Nursing Informatics - The Digital World PDF

Summary

This document provides a beginner's guide to internet basics, including its components, search engines, email, netiquette, and online safety. It explains the history and structure of the internet, and how it enables global connectivity. The document also discusses common online communication etiquette.

Full Transcript

NURSING INFORMATICS The Digital World: Guide to Internet Basics, Search Engines, Email, Netiquette, and Online Safety Learning Outcomes Explain the basic concepts and structure of the internet, including its components and how it enables...

NURSING INFORMATICS The Digital World: Guide to Internet Basics, Search Engines, Email, Netiquette, and Online Safety Learning Outcomes Explain the basic concepts and structure of the internet, including its components and how it enables global connectivity. Demonstrate the ability to use search engines to find accurate and reliable information efficiently. Create, manage, and use email accounts while understanding key features such as folders, attachments, and advanced settings. Apply appropriate online communication etiquette to foster respectful and productive interactions in digital environments. Recognize common internet threats such as phishing, malware, and scams, and implement best practices to protect personal and organizational data. Lesson 1: Internet Basics What is Internet? The Internet is a worldwide telecommunications system that provides connectivity for millions of other, smaller networks; therefore, the Internet is often referred to as a network of networks. It allows computer users to communicate with each other across distance and computer platforms. The Internet began in 1969 as the U.S. Department of Defense's Advanced Research Project Agency (ARPA) to provide immediate communication within the Department in case of war. Computers were then installed at U.S. universities with defense related projects. As scholars began to go online, this network changed from military use to scientific use. As ARPAnet grew, administration of the system became distributed to a number of organizations, including the National Science Foundation (NSF). This shift of responsibility began the transformation of the science oriented ARPAnet into the commercially minded and funded Internet used by millions today. The Internet acts as a pipeline to transport electronic messages from one network to another network. At the heart of most networks is a server, a fast computer with large amounts of memory and storage space. The server controls the communication of information between the devices attached to a network, such as computers, printers, or other servers. An Internet Service Provider (ISP) allows the user access to the Internet through their server. Many teachers use a connection through a local university as their ISP because it is free. Other ISPs, such as America Online, telephone companies, or cable companies provide Internet access for their members. You can connect to the Internet through telephone lines, cable modems, cellphones and other mobile devices. Timeline of Internet History The history of the internet dates back to the 1960s with the development of the Advanced Research Projects Agency Network (ARPANET), which was funded by the US Department of Defense. The goal of ARPANET was to create a decentralized network that would be able to operate even if some of the nodes (computers or networks) went down, so that researchers at universities and other institutions could share information and access resources. In the 1970s, the first email programs were developed, and by the late 1970s, the first internet service providers (ISPs) appeared, offering dial-up connections to the internet for individuals and small businesses. In the 1980s, the internet began to see wider use, and the World Wide Web (WWW) was developed in the 1990s, providing a graphical interface for accessing and sharing information on the internet. Since then, the internet has become a ubiquitous part of modern life, with billions of people around the world using it for communication, information sharing, and access to a wide range of resources and services. The internet has continued to evolve and expand since its early beginnings, and it has had a profound impact on many aspects of society. What makes up the World Wide Web? The Internet is often confused with the World Wide Web. The misperception is that these two terms are synonymous. The Internet is the collection of the many different systems and protocols. The World Wide Web, developed in 1989, is actually one of those different protocols. As the name implies, it allows resources to be linked with great ease in an almost seamless fashion. The World Wide Web contains a vast collection of linked multimedia pages that is ever-changing. However, there are several basic components of the Web that allow users to communicate with each other. Below you will find selected components and their descriptions. TCP/IP protocols. In order for a computer to communicate on the Internet, a set of rules or protocols computers must follow to exchange messages was developed. The two most important protocols allowing computers to transmit data on the Internet are Transmission Control Protocol (TCP) and Internet Protocol (IP). With these protocols, virtually all computers can communicate with each other. For instance, if a user is running Windows on a PC, he or she can communicate with iPhones. Domain name system. An Internet address has four fields with numbers that are separated by periods or dots. This type of address is known as an IP address. Rather than have the user remember long strings of numbers, the Domain Name System (DNS) was developed to translate the numerical addresses into words. For example, the address isu- ilagan.edu.ph is really 216.218.206.55. URLs. Addresses for web sites are called URLs (Uniform Resource Locators). Most of them begin with http (HyperText Transfer Protocol), followed by a colon and two slashes. For example, the URL for the ISU Ilagan is https://isu-ilagan.edu.ph/. Top-level domain. Each part of a domain name contains certain information. The first field is the host name, identifying a single computer or organization. The last field is the top- level domain, describing the type of organization and occasionally country of origin associated with the address. Top-level domain names include:.com Commercial.edu Educational.gov US Government.int Organization.mil US Military.net Networking Providers.org Non-profit Organization Domain name country codes include, but are not limited to:.au Australia.de Germany.fr France.nl Netherlands.uk United Kingdom.us United States.ph Philippines Paying attention to the top-level domain may give you a clue as to the accuracy of the information you find. For example, information on a "com" site can prove useful, but one should always be aware that the intent of the site may be to sell a particular product or service. Likewise, the quality of information you find on the "edu" domain may vary. Although many pages in that domain were created by the educational institutions themselves, some "edu" pages may be the private opinions of faculty and students. A common convention at many institutions is to indicate a faculty or student page with a ~ (tilde) in the address. For instance, https://fcit.usf.edu/~kemker/default.htm is a student's personal web page. Moving Around Internet There are a number of different ways to move from website to website, and most people use a combination of methods. How you go about finding information will depend on how much you know about the information you are looking for. Browsing Browsing is the term used to describe the action of finding sites by simply following hyperlinks. Text that is linked to other text (‘hyperlinks’) appears in a special colour and/or style and is often underlined. Browser Once you have an account with an Internet service provider, you can access the Web through a browser, such as Safari or Microsoft Internet Explorer. The browser is the application responsible for allowing a user's computer to read and display web documents. Hypertext Markup Language (HTML) is the language used to write web pages. A browser takes the HTML and translates it into the content you see on the screen. You will note your cursor turns into a pointing finger over some images or text on the page. This indicates a link to additional information and it can be either a link to additional web pages, email, newsgroups, audio, video, or any number of other exciting files. Basic Internet Navigation Your browser is equipped with many useful features to assist you in navigating through the Web. Some of these features are: ICON COMMAND FUNCTION Home Opens or returns to starting page Back Takes you to the previous page Forward Takes you to the next page Print Prints current page Stop Stops loading a page Reload Reload Refresh/redisplays current page Search Search Accesses search engine Lesson 2: Internet Search Engines – Advanced Searching What is a search engine? A search engine is a coordinated set of programs that searches for and identifies items in a database that match specified criteria. Search engines are used to access information on the World Wide Web. A web-based tool that is designed to search the content of web pages and find particular information on the Internet. Search engines are searchable databases of web content. They’re made up of two main parts: Search index. A digital library of information about webpages. Search algorithm(s). Computer program(s) tasked with matching results from the search index. Some Popular Search Engines Google Bing Baidu Yahoo! Yandex Ask.com DuckDuckGo How Search Engines Work? Google is the most used internet search engine. Google search takes place in the following three stages: Crawling. Crawlers discover what pages exist on the web. A search engine constantly looks for new and updated pages to add to its list of known pages. This is referred to as URL discovery. Once a page is discovered, the crawler examines its content. The search engine uses an algorithm to choose which pages to crawl and how often. Indexing. After a page is crawled, the textual content is processed, analyzed and tagged with attributes and metadata that help the search engine understand what the content is about. This also enables the search engine to weed out duplicate pages and collect signals about the content, such as the country or region the page is local to and the usability of the page. Searching and ranking. When a user enters a query, the search engine searches the index for matching pages and returns the results that appear the most relevant on the search engine results page (SERP). The engine ranks content on a number of factors, such as the authoritativeness of a page, back links to the page and keywords a page contains. How search engines rank results? Not every search engine ranks content the same way, but some have similar ranking algorithms. Google search and other search engines like it rank relevant results based on the following criteria: Query meaning. The search engine looks at user queries to establish searcher intent, which is the specific type of information the user is looking for. Search engines use language models to do this. Language models are algorithms that read user input, understand what it means and determine the type of information that a user is looking for. Relevance. Keywords from search queries are matched to keywords in content. Keywords that appear in several places in the content signify more relevance than others. Quality. Search engines look for indicators of expertise, authority and trustworthiness in the content. If other prominent websites link to the content, it is considered more trustworthy. Usability. Search engines evaluate the accessibility and general user experience of content and reward content with better page experience. One example of page usability is mobile-friendliness, which is a measure of how easy a webpage is to use on a mobile device. User data. A user's past search history, search settings and location data are a few of the data types search engines use to determine the content rankings they choose. Search engines might use other website performance metrics, such as bounce rate and time spent on page, to determine where websites rank on a results page. Search engines might return different results for the same term searched as text-based content versus an image or video search. Content creators use search engine optimization (SEO) to take advantage of the above processes. Optimizing the content on a page for search engines increases its visibility to searchers and its ranking on the SERP. For example, a content creator could insert keywords relevant to a given search query to improve results for that query. If the content creator wants people searching for dogs to land on their page, they might add the keywords bone, leash and hound. They might also include links to pages that Google deems authoritative. Search the Internet using a web search engine. 1. The Google homepage has a search box where you type your query. 2. Open a search engine in a web browser (such as Internet Explorer). 3. Type a few specific keywords or phrases in the search box to describe whatever you wish to search. Search engines look for the keywords in your query. 4. Press Enter. The search engine will display a list of websites (page after page) that include information related to your query. 5. Repeat above steps (type different keywords or phrases) if necessary. How to Properly Use Search Engine? There are numerous techniques available to help you find the search results you're looking for. Often, people are unaware of these methods and struggle to get optimal search results. Below, we'll primarily focus on Google as an example and cover topics such as using Boolean expressions for searches, tips for general searches, strategies for online academic research, and how to utilize Google Scholar effectively. The Google Search Engine Boolean Expressions for Search Engine. Boolean expressions can be used with any search engine, not just Google. They enable very specific results. Below are some examples of Boolean expressions and how they can be used. a. Quotation Marks. Use quotation marks to search a phrase exactly word for word. Search “signs of unstable weather” with the quotation marks included. You will see the search engine searches for the exact phrase with no break in between the words. Search the phrase without quotation marks. The results are very different and steer off from what you may want. b. Positive Signs (+). Use positive signs to include words in a search that are being ignored by the engine. Search “+signs of unstable weather” without the quotation marks. This tells Google to always include the word “signs.” c. Negative Signs (–). Use negative signs to exclude words from a search when Google usually includes them. Search “spots on fur –dogs” without the quotation marks. This will give results for any potential animal except for dogs. Search without “–dogs” in the search. Notice that the top three results now primarily contain dogs. d. The OR Operator. Use the word OR to allow the search to include another word, or phrase, around OR. Search “missing fur rabbits OR cats” without the quotation marks. This tells Google to search for pages that have information on rabbits, cats, or both. Remove the OR expression. Notice the results fail to list any information on cats. e. The AND Operator. Use the word AND to tell Google to allow both words to be included in the results. Search “painting with acrylic AND oil” without the quotation marks. Notice that in the top three results, two of the results include acrylics being mixed with oil paints. Remove the AND expression. Notice the top three results are mainly results helping searchers decide which one medium is more suitable, rather than both mixed together. f. The NEAR Operator. The NEAR operator is similar to the AND operator, except the NEAR operator allows a range of 16 words between the two words or phrases in the search. Search “allergies NEAR ocean” without quotation marks. The results will include both the words “allergies” and “ocean” within the range of 16 words. If only the AND operator were to be used, the results could include webpages that don’t provide information with an actual correlation between allergies and the ocean. The results could instead include a webpage about the “ocean” with “allergies” listed somewhere on the page and no direction relation between the two. Without either operator, the results may not be as specific or reliable for the information wanted. Remove the NEAR operator term from the search. Notice that the first result is not a result that would be as beneficial as the search including the NEAR expression. It is rather a personal question being asked instead of reliable source. g. Asterisks (*). Asterisks are to be used as a placeholder. This is useful both as a wildcard search term or if the word needed has been forgotten. Simply add * where a word or phrase would normally go. Search “Congress voted on *” with the quotation marks. This term will search for all phrases starting with congress voted on, while allowing for any word in place of the asterisk. Remember from what you’ve learned earlier that without the quotation marks, the words in the search phrase can be scattered throughout the webpage rather than together. Non-Academic Google Searches. Keep the searches simple. Boolean expressions