SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Netiquette: Guidelines You Should Follow Netiquette Tutorial 2
What is Netiquette? Rules 1 – 7 and why they are important Where can I go to learn more? Overview
“Netiquette” is an abbreviation for “Internet etiquette” Simply stated, Netiquette is the do’s and don’ts of online communication What is Netiquette?
Using all uppercase characters is considered shouting Use proper sentence case (i.e. the standard capitalization of an English sentence) Rule #1: Do not use ALL CAPS
Use descriptive and specific subject lines Include your class and section number Focus on one subject per message If you veer off onto another topic, update the subject line Include a signature block at the end of your message Rule #2: Complete the Subject Line
Ensure that your messages are professional Are well-written and free of typographical and grammatical errors convey the correct tone Rule #3: Ensure that your messages are professional and well-written
Be aware of the policies related to the computers and communication systems you are using You more than likely have signed a computer and/or network usage agreement (“Acceptable Use Policy (AUP)”) at your school or place of employment Computers and communication systems made available to you in the academic or business setting are for “business purposes only” You should not assume you have personal privacy rights regarding your electronic communications in these settings Rule #3 – Guideline #1Do not send personal messages
Stay on topic Convey your message effectively and efficiently Rule #3 – Guideline #2Be concise and clear
Trendy abbreviations or “Netspeak” are cryptic and only serve to confuse the recipient Some conventions to show emotion (e.g. emoticons) are considered acceptable Rule #3 – Guideline #3Don’t use “Netspeak” Examples of emoticons: :-)	happy face :)	happy face – no nose :-(	sad face  :(	sad face – no nose ;-)	wink Examples of “Netspeak”: TTFN 	 ta-ta for now PLZ 	 please BTW 	 by the way  IMHO 	 in my humble opinion LOL	laughing out loud
Carefully proofread your messages to check them for mistakes Use the “spell check” tool  Rule #3 – Guideline #4Make sure your messages are error-free
Heated messages are called flames If you are angry, stressed, or frustrated, you should wait to compose your message so that you do not get into a “flame war” Rule #3 – Guideline #5Don’t respond when you are angry or frustrated
Don’t say things in an electronic communication that you would not say in a face-to-face situation When you have to resolve a conflict or provide feedback, face-to-face communication may be a better choice Rule #3 – Guideline #6Don’t say it if you wouldn’t say it face-to-face
Be careful when using sarcasm and humor – it is often misinterpreted Rule #3 – Guideline #7Avoid sarcasm and humor
Ask yourself if a message warrants a response If a response is necessary, most times it is good enough to reply to the person who generated the original message Reply-to-all only if absolutelynecessary Rule #4: Avoid replying to a message unless it is purposeful
SPAM is considered an abuse of electronic messaging systems SPAM includes chain e-mails, urban legends, charity requests, e-mails about lost children, advertising, etc.  Rule #5: Do not send SPAM Ensure the messages you send or post do not fall into the category of SPAM - check their validity at Web sites like http://www.snopes.com/http://www.truthorfiction.com//http://www.breakthechain.org/
Be frugal with bandwidth Know that some people still use slower modems, dial-up connections, and/or older computers Tell your recipients if you have included file attachments Rule #6: Avoid sending large files and attachments
Share what you know but do check your facts Know when formality is necessary and appropriate Address your professors and fellow students in the appropriate manner Rule #7: Know your audience and your content
References Adams, T., & Scollard, S. (2005). Internet Effectively: A Beginner's Guide to the World Wide Web. Boston: Pearson Education, Inc. Netiquette. (n.d.). Retrieved July 6, 2009, from Northern Virginia Community College - Extended Learning Institute: http://eli.nvcc.edu/orientation/netiquette.htm Netiquette Home Page. (n.d.). Retrieved July 6, 2009, from Netiquette Home Page - A Service of Albion.com: http://www.albion.com/netiquette/ Spam - Wikipedia, the free encyclopedia. (n.d.). Retrieved July 6, 2009, from Wikipedia, the free encyclopedia: http://en.wikipedia.org/wiki/SPAM Taylor, T. (2007). 100% Information Literacy Success. Clifton Park: Thomson Delmar Learning.  

Weitere ähnliche Inhalte

Was ist angesagt?

