SlideShare une entreprise Scribd logo
1  sur  3
NETIQUETTE 
ETHICS - Refers to the rules of behavior known in respect to a particular class of human actions or a particular group, 
culture , etc. 
 Today the community of internet uses include people who are new to the environment. These “Newbies” are unfamiliar 
with the culture and do not need to know about transports and protocols. In order to bring these this to new users 
quickly, this guide offers a minimum set of conduct in which organizations and individuals m consider and adapt for their 
own use. Individuals should be aware, that no matter who supplies their internet access these organizations have 
policies about ownership of mail and files. Be sure to check with the local authorities for specific guidelines 
TOP TEN (10) NETIQUETTE GUIDELINES 
1. USE COMPUTER WITH COURTESY 
 Whether a person is sending an e-mail, chatting in a chat room or speaking in a forum, it is important to be polite and 
respectful of others online. USERS MUST ALWAYS REMEMBER THE GOLDEN RULE. 
2. USE EMOTICONS 
 when communicating online it Is difficult to gauge a writers expression. By using emoticons, the writer’s feelings or 
emotion is properly conveyed. 
3. KEEP IT SHORT AND SIMPLE (KISS) 
 It is important to keep it short especially when writing an email or typing in a chatroom 
4. DON’T SHOUT 
 Writing with capital letters is considered as shouting and is considered very rude 
5. PAY ATTENTION TO LSNGUAGE ISSUES 
 Improper language may get a member kicked out or permanently banned from a forum or group chat. 
6. “THINK BEFORE YOU CLICK” 
 It is important to note that whatever is posted online today may come back and haunt the writer tomorrow 
7. KEEP PERSONAL INFORMATION PRIVATE 
 Posting personal and confidential info. In the wrong location can have serious consequences 
8. OBEY COPYRIGHT LAWS 
 Disobeying copyright laws is a way of stealing. They must avoid using copy and paste and if done they must acknowledge 
the source and reference used 
9. HELP INTERNET NEWBIES 
 Users must be patient and helpful with others. Remember everyone was a newbie once. 
10. BE AWARE OF CYBER BULLYING 
 Cyber bullying is increasing rapidly. If targeted by a cyber bully do not respond if the messages are of a threatening 
nature, contact local law enforcement as soon as possible. 
BY FOLLOWING THE GUIDELINES,ONLINE EXPERIENCE WILL BE ENJOYABLE AND SAFE FOR ALL 
Social Networking Sites 
Social Networking Sites is probably the current unbeaten popular Internet service.Man,by nature is a social 
being.The need to mingle and communicate is inevitable. And with the fast development of technology , social network 
sites were developed.By technical definiton,a social network site is a virtual community for people with similar interest 
or just to be together.Social network provide features adding friends,placing comments and other services mentioned 
above depending its nature and capacity. 
While Frienster and Multiply ruled the early 2000s in the World Wide Web,they were overtaken by Facebook –a 
social network site developed on 2004 by Mark Zuckerberg in Harvard University.It is still at the top until now because 
of the progress of sevices it caters from blogs,multimedia,documents sharing,email,chat and the like.In 2006,micro-blog 
social network site was developed to stand out from other blog sites that allows lengthly posts –it not only allowed up to 
140 characters. 
Aside from the general social networks,there also special-purpose networks like Wikipedia-an online community for 
academic and information topics from the usual printed encyclopedia.This virtual community allows users to add and 
modify information the site-from vocubulary,famous places,figures and others. 
YouTube is also a social network site specifically intended for multi media sharing. 
Thread, forums and video sharing 
THREAD 
 Is a sequence of messages that usually comments regarding a given topic.
Web forum 
 -is a website or a portion of a website wherein random or registered users can converse with each other by posting 
messages. 
 -are not just limited to topics that are in text format or articles. 
Blog 
 -is originally referring to personal journals of an individual on the world wide web. 
Video Sharing 
 Paved way for family owned videos to be semi-permanently saved in the Net for souvenirs and even gave 
opportunities for some people to be popular across the nation and even around the world with just a simple video 
record of their talents. 
File Sharing 
 -several websites are offering file-sharing. This involves sharing of information or files via internet. 
Netiquette for E-mails and Chats 
Netiquette when Sending E-mail 
1.Never send chain letters via electronicmail. Chain letters are forbidden on the internet. The network privilages will be 
revoked. Notify the local system administrator if you ever received one. 
2. Be careful when addressing mail. There are addresses which may go to a group but the address looks like it is just one 
person. Know to whom you are sending. 
3.Use mixed case.ALL UPPER CASE MEANS SHOUTING. 
4.Limit line length fewer than 65 characters and end a line with a carriage return. 
5.Mail should have a subject heading which reflects the content of the message. 
6.Don’t send large amounts of unsolicited information to people. 
7. Be brief without being overly abrupt. When replying to message, include enough original material to be understood. It 
is extremely bad form to simply repky to a message by including the entire previous message. Edit out all the irrelevant 
material. 
Netiquette when Chatting 
1.Use mixed case and proper punctuation, as though you were typing a letter or sending a mail. 
2.Always say goodbye or farewell message, and wait to see a farewell from the other person before ending the session. 
This is especially important when you are communicating with someone from a far place. 
Cybercrime Prevention Act of 2012 
Republic Act No. 10175 is popularly known as Anti -Cybercrime Law of the Philippines intends to turn every Filipino 
citizen towards responsible netizenship. 
Netizen-Citizen that uses Internet actively. 
It recogmnizes the need for free, accessible and quality information and communications technology (ICT) and 
protection of every individual againts threats and crimess that can be done using technology and World Wide Web. 
It was implemented September 12, 2012. While there are good intentions, netizens reacted negatively on some 
provisions of the law specifically with libel because of its thin line with freedom of expression. Due to the qualms, it was 
suspended for 120 days via a temporary restraining order from the Supreme Court. The TRO was then lifted after 120 
days and the law was returned to be implemented on December 2012. 
The Ten commandments of Computer Ethics 
Computer Ethics Institute has issued a set of guidelines too, to reiterate the value of good ethics in Cyberspace. 
1.Thou shall not use a computer to harm other people.-Most attacks in computers are actually done online so every 
“netizen” must be committed for the common good and must be vigilant as well to fight or at least prevent such harms. 
2.Thou shall not interfere with other people’s computer work.-while collaboration of works is now patronize on the web 
with online document processing, it is still important to keep one’s privacy. 
3.Thou shall not snoop around in other people’s computer files.-Spying around is no longer just literally a person looking 
at another computer. There are available software programs that are capable of looking into another computer in the 
network using his/her computer. 
4.Thou shall not use a computer to steal.-Robbers hack credit card accounts and bank information to steal money and 
identity. Security and safety must be top priorities of such. 
5.Thou shall not use a computer to bear false witness.-Being online does not give anyone an excuse to post comments 
and messages that would degrade other individual especially if the accusations are not true.
6.Thou shall not copy or use proprietary software for which you have not paid. -Net users must always see to it that the 
software or other multimedia products that are downloadable from the internet must acquire a valid license. There are 
“open source” software programs available with free licenses should there be budgetary constraints. 
7.Thou shall not use other people’s computer resources without authorization or proper compensation. -Users, while 
inside school or company, must do their subject or work-related tasks and not doing other things that would waste 
money and productivity of the organization. 
8.Thou shall not appropriate other people’s intellectual output.-As students and researchers quoting statements from 
someone else’s material, even it is available online for free, is a must. Indicate the sources on footnotes and 
bibliography. 
9.Thou shall think about the social consequences of the program you are writing or the system you are designing. -As 
the saying goes,”A person can choose any decision he ought too, but he cannot choose its consequences.” It is better to 
promote an encouraging and socially-healthy cyberspace. 
10.Thou shall always use a computer in ways that ensure consideration and respect for your fellow human.-It is a 
common duty for everyone to be socially responsible and promote good-will whether in face-to-face setup or in 
cyberspace.

Contenu connexe

Tendances

Tendances (20)

Netiquette
NetiquetteNetiquette
Netiquette
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
Netiquette and code of conduct in communication
Netiquette and code of conduct in communicationNetiquette and code of conduct in communication
Netiquette and code of conduct in communication
 
Rules of netiquette
Rules of netiquetteRules of netiquette
Rules of netiquette
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
EMPOWERMENT TECHNOLOGIES - LESSON 2
EMPOWERMENT TECHNOLOGIES - LESSON 2EMPOWERMENT TECHNOLOGIES - LESSON 2
EMPOWERMENT TECHNOLOGIES - LESSON 2
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Netiquette
NetiquetteNetiquette
Netiquette
 
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTEEMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
 
The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ict
 
The Do's and DONT's of Internet
The Do's and DONT's of InternetThe Do's and DONT's of Internet
The Do's and DONT's of Internet
 
INTERNET ETIQUETTE AND NETIQUETTE
INTERNET ETIQUETTE AND NETIQUETTEINTERNET ETIQUETTE AND NETIQUETTE
INTERNET ETIQUETTE AND NETIQUETTE
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
2 Online Safety, Security, Ethics, and Etiquette
2 Online Safety,  Security, Ethics, and Etiquette2 Online Safety,  Security, Ethics, and Etiquette
2 Online Safety, Security, Ethics, and Etiquette
 
