際際滷

際際滷Share a Scribd company logo
 Online security, safety, and ethics
 Internet threats
 Protecting reputations online
 Copyright
 Contextualized online search and
research skills
Rules of Netiquette
At the end of this lesson, the students should be able to:
1. consider ones and others safety when sharing
information using the Internet;
2. consider ones and others reputation when using the
Internet;
3. determine and avoid the dangers of the Internet;
4. be responsible in the use of social networking sites; and
5. browse the Internet efficiently and properly through
proper referencing.
The Internet, truly, is a powerful tool. It
can be used to promote your business,
gain new friends, and stay in touch with
the old ones. It is also a source of
entertainment. But like most things in this
world, there is always another side of
the coin. The Internet is one of the most
dangerous places, especially if you do
not know what you are doing.
L2 rules of netiquette
Internet Threats:
1. Malware  stands for malicious software
Types: Virus, Worm, Trojan, Spyware, Adware
2. Spam  unwanted email mostly from bots
or advertisers. It can be used to send
malware.
3. Phishing  Its goal is to acquire sensitive
personal information like passwords and
credit card details.
Think Before You Click
1. Before you post something on the web, ask these questions
to yourself: Would you want your parents or grandparents to see
it? Would you want your future boss to see it? Once you post
something on the web, you have no control of who sees your
posts.
2. Your friends depend on you to protect their reputation online.
Talk to your friends about this serious responsibility.
3. Set your post to private. In this way, search engines will
not be able to scan that post.
4. Avoid using names. Names are easy for search engines to
scan.
5. If you feel that a post can affect you or others reputation, ask
the one who posted it to pull it down or report it as
inappropriate.
If you create somethingan
idea, an invention, a form of
literary work, or a research, you
have the right of how it should
be used by others. This is called
intellectual property.

More Related Content

What's hot (17)

Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For Educators
Maria Petropulos
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and Etiquette
DOFJLCCDD
Cyber safety by Lorraine Flores
Cyber safety by Lorraine FloresCyber safety by Lorraine Flores
Cyber safety by Lorraine Flores
lorrflores
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
NMSU - Family Resource Management
Digital+safety+powerpoint
Digital+safety+powerpointDigital+safety+powerpoint
Digital+safety+powerpoint
Andrew Duckworth
Internet safety
Internet safetyInternet safety
Internet safety
Aleksandra Brmbota
Internet safety
Internet safetyInternet safety
Internet safety
dsansford
CYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESHCYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESH
Yogesh Prajapati
Cyber safety
Cyber safetyCyber safety
Cyber safety
Shruti Bansal
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
Angelito Quiambao
Internet security
Internet securityInternet security
Internet security
Carmen Gorda
Internet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersInternet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and Beginners
Rajesh Soundararajan
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social media
sanjeev kumar
Internet safety
Internet safetyInternet safety
Internet safety
Dan Tomlinson
Users guide
Users guideUsers guide
Users guide
Darren Thomas
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
Saurav Jha
Evans Online Privacy Quiz
Evans Online Privacy QuizEvans Online Privacy Quiz
Evans Online Privacy Quiz
Dr. Joel Evans
Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For Educators
Maria Petropulos
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and Etiquette
DOFJLCCDD
Cyber safety by Lorraine Flores
Cyber safety by Lorraine FloresCyber safety by Lorraine Flores
Cyber safety by Lorraine Flores
lorrflores
Digital+safety+powerpoint
Digital+safety+powerpointDigital+safety+powerpoint
Digital+safety+powerpoint
Andrew Duckworth
Internet safety
Internet safetyInternet safety
Internet safety
dsansford
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
Angelito Quiambao
Internet security
Internet securityInternet security
Internet security
Carmen Gorda
Internet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersInternet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and Beginners
Rajesh Soundararajan
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social media
sanjeev kumar
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
Saurav Jha
Evans Online Privacy Quiz
Evans Online Privacy QuizEvans Online Privacy Quiz
Evans Online Privacy Quiz
Dr. Joel Evans

Similar to L2 rules of netiquette (20)

L2 Rules of Netiqugrrrrrrrrrrrrrrrrrrrrrrrrrrrette.pptx
L2 Rules of Netiqugrrrrrrrrrrrrrrrrrrrrrrrrrrrette.pptxL2 Rules of Netiqugrrrrrrrrrrrrrrrrrrrrrrrrrrrette.pptx
L2 Rules of Netiqugrrrrrrrrrrrrrrrrrrrrrrrrrrrette.pptx
dominicdaltoncaling2
Lesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxLesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptx
Joy Dugayo
2-rules-of-netiquette.pptxkjhjohhfytdtydgyfy
2-rules-of-netiquette.pptxkjhjohhfytdtydgyfy2-rules-of-netiquette.pptxkjhjohhfytdtydgyfy
2-rules-of-netiquette.pptxkjhjohhfytdtydgyfy
MaImmaConcepcionTros
2_Rules_of_Netiquette.pptx
2_Rules_of_Netiquette.pptx2_Rules_of_Netiquette.pptx
2_Rules_of_Netiquette.pptx
DenverNDiocares
group 4 demegillos report Digital Literacy.pptx
group 4 demegillos report Digital Literacy.pptxgroup 4 demegillos report Digital Literacy.pptx
group 4 demegillos report Digital Literacy.pptx
grieferwild
Rules of Netiquette Empowerment Technologies Lesson
Rules of Netiquette Empowerment Technologies LessonRules of Netiquette Empowerment Technologies Lesson
Rules of Netiquette Empowerment Technologies Lesson
queenencarguez
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
JayMarkBandoy1
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
jleverett
Internet threats
Internet threatsInternet threats
Internet threats
AngelicaMaliwat
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
NoelBuctot1
Module-9. DIGITAL.CYBER-LITERACY.pptx
Module-9.    DIGITAL.CYBER-LITERACY.pptxModule-9.    DIGITAL.CYBER-LITERACY.pptx
Module-9. DIGITAL.CYBER-LITERACY.pptx
CheriesAnnMorales
Online-Safety-Security-Ethics-and-Etiquette.pptx
Online-Safety-Security-Ethics-and-Etiquette.pptxOnline-Safety-Security-Ethics-and-Etiquette.pptx
Online-Safety-Security-Ethics-and-Etiquette.pptx
RosetteSoriano1
L1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdfL1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdf
Jeth Cuenco
empowerment technology/ RULES AND NETIQUETE lesson 2.pptx
empowerment technology/ RULES AND NETIQUETE lesson 2.pptxempowerment technology/ RULES AND NETIQUETE lesson 2.pptx
empowerment technology/ RULES AND NETIQUETE lesson 2.pptx
MariaIvyBonifacio
PCK-6-MODULE-9.pptx Digital/ Cyber Literacy
PCK-6-MODULE-9.pptx Digital/ Cyber LiteracyPCK-6-MODULE-9.pptx Digital/ Cyber Literacy
PCK-6-MODULE-9.pptx Digital/ Cyber Literacy
angelbasilio491
Cybersafety Version1
Cybersafety Version1Cybersafety Version1
Cybersafety Version1
sabrinacotta
L2 - ONLINE SAFETY, SECURITY, ETHICS, ETIQUETTE.pptx
L2 - ONLINE SAFETY, SECURITY, ETHICS, ETIQUETTE.pptxL2 - ONLINE SAFETY, SECURITY, ETHICS, ETIQUETTE.pptx
