SlideShare a Scribd company logo
Internet Etiquette orInternet Etiquette or
NetiquetteNetiquette
BY: Jill StassieBY: Jill Stassie
Ten Rules Of NetiquetteTen Rules Of Netiquette
 There are Ten rules ofThere are Ten rules of
Netiquette that everyone whoNetiquette that everyone who
goes online should follow.goes online should follow.
 You should remember themYou should remember them
every time you go online.every time you go online.
 Netiquette is a set of rules forNetiquette is a set of rules for
behaving properly online.behaving properly online.
 The ten rules are as follows.The ten rules are as follows.
Rule No. 1: Remember theRule No. 1: Remember the
HumanHuman
 You need toYou need to
remember that you areremember that you are
talking to a real persontalking to a real person
when you are online.when you are online.
 The internet bringsThe internet brings
people together whopeople together who
would otherwise neverwould otherwise never
meet.meet.
 Remember this sayingRemember this saying
when sending anwhen sending an
email: Would I sayemail: Would I say
this to the person’sthis to the person’s
face.face.
Rule No.2: Adhere to the sameRule No.2: Adhere to the same
standards online that you follow instandards online that you follow in
real lifereal life
 You need to behaveYou need to behave
the same way onlinethe same way online
that you do in real life.that you do in real life.
 You need toYou need to
remember that youremember that you
can get caught doingcan get caught doing
things you should notthings you should not
be doing online justbe doing online just
like you can in real life.like you can in real life.
 You are still talking toYou are still talking to
a real person witha real person with
feelings even thoughfeelings even though
you can’t see them.you can’t see them.
Rule no. 3: Know where youRule no. 3: Know where you
are in cyberspace.are in cyberspace.
 Always take a look around whenAlways take a look around when
you enter a new domain whenyou enter a new domain when
surfing the web.surfing the web.
 Get a sense of what theGet a sense of what the
discussion group is about beforediscussion group is about before
you join it.you join it.
Rule no.4: Respect otherRule no.4: Respect other
people’s time and bandwidth.people’s time and bandwidth.
 Remember people have otherRemember people have other
things to do besides read yourthings to do besides read your
email. You are not the center ofemail. You are not the center of
their world.their world.
 Keep your post and emails to aKeep your post and emails to a
minimum by saying what youminimum by saying what you
want to say.want to say.
 Remember everyone won’tRemember everyone won’t
answer your questions.answer your questions.
Rule No. 5: Make yourselfRule No. 5: Make yourself
look good online.look good online.
 Remember to always checkRemember to always check
your spelling and grammaryour spelling and grammar
before posting.before posting.
 Always know what you areAlways know what you are
talking about and make sensetalking about and make sense
saying it.saying it.
 Be polite and pleasant toBe polite and pleasant to
everyone.everyone.
Rule no. 6: Share expertRule no. 6: Share expert
knowledgeknowledge
 Ask questions onlineAsk questions online
 Share what you know online.Share what you know online.
 Post the answers to yourPost the answers to your
questions online becausequestions online because
someone may have the samesomeone may have the same
question you do.question you do.
Rule No.7: Help keep flameRule No.7: Help keep flame
wars under controlwars under control
 Netiquette doesNetiquette does
not forbidnot forbid
flaming.flaming.
 Netiquette doesNetiquette does
however forbidhowever forbid
people who arepeople who are
flaming to hurtflaming to hurt
discussiondiscussion
groups bygroups by
putting theputting the
group down.group down.
Rule No. 8: Respect otherRule No. 8: Respect other
people’s privacypeople’s privacy
 Do not read other people’s mailDo not read other people’s mail
without their permission.without their permission.
 Going through other people’sGoing through other people’s
things could cost you your job orthings could cost you your job or
you could even go to jail.you could even go to jail.
 Not respecting other people’sNot respecting other people’s
privacy is bad Netiquette.privacy is bad Netiquette.
Rule No.9: Don’t abuse yourRule No.9: Don’t abuse your
power.power.
 Do not take advantage of otherDo not take advantage of other
people just because you havepeople just because you have
more knowledge or power thanmore knowledge or power than
them.them.
 Treat others as you would wantTreat others as you would want
them to treat you if the rolesthem to treat you if the roles
were reversed.were reversed.
Rule No. 10: Be forgiving ofRule No. 10: Be forgiving of
other people’s mistakes.other people’s mistakes.
 Do not point out mistakes toDo not point out mistakes to
people online.people online.
 Remember that you were onceRemember that you were once
the new kid on the block.the new kid on the block.
 You still need to have goodYou still need to have good
manners even though you aremanners even though you are
online and can not see theonline and can not see the
person face to face.person face to face.
Email EtiquetteEmail Etiquette
 There are etiquetteThere are etiquette
rules for emailrules for email
messages also.messages also.
They are asThey are as
follows:follows:
 Check your emailCheck your email
dailydaily
 Delete unwantedDelete unwanted
messages.messages.
 Keep messages inKeep messages in
your box to ayour box to a
minimumminimum
 Mail messagesMail messages
can becan be
downloaded anddownloaded and
save for futuresave for future
references.references.
 Never assume thatNever assume that
your Email can beyour Email can be
read by no one butread by no one but
yourself.yourself.
 Remember thereRemember there
are always beare always be
lurking aroundlurking around
onlineonline
Ten Commandments ofTen Commandments of
Computer EthicsComputer Ethics
 Ten commandmentsTen commandments
taken from the Usertaken from the User
Guidelines andGuidelines and
Netiquette By ArleneNetiquette By Arlene
Rinaldi. TenRinaldi. Ten
commandments are ascommandments are as
follows:follows:
 Thou shalt not useThou shalt not use
computer to harmcomputer to harm
people.people.
 Thou shalt not interfereThou shalt not interfere
with other people’s work.with other people’s work.
 Thou shalt not snoopThou shalt not snoop
around other people’saround other people’s
files.files.
 Thou shalt not use aThou shalt not use a
computer to stealcomputer to steal
 Thou shalt not use aThou shalt not use a
computer to bear falsecomputer to bear false
witnesswitness
 Thou shalt not use orThou shalt not use or
copy software.copy software.
 Thou shalt not use otherThou shalt not use other
people’s computerpeople’s computer
resources.resources.
 Thou shalt notThou shalt not
appropriate otherappropriate other
people’s intellectualpeople’s intellectual
output.output.
 Thou shalt think aboutThou shalt think about
the social consequencesthe social consequences
of the program you write.of the program you write.
 Thou shalt use aThou shalt use a
computer in ways thacomputer in ways tha
show consideration andshow consideration and
respect.respect.
NetiquetteNetiquette
 Remember theRemember the
Ten rules ofTen rules of
Netiquette andNetiquette and
the Tenthe Ten
commandmentscommandments
for computerfor computer
Ethics while youEthics while you
are online andare online and
you will notyou will not
have anyhave any
problems.problems.
Remember the Rules!!!!Remember the Rules!!!!
The EndThe End

More Related Content

What's hot

Media Information and language
Media Information and language Media Information and language
Media Information and language
Rexly Lasaca
 
Tools and Equipment used in CSS NCII
Tools and Equipment used in CSS NCIITools and Equipment used in CSS NCII
Tools and Equipment used in CSS NCII
DepEd-Bataan
 
MEDIA AND INFORMATION LITERACY (MIL)
MEDIA AND INFORMATION LITERACY (MIL)MEDIA AND INFORMATION LITERACY (MIL)
MEDIA AND INFORMATION LITERACY (MIL)
Marvin Bronoso
 
CSS L04 - Integral Parts of the Computer System
CSS L04 - Integral Parts of the Computer SystemCSS L04 - Integral Parts of the Computer System
CSS L04 - Integral Parts of the Computer System
Marvin Bronoso
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Mark Jhon Oxillo
 
Empowerment Technologies Module1
Empowerment Technologies Module1Empowerment Technologies Module1
Empowerment Technologies Module1
Yolie Dags
 
EMPOWERMENT TECHNOLOGIES - LESSON 3
EMPOWERMENT TECHNOLOGIES - LESSON 3EMPOWERMENT TECHNOLOGIES - LESSON 3
EMPOWERMENT TECHNOLOGIES - LESSON 3
PATRONAGE OF MARY DEVELOPMENT SCHOOL (PMDS)
 
CSS LO6 - PREPARING AND INSTALLING OPERATING SYSTEM
CSS LO6 - PREPARING AND INSTALLING OPERATING SYSTEMCSS LO6 - PREPARING AND INSTALLING OPERATING SYSTEM
CSS LO6 - PREPARING AND INSTALLING OPERATING SYSTEM
Marvin Bronoso
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
jhannnii
 
