Rules of Netiquette (G2)

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 12

RULES OF NETIQUETTE

BY: GROUP 2 NIPA FRUITICANS


10 RULES OF NETIQUETTE
Okay, so the internet police won’t come and get you and the bush people aren’t
peeking in your windows with binoculars, but there definitely are some great
rules for internet etiquette that will make your online experience more enjoyable.

1. When typing never write in all capital letters. That is shouting. People don’t


like it when you shout at them in person. And they sure don’t like when you
shout at them on the net!
2. Don’t plagiarize. Someone spent a long time coming up with their content.
When you borrow something from someone, give them the credit. Site their
name or their site. Give the site when you have gotten your information.
3. Use proper quotes and always use the whole quote. Don’t take quotes out of context and
don’t be selective about which part of the quote you want to use.

4. Don’t gossip and keep personal information personal. Don’t tell stories that you don’t
know for a fact to be true. And often, just because it’s true, doesn’t mean that it needs to be
repeated.
5. Don’t steal those photographs off the web even if they are a perfect fit for what you need.
Chances are they are copyrighted and someone spent a long time putting that together. Get
permission and give credit where credit is due.
6. Watch your language. No potty mouths.
7. Be patient with internet newbies. Know that they are just learning like you did once upon a
time.
8. No spamming. Remember that spam is unwanted electronic messages or sending the same
electronic message over and over. This can get you in a lot of trouble on some sites and as a
general rule it just irritates everyone else.
9. If you are using a header (such as in an email) make sure your content really
pertains to the header. You must admit it would really stink if the header said
something about football, for example, and the email was really about your
newest and greatest business idea. Just stay on topic and the problem is solved.

10. Avoid overuse of emoticons. You know... those cute little smiley faces. They
really lose their cuteness when overused and tend to irritate people.
Following these simple guidelines will keep your internet connections happy and
allow for more “social” interactions. Just like in face to face dealings, internet
users love other users with manners. Manners go a long way in saying who you
are and what you are.
* Online security, safety, and ethics
* Internet threats
* Protecting reputations online
* Copyright
* Contextualized online search and
research skills
Online Safety and Security
• The internet, truly is a powerful tool. It can be used to promote
your business, gain new friends, and stay in touch with the old
ones. It also a source of entertainment though game, online
communities, and everything in between. But like most things in
this world, there is always the “other side of the coin.” The
internet is one of the most dangerous places, especially if you do
not know what you are doing with it. But there is no need to
worry it; It is never that late. Hopefully, by the end of this lesson,
you are able to consider how you go about your use of the
internet.
Type of Information Risks
1. First Name There is a risk sharing your first name. chances are, a hacker may already know plenty of stuff about
you even if you only give out your first name.
2. Last Name If sharing your first name is a small risk, having both your first and last name is more risky. You will be
vulnerable to being search for using search engines, which include image search.
3. Middle Name Sharing your middle name alone is probably not the most risky of this shared information, but sharing
your full name would be.
4. Current and previous Most people who steal identities study their subject. They can use this information for verification
school(S) purposes.
5. Your cellphone Your cellphone number should never be posted over the internet. The internet is a public place. You
number would not want random strangers to text or call you, or worse, pretend that they are someone else.
6. The name of your Risky, yet not as risky as posting their real names, especially mother’s maiden name. In fact you may
mother and father have already encountered many website’s that requires a maiden name as an answer to a secret
question whenever you lose your password.
7. Siblings name Disclosing this a huge risk. Strangers may pretend or use their identity to dupe you.
8. Your address Hopefully, you answered “no” to this one. Giving the internet your number is one thing; giving them
your address is a whole other level
9. Home phone number Scams usually use this information top deceive you.

10. Your birthday Letting people know your birthday is probably a must if you want to get as many gifts as possible. But
having it in your profile makes you vulnerable to identity theft.
Tips to Stay safe Online
• 1. Be mindful of what you share online and what site you share to.
• 2. Do not accept terms and condition; read it.
• 3. Check out the privacy policy page of website to learn how the website handles the information you share.
• 4. Know the security features of the social networking site use. By keeping your profile private, search engines will not able
to scan your profile.
• 5. Do not share your password with anyone.
• 6. Avoid logging into public networks/ Wi-Fi. Browsing in “incognito (or private) mode,” a feature of the browser, will not
protect you from hackers.
• 7. Do not talk to strangers whether online or face-to-face.
• 8. Never post anything about a future vacation. It is similar to posting, ”Rob my house at this date.”
• 9. Add friends you know in real life.
• 10. Avoid visiting untrusted website.
• 11. Install and update an antivirus software on your computer. Use only one antivirus software to avoid conflicts.
• 12. If you have a Wi-Fi at home, make it private network by adding a password.
• 13. Avoid downloading anything from untrusted website. You are most vulnerable in peer-to-peer downloads is most likely
not monitored by the site owner.
• 14. Buy the software; do not use pirated ones.
• 15. Do not reply or click links from suspicious email
Malware - stands for malicious software
A. Virus - a malicious program designed to replicate itself and transfer from one computer to
another either through the internet and local network or data storage like flash drives and CDs
B. Worm - a malicious program that transfers from one computer to another by any types of
means. Often, it uses a computer network to spread itself. For example, the ILOVE YOU worm
(Love Bug Worm)created by a Filipino
C. Trojan- a malicious program that is disguised as a useful program but once downloaded or
installed, leaves your PC unprotected and allows hackers to get your information
Rogue Security Software – tricks the user into posing that it is a security software it asks the user
to pay to improve his/her security but in reality they are not protected at all
D. Spyware - a program that runs in the background without you knowing it (thus ,called spy)
It has the ability to monitor what you are currently doing and typing through key logging
Key loggers - used to record the keystroke done by the user. This is done to steal their
password or any other sensitive information. It can record email, message, or any information
you type using your keyboard
E. Adware - a program designed to send advertisements mostly as popups
Think before you click
Here are thing might want consider before posting some thing
over the internet
1.Before you post something on the web ,ask these question to yourself
.would you want your parents or grandparent to see it? Would you want your
future boss to see it? Once you post something on the web, you have no
control of who sees you posts.
2.Your friends depend on you to protect their reputation online. Talk to your
friends about this serious responsibility
3.Set your post to private in this way ,search engines will not be able to scan
that post
4.Avoid using names. Names are easy for search engines to scan
5.If you feel that a post can affect you or other’s reputation. Ask the one who
posted it to pull it down or report it as inappropriate
Copyright Infringement
if you create something –an idea, an invention, a form of literary work, or a research
you have the right as to how it should be used by others, this called intellectual property
in other words, the copy right law includes you right over your work, and anyone who
uses it without your consent is punishable by law. Try grabbing any book then browse its
first few pages and you will find a page with disclaimer with the words; no part of this
book may be copied reproduced.

Here are some tips that could help you avoid copyright infringement:

1. Understand. Copyrights protects literary works, photographs, paintings, drawings.,


films, music (and lyrics), choreography, and sculptures, but it generally does not
protect underlying ideas.
2. Be responsible. Even if a material does not say that it is copyrighted, it is not valid
defense against copyright.
3. Be creative. Ask yourself whether what you are making is something that came from
you or something made from somebaody else’s creativity.
 LOVELY JOY YARA
 NEIL JAMES SOSMEÑA
 KENT BELLO PAG-ONG
 KHENT ANTIOLA
 MELBEN HERMOSO
 ARLYS JANE IGNACIO

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy