Submitted by: Donna Rembert Instructor: Dr. Laurie Fowler ED508 Technology Portfolio
Netiquette is a cyber term for doing what is right on the internet. It is a combination of the words network and etiquette. It is how one behaves every time they hit the send button. There are over 2 billion users on the web
Only use your first name and personal information or pictures to anyone. Never agree to see someone you ‘meet” on line. Don’t believe everything you read. Some one may be using a false identity. Do not reply to messages that makes you feel uncomfortable. Let someone else know. Never give anyone your password.
Think before you post. Observe the site before you use it. Read the FAQ’s(frequently asked questions)and archives, before posting in group discussion or chat room. Use courtesy while using netiquette
To protect our digital reputation on and offline To avoid “Flame Wars” online To treat others the way we want to be treated For your protection
There are over 107trillion s sent daily Make sure you use grammar & spell check Make sure your use your signature to let them know who is sending the Don’t correct someone else’s spelling Don’t send s when you are upset, angry or late at night Don’t use all caps in s (it means you are yelling)
Do not text while driving. No text is worth dying for. It is not safe to text while walking. Avoid playing texting games( some people are really busy and can’t always respond ASAP) Don’t lay phone on the dinner table or in a meeting. Keep conversations quiet while in public.
Copyright – Allows only the person who has designed the work to edit, copy and benefit from it. Fair Use- Allows a person to use copyright materials without the owner’s permission
The difference between copyright and fair use is that there is no set limits for the person with copyrights and there are rules for fair use When making a copy one must consider: How will the copied materials be used? What is the purpose for copying? How much of the materials copied will be used?
Media materials can only be used for non-profit or educational purposes. Copied materials can be used or changed in order to entertain a large audience.
Using someone’s ideas and claiming them to be yours. How to Avoid Plagiarism? Use quotations or reword or paraphrase Plagiarism Identified Google Search Programs for Plagiarism
Identity Theft: Using another's private information for financial gain. Reputation Management: Being mindful of ones reputation on and off the internet. Password: Secret words or digits used to give one access to files and websites. Cyber bullying- Using the internet to ruin one’s reputation or harassing an individual. Cyber stalking: is stalking on the internet.
Virus: A virus on the computer attached itself to files on your computer and destroys it. Trojan Horses: A software that poses as one thing and only steals your information on your computer. :Worms: Send copies of itself to cause harm to the network or damage files on the computer
sign/safety.html sign/safety.html
Google. Web 06 June evention.html evention.html The Riles of Netiquette Web. 10 June m.html m.html