SlideShare a Scribd company logo
Lesson2
Rules of
Netiquette
HOMAPON HIGH SCHOOL
Homapon, Legazpi City
By: ROCHELLE SABDAO-NATO
SHS Teacher
Reference: EMPOWERMENT
Technologies
Innovative Training Work, Inc.
First Edition
1. Consider one’s and others’ safety when
sharing information using the internet.
2. Consider one’s and others’ reputation
when using the internet.
3. Know and determined how to avoid the
dangers of the internet.
4. Be responsible in the use of social
networking sites
Objective:
1. Consider one’s and others’ safety when
sharing information using the internet.
2. Consider one’s and others’ reputation when
using the internet.
3. Know and determined how to avoid the
dangers of the internet
4. Be responsible in the use of social
networking sites
Rules of
Netiquette
Online
Security, safety
and ethics
Internet
Threats
Protecting
reputations
online
Copyright
Contextualized
online search
and research
skills
Pre-test
Write YES if you agree with the statement and NO if you
disagree.
1. My computer has an antivirus so it is okay to open
most e-mail attachments like e-cards and video files.
2. Your friend told you that this college application was
rejected due to the fact that you posted a video of
him doing crazy stuff at a party. You posted the video
several years ago but later took it down to protect
your friend’s reputation. Can your friend be right that
the college found the video?
3. You and your best friend play a lot of video
games. One time, she asks you for your
password so she can help you level up and get
in-game money. She promises to keep your
password a secret. Is it okay to give away your
password?
4. You received an email stating that your
mother’s bank account is going to be forfeited if
you do not respond to the email. Is it safe to
reply?
5. You forgot that your essay for English
class is due tomorrow. While doing your
research, you found a website offering free
essays. Is it okay to use the essay from this
free essay website?
6. A virus is a malware that multiplies and
infects other computers through flash
drives.
7. Keyloggers are software that show pop-
up ads even if you are not using your
browser.
8. Search engines scan websites for search
results even if you have set your post to
“private”.
9. There is a danger in posting information
about a future vacation.
10. Letting people know your birthday is
probably a must if you want to get as many gifts
as possible. But having it in your profile makes
you vulnerable to identify the theft.
 Rules of Netiquette
10 best rules of netiquette
The Golden Rule
( Treat others as you
would like to be
treated)
No FLAMING
(Flame is a personal
insult communicated
through the internet
Don’t type in ALL CAPS
( people may
misinterpret)
Don’t SPAM (it is any
unsolicited e-mail from
unknown sources)
Don’t talk with people
you do not know ( do
not arrange to meet
anyone you meet
online)
Obey Copyright Laws
(Don’t steal someone
else’s idea, property
and rights)
Use proper Grammar
and Spelling
(errors diminishes the
credibility of the
message
BE HONEST / Be
yourself
(tell the truth, do not
pretend to be someone
else)
Follow the TOS
(TOS- Term of Service)
(Rules and policy of
the sites
SHOP SECURE SITES
(These are sites with
transport layer security
(TLS or SLS Socket
Layer Security
Online Safety and Security
What is internet
Safety?
- It refers to the
online security or
safety of people and
their information
when using the
internet.
HTTPS - "Hyper-Text Transfer Protocol
Secure"
TYPE OF INFORMATION RISKS
1. First Name There is a risk in sharing your first name, Chances are , a
hacker may already know plenty of stuff about you even
if you only give out your first name.
2. Last Name If sharing your first name is a small risk, having both your
first and last is more risky. Matching a name with a face
is a modus to several cybercrimes' like identity theft
3. Middle Name Sharing your middle name is probably not the most risky
of these shared information, but sharing your full name
would be.
4. Current and
previous school/s
Most people who steal identities study their subject.
They can use this information for verification purposes.
5. Your cell phone
number
You cell phone number should never be posted over the
internet.
 Rules of Netiquette
Internet Threats
1. Malware – Stands
for malicious
software.
- is a set of
instructions that run
on you computer and
make your system do
something that an
attacker wants it to do.
What it is good for?
a. Steal personal
information
b. Delete files
c. Click fraud
d. Steal software serial
numbers
e. Use your computer
as relay
Different Kinds of Malware
Virus Worm Trojan Spyware Adware
Rogue
security
software
Keyloggers
Virus
- A computer virus is a piece of malicious
computer code that attaches itself to a
software program, email or computer file
without your permission.
- It can transfers through the internet and
local networks or data storage like flash
drives and CD’s
Trojan
A malicious program
that is disguised as a
useful program but
once downloaded or
installed, leaves your
PC unprotected and
allows hackers to get
your information.
Worm
A malicious program
that transfers from one
computer to another by
any type of means. It
uses computer network
to spread itself.
Ex. ILOVEYOU worm
Love Bug Worm created
by Filipino
Spread to
other
computers
Rogue security software- tricks
the user into posting that is a
security software. It asks the user to
pay to improve hi/her security but in
reality that are not protected at all.
Spyware
- A program that runs in the background
without you knowing it. It has the ability to
monitor what you are currently doing and typing
through keylogging.
Keyloggers- used to record the keystroke
done by the user. This is done to steal their
password or any other sensitive information. It
can record email, messages or any information
you type using your keyboard.
Adware
A program designed to send your
advertisement, mostly as pop-ups
SPAM- Refers to the
transmission of unsolicited
messages from various origins
using electric messaging
systems
EXAMPLE
* Pharming – a more complicated way of
phishing where it exploits the DNS (Domain
Name Service) system
Phishing – is a software or a
program used by an attacker to
obtain personal information.
- It targets the
passwords to hack and take
control of a user account..
How to avoid these threats?
A very effective way of avoiding these threats is
verifying the authenticity and credibility of the
WEB source
 Rules of Netiquette
Think before You Click !
1. Ask yourself? Would you want your parents or
grandparents to see it?
Talk to your friends about this serious responsibility.
Set your post to “private”
Avoid using names. Names are easy for search engines to
scan
If you feel that a post can affect you or other’s reputation,
ask the one who posted it to pull it down or report it as
inappropriate

More Related Content

DOCX
Dll empowerment technologies
PPTX
Empowerment Technology Lesson 3
PPTX
Empowerment Technology Lesson 2
PPTX
What is 21st Century Literature?
PPT
Netiquette
PPTX
Empowerment technology
PPTX
Defining culture and society from the perspectives of ANTHROPOLOGY AND SOCIO...
PPT
Lecture in Photojournalism
Dll empowerment technologies
Empowerment Technology Lesson 3
Empowerment Technology Lesson 2
What is 21st Century Literature?
Netiquette
Empowerment technology
Defining culture and society from the perspectives of ANTHROPOLOGY AND SOCIO...
Lecture in Photojournalism

What's hot (20)

PPTX
EMPOWERMENT TECHNOLOGIES - LESSON 5
PDF
Empowerment Technologies - Module 2
PPTX
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...
PPTX
Contextualized Online Search and Research Skills
PPTX
Online safety, security, ethics & etiquette
PPTX
Lesson 4 Productivity Tools.pptx
PPTX
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
PPTX
[EMPOWERMENT TECHNOLOGIES]-ADVANCED PRESENTATION SKILLS
PPTX
Nature and purposes of of online platforms and applications
PPTX
Empowerment Technology Lesson 5
PPTX
Online Platform Tools for ICT Content Development
PPTX
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
PPTX
EMPOWERMENT TECHNOLOGIES - LESSON 4
PPTX
EMPOWERMENT TECHNOLOGIES - LESSON 2
PPTX
ICT as a Platform for Change
PPTX
Chapter 1 Introduction to Media and Information Literacy
PPTX
MIL-Q1M9.pptx
PDF
ICT as a Platform for Change
PPTX
Online Systems, Functions, and Platforms
PPTX
Emp Tech 1 introduction
EMPOWERMENT TECHNOLOGIES - LESSON 5
Empowerment Technologies - Module 2
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...
Contextualized Online Search and Research Skills
Online safety, security, ethics & etiquette
Lesson 4 Productivity Tools.pptx
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
[EMPOWERMENT TECHNOLOGIES]-ADVANCED PRESENTATION SKILLS
Nature and purposes of of online platforms and applications
Empowerment Technology Lesson 5
Online Platform Tools for ICT Content Development
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
EMPOWERMENT TECHNOLOGIES - LESSON 4
EMPOWERMENT TECHNOLOGIES - LESSON 2
ICT as a Platform for Change
Chapter 1 Introduction to Media and Information Literacy
MIL-Q1M9.pptx
ICT as a Platform for Change
Online Systems, Functions, and Platforms
Emp Tech 1 introduction
Ad