L2 - ONLINE SAFETY, SECURITY, ETHICS, ETIQUETTE.pptx
kialagrama14
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
Karan Veer Singh
CYber Ethics.pptx do's and dont's of online
CYber Ethics.pptx do's and dont's of onlineCYber Ethics.pptx do's and dont's of online
CYber Ethics.pptx do's and dont's of online
Sabby Singh
The-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfThe-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdf
MelchorTolentino2
L2 Rules of Netiqugrrrrrrrrrrrrrrrrrrrrrrrrrrrette.pptx
L2 Rules of Netiqugrrrrrrrrrrrrrrrrrrrrrrrrrrrette.pptxL2 Rules of Netiqugrrrrrrrrrrrrrrrrrrrrrrrrrrrette.pptx
L2 Rules of Netiqugrrrrrrrrrrrrrrrrrrrrrrrrrrrette.pptx
dominicdaltoncaling2
Lesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxLesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptx
Joy Dugayo
2-rules-of-netiquette.pptxkjhjohhfytdtydgyfy
2-rules-of-netiquette.pptxkjhjohhfytdtydgyfy2-rules-of-netiquette.pptxkjhjohhfytdtydgyfy
2-rules-of-netiquette.pptxkjhjohhfytdtydgyfy
MaImmaConcepcionTros
2_Rules_of_Netiquette.pptx
2_Rules_of_Netiquette.pptx2_Rules_of_Netiquette.pptx
2_Rules_of_Netiquette.pptx
DenverNDiocares
group 4 demegillos report Digital Literacy.pptx
group 4 demegillos report Digital Literacy.pptxgroup 4 demegillos report Digital Literacy.pptx
group 4 demegillos report Digital Literacy.pptx
grieferwild
Rules of Netiquette Empowerment Technologies Lesson
Rules of Netiquette Empowerment Technologies LessonRules of Netiquette Empowerment Technologies Lesson
Rules of Netiquette Empowerment Technologies Lesson
queenencarguez
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
JayMarkBandoy1
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
jleverett
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
NoelBuctot1
Module-9. DIGITAL.CYBER-LITERACY.pptx
Module-9.    DIGITAL.CYBER-LITERACY.pptxModule-9.    DIGITAL.CYBER-LITERACY.pptx
Module-9. DIGITAL.CYBER-LITERACY.pptx
CheriesAnnMorales
Online-Safety-Security-Ethics-and-Etiquette.pptx
Online-Safety-Security-Ethics-and-Etiquette.pptxOnline-Safety-Security-Ethics-and-Etiquette.pptx
Online-Safety-Security-Ethics-and-Etiquette.pptx
RosetteSoriano1
L1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdfL1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdf
Jeth Cuenco
empowerment technology/ RULES AND NETIQUETE lesson 2.pptx
empowerment technology/ RULES AND NETIQUETE lesson 2.pptxempowerment technology/ RULES AND NETIQUETE lesson 2.pptx
empowerment technology/ RULES AND NETIQUETE lesson 2.pptx
MariaIvyBonifacio
PCK-6-MODULE-9.pptx Digital/ Cyber Literacy
PCK-6-MODULE-9.pptx Digital/ Cyber LiteracyPCK-6-MODULE-9.pptx Digital/ Cyber Literacy
PCK-6-MODULE-9.pptx Digital/ Cyber Literacy
angelbasilio491
Cybersafety Version1
Cybersafety Version1Cybersafety Version1
Cybersafety Version1
sabrinacotta
L2 - ONLINE SAFETY, SECURITY, ETHICS, ETIQUETTE.pptx
L2 - ONLINE SAFETY, SECURITY, ETHICS, ETIQUETTE.pptxL2 - ONLINE SAFETY, SECURITY, ETHICS, ETIQUETTE.pptx
L2 - ONLINE SAFETY, SECURITY, ETHICS, ETIQUETTE.pptx
kialagrama14
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
Karan Veer Singh
CYber Ethics.pptx do's and dont's of online
CYber Ethics.pptx do's and dont's of onlineCYber Ethics.pptx do's and dont's of online
CYber Ethics.pptx do's and dont's of online
Sabby Singh
The-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfThe-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdf
MelchorTolentino2

More from rowenick (10)

L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
rowenick
L1 introduction to information and communication technology
L1 introduction to information and communication technologyL1 introduction to information and communication technology