EMPOWERMENT TECHNOLOGIES - LESSON 2
EMPOWERMENT TECHNOLOGIES - LESSON 2EMPOWERMENT TECHNOLOGIES - LESSON 2
EMPOWERMENT TECHNOLOGIES - LESSON 2
PATRONAGE OF MARY DEVELOPMENT SCHOOL (PMDS)
 
Online ethics
Online ethicsOnline ethics
Netiquette
NetiquetteNetiquette
Netiquette
annamlingam1980
 
WWW and web browser
WWW and web browserWWW and web browser
WWW and web browser
Yansi Keim
 
Media and Information Literacy: Media and Information Languages
Media and Information Literacy: Media and Information LanguagesMedia and Information Literacy: Media and Information Languages
Media and Information Literacy: Media and Information Languages
Justin Cariaga
 
Copyright infringement
 Copyright infringement Copyright infringement
Copyright infringement
Rochelle Nato
 
Online Safety, Security, Ethics, and Etiquette (Part 2)
Online Safety, Security, Ethics, and Etiquette (Part 2)Online Safety, Security, Ethics, and Etiquette (Part 2)
Online Safety, Security, Ethics, and Etiquette (Part 2)
Maria Eloisa Blanza
 
Social Media - Empowerment Tech: ICT for Professional Tracks
Social Media - Empowerment Tech: ICT for Professional TracksSocial Media - Empowerment Tech: ICT for Professional Tracks
Social Media - Empowerment Tech: ICT for Professional Tracks
glairerabida
 
Install computer system,devices and peripherals
Install computer system,devices and peripheralsInstall computer system,devices and peripherals
Install computer system,devices and peripherals
Raiza Janelle
 
Natures and Purpose of Online Platforms and Applications
Natures and Purpose of Online Platforms and ApplicationsNatures and Purpose of Online Platforms and Applications
Natures and Purpose of Online Platforms and Applications
John Mark Centeno
 
2 Online Safety, Security, Ethics, and Etiquette
2 Online Safety,  Security, Ethics, and Etiquette2 Online Safety,  Security, Ethics, and Etiquette
2 Online Safety, Security, Ethics, and Etiquette
Teodoro Llanes II
 

What's hot (20)

Media Information and language
Media Information and language Media Information and language
Media Information and language
 
Tools and Equipment used in CSS NCII
Tools and Equipment used in CSS NCIITools and Equipment used in CSS NCII
Tools and Equipment used in CSS NCII
 
MEDIA AND INFORMATION LITERACY (MIL)
MEDIA AND INFORMATION LITERACY (MIL)MEDIA AND INFORMATION LITERACY (MIL)
MEDIA AND INFORMATION LITERACY (MIL)
 
CSS L04 - Integral Parts of the Computer System
CSS L04 - Integral Parts of the Computer SystemCSS L04 - Integral Parts of the Computer System
CSS L04 - Integral Parts of the Computer System
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
Empowerment Technologies Module1
Empowerment Technologies Module1Empowerment Technologies Module1
Empowerment Technologies Module1
 
EMPOWERMENT TECHNOLOGIES - LESSON 3
EMPOWERMENT TECHNOLOGIES - LESSON 3EMPOWERMENT TECHNOLOGIES - LESSON 3
EMPOWERMENT TECHNOLOGIES - LESSON 3
 
CSS LO6 - PREPARING AND INSTALLING OPERATING SYSTEM
CSS LO6 - PREPARING AND INSTALLING OPERATING SYSTEMCSS LO6 - PREPARING AND INSTALLING OPERATING SYSTEM
CSS LO6 - PREPARING AND INSTALLING OPERATING SYSTEM
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 
EMPOWERMENT TECHNOLOGIES - LESSON 2
EMPOWERMENT TECHNOLOGIES - LESSON 2EMPOWERMENT TECHNOLOGIES - LESSON 2
EMPOWERMENT TECHNOLOGIES - LESSON 2
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Netiquette
NetiquetteNetiquette
Netiquette
 
WWW and web browser
WWW and web browserWWW and web browser
WWW and web browser
 
Media and Information Literacy: Media and Information Languages
Media and Information Literacy: Media and Information LanguagesMedia and Information Literacy: Media and Information Languages
Media and Information Literacy: Media and Information Languages
 
Copyright infringement
 Copyright infringement Copyright infringement
Copyright infringement
 
