0% found this document useful (0 votes)
9 views6 pages

ETECH

Uploaded by

pre123541974
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views6 pages

ETECH

Uploaded by

pre123541974
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

NETIQUETTE Rule no.

8: Respect other people’s privacy

It is a word that came from the two words Rule no. 9: Don’t abuse your power
“net” and “etiquette”. It is an etiquette
Rule no. 10: Be forgiving of other people’s
applied online that shows proper manner and
mistake.
behavior. If you are a member of an online
society through social media you are called Rule no. 10: Be forgiving of other people’s
netizen. And in interacting with other netizen mistake
online, we need to maintain good behavior
which is acceptable to others in online RULES OF NETIQUETTE
community.

CONTENT COVERAGE
You need to remember that you are talking to
• Online Security a real person when you are online.
• Internet Threats The internet brings people together who
• Protecting Reputations Online would otherwise never meet.

• Copyright Remember this saying when sending an email:


Would I say this to the person’s face.
• Contextualized online search and
research skill

INTERNET SAFETY
You need to behave the same way online that
Refers to the online security or safety of you do in real life.
people and their information when using
internet. You need to remember that you can get
caught doing things you should not be doing
NETIQUETTE online just like you can in real life.
Combination of the words network and You are still talking to a real person with
etiquette and is defined as a set of rules for feelings even though you can’t see them.
acceptable online behavior.

TEN RULES OF NETIQUETTE

Rule no. 1: Remember the human Always take a look around when you enter a
new domain when surfing the web.
Rule no. 2: Adhere to the same standards
online that you follow in real life. Get a sense of what the discussion group is
about before you join it.
Rule no. 3: Know where you are in
cyberspace.

Rule no. 4: Respect other people’s time and


bandwidth. Remember people have other things to do
besides read your email. You are not the
Rule no. 5: Make yourself look good online.
center of their world.
Rule no. 6: Share expert knowledge
Keep your post and emails to minimum by
Rule no. 7: Help keep flame wars under saying what you want to say.
control
Remember everyone won’t answer your Do not point out mistakes to people online.
questions.
Remember that you were once the new kid
on the block.

You still need to have a good manners even


Be polite and pleasant to everyone.
though you are online and cannot see the
Always check your spelling and grammar person face to face.
before posting.

Know what you are talking about and make


sense saying it.

Ask questions online.

Share what you know online.

Post the answers to your questions online


because someone may have the same
question you do.

Netiquette does not forgive flaming.

Netiquette does however forbid people who


are flaming to hurt discussion groups by
putting the group down.

Do not read other people’s mail without their


permission.

Going through other people’s things could


cost you, your job or you could even go to jail.

Not respecting other people’s privacy is a bad


netiquette.

Do not take advantage of other people just


because you have more knowledge or power
than them.

Treat others as you would want them to treat


you if the roles were reversed.
INTERNET THREATS ADWARE

MALWARE A program designed to send you


SPAM advertisements, mostly a pop-ups.
PHISHING
PROTECTING REPUTATIONS ONLINE
MALWARE
 INTELLECTUAL PROPERTY
Stands for Malicious Software, any program or  COPYRIGHT LAW
file that is harmful to a computer user.  COPYRIGHT PAGE

SPAM INTELLECTUAL PROPERTY

Unwanted email mostly from advertisers. Intellectual property is a category of property


that includes intangible creations of the
PHISHING
human intellect. Intellectual property
Its goal is to acquire sensitive personal encompasses two types of rights: industrial
information like passwords and credit card property rights and copyright.
details.
COPYRIGHT LAW
KINDS OF MALWARE
It is the legal protection extended to the
 VIRUS owner of the rights in an original work.
 WORM
COPYRIGHT PAGE
 TROJAN
 SPYWARE The copyright page is where the publisher
 KEYLOGGER places all the legal notices and information
 ADWARE related to a book.

VIRUS TO AVOID COPYRIGHT INFRINGEMENT

Program designed to replicate itself and UNDERSTAND. Copyright protect literary


transfer from one computer to another. works, photographs paintings, drawing, films,
music choreography and sculptures.
WORM
BE RESPONSIBLE. Even if a material does not
A malicious program that transfers from one
say that it is copyrighted, it is not a valid
computer to another by any types of means.
defense against copyright.
TROJAN
BE CREATVE. Ask yourself whether what you
A malicious program that is disguised as a are making is something that came from you
useful program but once downloaded or or something made from somebody else
installed, leaves your PC unprotected and creativity.
allows hacker to get you information.
KNOW THE LAW. There are some limitations
SPYWARE to copyright laws.

Software that ruins in the background without


you knowing it.

KEYLOGGERS

Used to record the keystroke done by the


user.
ONLINE RESEARCH

Have a question in mind- Focus on a question


you want answered.

Narrow it down- Search engines like Google,


Bing, or Yahoo use several filters to determine
the most appropriate result for you.

Advanced Search- The best way to filter


information you get from search engines is by
using the advanced search.

Look for a credible sources- Some wikis, filled


with updated information, are not a credible
source. When using wikis, check out the link
of the cited texts.

Give credit- Give credit to the original author


of the page or information. To properly site a
reference, you may use the format below.
CONTEXTUALIZED ONLINE SEARCH AND 6.Skim through search results web pages.
RESEARCH SKILLS
7.Bookmark
INTERNET RESEARCH
8.Review your bookmarks.
Is a research method in collecting and
Online Research Skills by Hannah Trierweiler
gathering information via internet by using
Hudson
search engine such as google.
1.Check Your Sources
Search Engine is a program that allows users
to search for content on internet. 2.Ask Good Questions
SEARCH ENGINE 3.Go Beyond the Surface
Google Info 4.Be Patient
Aol Search Bing 5.Respect Ownership
Wow Baidu DuckDuckGo 6.Use Your Networks
Web Crawler Infospace COPYRITE
Yahoo! Search Contenko Copyright is a protection given to the owner
of the rights in an original work such as books,
MyWebSearch Internet Archive
musical works, films, paintings, and other
Wolframalpha Ask works, and computer programs. This original
work is called intellectual property which is
Dogpile
protected under Republic Act 8293 known as
SEARCHING THE WEB the “Intellectual Property Code of the
Philippines”.
Getting the correct and reliable information is
our goal in internet research. We may rely on Copyright Issues
the capability of search engine but sometimes
There are millions of information that we can
it may not give us the correct information
get from the internet. Some of this
because of the keywords we entered into a
information are free but others are not. They
search engine. There are techniques in
are protected by a copyright law.
searching information that can be applied in
search engine in order to get a better result. COPYRIGHT INFRINGEMENT
Some search engines allow combination of
This happens when the copyrighted work is
words and logic connectors of AND, OR, and
use by other person without permission of the
NOT.
author or copyright holder. Any person who is
Tips for Effective Internet Research by infringing the right protected work would be
George Mathews liable under the law.

1.Know what kind of research you want to do. FAIR USE

2.Make a list of keywords you will use in your Research is important to the students and
search. other people. Most of them rely on the
information that they can get online.
3.Enclose keywords in quotation marks.
Although this information is protected by a
4.Use the minus sign (-). copyright law but we can still use this

5.Try specialized search engines.


information without permission in a limited
way under certain condition and purpose.

Fair use is the use of copyrighted material for


comment, teaching, criticism, news reporting,
research, scholarship, and other similar
purpose is not an infringement of copyright.

GUIDELINESS FOR FAIR USE

1.Majority of the contents created must be


yours.

2.Give credit to the owner.

3.Don’t make profit of the copyrighted work.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy