SlideShare a Scribd company logo
By: Alyssa Nicole Barnes
Our first topic is plagiarism and the importance of how dangerous it is.
If you do plagiarize something then you could actually end up in jail. Yes
jail, if someone has copy rights to the work you plagiarized, then you
could be sued or sent to prison to stealing a copyrighted document.
More on Plagiarism
 Plagiarism is not a good    There two types of
  thing.                       plagiarism
 It could lead to many       Word for word plagiarism
  things, and sometimes        and paraphrasing
  even financial               plagiarism.
  consequences, not just a    Paraphrasing plagiarism is
  bad grade.                   basically taking two or
                               more sentences from a
                               copyrighted site and trying
                               to hide it with other text in
                               your own words. This is
                               still plagiarism if you don’t
                               state your resources.
Even more
on
plagiarism…
Plagiarism is taken very
seriously every where
it’s even a crime if taken
into court matters. It
could also lead in the
failure of your
class, report, exam, eve
n grade sometimes if it
happens enough.
The next topic on our list is Netiquette. It is a mix between two
words (etiquette and internet )which means proper behavior on
the internet. Netiquette is very important to think about when
on a social network or even talking to someone via email.
More on Netiquette…
               Netiquette is a very
                important thing when on
                the internet.
               No matter whether you
                delete what you said or
                think you did, the
                internet is forever and
                that message is still
                somewhere on the
                internet.
Even more on Netiquette…
 It is a term that all people need     There are many things that
  to think about before they hit         netiquette states and one is it
  the send button.                       emotes and emphasis.
 Think about how many people           When you are sending a
  are going to see the message. It’s     message on the computer do not
  not just that one person you are       put your message in all caps
  sending it to.                         because it seems you are
                                         shouting at that person.
                                        Emotes are an abbreviation for
                                         emoticons which is like a smiley
                                         face it is there to show emotion
                                         that you really cannot express in
                                         words so don’t abuse to a point
                                         where no one knows what you
                                         are trying to say.
Yep still Netiquette...
Netiquette is a very serious thing for people of all ages
especially if you are an adult. If you are an adult looking
for a job and there is a bad message floating around the
internet about you, do you really think the person giving
you a job isn’t going to look you up on the internet to see
your history? So your chances of getting that job are very
slim. So even adults need to be careful when on social
networks as well as teens and younger children.
The next topic on the list is Copyrights. Copyrights are law enforced
agreements with material. If you have copyrights to something that
you wrote, it is yours and no one can steal your ideas. If someone does
steal it then you have the legal rights to sue them or take them to
court.
More on copyrights…
 Copyrights are also a
  serious matter if they are
  stolen.
 If copyrighted material is
  stolen it is called
  plagiarism.
 Copyrights are when you
  create something and you
  want it to be yours and no
  one can steal it so you can
  get a copyright agreement
  to your work.
Hi I hope you liked my slide show on plagiarism, copyrights ,and netiquette. I
hope you learned a few things and Thanks for watching, and I do hope you
watched because here is a quiz
1.   What could happen if you plagiarize a copyrighted document without
     permission?
2. What is the two words that netiquette is a mix between?
3. What could happen if you are an adult trying to get a job with something
     bad about you floating around the internet?
4. If you delete something off the internet does it really ever go away?
Reference Page for information
 This is a fact site for plagiarism that I based the
  information for slides 2-4 off of. www.plagiarism.com
  (2012)
 This is also a fact site for copyrights that I based the
  information for slides 9- 11 off of. www.copyright.gov/
  (2012)
References for pictures
 The plagiarism sign www.webster.edu (2012)
 The word cloud
  www.languageteachingtips.wordpress.com (2012)
 The netiquette smileyface www.parham.me (n.d)
 The copyrightlock www.royal-dunfermline.com (2010)
 The copyrightsign
www.issuesincyberspace.blogspot.com(n.d)
 The thankyou sign www.netchoice.typepad.com(2011)
Thanks 4 watching ♥

More Related Content

What's hot

Crosbye digitialcitizenship
Crosbye digitialcitizenshipCrosbye digitialcitizenship
Crosbye digitialcitizenship
crosbye
 
Nakyra hill proper netiquette 9 18-12
Nakyra hill proper netiquette 9 18-12Nakyra hill proper netiquette 9 18-12
Nakyra hill proper netiquette 9 18-12nakyrahill915
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
Leelet1121
 
What Is Digital Etiquette
What Is Digital EtiquetteWhat Is Digital Etiquette
What Is Digital Etiquette
guestc38192
 
Plagiarism, Netiquette, And Copyrighting
Plagiarism, Netiquette, And CopyrightingPlagiarism, Netiquette, And Copyrighting
Plagiarism, Netiquette, And Copyrighting
Ayee_Its_Bailey
 
Digital citizenship for Students
Digital citizenship for StudentsDigital citizenship for Students
Digital citizenship for Students
Kelgator
 
Proper behavior on the web
Proper behavior on the webProper behavior on the web
Proper behavior on the webhaleycockrell208
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for students
Larry Magid
 
Etiquette in the Digital World
Etiquette in the Digital WorldEtiquette in the Digital World
Etiquette in the Digital World
mgastgoodman
 
Internet etiquette
Internet etiquetteInternet etiquette
Internet etiquetteAdy Setiawan
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquettedhabyahalk
 
Digital citizenship project
Digital citizenship projectDigital citizenship project
Digital citizenship projectfig2381
 
Rules of netiquette
Rules of netiquetteRules of netiquette
Rules of netiquetteklknight79
 
5b Digital Citizenship 2
5b Digital Citizenship 25b Digital Citizenship 2
5b Digital Citizenship 2Anja Junginger
 
Digital etiquette
Digital etiquetteDigital etiquette
Digital etiquette13amd
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
EmmanuelaSernicul
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette13sh
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
Kati W
 

What's hot (19)

Crosbye digitialcitizenship
Crosbye digitialcitizenshipCrosbye digitialcitizenship
Crosbye digitialcitizenship
 
Nakyra hill proper netiquette 9 18-12
Nakyra hill proper netiquette 9 18-12Nakyra hill proper netiquette 9 18-12
Nakyra hill proper netiquette 9 18-12
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
What Is Digital Etiquette
What Is Digital EtiquetteWhat Is Digital Etiquette
What Is Digital Etiquette
 
Plagiarism, Netiquette, And Copyrighting
Plagiarism, Netiquette, And CopyrightingPlagiarism, Netiquette, And Copyrighting
Plagiarism, Netiquette, And Copyrighting
 
Netiquette mine
Netiquette mineNetiquette mine
Netiquette mine
 
Digital citizenship for Students
Digital citizenship for StudentsDigital citizenship for Students
Digital citizenship for Students
 
Proper behavior on the web
Proper behavior on the webProper behavior on the web
Proper behavior on the web
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for students
 
Etiquette in the Digital World
Etiquette in the Digital WorldEtiquette in the Digital World
Etiquette in the Digital World
 
Internet etiquette
Internet etiquetteInternet etiquette
Internet etiquette
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette
 
Digital citizenship project
Digital citizenship projectDigital citizenship project
Digital citizenship project
 
Rules of netiquette
Rules of netiquetteRules of netiquette
Rules of netiquette
 
5b Digital Citizenship 2
5b Digital Citizenship 25b Digital Citizenship 2
5b Digital Citizenship 2
 
Digital etiquette
Digital etiquetteDigital etiquette
Digital etiquette
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 

Similar to Proper Behavior on the Computer

Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette13sh
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette13sh
 
Cedric dixon powerpoint 4 ms.whitaker 4
Cedric dixon powerpoint 4 ms.whitaker 4Cedric dixon powerpoint 4 ms.whitaker 4
Cedric dixon powerpoint 4 ms.whitaker 4cedric1977
 
Casting online shadows- how people on the web change your identity
Casting online shadows- how people on the web change your identityCasting online shadows- how people on the web change your identity
Casting online shadows- how people on the web change your identity
Christian Heilmann
 
Cedric dixon powerpoint 4 ms.whitaker 4
Cedric dixon powerpoint 4 ms.whitaker 4Cedric dixon powerpoint 4 ms.whitaker 4
Cedric dixon powerpoint 4 ms.whitaker 4cedric1977
 
Cedric dixon powerpoint 4 ms.whitaker 4
Cedric dixon powerpoint 4 ms.whitaker 4Cedric dixon powerpoint 4 ms.whitaker 4
Cedric dixon powerpoint 4 ms.whitaker 4cedric1977
 
Cedric dixon powerpoint 4 ms.whitaker 3 (1)
Cedric dixon powerpoint 4 ms.whitaker 3 (1)Cedric dixon powerpoint 4 ms.whitaker 3 (1)
Cedric dixon powerpoint 4 ms.whitaker 3 (1)cedric1977
 
Netiquettes.pptx
Netiquettes.pptxNetiquettes.pptx
Netiquettes.pptx
SheilaTorino
 
Digital etiquette for wiki presentation
Digital etiquette for wiki presentationDigital etiquette for wiki presentation
Digital etiquette for wiki presentationDebra Duncan
 
Q3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfQ3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdf
BryanSmile
 
Akira simmons netiquette
Akira simmons netiquetteAkira simmons netiquette
Akira simmons netiquette
akirasimmons
 
Plagiarism, Netiquette, and Copyright Talk
Plagiarism, Netiquette, and Copyright TalkPlagiarism, Netiquette, and Copyright Talk
Plagiarism, Netiquette, and Copyright Talk
mdfahad27803
 
How good are your internet manners proj. slideshare project this one
How good are your internet manners proj. slideshare project this oneHow good are your internet manners proj. slideshare project this one
How good are your internet manners proj. slideshare project this oneXxxCelesteTxxX
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
Nurizcka
 
The 10 commandments of the common computer (1)
The 10 commandments of the common computer (1)The 10 commandments of the common computer (1)
The 10 commandments of the common computer (1)
MudgeoTorso1091
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
Kermit Agbas
 

Similar to Proper Behavior on the Computer (20)

Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette
 
Cedric dixon powerpoint 4 ms.whitaker 4
Cedric dixon powerpoint 4 ms.whitaker 4Cedric dixon powerpoint 4 ms.whitaker 4
Cedric dixon powerpoint 4 ms.whitaker 4
 
Casting online shadows- how people on the web change your identity
Casting online shadows- how people on the web change your identityCasting online shadows- how people on the web change your identity
Casting online shadows- how people on the web change your identity
 
Cedric dixon powerpoint 4 ms.whitaker 4
Cedric dixon powerpoint 4 ms.whitaker 4Cedric dixon powerpoint 4 ms.whitaker 4
Cedric dixon powerpoint 4 ms.whitaker 4
 
Cedric dixon powerpoint 4 ms.whitaker 4
Cedric dixon powerpoint 4 ms.whitaker 4Cedric dixon powerpoint 4 ms.whitaker 4
Cedric dixon powerpoint 4 ms.whitaker 4
 
Cedric dixon powerpoint 4 ms.whitaker 3 (1)
Cedric dixon powerpoint 4 ms.whitaker 3 (1)Cedric dixon powerpoint 4 ms.whitaker 3 (1)
Cedric dixon powerpoint 4 ms.whitaker 3 (1)
 
Netiquettes.pptx
Netiquettes.pptxNetiquettes.pptx
Netiquettes.pptx
 
Digital etiquette for wiki presentation
Digital etiquette for wiki presentationDigital etiquette for wiki presentation
Digital etiquette for wiki presentation
 
Q3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfQ3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdf
 
Akira simmons netiquette
Akira simmons netiquetteAkira simmons netiquette
Akira simmons netiquette
 
Plagiarism, Netiquette, and Copyright Talk
Plagiarism, Netiquette, and Copyright TalkPlagiarism, Netiquette, and Copyright Talk
Plagiarism, Netiquette, and Copyright Talk
 
How good are your internet manners proj. slideshare project this one
How good are your internet manners proj. slideshare project this oneHow good are your internet manners proj. slideshare project this one
How good are your internet manners proj. slideshare project this one
 
Internet manners
Internet mannersInternet manners
Internet manners
 
Internet manners
Internet mannersInternet manners
Internet manners
 
Internet manners
Internet mannersInternet manners
Internet manners
 
Internet manners
Internet mannersInternet manners
Internet manners
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
The 10 commandments of the common computer (1)
The 10 commandments of the common computer (1)The 10 commandments of the common computer (1)
The 10 commandments of the common computer (1)
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 

Recently uploaded

Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 

Recently uploaded (20)

Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 

Proper Behavior on the Computer

  • 2. Our first topic is plagiarism and the importance of how dangerous it is. If you do plagiarize something then you could actually end up in jail. Yes jail, if someone has copy rights to the work you plagiarized, then you could be sued or sent to prison to stealing a copyrighted document.
  • 3. More on Plagiarism  Plagiarism is not a good  There two types of thing. plagiarism  It could lead to many  Word for word plagiarism things, and sometimes and paraphrasing even financial plagiarism. consequences, not just a  Paraphrasing plagiarism is bad grade. basically taking two or more sentences from a copyrighted site and trying to hide it with other text in your own words. This is still plagiarism if you don’t state your resources.
  • 4. Even more on plagiarism… Plagiarism is taken very seriously every where it’s even a crime if taken into court matters. It could also lead in the failure of your class, report, exam, eve n grade sometimes if it happens enough.
  • 5. The next topic on our list is Netiquette. It is a mix between two words (etiquette and internet )which means proper behavior on the internet. Netiquette is very important to think about when on a social network or even talking to someone via email.
  • 6. More on Netiquette…  Netiquette is a very important thing when on the internet.  No matter whether you delete what you said or think you did, the internet is forever and that message is still somewhere on the internet.
  • 7. Even more on Netiquette…  It is a term that all people need  There are many things that to think about before they hit netiquette states and one is it the send button. emotes and emphasis.  Think about how many people  When you are sending a are going to see the message. It’s message on the computer do not not just that one person you are put your message in all caps sending it to. because it seems you are shouting at that person.  Emotes are an abbreviation for emoticons which is like a smiley face it is there to show emotion that you really cannot express in words so don’t abuse to a point where no one knows what you are trying to say.
  • 8. Yep still Netiquette... Netiquette is a very serious thing for people of all ages especially if you are an adult. If you are an adult looking for a job and there is a bad message floating around the internet about you, do you really think the person giving you a job isn’t going to look you up on the internet to see your history? So your chances of getting that job are very slim. So even adults need to be careful when on social networks as well as teens and younger children.
  • 9. The next topic on the list is Copyrights. Copyrights are law enforced agreements with material. If you have copyrights to something that you wrote, it is yours and no one can steal your ideas. If someone does steal it then you have the legal rights to sue them or take them to court.
  • 10. More on copyrights…  Copyrights are also a serious matter if they are stolen.  If copyrighted material is stolen it is called plagiarism.  Copyrights are when you create something and you want it to be yours and no one can steal it so you can get a copyright agreement to your work.
  • 11. Hi I hope you liked my slide show on plagiarism, copyrights ,and netiquette. I hope you learned a few things and Thanks for watching, and I do hope you watched because here is a quiz 1. What could happen if you plagiarize a copyrighted document without permission? 2. What is the two words that netiquette is a mix between? 3. What could happen if you are an adult trying to get a job with something bad about you floating around the internet? 4. If you delete something off the internet does it really ever go away?
  • 12. Reference Page for information  This is a fact site for plagiarism that I based the information for slides 2-4 off of. www.plagiarism.com (2012)  This is also a fact site for copyrights that I based the information for slides 9- 11 off of. www.copyright.gov/ (2012)
  • 13. References for pictures  The plagiarism sign www.webster.edu (2012)  The word cloud www.languageteachingtips.wordpress.com (2012)  The netiquette smileyface www.parham.me (n.d)  The copyrightlock www.royal-dunfermline.com (2010)  The copyrightsign www.issuesincyberspace.blogspot.com(n.d)  The thankyou sign www.netchoice.typepad.com(2011)