MIL WEEK 6.pptx
MIL WEEK 6.pptxMIL WEEK 6.pptx
MIL WEEK 6.pptx
 
Netiquette powerpointbooth
Netiquette powerpointboothNetiquette powerpointbooth
Netiquette powerpointbooth
 
9 Interactive Multimedia
9 Interactive Multimedia9 Interactive Multimedia
9 Interactive Multimedia
 
Digital literacy
Digital literacyDigital literacy
Digital literacy
 
Netiquette2
Netiquette2Netiquette2
Netiquette2
 

Similaire à NETIQUETTE GUIDELINES

Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104Marvin Broñoso
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentationlahill16
 
Responsible Digital Citizenship
Responsible Digital CitizenshipResponsible Digital Citizenship
Responsible Digital CitizenshipAlex Noudelman
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxRheamaeLiwan
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxJakeTorio1
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxEhraicaSaquing
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxDineLiwan
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxLiberty Aquino
 
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdfW3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdfCedLinc
 
NETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxNETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxCatherineBagaan
 
The-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfThe-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfMelchorTolentino2
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2JeffUrgelles
 
L1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdfL1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdfJeth Cuenco
 

Similaire à NETIQUETTE GUIDELINES (20)

Netiquettes
NetiquettesNetiquettes
Netiquettes
 
Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentation
 
Responsible Digital Citizenship
Responsible Digital CitizenshipResponsible Digital Citizenship
Responsible Digital Citizenship
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER ETECH
REVIEWER ETECHREVIEWER ETECH
REVIEWER ETECH
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
Empowerment Technology
Empowerment Technology Empowerment Technology
Empowerment Technology
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdfW3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
 
NETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxNETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptx
 
The-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfThe-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdf
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
Power point 2 p
Power point 2 pPower point 2 p
Power point 2 p
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
 
EMPOWERMENT TECHNOLOGIES.
EMPOWERMENT TECHNOLOGIES.EMPOWERMENT TECHNOLOGIES.
EMPOWERMENT TECHNOLOGIES.
 
L1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdfL1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdf
 

Plus de Glory

Assessing the curriculum
Assessing the curriculumAssessing the curriculum
Assessing the curriculumGlory
 
Pelikula
PelikulaPelikula
PelikulaGlory
 
A detailed lesson plan in mathematicsfinal
A detailed lesson plan in mathematicsfinalA detailed lesson plan in mathematicsfinal
A detailed lesson plan in mathematicsfinalGlory
 
Bloom's taxonomy
Bloom's taxonomyBloom's taxonomy
Bloom's taxonomyGlory
 
Astronomical studies about the earth
Astronomical studies about the earthAstronomical studies about the earth
Astronomical studies about the earthGlory
 
Solving Word Problems Using Two Equations
Solving Word Problems Using Two EquationsSolving Word Problems Using Two Equations
Solving Word Problems Using Two EquationsGlory
 
Religion
ReligionReligion
ReligionGlory
 
THE NATURE, GOALS, AND CONTENT OF THE LANGUAGE SUBJECT AREAS
THE NATURE, GOALS, AND CONTENT OF THE LANGUAGE SUBJECT AREASTHE NATURE, GOALS, AND CONTENT OF THE LANGUAGE SUBJECT AREAS
THE NATURE, GOALS, AND CONTENT OF THE LANGUAGE SUBJECT AREAS Glory
 
Rainforest
RainforestRainforest
RainforestGlory
 
Nutrition
NutritionNutrition
NutritionGlory
 
Rest and Sleep
Rest and SleepRest and Sleep
Rest and SleepGlory
 
Principle of Underlying
Principle of UnderlyingPrinciple of Underlying
Principle of UnderlyingGlory
 
Principle of sequence
Principle of sequencePrinciple of sequence
Principle of sequenceGlory
 
Lesson planning
Lesson planningLesson planning
Lesson planningGlory
 
Word Problem
Word ProblemWord Problem
Word ProblemGlory
 
Action Research
Action ResearchAction Research
Action ResearchGlory
 

Plus de Glory (16)

Assessing the curriculum
Assessing the curriculumAssessing the curriculum
Assessing the curriculum
 
Pelikula
PelikulaPelikula
Pelikula
 
A detailed lesson plan in mathematicsfinal
A detailed lesson plan in mathematicsfinalA detailed lesson plan in mathematicsfinal
A detailed lesson plan in mathematicsfinal
 
