Ass6
Ass6Ass6
Ass6
 
4.1.1 netiquette 2016
4.1.1 netiquette 20164.1.1 netiquette 2016
4.1.1 netiquette 2016
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Netiquettes
NetiquettesNetiquettes
Netiquettes
 
Netiquette mine
Netiquette mineNetiquette mine
Netiquette mine
 
Net project
Net projectNet project
Net project
 
LESSON 1.ppt
LESSON 1.pptLESSON 1.ppt
LESSON 1.ppt
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Media and Information Literacy Netiquette
Media and Information Literacy NetiquetteMedia and Information Literacy Netiquette
Media and Information Literacy Netiquette
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
Ten commandments
Ten commandmentsTen commandments
Ten commandments
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
Responsible Digital Citizenship
Responsible Digital CitizenshipResponsible Digital Citizenship
Responsible Digital Citizenship
 
Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104
 
COT 2- EMP. TECH NOLOGY(Netiquettes).pptx
COT 2- EMP. TECH NOLOGY(Netiquettes).pptxCOT 2- EMP. TECH NOLOGY(Netiquettes).pptx
COT 2- EMP. TECH NOLOGY(Netiquettes).pptx
 

More from Roi Fernandez

More from Roi Fernandez (20)

History of computer
History of computerHistory of computer
History of computer
 
Other european nations
 Other european nations Other european nations
Other european nations
 
Kitchen utensils ppt
Kitchen utensils pptKitchen utensils ppt
Kitchen utensils ppt
 
India
IndiaIndia
India
 
Geographic setting of india
Geographic setting of indiaGeographic setting of india
Geographic setting of india
 
Early Civilizations
Early CivilizationsEarly Civilizations
Early Civilizations
 
Stages of man
Stages of manStages of man
Stages of man
 
The early men 3
The early men 3The early men 3
The early men 3
 
Civilization of smaller states
Civilization of smaller statesCivilization of smaller states
Civilization of smaller states
 
Continents
 Continents Continents
Continents
 
Pehm music unit 1 lesson 3
 Pehm music unit 1 lesson 3 Pehm music unit 1 lesson 3
Pehm music unit 1 lesson 3
 
Alternative peh mreport
Alternative peh mreportAlternative peh mreport
Alternative peh mreport
 
Topaz research
Topaz researchTopaz research
Topaz research
 
Smooth er
Smooth erSmooth er
Smooth er
 
Smooth Endoplasmic Reticulum
 Smooth Endoplasmic Reticulum Smooth Endoplasmic Reticulum
Smooth Endoplasmic Reticulum
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Human Geography
 Human Geography Human Geography
Human Geography
 
Landforms and Waterforms
 Landforms and Waterforms Landforms and Waterforms
Landforms and Waterforms
 
Geographical Quiz
Geographical QuizGeographical Quiz
Geographical Quiz
 
5 themes of geography
 5 themes of geography 5 themes of geography
5 themes of geography
 

Recently uploaded

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 

Recently uploaded (20)

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 

Netiquette

  • 3. Netiquette  also called as the proper use of internet.  It covers not only the rules of behavior during discussion but also guidelines that reflect a unique electronic nature of the medium.
  • 5. Proper use of internet guidelines: 1. Be clear 2. Use Appropriate language 3. Be brief 4. Make a good impression 5. Be selective on what information you put in an e-mail or in a website.
  • 6. 5. Be selective on what information you put in an email or in a website. 6. Forward e-mail messages you receive only with the permission of the sender. 7. Remember you are not anonymous. 8. Consider others. 9. Obey copyright laws and cite other’s work you use.
  • 7. 10. Do not send SPAM. 11. Don’t forward chain letters. 12. Don’t respond to “flames” or personal attack. 13. Use common abbreviations. 14. Use appropriate emoticons.
  • 9. Ten Commandments of Computer Ethics 1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people’s computer work. 3. Thou shalt not snoop around in other peoples files. 4. Thou shalt not use computer to steal. 5. Thou shalt not use computer to bear false witness.
  • 10. 6. Thou shalt not copy or use proprietary software for which you have not paid. 7. Thou shalt not use other peoples computer resources without authorization or proper compensation. 8. Thou shalt not appropriate other people’s intellectual output. 9. Thou shalt think about the social consequences of the program you write or the system you design. 10. Thou shalt use a computer in ways that show consideration of and respect for your fellow humans.
  • 11. Task
  • 12. ¼ sheet of paper Why is it important to learn netiquette/ proper use of internet? (3-5 sentences only) (5 minutes)
  • 13. Assignment: - - By pair - - in a ½ crosswise Formulate your own rules/ guidelines on how to use internet properly (5 rules/ guidelines only).
  • 14. Scratch Project : My Greeting Card (20 points) That would contain the following features: • • • • • There are at least three different sprites. There must a change in costumes. It must also have a text (which would serve as your message/s). It should have an appropriate background/s. It should have an appropriate sounds/music.
  • 15. _end of Slide Presentation_