0% found this document useful (0 votes)
7 views17 pages

LESSON 2 Rules of Netiquette

The document discusses the importance of netiquette, online safety, and security while using the internet. It provides tips for staying safe online, highlights various internet threats, and emphasizes the significance of copyright laws and authenticity verification of information. Additionally, it outlines different sources of information available on the internet.

Uploaded by

martdave05
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views17 pages

LESSON 2 Rules of Netiquette

The document discusses the importance of netiquette, online safety, and security while using the internet. It provides tips for staying safe online, highlights various internet threats, and emphasizes the significance of copyright laws and authenticity verification of information. Additionally, it outlines different sources of information available on the internet.

Uploaded by

martdave05
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 17

LESSON 2: RULES

OF NETIQUETTE
LESSON MOTIVATION
WHAT IS
ETHICS?
WHAT IS
ETIQUETTE?
WHAT IS
NETIQUETTE?
WHAT IS NETIZEN?
The internet, truly, is a
powerful tool.

ONLINE SAFETY AND It can be used to promote


your business, gain new
SECURITY friends, and stay in touch
with old ones.

It is also a source of
entertainment through
different ways.

There’s always the “other


side of the coin”
LESSON MOTIVATION
TIPS TO STAY SAFE ONLINE
1.Be mindful of what ypu share online and what site you
share it to.
2.Do not just accept terms and conditions; read it.
3.Check out the privacy policy page of a website
4.Know the security features of the social networking site
that you use.
5.Do not share your password to anyone.
6.Avois logging in to any public networks/WiFi.
7.Do not talk to strangers whether online or face-to-face.
8.Never post anything about a future vacation.
9.Add friends you know in real life.
10.Avoid visiting untrusted websites.
11.Install ang update an antivirus software on your
computer.
12.If you have a WiFi at home, make it a private network by
adding a password.
13.Avoid downloading anything from a untrusted websites.
14.Buy the software: do not use the pirated ones.
15.Do not reply or click links from suspicious emails.
INTERNET THREATS
1.Malware
a. Virus
b. Worm
c. Trojan
d, Spyware
*Keyloggers
e. Adware
2. Spam
3. Phishing
*Pharming
THINK
BEFORE
YOU CLICK
COPY RIGHT INFRINGEMENT

Tips to avoid
Copyright
Infringement:

1. Understand
2. Be Responsible
3. Be Creative
4. Know the Law
WHAT IS THE
DIFFERENCE
BETWEEN
AUTHENTICITY ANDD
RELIABILITY?
THE FOLLOWING ARE THE FIVE(5) SOURCES
OVER THE INTERNET
1.Web Search Engines-
Bing, Google, and
Yahoo
2.Research Index Sites-
Google Scholar and
Search Engine
3.Massive Online Open
Course (MOOC)-
Coursera, edX, and
Udemy
THE FOLLOWING ARE THE FIVE(5) SOURCES
OVER THE INTERNET

4. Employment
Websites- Jobstreet,
Indeed, etc.
5. Electronic
Commerce (E-
commerce)
AUTHENTICITY VERIFICATION OF
INFORMATION FROM THE WEB

1.Published Author’s
Name
2.Credible Websites
3.Rating, number of
viewers, and number
of shares
4.Reference and
related articles
THANK YOU!
As we look to the future, these technologies will play a crucial
role in shaping a better world for generations to come.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy