SlideShare a Scribd company logo
1 of 12
1.Use computer Courtesy

   Whether the person is sending an
email, chatting in a forum, it is important to
be courteous and respectful of others online.
2. Use Emotions

   When communicating online, it can be
difficult to gauge a writer’s emotion. Unless a
web camera or microphone is used, the
writer’s expressions or emotion is difficult to
determined. By using emoticons, the writer’s
proper emotion will be conveyed to the
reader.
3. Watch what you click

 Don’t just click anything in a web page.
Some web page are “click-activated” ,just
waiting to be clicked to spread around.
4. DON’T SHOUT

  No matter what forum, writing in all capital
letters is considered SHOUTING and it is
considered as rude.
5. Pay attention to the Language
 Issues

   Improper, inappropriate or bad language
 may get a participant kicked out or
 permanently banned from a forum or group.
6. Think Before Posting

    It is important to note, what is
 posted online today, may come back
 and haunt the writer tomorrow.
7. Keep personal informative
  Private

     Posting private and personal information
 in the wrong location can be serious
 consequences.
8. Obey Copyright Laws

 Obey copyright laws. Don’t steal.
9. Help Internet Newbies

  Be patient and helpful with others
especially the beginners.
10. Be aware of Cyberbullying

    This relates mostly to an adult
harassing, threatening a younger person.
Also be aware that there are laws regarding
getting information from the minors without
the presence of their parents.
THANK YOU FOR
WATCHING!!!!!!!!!


Prepared By:
               Verlyn S.M.
Maravilla

More Related Content

What's hot

nur syahira nabila
nur syahira nabilanur syahira nabila
nur syahira nabilaTJKU
 
Communications etiquette for the modern world
Communications etiquette for the modern worldCommunications etiquette for the modern world
Communications etiquette for the modern worldSaeed Motiwala
 
Six pillars for web 2 powerpoint
Six pillars for web 2 powerpointSix pillars for web 2 powerpoint
Six pillars for web 2 powerpointberryj
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingNuraySmat
 
Steps to Protect your Social Media Accounts
Steps to Protect your Social Media AccountsSteps to Protect your Social Media Accounts
Steps to Protect your Social Media Accountstechexpert2345
 
Keenright591 Interactive Presentation
Keenright591 Interactive PresentationKeenright591 Interactive Presentation
Keenright591 Interactive PresentationStephanie L Keenright
 
Cybersafety junior school
Cybersafety junior schoolCybersafety junior school
Cybersafety junior schoolsamandshiike
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpointMsCCostello
 
Surfing Safe on the Net, a school project presented at #Bett Show 2015, London
Surfing Safe on the Net, a school project presented at #Bett Show 2015, LondonSurfing Safe on the Net, a school project presented at #Bett Show 2015, London
Surfing Safe on the Net, a school project presented at #Bett Show 2015, LondonEva Buyuksimkesyan
 
Safety in cyberspace
Safety in cyberspaceSafety in cyberspace
Safety in cyberspaceJanealW
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety pptmcmullan
 
Managing Your Relationship With Your Cellphone: A Primer for High School Stud...
Managing Your Relationship With Your Cellphone: A Primer for High School Stud...Managing Your Relationship With Your Cellphone: A Primer for High School Stud...
Managing Your Relationship With Your Cellphone: A Primer for High School Stud...Chris Lazarski
 

What's hot (20)

Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Nour bassem 10 a
Nour bassem   10 aNour bassem   10 a
Nour bassem 10 a
 
Im A Chatter Al
Im A Chatter AlIm A Chatter Al
Im A Chatter Al
 
nur syahira nabila
nur syahira nabilanur syahira nabila
nur syahira nabila
 
Communications etiquette for the modern world
Communications etiquette for the modern worldCommunications etiquette for the modern world
Communications etiquette for the modern world
 
Six pillars for web 2 powerpoint
Six pillars for web 2 powerpointSix pillars for web 2 powerpoint
Six pillars for web 2 powerpoint
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Steps to Protect your Social Media Accounts
Steps to Protect your Social Media AccountsSteps to Protect your Social Media Accounts
Steps to Protect your Social Media Accounts
 