Digital Citizenship & Netiquette
Digital Citizenship & NetiquetteDigital Citizenship & Netiquette
Digital Citizenship & NetiquetteSteve Katz
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
Netiquette powerpointbooth
Netiquette powerpointboothNetiquette powerpointbooth
Netiquette powerpointboothkabooth
 
Computer system servicing
Computer system servicingComputer system servicing
Computer system servicingLindyl Geral
 
CSS L01 - Introduction to Computer System Servicing (NCII)
CSS L01 - Introduction to Computer System Servicing (NCII)CSS L01 - Introduction to Computer System Servicing (NCII)
CSS L01 - Introduction to Computer System Servicing (NCII)Marvin Bronoso
 
The 10 core rules of netiqutte
The 10 core rules of netiqutteThe 10 core rules of netiqutte
The 10 core rules of netiqutteMudgeoTorso1091
 
Lesson 1: Introduction to Information and Communication Technology
Lesson 1: Introduction to Information and Communication TechnologyLesson 1: Introduction to Information and Communication Technology
Lesson 1: Introduction to Information and Communication TechnologyLea Rodriguez
 
Online Safety, Security, Ethics, and Etiquette (Part 2)
Online Safety, Security, Ethics, and Etiquette (Part 2)Online Safety, Security, Ethics, and Etiquette (Part 2)
Online Safety, Security, Ethics, and Etiquette (Part 2)Maria Eloisa Blanza
 
Project in Empowerment Technology
Project in Empowerment Technology Project in Empowerment Technology
Project in Empowerment Technology Jeanloismorante
 
CSS L12 STRUCTURE OF COMPUTER NETWORK
CSS L12 STRUCTURE OF COMPUTER NETWORKCSS L12 STRUCTURE OF COMPUTER NETWORK
CSS L12 STRUCTURE OF COMPUTER NETWORKMarvin Bronoso
 
Computer Hardware Servicing Learning Module v.2.0
Computer Hardware Servicing Learning Module v.2.0Computer Hardware Servicing Learning Module v.2.0
Computer Hardware Servicing Learning Module v.2.0Bogs De Castro
 
Nettiquette complete
Nettiquette completeNettiquette complete
Nettiquette completeyoochunjjangy
 
Web Navigation Presentation
Web Navigation PresentationWeb Navigation Presentation
Web Navigation Presentationglvsav37
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internetMaricrs Alfarö
 
CSS L04 - Integral Parts of the Computer System
CSS L04 - Integral Parts of the Computer SystemCSS L04 - Integral Parts of the Computer System
CSS L04 - Integral Parts of the Computer SystemMarvin Bronoso
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)John Bosco Javellana, MAEd.
 

Was ist angesagt? (20)

Netiquette
NetiquetteNetiquette
Netiquette
 
Digital Citizenship & Netiquette
Digital Citizenship & NetiquetteDigital Citizenship & Netiquette
Digital Citizenship & Netiquette
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Netiquette powerpointbooth
Netiquette powerpointboothNetiquette powerpointbooth
Netiquette powerpointbooth
 
Computer system servicing
Computer system servicingComputer system servicing
Computer system servicing
 
CSS L01 - Introduction to Computer System Servicing (NCII)
CSS L01 - Introduction to Computer System Servicing (NCII)CSS L01 - Introduction to Computer System Servicing (NCII)
CSS L01 - Introduction to Computer System Servicing (NCII)
 
The 10 core rules of netiqutte
The 10 core rules of netiqutteThe 10 core rules of netiqutte
The 10 core rules of netiqutte
 
Productivity tools
Productivity toolsProductivity tools
Productivity tools
 
Lesson 1: Introduction to Information and Communication Technology
Lesson 1: Introduction to Information and Communication TechnologyLesson 1: Introduction to Information and Communication Technology
Lesson 1: Introduction to Information and Communication Technology
 
Online Safety, Security, Ethics, and Etiquette (Part 2)
Online Safety, Security, Ethics, and Etiquette (Part 2)Online Safety, Security, Ethics, and Etiquette (Part 2)
Online Safety, Security, Ethics, and Etiquette (Part 2)
 
Project in Empowerment Technology
Project in Empowerment Technology Project in Empowerment Technology
Project in Empowerment Technology
 
CSS L12 STRUCTURE OF COMPUTER NETWORK
CSS L12 STRUCTURE OF COMPUTER NETWORKCSS L12 STRUCTURE OF COMPUTER NETWORK
CSS L12 STRUCTURE OF COMPUTER NETWORK
 
