computernotes part 3
11.3.2 Communication Etiquettes
Digital communication includes email, texting, instant
messaging, talking on the cell phone, audio or video
Remember!!
While surfing the Internet,
we should be cautious
about our personal and
confidential data.
√ Think before sharing
credentials with others
on an online platform.
√ Keep personal
information safe and
protected through
passwords.
Activity 11.2
Find out how to report
about an abusive or
inappropriate post or
about a sender in a
social network?
Ch 11.indd 232 08-Apr-19 12:32:00 PM
2020-21
Societal Impact 233
conferencing, posting on forums, social
networking sites, etc. All these are
great ways to connect with people in
order to exchange ideas, share data
and knowledge. Good communication
over email, chat room and other such
forums require a digital citizen to abide
by the communication etiquettes as
shown in Figure 11.3.
(A) Be Precise
• Respect time: we should not waste
precious time in responding to
unnecessary emails or comments
unless they have some relevance for us. Also, we
should not always expect an instant response as
the recipient may have other priorities.
• Respect data limits: For concerns related to data
and bandwidth, very large attachments may be
avoided. Rather send compressed files or link of
the files through cloud shared storage like Google
Drive, Microsoft OneDrive, Yahoo Dropbox, etc.
(B) Be Polite
Whether the communication is synchronous (happening
in real time like chat, audio/video calls) or asynchronous
(like email, forum post or comments), we should be
polite and non-aggressive in our communication. We
should avoid being abusive even if we don’t agree with
others’ point of view.
(C) Be Credible
We should be cautious while making a comment,
replying or writing an email or forum post as such acts
decide our credibility over a period of time. That is how
we decide to follow some particular person’s forum posts
while ignoring posts of other members of the forum. On
various discussion forums, we usually try to go through
the previous comments of a person and judge their
credibility before relying on that person’s comments.
11.3.3 Social Media Etiquettes
In the current digital era, we are familiar with different
kinds social media and we may have an account on
Facebook, Google+, Twitter, Instagram, Pinterest, or
the YouTube channel. Social media are websites or
Avoid Spam!!
On receiving junk email
(called Spam), neither
reply nor open any
attachment in such
email.
No Permanent Deletion!!
We can post or comment
anything on Internet, and
delete it later.
√ But remember,
it cannot be
permanently deleted.
It is recorded in our
Digital Footprint.
√ This is how many
culprits who spread
hate, bully others or
engage in criminal
activities are traced
and apprehended.
Figure 11.3: Communication etiquettes
Be
Precise
Respect
Time
Respect
Data
Limits
Be
Polite
Be
Credible
Communication Etiquettes
Ch 11.indd 233 08-Apr-19 12:32:00 PM
2020-21
234 Computer Science – Class xi
applications that enable their users
to participate in social networking
by creating and sharing content
with others in the community. These
platforms encourage users to share
their thoughts and experiences through
posts or pictures. In this way users
can interact with other online users of
those social media apps or channels.
This is why the impact and outreach of
social media has grown exponentially.
It has begun to shape the outcome of politics, business,
culture, education and more. In social media too, there
are certain etiquettes we need to follow as shown in
Figure 11.4.
(A) Be Secure
• Choose password wisely: it is vital for social
network users. News of breaching or leakage of user
data from social network often attracts headlines.
Users should be wary of such possibilities and
must know how to safeguard themselves and
their accounts. The minimum one can do is to
have strong and frequently changed password.
Never share personal credentials like username
and password with others.
• Know who you befriend: social networks usually
encourage connecting with users (making friends),
sometime even those whom we don’t know or have
not met. However, we need to be careful while
befriending unknown people as their intentions
possibly could be malicious and unsafe.
• Beware of fake information: fake news, messages
and posts are common in social networks. As a
user, we should be aware of them. With experience,
we should be able to figure out whether a news,
message or post is genuine or fake. Thus, we
should not blindly believe in everything that we
come across on such platforms, we should apply
our knowledge and experience to validate such
news, message or post.
(B) Be Reliable
• Think before uploading: we can upload almost
anything on social network. However, remember
that once uploaded, it is always there in the
remote server even if we delete the files. Hence we
Don’t Meet Up!!
√ Never arrange to
meet an online friend
because it may not
be safe.
√ No matter how
genuine someone is
appearing online,
they might be
pretending and
hiding their real
identity.
Play Safe!!
Think carefully before
sharing personal photos.
Is having the same
password for all your
accounts on different
websites safe?
Think and Reflect
Figure 11.4: Social media etiquettes
Choose password wisely
Know who you befriend
Beware of fake information
Think before you upload
Ch 11.indd 234 07-May-19 9:45:46 AM
2020-21
Societal Impact 235
need to be cautious while uploading or sending
sensitive or confidential files which have a bearing
on our privacy
No comments:
Post a Comment