Presentation is loading. Please wait.

Presentation is loading. Please wait.

Submitted by: Donna Rembert Instructor: Dr. Laurie Fowler ED508 Technology Portfolio.

Similar presentations

Presentation on theme: "Submitted by: Donna Rembert Instructor: Dr. Laurie Fowler ED508 Technology Portfolio."— Presentation transcript:

1 Submitted by: Donna Rembert Instructor: Dr. Laurie Fowler ED508 Technology Portfolio

2  Netiquette is a cyber term for doing what is right on the internet.  It is a combination of the words network and etiquette.  It is how one behaves every time they hit the send button.  There are over 2 billion users on the web

3  Only use your first name and personal information or pictures to anyone.  Never agree to see someone you ‘meet” on line.  Don’t believe everything you read. Some one may be using a false identity.  Do not reply to messages that makes you feel uncomfortable. Let someone else know.  Never give anyone your password.

4  Think before you post.  Observe the site before you use it.  Read the FAQ’s(frequently asked questions)and archives, before posting in group discussion or chat room.  Use courtesy while using netiquette

5  To protect our digital reputation on and offline  To avoid “Flame Wars” online  To treat others the way we want to be treated  For your protection

6  There are over 107trillion emails sent daily  Make sure you use grammar & spell check  Make sure your use your signature to let them know who is sending the email  Don’t correct someone else’s spelling  Don’t send emails when you are upset, angry or late at night  Don’t use all caps in emails (it means you are yelling)

7  Do not text while driving.  No text is worth dying for.  It is not safe to text while walking.  Avoid playing texting games( some people are really busy and can’t always respond ASAP)  Don’t lay phone on the dinner table or in a meeting.  Keep conversations quiet while in public.

8  Copyright – Allows only the person who has designed the work to edit, copy and benefit from it.  Fair Use- Allows a person to use copyright materials without the owner’s permission

9  The difference between copyright and fair use is that there is no set limits for the person with copyrights and there are rules for fair use  When making a copy one must consider:  How will the copied materials be used?  What is the purpose for copying?  How much of the materials copied will be used?

10  Media materials can only be used for non-profit or educational purposes.  Copied materials can be used or changed in order to entertain a large audience.

11  Using someone’s ideas and claiming them to be yours. How to Avoid Plagiarism?  Use quotations or reword or paraphrase Plagiarism Identified  Google Search  Programs for Plagiarism

12  Identity Theft: Using another's private information for financial gain.  Reputation Management: Being mindful of ones reputation on and off the internet.  Password: Secret words or digits used to give one access to files and websites.  Cyber bullying- Using the internet to ruin one’s reputation or harassing an individual.  Cyber stalking: is stalking on the internet.

13  Virus: A virus on the computer attached itself to files on your computer and destroys it.  Trojan Horses: A software that poses as one thing and only steals your information on your computer.  :Worms: Send copies of itself to cause harm to the network or damage files on the computer

14   sign/safety.html sign/safety.html

15  Google. Web 06 June 2012 http://google.com  evention.html evention.html  The Riles of Netiquette Web. 10 June 2012    m.html m.html 

Download ppt "Submitted by: Donna Rembert Instructor: Dr. Laurie Fowler ED508 Technology Portfolio."

Similar presentations

Ads by Google