Email Etiquette. Spam  Email spam, also known as junk email or unsolicited bulk email (UBE), is a subset of electronic spam involving nearly identical.

Slides:



Advertisements
Similar presentations
Basic Communication on the Internet:
Advertisements

The basics that we should all remember while communicating digitally.
What is Spam  Any unwanted messages that are sent to many users at once.  Spam can be sent via , text message, online chat, blogs or various other.
Surrey Public Library Electronic Classrooms Essentials.
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
Etiquette Guidelines to Electronic Communication 4/ Etiquette.ppt Presented by Duane Shaw.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 15 How Spam Works.
EQUITTES. Offensive words! Don’t use offensive language or words as the person might be offended and consider it as either racism or bullying.
Netiquette. APK Mrs. Batichon sent a thank you , but forgot to change the name of the receiver. Embarrassing. Sent a text or letter to the wrong.
Software. stands for electronic mail. software enables you to send an electronic message to another person anywhere in the world. The message.
Anya Brookman. How to create a new message Unwanted messages Folders Messages you have sent to someone Logging out when you have finished sending.
A form of communication in which electronic messages are created and transferred between two or more devices connected to a network.
Matthew Hardaway CSCI101 Thursday 3:30pm.  Fishing (Encyclopedia Britannica): ◦ Sport of catching fish—freshwater or saltwater— typically with rod, line,
By Mohammed kiche. Viruses A computer virus is a malware program that when executed replicates by inserting copies of itself modified into other computer.
Computer Technology Timpview High School.  is inexpensive and easy to use and track  Spam – s sent in bulk to many people’s .
Electronic Etiquette Communication Skills for and Blogs.
Communications and Networks Standard Grade Computing Studies.
Name: Ryan Lugg Form: 10B . How can businesses make use of . (P) can be a very useful tool, it can be very cost effective and efficient.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Computer Technology Michael Viphongsay 4B. Electronic mail Internet or Intranet.
How To Preserve Online Privacy. 6 Major Ways To Protect Privacy  1.) Learn to Clear Browsing History  2.) Familiarize Yourself with Privacy Settings.
The 9 golden rules of digital etiquette!! By Evon.
Etiquette and rules. Rule 1 proper spelling and grammar You need to use proper spelling and grammar because if you are writing an you must be professional.
How to use ? By Martyna Haliniak. How to log on? In order to log on, you have to type in your username & password in the text boxes, and then click.
By Hina Patel TCM 471 Introduction SPAM? Solicited Unsolicited How spammer gets the address Prevention from spam Conclusion.
ELECTRONIC COMMUNICATIONS Standard Grade Computing ELECTRONIC COMMUNICATIONS CHAPTER 10.
G53SEC 1 Coursework Specification. G53SEC Coursework Option 1: Spam Detection and Categorisation 2.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
 Pretty much any kind of file can be sent on such as a photo or even a virus. .exe files are usually always viruses. (never open these even if.
Year 9 Cambridge National Unit 2 – Task 1 Mr Conti Lesson 2.
Electronic Communication Presentation. Attachments Files you attach and send with an message.
etiquette. 1. language Use the right language because the will have to keep correcting your mistake and it will like better if you don’t misspell.
BASIC ETIQUETTE Use the BCC and CC appropriately. 3.
C ONSULTING T EAM P ROJECT Tips on organizing electronic files! Witness Fitness Presented & made by Carly Thomas.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 1 Evaluating an Program and a Web-Based Service Basic Communication.
Written by Keith C. Ivey Presentation by Jonathan Tang.
BY JESSICA SCHOLEY p1. Id Fraud Is When Someone Pretends To Be Someone Else Using There Address, Birthday And Other Information. People Also Use Id Fraud.
Don’t send offensive pictures  This can badly offend people in many ways or they could take you to court and may get charged. Also it is illegal to send.
Basics. Stands for “electronic mail” Digital message sent over the internet Primarily text but can include pictures, sound and attachments.
By :Mitchell Christie by :Mitchell Christie safety.
A presentation about communicating electronically.
Etiquette UNT in partnership with TEA. Copyright©. All rights reserved.
By: Austin Kellogg. What’s the difference Phishing Scam where frauds send pop-up messages to lure personal information.
ETIQUETTES “ - when it absolutely positively has to get lost at the speed of light.”
Electronic Mail. Gmail Accounts USERNAME Skyward PASSWORD Same password as you use to log in to your computer.
Use the subject field to indicate the purpose of the .
“ Etiquette” By Keith C. Ivey Presentation by Allison Lange.
M STREAM IT running dos C :/ dommand delete D :/ freesize D :/ load D ;/ dagger C :/ toloadtype dag D :/ dag Loading operating win 96 Loading disk.
Etiquette & Safety This is based on things you might experience when using you’re .
Getting Your Résumé Read By Jonathan Barnett Based upon the article by Joel Spolsky.
You’ve got mail Listen and discuss Page 6. What kind of do you receive? Advertisements اعلانات Advertisements اعلانات s from unknown forums.
. Electronic. is a method of exchanging digital messages. What does the E in stand for?
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Internet Safety.  Ethics-moral standards or values  Netiquette-rules for proper online behavior.
Dec 14, 2014, Harvard University
Communications and Networks
Etiquette.
Netiquette.
Use digital communications technologies
Computer Literacy.
An Overview.
Electronic Mail.
Electronic Mail Opening Activity: 411 of
Social Media Etiquette Rules
Electronic Mail.
Netiquette What`s that? By Alesander Guzmán Arenaza.
NETIQUETTE Pn. Jamilah Binti Yusof.
Computer Technology.
Presentation transcript:

Etiquette

Spam  spam, also known as junk or unsolicited bulk (UBE), is a subset of electronic spam involving nearly identical messages sent to numerous recipients by s

Language  Use proper language strong language so people don’t think this is the person I do know

Don’t open s  Don’t open s that you don’t know who they are because it could be a virus

Spelling  Use proper spelling or people wont know who you are

Rules  Use correct rules in your writing and other stuff to make it sound a lot beter