SlideShare une entreprise Scribd logo
1  sur  15
Netiquette
Definition

Commandments

Guidelines

Task
Netiquette
 also called as the proper use of internet.
 It covers not only the rules of behavior during
discussion but also guidelines that reflect a
unique electronic nature of the medium.
Guidelines
Proper use of internet guidelines:
1. Be clear
2. Use Appropriate language

3. Be brief
4. Make a good impression

5. Be selective on what information you put in an
e-mail or in a website.
5. Be selective on what information you put in
an email or in a website.
6. Forward e-mail messages you receive only
with the permission of the sender.

7. Remember you are not anonymous.
8. Consider others.

9. Obey copyright laws and cite other’s work
you use.
10. Do not send SPAM.
11. Don’t forward chain letters.
12. Don’t respond to “flames” or personal
attack.
13. Use common abbreviations.
14. Use appropriate emoticons.
10 commandments
of
Computer Ethics
Ten Commandments of Computer Ethics
1. Thou shalt not use a computer to harm other people.
2. Thou shalt not interfere with other people’s computer
work.
3. Thou shalt not snoop around in other peoples files.
4. Thou shalt not use computer to steal.
5.

Thou shalt not use computer to bear false witness.
6. Thou shalt not copy or use proprietary software for which
you have not paid.
7. Thou shalt not use other peoples computer resources
without authorization or proper compensation.

8. Thou shalt not appropriate other people’s intellectual
output.
9. Thou shalt think about the social consequences of the
program you write or the system you design.
10. Thou shalt use a computer in ways that show consideration
of and respect for your fellow humans.
Task
¼ sheet of paper
Why is it important to learn netiquette/ proper use of
internet?
(3-5 sentences only)

(5 minutes)
Assignment:
- - By pair
- - in a ½ crosswise
Formulate your own rules/ guidelines on how to use
internet properly
(5 rules/ guidelines only).
Scratch Project :

My Greeting Card
(20 points)

That would contain the following features:
•
•
•
•
•

There are at least three different sprites.
There must a change in costumes.
It must also have a text (which would serve as your
message/s).
It should have an appropriate background/s.
It should have an appropriate sounds/music.
_end of Slide Presentation_

Contenu connexe

Tendances

Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteJuan Miguel Palero
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteDOFJLCCDD
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2alicelagajino
 
Online Ethics and Etiquette
Online Ethics and Etiquette Online Ethics and Etiquette
Online Ethics and Etiquette JessamenTino21
 
Netiquette - Basic Guidelines
Netiquette - Basic GuidelinesNetiquette - Basic Guidelines
Netiquette - Basic Guidelinesjosbor61
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of NetiquetteLeelet1121
 
Netiquette
NetiquetteNetiquette
NetiquetteGlory
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATSJazzyNF
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteAngelito Quiambao
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsLeelet1121
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingYumna Ali
 
Netiquette Presentation
Netiquette PresentationNetiquette Presentation
Netiquette Presentationsydnee15
 
Nettiquette complete
Nettiquette completeNettiquette complete
Nettiquette completeyoochunjjangy
 
Setting up a network
Setting up a networkSetting up a network
Setting up a networkRachel Espino
 
Responsible Digital Citizenship
Responsible Digital CitizenshipResponsible Digital Citizenship
Responsible Digital CitizenshipAlex Noudelman
 

Tendances (20)

Netiquette do’s & don’ts
Netiquette do’s & don’tsNetiquette do’s & don’ts
Netiquette do’s & don’ts
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and Etiquette
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and Etiquette
 
Nettique
NettiqueNettique
Nettique
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
Online Ethics and Etiquette
Online Ethics and Etiquette Online Ethics and Etiquette
Online Ethics and Etiquette
 
Netiquette - Basic Guidelines
Netiquette - Basic GuidelinesNetiquette - Basic Guidelines
Netiquette - Basic Guidelines
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
Netiquette
NetiquetteNetiquette
Netiquette
 
EMPOWERMENT TECHNOLOGIES - LESSON 2
EMPOWERMENT TECHNOLOGIES - LESSON 2EMPOWERMENT TECHNOLOGIES - LESSON 2
EMPOWERMENT TECHNOLOGIES - LESSON 2
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
 
Internet Ethics
Internet EthicsInternet Ethics
Internet Ethics
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Netiquette Presentation
Netiquette PresentationNetiquette Presentation
Netiquette Presentation
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
Nettiquette complete
Nettiquette completeNettiquette complete
Nettiquette complete
 
Setting up a network
Setting up a networkSetting up a network
Setting up a network
 
Responsible Digital Citizenship
Responsible Digital CitizenshipResponsible Digital Citizenship
Responsible Digital Citizenship
 

Similaire à Netiquette

the lesson about the information and communication to technology
the lesson about the information and communication to technologythe lesson about the information and communication to technology
the lesson about the information and communication to technologylcnemedez
 
CAS110 Netiquette PPT when using the internet
CAS110 Netiquette PPT when using the internetCAS110 Netiquette PPT when using the internet
CAS110 Netiquette PPT when using the internetHendrixAntonniAmante
 
4.1.1 netiquette 2016
4.1.1 netiquette 20164.1.1 netiquette 2016
4.1.1 netiquette 2016dilahkmpk
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computerFatin Izzaty
 
Media and Information Literacy Netiquette
Media and Information Literacy NetiquetteMedia and Information Literacy Netiquette
Media and Information Literacy NetiquetteJPAballe
 
Ten commandments
Ten commandmentsTen commandments
Ten commandmentslsanford84
 
Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104Marvin Broñoso
 
The Do's and DONT's of Internet
The Do's and DONT's of InternetThe Do's and DONT's of Internet
The Do's and DONT's of Internetjoy santos
 