Online Safety, Security, Ethics, and Etiquette (Part 2)
Online Safety, Security, Ethics, and Etiquette (Part 2)Online Safety, Security, Ethics, and Etiquette (Part 2)
Online Safety, Security, Ethics, and Etiquette (Part 2)
 
Social Media - Empowerment Tech: ICT for Professional Tracks
Social Media - Empowerment Tech: ICT for Professional TracksSocial Media - Empowerment Tech: ICT for Professional Tracks
Social Media - Empowerment Tech: ICT for Professional Tracks
 
Install computer system,devices and peripherals
Install computer system,devices and peripheralsInstall computer system,devices and peripherals
Install computer system,devices and peripherals
 
Natures and Purpose of Online Platforms and Applications
Natures and Purpose of Online Platforms and ApplicationsNatures and Purpose of Online Platforms and Applications
Natures and Purpose of Online Platforms and Applications
 
2 Online Safety, Security, Ethics, and Etiquette
2 Online Safety,  Security, Ethics, and Etiquette2 Online Safety,  Security, Ethics, and Etiquette
2 Online Safety, Security, Ethics, and Etiquette
 

Viewers also liked

Netiquette
NetiquetteNetiquette
Netiquette
sara ibrahim
 
Mirsis Corporate Overview
Mirsis Corporate OverviewMirsis Corporate Overview
Mirsis Corporate Overview
Mirsis Bilgi Teknolojileri
 
Photoessay
PhotoessayPhotoessay
Photoessay
ErikaReyes123
 
Subsalt Steep Dip Imaging Study with 3D Acoustic Modeling
Subsalt Steep Dip Imaging Study  with 3D Acoustic  ModelingSubsalt Steep Dip Imaging Study  with 3D Acoustic  Modeling
Subsalt Steep Dip Imaging Study with 3D Acoustic Modelingleizhuo
 
N card student_orientation_2011
N card student_orientation_2011N card student_orientation_2011
N card student_orientation_2011
Maera Carr Bradberry
 
Gandhi Heritage Portal ... A March towards preserving heritage
Gandhi Heritage Portal ... A March towards preserving heritageGandhi Heritage Portal ... A March towards preserving heritage
Gandhi Heritage Portal ... A March towards preserving heritage
Dr. Viratkumar Kothari
 
Indian polity 11
Indian polity 11Indian polity 11
Indian polity 11
Kushagra Ghogre
 
Mirsis Test Hizmeti
Mirsis Test Hizmeti Mirsis Test Hizmeti
Mirsis Test Hizmeti
Mirsis Bilgi Teknolojileri
 
สนใจ ไม่ได้แปลว่าได้ใจ
สนใจ ไม่ได้แปลว่าได้ใจสนใจ ไม่ได้แปลว่าได้ใจ
สนใจ ไม่ได้แปลว่าได้ใจ
nudeJEH
 
BOM Team Prosperity
BOM Team ProsperityBOM Team Prosperity
BOM Team Prosperity
Ketty Masim
 
Triconf
TriconfTriconf
Alex gutierrez final powerpoint
Alex gutierrez  final powerpointAlex gutierrez  final powerpoint
Alex gutierrez final powerpointalexg20
 
Presentatie Astorium IT 2011
Presentatie Astorium IT 2011Presentatie Astorium IT 2011
Presentatie Astorium IT 2011
Mustafa Cevik
 

Viewers also liked (20)

Netiquette
NetiquetteNetiquette
Netiquette
 
January 2010
January 2010January 2010
January 2010
 
Mirsis Corporate Overview
Mirsis Corporate OverviewMirsis Corporate Overview
Mirsis Corporate Overview
 
Photoessay
PhotoessayPhotoessay
Photoessay
 
QOL
QOLQOL
QOL
 
Visual Resume
Visual ResumeVisual Resume
Visual Resume
 
Michal@gala
Michal@galaMichal@gala
Michal@gala
 
Facebook
FacebookFacebook
Facebook
 
Subsalt Steep Dip Imaging Study with 3D Acoustic Modeling
Subsalt Steep Dip Imaging Study  with 3D Acoustic  ModelingSubsalt Steep Dip Imaging Study  with 3D Acoustic  Modeling
Subsalt Steep Dip Imaging Study with 3D Acoustic Modeling
 
N card student_orientation_2011
N card student_orientation_2011N card student_orientation_2011
N card student_orientation_2011
 