Computer Hardware Servicing Learning Module v.2.0
Computer Hardware Servicing Learning Module v.2.0Computer Hardware Servicing Learning Module v.2.0
Computer Hardware Servicing Learning Module v.2.0
 
Nettiquette complete
Nettiquette completeNettiquette complete
Nettiquette complete
 
Web Navigation Presentation
Web Navigation PresentationWeb Navigation Presentation
Web Navigation Presentation
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internet
 
CSS L04 - Integral Parts of the Computer System
CSS L04 - Integral Parts of the Computer SystemCSS L04 - Integral Parts of the Computer System
CSS L04 - Integral Parts of the Computer System
 
Productivity tools
Productivity toolsProductivity tools
Productivity tools
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)
 

Andere mochten auch

New Virtual MR Festival - Semantic Web 3.0 preso rethought (2010)
New Virtual MR Festival - Semantic Web 3.0 preso rethought (2010)New Virtual MR Festival - Semantic Web 3.0 preso rethought (2010)
New Virtual MR Festival - Semantic Web 3.0 preso rethought (2010)DirectionFirst
 
Open SUNY NDLW: Exploring Emerging Technologies for Lifelong Learning and Suc...
Open SUNY NDLW: Exploring Emerging Technologies for Lifelong Learning and Suc...Open SUNY NDLW: Exploring Emerging Technologies for Lifelong Learning and Suc...
Open SUNY NDLW: Exploring Emerging Technologies for Lifelong Learning and Suc...Erin Maney
 
50 actividades con tics
50 actividades con tics50 actividades con tics
50 actividades con ticsLuis Capelli
 
Las TICs como herramienta pedagógica en el aula
Las TICs como herramienta pedagógica en el aulaLas TICs como herramienta pedagógica en el aula
Las TICs como herramienta pedagógica en el aulaMaya Sánchez
 
tics zaida apaico mendoza
tics zaida apaico mendozatics zaida apaico mendoza
tics zaida apaico mendozazaidaam1985
 
Importancia de las Tics en la educación
Importancia de las Tics en la educaciónImportancia de las Tics en la educación
Importancia de las Tics en la educaciónRaquel_Delgado
 
Tutorialestor
TutorialestorTutorialestor
TutorialestorMarilina
 

Andere mochten auch (9)

Wikis En El Aula
Wikis En El AulaWikis En El Aula
Wikis En El Aula
 
New Virtual MR Festival - Semantic Web 3.0 preso rethought (2010)
New Virtual MR Festival - Semantic Web 3.0 preso rethought (2010)New Virtual MR Festival - Semantic Web 3.0 preso rethought (2010)
New Virtual MR Festival - Semantic Web 3.0 preso rethought (2010)
 
Web 3.0 semantics
Web 3.0 semanticsWeb 3.0 semantics
Web 3.0 semantics
 
Open SUNY NDLW: Exploring Emerging Technologies for Lifelong Learning and Suc...
Open SUNY NDLW: Exploring Emerging Technologies for Lifelong Learning and Suc...Open SUNY NDLW: Exploring Emerging Technologies for Lifelong Learning and Suc...
Open SUNY NDLW: Exploring Emerging Technologies for Lifelong Learning and Suc...
 
50 actividades con tics
50 actividades con tics50 actividades con tics
50 actividades con tics
 
Las TICs como herramienta pedagógica en el aula
Las TICs como herramienta pedagógica en el aulaLas TICs como herramienta pedagógica en el aula
Las TICs como herramienta pedagógica en el aula
 
tics zaida apaico mendoza
tics zaida apaico mendozatics zaida apaico mendoza
tics zaida apaico mendoza
 
Importancia de las Tics en la educación
Importancia de las Tics en la educaciónImportancia de las Tics en la educación
Importancia de las Tics en la educación
 
Tutorialestor
TutorialestorTutorialestor
Tutorialestor
 

Ähnlich wie Netiquette - Basic Guidelines

Lecture 4 document preparation 1
Lecture 4  document preparation 1Lecture 4  document preparation 1
Lecture 4 document preparation 1MarketingAcademy2
 
Email & Social Media Training
Email & Social Media TrainingEmail & Social Media Training
Email & Social Media TrainingWilliam Mann
 
Netiquette
NetiquetteNetiquette
Netiquetteannekish
 
23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquette23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquettebtanwar74
 
23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquette23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquetteNamita Singh
 
23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquette23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquetteNamita Singh
 
