Netiquette. IT Engineering II Instructor: Ali B. Hashemi

Size: px
Start display at page:

Download "Netiquette. IT Engineering II Instructor: Ali B. Hashemi"

Transcription

1 Netiquette IT Engineering II Instructor: Ali B. Hashemi 1 1

2 Ethics in Networking!? 2 2

3 Netiquette Etiquette: the formal rules for polite behaviour in society or in a particular group. Netiquette is network etiquette: the do's and don'ts of online communication. Netiquette covers both common courtesy online and the informal "rules of the road" of cyberspace. In other words, Netiquette is a set of rules for behaving properly online. 3 3

4 What do you do if someone sends you an that makes you feel uncomfortable? 4 4

5 Language What should you do if someone uses inappropriate language in an ? 5 5

6 Feelings What should you do if someone writes something that is meant to hurt someone else s s feelings? Remember the web s golden rule: Remember, there is a person there. s, comments in chat rooms, and instant messages are read by real people with real feelings. 6 6

7 Netiquette ~ Law There are many rules of netiquette, but some happen to be laws too. No spamming No spoofing No phishing No flaming 7 7

8 HUH???? 8 8

9 SPAMMING Definition: the act of sending unsolicited electronic messages in bulk. (Dictionary.LaborlawTalk.com) 9 9

10 Types of SPAM spam: unsolicited . Forum spam: posting advertisements or useless posts on a forum. Newsgroup spam: advertisement and forgery on newsgroups. Spam in blogs: posting random comments or promoting commercial services to blogs, wikis, guestbooks. Messaging spam ("SPIM"): use of instant messenger services for advertisement or even extortion. Spamdexing: manipulating a search engine to create the illusion of popularity for webpages

11 What is SPAMminess? The original approaches were fairly mundane keyword matching systems. Say the wrong thing and your message is relegated to the bit bucket

12 Dilbert & Spam 12 12

13 SPOOFING Definition: A technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host.(webopedia) 13 13

14 SPOOFING (cont.) spoofing A term used to describe fraudulent activity in which the sender address and other parts of the header are altered to appear as though the originated from a different source commonly used for spam and phishing to hide the origin of an message 14 14

15 SPOOFING (cont.) Website spoofing the act of creating a website, as a hoax, with the intention of misleading readers that the website has been created by a different person or organisation. Normally, the website will adopt the design of the target website and sometimes has a similar URL

16 SPOOFING (cont.) Referer spoofing the sending of incorrect referer information along with an HTTP request, sometimes with the aim of gaining unauthorized access to a web site. It can also be used because of privacy concerns, as an alternative to sending no referer at all

17 SPOOFING (cont.) IP (Internet Protocol) address spoofing The creation of IP packets with a forged (spoofed) source IP address with the purpose of concealing the identity of the sender or impersonating another computing system

18 PHISHING webpage spoofing Definition: The act of sending an to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. (Webopedia) Phishing attacks generally use spoofing as a strategy but spoofing attacks are not necessarily phishing 18 18

19 A Geocities web page duplicating the Yahoo! login page 19 19

20 FLAMING Definition: posting messages that are deliberately hostile and insulting, usually in the social context of a discussion board. (Answers.com) 20 20

21 Borrowing Is it ever right to borrow or copy someone else s pictures or writing without giving them credit? Cutting and Pasting Others Work Is Okay as Long as You Give Credit Where Credit Is Due Cite Your Sources! 21 21

22 The Web Makes Us All Neighbors Remember to treat your web neighbors the way you would like to be treated. s are read by real people with real feelings

23 Online Resources GUIDELINES.html

24 The Core Rules of Netiquette 24 24

25 Rule 1: Remember the Human The golden rule: Do unto others as you'd have others do unto you. Easy to misinterpret meaning of words. Lack of facial expression, gestures and tone of voice to convey meaning. Would you say it to the person's face? 25 25

26 Rule 1: Remember the Human (cont.) When you communicate through cyberspace your words are written Any message you send could be saved or forwarded by its recipient. You don't have to be engaged in criminal activity to want to be careful! You have no control over where it goes. It is unethical to forward a message without asking permission of the originator of the message. Do not make changes to someone else's message and pass it on without making it clear where you have made the changes. would be misrepresentation. Use the BCC -Blind Carbon Copy- function when sending a message to a large group of contacts especially if the recipients of your mail do not know each other

27 Rule 2: Stick to real-life standards of behavior Different standards of behavior BUT not lower than in real life. Be ethical encountering an ethical dilemma in cyberspace, consult the code you follow in real life. If you use shareware, pay for it. encourages more people to write shareware. The few dollars probably won't mean much to you, but they benefit all of cyberspace in the long run. Breaking the law is bad Netiquette

28 Rule 3: Know where you are in cyberspace Netiquette varies from domain to domain. What's perfectly acceptable in one area may be dreadfully rude in another. Important: know where you are! Lurk before you leap take a look around. Spend a while listening to the chat or reading the archives. Get a sense of how the people who are already there act. Then go ahead and participate

