0% found this document useful (0 votes)
14 views

Netiquette qb (1)

Uploaded by

sshreyakam365.0
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views

Netiquette qb (1)

Uploaded by

sshreyakam365.0
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Unit 1

1. Define Netiquette. Rules of netiquette.


2. Define etiquette. Explain history of netiquette.
3. Explain types of netiquette.
4. Define netiquette. Explain importance of netiquette.
5. Define etiquette. Explain netiquette for commercial online service.
6. Explain Netiquette for sender and receiver.

Unit 2
1. Explain email and its advantages and disadvantages.
2. Explain structure of email.
3. Explain email and its usage
4. Explain netiquette for online discussion group.
5. Explain netiquette for information retrieval.
6. Explain netiquette for copyrights.
7. Explain elements of emails.
8. Explain contents of emails
9. Explain email sending, replying, forwarding rules.
10. Explain The Art of Flaming.

Unit 3
1. Explain egregious violations of Netiquette.
2. Explain electronic mail at work place.
3. Explain threats in cyberspace.
4. Explain spamming and pornography in cyberspace.
5. Explain cyberspace and netiquette for internet.
6. Explain the given terms
i) Email harassment
ii) Email bombing.
iii) Cyberspace predators
iv) Electronic forgery
v) Chain letters

Unit 4
1. Explain kids in cyberspace
2. Explain things to watch out for in netiquette.
3. Explain netiquette for school.
4. Explain cyber rules for home.
5. Explain internet safety rules.
6. Explain netiquette at home.
7. Explain netiquette in social media.
8. What to do and not to do in internet.
Unit 5
1. Explain threats in copyrights.
2. Explain remedies for copyright infringement.
3. Explain encryption and its types.
4. Explain cyber security.
5. Explain email privacy.
6. Explain copyrights
7. Explain encryption.
8. Explain Indian copyright act and its perspective.
9. Explain types of encryption.

You might also like