Business Email Etiquette & Ethics ppt.pptx
Business Email Etiquette & Ethics ppt.pptxBusiness Email Etiquette & Ethics ppt.pptx
Business Email Etiquette & Ethics ppt.pptxDr Ganesh Saini
 
Tech Training - Session 8
Tech Training - Session 8Tech Training - Session 8
Tech Training - Session 8William Mann
 
Presentation of email etiquette (draft)
Presentation of email etiquette (draft)Presentation of email etiquette (draft)
Presentation of email etiquette (draft)Syed Abu Zahid
 
COT 2- EMP. TECH NOLOGY(Netiquettes).pptx
COT 2- EMP. TECH NOLOGY(Netiquettes).pptxCOT 2- EMP. TECH NOLOGY(Netiquettes).pptx
COT 2- EMP. TECH NOLOGY(Netiquettes).pptxacademicjfurio
 
email etiquette by rohit sharma
email etiquette by rohit sharmaemail etiquette by rohit sharma
email etiquette by rohit sharmaRohit Sharma
 
E mails.pptx KNOELWDESE THGDFDHGDJHFKJGKH
E mails.pptx KNOELWDESE THGDFDHGDJHFKJGKHE mails.pptx KNOELWDESE THGDFDHGDJHFKJGKH
E mails.pptx KNOELWDESE THGDFDHGDJHFKJGKHshilparaghuwanshi4
 
Netiquette office 2007
Netiquette office 2007Netiquette office 2007
Netiquette office 2007left4future
 
Email etiquette
Email etiquetteEmail etiquette
Email etiquettePradnag
 
Chapter 5 Notes
Chapter 5 NotesChapter 5 Notes
Chapter 5 Noteskvaughn115
 
Email protocol & courtesy
Email protocol & courtesyEmail protocol & courtesy
Email protocol & courtesyNB0208
 

Ähnlich wie Netiquette - Basic Guidelines (20)

Lecture 4 document preparation 1
Lecture 4  document preparation 1Lecture 4  document preparation 1
Lecture 4 document preparation 1
 
Email & Social Media Training
Email & Social Media TrainingEmail & Social Media Training
Email & Social Media Training
 
SA1.09.2 Texting, Emails, Netiquette
SA1.09.2 Texting, Emails, NetiquetteSA1.09.2 Texting, Emails, Netiquette
SA1.09.2 Texting, Emails, Netiquette
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Form 1 Term 2 Week 6.1
Form 1   Term 2   Week 6.1Form 1   Term 2   Week 6.1
Form 1 Term 2 Week 6.1
 
23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquette23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquette
 
23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquette23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquette
 
23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquette23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquette
 
Business Email Etiquette & Ethics ppt.pptx
Business Email Etiquette & Ethics ppt.pptxBusiness Email Etiquette & Ethics ppt.pptx
Business Email Etiquette & Ethics ppt.pptx
 
Tech Training - Session 8
Tech Training - Session 8Tech Training - Session 8
Tech Training - Session 8
 
Presentation of email etiquette (draft)
Presentation of email etiquette (draft)Presentation of email etiquette (draft)
Presentation of email etiquette (draft)
 
COT 2- EMP. TECH NOLOGY(Netiquettes).pptx
COT 2- EMP. TECH NOLOGY(Netiquettes).pptxCOT 2- EMP. TECH NOLOGY(Netiquettes).pptx
COT 2- EMP. TECH NOLOGY(Netiquettes).pptx
 
email etiquette by rohit sharma
email etiquette by rohit sharmaemail etiquette by rohit sharma
email etiquette by rohit sharma
 
E mails.pptx KNOELWDESE THGDFDHGDJHFKJGKH
E mails.pptx KNOELWDESE THGDFDHGDJHFKJGKHE mails.pptx KNOELWDESE THGDFDHGDJHFKJGKH
E mails.pptx KNOELWDESE THGDFDHGDJHFKJGKH
 
Netiquette office 2007
Netiquette office 2007Netiquette office 2007
Netiquette office 2007
 
101 email etiquette tips
101 email etiquette tips101 email etiquette tips
101 email etiquette tips
 
Email etiquette
Email etiquetteEmail etiquette
Email etiquette
 
Netiquettes
NetiquettesNetiquettes
Netiquettes
 
Chapter 5 Notes
Chapter 5 NotesChapter 5 Notes
Chapter 5 Notes
 
Email protocol & courtesy
Email protocol & courtesyEmail protocol & courtesy
Email protocol & courtesy
 

