The essential rules of netiquette by HalinaSelf-employed
The golden rule your parents and your kindergarten teacher taught you was pretty simple: Do unto others as you'd have others do unto you. Imagine how you'd feel if you were in the other person's shoes. Stand up for yourself, but try not to hurt people's feelings.
In cyberspace, we state this in an even more basic manner: Remember the human.
Introduction, Why netiquette, What is netiquette or what is internet etiquette or what is net etiquette, Different rules for netiquette , Rule No. 1: Remember the Human. Rule No. 1: Remember the Human. Rule no. 3: Know where you are in cyberspace. and so on...
The presentation I created for students to make them aware and how to be more precautious to deal with day to day cyberattacks under Teach for India Volunteers.
The essential rules of netiquette by HalinaSelf-employed
The golden rule your parents and your kindergarten teacher taught you was pretty simple: Do unto others as you'd have others do unto you. Imagine how you'd feel if you were in the other person's shoes. Stand up for yourself, but try not to hurt people's feelings.
In cyberspace, we state this in an even more basic manner: Remember the human.
Introduction, Why netiquette, What is netiquette or what is internet etiquette or what is net etiquette, Different rules for netiquette , Rule No. 1: Remember the Human. Rule No. 1: Remember the Human. Rule no. 3: Know where you are in cyberspace. and so on...
The presentation I created for students to make them aware and how to be more precautious to deal with day to day cyberattacks under Teach for India Volunteers.
Quant - Interchain Development And Cross-Chain Protocols. BlockchainLive 2018Gilbert Verdian
The Internet of Trust: Network of inter-connected blockchain networks to transact Value.
I covered the history of the Internet, the mistakes we made with OSI and why we’re making the same mistakes again on blockchain.
The problem with Blockchain today is lack of Openness, Adoption and Proprietary Technology
#Overledger solves this.
E marketing the essential guide to online marketingrealtop466
eMarketing, Online Marketing, social medial, digital marketing, hocipi.com, marketing technology, information technology, make money online, email marketing
Chapter 5 Networking and Communication Learning Objecti.docxrobertad6
Chapter 5: Networking and
Communication
Learning Objectives
Upon successful completion of this chapter, you will be
able to:
• understand the history and development of
networking technologies;
• define the key terms associated with networking
technologies;
• understand the importance of broadband
technologies; and
• describe organizational networking.
Introduction
In the early days of computing, computers were seen as devices
for making calculations, storing data, and automating business
processes. However, as the devices evolved, it became apparent that
many of the functions of telecommunications could be integrated
into the computer. During the 1980s, many organizations began
Chapter 5: Networking and
Communication | 99
combining their once-separate telecommunications and
information systems departments into an Information Technology
(IT) department. This ability for computers to communicate with
one another and to facilitate communication between individuals
and groups has had a major impact on the growth of computing over
the past several decades.
Computer networking began in the 1960s with the birth of the
Internet. However, while the Internet and web were evolving,
corporate networking was also taking shape in the form of local
area networks and client-server computing. The Internet went
commercial in 1994 as technologies began to pervade all areas of the
organization. Today it would be unthinkable to have a computer that
did not include communications capabilities. This chapter reviews
the different technologies that have been put in place to enable this
communications revolution.
A Brief History of the Internet
In the Beginning: ARPANET
The story of the Internet, and networking in general, can be traced
back to the late 1950s. The United States was in the depths of the
Cold War with the USSR as each nation closely watched the other
to determine which would gain a military or intelligence advantage.
In 1957, the Soviets surprised the U.S. with the launch of Sputnik,
propelling us into the space age. In response to Sputnik, the U.S.
Government created the Advanced Research Projects Agency
(ARPA), whose initial role was to ensure that the U.S. was not
surprised again. It was from ARPA, now called DARPA
((Defense Advanced Research Projects Agency), that the Internet
first sprang.
100 | Information Systems for Business and Beyond (2019)
http://history.nasa.gov/sputnik
ARPA was the center of computing research in the 1960s, but
there was just one problem. Many of the computers could not
communicate with each other. In 1968 ARPA sent out a request
for proposals for a communication technology that would allow
different computers located around the country to be integrated
together into one network. Twelve companies responded to the
request, and a company named Bolt, Beranek, and Newman (BBN)
won the contract. They immediately b.
1. NETTIQUETTE
•Definition
•History
•Common Rules
•Importance of Netiquette
•Types of Netiquette
2. `
network etiquette, the do's and don'ts of online
communication
is a set of social conventions that facilitate
interaction over networks, ranging from usenet
and mailing lists to blogs and forum
3. HISTORY
Netiquette began before the 1991 start
of the World Wide Web.
Text-based email, Telnet, Usenet,
Gopher, Wais, and FTP from
educational and research bodies
dominated Internet traffic.
4. CONT…
Atthat time, it was considered somewhat
indecent to make commercial public
postings, and the limitations of insecure,
text-only communications demanded that
the community have a common set of
rules.
5. CONT…
Theterm "netiquette" has been in use
since at least 1983, as evidenced by
posts of the satirical "Dear Emily"
Postnews column
6. COMMON RULES
1. Remember the human
2. Adhere to the standards of behavior online
that you follow in real life
3. Know where you are in cyberspace
4. Respect other people’s time and
bandwidth
5. Make yourself look good online
7. CONT…
6. Share expert knowledge
7. Help keep flame wars under controls
8. Respect other people’s privacy
9. Don’t abuse your power
10. Be forgiving of other people’s mistakes
9. You and your virtual buddies
Developing time-saving habits
Things never to post to a
discussion group
• Requests for the FAQ.
• Answers to basic or stupid
questions.
10. What can you do to prevent that?
Don't stay logged in when you're not doing
anything. If possible, log in at off-peak hours.
Download only files you actually need.
If a file looks interesting but you're not entirely
sure what it is, download and read the
associated README file.
12. NETTIQUETTE OF
SENDING
BE BRIEF
USE WHITE SPACE
USE DESCRIPTIVE SUBJECT-LINES
STAY ON-TOPICS
BECAREFUL SENDING ATTACHMENTS
COPY THE MINIMUN NUMBER OF PEOPLE
INCLUDE YOUR EMAIL ADRESS
RESPECT THE NON-COMERCIALSPACE
AVOID FLAMING
13. NETTIQUETTE OF REPLYING
Replying and Forwarding
Summarizes for The Group
Check Currents Information Before
Replying
Reference Past Communications
Acknowledge Important
Communications
14. NETTIQUETTE OF CONFIDENTIALLY
DON’T PUBLISH OTHER’S EMAIL
ADDRESSES
NEVER SEND WHAT YOU DON’T READ
REMEMBER ARCHIVING
RESPECT COPYRIGHT
15. CONCLUSION
DEFINITION
HISTORY
NETTIQUETTE COMMON RULES
IMPORTANCES OF
NETTIQUETTE
TYPES OF
NETTIQUETTE