WHAT IS NETIQUETTE? common courtesy once posting your views to on-line NETIQUETTE refers to a collection of rules that discussion teams. governs what conduct is socially acceptable in a web DO’S or digital scenario. It’s a social code of network o Respect other people’s privacy. communication. Netiquette is a set of rules for o Verify facts before posting. behaving o Check messages and respond promptly. properly on-line. It represents the importance of correct manners DON’T’S and behavior on-line. In general, netiquette is that the o Name-call or express offensive opinions. set of skilled and social etiquettes practiced and o Post private or embarrassing images or advocated in transmission over any electronic network. Common pointers embody being courteous comments. o Exclude people or talk behind their back. and precise, and avoiding cyber-bullying. Netiquette additionally dictates that users ought to 10 BASIC RULES OF NETIQUETTE OR INTERNET adapt copyright laws and avoid over victimization ETIQUETTE emoticons. It could be a short type of network rule or 1. Make Real People net rule. The word netiquette could be a combination a Priority of ‘net’ (from internet) and ‘etiquette’. It suggests that 2. Use Respectful Language respecting alternative users’ views and displaying 3. Share with Discretion common courtesy once posting your views to on-line 4. Don't Exclude Others discussion teams. 5. Choose Friends Wisely 6. Respect People's Privacy The word netiquette could be a combination of ‘net’ 7. Fact Check Before Reposting (from internet) and ‘etiquette’. It suggests that 8. Don't Spam respecting alternative users’ views and displaying 9. Respond to Emails and Texts Promptly 10. Update Online Information now, or at any point in the future, don’t post it online. 4. Don’t Exclude Your Audience 1. Remember That Real People Take Priority If you have an in-joke to share with one other person, If someone is in the room with you, stop what you are or a small number of people in a larger online group, doing and look at them. And don’t answer your cell send them a private message. Don’t make everyone phone unless it is to tell the person on the other end else feel left out by posting an obscure comment to that you will call them right back. This is also true of your Facebook status, forum, or Instagram story. public places, such as restaurants, public transit, 5. Don’t “Friend” Then “Unfriend” People stores, elevators, and libraries. Avoid taking phone No one believes you have 1,000 friends, but it is still calls and having conversations in these shared insulting to be dropped from someone’s friend list. spaces. Think about it before adding them or accepting their 2. If You Wouldn’t Say It to Someone’s Face, Don’t invitation. If you want to stay in touch for professional Say It Online reasons, tell them you only use Facebook for close Name-calling, cursing, expressing deliberately personal friendships, and join LinkedIn or another offensive opinions— if you wouldn’t do it to the face professional networking site for more distant contacts. of anyone who might conceivably see what you write, 6. Don’t Overload System Resources with Enormous don’t write it. This goes for any social media site, Files forum, chat room, or email message, even if you think Overloading an email crashes receivers' server, it it can’t be traced back to you. It can. depletes their inbox quota, so their emails get 3. If You Wouldn’t Show It in Public, Don’t Share It bounced for a week before they realize, it or use up Online the last bit of space they needed to complete an Naked sex pictures, drunk pictures, drug use pictures, important assignment. unedited home video— if you would have a problem 7. Respect People’s Privacy with your boss, your parents, or your kids seeing it Don't forward information sent to you without checking with the original sender first or always ask do not or have restricted access. Before the late for their consent. twentieth century, digital divide referred principally to the division between those with and without phone access. 8. Don’t Repost Without Checking the Facts The digital divide generally exists between those in If you aren't sure of the facts, email it to someone cities and people in rural areas; between the who does know or can find out. Or do a search on educated Google or snopes.com socioeconomic groups; and, globally, between the 9. Check and Respond to Email Promptly more and less industrially developed nations. Even Have the courtesy to reply to their message within a among populations with some access to technology, few days. If it is going to take longer to reply, email the digital divide can be evident in the form of lower- them and tell them that. By all means, ignore and performance delete spam, unsolicited messages, and crazy stuff. connections, lower-priced connections such as dial- 10. Update Online Information That People Depend up, and limited access to subscription-based content Upon (Rouse, 2014) and the computers, uneducated; lower-speed between wireless Don't leave inaccurate information online just because you can't be bothered to update your COMPUTER ADDICTION website. A disorder in which the individual turns to the Internet or plays computer games to change moods, Digital Divide, Addiction, and