SlideShare une entreprise Scribd logo
1  sur  13
Netiquette

  "Netiquette" is network etiquette, the do's and
don'ts of online communication. Netiquette covers
 both common courtesy online and the informal
         "rules of the road" of cyberspace.
Introduction
What is Netiquette?

Simply stated, it's network etiquette --
that is, the etiquette of cyberspace.

“Etiquette” means “the forms required by good breeding or
prescribed by authority to be required in social or official
life.”

In other words, Netiquette is a set of rules for
behaving properly online.
Rule 1: Remember the Human
The golden rule: Do unto others as you'd have others do unto you. Imagine how
you'd feel if you were in the other person's shoes. Stand up for yourself, but try not
to hurt people's feelings.

Electronic communication lacks the facial expression, gestures and tone of voice to
convey your meaning. It’s easy to misinterpret meaning of words.

Would you say it to the person's face?
If the answer is no, rewrite and reread. Repeat the process till you feel sure that
you'd feel as comfortable saying these words to the live person as you do sending
them through cyberspace.

Remember, when you communicate through cyberspace your words are written.
Chances are they're stored somewhere. They can come back and haunt you. You
don't have to be engaged in criminal activity to want to be careful. Any message you
send could be saved or forwarded by its recipient. You have no control over where it
goes.
Rule 2: Adhere to real-life standards of
              behavior
 Standards of behavior may be different in some areas of cyberspace, but
 they are not lower than in real life.
 Be ethical.
 If you encounter an ethical dilemma in cyberspace, consult the code you
 follow in real life.
 If you use shareware, pay for it.
 Paying for shareware encourages more people to write shareware. The few
 dollars probably won't mean much to you, but they benefit all of
 cyberspace in the long run.
 Breaking the law is bad Netiquette.
 If you're tempted to do something that's illegal, chances are it's also bad
 Netiquette.
Rule 3: Know where you are in
                 cyberspace
Netiquette varies from domain to domain. What's perfectly
acceptable in one area may be dreadfully rude in another.

Netiquette is different in different places, so it's important
to know where you are.

Lurk before you leap
When you enter a domain of cyberspace that's new to you, take a look around.
Spend a while listening to the chat or reading the archives. Get a sense of how
the people who are already there act. Then go ahead and participate.
Rule 4: Respect other people's time and
               bandwidth
Bandwidth is the information-carrying capacity of the wires and channels that connect
everyone in cyberspace. It also refers to the storage capacity of a host system.

If you accidentally post the same note to the same newsgroup five times, you are
wasting both time (of the people who check each copy) and bandwidth (by sending
repetitive information over the wires and requiring it to be stored somewhere).

You are not the center of cyberspace. Don’t expect instant responses to all your
questions, and don't assume that all readers will agree with -- or care about -- your
passionate arguments.

Ensure your message is worth the time it takes to open it.

Before you copy people on your messages, ask yourself whether
they really need to know. If the answer is no, don't waste their time. If the answer is
maybe, think twice before you hit the send key.
Rule 5: Make yourself look good online

Take advantage of your anonymity. You won't be judged by
color, weight, age or dress sense. You will, however, be judged
by the quality of your writing. So spelling and grammar do
count.
Know what you're talking about and make sense. Pay
attention to the content of your writing. Ensure your notes are
clear and logical.
Be pleasant and polite. Avoid offensive language, and don't be
confrontational for the sake of confrontation.
If you must swear, think up creative alternatives.
Rule 6: Share expert knowledge
The strength of cyberspace is in its numbers. The Internet itself was
founded and grew because academics wanted to share information.
Don't be afraid to share what you know.

If you ask a question and anticipate a lot of answers, it’s customary
to request replies by email instead of to the group. Share the results
of your questions with others, so everyone benefits from the experts
who took the time to write to you.

If you’re an expert, or you've researched a topic that you think
would be of interest to others, write it up and post it. Sharing your
knowledge is fun. And it makes the world a better place.
Rule 7: Help keep flame wars under
              control
"Flaming" is what people do when they express a strongly held
opinion without holding back any emotion.