L1 introduction to information and communication technology
rowenick
2 2 properties of sound
2 2  properties of sound2 2  properties of sound
2 2 properties of sound
rowenick
2 physics of sound
2   physics of sound2   physics of sound
2 physics of sound
rowenick
Cell structure function
Cell structure functionCell structure function
Cell structure function
rowenick
Ittcoachingpresentation 130119130847-phpapp02
Ittcoachingpresentation 130119130847-phpapp02Ittcoachingpresentation 130119130847-phpapp02
Ittcoachingpresentation 130119130847-phpapp02
rowenick
L1 introduction to information and communication technology
L1 introduction to information and communication technologyL1 introduction to information and communication technology
L1 introduction to information and communication technology
rowenick
L12 ict project for social change
L12 ict project for social changeL12 ict project for social change
L12 ict project for social change
rowenick
L4 advanced spreadsheet skills
L4 advanced spreadsheet skillsL4 advanced spreadsheet skills
L4 advanced spreadsheet skills
rowenick
Excel.fns frmls
Excel.fns frmlsExcel.fns frmls
Excel.fns frmls
rowenick
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
rowenick
L1 introduction to information and communication technology
L1 introduction to information and communication technologyL1 introduction to information and communication technology
L1 introduction to information and communication technology
rowenick
2 2 properties of sound
2 2  properties of sound2 2  properties of sound
2 2 properties of sound
rowenick
2 physics of sound
2   physics of sound2   physics of sound
2 physics of sound
rowenick
Cell structure function
Cell structure functionCell structure function
Cell structure function
rowenick
Ittcoachingpresentation 130119130847-phpapp02
Ittcoachingpresentation 130119130847-phpapp02Ittcoachingpresentation 130119130847-phpapp02
Ittcoachingpresentation 130119130847-phpapp02
rowenick
L1 introduction to information and communication technology
L1 introduction to information and communication technologyL1 introduction to information and communication technology
L1 introduction to information and communication technology
rowenick
L12 ict project for social change
L12 ict project for social changeL12 ict project for social change
L12 ict project for social change
rowenick
L4 advanced spreadsheet skills
L4 advanced spreadsheet skillsL4 advanced spreadsheet skills
L4 advanced spreadsheet skills
rowenick
Excel.fns frmls
Excel.fns frmlsExcel.fns frmls
Excel.fns frmls
rowenick

Recently uploaded (20)

Antifungal agents by Mrs. Manjushri Dabhade
Antifungal agents by Mrs. Manjushri DabhadeAntifungal agents by Mrs. Manjushri Dabhade
Antifungal agents by Mrs. Manjushri Dabhade
Dabhade madam Dabhade
Urinary Tract Infection & Sexually Transmt ted Diseases.pptx
Urinary Tract Infection & Sexually Transmt ted Diseases.pptxUrinary Tract Infection & Sexually Transmt ted Diseases.pptx
Urinary Tract Infection & Sexually Transmt ted Diseases.pptx
Ashish Umale
MIPLM subject matter expert Daniel Holzner
MIPLM subject matter expert Daniel HolznerMIPLM subject matter expert Daniel Holzner
MIPLM subject matter expert Daniel Holzner
MIPLM
hdjhdjhdjhdjhdjdhdjhdjdhdjhdjdhdjhdjdhjdh
hdjhdjhdjhdjhdjdhdjhdjdhdjhdjdhdjhdjdhjdhhdjhdjhdjhdjhdjdhdjhdjdhdjhdjdhdjhdjdhjdh
hdjhdjhdjhdjhdjdhdjhdjdhdjhdjdhdjhdjdhjdh
preetheshparmar
How to Configure Outgoing and Incoming mail servers in Odoo 18
How to Configure Outgoing and Incoming mail servers in Odoo 18How to Configure Outgoing and Incoming mail servers in Odoo 18
How to Configure Outgoing and Incoming mail servers in Odoo 18
Celine George
Yale VMOC Special Report - Measles Outbreak Southwest US 3-30-2025 FINAL v2...
