We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byMaeve Holifield
Modified over 2 years ago
5 C H A P T E R © 2001 The McGraw-Hill Companies, Inc. All Rights Reserved1 Internet Etiquette (Netiquette) Netiquette is the observance of certain rules and conventions that have evolved in order to keep the Internet from becoming a free-for-all in which tons of unwanted messages and junk mail would clog your in-box.
© 2001 The McGraw-Hill Companies, Inc. All Rights Reserved2 C H A P T E R 5 Objectives: Define the term netiquette and explain its derivation. Know what it means to spam someone on the Internet, and what to do if someone spams you. Be prepared to protect yourself against unethical users who use to spread hoaxes and send viruses that can damage your computer or the programs and data it contains.
© 2001 The McGraw-Hill Companies, Inc. All Rights Reserved3 C H A P T E R 5 Objectives: Understand the concept of lurking, and know when you should lurk. Know what it means to flame someone on the Internet. Understand the concept of SHOUTING on the Internet and become sensitized to not overdoing it. Recognize the more common smileys and other emoticons used on the Internet, and know how to look up the meaning of less common symbols.
© 2001 The McGraw-Hill Companies, Inc. All Rights Reserved4 C H A P T E R 5 Objectives: Understand what the more common three- letter acronyms mean, and know where to go on the Web to look up more esoteric acronyms. Understand some of the more commonly used Internet jargon, and know where to find a more complete listing of Internet terms and definitions.
© 2001 The McGraw-Hill Companies, Inc. All Rights Reserved5 C H A P T E R 5 Netiquette Guidelines
© 2001 The McGraw-Hill Companies, Inc. All Rights Reserved6 C H A P T E R 5 Spam On the Internet, the term spam refers to unwanted messages posted to newsgroups or sent to a list of users through . The term can be used either as a verb or a noun.
© 2001 The McGraw-Hill Companies, Inc. All Rights Reserved7 C H A P T E R 5 Hoaxes Some pretty incredible hoaxes have been propagated across the Internet. The hoaxes are designed to prey upon peoples fears, sensitivities, or desires to keep the hoax spreading to other users over the Net.
© 2001 The McGraw-Hill Companies, Inc. All Rights Reserved8 C H A P T E R 5 Viruses Some of the more harmful chain letters and hoaxes have transmitted viruses across the Internet. The best way to guard against catching a virus through is never to open an attachment to an message, especially if the attachment has an executable filename extension such as.exe,.vbs, or.class.
© 2001 The McGraw-Hill Companies, Inc. All Rights Reserved9 C H A P T E R 5 Lurking To lurk means to participate in a conversation on the Internet without responding to any of the messages. You receive and read the messages, but you dont say anything in return. Thus, youre lurking!
© 2001 The McGraw-Hill Companies, Inc. All Rights Reserved10 C H A P T E R 5 Flames On the Internet, a flame is a message written in anger. To flame someone is to send them an angry message. Angry messages that people send you are known as flames. If you are real mad and send a hastily written flame, you may regret it later on.
© 2001 The McGraw-Hill Companies, Inc. All Rights Reserved11 C H A P T E R 5 Firefighters Sometimes flaming can get out of hand. People start sending more-heated messages, and things can get ugly. Someone has to step in and write a message intended to restore peace. Since that puts an end to the flames, such peacemakers on the Internet are known as firefighters.
© 2001 The McGraw-Hill Companies, Inc. All Rights Reserved12 C H A P T E R 5 SHOUTING WHEN YOU WRITE IN ALL CAPS, YOURE SHOUTING! Shouting means to add emphasis by writing in all capital letters.
