SlideShare a Scribd company logo
• Online security, safety, and ethics
• Internet threats
• Protecting reputations online
• Copyright
• Contextualized online search and
research skills
Rules of Netiquette
At the end of this lesson, the students should be able to:
1. consider one’s and others’ safety when sharing
information using the Internet;
2. consider one’s and others’ reputation when using the
Internet;
3. determine and avoid the dangers of the Internet;
4. be responsible in the use of social networking sites; and
5. browse the Internet efficiently and properly through
proper referencing.
The Internet, truly, is a powerful tool. It
can be used to promote your business,
gain new friends, and stay in touch with
the old ones. It is also a source of
entertainment. But like most things in this
world, there is always “another side of
the coin.” The Internet is one of the most
dangerous places, especially if you do
not know what you are doing.
L2 Rules of Netiquette.pptx
Internet Threats:
1. Malware – stands for malicious software
Types: Virus, Worm, Trojan, Spyware, Adware
2. Spam – unwanted email mostly from bots
or advertisers. It can be used to send
malware.
3. Phishing – Its goal is to acquire sensitive
personal information like passwords and
credit card details.
Think Before You Click
1. Before you post something on the web, ask these questions
to yourself: Would you want your parents or grandparents to see
it? Would you want your future boss to see it? Once you post
something on the web, you have no control of who sees your
posts.
2. Your friends depend on you to protect their reputation online.
Talk to your friends about this serious responsibility.
3. Set your post to “private.” In this way, search engines will
not be able to scan that post.
4. Avoid using names. Names are easy for search engines to
scan.
5. If you feel that a post can affect you or other’s reputation, ask
the one who posted it to pull it down or report it as
inappropriate.
If you create something—an
idea, an invention, a form of
literary work, or a research, you
have the right of how it should
be used by others. This is called
intellectual property.

More Related Content

PPT
L2 Rules of Netiquette.ppt · version 1.ppt
PPTX
L2 Rules of Netiqugrrrrrrrrrrrrrrrrrrrrrrrrrrrette.pptx
PPTX
L2 rules of netiquette
PDF
lesson-2-rules-of-netiquette.pdf.bshhsjdj
PPT
L2 Rules of Netiquette in Empowerment technology
PPTX
Lesson 2_Rules_of_Netiquette.pptx
PPTX
2-rules-of-netiquette.pptxkjhjohhfytdtydgyfy
PPTX
Lesson-2-Online-Safety-Security-Ethics-And-Etiquette.pptx
L2 Rules of Netiquette.ppt · version 1.ppt
L2 Rules of Netiqugrrrrrrrrrrrrrrrrrrrrrrrrrrrette.pptx
L2 rules of netiquette
lesson-2-rules-of-netiquette.pdf.bshhsjdj
L2 Rules of Netiquette in Empowerment technology
Lesson 2_Rules_of_Netiquette.pptx
2-rules-of-netiquette.pptxkjhjohhfytdtydgyfy
Lesson-2-Online-Safety-Security-Ethics-And-Etiquette.pptx

Similar to L2 Rules of Netiquette.pptx (20)