Bullying overcome anxiety, deal with depression, reduce DIGITAL DIVIDE isolation or loneliness, or distract themselves from Digital divide could be a term that refers to the gap overwhelming problems. The elderly, as well as between demographics and regions that have children and adolescents, are particularly vulnerable access to trendy info and technology, and people that because they may not realize the extent of their dependency. In many instances, individuals with the same people. computer addiction may seek help for another • Repetition: Bullying behaviors happen more than condition, such as depression, phobias, or other once or have the potential to happen more than once. addictions (Shiel, 2018). Bullying includes actions such as making threats, spreading rumors, attacking someone physically or verbally, and excluding someone from a group on purpose. TYPES OF BULLYING-There are three types of BULLYING bullying: Stopbullying.org (2019) defines bullying as unwanted, • Verbal bullying is saying or writing means things. aggressive behavior among school aged children Verbal bullying includes: that involve a real or perceived power imbalance. The o Teasing behavior is repeated, or has the potential to be o Name-calling repeated, over time. Both kids who are bullied and o Inappropriate sexual comments who bully others may have serious, lasting problems. o Taunting o Threatening to cause harm In order to be considered bullying, the behavior must • Social bullying, sometimes referred to as relational be aggressive and include: bullying, involves hurting someone’s reputation or • An Imbalance of Power: Kids who bully use their relationships. Social bullying includes: power—such as physical strength, access to o Leaving someone out on purpose embarrassing information, or popularity—to control o Telling other children not to be friends with or harm others. Power imbalances can change over someone time and in different situations, even if they involve o Spreading rumors about someone o Embarrassing someone in public unlawful or criminal behavior. • Physical bullying involves hurting a person’s body or possessions. Physical bullying includes: The most common places where cyberbullying o Hitting/kicking/pinching occurs are: o Spitting • Social Media, such as Facebook, Instagram, o Tripping/pushing Snapchat, and Twitter o Taking or breaking someone’s things • SMS (Short Message Service) also known as Text o Making mean or rude hand gestures Message sent through devices • Instant Message (via devices, email provider services, apps, and social media messaging features) • Email WHAT IS CYBERBULLYING Cyberbullying, according to stopbullying.com (2019), is bullying that takes place over digital devices like cell phones, computers, and tablets. Cyberbullying can occur through SMS, Text, and apps, or online in social media, forums, or gaming where people can view, participate in, or share content. Cyberbullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone else. It can include sharing personal or private information about someone else causing embarrassment or humiliation. Some cyberbullying crosses the line into Orienteering is a group of sports that require from the undergrowth while allowing freedom of navigational skills using a map and compass to movement, even if it gets wet. navigate from point to point in diverse and usually 4. Running shoes unfamiliar terrain whilst moving at speed. Light, strong shoes with non-slip soles are required Participants are given a topographical map, usually a to allow a good grip on all types of ground. The specially prepared orienteering map, which they use orienteering will encounter all types of surfaces, to find control points including mud and bare rock. ORIENTEERING EQUIPMENT 5. Control card 1. Map The control card is given to you at the start of an Any kind of map may be used for orienteering (even event with the map. It is used to prove that you have a street map), but the best ones are detailed five- visited all the control points in the right order. At each color topographic maps developed especially for the control point, there will be either an electronic device sport. Orienteering maps show many topographic to record that you were there, or a manual hole punch features, including boulders, cliffs, ditches, and device to mark your card. fences, in addition to the elevation, vegetation, and Other trails. The map is provided by the organizer. It also Nonessential items that you should consider shows the course with all the control points which taking to an event are sunscreen, hat, drink bottle, must be visited. towel, pre- and post-exercise snack. 2. Compass A compass is vitally important for correct navigation. There is a wide variety in quality and size that may be purchased. 3. Attire It is a lightweight, stretchy suit which protects you Orienteering Activities 1. Morse code Morse code is a method used in telecommunication to encode text characters as standardized sequences of two different signal durations, called dots and dashes or dits and dahs. Morse code is named after Samuel Morse, an inventor of the telegraph. 2. Knot Tying The definition of a knot is the looping and tying of a piece of string or rope, or the place where a tree limb joins the trunk.