29 Rule 4: Respect other people's time and bandwidth Bandwidth is the information-carrying capacity of the wires and channels that connect everyone in cyberspace. Storage capacity of a host system. If you accidentally post the same note to the same newsgroup five times!, you are wasting both time (of the people who check each copy) and bandwidth (by sending repetitive information over the wires and requiring it to be stored somewhere)

30 Rule 4: Respect other people's time and bandwidth(cont.) You are not the center of cyberspace! Don t expect instant responses to all your questions. Don't assume that all readers will agree with your passionate arguments. Ensure your message is worth the time it takes to open it. Before you copy people on your messages, ask yourself whether they really need to know. If the answer is no, don't waste their time. If the answer is maybe, think twice before you hit the send key

31 Rule 5: Make yourself look good online Take advantage of your anonymity. You won't be judged by race, color, weight, age. However, You will be judged by the quality of your writing. spelling and grammar do count. Know what you're talking about and make sense. Pay attention to the content of your writing. Ensure your notes are clear and logical. Be pleasant and polite. Avoid offensive language

32 Rule 6: Share expert knowledge Don't be afraid to share what you know. The strength of cyberspace is in its numbers. The Internet is to share information. If you ask a question and anticipate a lot of answers Share the results If you re an expert, or you've researched a topic that you think would be of interest to others: Write it up and post it. Sharing your knowledge is fun. And it makes the world a better place

33 Rule 7: Help keep flame wars under control Flaming is what people do when they express a strongly held opinion without holding back any emotion. Netiquette does not forbid flaming! Flaming is a long-standing network tradition (and Netiquette never messes with tradition!). Flames can be lots of fun, both to write and to read! The recipients of flames sometimes deserve the heat! Netiquette does forbid the perpetuation of flame wars Can dominate the tone and destroy the camaraderie of a discussion group

34 Rule 8: Respect other people's privacy You d never snoop through your colleagues' desk drawers, so naturally you wouldn't read their either. Failing to respect other people's privacy is not just bad Netiquette! It could also cost you your job! 34 34

35 Rule 9: Don't abuse your power Some people in cyberspace have more power than others! experts in every office, and system administrators. Knowing more than others, or having more power than they do, does not give you the right to take advantage of them. For example, sysadmins should never read private

36 Rule 10: Be forgiving of other people s mistakes Everyone was a newbie once. When someone makes a mistake be kind about it. If it's a minor error, you may not need to say anything. Even if you feel strongly about it, think twice before reacting. Having good manners doesn't give you license to correct everyone else. If you inform someone of a mistake: point it out politely preferably by private rather than in public

37 Security Is Important, So You May Want To Follow These Directions 37 37

38 Passwords Should you tell your password to anyone? Why or why not? 38 38

39 Strangers What should you do if a stranger asks you questions? What if a stranger asks to meet you in person? What should you do? 39 39

Netiquette. IT Engineering II. IT Engineering II Instructor: Ali B. Hashemi

Netiquette. IT Engineering II. IT Engineering II Instructor: Ali B. Hashemi Netiquette IT Engineering II IT Engineering II Instructor: Ali B. Hashemi 1 1 Netiquette "Netiquette" is network etiquette, the do's and don'ts of online communication. Netiquette covers both common courtesy

More information

2.4.2 List out the Dos and Don ts while communicating online.

2.4.2 List out the Dos and Don ts while communicating online. NOTES 2.4 Netiquette 2.4.1 Explain the meaning of Netiquette. Netiquette is etiquette on the Internet. Since the Internet changes rapidly, its netiquette does too, but it's still usually based on the Golden

More information

Intellectual Property Rights

Intellectual Property Rights Intellectual Property Rights Copyright The U.S. Copyright Act, 17 U.S.C. 101-810, is Federal legislation enacted by Congress under its Constitutional grant of authority to protect the writings of authors.

More information

Circle Link 1 "Know Before You Go" Web Literacy Tips:

Circle Link 1   Know Before You Go Web Literacy Tips: 5 th Grade Scavenger Hunt Content Circle Link 1 http://pbskids.org/privacy/literacytips.html "Know Before You Go" Web Literacy Tips: You know not to talk to strangers on the street but what about on the

More information

EADS up. stop think connect

EADS up. stop think connect EADS up stop think connect You text, you play games, you share photos and video. You update your status, you post comments, you probably spend some time in a virtual world. Being online connected through

More information

NETIQUETTE GUIDE FOR ONLINE LEARNING GADSDEN STATE COMMUNITY COLLEGE TEACHING & LEARNING CENTER

NETIQUETTE GUIDE FOR ONLINE LEARNING GADSDEN STATE COMMUNITY COLLEGE TEACHING & LEARNING CENTER NETIQUETTE GUIDE FOR ONLINE LEARNING GADSDEN STATE COMMUNITY COLLEGE TEACHING & LEARNING CENTER WHAT IS NETTIQUETTE? According to the BBC s WebWise Team (2012), the word netiquette is a combination of