Final 3
Final 3Final 3
Final 3
 
Gandhi Heritage Portal ... A March towards preserving heritage
Gandhi Heritage Portal ... A March towards preserving heritageGandhi Heritage Portal ... A March towards preserving heritage
Gandhi Heritage Portal ... A March towards preserving heritage
 
Indian polity 11
Indian polity 11Indian polity 11
Indian polity 11
 
Mirsis Test Hizmeti
Mirsis Test Hizmeti Mirsis Test Hizmeti
Mirsis Test Hizmeti
 
สนใจ ไม่ได้แปลว่าได้ใจ
สนใจ ไม่ได้แปลว่าได้ใจสนใจ ไม่ได้แปลว่าได้ใจ
สนใจ ไม่ได้แปลว่าได้ใจ
 
BOM Team Prosperity
BOM Team ProsperityBOM Team Prosperity
BOM Team Prosperity
 
Triconf
TriconfTriconf
Triconf
 
Alex gutierrez final powerpoint
Alex gutierrez  final powerpointAlex gutierrez  final powerpoint
Alex gutierrez final powerpoint
 
Cloudbased solutions services
Cloudbased solutions servicesCloudbased solutions services
Cloudbased solutions services
 
Presentatie Astorium IT 2011
Presentatie Astorium IT 2011Presentatie Astorium IT 2011
Presentatie Astorium IT 2011
 

Similar to Netiquette stassie

Net project
Net projectNet project
Net project
Leona Rose Beltran
 
CAS110 Netiquette PPT when using the internet
CAS110 Netiquette PPT when using the internetCAS110 Netiquette PPT when using the internet
CAS110 Netiquette PPT when using the internet
HendrixAntonniAmante
 
Netiquette.ppt
Netiquette.pptNetiquette.ppt
Netiquette.ppt
SarahTan574694
 
Netiquette do’s & don’ts
Netiquette do’s & don’tsNetiquette do’s & don’ts
Netiquette do’s & don’ts
Amy Whitener, Ed.S
 
Netiquette Rules
Netiquette RulesNetiquette Rules
Netiquette RulesRaquelPG96
 
The 10 commandments of the common computer (1)
The 10 commandments of the common computer (1)The 10 commandments of the common computer (1)
The 10 commandments of the common computer (1)
MudgeoTorso1091
 
The essential rules of netiquette by Halina
The essential rules of netiquette by HalinaThe essential rules of netiquette by Halina
The essential rules of netiquette by Halina
Self-employed
 
The 10 core rules of netiqutte
The 10 core rules of netiqutteThe 10 core rules of netiqutte
The 10 core rules of netiqutteMudgeoTorso1091
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
Rexly Lasaca
 
Internet etiquette
Internet etiquetteInternet etiquette
Internet etiquetteAdy Setiawan
 
Teens on the net
Teens on the netTeens on the net
Teens on the net
talandronmmp
 
Netiquette by Ankush Agrawal
Netiquette by Ankush AgrawalNetiquette by Ankush Agrawal
Netiquette by Ankush Agrawal
Ankush Agrawal
 
Lesson 2.1 Rules of Netiquette.pptx
Lesson 2.1 Rules of Netiquette.pptxLesson 2.1 Rules of Netiquette.pptx
Lesson 2.1 Rules of Netiquette.pptx
Grayzon Gonzales, LPT
 
Digital student netiquette
Digital student netiquetteDigital student netiquette
Digital student netiquettelynorense
 
Netiquettes.pptx
Netiquettes.pptxNetiquettes.pptx
Netiquettes.pptx
SheilaTorino
 
Netiquette
NetiquetteNetiquette
Netiquette
shubham jindal
 
Media and Information Literacy Netiquette
Media and Information Literacy NetiquetteMedia and Information Literacy Netiquette
Media and Information Literacy Netiquette
JPAballe
 
10 internet rules when using the internet.pptx
10 internet rules when using the internet.pptx10 internet rules when using the internet.pptx
10 internet rules when using the internet.pptx
DaveCalapis3
 

Similar to Netiquette stassie (20)

Net project
Net projectNet project
Net project
 
CAS110 Netiquette PPT when using the internet
CAS110 Netiquette PPT when using the internetCAS110 Netiquette PPT when using the internet
CAS110 Netiquette PPT when using the internet
 