COT 2- EMP. TECH NOLOGY(Netiquettes).pptx
COT 2- EMP. TECH NOLOGY(Netiquettes).pptxCOT 2- EMP. TECH NOLOGY(Netiquettes).pptx
COT 2- EMP. TECH NOLOGY(Netiquettes).pptxacademicjfurio
 

Similaire à Netiquette (20)

the lesson about the information and communication to technology
the lesson about the information and communication to technologythe lesson about the information and communication to technology
the lesson about the information and communication to technology
 
CAS110 Netiquette PPT when using the internet
CAS110 Netiquette PPT when using the internetCAS110 Netiquette PPT when using the internet
CAS110 Netiquette PPT when using the internet
 
Ass6
Ass6Ass6
Ass6
 
4.1.1 netiquette 2016
4.1.1 netiquette 20164.1.1 netiquette 2016
4.1.1 netiquette 2016
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Netiquettes
NetiquettesNetiquettes
Netiquettes
 
Netiquette mine
Netiquette mineNetiquette mine
Netiquette mine
 
Net project
Net projectNet project
Net project
 
LESSON 1.ppt
LESSON 1.pptLESSON 1.ppt
LESSON 1.ppt
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Media and Information Literacy Netiquette
Media and Information Literacy NetiquetteMedia and Information Literacy Netiquette
Media and Information Literacy Netiquette
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
Ten commandments
Ten commandmentsTen commandments
Ten commandments
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104
 
The Do's and DONT's of Internet
The Do's and DONT's of InternetThe Do's and DONT's of Internet
The Do's and DONT's of Internet
 
COT 2- EMP. TECH NOLOGY(Netiquettes).pptx
COT 2- EMP. TECH NOLOGY(Netiquettes).pptxCOT 2- EMP. TECH NOLOGY(Netiquettes).pptx
COT 2- EMP. TECH NOLOGY(Netiquettes).pptx
 
Educational Technology Chapter 8
Educational Technology Chapter 8Educational Technology Chapter 8
Educational Technology Chapter 8
 

Plus de Roi Fernandez

Plus de Roi Fernandez (20)

History of computer
History of computerHistory of computer
History of computer
 
Other european nations
 Other european nations Other european nations
Other european nations
 
Kitchen utensils ppt
Kitchen utensils pptKitchen utensils ppt
Kitchen utensils ppt
 
India
IndiaIndia
India
 
Geographic setting of india
Geographic setting of indiaGeographic setting of india
Geographic setting of india
 
Early Civilizations
Early CivilizationsEarly Civilizations
Early Civilizations
 
Stages of man
Stages of manStages of man
Stages of man
 
The early men 3
The early men 3The early men 3
The early men 3
 
Civilization of smaller states
Civilization of smaller statesCivilization of smaller states
Civilization of smaller states
 
Continents
 Continents Continents
Continents
 
Pehm music unit 1 lesson 3
 Pehm music unit 1 lesson 3 Pehm music unit 1 lesson 3
Pehm music unit 1 lesson 3
 
Alternative peh mreport
Alternative peh mreportAlternative peh mreport
Alternative peh mreport
 
Topaz research
Topaz researchTopaz research
Topaz research
 
Smooth er
Smooth erSmooth er
Smooth er
 
Smooth Endoplasmic Reticulum
 Smooth Endoplasmic Reticulum Smooth Endoplasmic Reticulum
Smooth Endoplasmic Reticulum
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Human Geography
 Human Geography Human Geography
Human Geography
 
Landforms and Waterforms
 Landforms and Waterforms Landforms and Waterforms
Landforms and Waterforms
 
Geographical Quiz
Geographical QuizGeographical Quiz
Geographical Quiz
 
5 themes of geography
 5 themes of geography 5 themes of geography
5 themes of geography
 

Dernier

2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 

Dernier (20)

2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 

Netiquette

  • 3. Netiquette  also called as the proper use of internet.  It covers not only the rules of behavior during discussion but also guidelines that reflect a unique electronic nature of the medium.
  • 5. Proper use of internet guidelines: 1. Be clear 2. Use Appropriate language 3. Be brief 4. Make a good impression 5. Be selective on what information you put in an e-mail or in a website.
  • 6. 5. Be selective on what information you put in an email or in a website. 6. Forward e-mail messages you receive only with the permission of the sender. 7. Remember you are not anonymous. 8. Consider others. 9. Obey copyright laws and cite other’s work you use.
  • 7. 10. Do not send SPAM. 11. Don’t forward chain letters. 12. Don’t respond to “flames” or personal attack. 13. Use common abbreviations. 14. Use appropriate emoticons.
  • 9. Ten Commandments of Computer Ethics 1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people’s computer work. 3. Thou shalt not snoop around in other peoples files. 4. Thou shalt not use computer to steal. 5. Thou shalt not use computer to bear false witness.
  • 10. 6. Thou shalt not copy or use proprietary software for which you have not paid. 7. Thou shalt not use other peoples computer resources without authorization or proper compensation. 8. Thou shalt not appropriate other people’s intellectual output. 9. Thou shalt think about the social consequences of the program you write or the system you design. 10. Thou shalt use a computer in ways that show consideration of and respect for your fellow humans.
  • 11. Task
  • 12. ¼ sheet of paper Why is it important to learn netiquette/ proper use of internet? (3-5 sentences only) (5 minutes)
  • 13. Assignment: - - By pair - - in a ½ crosswise Formulate your own rules/ guidelines on how to use internet properly (5 rules/ guidelines only).
  • 14. Scratch Project : My Greeting Card (20 points) That would contain the following features: • • • • • There are at least three different sprites. There must a change in costumes. It must also have a text (which would serve as your message/s). It should have an appropriate background/s. It should have an appropriate sounds/music.
  • 15. _end of Slide Presentation_