are very helpful, but using too many is not practical. To further narrow searches, under the already-searched phrase in the search box, click on the “Search tools” tab. This allows you to search by things such as time, relevance, and location. To Google search within a website, try “site:[website URL]” and a word, or phrase, you would like to search within that website. Example: site:isu-ilagan.edu.ph academic programs To search by file type, try “filetype:[file type]” and a following word, or phrase you would like to search under that file type. Examples of file types include jpg, doc, ppt, and pdf. Example: filetype:ppt Internet Basics To define a word, try “define: [word]” Example: define: Competency To search the current weather, try “weather [zipcode or city]” Example: weather: Ilagan city, isabela To set a timer, try “set timer for [time]”. Example: set time for 5 minutes To convert currencies or units, try “[first measurement] to [second measurement]” Example: us dollar to ph peso Use an at symbol (@) to search for usernames within social media. Example: @zachcorpuz For more advanced searching, you can search by image or by voice through google search engine. Online Academic Research. It may not be recommended to research with primarily Wikipedia, but using Wikipedia is a great way to develop ideas for research. Use your school library’s website, your library’s online database, and Google Scholar. Use Boolean expressions for specific results. Look into newer webpages. To do this on Google, click the “Search Tools” tab under the search bar (the phrase must be already searched), then click “Any time” and select a time frame. Using Google Scholar. Google scholar is located at http://www.scholar.google.com. This is Google’s excellent tool provided to research for academic purposes. Get to the main page of Google scholar. Click the down-facing arrow inside the right side of the search box. This will pop up a box with fields to narrow your search based on keywords, authors, published articles, and dates. Notice that when the search is already performed, the same pop-up box can be found by clicking on the arrow underneath the search box. Then, click on “Advanced search” towards the bottom. Explore the functions provided within this drop-down box. Search by time and relevance under with the “Any time” tab. View your citations and saved library under the “My Citations” and “My library” links. Search through a specific school’s library by going to “Settings” and then “Library Links” on the new page. Lesson 3: Email Systems What is Email? Email (electronic mail) is a way to send and receive messages across the Internet. It's similar to traditional mail, but it also has some key differences. To get a better idea of what email is all about, take a look at the infographic below and consider how you might benefit from its use. Email advantages Productivity tools: Email is usually packaged with a calendar, address book, instant messaging, and more for convenience and productivity. Access to web services: If you want to sign up for an account like Facebook or order products from services like Amazon, you will need an email address so you can be safely identified and contacted. Easy mail management: Email service providers have tools that allow you to file, label, prioritize, find, group, and filter your emails for easy management. You can even easily control spam, or junk email. Privacy: Your email is delivered to your own personal and private account with a password required to access and view emails. Communication with multiple people: You can send an email to multiple people at once, giving you the option to include as few as or as many people as you want in a conversation. Accessible anywhere at any time: You don’t have to be at home to get your mail. You can access it from any computer or mobile device that has an Internet connection. Understanding Email Addresses To receive emails, you will need an email account and an email address. Also, if you want to send emails to other people, you will need to obtain their email addresses. It's important to learn how to write email addresses correctly because if you do not enter them exactly right, your emails will not be delivered or might be delivered to the wrong person. Email addresses are always written in a standard format that includes a username, the @ (at) symbol, and the email provider's domain. The username is the name you choose to identify yourself. The email provider is the website that hosts your email account. Some businesses and organizations use email addresses with their own website domain. About email providers In the past, people usually received an email account from the same companies that provided their Internet access. For example, if AOL provided your Internet connection, you'd have an AOL email address. While this is still true for some people, today it's increasingly common to use a free web-based email service, also known as webmail. Anyone can use these services, no matter who provides their Internet access. Webmail providers At present, the top three webmail providers are Yahoo!, Microsoft's Outlook.com (previously Hotmail), and Google's Gmail. These providers are popular because they allow you to access your email account from anywhere with an Internet connection. You can also access webmail on your mobile device. Visit the links below to compare the features of the three top webmail providers: Other email providers Many people also have an email address hosted by their company, school, or organization. These email addresses are usually for professional purposes. For example, the people who work for this website have email addresses that end with @gcflearnfree.org. If you are part of an organization that hosts your email, they'll show you how to access it. Many hosted web domains end with a suffix other than.com. Depending on the organization, your provider's domain might end with a suffix like.gov (for government websites),.edu (for schools),.mil (for military branches), or.org (for nonprofit organizations). Common Email Features No matter which email service you choose, you'll need to learn how to interact with an email interface, including the inbox, the Message pane, and the Compose pane. Depending on the email provider, the interfaces may look and feel different, but they all function in essentially the same way. In this lesson, we'll talk about using an email interface to send and receive messages. We'll also discuss various terms, actions, and features that are commonly used when working with email. Understanding the email interface Below are some examples of different email interfaces from Gmail. Review the images below to become familiar with various email interfaces. Inbox The inbox is where you'll view and manage emails you receive. Emails are listed with the name of the sender, the subject of the message, and the date received. Message pane When you select an email in the inbox, it will open in the Message pane. From here, you can read the message and choose how to respond with a variety of commands. Compose pane You can click the Compose or New button from your inbox to open the Compose pane to create your own email message. From here, you will need to enter the recipient's email address and a subject. You will also have the option to upload files (photos, documents, etc.) as attachments and add formatting to the message. A Compose pane will also appear when you select Reply or Forward. The text from the original message will be copied into the Compose pane. Common email terms and actions All email applications use certain terms and commands you will need to understand before using email. The examples below use Gmail's Compose pane and Message pane to introduce basic email terms, but these will still be applicable for Yahoo! and Outlook. Click the buttons in the interactive below to learn more about the Compose pane. Click the buttons in the interactive below to learn more about the Message pane. Forward Whenever you want to share an email you've received, you can use the Forward command to send the message to another person. Email Etiquette and Safety Like any form of online communication, it's important to practice good etiquette and safety when using email. Etiquette is a set of rules and guidelines that people use to communicate more effectively. You should also know how to protect yourself from certain risks, like malware and phishing. In this lesson, we'll discuss writing more effective emails using good email etiquette, both for personal use and in the workplace. We'll also talk about different strategies for using email safely. Tips for email success Here are some basic rules you can follow to write better emails, no matter who you're emailing. In some cases, it's OK to break these rules. Use these rules as a starting point, then tailor each email you send based on the situation. Email attachment etiquette Attachments are an easy way to share files, photos, and more, but many people aren't aware of some of the most common attachment mistakes. Be sure to follow these basic rules when including attachments in your emails. Mention included attachments. Never attach a file without mentioning it in the body of your email. Something as simple as I've attached a few photos to this email will help your recipients know what to expect. On the other hand, make sure the attachments you mention are actually included with the message—it's easy to focus on your message and forget to include the file itself. We recommend attaching any files before you start writing. Consider file size and format. Avoid sending excessively large attachments or uncompressed photos, which can take a long time for your recipients to download. You can always ZIP or compress files to make them easier to send. Additionally, make sure your attachments don't need to be viewed in a specific application—use universal file types like.PDF,.RTF, and.JPG. Only include related files. If you need to send a lot of different files to the same person, consider sending the attachments through multiple emails. If you include several unrelated files in the same email, it can be difficult for your recipients to find the exact file they need. While attachments are still an easy way to share files quickly over email, many people have begun using cloud based storage services like Google Drive and Microsoft OneDrive to share large files. Rather than sharing the file itself, you can share a link, allowing others to access the file remotely. Check out our lessons on sharing files in Google Drive and sharing files in OneDrive to learn more. Using email in business Whether you're using email at work or applying for a job, the normal rules of email etiquette still apply. However, there are a few additional considerations to keep in mind, as business emails can affect your professional reputation. Remember, you should never use your work email account for personal communication. It's best to get your own personal account from a webmail service like Gmail, Yahoo!, or Outlook.com. Email safety Email is not totally secure, so you should avoid sending sensitive information like credit card numbers, passwords, and your Social Security Number. In addition, you may receive emails from scammers and cybercriminals. The first step in dealing with email safety concerns is understanding them so you know what to look for. Spam. Spam is another term for junk email or unwanted email advertisements. It's best to ignore or delete these messages. Luckily, most email services offer some protection, including spam filtering. Phishing. Certain emails pretend to be from a bank or trusted source in order to steal your personal information. It's easy for someone