Netiquette.ppt
Netiquette.pptNetiquette.ppt
Netiquette.ppt
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Netiquette do’s & don’ts
Netiquette do’s & don’tsNetiquette do’s & don’ts
Netiquette do’s & don’ts
 
Netiquette mine
Netiquette mineNetiquette mine
Netiquette mine
 
Netiquette Rules
Netiquette RulesNetiquette Rules
Netiquette Rules
 
The 10 commandments of the common computer (1)
The 10 commandments of the common computer (1)The 10 commandments of the common computer (1)
The 10 commandments of the common computer (1)
 
The essential rules of netiquette by Halina
The essential rules of netiquette by HalinaThe essential rules of netiquette by Halina
The essential rules of netiquette by Halina
 
The 10 core rules of netiqutte
The 10 core rules of netiqutteThe 10 core rules of netiqutte
The 10 core rules of netiqutte
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Internet etiquette
Internet etiquetteInternet etiquette
Internet etiquette
 
Teens on the net
Teens on the netTeens on the net
Teens on the net
 
Netiquette by Ankush Agrawal
Netiquette by Ankush AgrawalNetiquette by Ankush Agrawal
Netiquette by Ankush Agrawal
 
Lesson 2.1 Rules of Netiquette.pptx
Lesson 2.1 Rules of Netiquette.pptxLesson 2.1 Rules of Netiquette.pptx
Lesson 2.1 Rules of Netiquette.pptx
 
Digital student netiquette
Digital student netiquetteDigital student netiquette
Digital student netiquette
 
Netiquettes.pptx
Netiquettes.pptxNetiquettes.pptx
Netiquettes.pptx
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Media and Information Literacy Netiquette
Media and Information Literacy NetiquetteMedia and Information Literacy Netiquette
Media and Information Literacy Netiquette
 
10 internet rules when using the internet.pptx
10 internet rules when using the internet.pptx10 internet rules when using the internet.pptx
10 internet rules when using the internet.pptx
 

Recently uploaded

Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 

Recently uploaded (20)

Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 

Netiquette stassie

  • 1. Internet Etiquette orInternet Etiquette or NetiquetteNetiquette BY: Jill StassieBY: Jill Stassie
  • 2. Ten Rules Of NetiquetteTen Rules Of Netiquette  There are Ten rules ofThere are Ten rules of Netiquette that everyone whoNetiquette that everyone who goes online should follow.goes online should follow.  You should remember themYou should remember them every time you go online.every time you go online.  Netiquette is a set of rules forNetiquette is a set of rules for behaving properly online.behaving properly online.  The ten rules are as follows.The ten rules are as follows.
  • 3. Rule No. 1: Remember theRule No. 1: Remember the HumanHuman  You need toYou need to remember that you areremember that you are talking to a real persontalking to a real person when you are online.when you are online.  The internet bringsThe internet brings people together whopeople together who would otherwise neverwould otherwise never meet.meet.  Remember this sayingRemember this saying when sending anwhen sending an email: Would I sayemail: Would I say this to the person’sthis to the person’s face.face.
  • 4. Rule No.2: Adhere to the sameRule No.2: Adhere to the same standards online that you follow instandards online that you follow in real lifereal life  You need to behaveYou need to behave the same way onlinethe same way online that you do in real life.that you do in real life.  You need toYou need to remember that youremember that you can get caught doingcan get caught doing things you should notthings you should not be doing online justbe doing online just like you can in real life.like you can in real life.  You are still talking toYou are still talking to a real person witha real person with feelings even thoughfeelings even though you can’t see them.you can’t see them.
  • 5. Rule no. 3: Know where youRule no. 3: Know where you are in cyberspace.are in cyberspace.  Always take a look around whenAlways take a look around when you enter a new domain whenyou enter a new domain when surfing the web.surfing the web.  Get a sense of what theGet a sense of what the discussion group is about beforediscussion group is about before you join it.you join it.
  • 6. Rule no.4: Respect otherRule no.4: Respect other people’s time and bandwidth.people’s time and bandwidth.  Remember people have otherRemember people have other things to do besides read yourthings to do besides read your email. You are not the center ofemail. You are not the center of their world.their world.  Keep your post and emails to aKeep your post and emails to a minimum by saying what youminimum by saying what you want to say.want to say.  Remember everyone won’tRemember everyone won’t answer your questions.answer your questions.
  • 7. Rule No. 5: Make yourselfRule No. 5: Make yourself look good online.look good online.  Remember to always checkRemember to always check your spelling and grammaryour spelling and grammar before posting.before posting.  Always know what you areAlways know what you are talking about and make sensetalking about and make sense saying it.saying it.  Be polite and pleasant toBe polite and pleasant to everyone.everyone.
  • 8. Rule no. 6: Share expertRule no. 6: Share expert knowledgeknowledge  Ask questions onlineAsk questions online  Share what you know online.Share what you know online.  Post the answers to yourPost the answers to your questions online becausequestions online because someone may have the samesomeone may have the same question you do.question you do.
  • 9. Rule No.7: Help keep flameRule No.7: Help keep flame wars under controlwars under control  Netiquette doesNetiquette does not forbidnot forbid flaming.flaming.  Netiquette doesNetiquette does however forbidhowever forbid people who arepeople who are flaming to hurtflaming to hurt discussiondiscussion groups bygroups by putting theputting the group down.group down.
  • 10. Rule No. 8: Respect otherRule No. 8: Respect other people’s privacypeople’s privacy  Do not read other people’s mailDo not read other people’s mail without their permission.without their permission.  Going through other people’sGoing through other people’s things could cost you your job orthings could cost you your job or you could even go to jail.you could even go to jail.  Not respecting other people’sNot respecting other people’s privacy is bad Netiquette.privacy is bad Netiquette.
  • 11. Rule No.9: Don’t abuse yourRule No.9: Don’t abuse your power.power.  Do not take advantage of otherDo not take advantage of other people just because you havepeople just because you have more knowledge or power thanmore knowledge or power than them.them.  Treat others as you would wantTreat others as you would want them to treat you if the rolesthem to treat you if the roles were reversed.were reversed.
  • 12. Rule No. 10: Be forgiving ofRule No. 10: Be forgiving of other people’s mistakes.other people’s mistakes.  Do not point out mistakes toDo not point out mistakes to people online.people online.  Remember that you were onceRemember that you were once the new kid on the block.the new kid on the block.  You still need to have goodYou still need to have good manners even though you aremanners even though you are online and can not see theonline and can not see the person face to face.person face to face.
  • 13. Email EtiquetteEmail Etiquette  There are etiquetteThere are etiquette rules for emailrules for email messages also.messages also. They are asThey are as follows:follows:  Check your emailCheck your email dailydaily  Delete unwantedDelete unwanted messages.messages.  Keep messages inKeep messages in your box to ayour box to a minimumminimum  Mail messagesMail messages can becan be downloaded anddownloaded and save for futuresave for future references.references.  Never assume thatNever assume that your Email can beyour Email can be read by no one butread by no one but yourself.yourself.  Remember thereRemember there are always beare always be lurking aroundlurking around onlineonline
  • 14. Ten Commandments ofTen Commandments of Computer EthicsComputer Ethics  Ten commandmentsTen commandments taken from the Usertaken from the User Guidelines andGuidelines and Netiquette By ArleneNetiquette By Arlene Rinaldi. TenRinaldi. Ten commandments are ascommandments are as follows:follows:  Thou shalt not useThou shalt not use computer to harmcomputer to harm people.people.  Thou shalt not interfereThou shalt not interfere with other people’s work.with other people’s work.  Thou shalt not snoopThou shalt not snoop around other people’saround other people’s files.files.  Thou shalt not use aThou shalt not use a computer to stealcomputer to steal  Thou shalt not use aThou shalt not use a computer to bear falsecomputer to bear false witnesswitness  Thou shalt not use orThou shalt not use or copy software.copy software.  Thou shalt not use otherThou shalt not use other people’s computerpeople’s computer resources.resources.  Thou shalt notThou shalt not appropriate otherappropriate other people’s intellectualpeople’s intellectual output.output.  Thou shalt think aboutThou shalt think about the social consequencesthe social consequences of the program you write.of the program you write.  Thou shalt use aThou shalt use a computer in ways thacomputer in ways tha show consideration andshow consideration and respect.respect.
  • 15. NetiquetteNetiquette  Remember theRemember the Ten rules ofTen rules of Netiquette andNetiquette and the Tenthe Ten commandmentscommandments for computerfor computer Ethics while youEthics while you are online andare online and you will notyou will not have anyhave any problems.problems.
  • 16. Remember the Rules!!!!Remember the Rules!!!! The EndThe End