Kürzlich hochgeladen

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Kürzlich hochgeladen (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Netiquette - Basic Guidelines

  • 1. Netiquette: Guidelines You Should Follow Netiquette Tutorial 2
  • 2. What is Netiquette? Rules 1 – 7 and why they are important Where can I go to learn more? Overview
  • 3. “Netiquette” is an abbreviation for “Internet etiquette” Simply stated, Netiquette is the do’s and don’ts of online communication What is Netiquette?
  • 4. Using all uppercase characters is considered shouting Use proper sentence case (i.e. the standard capitalization of an English sentence) Rule #1: Do not use ALL CAPS
  • 5. Use descriptive and specific subject lines Include your class and section number Focus on one subject per message If you veer off onto another topic, update the subject line Include a signature block at the end of your message Rule #2: Complete the Subject Line
  • 6. Ensure that your messages are professional Are well-written and free of typographical and grammatical errors convey the correct tone Rule #3: Ensure that your messages are professional and well-written
  • 7. Be aware of the policies related to the computers and communication systems you are using You more than likely have signed a computer and/or network usage agreement (“Acceptable Use Policy (AUP)”) at your school or place of employment Computers and communication systems made available to you in the academic or business setting are for “business purposes only” You should not assume you have personal privacy rights regarding your electronic communications in these settings Rule #3 – Guideline #1Do not send personal messages
  • 8. Stay on topic Convey your message effectively and efficiently Rule #3 – Guideline #2Be concise and clear
  • 9. Trendy abbreviations or “Netspeak” are cryptic and only serve to confuse the recipient Some conventions to show emotion (e.g. emoticons) are considered acceptable Rule #3 – Guideline #3Don’t use “Netspeak” Examples of emoticons: :-) happy face :) happy face – no nose :-( sad face :( sad face – no nose ;-) wink Examples of “Netspeak”: TTFN ta-ta for now PLZ please BTW by the way IMHO in my humble opinion LOL laughing out loud
  • 10. Carefully proofread your messages to check them for mistakes Use the “spell check” tool Rule #3 – Guideline #4Make sure your messages are error-free
  • 11. Heated messages are called flames If you are angry, stressed, or frustrated, you should wait to compose your message so that you do not get into a “flame war” Rule #3 – Guideline #5Don’t respond when you are angry or frustrated
  • 12. Don’t say things in an electronic communication that you would not say in a face-to-face situation When you have to resolve a conflict or provide feedback, face-to-face communication may be a better choice Rule #3 – Guideline #6Don’t say it if you wouldn’t say it face-to-face
  • 13. Be careful when using sarcasm and humor – it is often misinterpreted Rule #3 – Guideline #7Avoid sarcasm and humor
  • 14. Ask yourself if a message warrants a response If a response is necessary, most times it is good enough to reply to the person who generated the original message Reply-to-all only if absolutelynecessary Rule #4: Avoid replying to a message unless it is purposeful
  • 15. SPAM is considered an abuse of electronic messaging systems SPAM includes chain e-mails, urban legends, charity requests, e-mails about lost children, advertising, etc. Rule #5: Do not send SPAM Ensure the messages you send or post do not fall into the category of SPAM - check their validity at Web sites like http://www.snopes.com/http://www.truthorfiction.com//http://www.breakthechain.org/
  • 16. Be frugal with bandwidth Know that some people still use slower modems, dial-up connections, and/or older computers Tell your recipients if you have included file attachments Rule #6: Avoid sending large files and attachments
  • 17. Share what you know but do check your facts Know when formality is necessary and appropriate Address your professors and fellow students in the appropriate manner Rule #7: Know your audience and your content
  • 18. References Adams, T., & Scollard, S. (2005). Internet Effectively: A Beginner's Guide to the World Wide Web. Boston: Pearson Education, Inc. Netiquette. (n.d.). Retrieved July 6, 2009, from Northern Virginia Community College - Extended Learning Institute: http://eli.nvcc.edu/orientation/netiquette.htm Netiquette Home Page. (n.d.). Retrieved July 6, 2009, from Netiquette Home Page - A Service of Albion.com: http://www.albion.com/netiquette/ Spam - Wikipedia, the free encyclopedia. (n.d.). Retrieved July 6, 2009, from Wikipedia, the free encyclopedia: http://en.wikipedia.org/wiki/SPAM Taylor, T. (2007). 100% Information Literacy Success. Clifton Park: Thomson Delmar Learning.