Yale VMOC Special Report - Measles Outbreak  Southwest US 3-30-2025  FINAL v2...Yale VMOC Special Report - Measles Outbreak  Southwest US 3-30-2025  FINAL v2...
Yale VMOC Special Report - Measles Outbreak Southwest US 3-30-2025 FINAL v2...
Yale School of Public Health - The Virtual Medical Operations Center (VMOC)
COMMON HEALTH PROBLEMS INCLUDING COMMUNICABLES AND NON COMMUNICABLE DISEASES
COMMON HEALTH PROBLEMS INCLUDING COMMUNICABLES AND NON COMMUNICABLE DISEASESCOMMON HEALTH PROBLEMS INCLUDING COMMUNICABLES AND NON COMMUNICABLE DISEASES
COMMON HEALTH PROBLEMS INCLUDING COMMUNICABLES AND NON COMMUNICABLE DISEASES
SonaliGupta630281
Sulfonamides by Mrs. Manjushri P. Dabhade
Sulfonamides by Mrs. Manjushri P. DabhadeSulfonamides by Mrs. Manjushri P. Dabhade
Sulfonamides by Mrs. Manjushri P. Dabhade
Dabhade madam Dabhade
Cut Through the Noise_ Reaching Supporters When (and Where) It Matters Most.pdf
Cut Through the Noise_ Reaching Supporters When (and Where) It Matters Most.pdfCut Through the Noise_ Reaching Supporters When (and Where) It Matters Most.pdf
Cut Through the Noise_ Reaching Supporters When (and Where) It Matters Most.pdf
TechSoup
Design approaches and ethical challenges in Artificial Intelligence tools for...
Design approaches and ethical challenges in Artificial Intelligence tools for...Design approaches and ethical challenges in Artificial Intelligence tools for...
Design approaches and ethical challenges in Artificial Intelligence tools for...
Yannis
Role of Teacher in the era of Generative AI
Role of Teacher in the era of Generative AIRole of Teacher in the era of Generative AI
Role of Teacher in the era of Generative AI
Prof. Neeta Awasthy
UTI Quinolones by Mrs. Manjushri Dabhade
UTI Quinolones by Mrs. Manjushri DabhadeUTI Quinolones by Mrs. Manjushri Dabhade
UTI Quinolones by Mrs. Manjushri Dabhade
Dabhade madam Dabhade
llllllllllllllllllllllllllllllllllllllllllllllllllllllllll
llllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll
llllllllllllllllllllllllllllllllllllllllllllllllllllllllll
S Maillard
Tollywood Quiz- 21st March 2025, Quiz Club NITW
Tollywood Quiz- 21st March 2025, Quiz Club NITWTollywood Quiz- 21st March 2025, Quiz Club NITW
Tollywood Quiz- 21st March 2025, Quiz Club NITW
Quiz Club NITW
Yale VMOC Special Report - Measles Outbreak Southwest US 3-26-2025 FINAL.pptx
Yale VMOC  Special Report - Measles Outbreak  Southwest US 3-26-2025  FINAL.pptxYale VMOC  Special Report - Measles Outbreak  Southwest US 3-26-2025  FINAL.pptx
Yale VMOC Special Report - Measles Outbreak Southwest US 3-26-2025 FINAL.pptx
Yale School of Public Health - The Virtual Medical Operations Center (VMOC)
MIPLM subject matter expert Nicos Raftis
MIPLM subject matter expert Nicos RaftisMIPLM subject matter expert Nicos Raftis
MIPLM subject matter expert Nicos Raftis
MIPLM
S. Y. G. N. M. CHILD HEALTH NURSING Leukemia in Children.pptx
S. Y. G. N. M. CHILD HEALTH NURSING Leukemia in Children.pptxS. Y. G. N. M. CHILD HEALTH NURSING Leukemia in Children.pptx
S. Y. G. N. M. CHILD HEALTH NURSING Leukemia in Children.pptx
sachin7989
EDL 290F Week 4 - Group Ride (2025).pdf
EDL 290F Week 4  - Group Ride (2025).pdfEDL 290F Week 4  - Group Ride (2025).pdf
EDL 290F Week 4 - Group Ride (2025).pdf
Liz Walsh-Trevino
Studying and Notetaking: Some Suggestions
Studying and Notetaking: Some SuggestionsStudying and Notetaking: Some Suggestions
Studying and Notetaking: Some Suggestions
Damian T. Gordon
Appreciations - Feb 25.pptxhdhdhdhdhdhdhd
Appreciations - Feb 25.pptxhdhdhdhdhdhdhdAppreciations - Feb 25.pptxhdhdhdhdhdhdhd
Appreciations - Feb 25.pptxhdhdhdhdhdhdhd
preetheshparmar
Antifungal agents by Mrs. Manjushri Dabhade
Antifungal agents by Mrs. Manjushri DabhadeAntifungal agents by Mrs. Manjushri Dabhade
Antifungal agents by Mrs. Manjushri Dabhade
Dabhade madam Dabhade
Urinary Tract Infection & Sexually Transmt ted Diseases.pptx
Urinary Tract Infection & Sexually Transmt ted Diseases.pptxUrinary Tract Infection & Sexually Transmt ted Diseases.pptx
Urinary Tract Infection & Sexually Transmt ted Diseases.pptx
Ashish Umale
MIPLM subject matter expert Daniel Holzner
MIPLM subject matter expert Daniel HolznerMIPLM subject matter expert Daniel Holzner
MIPLM subject matter expert Daniel Holzner
MIPLM
hdjhdjhdjhdjhdjdhdjhdjdhdjhdjdhdjhdjdhjdh
hdjhdjhdjhdjhdjdhdjhdjdhdjhdjdhdjhdjdhjdhhdjhdjhdjhdjhdjdhdjhdjdhdjhdjdhdjhdjdhjdh
hdjhdjhdjhdjhdjdhdjhdjdhdjhdjdhdjhdjdhjdh
preetheshparmar
How to Configure Outgoing and Incoming mail servers in Odoo 18
How to Configure Outgoing and Incoming mail servers in Odoo 18How to Configure Outgoing and Incoming mail servers in Odoo 18
How to Configure Outgoing and Incoming mail servers in Odoo 18
Celine George
COMMON HEALTH PROBLEMS INCLUDING COMMUNICABLES AND NON COMMUNICABLE DISEASES
COMMON HEALTH PROBLEMS INCLUDING COMMUNICABLES AND NON COMMUNICABLE DISEASESCOMMON HEALTH PROBLEMS INCLUDING COMMUNICABLES AND NON COMMUNICABLE DISEASES
COMMON HEALTH PROBLEMS INCLUDING COMMUNICABLES AND NON COMMUNICABLE DISEASES
SonaliGupta630281
Sulfonamides by Mrs. Manjushri P. Dabhade
Sulfonamides by Mrs. Manjushri P. DabhadeSulfonamides by Mrs. Manjushri P. Dabhade
Sulfonamides by Mrs. Manjushri P. Dabhade
Dabhade madam Dabhade
Cut Through the Noise_ Reaching Supporters When (and Where) It Matters Most.pdf
Cut Through the Noise_ Reaching Supporters When (and Where) It Matters Most.pdfCut Through the Noise_ Reaching Supporters When (and Where) It Matters Most.pdf
Cut Through the Noise_ Reaching Supporters When (and Where) It Matters Most.pdf
TechSoup
Design approaches and ethical challenges in Artificial Intelligence tools for...
Design approaches and ethical challenges in Artificial Intelligence tools for...Design approaches and ethical challenges in Artificial Intelligence tools for...
Design approaches and ethical challenges in Artificial Intelligence tools for...