More information

(Photos and Instructions Based on Microsoft Outlook 2007, Gmail, Yahoo! Mail, and Hotmail)

(Photos and Instructions Based on Microsoft Outlook 2007, Gmail, Yahoo! Mail, and Hotmail) Specific instructions on how to compose a professional e-mail using send and reply options, basic e-mail components, appropriate wording, content, tone, and examples of what not to do. (Photos and Instructions

More information

Introduction to

Introduction to Introduction to Email gcflearnfree.org/print/email101/introduction-to-email Introduction Do you ever feel like the only person who doesn't use email? You don't have to feel left out. If you're just getting

More information

Your message is sent from your computer to a server (like the post office) where the

Your message is sent from your computer to a server (like the post office) where the E-mail it s convenient, cheap and easy. Today, it is the most rapidly growing means of communication. All e-mail programs are slightly different. Gmail, Hotmail, and Yahoo! are some popular e-mail programs.

More information

Glossary

Glossary Glossary www.cybersmart.gov.au/cyberquoll CyberQuoll Internet Safety Education for Primary School Students, Parents Guide Website: www.cybersmart.gov.au/cyberquoll Source: Commonwealth of Australia 2009

More information

ONLINE SAFETY. Messaging, , Vlogging and Sexting

ONLINE SAFETY. Messaging,  , Vlogging and Sexting ONLINE SAFETY Messaging, email, Vlogging and Sexting www.eitts.co.uk Contents WhatsApp & Messaging Email Vlogging Sexting THE RISKS People online are not necessarily who they say they are or seem to be.

More information

Online Communication. Chat Rooms Instant Messaging Blogging Social Media

Online Communication.  Chat Rooms Instant Messaging Blogging Social Media Online Communication E-mail Chat Rooms Instant Messaging Blogging Social Media Advantages: Reduces cost of postage Fast and convenient Eliminates phone charges Disadvantages: May be difficult to understand

More information

Computer Basics 4 Basics Revision 3 ( )

Computer Basics 4  Basics Revision 3 ( ) Computer Basics 4 E-mail Basics Revision 3 (1-10-2014) E-MAIL E-mail or electronic mail allows you to send and receive messages from anyone in the world with an e-mail address. To access e-mail you need

More information

Implications of an Information Society Final Exam: Tuesday, 4/29 from 8am-noon in 014

Implications of an Information Society Final Exam: Tuesday, 4/29 from 8am-noon in 014 Implications of an Information Society Final Exam: Tuesday, 4/29 from 8am-noon in 014 Computers in our day-to-day lives Communication Email, Instant Messaging Our identity, a virtual face Facebook, Blogs,

More information

Internet and Policy

Internet and  Policy CITY OF JOHNSON CITY Internet and E-mail Policy Revision Number: 4 Page: 1 of 4 1.0 POLICY STATEMENT: The purpose of the Internet Policy is to implement guidelines for the establishment, administration,

More information

Online Communication. Chat Rooms Instant Messaging Blogging Social Media

Online Communication.  Chat Rooms Instant Messaging Blogging Social Media Online Communication E-mail Chat Rooms Instant Messaging Blogging Social Media { Advantages: { Reduces cost of postage Fast and convenient Need an email address to sign up for other online accounts. Eliminates

More information

Conveying Emotion. Chapter 12: Computers In Polite Society: Social Implications of IT. Improving the Effectiveness of . Problems with

Conveying Emotion. Chapter 12: Computers In Polite Society: Social Implications of IT. Improving the Effectiveness of  . Problems with Chapter 12: Computers In Polite Society: Social Implications of IT Fluency with Information Technology Third Edition by Lawrence Snyder Improving the Effectiveness of Email Problems with email: Conveying

More information

Entomology)320)Honey)Bee)Biology) Spring)2014))

Entomology)320)Honey)Bee)Biology) Spring)2014)) Entomology)320)Honey)Bee)Biology) Spring)2014)) Section:)700(CRN:)16072)) Instructor:)Dr.)Bradley)N)Metz)(bmetz@tamu.edu)) Course)Introduction) Welcome'to'Texas'A&M s'introductory'course'on'honey'bee'biology,'evolution,'

More information

Netiquette Vocabulary

Netiquette Vocabulary Flame Spam Mail Bomb Newbie Lurk Shouting FAQ Netiquette Vocabulary To send an insulting or derogatory message to another person or people. Consider any message that comments on another person or their

More information

Your security on click Jobs

Your security on click Jobs Your security on click Jobs At Click Jobs is a trading name of Raspberry Recruitment Limited, we're committed to helping you find the right job in a safe and secure environment. On these pages, you can

More information

FACEBOOK SAFETY FOR JOURNALISTS. Thanks to these partners for reviewing these safety guidelines:

FACEBOOK SAFETY FOR JOURNALISTS. Thanks to these partners for reviewing these safety guidelines: FACEBOOK SAFETY FOR JOURNALISTS Thanks to these partners for reviewing these safety guidelines: 10 STEPS TO KEEP YOURSELF SAFE Journalists are using Facebook in innovative ways to do their jobs, tell stories,

More information

Frequently Asked Questions- Communication, the Internet, Presentations Question 1: What is the difference between the Internet and the World Wide Web?