Netiquette does not forbid flaming. Flaming is a long-standing
network tradition (and Netiquette never messes with tradition).

Netiquette does forbid the perpetuation of flame wars that can
dominate the tone and destroy the camaraderie of a discussion
group.

While flame wars can initially be amusing, they’re an unfair
monopolization of bandwidth.
Rule 8: Respect other people's privacy

You’d never snoop through your colleagues' desk
drawers, so naturally you wouldn't read their email
either.


Failing to respect other people's privacy is not just bad
Netiquette. It could also cost you your job.
Rule 9: Don't abuse your power

Some people in cyberspace have more power than
others. There are wizards in MUDs (multi-user
dungeons), experts in every office, and system
administrators in every system.

Knowing more than others, or having more power than
they do, does not give you the right to take advantage of
them. For example, sysadmins should never read private
email.
Rule 10: Be forgiving of other people’s
               mistakes
Everyone was a newbie once.

When someone makes a mistake -- be kind about it. If it's a minor error,
you may not need to say anything. Even if you feel strongly about it,
think twice before reacting.

Having good manners yourself doesn't give you license to correct
everyone else.

If you inform someone of a mistake, point it out politely, and preferably
by private email rather than in public.

Give people the benefit of the doubt.
Resources

• http://www.networketiquette.net/
• http://www.albion.com/netiquette/
• http://www.livinginternet.com/i/ia_nq.
  htm
• http://www.netmanners.com/
• http://www.ietf.org/rfc/rfc1855.txt
• http://www.albury.net.au/new-
  users/netiquet.htm

Contenu connexe

Tendances (20)

Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Manners etiquettes
Manners etiquettesManners etiquettes
Manners etiquettes
 
Netiquette - Basic Guidelines
Netiquette - Basic GuidelinesNetiquette - Basic Guidelines
Netiquette - Basic Guidelines
 
Email etiquette[1] (1)
Email etiquette[1] (1)Email etiquette[1] (1)
Email etiquette[1] (1)
 
INTERNET ETIQUETTE AND NETIQUETTE
INTERNET ETIQUETTE AND NETIQUETTEINTERNET ETIQUETTE AND NETIQUETTE
INTERNET ETIQUETTE AND NETIQUETTE
 
Top Office Etiquette Mistakes
Top Office Etiquette MistakesTop Office Etiquette Mistakes
Top Office Etiquette Mistakes
 
Netiquette powerpointbooth
Netiquette powerpointboothNetiquette powerpointbooth
Netiquette powerpointbooth
 
Email Etiquette
Email Etiquette Email Etiquette
Email Etiquette
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Email etiquette- The sweetest way to learn!
Email etiquette- The sweetest way to learn!Email etiquette- The sweetest way to learn!
Email etiquette- The sweetest way to learn!
 
Social etiquettes
Social etiquettesSocial etiquettes
Social etiquettes
 
Public Speaking Etiquette
Public Speaking EtiquettePublic Speaking Etiquette
Public Speaking Etiquette
 
Manners and etiquette imh
Manners and etiquette imhManners and etiquette imh
Manners and etiquette imh
 
Netiquette do’s & don’ts
Netiquette do’s & don’tsNetiquette do’s & don’ts
Netiquette do’s & don’ts
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette
 
Internet etiquette
Internet etiquetteInternet etiquette
Internet etiquette
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Email Ethics
Email Ethics Email Ethics
Email Ethics
 
Effective Public Speaking
Effective Public SpeakingEffective Public Speaking
Effective Public Speaking
 

Similaire à Netiquette mine

Presentation (2).pptx e-tech
Presentation (2).pptx e-techPresentation (2).pptx e-tech
Presentation (2).pptx e-techTrexie9
 
The 10 commandments of the common computer (1)
The 10 commandments of the common computer (1)The 10 commandments of the common computer (1)
The 10 commandments of the common computer (1)MudgeoTorso1091
 
CAS110 Netiquette PPT when using the internet
CAS110 Netiquette PPT when using the internetCAS110 Netiquette PPT when using the internet
CAS110 Netiquette PPT when using the internetHendrixAntonniAmante
 
Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104Marvin Broñoso
 
Netiquette
NetiquetteNetiquette
Netiquettejcdmce
 
Media and Information Literacy Netiquette
Media and Information Literacy NetiquetteMedia and Information Literacy Netiquette
Media and Information Literacy NetiquetteJPAballe
 
Netiquette stassie
Netiquette stassieNetiquette stassie
Netiquette stassieJill Stassie
 
The essential rules of netiquette by Halina
The essential rules of netiquette by HalinaThe essential rules of netiquette by Halina
The essential rules of netiquette by HalinaSelf-employed
 
Netiquette Rules
Netiquette RulesNetiquette Rules
Netiquette RulesRaquelPG96
 
10 netiquette rules.pptx
10 netiquette rules.pptx10 netiquette rules.pptx
10 netiquette rules.pptxjulitolosbanos
 
The 10 core rules of netiqutte
The 10 core rules of netiqutteThe 10 core rules of netiqutte
The 10 core rules of netiqutteMudgeoTorso1091
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of NetiquetteLeelet1121
 

Similaire à Netiquette mine (20)

Netiquette
NetiquetteNetiquette
Netiquette
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Netiquettes.pptx
Netiquettes.pptxNetiquettes.pptx
Netiquettes.pptx
 
Presentation (2).pptx e-tech
Presentation (2).pptx e-techPresentation (2).pptx e-tech
Presentation (2).pptx e-tech
 
The 10 commandments of the common computer (1)
The 10 commandments of the common computer (1)The 10 commandments of the common computer (1)
The 10 commandments of the common computer (1)
 
CAS110 Netiquette PPT when using the internet
CAS110 Netiquette PPT when using the internetCAS110 Netiquette PPT when using the internet
CAS110 Netiquette PPT when using the internet
 
Netiquette.ppt
Netiquette.pptNetiquette.ppt
Netiquette.ppt
 
ETECH Q1 Wk2.pptx
ETECH Q1 Wk2.pptxETECH Q1 Wk2.pptx
ETECH Q1 Wk2.pptx
 
Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Media and Information Literacy Netiquette
Media and Information Literacy NetiquetteMedia and Information Literacy Netiquette
Media and Information Literacy Netiquette
 
Netiquette stassie
Netiquette stassieNetiquette stassie
Netiquette stassie
 
Netiquettes
NetiquettesNetiquettes
Netiquettes
 
Net project
Net projectNet project
Net project
 
The essential rules of netiquette by Halina
The essential rules of netiquette by HalinaThe essential rules of netiquette by Halina
The essential rules of netiquette by Halina
 
Netiquette Rules
Netiquette RulesNetiquette Rules
Netiquette Rules
 
Teens on the net
Teens on the netTeens on the net
Teens on the net
 
10 netiquette rules.pptx
10 netiquette rules.pptx10 netiquette rules.pptx
10 netiquette rules.pptx
 
The 10 core rules of netiqutte
The 10 core rules of netiqutteThe 10 core rules of netiqutte
The 10 core rules of netiqutte
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 

Plus de Ady Setiawan

Presentasi Usulan Maskot dan Slogan UNTAN
Presentasi Usulan Maskot dan Slogan UNTANPresentasi Usulan Maskot dan Slogan UNTAN
Presentasi Usulan Maskot dan Slogan UNTANAdy Setiawan
 
Konsep Sistem Desentralisasi Dalam Pendidikan
Konsep Sistem Desentralisasi Dalam PendidikanKonsep Sistem Desentralisasi Dalam Pendidikan
Konsep Sistem Desentralisasi Dalam PendidikanAdy Setiawan
 
Kepemimpinan Pendidikan
Kepemimpinan PendidikanKepemimpinan Pendidikan
Kepemimpinan PendidikanAdy Setiawan
 
Pelaksanaan Kurikulum Modifikasi di Sekolah Inklusif
Pelaksanaan Kurikulum Modifikasi di Sekolah InklusifPelaksanaan Kurikulum Modifikasi di Sekolah Inklusif
Pelaksanaan Kurikulum Modifikasi di Sekolah InklusifAdy Setiawan
 