PPTX
EMTECH Q1, M2 ONLINE SAFETY SECURITY ETHIC AND ETIQUETTE.pptx
PPTX
Digital Literacy and Its Impact 2.0.pptx
PPTX
2_Rules_of_Netiquette.pptx
PPTX
group 4 demegillos report Digital Literacy.pptx
PPTX
Rules of Netiquette Empowerment Technologies Lesson
PPTX
EMPOWERMENT TECHNOLOGIES LESSON 2
PPTX
Digital Citizenship
PPTX
Internet threats
PPTX
Rules of netiquette-lesson 2.pptx
PPTX
Lesson 2 - Rules of Netiquette (Information and Communication Technology)
PPTX
Module-9. DIGITAL.CYBER-LITERACY.pptx
PPTX
Online-Safety-Security-Ethics-and-Etiquette.pptx
PDF
L1b Trends in ICT - Online Safety and Security.pdf
PPTX
empowerment technology/ RULES AND NETIQUETE lesson 2.pptx
PPTX
PCK-6-MODULE-9.pptx Digital/ Cyber Literacy
PPTX
Empowerment Technology, Laws and codes. Lesson 2.pptx
PPTX
Cybersafety Version1
PPTX
L2 - ONLINE SAFETY, SECURITY, ETHICS, ETIQUETTE.pptx
PPTX
Social groups for awareness
PPTX
CYber Ethics.pptx do's and dont's of online
EMTECH Q1, M2 ONLINE SAFETY SECURITY ETHIC AND ETIQUETTE.pptx
Digital Literacy and Its Impact 2.0.pptx
2_Rules_of_Netiquette.pptx
group 4 demegillos report Digital Literacy.pptx
Rules of Netiquette Empowerment Technologies Lesson
EMPOWERMENT TECHNOLOGIES LESSON 2
Digital Citizenship
Internet threats
Rules of netiquette-lesson 2.pptx
Lesson 2 - Rules of Netiquette (Information and Communication Technology)
Module-9. DIGITAL.CYBER-LITERACY.pptx
Online-Safety-Security-Ethics-and-Etiquette.pptx
L1b Trends in ICT - Online Safety and Security.pdf
empowerment technology/ RULES AND NETIQUETE lesson 2.pptx
PCK-6-MODULE-9.pptx Digital/ Cyber Literacy
Empowerment Technology, Laws and codes. Lesson 2.pptx
Cybersafety Version1
L2 - ONLINE SAFETY, SECURITY, ETHICS, ETIQUETTE.pptx
Social groups for awareness
CYber Ethics.pptx do's and dont's of online
Ad

Recently uploaded (20)

PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
RMMM.pdf make it easy to upload and study
PDF
What if we spent less time fighting change, and more time building what’s rig...
PDF
Classroom Observation Tools for Teachers
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
Hazard Identification & Risk Assessment .pdf
PDF
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PDF
Weekly quiz Compilation Jan -July 25.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Indian roads congress 037 - 2012 Flexible pavement
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
advance database management system book.pdf
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
A powerpoint presentation on the Revised K-10 Science Shaping Paper
RMMM.pdf make it easy to upload and study
What if we spent less time fighting change, and more time building what’s rig...
Classroom Observation Tools for Teachers
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Hazard Identification & Risk Assessment .pdf
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
Chinmaya Tiranga quiz Grand Finale.pdf
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
Weekly quiz Compilation Jan -July 25.pdf
Final Presentation General Medicine 03-08-2024.pptx
Indian roads congress 037 - 2012 Flexible pavement
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
advance database management system book.pdf
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
UNIT III MENTAL HEALTH NURSING ASSESSMENT
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Ad

L2 Rules of Netiquette.pptx

  • 1. • Online security, safety, and ethics • Internet threats • Protecting reputations online • Copyright • Contextualized online search and research skills Rules of Netiquette
  • 2. At the end of this lesson, the students should be able to: 1. consider one’s and others’ safety when sharing information using the Internet; 2. consider one’s and others’ reputation when using the Internet; 3. determine and avoid the dangers of the Internet; 4. be responsible in the use of social networking sites; and 5. browse the Internet efficiently and properly through proper referencing.
  • 3. The Internet, truly, is a powerful tool. It can be used to promote your business, gain new friends, and stay in touch with the old ones. It is also a source of entertainment. But like most things in this world, there is always “another side of the coin.” The Internet is one of the most dangerous places, especially if you do not know what you are doing.
  • 5. Internet Threats: 1. Malware – stands for malicious software Types: Virus, Worm, Trojan, Spyware, Adware 2. Spam – unwanted email mostly from bots or advertisers. It can be used to send malware. 3. Phishing – Its goal is to acquire sensitive personal information like passwords and credit card details.
  • 6. Think Before You Click 1. Before you post something on the web, ask these questions to yourself: Would you want your parents or grandparents to see it? Would you want your future boss to see it? Once you post something on the web, you have no control of who sees your posts. 2. Your friends depend on you to protect their reputation online. Talk to your friends about this serious responsibility. 3. Set your post to “private.” In this way, search engines will not be able to scan that post. 4. Avoid using names. Names are easy for search engines to scan. 5. If you feel that a post can affect you or other’s reputation, ask the one who posted it to pull it down or report it as inappropriate.
  • 7. If you create something—an idea, an invention, a form of literary work, or a research, you have the right of how it should be used by others. This is called intellectual property.