Frequently Asked Questions- Communication, the Internet, Presentations Question 1: What is the difference between the Internet and the World Wide Web? Frequently Asked Questions- Communication, the Internet, Presentations Question 1: What is the difference between the Internet and the World Wide Web? Answer 1: The Internet and the World Wide Web are

More information

Chapter 13: The IT Professional

Chapter 13: The IT Professional Chapter 13: The IT Professional IT Essentials v6.0 ITE v6.0 1 Chapter 13 - Sections & Objectives 13.1 Communication Skills and the IT Professional Explain why good communication skills are a critical part

More information

ETIQUETTE TIPS. Traci Kasten. Executive Assistant Chief Operations Office x179

ETIQUETTE TIPS. Traci Kasten. Executive Assistant Chief Operations Office x179 EMAIL ETIQUETTE TIPS Traci Kasten Executive Assistant Chief Operations Office 896-0667 x179 tkasten@rrps.net SENDING EMAILS Make sure your email contains a courteous greeting and closing. Address your

More information

(short for electronic mail) is a fast and convenient way to communicate with others. You can use to:

(short for electronic mail) is a fast and convenient way to communicate with others. You can use  to: Everything you ever wanted to know about E-Mail E-mail (short for electronic mail) is a fast and convenient way to communicate with others. You can use e-mail to: Send and receive text messages. You can

More information

Anti-Cyber Bullying Policy.

Anti-Cyber Bullying Policy. Anti-Cyber Bullying Policy. Bullying, in any form, is an issue that we all take very seriously at Bredon School. We accept that victims can become depressed and suicidal, and even take their own lives.

More information

Security Awareness. Presented by OSU Institute of Technology

Security Awareness. Presented by OSU Institute of Technology Security Awareness Presented by OSU Institute of Technology Information Technologies Division Security Awareness Topics Social Engineering Phishing Social Networks Displaying Sensitive Information Wireless

More information

Who We Are! Natalie Timpone

Who We Are! Natalie Timpone Who We Are! Natalie Timpone Manager of Security Business Management Office Enterprise Security Awareness Manager Carmelo Walsh Security, Risk, and Compliance Security Awareness Subject Matter Expert Who

More information

Twitter Basics at the Deerfield Public Library

Twitter Basics at the Deerfield Public Library Twitter Basics at the Deerfield Public Library Class Outline: 1) What is Twitter? 2) Setting up an account and profile 3) Terms you should know & examples 4) How do I decide what to write? 5) Q & A Expected

More information

Computer Foundation Skills. Internet Webmail

Computer Foundation Skills. Internet Webmail Computer Foundation Skills Internet Webmail Table of Contents Contents Webmail... 4 Gmail Create an account... 5 Gmail - Passwords... 6 Gmail - Inbox... 7 Gmail View message... 7 Gmail Compose mail...

More information

This Policy applies to all staff and other authorised users in St Therese School.

This Policy applies to all staff and other authorised users in St Therese School. St. Therese School Computer and Internet Policy STAFF Policy Statement All staff and other authorised users of St Therese information and communications technology are to use the technology only in a way

More information

The Internet and the World Wide Web Lesson 3 Communicating on the Internet

The Internet and the World Wide Web Lesson 3 Communicating on the Internet The Internet and the World Wide Web Lesson 3 Communicating on the Internet Edited by J. Howard, R. Scott & C. Rhodes 09/11 Lesson 3: Communicating on the Internet Objectives After completing this lesson,

More information

Agenda. 1. Cyberwellness Talk 2. How to Login to LMS

Agenda. 1. Cyberwellness Talk 2. How to Login to LMS Agenda 1. Cyberwellness Talk 2. How to Login to LMS Cyberwellness Talk 1. Internet & Gaming Addiction 2. Netiquette 3. Danger of Cyber Contacts 4. Dangers of Facebook Internet & Gaming Addiction Definition

More information

3.5 SECURITY. How can you reduce the risk of getting a virus?

3.5 SECURITY. How can you reduce the risk of getting a virus? 3.5 SECURITY 3.5.4 MALWARE WHAT IS MALWARE? Malware, short for malicious software, is any software used to disrupt the computer s operation, gather sensitive information without your knowledge, or gain

More information

The Basics of Netiquette

The Basics of Netiquette The Basics of Netiquette Etiquette is a code of social behavior. It includes behavior expectations or norms within a society, social class, or group. Netiquette is how our social codes of behavior look

More information

Binarytech Digital Education Karta Allahabad ( Notes)

Binarytech Digital Education Karta Allahabad ( Notes) Email Email is a service which allows us to send the message in electronic mode over the internet. It offers an efficient, inexpensive and real time mean of distributing information among people. E-Mail

More information

101 Etiquette Tips

101  Etiquette Tips 101 Email Etiquette Tips It is important that whether for business or personal use that you follow the basics of email etiquette. This document covers for you the top tips for email etiquette that everyone

More information

MPEG Frame Types intrapicture predicted picture bidirectional predicted picture. I frames reference frames

MPEG Frame Types intrapicture predicted picture bidirectional predicted picture. I frames reference frames MPEG o We now turn our attention to the MPEG format, named after the Moving Picture Experts Group that defined it. To a first approximation, a moving picture (i.e., video) is simply a succession of still

More information

The ICT4me Curriculum

The ICT4me Curriculum The ICT4me Curriculum About ICT4me ICT4me is an after school and summer curriculum for middle school youth to develop ICT fluency, interest in mathematics, and knowledge of information, communication,

More information

The ICT4me Curriculum

The ICT4me Curriculum The ICT4me Curriculum About ICT4me ICT4me is an after school and summer curriculum for middle school youth to develop ICT fluency, interest in mathematics, and knowledge of information, communication,

More information

Student E-Safety Induction

Student E-Safety Induction Central College Nottingham Student E-Safety Induction Academic Year 2015-16 Training & Learning Technologies September 2015 E-Safety It is important to the College that all students know how to stay safe

More information

ASKnLearn Learning Management System Parents Talk Punggol Green Primary School 2 & 3 Jan 2014

ASKnLearn Learning Management System Parents Talk Punggol Green Primary School 2 & 3 Jan 2014 ASKnLearn Learning Management System Parents Talk Punggol Green Primary School 2 & 3 Jan 2014 Agenda 1. Cyberwellness Talk 2. How to Login to LMS Cyberwellness Talk 1. Internet & Gaming Addiction 2. Netiquette

More information

Using Gmail. Created by the Columbia Basin Alliance for Literacy. Margaret Sutherland

Using Gmail. Created by the Columbia Basin Alliance for Literacy. Margaret Sutherland Created by the Columbia Basin Alliance for Literacy This project is funded by Government of Canada s New Horizons for Seniors Program and is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike

More information

s, Texts and Social Media: What Physicians Need to Know

s, Texts and Social Media: What Physicians Need to Know Emails, Texts and Social Media: What Physicians Need to Know 1 Today s Learning Objectives By the end of today s program, you will be able to : Identify the risks to patients privacy which email, text

More information

Rules and Outlines for Replying to Skeptical Correspondence those made in s, social comments, and private messages

Rules and Outlines for Replying to Skeptical Correspondence those made in  s, social comments, and private messages Rules and Outlines for Replying to Skeptical Correspondence those made in emails, social comments, and private messages There are 2 types of skeptics: people whose minds you can change, people whose minds

More information

How to recognize phishing s

How to recognize phishing  s Phishing email messages, websites, and phone calls are designed to steal money, steal data and/or destroy information. Cybercriminals can do this by installing malicious software on your computer or stealing

More information

Online Scams. Ready to get started? Click on the green button to continue.

Online Scams. Ready to get started? Click on the green button to continue. Online Scams Hi, I m Kate. We re here to learn how to protect ourselves from online scams. We ll follow along with Kevin to learn what types of scams are out there, how to recognize the warning signs,

More information

Security and Privacy

Security and Privacy E-mail Security and Privacy Department of Computer Science Montclair State University Course : CMPT 320 Internet/Intranet Security Semester : Fall 2008 Student Instructor : Alex Chen : Dr. Stefan Robila

More information

Home/Network Computing

Home/Network Computing Home/Network Computing How to avoid becoming road kill on the Internet (Information Superhighway) Home Computing not as simple as it used to be almost all computers need to have sys-admin disk drives will

More information

INTERNET SAFETY IS IMPORTANT

INTERNET SAFETY IS IMPORTANT INTERNET SAFETY IS IMPORTANT Internet safety is not just the ability to avoid dangerous websites, scams, or hacking. It s the idea that knowledge of how the internet works is just as important as being

More information

2. VIOLATIONS OF ACCESSHOSTING.COM S ACCEPTABLE USE POLICY. b. Harm to minors. Using the Services to harm, or attempt to harm, minors in any way.

2. VIOLATIONS OF ACCESSHOSTING.COM S ACCEPTABLE USE POLICY. b. Harm to minors. Using the Services to harm, or attempt to harm, minors in any way. 1. INTRODUCTION Accesshosting.com's ("AUP") is intended to help enhance the use of the Access Hosting Service by preventing unacceptable use. All users of Accesshosting.com s Access Hosting Services (the

More information

Discover (n.): This feature surfaces personalized content tailored to your interests.

