EMAILEMAIL. Electronic. Email is a method of exchanging digital messages. What does the E in Email stand for?

Slides:



Advertisements
Similar presentations
101 Instructors: Connie Hutchison & Christopher McCoy.
Advertisements

Surrey Public Library Electronic Classrooms Essentials.
Computer Literacy 1 Transition Plus Services.
Introduction to Your Name Goes Here
HUNTINGTON BEACH PUBLIC LIBRARY Basics. What is ? short for electronic mail send & receive messages over the internet.
Surrey Libraries Computer Learning Centres Totally New to Computers Easy Gmail September 2013 Easy Gmail Teaching Script.
Goodbye Snail Mail, Hello
Surrey Libraries Computer Learning Centres Totally New to Computers Easy Gmail March 2013 Easy Gmail Teaching Script.
OCR Functional Skills Keywords Use the right keywords To do this you need to know what it is you are searching for! – For example, you might want to search.
evidence. Safety To stay safe on the internet there are many points you need to follow. The first point is to change your password regularly, you.
ICT Essential Skills. (electronic mail) Snail Mail.
E – Mail History of s What is an ? What happens when we sent an ? messages Folders Address Attachments Types of.
Technology ICT Option: . Electronic mail is the transmission of mainly text based messages across networks This can be within a particular.
English Comprehension and Composition – Lecture 25 Objectives: What is an ? Basics of an Tips for Writing Effective s.
OCR Nationals – Unit 1 AO2 (Part 2) – s. Overview of AO2 (Part 2) To select and use tools and facilities to download files/information and to send.
Information guide.
What is ? , or electronic mail, is a method of exchanging digital messages from an author to one or more recipients These messages can include.
Unit 10 Communication Services
Using A presentation of the Elmhurst Public Library.
Computer Technology Michael Viphongsay 4B. Electronic mail Internet or Intranet.
9/4/01Mary Price ( )1 ELECTRONIC MAIL. 9/4/01Mary Price ( )2 Electronic Mail ( ) A facility which allows text messages and computer files.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
Dylan Bayliff. Contents: 1- Sending s & Using etiquette 2- Staying safe and Accessing 3- Open s 4- Replying to s 5- Setting up contacts.
All addresses have = at in English. = dot in English.
How to use ? By Martyna Haliniak. How to log on? In order to log on, you have to type in your username & password in the text boxes, and then click.
Introduction to Student Name Student Class.
Go on to the Greensward Academy website and click on webmail.
How to Read Outlook . Make sure the computer is on.
The Internet 8th Edition Tutorial 3 Using Web-Based Services for Communication and Collaboration.
etiquette. 1. language Use the right language because the will have to keep correcting your mistake and it will like better if you don’t misspell.
By Tia, Amy & Carly Don’t share any of these things to anyone:  Phone number  address  Where you live  Your name  Age  Sex  Photos of yourself.
Lesson 2 . Objectives Describe Understand how to send, reply, and forward Define and send attachments.
Let’s Talk About ! Instructor: Robert Griffiths Spring 2010 (original presentation developed by Jill Bond)
Basics. Stands for “electronic mail” Digital message sent over the internet Primarily text but can include pictures, sound and attachments.
tool kit. USER GUIDE Etiquette (Acceptable use policy) – a list of rules that we observe Use a suitable subject in the - this helps.
By :Mitchell Christie by :Mitchell Christie safety.
RYAN HICKLING. WHAT IS AN An messages distributed by electronic means from one computer user to one or more recipients via a network.
By Sarah Anderson and Tony Christensen. PARTS OF Header Body Attachments.
Electronic Mail. Gmail Accounts USERNAME Skyward PASSWORD Same password as you use to log in to your computer.
Jeopardy By Katrina Cox & Gordon Moses © July 2008.
M STREAM IT running dos C :/ dommand delete D :/ freesize D :/ load D ;/ dagger C :/ toloadtype dag D :/ dag Loading operating win 96 Loading disk.
Etiquette & Safety This is based on things you might experience when using you’re .
Definitions. Inbox – Incoming s are stored in the Inbox Sent Box – Set your system to save your sent messages.
How to be E-safe Objective To know how to use Technology responsibly in today’s world. Outcome To create a Responsible use of Technology poster suitable.
BASICS. Objectives Choose an provider Fill out an online form Learn about usernames and addresses Learn about Capcha Explore the organization.
Computer Literacy 1 Transition Plus Services.
– Purposes & Uses 20 – Purposes & Uses 20.
What it is and how to stop it.  What spam is.  Why it can be dangerous.  How to handle it.
Computer Skills (1) .
3.2 Introduction to .
Introduction to Your Name Goes Here
Instructor Name Instructor Title Library Name
Unit 4 IT Security.
Welcome To Hotmail Support Number
Computer Literacy.
Huntington Beach Public Library
Electronic Mail.
Technology ICT Option: .
Electronic Mail.
Electronic Mail Opening Activity: 411 of
Introduction to From the Saint Paul Public Library.
3.2 Introduction to .
Lesson 2 .
Introduction to Your Name Goes Here
Basics HURY DEPARTMENT OF COMPUTER SCIENCE M.TEJASWINI.
Electronic Mail.
Electronic Mail.
ICT Communications Lesson 5: Communicating Using
Technology ICT Option: .
Presentation transcript:

Electronic. is a method of exchanging digital messages. What does the E in stand for?

If there is symbol, it’s an address. symbol is between the username and the host (hotmail, yahoo, gmail, etc). Example:

Where is it? Someone sent you an but it isn’t in your Inbox. What’s the first thing you should do?

REPLY sends your message to the sender only. REPLY ALL sends your message to everyone who received the original . vs.

If you think your is private, you are wrong! The network administrator of your host (hotmail, yahoo, gmail, etc.) has access to ALL of your messages.

SPAM unsolicited sent to multiple users. In other words, junk mail; you didn’t ask for and don’t want.

Never type an message in all CAPITAL LETTERS. It is equivalent to yelling at the person reading the .

Attachment Need to send that business presentation you just finished to your boss? Attach it to an and she’ll get it in no time.

Only download attachments from people you know and trust. Viruses can be attached to s. Once downloaded, they will infect your computer.

What makes a strong password? o At least 8 characters o At least one number o At least one capital letter o At least one symbol