Keenright591 Interactive Presentation
Keenright591 Interactive PresentationKeenright591 Interactive Presentation
Keenright591 Interactive Presentation
 
Cybersafety junior school
Cybersafety junior schoolCybersafety junior school
Cybersafety junior school
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpoint
 
Surfing Safe on the Net, a school project presented at #Bett Show 2015, London
Surfing Safe on the Net, a school project presented at #Bett Show 2015, LondonSurfing Safe on the Net, a school project presented at #Bett Show 2015, London
Surfing Safe on the Net, a school project presented at #Bett Show 2015, London
 
Safety in cyberspace
Safety in cyberspaceSafety in cyberspace
Safety in cyberspace
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
Managing Your Relationship With Your Cellphone: A Primer for High School Stud...
Managing Your Relationship With Your Cellphone: A Primer for High School Stud...Managing Your Relationship With Your Cellphone: A Primer for High School Stud...
Managing Your Relationship With Your Cellphone: A Primer for High School Stud...
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 

Viewers also liked

Netiquette and code of conduct in communication
Netiquette and code of conduct in communicationNetiquette and code of conduct in communication
Netiquette and code of conduct in communicationfloresnewcastleeduau
 
MySewingMall.com [Sewing Machine Parts & Sewing Jargons]
MySewingMall.com [Sewing Machine Parts & Sewing Jargons]MySewingMall.com [Sewing Machine Parts & Sewing Jargons]
MySewingMall.com [Sewing Machine Parts & Sewing Jargons]MSM Online LLC
 
Sewing machine attachments
Sewing machine attachmentsSewing machine attachments
Sewing machine attachmentsmayamuth
 
sewing tools and equipments
sewing tools and equipments sewing tools and equipments
sewing tools and equipments Rona De la Rama
 
Sewing tools and equipments parts of the sewing machine
Sewing tools and equipments parts of the sewing machineSewing tools and equipments parts of the sewing machine
Sewing tools and equipments parts of the sewing machineJesus Obenita Jr.
 
Internet And How It Works
Internet And How It WorksInternet And How It Works
Internet And How It Worksftz 420
 

Viewers also liked (6)

Netiquette and code of conduct in communication
Netiquette and code of conduct in communicationNetiquette and code of conduct in communication
Netiquette and code of conduct in communication
 
MySewingMall.com [Sewing Machine Parts & Sewing Jargons]
MySewingMall.com [Sewing Machine Parts & Sewing Jargons]MySewingMall.com [Sewing Machine Parts & Sewing Jargons]
MySewingMall.com [Sewing Machine Parts & Sewing Jargons]
 
Sewing machine attachments
Sewing machine attachmentsSewing machine attachments
Sewing machine attachments
 
sewing tools and equipments
sewing tools and equipments sewing tools and equipments
sewing tools and equipments
 
Sewing tools and equipments parts of the sewing machine
Sewing tools and equipments parts of the sewing machineSewing tools and equipments parts of the sewing machine
Sewing tools and equipments parts of the sewing machine
 
Internet And How It Works
Internet And How It WorksInternet And How It Works
Internet And How It Works
 

Similar to Top ten nettiquette guidelines

Netiquette
NetiquetteNetiquette
NetiquetteGlory
 
2.5 Netiquette
2.5 Netiquette2.5 Netiquette
2.5 Netiquettehazirma
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internetMaricrs Alfarö
 
4.1.1 netiquette 2016
4.1.1 netiquette 20164.1.1 netiquette 2016
4.1.1 netiquette 2016dilahkmpk
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxNoelBuctot1
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social mediasanjeev kumar
 
The-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfThe-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfMelchorTolentino2
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTTeacherNicaPrintable
 
MIL_Lesson 5_Responsible Use of Media and Information.pdf
MIL_Lesson 5_Responsible Use of Media and Information.pdfMIL_Lesson 5_Responsible Use of Media and Information.pdf
MIL_Lesson 5_Responsible Use of Media and Information.pdfranniejhon
 
