Save
EMP tech
Save
Share
Learn
Content
Leaderboard
Learn
Created by
NeutralToad8092
Visit profile
Cards (27)
Think before Click
Don't hesitate to think before clicking
Update Online Information
Don't leave inaccurate information online
Respond to Emails Promptly
In doing this, you can easily check whether the emails you received are spams,
Fact Check Before Reposting
If you aren't sure of the facts that you're going to repost, email it to someone who does know or can find out.
Respect People's Privacy
One example is when you send email to multiple recipients
Choose
Friends
Wisely
It is insulting to be dropped from someone's friend list on a social media site.
Don't Exclude Others
Don't let others feel that they are the one you are talking
Share With Discretion
Avoid sending naked sexy pictures,
Use
Respectful Language
Avoid name-calling, cursing, expressing deliberately offensive opinions.
Make
Real People
a
Priority
If you are talking personally and face to face with someone, stop browsing or chatting with anybody else in your cellphone.
Netiquette
is a combination of the words network and etiquette you sent and is defined as a set of rules for acceptable online behavior.
Online ethics
focuses on the acceptable use of online resources
Flaming
is the act of saying mean things online
Online Predation
is the act of engaging an underage minor into inadoropriate sexual relationships
Cyberbullying
bullying
that occurs in digital devices
Cyberstalking
is the same as physical stalking
Hacker
clever or expert programmer
Pop-ads
Type of window that appears on top of (over) the browser window
Spyware
software that "spies" on your computer
Computer Viruses
small programs or scripts that can negatively affect the health of your computer.
Pharming
a scamming practice in which malicious code is installed
Phishing
a deceitful practice of getting your personal information
Email Spoofing
is the creation of emails with a forged sender address.
Spam Mail
Usually unsolicited commercial email
Republic
Act
10173
or the Data Privacy Act of 2012
that is to protect the fundamental human right of privacy
Private Information
is your sensitive personal information
Preston
according to _ digital medias uses electronic devices