Similar to Rules of Netiquette (20)

PPTX
empowerment technology/ RULES AND NETIQUETE lesson 2.pptx
PPTX
EMPOWERMENT TECHNOLOGIES LESSON 2
PPTX
Lesson 2 rules of netiquette
PPTX
2-rules-of-netiquette.pptxkjhjohhfytdtydgyfy
PPTX
Online Safety, Security, Ethics, and Etiquette.pptx
PPTX
Online Safety, Security, Ethics, and Etiquette.pptx
PPTX
ONLINE SAFETY empowerment technolog.pptx
PPTX
EMTECH Q1, M2 ONLINE SAFETY SECURITY ETHIC AND ETIQUETTE.pptx
PPTX
ONLINE SAFETY-online Etiquette ETEC.pptx
PPTX
EMPOWERMENT TECHNOLOGIES LESSON 2 - NETIQUETTE
PPTX
Lesson-2-Online-Safety-Security-Ethics-And-Etiquette.pptx
PPTX
empowermenttechnologylesson2-210114045455.pptx
PPTX
empowermenttechnologylesson2-210114045455.pptx
PPTX
itEraLesson3. .pptx
PPTX
Rules of netiquette-lesson 2.pptx
PPTX
LESSON 2 - NETIQUETTE.pptx EMPOWERMENT TECHNOLOGY
PPTX
2. ONLINE SECURITY, SAFETY AND ETHICS.pptx
PPTX
L2 rules of netiquette
PPTX
Rules and Netiquetted asdnasdbJDKJSDHASDHASDSA.pptx
PPTX
Netiquette on using internet
empowerment technology/ RULES AND NETIQUETE lesson 2.pptx
EMPOWERMENT TECHNOLOGIES LESSON 2
Lesson 2 rules of netiquette
2-rules-of-netiquette.pptxkjhjohhfytdtydgyfy
Online Safety, Security, Ethics, and Etiquette.pptx
Online Safety, Security, Ethics, and Etiquette.pptx
ONLINE SAFETY empowerment technolog.pptx
EMTECH Q1, M2 ONLINE SAFETY SECURITY ETHIC AND ETIQUETTE.pptx
ONLINE SAFETY-online Etiquette ETEC.pptx
EMPOWERMENT TECHNOLOGIES LESSON 2 - NETIQUETTE
Lesson-2-Online-Safety-Security-Ethics-And-Etiquette.pptx
empowermenttechnologylesson2-210114045455.pptx
empowermenttechnologylesson2-210114045455.pptx
itEraLesson3. .pptx
Rules of netiquette-lesson 2.pptx
LESSON 2 - NETIQUETTE.pptx EMPOWERMENT TECHNOLOGY
2. ONLINE SECURITY, SAFETY AND ETHICS.pptx
L2 rules of netiquette
Rules and Netiquetted asdnasdbJDKJSDHASDHASDSA.pptx
Netiquette on using internet
Ad

More from Rochelle Nato (20)