Fiqih Penguatan Penyandang Disabilitas
Fiqih Penguatan Penyandang DisabilitasFiqih Penguatan Penyandang Disabilitas
Fiqih Penguatan Penyandang DisabilitasAdy Setiawan
 
Buku KH. Hasyim Asy'ari (Pendiri Nahdlatul Ulama)
Buku KH. Hasyim Asy'ari (Pendiri Nahdlatul Ulama)Buku KH. Hasyim Asy'ari (Pendiri Nahdlatul Ulama)
Buku KH. Hasyim Asy'ari (Pendiri Nahdlatul Ulama)Ady Setiawan
 
Pedoman Diklat Berjenjang Bagi Guru PAUD di Daerah 3T
Pedoman Diklat Berjenjang Bagi Guru PAUD di Daerah 3TPedoman Diklat Berjenjang Bagi Guru PAUD di Daerah 3T
Pedoman Diklat Berjenjang Bagi Guru PAUD di Daerah 3TAdy Setiawan
 
Kebijakan Pendidikan Kesetaraan Tahun 2018
Kebijakan Pendidikan Kesetaraan Tahun 2018Kebijakan Pendidikan Kesetaraan Tahun 2018
Kebijakan Pendidikan Kesetaraan Tahun 2018Ady Setiawan
 
Analisis Biaya Pendidikan
Analisis Biaya PendidikanAnalisis Biaya Pendidikan
Analisis Biaya PendidikanAdy Setiawan
 
Konsep Belajar dan Kinerja
Konsep Belajar dan KinerjaKonsep Belajar dan Kinerja
Konsep Belajar dan KinerjaAdy Setiawan
 
Kebijakan Pendidikan yang Unggul
Kebijakan Pendidikan yang UnggulKebijakan Pendidikan yang Unggul
Kebijakan Pendidikan yang UnggulAdy Setiawan
 
Wawancara sebagai Teknik Pengumpulan Data dalam Penelitian Kualitatif
Wawancara sebagai Teknik Pengumpulan Data dalam Penelitian KualitatifWawancara sebagai Teknik Pengumpulan Data dalam Penelitian Kualitatif
Wawancara sebagai Teknik Pengumpulan Data dalam Penelitian KualitatifAdy Setiawan
 
Promosi, Perpindahan, Demosi, dan PHK dalam Manajemen Sumber Daya Manusia Pen...
Promosi, Perpindahan, Demosi, dan PHK dalam Manajemen Sumber Daya Manusia Pen...Promosi, Perpindahan, Demosi, dan PHK dalam Manajemen Sumber Daya Manusia Pen...
Promosi, Perpindahan, Demosi, dan PHK dalam Manajemen Sumber Daya Manusia Pen...Ady Setiawan
 
Teori dan Fungsi Manajemen
Teori dan Fungsi ManajemenTeori dan Fungsi Manajemen
Teori dan Fungsi ManajemenAdy Setiawan
 
Menyusun Instrumen Penelitian Kuantitatif
Menyusun Instrumen Penelitian KuantitatifMenyusun Instrumen Penelitian Kuantitatif
Menyusun Instrumen Penelitian KuantitatifAdy Setiawan
 
e-Book Senarai Kearifan Gontory Karya Ust. Ahmad Suharto
e-Book Senarai Kearifan Gontory Karya Ust. Ahmad Suhartoe-Book Senarai Kearifan Gontory Karya Ust. Ahmad Suharto
e-Book Senarai Kearifan Gontory Karya Ust. Ahmad SuhartoAdy Setiawan
 
Pendekatan Cost Benefit, Cost Effectiveness, dan Sarpras dalam Perencanaan Pe...
Pendekatan Cost Benefit, Cost Effectiveness, dan Sarpras dalam Perencanaan Pe...Pendekatan Cost Benefit, Cost Effectiveness, dan Sarpras dalam Perencanaan Pe...
Pendekatan Cost Benefit, Cost Effectiveness, dan Sarpras dalam Perencanaan Pe...Ady Setiawan
 