Discover (n.): This feature surfaces personalized content tailored to your interests. Glossary: General Terms @: The @ sign is used to call out usernames in Tweets: "Hello @twitter!" People will use your @username to mention you in Tweets, send you a message or link to your profile. @username:

More information

An electronic mailing list is a way to distribute information to many Internet users using . It is a list of names and addresses, similar to a

An electronic mailing list is a way to distribute information to many Internet users using  . It is a list of names and addresses, similar to a 1 An electronic mailing list is a way to distribute information to many Internet users using email. It is a list of names and addresses, similar to a traditional mailing list and works using a reflector,

More information

Digital Safety and Digital Citizenship

Digital Safety and Digital Citizenship Digital Safety and Digital Citizenship A Guide for Students The laptop has been given to you as a tool for learning. Use it for that. While doing so, here are some important rules for keeping yourself

More information

Chapter 22: Communication Process Study Guide Matching

Chapter 22: Communication Process Study Guide Matching Chapter 22: Communication Process Study Guide Matching Match the following terms with their definitions. A. barrier B. channel C. decoding D. empathy E. encoding F. feedback G. four Cs of writing H. memo

More information

Written Communication

Written Communication Module 2: Written Communication 1 Your Passport to Professionalism: Module 2 Written Communication Step 1 Learn Introduction Sooner or later, you will need to communicate in writing. You will write down

More information

Internet Concepts ML Study Guide Created by Advisers

Internet Concepts ML Study Guide Created by Advisers Description of Internet Concepts ML: The written objective test may consist of general information about the Internet, world wide web, browsers, e-mail, computer security, ethics, and privacy. 1 It is

More information

Privacy & Cookie Statement

Privacy & Cookie Statement Privacy & Cookie Statement Version: 8 May 2018 Since day 1, WeTransfer has cared a great deal about privacy and respecting our users. We have always had a lean data policy: no sign up, no install, no retargeting.

More information

FAQ: Privacy, Security, and Data Protection at Libraries

FAQ: Privacy, Security, and Data Protection at Libraries FAQ: Privacy, Security, and Data Protection at Libraries This FAQ was developed out of workshops and meetings connected to the Digital Privacy and Data Literacy Project (DPDL) and Brooklyn Public Library

More information

LEARNER I.T. ACCEPTABLE USE POLICY. Learner I.T. Acceptable Use Policy [Type text] Updated November Authorised by ILT Board/Executive.

LEARNER I.T. ACCEPTABLE USE POLICY. Learner I.T. Acceptable Use Policy [Type text] Updated November Authorised by ILT Board/Executive. LEARNER I.T. ACCEPTABLE USE POLICY Learner I.T. Acceptable Use Policy 2012-13 [Type text] Updated November 2011. Authorised by ILT Board/Executive. Learner I.T. Acceptable Use Policy Table of Contents

More information

Chapter 6 Network and Internet Security and Privacy

Chapter 6 Network and Internet Security and Privacy Chapter 6 Network and Internet Security and Privacy Learning Objectives LO6.1: Explain network and Internet security concerns LO6.2: Identify online threats LO6.3: Describe cyberstalking and other personal

More information

101 Etiquette Tips

101  Etiquette Tips 101 Email Etiquette Tips It is important that whether for business or personal use that you follow the basics of email etiquette. This document covers for you the top tips for email etiquette that everyone

More information

Violations of any portion of this policy may be subject to disciplinary action up to and including termination of employment.

Violations of any portion of this policy may be subject to disciplinary action up to and including termination of employment. Page 1 of 6 Policy: All computer resources are the property of Lee County and are intended to be used for approved County business purposes. Users are permitted access to the computer system to assist

More information

Computer Technology. Lesson 2: Internet Communication

Computer Technology. Lesson 2: Internet Communication Computer Technology Lesson 2: Internet Communication Learning Goal: Students will be able to define modern Web technologies. Scale Yourself 4 I can define modern Web technologies. I can teach them to others.

More information

Computer Technology. Scale Yourself. Lesson 2: Internet Communication. Learning Goal: Students will be able to define modern Web technologies.

Computer Technology. Scale Yourself. Lesson 2: Internet Communication. Learning Goal: Students will be able to define modern Web technologies. Computer Technology Lesson 2: Internet Communication Learning Goal: Students will be able to define modern Web technologies. Scale Yourself 4 I can define modern Web technologies. I can teach them to others.

More information

SYLLABUS. CISS 300 Introduction to Information Systems Security Section UNIT CLASS NAME AND TITLE (COURSE CODE):

SYLLABUS. CISS 300 Introduction to Information Systems Security Section UNIT CLASS NAME AND TITLE (COURSE CODE): SYLLABUS CLASS NAME AND TITLE (COURSE CODE): CISS 300 Introduction to Information Systems Security Section 11102 1 UNIT PREREQUISITES: None, but a background in computer networking is highly recommended

More information

Peaceful Pill Forum Rules

Peaceful Pill Forum Rules Peaceful Pill Forum Rules The Exit Peaceful Pill Forums are a private Forum for the purpose of discussing the content of and asking questions in regard to The Peaceful Pill ehandbook. While we encourage

More information

Doctorate of Commissioner Science Thesis on Starting an Online Commissioner Forum. Jim Gray

Doctorate of Commissioner Science Thesis on Starting an Online Commissioner Forum. Jim Gray Doctorate of Commissioner Science Thesis on Starting an Online Commissioner Forum Jim Gray Abstract This Paper is on how to start a Commissioner Forum. The steps I include in here are the ones I used.

