0% found this document useful (0 votes)
84 views55 pages

Lesson 11 Rules of Netiquette

Uploaded by

Ianna Landicho
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
84 views55 pages

Lesson 11 Rules of Netiquette

Uploaded by

Ianna Landicho
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 55

RULES OF

NETIQUETTE
Essential Question:

How should we
communicate online?
NETWORK + ETIQUETTE
Netiquette
• Netiquette are the manners
that everyone should follow
when communicating online.
RULES OF
NETIQUETTE
Be nice and respectful
• Just because you can’t see someone,
doesn’t mean that person can’t have
his/her feelings hurt. If you won’t say
it to someone’s face, then
don’t feel free to say it in
writing.
Don’t use bad language
• Using bad language just
proves you don’t know
how to say something
well.
Don’t spread rumors or lies
• This is a form of bullying and is
against the law.
• Words and writing are
powerful.
• Treat that power with
respect.
DON’T SHOUT
• All caps = shouting.
• Use all caps like you would a
highlighter — only occasionally.
Don’t break the law.
• Stealing from others isn’t just
impolite; it’s illegal. That means files,
movies, music, etc.
• If someone else did the
work, don’t take it
without asking.
Control Flame Wars
• “Flaming” is when the fires of gossip get
out of control and rapidly spread.
• Don’t get caught up in it. If someone
comments in a discussion in an
emotional way or in a way that breaks
another rule of netiquette, don’t get
involved.
Be forgiving
• Everyone is new at this.
• Everyone may occasionally make a
mistake, like a spelling error.
• Let the small things pass.
INTERNET + ETIQUETTE
Netiquette
• Netiquette are the manners
that everyone should follow
when communicating online.
Netiquette
• Manner and behavior
• is the set of professional and social etiquettes
practiced and advocated in electronic
communication over any computer network.
• include being courteous and precise, and
avoiding cyber-bullying
• also dictates that users should obey copyright
laws
INTERNET THREATS
Malware
• Malicious Software, is any program or
file that is harmful to a computer user.
• Attached to a small pieces of computer
code, software, or documents.
• May transfer through e-mail, file
transfers, and instant messaging.
Malware
1.Virus
2.Worm
3.Trojan
4.Spyware
5. Adware
1. Virus
• A malicious program designed to
replicate itself and transfer from
one computer to another either through
Internet or data storage.
• A virus has a potential to corrupt or even delete
files on your computer, use email to spread
itself to other computers, or even erase your
hard drive.
2. Worm
• Is a self-replicating program
that is harmful to networks.
• A malicious program that
transfer from one computer
network to spread itself.
• Different from the virus because the worm does
not need to attach to a program to infect the
host.
3. Trojan Horse
• A malicious program designed as a useful
program but once downloaded or installed,
leaves your PC unprotected and allows
hackers to get information.
3. Trojan Horse
• A Trojan Horse Virus is a type of malware that
downloads onto a computer disguised as a
legitimate program.
4. Spyware
• Spyware is loosely defined as malicious
software designed to enter your computer
device, gather data about you, and forward it to
a third-party without your consent.
• Spyware can also refer to legitimate software
that monitors your data for commercial
purposes like advertising. However, malicious
spyware is explicitly used to profit from stolen
data.
4. Spyware
• Programs that runs in the background without
you knowing it.
• It has the ability to monitor what you are
currently doing and typing through keylogger
software.
4. Spyware
• Keyloggers – used to record the keystroke
done by the users. This is done to steal their
password or any other sensitive information. It
can record email, message, or any information
you type using your keyboard.
5. Adware
• A program designed to send you
advertisement, mostly as pop-ups.
Spam
• unwanted email mostly from bots or
advertisers. It can be used to send
malware.
Phishing
• Its goal is to acquire sensitive personal
information like passwords and credit
card details.
Phishing
• This is done by sending you an email
that will direct the user to visit website
and be asked to update his/her
username, password, credit card, or
personal information.
COPYRIGHT INFRINGEMENT
• In other words, the copyright law
includes your rights over your work, and
anyone who uses it without your consent
is punishable by law.
COPYRIGHT INFRINGEMENT
• If you create something ----- an idea, an
invention, a form of literary work, or a
research, you have the right as to how it
should be used by others.
• This is called intellectual property.
COPYRIGHT INFRINGEMENT
• Try grabbing any book the browse its
first few page and you ill find a page with
a disclaimer with the words: “No part of
this book may be copied, reproduced…”
That is copyright page.
COPYRIGHT INFRINGEMENT
• As a responsible user of the Internet, you have
to consider that not everything out there is free
for you to use. Just like your own, contents
that you see from websites have there
respective copyrights. There are several
instances where employees are business
owners face copyrights infringement and are
sentenced to a huge fine due to reckless
copying of materials.
Here are some examples of copyrighted
materials:
• Architectural works, including
blueprints
• Sound recordings
• Audiovisual works, including motion
pictures
• Artworks
Here are some examples of copyrighted
materials:
• Dramatic works, including any
accompanying music
• Musical works, including any
accompanying words
• Literary works
• Choreographic works
Architectural works,
Here are some Including
examples blueprints
of copyrighted
materials:
Here are some tips that could help you avoid
copyright infringement:
UNDERSTAND
• Copyright protects literary works, photographs,
paintings, drawings, films, music (and lyrics),
choreography, and sculpture, but It generally
does NOT protect underlying ideas and facts.
This means that you can express something
using your own words, but you should give
credit to the source.
BE RESPONSIBLE
• Even if a material does not say
that it is copyrighted, it is not a
valid defense against copyright.
Be responsible enough to know
if something as a copyright.
BE CREATIVE
• Ask yourself whether what you are
making is something that came from
you or something made from
somebody else’s creativity. It is
important to add your own creative
genius in everything that will be
credited to you.
KNOW THE LAW
• There are some limitations to copyright laws. For
instance in the Philippines, copyrights only last a
lifetime(of the author) plus 50 years. There also
provisions for “fair use” which mean that an intellectual
property maybe use without a consent as long as it is
used in commentaries, criticisms, search engines,
parodies, news reports, research, library archiving,
teaching, and education. If you have doubts that what
you are doing does not fall under the policy of fair use,
seek permission first.

You might also like