Pedoman Umum Ejaan Bahasa Indonesia (PUEBI)
Pedoman Umum Ejaan Bahasa Indonesia (PUEBI)Pedoman Umum Ejaan Bahasa Indonesia (PUEBI)
Pedoman Umum Ejaan Bahasa Indonesia (PUEBI)Ady Setiawan
 
Analisis Biaya dan Pengeluaran dalam Perencanaan Pendidikan
Analisis Biaya dan Pengeluaran dalam Perencanaan PendidikanAnalisis Biaya dan Pengeluaran dalam Perencanaan Pendidikan
Analisis Biaya dan Pengeluaran dalam Perencanaan PendidikanAdy Setiawan
 
Menentukan Sumber Data Penelitian (Populasi dan Sampel)
Menentukan Sumber Data Penelitian (Populasi dan Sampel)Menentukan Sumber Data Penelitian (Populasi dan Sampel)
Menentukan Sumber Data Penelitian (Populasi dan Sampel)Ady Setiawan
 

Plus de Ady Setiawan (20)

Presentasi Usulan Maskot dan Slogan UNTAN
Presentasi Usulan Maskot dan Slogan UNTANPresentasi Usulan Maskot dan Slogan UNTAN
Presentasi Usulan Maskot dan Slogan UNTAN
 
Konsep Sistem Desentralisasi Dalam Pendidikan
Konsep Sistem Desentralisasi Dalam PendidikanKonsep Sistem Desentralisasi Dalam Pendidikan
Konsep Sistem Desentralisasi Dalam Pendidikan
 
Kepemimpinan Pendidikan
Kepemimpinan PendidikanKepemimpinan Pendidikan
Kepemimpinan Pendidikan
 
Pelaksanaan Kurikulum Modifikasi di Sekolah Inklusif
Pelaksanaan Kurikulum Modifikasi di Sekolah InklusifPelaksanaan Kurikulum Modifikasi di Sekolah Inklusif
Pelaksanaan Kurikulum Modifikasi di Sekolah Inklusif
 
Fiqih Penguatan Penyandang Disabilitas
Fiqih Penguatan Penyandang DisabilitasFiqih Penguatan Penyandang Disabilitas
Fiqih Penguatan Penyandang Disabilitas
 
Buku KH. Hasyim Asy'ari (Pendiri Nahdlatul Ulama)
Buku KH. Hasyim Asy'ari (Pendiri Nahdlatul Ulama)Buku KH. Hasyim Asy'ari (Pendiri Nahdlatul Ulama)
Buku KH. Hasyim Asy'ari (Pendiri Nahdlatul Ulama)
 
Pedoman Diklat Berjenjang Bagi Guru PAUD di Daerah 3T
Pedoman Diklat Berjenjang Bagi Guru PAUD di Daerah 3TPedoman Diklat Berjenjang Bagi Guru PAUD di Daerah 3T
Pedoman Diklat Berjenjang Bagi Guru PAUD di Daerah 3T
 
Kebijakan Pendidikan Kesetaraan Tahun 2018
Kebijakan Pendidikan Kesetaraan Tahun 2018Kebijakan Pendidikan Kesetaraan Tahun 2018
Kebijakan Pendidikan Kesetaraan Tahun 2018
 
Analisis Biaya Pendidikan
Analisis Biaya PendidikanAnalisis Biaya Pendidikan
Analisis Biaya Pendidikan
 
Konsep Belajar dan Kinerja
Konsep Belajar dan KinerjaKonsep Belajar dan Kinerja
Konsep Belajar dan Kinerja
 
Kebijakan Pendidikan yang Unggul
Kebijakan Pendidikan yang UnggulKebijakan Pendidikan yang Unggul
Kebijakan Pendidikan yang Unggul
 
Wawancara sebagai Teknik Pengumpulan Data dalam Penelitian Kualitatif
Wawancara sebagai Teknik Pengumpulan Data dalam Penelitian KualitatifWawancara sebagai Teknik Pengumpulan Data dalam Penelitian Kualitatif
Wawancara sebagai Teknik Pengumpulan Data dalam Penelitian Kualitatif
 
Promosi, Perpindahan, Demosi, dan PHK dalam Manajemen Sumber Daya Manusia Pen...
Promosi, Perpindahan, Demosi, dan PHK dalam Manajemen Sumber Daya Manusia Pen...Promosi, Perpindahan, Demosi, dan PHK dalam Manajemen Sumber Daya Manusia Pen...
Promosi, Perpindahan, Demosi, dan PHK dalam Manajemen Sumber Daya Manusia Pen...
 
