SlideShare une entreprise Scribd logo
1  sur  11
Digital Etiquette
Madeline Schreck,
Shelby Wetterau,
Alexis Pins
Digital Etiquette is also known as netiquette.
It is a basic set of rules on how you should behave
while using the internet.
Rules of the Internet
Treat others
the way you
want to be
treated
Why Is Digital Etiquette Important?
Everyone
deserves to
be treated
with respect
and courtesy.
Bad Examples of Digital Etiquette
DO NOT USE ALL
CAPS!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!
Continued.
Don’t use
slang when
writing a
formal
message
Bad Netiquette
Do not
use bad
language.
Good Examples of Netiquette
Be Yourself
Good Examples Cont.
Make sure
your
comment
cant be
mistaken.
Good Examples Cont.
Make a
username that
isn’t
embarrassing or
inappropriate
THANKS FOR WATCHING. BELLA KNOWS
WHO WASN’T.

Contenu connexe

En vedette

Unit 3 standards presentation
Unit 3 standards presentationUnit 3 standards presentation
Unit 3 standards presentationrebeccaneely
 
0046352b60861f1df3000000.pdf
0046352b60861f1df3000000.pdf0046352b60861f1df3000000.pdf
0046352b60861f1df3000000.pdfstoneshedadvisory
 
Universal design - Towards a More Thorough Ethical and Theoretical Understan...
Universal design - Towards a More Thorough  Ethical and Theoretical Understan...Universal design - Towards a More Thorough  Ethical and Theoretical Understan...
Universal design - Towards a More Thorough Ethical and Theoretical Understan...Ilse Oosterlaken
 
Каталог faberlic №6/2015
Каталог faberlic №6/2015Каталог faberlic №6/2015
Каталог faberlic №6/2015Larisa Batutina
 
Android operating system
Android operating systemAndroid operating system
Android operating systemShahid Sayed
 
How to restart windows 8
How to restart windows 8How to restart windows 8
How to restart windows 8mmeas
 
Pests infesting Fam. Solanaceae
Pests infesting Fam. SolanaceaePests infesting Fam. Solanaceae
Pests infesting Fam. SolanaceaeAsmaa Bedawy
 
Welzijn, diversiteit & actorschap; Een introductie op de 'capability' benadering
Welzijn, diversiteit & actorschap; Een introductie op de 'capability' benaderingWelzijn, diversiteit & actorschap; Een introductie op de 'capability' benadering
Welzijn, diversiteit & actorschap; Een introductie op de 'capability' benaderingIlse Oosterlaken
 
Сихівський замок
Сихівський замокСихівський замок
Сихівський замок109 Group
 
Khmer fruits pronounciation
Khmer fruits pronounciationKhmer fruits pronounciation
Khmer fruits pronounciationmmeas
 
Bootstrat REST APIs with Laravel 5
Bootstrat REST APIs with Laravel 5Bootstrat REST APIs with Laravel 5
Bootstrat REST APIs with Laravel 5Elena Kolevska
 
What counts as a philosophical theory of well-being?
What counts as a philosophical theory of well-being?What counts as a philosophical theory of well-being?
What counts as a philosophical theory of well-being?Ilse Oosterlaken
 
ICT, Development & Privacy: Exploring the Debate and Evaluating Argumentative...
ICT, Development & Privacy: Exploring the Debate and Evaluating Argumentative...ICT, Development & Privacy: Exploring the Debate and Evaluating Argumentative...
ICT, Development & Privacy: Exploring the Debate and Evaluating Argumentative...Ilse Oosterlaken
 

En vedette (20)

Unit 3 standards presentation
Unit 3 standards presentationUnit 3 standards presentation
Unit 3 standards presentation
 
0046352b60861f1df3000000.pdf
0046352b60861f1df3000000.pdf0046352b60861f1df3000000.pdf
0046352b60861f1df3000000.pdf
 
2016 13 cat_ru
2016 13 cat_ru2016 13 cat_ru
2016 13 cat_ru
 
Evaluation question 2
Evaluation question 2Evaluation question 2
Evaluation question 2
 
Universal design - Towards a More Thorough Ethical and Theoretical Understan...
Universal design - Towards a More Thorough  Ethical and Theoretical Understan...Universal design - Towards a More Thorough  Ethical and Theoretical Understan...
Universal design - Towards a More Thorough Ethical and Theoretical Understan...
 
Каталог faberlic №6/2015
Каталог faberlic №6/2015Каталог faberlic №6/2015
Каталог faberlic №6/2015
 
Android operating system
Android operating systemAndroid operating system
Android operating system
 
How to restart windows 8
How to restart windows 8How to restart windows 8
How to restart windows 8
 
2016 14 cat_ru
2016 14 cat_ru2016 14 cat_ru
2016 14 cat_ru
 
NAV CV,,,,,,,
NAV CV,,,,,,,NAV CV,,,,,,,
NAV CV,,,,,,,
 
Presentación1
Presentación1Presentación1
Presentación1
 
Pests infesting Fam. Solanaceae
Pests infesting Fam. SolanaceaePests infesting Fam. Solanaceae
Pests infesting Fam. Solanaceae
 
Welzijn, diversiteit & actorschap; Een introductie op de 'capability' benadering
Welzijn, diversiteit & actorschap; Een introductie op de 'capability' benaderingWelzijn, diversiteit & actorschap; Een introductie op de 'capability' benadering
Welzijn, diversiteit & actorschap; Een introductie op de 'capability' benadering
 
Avalon_Case_Study
Avalon_Case_StudyAvalon_Case_Study
Avalon_Case_Study
 
U.A. NADKARNI MSc THESIS - Copy
U.A. NADKARNI MSc THESIS - CopyU.A. NADKARNI MSc THESIS - Copy
U.A. NADKARNI MSc THESIS - Copy
 
Сихівський замок
Сихівський замокСихівський замок
Сихівський замок
 
Khmer fruits pronounciation
Khmer fruits pronounciationKhmer fruits pronounciation
Khmer fruits pronounciation
 
Bootstrat REST APIs with Laravel 5
Bootstrat REST APIs with Laravel 5Bootstrat REST APIs with Laravel 5
Bootstrat REST APIs with Laravel 5
 
What counts as a philosophical theory of well-being?
What counts as a philosophical theory of well-being?What counts as a philosophical theory of well-being?
What counts as a philosophical theory of well-being?
 
ICT, Development & Privacy: Exploring the Debate and Evaluating Argumentative...
ICT, Development & Privacy: Exploring the Debate and Evaluating Argumentative...ICT, Development & Privacy: Exploring the Debate and Evaluating Argumentative...
ICT, Development & Privacy: Exploring the Debate and Evaluating Argumentative...
 

Similaire à Digital Etiquette

Managing a professional identity online
Managing a professional identity onlineManaging a professional identity online
Managing a professional identity onlineangeladh
 
Digital citizenship for Elementary Students
Digital citizenship for Elementary StudentsDigital citizenship for Elementary Students
Digital citizenship for Elementary Studentskgilliard13
 
Email and Net Etiquette
Email and Net EtiquetteEmail and Net Etiquette
Email and Net EtiquetteSanu Subham
 
Proper Netiquette.pptx
Proper Netiquette.pptxProper Netiquette.pptx
Proper Netiquette.pptxABADMARKGEMREL
 
Internet safety
Internet safetyInternet safety
Internet safetykohlerj
 
Digital etiquette 2[1]
Digital etiquette 2[1]Digital etiquette 2[1]
Digital etiquette 2[1]putnamca
 
Package Yourself for Success
Package Yourself for SuccessPackage Yourself for Success
Package Yourself for Successbethgsanders
 
FIT_A&D_TI_WORKSHOPS_NETIQUETTE_FALL13
FIT_A&D_TI_WORKSHOPS_NETIQUETTE_FALL13FIT_A&D_TI_WORKSHOPS_NETIQUETTE_FALL13
FIT_A&D_TI_WORKSHOPS_NETIQUETTE_FALL13Sandra Markus
 
Internet Safety: I
Internet Safety: IInternet Safety: I
Internet Safety: Imlegan31
 

Similaire à Digital Etiquette (20)

Digital etiquette
Digital etiquetteDigital etiquette
Digital etiquette
 
Managing a professional identity online
Managing a professional identity onlineManaging a professional identity online
Managing a professional identity online
 
Digital citizenship for Elementary Students
Digital citizenship for Elementary StudentsDigital citizenship for Elementary Students
Digital citizenship for Elementary Students
 
Film 260
Film 260Film 260
Film 260
 
10 commandments
10 commandments10 commandments
10 commandments
 
Email and Net Etiquette
Email and Net EtiquetteEmail and Net Etiquette
Email and Net Etiquette
 
Proper Netiquette.pptx
Proper Netiquette.pptxProper Netiquette.pptx
Proper Netiquette.pptx
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Hungerfordnetiquette
HungerfordnetiquetteHungerfordnetiquette
Hungerfordnetiquette
 
Hacking a career
Hacking a careerHacking a career
Hacking a career
 
Digital etiquette 2[1]
Digital etiquette 2[1]Digital etiquette 2[1]
Digital etiquette 2[1]
 
Netiquette 5 cl
Netiquette 5 clNetiquette 5 cl
Netiquette 5 cl
 
Package Yourself for Success
Package Yourself for SuccessPackage Yourself for Success
Package Yourself for Success
 
FIT_A&D_TI_WORKSHOPS_NETIQUETTE_FALL13
FIT_A&D_TI_WORKSHOPS_NETIQUETTE_FALL13FIT_A&D_TI_WORKSHOPS_NETIQUETTE_FALL13
FIT_A&D_TI_WORKSHOPS_NETIQUETTE_FALL13
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Netiquette
NetiquetteNetiquette
Netiquette
 
6. netiquette day 8
6. netiquette day 86. netiquette day 8
6. netiquette day 8
 
6. netiquette day 8
6. netiquette day 86. netiquette day 8
6. netiquette day 8
 
Internet Safety: I
Internet Safety: IInternet Safety: I
Internet Safety: I
 

Dernier

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Dernier (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Digital Etiquette