Professional Documents
Culture Documents
TLE - ICT Script 9-25-2020
TLE - ICT Script 9-25-2020
As people continue to expand their use of the internet for all aspects of their lives, from emailing pals
and doing social networking to scheduling job interviews and doctor appointments, many of them have
become complacent, formed bad habits, and tossed proper etiquette aside.
This is unfortunate and may create problems if we don’t learn a few basic rules. Internet etiquette, also
known as “Netiquette,” is essential in a civilized work environment or personal relationship. Even
though you aren't with others in person, you should remember that they're still there, on the other end
of your communication.
1. The first rule of internet etiquette is to be kind and courteous. Remember that whatever you
send from your keyboard or your phone is still an extension of you, even though you're not with
others in person. Being nice includes avoiding cyber bullying. Think about how you would feel if
someone said whatever you just typed about you. If you find it the least bit disturbing, delete it.
Cyber bullying may lead to disaster if a despondent person perceives he or she is being
threatened.
Never flame or rant in a public forum. Show respect for the opinions of others, even if you don’t
agree, and refrain from name-calling. Avoid gossiping or saying anything negative about others.
2. Learn Internet Acronyms
As communication on the Internet explodes, so does the use of acronyms. Learn what they
mean so you won’t misunderstand messages and comments.
BTW - By the way
TTYL – Talk to you later
TYT - Take your time
LOL – Laughing out loud
ROTFL – Rolling on the floor laughing
FWIW – For what it’s worth
POV - Point of view
B/C – Because
AYOR – At your own risk
B4N – Bye for now
DH – Dear husband
DF – Dear friend
EML – Email me later
JK – Just kidding
SFW – Safe for work
OIC - Oh I see
AAMOF - As a matter of fact
TYVM - Thank you very much
AFAIK - As far as I know
IIRC - If I recall correctly
EOD - End of day
EOM - End of message
C&P - Copy and paste
HTH - Hope this helps
NNTR - No need to reply
YAM - Yet another meeting
ICYMI - In case you missed it
SMH - Shaking my head
TBA - To be announced
B2K/BTK - Back to keyboard
WFM - Works for me
3. Keep Messages and Posts Brief
Most people use the internet to save time, so honor that and keep all messages as brief as
possible. If you have more to say, try breaking it up into smaller topics. This will force you to be
more organized and enable the reader to digest the information in a more orderly manner.
4. Don’t Shout
Avoid using all caps in any email or post. Some people think that keeping the caps lock button on
for the entire message will make it easier to read, while it actually does the opposite. It is not
only difficult to read, it comes across as shouting, which is rude.
5. Use Discretion
Whether you are sending email, instant messaging, commenting on Facebook, adding images to
Snapchat, or posting a message to your blog, you need to remember that anything you put on
the internet can be there forever. Even if you remove the material, someone may have made a
screen shot, copied, or saved it. One rule of thumb many people use is to never post anything
you wouldn’t want your parents or boss to see.
6. Protect Personal Information
Since anything you post on the Internet is out there for all to see, avoid adding anything
personal. This includes your address, phone number, social security number, and driver’s license
information. You don’t want to make things easy for identity thieves, burglars, and predators.
7. Obey Copyright Laws
Never copy someone else’s work and post it as your own. It is against copyright law because it is
considered stealing. It is always a good idea to ask permission before quoting anyone, but that
isn’t always possible. If you want to quote someone, keep the quote short, cite the source, and
put a link to the complete written work.
8. Think before you click
It is always a good idea to reread anything you type before clicking the “send” button. If you
have time, step away for a few minutes and come back to it with fresh eyes. For those times
when you need to post quickly, at least check your spelling, grammar, and tone of the message.
If it is late at night, and you are extremely tired, it’s probably best to wait until the next morning.
You can save most messages and posts in draft mode.
9. Help Others
If someone appears to be new to the internet, offer your assistance. Share information on
proper etiquette, send them a link to a list of the most common acronyms and emoticons, and
offer to answer any questions until they get the hang of it. After you see that someone has
posted something inappropriate, let him or her know privately. Never do anything to publicly
embarrass anyone you know online.
10. Internet Trolls
Keep in mind that there are internet trolls out there, looking for their next victim. If you become
the subject of their bad behavior, don't respond. Most of the time, these people like to stir
things up while hiding behind their keyboards. When they don't get a reaction, they move on to
someone else.
