Research#4
Flame Wars
A flame war results when one or more users engages in provocative responses to the originally posted flame bait. Flame wars often draw in many users (including those trying to diffuse the flame war) and can overshadow regular forum discussion if left unchecked. Resolving a flame war can be difficult, as it is often hard to determine who is really responsible for the degradation of a reasonable discussion into flame war. Someone who posts a contrary opinion in a strongly focused discussion forum may be easily labeled a "baiter", "flamer", or "troll". An approach to resolving a flame war or responding to flaming is to communicate openly with the offending users. Acknowledging mistakes, offering to help resolve the disagreement, making clear, reasoned arguments, and even self-deprecation have all been noted as worthwhile strategies to end such disputes. However, others prefer to simply ignore flaming, noting that, in many cases, if the flame bait receives no attention, it will quickly be forgotten as forum discussions carry on.
Emoticons
Emoticons are types of faces that is used in social networking websites like facebook, twitter, and skype, often used to express ones feelings. Emoticons are created by typing combined letters, numbers and signs like ( ) : - < > | \ = ^ _. Facebook emoticons are:
Emoticon
Name smile tongue wink grin curly lips kiss grumpy glasses sunglasses upset
Shortcut :-) :) :] =) :-P :P :-p :p =P ;-) ;) :-D :D =D :3 :-* :* >:( >:-( 8-) 8) B-) B) 8-| 8| B-| B| >:O >:-O >:o >:-o
confused shark gasp pacman squint devil unsure frown cry Chris Putnam robot heart angel kiki penguin
o.O O.o (^^^) :-O :O :-o :o :v -_3:) 3:-) :/ :-/ :\ :-\ :-( :( :[ =( :'( :putnam: :|] <3 O:) O:-) ^_^ <()
Hyper link
In computing, a hyperlink (or link) is a reference to a document that the reader can directly follow, or that is followed automatically. A hyperlink points to a whole document or to a specific element within a document. Hypertext is text with hyperlinks. A software system for viewing and creating hypertext is a hypertext system, and to create a hyperlink is to hyperlink (or simply to link). A user following hyperlinks is said to navigate or browse the hypertext. A hyperlink has an anchor, which is the location within a document from which the hyperlink can be followed; the document containing a hyperlink is known as its source document. The target of a hyperlink is the document, or location within a document, to which the hyperlink leads. Users can activate and follow the link when
its anchor is shown, usually by touching or clicking on the anchor with a pointing device. Following the link has the effect of displaying its target, often with its context.
Spam
Spam is the use of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately. While the most widely recognized form of spam is e-mail spam, the term is applied to similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, wiki spam, online classified ads spam, mobile phone messaging spam, Internet forum spam, junk fax transmissions, social networking spam, television advertising and file sharing network spam. Spamming remains economically viable because advertisers have no operating costs beyond the management of their mailing lists, and it is difficult to hold senders accountable for their mass mailings. Because the barrier to entry is so low, spammers are numerous, and the volume of unsolicited mail has become very high. In the year 2011, the estimated figure for spam messages is around seven trillion. The costs, such as lost productivity and fraud, are borne by the public and by Internet service providers, which have been forced to add extra capacity to cope with the deluge. Spamming has been the subject of legislation in many jurisdictions.
Netiquette
Netiquette (short for "network etiquette" or "Internet etiquette") is a set of social conventions that facilitate interaction over networks, ranging from Usenet and mailing lists to blogs and forums. These rules were described in IETF RFC 1855. However, like many Internet phenomena, the concept and its application remain in a state of flux, and vary from community to community. The points most strongly emphasized about USENET netiquette often include using simple electronic signatures, and avoiding multiposting, cross-posting, offtopic posting, hijacking a discussion thread, and other techniques used to minimize the effort required to read a post or a thread. Netiquette guidelines posted by IBM for employees utilizing Second Life in an official capacity, however, focus on basic professionalism, amiable work environment, and protecting IBM's intellectual property. Similarly, some Usenet guidelines call for use of unabbreviated
English while users of instant messaging protocols like SMS occasionally encourage just the opposite, bolstering use of SMS language. However, many other online communities frown upon this practice.
2. Rules of Netiquette
1. 2. 3. 4. Each line should be a maximum of 65 characters wide. Structure your message using paragraphs and sentences of sensible lengths. Avoid non-standard forms of English, such as txt or l33t. If you have a signature automatically appended to every email you send, keep its length to a maximum of six (preferably four) lines of 70 characters each. 5. Use an appropriate level of small talk. 6. Keep business emails short and to the point. 7. Think carefully before sending an email that could embarrass you if it were more widely distributed. 8. Do not use email to send bad news. 9. Do not write all in capital (or all in lower-case) letters. 10.Do not use email as a way to avoid social interaction. 11.Read your emails before you send them. 12.If your email system allows you to set the priority of the emails you send, make use of this facility (in particular, mark low-priority emails). 13.Wrap URLs in angle brackets, like this <http://www.example.com/whatever.html>. 14.Take care when using terms that might get your message misidentified as spam. 15.Use a sufficiently long subject so that people will have an accurate idea about your emails contents. 16.Only change subject lines when it is helpful to other people to do so (using [long] and [was ...]). 17.Send messages to only those people who are likely to want to read them. 18.Avoid using BCC unless it is clear that you have done so. 19.Differentiate between TO and CC. 20.Use peoples full names (in title case) as well as their email addresses in the TO, FROM and CC fields. 21.Respond promptly to emails sent to you. 22.Use the Reply button in your email software to reply to emails dont start a new message. 23.Check with the author before adding extra recipients to a reply to an email. 24.It is traditional to include the text of the original message in the reply, typically below the new material and distinguished in some way (such as by prep ending each line with a > character). If you need to respond point-by-point, you may intersperse your comments with the original text so long as it is clear which is which.
25.Unless you are adding further recipients to your reply, quote only as much material as is necessary to give context to your own response. 26.If you set up an automatic reply for when you are on holiday, make certain that it will reply only to individuals and not to mailing lists of which you are a member. 27.If you received an email because you were BCCed on it, and other recipients would be surprised that you had seen it, does not use Reply to All. 28.Dont reply to an email just as an easy way to create a new email to the same people. 29.When replying to emails, dont send identical files back to people who already have them. 30.Prep end the subject lines of your replies and forwarded messages with the standard two-letter designations (RE and FW respectively). 31.Always add a short comment to say why you are forwarding the email. 32.Dont forward emails that were sent to you privately (or to a private forum of which you are a member) without the original senders permission. This applies whether you want to send the email to another person or to a mailing list. 33.Do not edit the text of a forwarded email. 34.Never send warnings about the latest virus by email. 35.Never participate in chain letters. 36.Do not forward jokes or other incidental emails indiscriminately to your friends. 37.Dont email lots of people using raw names in the To box. Instead, use a distribution list or BCC. 38.Send your emails in plain text unless you need to use formatting to benefit your recipients. 39.Dont send attachments at all unless you need to. 40.If you need to send people a large file (say a megabyte or more), contact them first to check how and when they would like to receive it. Dont just send it as an attachment to an email. 41.If you are sending photos, reduce their dimensions. 42.Compress files before you send them to someone else over the Internet. 43.Do not read other peoples private emails. 44.Dont use features of your email client that will notify you when someone receives or opens an email that you have sent. 3.
History of the Internet
The history of the Internet starts in the 1950s and 1960s with the development of computers. This began with point-to-point communication between mainframe computers and terminals, expanded to point-to-point connections between computers and then early research into packet switching. Packet switched networks such as ARPANET, Mark I at NPL in the UK, CYCLADES, Merit Network, Tymnet, and Telenet, and were developed in the late 1960s and early 1970s using a variety
of protocols. The ARPANET in particular led to the development of protocols for internetworking, where multiple separate networks could be joined together into a network of networks. In 1982 the Internet Protocol Suite (TCP/IP) was standardized and the concept of a world-wide network of fully interconnected TCP/IP networks called the Internet was introduced. Access to the ARPANET was expanded in 1981 when the National Science Foundation (NSF) developed the Computer Science Network (CSNET) and again in 1986 when NSFNET provided access to supercomputer sites in the United States from research and education organizations. The ARPANET was decommissioned in 1990. Commercial internet service provider (ISPs) began to emerge in the late 1980s and 1990s and the Internet was commercialized in 1995 when NSFNET was decommissioned, removing the last restrictions on the use of the Internet to carry commercial traffic. Since the mid-1990s the Internet has had a drastic impact on culture and commerce, including the rise of near instant communication by electronic mail, instant messaging, Voice over Internet Protocol (VoIP) "phone calls", two-way interactive video calls, and the World Wide Web with its discussion forums, blogs, social networking, and online shopping sites. The research and education community continues to use advanced networks such as NSF's very high speed Backbone Network Service (vBNS) and Internet2. Increasing amounts of data are transmitted at higher and higher speeds over fiber optic networks operating at 1-Gbit/s, 10Gbit/s, or more. The Internet continues to grow, driven by ever greater amounts of online information and knowledge, commerce, entertainment and social networking. It is estimated that in 1993 the Internet carried only 1% of the information flowing through two-way telecommunication, by 2000 this figure had grown to 51%, and by 2007 more than 97% of all telecommunicated information was carried over the Internet.