PPTX
Drafting of basic pattern for shorts
PPTX
Drafting the basic pattern for short pants
PPTX
How to read an L- square
PPTX
Mga kasanayan sa mapanuring pagbasa
PPTX
Antas ng Pagbasa
PPTX
Scanning at skimming na pagbasa
PPT
Kakayahang Lingguwistiko sa Wikang Filipino
PPT
Phatic, Emotive at Expressive na Gamit ng Wika
PPT
Conative, Informative at Labeling na Gamit ng Wika
PPT
Kasaysayan at Pagkabuo ng Wikang Pambansa
PPT
Bilingguwalismo at Multilingguwalismo
PPT
Mga Batayang Kaalaman sa Wika
PPT
Heograpikal,Morpolohikal at Ponolohikal na Varayti ng Wika
PPT
Register Bilang VARAYTI NG WIKA
PPTX
Intensibo at ekstensibong pagbasa
PPTX
Batayang kaalaman sa mapanuring pagbasa
PPT
Perform preventive maintenance
PPT
Farm implements and safety practices in using farm tools and equipment
PPT
Lesson 1 Use of farm Tools and Equipment
PPT
An introduction to Agricultural Crop Production
Drafting of basic pattern for shorts
Drafting the basic pattern for short pants
How to read an L- square
Mga kasanayan sa mapanuring pagbasa
Antas ng Pagbasa
Scanning at skimming na pagbasa
Kakayahang Lingguwistiko sa Wikang Filipino
Phatic, Emotive at Expressive na Gamit ng Wika
Conative, Informative at Labeling na Gamit ng Wika
Kasaysayan at Pagkabuo ng Wikang Pambansa
Bilingguwalismo at Multilingguwalismo
Mga Batayang Kaalaman sa Wika
Heograpikal,Morpolohikal at Ponolohikal na Varayti ng Wika
Register Bilang VARAYTI NG WIKA
Intensibo at ekstensibong pagbasa
Batayang kaalaman sa mapanuring pagbasa
Perform preventive maintenance
Farm implements and safety practices in using farm tools and equipment
Lesson 1 Use of farm Tools and Equipment
An introduction to Agricultural Crop Production

Recently uploaded (20)

PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Business Ethics Teaching Materials for college
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
Pharma ospi slides which help in ospi learning
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PPTX
Cell Types and Its function , kingdom of life
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Renaissance Architecture: A Journey from Faith to Humanism
O7-L3 Supply Chain Operations - ICLT Program
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Business Ethics Teaching Materials for college
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
STATICS OF THE RIGID BODIES Hibbelers.pdf
Pharma ospi slides which help in ospi learning
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPH.pptx obstetrics and gynecology in nursing
Microbial disease of the cardiovascular and lymphatic systems
Week 4 Term 3 Study Techniques revisited.pptx
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
Microbial diseases, their pathogenesis and prophylaxis
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
Cell Types and Its function , kingdom of life
Abdominal Access Techniques with Prof. Dr. R K Mishra