© 2001 The McGraw-Hill Companies, Inc. All Rights Reserved13 C H A P T E R 5 Smileys and Emoticons To give the person reading your message a clue as to what your emotions are, emoticons were invented. Emoticons are combinations of a few characters which, when turned sideways, conjure a facial expression. The most common form of emoticon is the smiley. :-)
© 2001 The McGraw-Hill Companies, Inc. All Rights Reserved14 C H A P T E R 5 Three-Letter Acronyms (TLAs) To shorten the amount of keyboarding required to write a message, some people use three-letter acronyms, which are appropriately known as TLAs. Some examples are: brb= be right back bbl= be back later btw= by the way
© 2001 The McGraw-Hill Companies, Inc. All Rights Reserved15 C H A P T E R 5 Jargon on the Net Admin -Administrator; the person in charge on a computer. ASCII - American Standard Code for Information Interchange; the file format of a plain-text (.txt) file Avatar -An icon or representation of a user in a shared virtual reality back door - A hole in the security of a system deliberately left in place by designers or maintainers
© 2001 The McGraw-Hill Companies, Inc. All Rights Reserved16 C H A P T E R 5 Jargon on the Net Bandwidth - The volume of information per unit of time that a computer, person, or transmission medium can handle Banner - Opening screen containing a logo, author credits, or copyright notice Baud - Bits per second, a measure of telecommunication speed BBS - Electronic bulletin-board system Beta - Mostly working, but still under test
© 2001 The McGraw-Hill Companies, Inc. All Rights Reserved17 C H A P T E R 5 Jargon on the Net Bit - Binary digit; a computational quantity that can take on one of two values, such as true and false, or 0 and 1 Byte - Eight bits; 1 byte can hold 1 ASCII character (see ASCII) Channel - The basic unit of discussion in an IRC channel op or chanop - Someone who is endowed with privileges on a particular IRC channel
© 2001 The McGraw-Hill Companies, Inc. All Rights Reserved18 C H A P T E R 5 Jargon on the Net Cookie - A handle, transaction ID, or other token of agreement between cooperating programs; also, a record of the mouse clicks made by a user at a Web site Cracker - Someone who breaks security or intentionally causes operational problems on a computer system Egosurfing - Typing your own name as a key word into an Internet search engine Emoticon - A character combination used in or news to indicate an emotional state; the most famous is the smiley : )
© 2001 The McGraw-Hill Companies, Inc. All Rights Reserved19 C H A P T E R 5 Jargon on the Net FAQ - Frequently asked question; also, a list of frequently asked questions and their answers Firefighter - A peacemaker on the Internet who intervenes to stop a flame war Firewall - Provides security by preventing unauthorized data from moving across a network Flame - To send an message intended to insult or provoke; also used as a noun to refer to the insulting message
© 2001 The McGraw-Hill Companies, Inc. All Rights Reserved20 C H A P T E R 5 Jargon on the Net flame war - An acrimonious dispute conducted via or newsgroups Flamer - A person who flames habitually Giga - A billion; abbreviated G, as in GB, meaning a billion bytes, which is also called a gigabyte Hacker - A person who enjoys exploring the details of programmable systems and how to stretch their capabilities; someone who can program quickly.
© 2001 The McGraw-Hill Companies, Inc. All Rights Reserved21 C H A P T E R 5 Jargon on the Net IRC - Internet Relay Chat, a worldwide party line network that allows one to converse with others in real time in chat rooms on the Internet ISP - Internet service provider, a company that sells Internet access Kilo - A thousand; abbreviated K, as in KB, meaning a thousand bytes, which is also called a kilobyte
© 2001 The McGraw-Hill Companies, Inc. All Rights Reserved22 C H A P T E R 5 Jargon on the Net Lurker - One of the silent majority in an electronic forum who posts occasionally or not at all but reads the groups postings regularly Mega - A million; abbreviated M, as in MB, meaning a million bytes, which is also called a megabyte MUD - Multi User Dimension; also Multi-User Dungeon
© 2001 The McGraw-Hill Companies, Inc. All Rights Reserved23 C H A P T E R 5 Jargon on the Net Netiquette - Network etiquette Newbie - Someone new to the network or to a newsgroup Newsgroup - One of Usenets many discussion groups; see Usenet Nick - Short for a nickname; in a chat room, every user must pick a nick Ping - A tiny network message sent by one computer to check for the presence and alertness of another computer
© 2001 The McGraw-Hill Companies, Inc. All Rights Reserved24 C H A P T E R 5 Jargon on the Net POTS - Plain old telephone service Rave - To persist in discussing a specific topic when other users wish you would drop it snail mail - Paper mail, as opposed to electronic mail Sneakernet - Term used to refer to transporting data by carrying physical media such as diskettes from one computer to another, instead of transferring the data over the Internet
© 2001 The McGraw-Hill Companies, Inc. All Rights Reserved25 C H A P T E R 5 Jargon on the Net Spam - To send unwanted messages to newsgroups or listservs; also used as a noun to refer to the unwanted messages Surf - To browse the Internet in search of interesting stuff, especially on the World Wide Web Sysadmin - System administrator; the technical support person in charge of a server
© 2001 The McGraw-Hill Companies, Inc. All Rights Reserved26 C H A P T E R 5 Jargon on the Net TCP/IP - Transmission Control Protocol/Internet Protocol; the wide-area networking protocol that makes the Internet work URL - Uniform resource locator, an address that identifies a document or resource on the World Wide Web Usenet - A distributed bulletin-board system hosting more than 10,000 newsgroups
© 2001 The McGraw-Hill Companies, Inc. All Rights Reserved27 C H A P T E R 5 Jargon on the Net Virus - A cracker program that searches out other programs and infects them by embedding a copy of itself in them. When these programs are executed, the embedded virus is executed too, thus propagating the infection Wannabee - A would-be hacker yo-yo mode - The state in which the system is said to be when it rapidly alternates several times between being up and being down
9 C H A P T E R © 2001 The McGraw-Hill Companies, Inc. All Rights Reserved1 Communicating in Real Time Now it is also possible to converse in real time.
