Gold Country Computer Learning Center Netiquette Manners for a Hi Tech World Don Tweedie.

Slides:



Advertisements
Similar presentations
1. XP 2 * The Web is a collection of files that reside on computers, called Web servers. * Web servers are connected to each other through the Internet.
Advertisements

1 Web Based A Module of the CYC Course – Internet Basics
Click to edit Master title style Page - 1 OneSky Teams Step-by-Step Online Corporate Communication Support 2006.
Setting up a Gmail Account & Safety
1 After completing this lesson, you will be able to: Compose, address, and send messages. Format the body of a message. Attach a file to a message. Check.
Review Ch. 3 – Connecting to the Worlds Information © 2010, 2006 South-Western, Cengage Learning.
1 Welcome to SAPS Webmail. 2 Things we will learn about: 1. Login to mail.
ACDV B50 Joyce Kirst. Content Consider whether what you have to say is best said through Consider whether the person you are writing to needs to.
AO- 2 (part 2 of 2) Pass + Send. Receive. Reply. Forward. With more than 1 attachment.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
1 NCDesk % of the test will be Telecommunication/Internet Questions.
Internet etiquette, or netiquette guides us in proper behavior on the Internet. There are widely accepted rules of behavior to follow when you're online.
Netiquette Guidelines
Etiquette This is my slideshow about tools and etiquette that help you to communicate with others in a business context. By Jake Alaia.
By Angela Bitter Comm 165 A.K.A. “Internet Etiquette”
s. Why use s?  send a message any time, any where and the recipient can read it at his or her convenience.  same message to several people.
By Laura Trawin.
{ Etiquette Handbook. Feature Creating an Font, colour and sizes etc Sending an Sending using Cc Sending using Bcc Creating a signature.
COMMUNICATION IGCSE ICT 0417 Section 9.
OCR Functional Skills Keywords Use the right keywords To do this you need to know what it is you are searching for! – For example, you might want to search.
This PowerPoint presentation will show you how to use your productively and successfully.
 To: means to the person you are sending the to.  CC: Carbon copy, to add additional addresses.  BBC: Blind carbon copy, to add additional addresses.
Evidence By Jordan Shurety. This I where you write who you are going to send the to. Cc in an means carbon copy or courtesy copy. You.
This is group I have made.  Deleted all the s we didn’t need to clear out our .  Then created folders for the s we would receive.
ICT Essential Skills. (electronic mail) Snail Mail.
Anya Brookman. How to create a new message Unwanted messages Folders Messages you have sent to someone Logging out when you have finished sending.
Etiquette. Automatic reply Here I have created a automatic reply for when I am not able to contact people when I have ed then.
I have attached a file to this by selecting the paperclip on the bottom of the page.
ETIQUETTE AND EVIDENCE
Matt Crocker. What's in a ? Cc=carbon copy To…=who will receive Bcc…=blind carbon copy Attachments=file can be sent through Text area.
Information guide.
Name: Ryan Lugg Form: 10B . How can businesses make use of . (P) can be a very useful tool, it can be very cost effective and efficient.
Jeff Martin, 1999 There are hundreds of Internet sites that offer free accounts. Some of the most popular are: Yahoo! Hotmail Excite Juno We’ll.
NETIQUETTE GUIDELINES FOR DISTANCE EDUCATION COURSES.
evidence By Sam Phillips. evidence Sending and replying.
Computer Technology Michael Viphongsay 4B. Electronic mail Internet or Intranet.
Involving What is and how does it work? Difference between CC and Bcc Virus How to compress a large file? Advantages and Disadvantages.
How to use ? By Martyna Haliniak. How to log on? In order to log on, you have to type in your username & password in the text boxes, and then click.
Week Rainey Community ICT Classes ICT – The Basics.
 Subject: The topic you are talking about. So they understand what it is a about and explain to the point.  clients usually display it in a.
Do’s and Don'ts For Office s
Microsoft Outlook Objective The learner will be able to perform basic tasks in Microsoft Outlook 2003.
Microsoft Office Illustrated Introductory, Second Edition Started with Outlook 2003 Getting.
Santa’s s By Morgan Johnson. Sending an attachment to Santa  Explain how you attached the . Just click attach and click the folder I.
 To send a you need to first click new.  Then type in the name off the person you want to send it to.  Then write something.  And to finish.
Preparing s Using Etiquette Lesson A4-3.
Company Guidelines and Basic Rules for …. No text words or slang, all s sent have to be polite and formal Use suitable, relevant subject lines.
Introduction to Microsoft Outlook 2007 My Other Brother Software, LLC Darryl Geoffrey.
Preparing s Using Etiquette. Learning Objectives Define . List the parts of an and an header. List rules for etiquette.
Etiquette “ s should always be clear, concise, and well written.” -eHow “ s should always be clear, concise, and well written.” -eHow.
BASIC ETIQUETTE Use the BCC and CC appropriately. 3.
Lesson 2 . Objectives Describe Understand how to send, reply, and forward Define and send attachments.
Professional Communications Mrs. Lopez-Wyatt. Why is etiquette important? We interact more with written word and the number of users and usage rates.
Do Now: Describe the steps used to access the comments tool in MS Word. ( review your notes for the answer) Ex: Step 1. Select the text or item you want.
Etiquette Paige Cross. Home Creating a new Fonts, colours, sizes etc Sending an Send using CC Send using BCC Create a signature Include.
Get up to speed Find everyday commands You’ve got Outlook 2007 installed and you’ve taken time to learn about some of the ways it differs from previous.
Use the subject field to indicate the purpose of the .
EFFECTIVE COMMUNICATION PRESENTED BY THE SOLUTIONS GROUP.
NEXT. Creating An Changing The Type Using CC Using BCC Creating A Signature Attaching A Picture Making It Important Requesting A Receipt How To.
is short for electronic mail!. What is ? An electronic message sent from one computer to another. saves money and time compared to regular.
Yahoo! Mail We gave Google some good press so we’ll use Yahoo! mail as our example for web s. If you don’t have an account Yahoo! will provide.
GOOGLE LEARNING TO USE YOUR G-MAIL ACCOUNT.
Sending effective and professional s . Session aims and objectives Lesson Aims and Objectives send s that are fit for purpose and audience.
Using Using Computers Safely, Effectively and Responsibly.
Guidelines for polite online interaction; words “Internet” and “etiquette” Don’t type in all capital letters; this is interpreted as SHOUTING Do use correct.
is short for electronic mail!
Computer Literacy.
August 17, 2015 J. Boles, J.Burnias and M.Garcia Office 2013
in Business.
Netiquette Guidelines
Presentation transcript:

Gold Country Computer Learning Center Netiquette Manners for a Hi Tech World Don Tweedie

Gold Country Computer Learning Center Netiquette Don Tweedie October Items to Ponder Dont use all caps Using all caps is considered shouting and their use should be held to a minimum and only for emphasis.

Gold Country Computer Learning Center Netiquette Don Tweedie October Items to Ponder Always have a subject line Most programs require this. If you use terms such as 'Hi, Help, Please respond, some mail servers will flag message as spam and delete it. And remember, dont open mail without a subject.

Gold Country Computer Learning Center Netiquette Don Tweedie October Items to Ponder Fancy Fonts and Backgrounds, NO! The font you selected may not be available at the receiving end so a default will be selected Stationery is pretty but is it worth the recipients time? Think of the bandwidth. Have pity on the person using a dialup service. Another thing is that the recipient may have their mail server set to only show text.

Gold Country Computer Learning Center Netiquette Don Tweedie October Items to Ponder

Gold Country Computer Learning Center Netiquette Don Tweedie October Items to Ponder Indiscriminate forwarding Forward is easy to use, but do the recipients really need to know? If the answer is No, dont. If the answer is maybe, think twice before hitting the Send key. Too much information is dangerous.

Gold Country Computer Learning Center Netiquette Don Tweedie October Items to Ponder Necessary to send to group ? Be careful when you send to more than one at a time. Using CC will result in showing all addresses in the header. Header with complete addresses can be accessed by the individual recipients.

Gold Country Computer Learning Center Netiquette Don Tweedie October Items to Ponder Necessary to send to group ? CC

Gold Country Computer Learning Center Netiquette Don Tweedie October Items to Ponder Necessary to send to group ? Another example with multiple TOs

Gold Country Computer Learning Center Netiquette Don Tweedie October Items to Ponder Necessary to send to group ? Learn to use BCC (blind copy). Each recipient will see only their address. Put your name in the TO box or this will not work.

Gold Country Computer Learning Center Netiquette Don Tweedie October Items to Ponder Necessary to send to group ? BCC

Gold Country Computer Learning Center Netiquette Don Tweedie October Items to Ponder Necessary to send to group ? BCC

Gold Country Computer Learning Center Netiquette Don Tweedie October Items to Ponder Never give out phone numbers or personal information Never give out personal contact information of others. If you forward without doing some deleting you will be sending the previous addressees info. This holds true for most of things we forward. Edit out personal info, remember the header of the message has the address info.

Gold Country Computer Learning Center Netiquette Don Tweedie October Items to Ponder If you receive a nasty - do not respond immediately Cool down – think it over – perhaps you didnt understand what was said. If you don't have something constructive to say -- just hit delete If you answer in the same vein, things will quickly escalate resulting in what is called a Flame War

Gold Country Computer Learning Center Netiquette Don Tweedie October Items to Ponder Keep in mind that all is considered to be copyrighted by the original author Don't copy or quote without permission. The writer does not expect his words to show up on someone else's screen. This also holds true for the internet.

Gold Country Computer Learning Center Netiquette Don Tweedie October Items to Ponder Always minimize, compress or "zip" large files before sending Not everyone has high speed internet access Compress anything over 100 Kb. Pictures are the biggest offenders. Besides, my mail box has a limited size, if it doesn't fit, when its full I I don't get more.

Gold Country Computer Learning Center Netiquette Don Tweedie October Items to Ponder Always minimize, compress or "zip" large files before sending Learn how to compress and extract files using XP 1. Right click large file (opens context menu) 2. Left click Send to Left click Compressed (zipped) Folder 4. To extract, right click *.zip (opens context menu) 5. Left click Extract All Follow the self explanatory Wizard to extract file.

Gold Country Computer Learning Center Netiquette Don Tweedie October Items to Ponder Do not forward virus warnings Virus warnings received from others are generally always hoaxes. An exception would be if you discovered that your system inadvertently had a virus which was sent to someone else. In this case, tell them. Virus notification should be left to Microsoft and other Antivirus firms such as Norton, MacAfee and AVG.

Gold Country Computer Learning Center Netiquette Don Tweedie October Items to Ponder There is no such thing as private when you send Would you write it on a postcard and leave it on the counter for the mail boy to pickup and deliver to the post office?

Gold Country Computer Learning Center Netiquette Don Tweedie October Items to Ponder Finally! No more rambling Realize you will always be on a learning curve. Information discussed here is from an e-book written by Judith Kallos NetMatters.com Full text available for download at