Teori dan Fungsi Manajemen
Teori dan Fungsi ManajemenTeori dan Fungsi Manajemen
Teori dan Fungsi Manajemen
 
Menyusun Instrumen Penelitian Kuantitatif
Menyusun Instrumen Penelitian KuantitatifMenyusun Instrumen Penelitian Kuantitatif
Menyusun Instrumen Penelitian Kuantitatif
 
e-Book Senarai Kearifan Gontory Karya Ust. Ahmad Suharto
e-Book Senarai Kearifan Gontory Karya Ust. Ahmad Suhartoe-Book Senarai Kearifan Gontory Karya Ust. Ahmad Suharto
e-Book Senarai Kearifan Gontory Karya Ust. Ahmad Suharto
 
Pendekatan Cost Benefit, Cost Effectiveness, dan Sarpras dalam Perencanaan Pe...
Pendekatan Cost Benefit, Cost Effectiveness, dan Sarpras dalam Perencanaan Pe...Pendekatan Cost Benefit, Cost Effectiveness, dan Sarpras dalam Perencanaan Pe...
Pendekatan Cost Benefit, Cost Effectiveness, dan Sarpras dalam Perencanaan Pe...
 
Pedoman Umum Ejaan Bahasa Indonesia (PUEBI)
Pedoman Umum Ejaan Bahasa Indonesia (PUEBI)Pedoman Umum Ejaan Bahasa Indonesia (PUEBI)
Pedoman Umum Ejaan Bahasa Indonesia (PUEBI)
 
Analisis Biaya dan Pengeluaran dalam Perencanaan Pendidikan
Analisis Biaya dan Pengeluaran dalam Perencanaan PendidikanAnalisis Biaya dan Pengeluaran dalam Perencanaan Pendidikan
Analisis Biaya dan Pengeluaran dalam Perencanaan Pendidikan
 
Menentukan Sumber Data Penelitian (Populasi dan Sampel)
Menentukan Sumber Data Penelitian (Populasi dan Sampel)Menentukan Sumber Data Penelitian (Populasi dan Sampel)
Menentukan Sumber Data Penelitian (Populasi dan Sampel)
 

Dernier

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Dernier (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Netiquette mine

  • 1. Netiquette "Netiquette" is network etiquette, the do's and don'ts of online communication. Netiquette covers both common courtesy online and the informal "rules of the road" of cyberspace.
  • 2. Introduction What is Netiquette? Simply stated, it's network etiquette -- that is, the etiquette of cyberspace. “Etiquette” means “the forms required by good breeding or prescribed by authority to be required in social or official life.” In other words, Netiquette is a set of rules for behaving properly online.
  • 3. Rule 1: Remember the Human The golden rule: Do unto others as you'd have others do unto you. Imagine how you'd feel if you were in the other person's shoes. Stand up for yourself, but try not to hurt people's feelings. Electronic communication lacks the facial expression, gestures and tone of voice to convey your meaning. It’s easy to misinterpret meaning of words. Would you say it to the person's face? If the answer is no, rewrite and reread. Repeat the process till you feel sure that you'd feel as comfortable saying these words to the live person as you do sending them through cyberspace. Remember, when you communicate through cyberspace your words are written. Chances are they're stored somewhere. They can come back and haunt you. You don't have to be engaged in criminal activity to want to be careful. Any message you send could be saved or forwarded by its recipient. You have no control over where it goes.
  • 4. Rule 2: Adhere to real-life standards of behavior Standards of behavior may be different in some areas of cyberspace, but they are not lower than in real life. Be ethical. If you encounter an ethical dilemma in cyberspace, consult the code you follow in real life. If you use shareware, pay for it. Paying for shareware encourages more people to write shareware. The few dollars probably won't mean much to you, but they benefit all of cyberspace in the long run. Breaking the law is bad Netiquette. If you're tempted to do something that's illegal, chances are it's also bad Netiquette.
  • 5. Rule 3: Know where you are in cyberspace Netiquette varies from domain to domain. What's perfectly acceptable in one area may be dreadfully rude in another. Netiquette is different in different places, so it's important to know where you are. Lurk before you leap When you enter a domain of cyberspace that's new to you, take a look around. Spend a while listening to the chat or reading the archives. Get a sense of how the people who are already there act. Then go ahead and participate.
  • 6. Rule 4: Respect other people's time and bandwidth Bandwidth is the information-carrying capacity of the wires and channels that connect everyone in cyberspace. It also refers to the storage capacity of a host system. If you accidentally post the same note to the same newsgroup five times, you are wasting both time (of the people who check each copy) and bandwidth (by sending repetitive information over the wires and requiring it to be stored somewhere). You are not the center of cyberspace. Don’t expect instant responses to all your questions, and don't assume that all readers will agree with -- or care about -- your passionate arguments. Ensure your message is worth the time it takes to open it. Before you copy people on your messages, ask yourself whether they really need to know. If the answer is no, don't waste their time. If the answer is maybe, think twice before you hit the send key.
  • 7. Rule 5: Make yourself look good online Take advantage of your anonymity. You won't be judged by color, weight, age or dress sense. You will, however, be judged by the quality of your writing. So spelling and grammar do count. Know what you're talking about and make sense. Pay attention to the content of your writing. Ensure your notes are clear and logical. Be pleasant and polite. Avoid offensive language, and don't be confrontational for the sake of confrontation. If you must swear, think up creative alternatives.
  • 8. Rule 6: Share expert knowledge The strength of cyberspace is in its numbers. The Internet itself was founded and grew because academics wanted to share information. Don't be afraid to share what you know. If you ask a question and anticipate a lot of answers, it’s customary to request replies by email instead of to the group. Share the results of your questions with others, so everyone benefits from the experts who took the time to write to you. If you’re an expert, or you've researched a topic that you think would be of interest to others, write it up and post it. Sharing your knowledge is fun. And it makes the world a better place.
  • 9. Rule 7: Help keep flame wars under control "Flaming" is what people do when they express a strongly held opinion without holding back any emotion. Netiquette does not forbid flaming. Flaming is a long-standing network tradition (and Netiquette never messes with tradition). Netiquette does forbid the perpetuation of flame wars that can dominate the tone and destroy the camaraderie of a discussion group. While flame wars can initially be amusing, they’re an unfair monopolization of bandwidth.
  • 10. Rule 8: Respect other people's privacy You’d never snoop through your colleagues' desk drawers, so naturally you wouldn't read their email either. Failing to respect other people's privacy is not just bad Netiquette. It could also cost you your job.
  • 11. Rule 9: Don't abuse your power Some people in cyberspace have more power than others. There are wizards in MUDs (multi-user dungeons), experts in every office, and system administrators in every system. Knowing more than others, or having more power than they do, does not give you the right to take advantage of them. For example, sysadmins should never read private email.
  • 12. Rule 10: Be forgiving of other people’s mistakes Everyone was a newbie once. When someone makes a mistake -- be kind about it. If it's a minor error, you may not need to say anything. Even if you feel strongly about it, think twice before reacting. Having good manners yourself doesn't give you license to correct everyone else. If you inform someone of a mistake, point it out politely, and preferably by private email rather than in public. Give people the benefit of the doubt.
  • 13. Resources • http://www.networketiquette.net/ • http://www.albion.com/netiquette/ • http://www.livinginternet.com/i/ia_nq. htm • http://www.netmanners.com/ • http://www.ietf.org/rfc/rfc1855.txt • http://www.albury.net.au/new- users/netiquet.htm