More information

TITLE SOCIAL MEDIA AND COLLABORATION POLICY

TITLE SOCIAL MEDIA AND COLLABORATION POLICY DATE 9/20/2010 TITLE 408.01 SOCIAL MEDIA AND COLLABORATION POLICY ORG. AGENCY Department of Communications Approved AFT As more and more citizens in our community make the shift towards, or include the

More information

The Do's and Don'ts of Etiquette

The Do's and Don'ts of  Etiquette EMAIL The Do's and Don'ts of Email Etiquette Image credit: Shutterstock March 25, 2016 Jacqueline Whitmore Author, Business Etiquette Expert and Founder of The Protocol School of Palm Beach When the use

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Why is Cleveland Broadband providing this Policy to me? Cleveland Broadband s goal is to provide its customers with the best Internet service possible. In order to help accomplish

More information

Using web-based

Using web-based Using web-based Email 1. When you want to send a letter to a friend you write it, put it in an envelope, stamp it and put it in the post box. From there the postman picks it up, takes it to a sorting office

More information

Rapid Software Testing Guide to Making Good Bug Reports

Rapid Software Testing Guide to Making Good Bug Reports Rapid Software Testing Guide to Making Good Bug Reports By James Bach, Satisfice, Inc. v.1.0 Bug reporting is a very important part of testing. The bug report, whether oral or written, is the single most

More information

What is epals SchoolMail? Student Accounts. Passwords. Safety. Flag Attachment

What is epals SchoolMail? Student Accounts. Passwords. Safety. Flag Attachment What is epals SchoolMail? http://www.epals.com/ epals Schoolmail is a complete, Internet-based email solution and collaborative toolset designed for the education environment. Student Accounts Students

More information

INTRODUCTION TO Part 3

INTRODUCTION TO  Part 3 TECH SAVVY SENIORS The NSW Tech Savvy Seniors program is a key initiative of the NSW Ageing Strategy and the Telstra Digital Literacy Strategy. Victorian Tech Savvy Seniors is a Seniors Card Age Friendly

More information

The Do s and Don ts of Communicating Effectively

The Do s and Don ts of Communicating Effectively The Do s and Don ts of Communicating Effectively It all started with: Then came verbal communication: Finally, technology was introduced. Webster states: It is. 1. the act or process of communicating;

More information

Professional Communications

Professional Communications Professional Communications Why do we Communicate? To convey information To clarify instructions To request actions To record events To verify arrangements 2 Communication Modes Professional Email Telephone

More information

(c) IKSC 2010 Copying allowed for incidental, classroom purposes. Workshop 2: Playing and Staying Safe Online Student Handouts

(c) IKSC 2010 Copying allowed for incidental, classroom purposes. Workshop 2: Playing and Staying Safe Online Student Handouts Workshop 2: Playing and Staying Safe Online Student Handouts Table of Contents Lesson 1: I Know/I Want to Know 1 Lesson 1: Video Summary: Staying Safe Online, Part 1 2 Lesson 1: Guidelines for Creating

More information

The Anatomy of A FOSS Project

The Anatomy of A FOSS Project The Anatomy of A FOSS Project We heard the historical/ political side What does it mean then to say that something is a FOSS project? What do we think of when we hear that term FOSS project? What are expectations

More information

Web Hosting. Important features to consider

Web Hosting. Important features to consider Web Hosting Important features to consider Amount of Storage When choosing your web hosting, one of your primary concerns will obviously be How much data can I store? For most small and medium web sites,

More information

Digital Workflow 10 Tech Rules to Guide You

Digital Workflow 10 Tech Rules to Guide You Last updated: 10/11/10 Digital Workflow 10 Tech Rules to Guide You Introduction Whether your goal is to become paperless, or just to get more out of the technology you use, you need to (1) find the easy

More information

FAQ. Usually appear to be sent from official address

FAQ. Usually appear to be sent from official  address FAQ 1. What is Phishing Email? A form of fraud by which an attacker masquerades as a reputable entity in order to obtain your personal information. Usually appear to be sent from official email address

More information

WYANDOTTE MUNICIPAL SERVICES ACCEPTABLE USE POLICY

WYANDOTTE MUNICIPAL SERVICES ACCEPTABLE USE POLICY WYANDOTTE MUNICIPAL SERVICES ACCEPTABLE USE POLICY Wyandotte Municipal Services may modify this Acceptable Use Policy at any time without notifying its users. For this reason, Wyandotte Services High Speed

More information

Keystone Acceptable Use Policy

Keystone Acceptable Use Policy Keystone Acceptable Use Policy Keystone Learning Services, ("Keystone") Acceptable Use Policy ("AUP") is intended for Keystone products and services with the goal of protecting Keystone Subsidiaries, Affiliates,

More information

The Table Privacy Policy Last revised on August 22, 2012

The Table Privacy Policy Last revised on August 22, 2012 The Table Privacy Policy Last revised on August 22, 2012 The Table, an online venue through which your organization and its members/employees can connect to better fulfill its mission respects and is committed

More information

Electronic Network Acceptable Use Policy

Electronic Network Acceptable Use Policy Electronic Network Acceptable Use Policy 2016-2017 www.timothychristian.com ELECTRONIC NETWORK ACCEPTABLE USE POLICY Electronic Network This Policy is intended to serve as a guide to the scope of TCS s

More information

Using in Schools

Using  in Schools Using e-mail in Schools Education, Leisure & Lifelong Learning Baglan Information Technology Centre C O N T E N T S Page Background... 1 Teaching e-safety... 1 Using e-mail to enhance teaching and learning...