8 C H A P T E R © 2001 The McGraw-Hill Companies, Inc. All Rights Reserved1 Usenet Newsgroups and Web-based Forums In this chapter, you will learn how.
Internet Basics Terminology Click the screen to advance slides. Click again to see the definition.
Parenting the Online Child. Your Child Is on the Internet The Internet is a wonderful research tool. Reliance on the Internet in schools has grown rapidly.
COMPUTER NETWORKS. COMMUNICATION BETWEEN COMPUTERS For a computer to communicate with each other (which may be a completely different system) an interface.
Unit 1 Review Project Luke Mitchell Kinsey Lyle Theron Guidry Devon Bryant Keith Walston.
INTRODUCTION To Internet Concepts & Using Internet in Our Life.
Standard Grade Computing Communications and Networks.
Mozilla Thunderbird Management. Topic 1: Changing How is Organized Topic 2: Creating and Using Folders Topic 3: Attachments Topic 4: Organizing.
An ISO 9001:2000 Certified Organization CS-611 COMPUTER FUNDAMENTAL & PC SOFTWARE BCA-1 IGNOU.
Computer Vulnerabilities 1. 1.Overview 2. 2.Threats to Computer Systems 3. 3.How Hackers Work 4. 4.Using the Internet Securely 5. 5.How We Make It Easy.
UNIT I FUNDAMENTAL OF E-COMMERCE 1.1INTRODUCTION TO E-COMMERCE 1.2 DRIVING FORCES OF E-COMMERCE 1.3 BENEFITS AND LIMITATIONS OF E-COMMERCE 1.4 DATA MINING.
Internet/ INFORMATION TECHNOLOGY MANAGEMENT SERVICE Training & Research Division.
SECURITY AWARENESS. The Importance of Security Awareness Training Security Awareness Training provides the knowledge to protect information systems and.
1.About ModemsAbout Modems 2.All About BroadbandAll About Broadband 3.Making ConnectionsMaking Connections 4.VirusesViruses 5.Data BackupData Backup 6.File.
Computers Are Your Future © 2005 Prentice-Hall, Inc.
Chapter 3 The Basics of Networking. Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Learning Objectives Tell whether a communication.
Version 4.1 CCNA Discovery 2– Chapter 7. Contents 7.1: ISP Services : TCP / IP Protocols 7.2: 7.3: DNS 7.3: 7.4: Application Layer Protocols 7.4.
Computers Are Your Future Twelfth Edition Chapter 6: The Internet and the World Wide Web Copyright © 2012 Pearson Education, Inc. Publishing as Prentice.
12 C H A P T E R © 2001 The McGraw-Hill Companies, Inc. All Rights Reserved1 Commonly Found Internet File Types When you use an Internet search engine.
Information Systems Using Information (Higher and Intermediate 2)
THE INTERNET -Notes Presentation- Download the Internet –Notes from this weeks page of the teacher website.
HIPAA Security Awareness What You Need To Know. Training Overview This course will discuss the following subject areas: How this training relates to you.
A. Computer Basics Unit Objectives: Examine the role of hardware and software.
Center for Management Development 1 Introduction to Electronic Commerce TERMS Dr. Scudder.
Logical IT Security By Prashant Mali.
CSC1720 – Introduction to Internet Essential Materials Virtual Community USENET newsgroup.
Etiquette A re you -happy; that is, do you send too much? Did you send an that was misunderstood? Did the message you thought you sent.
© 2016 SlidePlayer.com Inc. All rights reserved.