to create an email that looks like it's from a specific business. Be especially cautious of any emails requesting an urgent response. Attachments. Some email attachments can contain viruses and other malware. It's generally safest not to open any attachment you weren't expecting. If a friend sends you an attachment, you may want to ask if he or she meant to send it before downloading. Lesson 4: Netiquette What is Netiquette? Netiquette refers to the guidelines for polite and respectful communication in online spaces. It encompasses proper behavior when sending emails, participating in online discussions, and more. Similar to traditional etiquette, which outlines social conduct in face- to-face interactions, netiquette aims to create and sustain a positive, comfortable, and efficient digital environment. Additionally, it helps minimize system strain and prevents conflicts among users. (Encyclopedia Britannica, 2022) Netiquette is a blend of the words "net" and "etiquette," referring to the guidelines for respectful and appropriate online communication. Often described as internet etiquette, these rules are not legally enforceable but serve as recommended practices for courteous interaction. Netiquette is particularly relevant when engaging with unfamiliar individuals on the internet. (Kaspersky) Ten Rules of Netiquette 1. Remember the Human. You need to remember that you are talking to a real person when you are online. Ask yourself when sending an email or posting: Would I say this to the person's face? If not, do not send it or post it or chat about it. Always ask permission before posting anything about someone on the Web. 2. Adhere to the same standards online that you follow in real life. You need to behave the same way online that you do in real life. You need to remember that you can get caught doing things you should not be doing online just like you can in real life. You are still talking to a real person with feelings even though you cannot see them. 3. Know where you are in cyberspace. Always take a look around when you enter a new domain when surfing the web. Get a sense of what the discussion group is about before you join it. Be the better person. If someone is being rude in cyber space, do not make it worse. 4. Respect other people's time and bandwidth. Remember people have other things to do besides read your email. You are not the center of their world. Keep your post and emails to a minimum by saying what you want to say. Use the subject line so the recipient knows what the email is about. If you want a response or action, put it in the subject line. Double —check the list of people to whom you are forwarding a message to make sure no one is on it who should not be. 5. Make yourself look good online. Remember to always check your spelling and grammar before posting. Always know what you are talking about and make sense saying it. Be polite and pleasant to everyone. 6. Share expert knowledge. Ask questions online. Share what you know online. Post the answers to your questions online because someone may have the same question you do. 7. Help keep flame wars under control. Definition — "Flaming" is what people do when they express a strongly held opinion without holding back any emotion. Netiquette does not forbid flaming. Netiquette does, however, forbid people who are flaming to hurt discussion groups by putting the group down. 8. Respect other people's privacy. Do not read other people's mail without their permission. Going through other people's things could cost you your job or you could even go to jail. Not respecting other people's privacy is bad Netiquette. 9. Don't abuse your power. Do not take advantage of other people just because you have more knowledge or power than them. Treat others as you would want them to treat you if the roles were reversed. For example, system admins should never read private email. 10. Be forgiving of other people's mistakes. Do not point out mistakes to people online. Remember that you were once the new kid on the block. You still need to have good manners even though you are online and cannot see the person face to face. Ten Commandments of Computer Ethics The Ten Commandments of Computer Ethics were created in 1992 by the Washington, D.C. based Computer Ethics Institute. The commandments were introduced in the paper "In Pursuit of a 'Ten Commandments' for Computer Ethics" by Ramon C. Barquin as a means to create "a set of standards to guide and instruct people in the ethical use of computers." The commandments have been widely quoted in computer ethics literature but also have been criticized by both the hacker community and some in academia. For instance, Dr. Ben Fairweather of the "Centre for Computing and Social Responsibility" has described them as "simplistic" and overly restrictive. The Ten Commandments of Computer Ethics Written by the Computer Ethics Institute; by the Computer Ethics Institute 1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people's computer work. 3. Thou shalt not snoop around in other people's computer files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not copy or use proprietary software for which you have not paid. 7. Thou shalt not use other people's computer resources without authorization or proper compensation. 8. Thou shalt not appropriate other people's intellectual output. 9. Thou shalt think about the social consequences of the program you are writing or the system you are designing. 10. Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans. References: https://edu.gcfglobal.org/en/powerpoint/inserting-videos/1/ Chen, S. Sarina (2022, January 11). netiquette. Encyclopedia Britannica. https://www.britannica.com/topic/netiquette https://www.kaspersky.com/resource-center/preemptive-safety/what-is-netiquette http://cpsr.org/issues/ethics/cei/

Use Quizgecko on...
Browser
Browser