Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 11

TEN RULES OF NETIQUETTE

Rule No. 1: Remember the human

          You need to remember that you are talking to a real person when you are
online.
          The internet brings people together who would otherwise never meet.
          Remember this saying when sending an email: Would I say this to the
person’s face.
Rule No. 2: Adhere to the same standards online that you follow in real life.

       You need to behave the same way online that you do in real life.
       You need to remember that you can get caught doing things you should not
be doing       online just like you can in real life.
         You are still talking to a real person with feelings even though you can’t
see them.
Rule no. 3: Know where you are in cyberspace.

          Always take a look around when you enter a new domain when surfing
the web.
          Get a sense of what the discussion group is about before you join it.
Rule no. 4: Respect other people’s time and bandwidth.

          Remember people have other things to do besides read your email. You
are not the center of their world.
          Keep your post and emails to minimum by saying what you want to say.
          Remember everyone won’t answer your questions.
Rule no. 5: Make yourself look good online.

          Be polite and pleasant to everyone.


          Always check your spelling and grammar before posting.
 ·        Know what you are talking about and make sense saying it.
Rule no. 6: Share expert knowledge

         Ask questions online


         Share what you know online.
         Post the answers to your questions online because someone may have the
same question         you do.
Rule no. 7: Help keep flame wars under control
         Netiquette does not forgive flaming.
         Netiquette does however forbid people who are flaming to hurt discussion
groups by putting the group down.
Rule no. 8: Respect other people’s privacy.

          Do not read other people’s mail without their permission.


          Going through other people’s things could cost you, your job or you
could even go to jail.
          Not respecting other people’s privacy is a bad netiquette.
Rule no. 9: Don’t abuse your power.

          Do not take advantage of other people just because you have more
knowledge or power than them.
          Treat others as you would want them to treat you if the roles were
reversed.
Rule no. 10: Be forgiving of other people’s mistake.

          Do not point out mistakes to people online.


          Remember that you were once the new kid on the block.
          You still need to have a good manners even though you are online and
cannot see the          person face to face.

Key Terms

Cyber crime- a crime committed or assisted through the use of the Internet.

Privacy Policy/Terms of Services (ToS) – tells the user how the website will handle its data.

Malware- stands for malicious software.

Virus- a malicious program designed to transfer from one computer to another in any means possible.

Worms– a malicious program designed to replicate itself and transfer from one file folder to another
and also transfer to other computers.

Trojan-a malicious program designed that is disguised as a useful program but once downloaded or
installed, leaves your PC unprotected and allows hacker to get your information.

Spyware– a program that runs in the background without you knowing it. It has the ability to monitor
what you are currently doing and typing through key logging.
Adware- a program designed to send you advertisement, mostly pop-ups.

Spam– unwanted email mostly from bots or advertisers.

Phishing- acquires sensitive personal information like passwords and credits card details.

Pharming- a more complicated way of phishing where it exploits the DNS system.

Copyright- a part of law, wherein you have the rights to work, anyone who uses it w/o your consent is
punishable by law.

Fair Use- means that an intellectual property may be used w/o consent as long as it is used in
commentaries, criticism, parodies, research and etc.

Keyloggers- used to record the keystrokes done by user. This is done to steal passwords or any other
sensitive information.

Rogue security softwares– is a form of malicious software and internet fraud that misleads users into
believing there is a virus on their computer, and manipulates them into paying money for a fake
malware removal tool.

10 Basic Rules of Netiquette or Internet


Etiquette
Know Your Manners When Using Technology
By 
Elizabeth Hartney, BSc., MSc., MA, PhD 
 Reviewed by 
Amy Morin, LCSW 
Updated on January 13, 2020
Print 

The rules of etiquette are just as important in cyberspace as they are in the real world—and the
evidence of poor netiquette can stick around to haunt you for much longer. Follow these basic
rules of netiquette to avoid damaging your online and offline relationships.

Netiquette
Netiquette is short for "Internet etiquette." Just like etiquette is a code of polite
behavior in society, netiquette is a code of good behavior on the Internet. 

TRENDS IN ICT
1. Convergence- is the synergy of technological advancements to work on a similar goal or task. For
example, besides using your personal computer to create word documents, you can now use your
smartphone.

2. Social Media- is a website, application, or online channel that enables web users web users to create ,
co-create, discuss modify, and exchange user generated content.
Six types of Social Media:

a)      Social Networks - These are sites that allows you to connect with other people with the same
interests or background. Once the user creates his/her account, he/she can set up a profile, add people,
share content, etc

           Example: Facebook and Google+


b)      Bookmarking Sites - Sites that allow you to store and manage links to various website and
resources. Most of the sites allow you to create a tag to others.
                
      Ex. Stumble Upon, Pinterest

c)       Social News – Sites that allow users to post their own news items or links to other news sources.
The users can also comment on the post and comments may also be rank.                        
                
       Ex. Reddit and Digg
  d)      Media Sharing – sites that allow you to upload and share media content like images, music and
video.

                                    
         Ex. Flickr, YouTube and Instagram

  e)      Microblogging - focus on short updates from the user. Those that subscribed to the user will be
able to receive these updates.

                                
      Ex. Twitter and Plurk
      f)       Blogs and Forums - allow user to post their content. Other users are able to comment on
the said topic.

            
Ex. Blogger, WordPress and Tumblr

                   

                                    

 3. Mobile Technologies - The popularity of smartphones and tablets has taken a major rise over the
years. This is largely because of the devices capability to do the tasks that were originally found in PCs.
Several of these devices are capable of using a high-speed internet. Today the latest model devices use
4G Networking (LTE), which is currently the fastest.
MOBILE OS

·         iOS - use in apple devices such as iPhone and iPad

·         Android - an open source OS developed by Google. Being open source means mobile phone
companies use this OS for free.

·         Blackberry OS - use in blackberry devices

·         Windows phone OS - A closed source and proprietary operating system developed by Microsoft.

·         Symbian - the original smartphone OS. Used by Nokia devices

·         WebOS- originally used in smartphone; now in smart TVs.

·         Windows Mobile - developed by Microsoft for smartphones and pocket PCs

4. Assistive Media -   is a non- profit service designed to help people who have visual and
reading impairments. A database of audio recordings is used to read to the user.

DNA to mRNA to Protein Converter (skaminsky115.github.io)

DNA and RNA codon tables - Wikipedia


CLOUD COMPUTING

5. Cloud computing- distributed computing on internet or delivery of computing service over


the internet.

 e.g. Yahoo!, Gmail, Hotmail

  

-Instead of running an e-mail program on your computer, you log in to a Web

 e-mail account remotely. The software and storage for your account doesn’t exist

 on your computer – it’s on the service’s computer cloud.

It has three components

1.       Client computers   –   clients are the device that the end user interact with cloud.

2.       Distributed Servers – Often servers are in geographically different places, but server acts as if they
are working next to each other.

3.     Datacenters – It is collection of servers where application is placed and is accessed via Internet.
TYPES OF CLOUDS

PUBLIC CLOUD allows systems and services to be easily accessible to the general public. Public cloud
may be less secured because of its openness, e.g. e-mail

PRIVATE CLOUD allows systems and services to be accessible within an organization. It offers increased
security because of its private nature.

COMMUNITY CLOUD allows systems and services to be accessible by group of organizations.

HYBRID CLOUD is a mixture of public and private cloud. However, the critical activities are performed
using private cloud while the non-critical activities are performed using public cloud.

You might also like