However, if it continues and you feel as though you are being threatened, contact the
authorities. You need to make sure you protect yourself and your family.
The Internet (or internet) is the global system of interconnected computer networks that uses the
Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a network of
networks that consists of private, public, academic, business, and government networks of local to
global scope, linked by a broad array of electronic, wireless, and optical networking technologies. The
Internet carries a vast range of information resources and services, such as the inter-linked hypertext
documents and applications of the World Wide Web (WWW), electronic mail, telephony, and file
sharing.
The World Wide Web is a global collection of documents, images, multimedia, applications, and other
resources, logically interrelated by hyperlinks and referenced with Uniform Resource Identifiers (URIs),
which provide a global system of named references. URIs symbolically identify services, web servers,
databases, and the documents and resources that they can provide. Hypertext Transfer Protocol (HTTP)
is the main access protocol of the World Wide Web. Web services also use HTTP for communication
between software systems for information transfer, sharing and exchanging business data and logistic
and is one of many languages or protocols that can be used for communication on the Internet.
History
Main articles: History of the Internet and History of the World Wide Web
In the 1960s, the Advanced Research Projects Agency (ARPA) of the United States Department of
Defense funded research into time-sharing of computers.[13][14][15] Research into packet switching,
one of the fundamental Internet technologies, started in the work of Paul Baran in the early 1960s and,
independently, Donald Davies in 1965.[1][16] After the Symposium on Operating Systems Principles in
1967, packet switching from the proposed NPL network was incorporated into the design for the
ARPANET and other resource sharing networks such as the Merit Network and CYCLADES, which were
developed in the late 1960s and early 1970s.[17]
ARPANET development began with two network nodes which were interconnected between the
Network Measurement Center at the University of California, Los Angeles (UCLA) Henry Samueli School
of Engineering and Applied Science directed by Leonard Kleinrock, and the NLS system at SRI
International (SRI) by Douglas Engelbart in Menlo Park, California, on 29 October 1969.[18] The third site
was the Culler-Fried Interactive Mathematics Center at the University of California, Santa Barbara,
followed by the University of Utah Graphics Department. In a sign of future growth, 15 sites were
connected to the young ARPANET by the end of 1971.[19][20] These early years were documented in
the 1972 film Computer Networks: The Heralds of Resource Sharing.
Access
Common methods of Internet access by users include dial-up with a computer modem via telephone
circuits, broadband over coaxial cable, fiber optics or copper wires, Wi-Fi, satellite, and cellular
telephone technology (e.g. 3G, 4G). The Internet may often be accessed from computers in libraries and
Internet cafes. Internet access points exist in many public places such as airport halls and coffee shops.
Various terms are used, such as public Internet kiosk, public access terminal, and Web payphone. Many
hotels also have public terminals that are usually fee-based. These terminals are widely accessed for
various usages, such as ticket booking, bank deposit, or online payment. Wi-Fi provides wireless access
to the Internet via local computer networks. Hotspots providing such access include Wi-Fi cafes, where
users need to bring their own wireless devices such as a laptop or PDA. These services may be free to all,
free to customers only, or fee-based.
IP Addresses
A DNS resolver consults three name servers to resolve the domain name user-visible
"www.wikipedia.org" to determine the IPV4 Address 207.142.131.234
For locating individual computers on the network, the Internet provides IP addresses. IP addresses are
used by the Internet infrastructure to direct internet packets to their destinations. They consist of fixed-
length numbers, which are found within the packet. IP addresses are generally assigned to equipment
either automatically via DHCP, or are configured.
Usage:
The Internet allows greater flexibility in working hours and location, especially with the spread of
unmetered high-speed connections. The Internet can be accessed almost anywhere by numerous
means, including through mobile Internet devices. Mobile phones, datacards, handheld game consoles
and cellular routers allow users to connect to the Internet wirelessly. Within the limitations imposed by
small screens and other limited facilities of such pocket-sized devices, the services of the Internet,
including email and the web, may be available. Service providers may restrict the services offered and
mobile data charges may be significantly higher than other access methods.