Yannis
Role of Teacher in the era of Generative AI
Role of Teacher in the era of Generative AIRole of Teacher in the era of Generative AI
Role of Teacher in the era of Generative AI
Prof. Neeta Awasthy
UTI Quinolones by Mrs. Manjushri Dabhade
UTI Quinolones by Mrs. Manjushri DabhadeUTI Quinolones by Mrs. Manjushri Dabhade
UTI Quinolones by Mrs. Manjushri Dabhade
Dabhade madam Dabhade
llllllllllllllllllllllllllllllllllllllllllllllllllllllllll
llllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll
llllllllllllllllllllllllllllllllllllllllllllllllllllllllll
S Maillard
Tollywood Quiz- 21st March 2025, Quiz Club NITW
Tollywood Quiz- 21st March 2025, Quiz Club NITWTollywood Quiz- 21st March 2025, Quiz Club NITW
Tollywood Quiz- 21st March 2025, Quiz Club NITW
Quiz Club NITW
MIPLM subject matter expert Nicos Raftis
MIPLM subject matter expert Nicos RaftisMIPLM subject matter expert Nicos Raftis
MIPLM subject matter expert Nicos Raftis
MIPLM
S. Y. G. N. M. CHILD HEALTH NURSING Leukemia in Children.pptx
S. Y. G. N. M. CHILD HEALTH NURSING Leukemia in Children.pptxS. Y. G. N. M. CHILD HEALTH NURSING Leukemia in Children.pptx
S. Y. G. N. M. CHILD HEALTH NURSING Leukemia in Children.pptx
sachin7989
EDL 290F Week 4 - Group Ride (2025).pdf
EDL 290F Week 4  - Group Ride (2025).pdfEDL 290F Week 4  - Group Ride (2025).pdf
EDL 290F Week 4 - Group Ride (2025).pdf
Liz Walsh-Trevino
Studying and Notetaking: Some Suggestions
Studying and Notetaking: Some SuggestionsStudying and Notetaking: Some Suggestions
Studying and Notetaking: Some Suggestions
Damian T. Gordon
Appreciations - Feb 25.pptxhdhdhdhdhdhdhd
Appreciations - Feb 25.pptxhdhdhdhdhdhdhdAppreciations - Feb 25.pptxhdhdhdhdhdhdhd
Appreciations - Feb 25.pptxhdhdhdhdhdhdhd
preetheshparmar

L2 rules of netiquette

  • 1. Online security, safety, and ethics Internet threats Protecting reputations online Copyright Contextualized online search and research skills Rules of Netiquette
  • 2. At the end of this lesson, the students should be able to: 1. consider ones and others safety when sharing information using the Internet; 2. consider ones and others reputation when using the Internet; 3. determine and avoid the dangers of the Internet; 4. be responsible in the use of social networking sites; and 5. browse the Internet efficiently and properly through proper referencing.
  • 3. The Internet, truly, is a powerful tool. It can be used to promote your business, gain new friends, and stay in touch with the old ones. It is also a source of entertainment. But like most things in this world, there is always another side of the coin. The Internet is one of the most dangerous places, especially if you do not know what you are doing.
  • 5. Internet Threats: 1. Malware stands for malicious software Types: Virus, Worm, Trojan, Spyware, Adware 2. Spam unwanted email mostly from bots or advertisers. It can be used to send malware. 3. Phishing Its goal is to acquire sensitive personal information like passwords and credit card details.
  • 6. Think Before You Click 1. Before you post something on the web, ask these questions to yourself: Would you want your parents or grandparents to see it? Would you want your future boss to see it? Once you post something on the web, you have no control of who sees your posts. 2. Your friends depend on you to protect their reputation online. Talk to your friends about this serious responsibility. 3. Set your post to private. In this way, search engines will not be able to scan that post. 4. Avoid using names. Names are easy for search engines to scan. 5. If you feel that a post can affect you or others reputation, ask the one who posted it to pull it down or report it as inappropriate.
  • 7. If you create somethingan idea, an invention, a form of literary work, or a research, you have the right of how it should be used by others. This is called intellectual property.