Bloom's taxonomy
Bloom's taxonomyBloom's taxonomy
Bloom's taxonomy
 
Astronomical studies about the earth
Astronomical studies about the earthAstronomical studies about the earth
Astronomical studies about the earth
 
Solving Word Problems Using Two Equations
Solving Word Problems Using Two EquationsSolving Word Problems Using Two Equations
Solving Word Problems Using Two Equations
 
Religion
ReligionReligion
Religion
 
THE NATURE, GOALS, AND CONTENT OF THE LANGUAGE SUBJECT AREAS
THE NATURE, GOALS, AND CONTENT OF THE LANGUAGE SUBJECT AREASTHE NATURE, GOALS, AND CONTENT OF THE LANGUAGE SUBJECT AREAS
THE NATURE, GOALS, AND CONTENT OF THE LANGUAGE SUBJECT AREAS
 
Rainforest
RainforestRainforest
Rainforest
 
Nutrition
NutritionNutrition
Nutrition
 
Rest and Sleep
Rest and SleepRest and Sleep
Rest and Sleep
 
Principle of Underlying
Principle of UnderlyingPrinciple of Underlying
Principle of Underlying
 
Principle of sequence
Principle of sequencePrinciple of sequence
Principle of sequence
 
Lesson planning
Lesson planningLesson planning
Lesson planning
 
Word Problem
Word ProblemWord Problem
Word Problem
 
Action Research
Action ResearchAction Research
Action Research
 

Dernier

ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6Vanessa Camilleri
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfChristalin Nelson
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesVijayaLaxmi84
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxAnupam32727
 
Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Celine George
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Developmentchesterberbo7
 

Dernier (20)

ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdf
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
prashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Professionprashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Profession
 
Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their uses
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
 
Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Development
 

NETIQUETTE GUIDELINES

  • 1. NETIQUETTE ETHICS - Refers to the rules of behavior known in respect to a particular class of human actions or a particular group, culture , etc.  Today the community of internet uses include people who are new to the environment. These “Newbies” are unfamiliar with the culture and do not need to know about transports and protocols. In order to bring these this to new users quickly, this guide offers a minimum set of conduct in which organizations and individuals m consider and adapt for their own use. Individuals should be aware, that no matter who supplies their internet access these organizations have policies about ownership of mail and files. Be sure to check with the local authorities for specific guidelines TOP TEN (10) NETIQUETTE GUIDELINES 1. USE COMPUTER WITH COURTESY  Whether a person is sending an e-mail, chatting in a chat room or speaking in a forum, it is important to be polite and respectful of others online. USERS MUST ALWAYS REMEMBER THE GOLDEN RULE. 2. USE EMOTICONS  when communicating online it Is difficult to gauge a writers expression. By using emoticons, the writer’s feelings or emotion is properly conveyed. 3. KEEP IT SHORT AND SIMPLE (KISS)  It is important to keep it short especially when writing an email or typing in a chatroom 4. DON’T SHOUT  Writing with capital letters is considered as shouting and is considered very rude 5. PAY ATTENTION TO LSNGUAGE ISSUES  Improper language may get a member kicked out or permanently banned from a forum or group chat. 6. “THINK BEFORE YOU CLICK”  It is important to note that whatever is posted online today may come back and haunt the writer tomorrow 7. KEEP PERSONAL INFORMATION PRIVATE  Posting personal and confidential info. In the wrong location can have serious consequences 8. OBEY COPYRIGHT LAWS  Disobeying copyright laws is a way of stealing. They must avoid using copy and paste and if done they must acknowledge the source and reference used 9. HELP INTERNET NEWBIES  Users must be patient and helpful with others. Remember everyone was a newbie once. 10. BE AWARE OF CYBER BULLYING  Cyber bullying is increasing rapidly. If targeted by a cyber bully do not respond if the messages are of a threatening nature, contact local law enforcement as soon as possible. BY FOLLOWING THE GUIDELINES,ONLINE EXPERIENCE WILL BE ENJOYABLE AND SAFE FOR ALL Social Networking Sites Social Networking Sites is probably the current unbeaten popular Internet service.Man,by nature is a social being.The need to mingle and communicate is inevitable. And with the fast development of technology , social network sites were developed.By technical definiton,a social network site is a virtual community for people with similar interest or just to be together.Social network provide features adding friends,placing comments and other services mentioned above depending its nature and capacity. While Frienster and Multiply ruled the early 2000s in the World Wide Web,they were overtaken by Facebook –a social network site developed on 2004 by Mark Zuckerberg in Harvard University.It is still at the top until now because of the progress of sevices it caters from blogs,multimedia,documents sharing,email,chat and the like.In 2006,micro-blog social network site was developed to stand out from other blog sites that allows lengthly posts –it not only allowed up to 140 characters. Aside from the general social networks,there also special-purpose networks like Wikipedia-an online community for academic and information topics from the usual printed encyclopedia.This virtual community allows users to add and modify information the site-from vocubulary,famous places,figures and others. YouTube is also a social network site specifically intended for multi media sharing. Thread, forums and video sharing THREAD  Is a sequence of messages that usually comments regarding a given topic.
  • 2. Web forum  -is a website or a portion of a website wherein random or registered users can converse with each other by posting messages.  -are not just limited to topics that are in text format or articles. Blog  -is originally referring to personal journals of an individual on the world wide web. Video Sharing  Paved way for family owned videos to be semi-permanently saved in the Net for souvenirs and even gave opportunities for some people to be popular across the nation and even around the world with just a simple video record of their talents. File Sharing  -several websites are offering file-sharing. This involves sharing of information or files via internet. Netiquette for E-mails and Chats Netiquette when Sending E-mail 1.Never send chain letters via electronicmail. Chain letters are forbidden on the internet. The network privilages will be revoked. Notify the local system administrator if you ever received one. 2. Be careful when addressing mail. There are addresses which may go to a group but the address looks like it is just one person. Know to whom you are sending. 3.Use mixed case.ALL UPPER CASE MEANS SHOUTING. 4.Limit line length fewer than 65 characters and end a line with a carriage return. 5.Mail should have a subject heading which reflects the content of the message. 6.Don’t send large amounts of unsolicited information to people. 7. Be brief without being overly abrupt. When replying to message, include enough original material to be understood. It is extremely bad form to simply repky to a message by including the entire previous message. Edit out all the irrelevant material. Netiquette when Chatting 1.Use mixed case and proper punctuation, as though you were typing a letter or sending a mail. 2.Always say goodbye or farewell message, and wait to see a farewell from the other person before ending the session. This is especially important when you are communicating with someone from a far place. Cybercrime Prevention Act of 2012 Republic Act No. 10175 is popularly known as Anti -Cybercrime Law of the Philippines intends to turn every Filipino citizen towards responsible netizenship. Netizen-Citizen that uses Internet actively. It recogmnizes the need for free, accessible and quality information and communications technology (ICT) and protection of every individual againts threats and crimess that can be done using technology and World Wide Web. It was implemented September 12, 2012. While there are good intentions, netizens reacted negatively on some provisions of the law specifically with libel because of its thin line with freedom of expression. Due to the qualms, it was suspended for 120 days via a temporary restraining order from the Supreme Court. The TRO was then lifted after 120 days and the law was returned to be implemented on December 2012. The Ten commandments of Computer Ethics Computer Ethics Institute has issued a set of guidelines too, to reiterate the value of good ethics in Cyberspace. 1.Thou shall not use a computer to harm other people.-Most attacks in computers are actually done online so every “netizen” must be committed for the common good and must be vigilant as well to fight or at least prevent such harms. 2.Thou shall not interfere with other people’s computer work.-while collaboration of works is now patronize on the web with online document processing, it is still important to keep one’s privacy. 3.Thou shall not snoop around in other people’s computer files.-Spying around is no longer just literally a person looking at another computer. There are available software programs that are capable of looking into another computer in the network using his/her computer. 4.Thou shall not use a computer to steal.-Robbers hack credit card accounts and bank information to steal money and identity. Security and safety must be top priorities of such. 5.Thou shall not use a computer to bear false witness.-Being online does not give anyone an excuse to post comments and messages that would degrade other individual especially if the accusations are not true.
  • 3. 6.Thou shall not copy or use proprietary software for which you have not paid. -Net users must always see to it that the software or other multimedia products that are downloadable from the internet must acquire a valid license. There are “open source” software programs available with free licenses should there be budgetary constraints. 7.Thou shall not use other people’s computer resources without authorization or proper compensation. -Users, while inside school or company, must do their subject or work-related tasks and not doing other things that would waste money and productivity of the organization. 8.Thou shall not appropriate other people’s intellectual output.-As students and researchers quoting statements from someone else’s material, even it is available online for free, is a must. Indicate the sources on footnotes and bibliography. 9.Thou shall think about the social consequences of the program you are writing or the system you are designing. -As the saying goes,”A person can choose any decision he ought too, but he cannot choose its consequences.” It is better to promote an encouraging and socially-healthy cyberspace. 10.Thou shall always use a computer in ways that ensure consideration and respect for your fellow human.-It is a common duty for everyone to be socially responsible and promote good-will whether in face-to-face setup or in cyberspace.