More information

Fighting Phishing I: Get phish or die tryin.

Fighting Phishing I: Get phish or die tryin. Fighting Phishing I: Get phish or die tryin. Micah Nelson and Max Hyppolite bit.ly/nercomp_sap918 Please, don t forget to submit your feedback for today s session at the above URL. If you use social media

More information

BEST PRACTICES FOR PERSONAL Security

BEST PRACTICES FOR PERSONAL  Security BEST PRACTICES FOR PERSONAL Email Security Sometimes it feels that the world of email and internet communication is fraught with dangers: malware, viruses, cyber attacks and so on. There are some simple

More information

Cyber Security Guide. For Politicians and Political Parties

Cyber Security Guide. For Politicians and Political Parties Cyber Security Guide For Politicians and Political Parties Indian Election Integrity Initiative Design by ccm.design Cover Image by Paul Dufour Helping to Safeguard the Integrity of the Electoral Process

More information

Wimba Pronto. Version 2.0. User Guide

Wimba Pronto. Version 2.0. User Guide Wimba Pronto Version 2.0 User Guide Wimba Pronto 2.0 User Guide Welcome to Wimba Pronto 1 What's New in Wimba Pronto 2.0 2 Getting Started 3 Wimba Pronto System Requirements 3 Creating a New Wimba Pronto

More information

Azon Master Class. By Ryan Stevenson Guidebook #5 WordPress Usage

Azon Master Class. By Ryan Stevenson   Guidebook #5 WordPress Usage Azon Master Class By Ryan Stevenson https://ryanstevensonplugins.com/ Guidebook #5 WordPress Usage Table of Contents 1. Widget Setup & Usage 2. WordPress Menu System 3. Categories, Posts & Tags 4. WordPress

More information

S E R V E R C E N T R E

S E R V E R C E N T R E S E R V E R C E N T R E H O S T I N G Acceptable Use Policy Server Centre Hosting Ltd 28/06/2011 Server Centre Hosting Ltd, The Old Public Hall, 3 Watnall Road, Hucknall, Nottingham, NG15 7LD Acceptable

More information

Internet and Mini.K.G Senior Scientist, FRAD, CMFRI

Internet and  Mini.K.G Senior Scientist, FRAD, CMFRI Internet and E-Mail Mini.K.G Senior Scientist, FRAD, CMFRI Email: mini.anish02@gmail.com 28 Introduction to Internet Internet is a worldwide system of interconnected computer networks. It connects several

More information

EDULEADERSHIP. Handle Every Kind of for Maximum Productivity HOW TO: JUSTIN BAEDER ON HIGH-PERFORMANCE INSTRUCTIONAL LEADERSHIP

EDULEADERSHIP. Handle Every Kind of  for Maximum Productivity HOW TO: JUSTIN BAEDER ON HIGH-PERFORMANCE INSTRUCTIONAL LEADERSHIP EDULEADERSHIP JUSTIN BAEDER ON HIGH-PERFORMANCE INSTRUCTIONAL LEADERSHIP HOW TO: Handle Every Kind of Email for Maximum Productivity Email can be a great tool for school leaders, yet it can also be a terrible

More information

The John Fisher School ICT Policy

The John Fisher School ICT Policy The John Fisher School ICT Policy Responsible: Governors Resources Committee Review Date: May 2018 The need for a policy All The John Fisher School s information communication technology (ICT) facilities

More information

ELECTRONIC MAIL RAYMOND ROSE. Computer Technology Department 2011/12

ELECTRONIC MAIL RAYMOND ROSE. Computer Technology Department 2011/12 ELECTRONIC MAIL RAYMOND ROSE Computer Technology Department 2011/12 ELECTRONIC COMMUNICATION Systems for exchanging information and news were the first applications developed for network communication.

More information

Content Curation Mistakes

Content Curation Mistakes Table of Contents Table of Contents... 2 Introduction... 3 Mistake #1 Linking to Poor Quality Content... 4 Mistake #2 Using the Same Few Sources... 5 Mistake #3 Curating Only Blog Posts... 6 Mistake #4

More information

Family Technology Boundaries:

Family Technology Boundaries: General questions to answer Family Technology Boundaries: How much time per day/week will various technologies be allowed? Can social media be accessed from all devices? What should children do if they

More information

Writing. By: Sohail Ahmed M.A English Literature

Writing. By: Sohail Ahmed M.A English Literature E-mail Writing By: Email writing Email writing has become a large part of modern communication, particularly in business. The world has become much smaller now that we have the ability to send and receive

More information