Educational material at all levels from pre-school to post-doctoral is available from websites. Examples
range from CBeebies, through school and high-school revision guides and virtual universities, to access
to top-end scholarly literature through the likes of Google Scholar. For distance education, help with
homework and other assignments, self-guided learning, whiling away spare time, or just looking up
more detail on an interesting fact, it has never been easier for people to access educational information
at any level from anywhere. The Internet in general and the World Wide Web in particular are important
enablers of both formal and informal education. Further, the Internet allows universities, in particular,
researchers from the social and behavioral sciences, to conduct research remotely via virtual
laboratories, with profound changes in reach and generalizability of findings as well as in communication
between scientists and in the publication of results.
Malware
Malware is malicious software used and distributed via the Internet. It includes computer viruses which
are copied with the help of humans, computer worms which copy themselves automatically, software
for denial of service attacks, ransomware, botnets, and spyware that reports on the activity and typing
of users. Usually, these activities constitute cybercrime. Defense theorists have also speculated about
the possibilities of hackers using cyber warfare using similar methods on a large scale.
You’re probably familiar with computer viruses and the unpleasant consequences they can have for
users, but are you aware of the serious implications that an infection could have for your company?
Computer viruses are extremely prevalent and can compromise sensitive information, destroy data,
harm hardware and waste copious amounts of time, resources and energy. User-downloaded viruses
are responsible for 2,000,000 to 5,000,000 attacks per day. Some notorious viruses have resulted in
billions of dollars worth of damages. The most expensive computer virus of all time, dubbed MyDoom,
caused $38 billion in damages and was estimated to impact 25% of all emails in 2004.
A computer virus is a specific type of malware designed to replicate and spread by modifying other
computer programs and inserting its own code. When this replication succeeds, the affected programs
are referred to as “infected” with a computer virus. The sole purpose of any virus is to replicate and
spread itself, and damage to the host system is often a consequence of infection.
There are many different forms of computer viruses that infect systems in different ways. To make
things even more complex, the modern threat landscape is anything but stagnant and zero-day viruses
are rapidly emerging. Some types of viruses are more dangerous than others. A few of the most
threatening types of computer viruses include:
1. Boot sector viruses: For the majority of users, this type of virus is one of the most dangerous
types that exist. These viruses spread on the master boot record, making them very difficult to
remove and frequently resulting in a full system reformat.
2. Direct action viruses: This type of virus is one of the two main types that infect files. These
viruses work through files that they attach to, rather than hiding in a computer’s memory or
installing themselves. When a user clicks on an infected file, the attached virus is activated and
continues to spread. Although direct action viruses make files inaccessible, they don’t affect a
system’s performance.
3. Resident viruses: Like direct action viruses, resident viruses infect files. However, this type of
virus installs itself on a PC. These viruses are especially dangerous because they can persist even
after the primary source of the virus is removed.
4. Multipartite viruses: This type of virus can spread in various ways and can behave in a different
manner depending on factors such as a PC’s operating system. These viruses can infect the boot
sector as well as files on a computer and can spread extremely rapidly and be very difficult to
remove as a result.
5. Polymorphic viruses: This type of virus changes its signature when it reproduces, masquerading
as a different and seemingly harmless file. These viruses are especially threatening because
antivirus programs have a very hard time detecting them. Because traditional antivirus software
can only blacklist a single virus variant, many programs take months to identify a single
polymorphic virus.
Best Practices for Recognizing Virus email and Preventing Them from Infecting Devices and Networks
Knowing how to recognize an email virus, as well as implementing basic email security best practices, is
imperative in protecting yourself and your company from infection. Here are some tips for identifying
viruses and preventing infection:
Antivirus software plays an important role in protecting against email viruses; however, this technology
must be implemented as an element of a comprehensive, multi-layered cloud email security solution to
effectively combat advanced attacks.
Gmail – (pronounced Gee-mail) is a free Web-based e-mail service currently being tested at Google that
provides users with a gigabyte of storage for messages and provides the ability to search for specific
messages. The Gmail program also automatically organizes successively related messages into a
conversational thread.
1. To log into Gmail on your Mac or PC, simply go to Gmail.com and enter your account email (or
associated phone number) when prompted and your password. Check the box next to
"Remember me" if you'd like to stay logged in automatically.
2. And if you're logging in on a public or shared device, don't forget to log out of Gmail when
you're done for the day.
3. Beside on your picture, click the 9 dot and choose Gmail.
Google Docs is a free Web-based application in which documents and spreadsheets can be created,
edited and stored online.
Google Sheets is a spreadsheet program included as part of a free, web-based software office suite
offered by Google within its Google Drive service.