Rules of Netiquette

  • 1. Lesson2 Rules of Netiquette HOMAPON HIGH SCHOOL Homapon, Legazpi City By: ROCHELLE SABDAO-NATO SHS Teacher Reference: EMPOWERMENT Technologies Innovative Training Work, Inc. First Edition
  • 2. 1. Consider one’s and others’ safety when sharing information using the internet. 2. Consider one’s and others’ reputation when using the internet. 3. Know and determined how to avoid the dangers of the internet. 4. Be responsible in the use of social networking sites
  • 3. Objective: 1. Consider one’s and others’ safety when sharing information using the internet. 2. Consider one’s and others’ reputation when using the internet. 3. Know and determined how to avoid the dangers of the internet 4. Be responsible in the use of social networking sites
  • 4. Rules of Netiquette Online Security, safety and ethics Internet Threats Protecting reputations online Copyright Contextualized online search and research skills
  • 5. Pre-test Write YES if you agree with the statement and NO if you disagree. 1. My computer has an antivirus so it is okay to open most e-mail attachments like e-cards and video files. 2. Your friend told you that this college application was rejected due to the fact that you posted a video of him doing crazy stuff at a party. You posted the video several years ago but later took it down to protect your friend’s reputation. Can your friend be right that the college found the video?
  • 6. 3. You and your best friend play a lot of video games. One time, she asks you for your password so she can help you level up and get in-game money. She promises to keep your password a secret. Is it okay to give away your password? 4. You received an email stating that your mother’s bank account is going to be forfeited if you do not respond to the email. Is it safe to reply?
  • 7. 5. You forgot that your essay for English class is due tomorrow. While doing your research, you found a website offering free essays. Is it okay to use the essay from this free essay website? 6. A virus is a malware that multiplies and infects other computers through flash drives. 7. Keyloggers are software that show pop- up ads even if you are not using your browser.
  • 8. 8. Search engines scan websites for search results even if you have set your post to “private”. 9. There is a danger in posting information about a future vacation. 10. Letting people know your birthday is probably a must if you want to get as many gifts as possible. But having it in your profile makes you vulnerable to identify the theft.
  • 10. 10 best rules of netiquette The Golden Rule ( Treat others as you would like to be treated) No FLAMING (Flame is a personal insult communicated through the internet Don’t type in ALL CAPS ( people may misinterpret) Don’t SPAM (it is any unsolicited e-mail from unknown sources) Don’t talk with people you do not know ( do not arrange to meet anyone you meet online) Obey Copyright Laws (Don’t steal someone else’s idea, property and rights) Use proper Grammar and Spelling (errors diminishes the credibility of the message BE HONEST / Be yourself (tell the truth, do not pretend to be someone else) Follow the TOS (TOS- Term of Service) (Rules and policy of the sites SHOP SECURE SITES (These are sites with transport layer security (TLS or SLS Socket Layer Security
  • 11. Online Safety and Security What is internet Safety? - It refers to the online security or safety of people and their information when using the internet.
  • 12. HTTPS - "Hyper-Text Transfer Protocol Secure"
  • 13. TYPE OF INFORMATION RISKS 1. First Name There is a risk in sharing your first name, Chances are , a hacker may already know plenty of stuff about you even if you only give out your first name. 2. Last Name If sharing your first name is a small risk, having both your first and last is more risky. Matching a name with a face is a modus to several cybercrimes' like identity theft 3. Middle Name Sharing your middle name is probably not the most risky of these shared information, but sharing your full name would be. 4. Current and previous school/s Most people who steal identities study their subject. They can use this information for verification purposes. 5. Your cell phone number You cell phone number should never be posted over the internet.
  • 15. Internet Threats 1. Malware – Stands for malicious software. - is a set of instructions that run on you computer and make your system do something that an attacker wants it to do. What it is good for? a. Steal personal information b. Delete files c. Click fraud d. Steal software serial numbers e. Use your computer as relay
  • 16. Different Kinds of Malware Virus Worm Trojan Spyware Adware Rogue security software Keyloggers
  • 17. Virus - A computer virus is a piece of malicious computer code that attaches itself to a software program, email or computer file without your permission. - It can transfers through the internet and local networks or data storage like flash drives and CD’s
  • 18. Trojan A malicious program that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information. Worm A malicious program that transfers from one computer to another by any type of means. It uses computer network to spread itself. Ex. ILOVEYOU worm Love Bug Worm created by Filipino Spread to other computers Rogue security software- tricks the user into posting that is a security software. It asks the user to pay to improve hi/her security but in reality that are not protected at all.
  • 19. Spyware - A program that runs in the background without you knowing it. It has the ability to monitor what you are currently doing and typing through keylogging. Keyloggers- used to record the keystroke done by the user. This is done to steal their password or any other sensitive information. It can record email, messages or any information you type using your keyboard.
  • 20. Adware A program designed to send your advertisement, mostly as pop-ups SPAM- Refers to the transmission of unsolicited messages from various origins using electric messaging systems
  • 22. * Pharming – a more complicated way of phishing where it exploits the DNS (Domain Name Service) system Phishing – is a software or a program used by an attacker to obtain personal information. - It targets the passwords to hack and take control of a user account..
  • 23. How to avoid these threats? A very effective way of avoiding these threats is verifying the authenticity and credibility of the WEB source
  • 25. Think before You Click ! 1. Ask yourself? Would you want your parents or grandparents to see it? Talk to your friends about this serious responsibility. Set your post to “private” Avoid using names. Names are easy for search engines to scan If you feel that a post can affect you or other’s reputation, ask the one who posted it to pull it down or report it as inappropriate