Computer security and ethics
Computer security and ethicsComputer security and ethics
Computer security and ethicsSyed Zeeshan Ali
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2JeffUrgelles
 
Netiquette and safety
Netiquette and safetyNetiquette and safety
Netiquette and safetyBVJohnson
 
L1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdfL1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdfJeth Cuenco
 
ECSM 2021 - Sfaturi pentru a te proteja în mediul online
ECSM 2021 - Sfaturi pentru a te proteja în mediul online ECSM 2021 - Sfaturi pentru a te proteja în mediul online
ECSM 2021 - Sfaturi pentru a te proteja în mediul online One-IT
 

Similar to Top ten nettiquette guidelines (20)

Netiquette
NetiquetteNetiquette
Netiquette
 
2.5 Netiquette
2.5 Netiquette2.5 Netiquette
2.5 Netiquette
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internet
 
4.1.1 netiquette 2016
4.1.1 netiquette 20164.1.1 netiquette 2016
4.1.1 netiquette 2016
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social media
 
Computer SOS
Computer SOSComputer SOS
Computer SOS
 
The-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfThe-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdf
 
Netiquettes
NetiquettesNetiquettes
Netiquettes
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
 
MIL_Lesson 5_Responsible Use of Media and Information.pdf
MIL_Lesson 5_Responsible Use of Media and Information.pdfMIL_Lesson 5_Responsible Use of Media and Information.pdf
MIL_Lesson 5_Responsible Use of Media and Information.pdf
 
Netiquette
NetiquetteNetiquette
Netiquette
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Computer security and ethics
Computer security and ethicsComputer security and ethics
Computer security and ethics
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
 
Netiquette and safety
Netiquette and safetyNetiquette and safety
Netiquette and safety
 
L1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdfL1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdf
 
Cyber bullying gr8
Cyber bullying gr8Cyber bullying gr8
Cyber bullying gr8
 
Social media guidelines
Social media guidelinesSocial media guidelines
Social media guidelines
 
ECSM 2021 - Sfaturi pentru a te proteja în mediul online
ECSM 2021 - Sfaturi pentru a te proteja în mediul online ECSM 2021 - Sfaturi pentru a te proteja în mediul online
ECSM 2021 - Sfaturi pentru a te proteja în mediul online
 

Recently uploaded

Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimaginedpanagenda
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهMohamed Sweelam
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfAnubhavMangla3
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Paige Cruz
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdfMuhammad Subhan
 

Recently uploaded (20)

Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 

Top ten nettiquette guidelines

  • 1.
  • 2. 1.Use computer Courtesy Whether the person is sending an email, chatting in a forum, it is important to be courteous and respectful of others online.
  • 3. 2. Use Emotions When communicating online, it can be difficult to gauge a writer’s emotion. Unless a web camera or microphone is used, the writer’s expressions or emotion is difficult to determined. By using emoticons, the writer’s proper emotion will be conveyed to the reader.
  • 4. 3. Watch what you click Don’t just click anything in a web page. Some web page are “click-activated” ,just waiting to be clicked to spread around.
  • 5. 4. DON’T SHOUT No matter what forum, writing in all capital letters is considered SHOUTING and it is considered as rude.
  • 6. 5. Pay attention to the Language Issues Improper, inappropriate or bad language may get a participant kicked out or permanently banned from a forum or group.
  • 7. 6. Think Before Posting It is important to note, what is posted online today, may come back and haunt the writer tomorrow.
  • 8. 7. Keep personal informative Private Posting private and personal information in the wrong location can be serious consequences.
  • 9. 8. Obey Copyright Laws Obey copyright laws. Don’t steal.
  • 10. 9. Help Internet Newbies Be patient and helpful with others especially the beginners.
  • 11. 10. Be aware of Cyberbullying This relates mostly to an adult harassing, threatening a younger person. Also be aware that there are laws regarding getting information from the minors without the presence of their parents.
  • 12. THANK YOU FOR WATCHING!!!!!!!!! Prepared By: Verlyn S.M. Maravilla