OCR Nationals Unit 1 – ICT Skills for Business. Using email in business What bad practice can you see in this email? Annotate your copy.

Slides:



Advertisements
Similar presentations
AO- 2 (part 2 of 2) Pass + Send. Receive. Reply. Forward. With more than 1 attachment.
Advertisements

Task 8 Design and create a business presentation on Safe Working Practices when using ICT.
What do I need to know?.   Instant Messages  Social Networking.
Etiquette This is my slideshow about tools and etiquette that help you to communicate with others in a business context. By Jake Alaia.
 When you receive a new you will be shown a highlighted in yellow box where your can be found  To open your new just double click.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
By Laura Trawin.
{ Etiquette Handbook. Feature Creating an Font, colour and sizes etc Sending an Sending using Cc Sending using Bcc Creating a signature.
 You must make sure that you include the following in your presentation: › Transitions between slides. › Speaker notes (what you would say if you were.
This is the first page of the log in, this is were you enter your unique details.
This PowerPoint presentation will show you how to use your productively and successfully.
 To: means to the person you are sending the to.  CC: Carbon copy, to add additional addresses.  BBC: Blind carbon copy, to add additional addresses.
Evidence By Jordan Shurety. This I where you write who you are going to send the to. Cc in an means carbon copy or courtesy copy. You.
This is group I have made.  Deleted all the s we didn’t need to clear out our .  Then created folders for the s we would receive.
user guide Having a strong password allows other users to struggle to guess. To make a strong password you should use up to 12 letters and 1 or 2.
Anya Brookman. How to create a new message Unwanted messages Folders Messages you have sent to someone Logging out when you have finished sending.
Hello Employee, Welcome to MStreamIT!
COMPUTER TECHNOLOGY Electronic Mail Advantages of Using Less intrusive than a phone call Cheaper and faster than a letter Less hassle than a.
Etiquette. Automatic reply Here I have created a automatic reply for when I am not able to contact people when I have ed then.
Evidence. Sending with attachment with zip folder.
Name: alex lewis Form:.  You must make sure that you include the following in your presentation:  Transitions between slides.  Speaker notes (what.
. Open a Click on your inbox and click on a you want to open then it will open.
I have attached a file to this by selecting the paperclip on the bottom of the page.
ETIQUETTE AND EVIDENCE
OCR Nationals – Unit 1 AO2 (Part 2) – s. Overview of AO2 (Part 2) To select and use tools and facilities to download files/information and to send.
OCR Nationals ICT – Unit 1 Task 3 Grade A Task Overview In preparation for the students’ work experience, the organisers of the French trip want to ensure.
Lesson Objectives Understanding the advanced features of . All – Will be able to use 1 of the advanced features and provide evidence Most – Will also.
Information guide.
This presentation will be all about s, etiquette and software. I will be going through each one of these individually and thoroughly step.
This presentation will be all about s, etiquette and software. I will be going through each one of these individually and thoroughly step.
. Open a Click on your inbox and click on a you want to open then it will open.
etiquette Etiquette s always go to any of the following: Staff
FAIRTRADE FOUNDATION OCR Nationals in ICT Unit 1 ICT Skills for Business AO2.
Name: Ryan Lugg Form: 10B . How can businesses make use of . (P) can be a very useful tool, it can be very cost effective and efficient.
By Ciaran carney. ADD COM  Etiquette – Acceptable Use Policy  Use a suitable subject in the - this helps the reader to understand what the message.
evidence By Sam Phillips. evidence Sending and replying.
Dylan Bayliff. Contents: 1- Sending s & Using etiquette 2- Staying safe and Accessing 3- Open s 4- Replying to s 5- Setting up contacts.
How to use ? By Martyna Haliniak. How to log on? In order to log on, you have to type in your username & password in the text boxes, and then click.
This PowerPoint presentation will show you how to use your productively and successfully.
 Subject: The topic you are talking about. So they understand what it is a about and explain to the point.  clients usually display it in a.
 Subject: The topic you are talking about. So they understand what it is a about and explain to the point.  clients usually display it in a.
By Sasha Radjuk. - Etiquette and User Guide Give some basic notes on how to log in. To login go on Google and type in outlook web app and the type.
Preparing s Using Etiquette Lesson A4-3.
Company Guidelines and Basic Rules for …. No text words or slang, all s sent have to be polite and formal Use suitable, relevant subject lines.
s This presentation is all about s, etiquette and software. I will go through these things step by step to give you a clear understanding.
This presentation will be all about s, etiquette and software. I will be going through each one of these individually and thoroughly step.
Preparing s Using Etiquette. Learning Objectives Define . List the parts of an and an header. List rules for etiquette.
 When you receive a new you will be shown a highlighted in yellow box where your can be found  To open your new just double click.
STAYING SAFE: Here are some safety tips when using Change your password regularly and keep it in a safe place. Don’t share your password with anyone.
OCR Nationals Unit 1: ICT Skills for Business AO2 - Using appropriate software, select and use tools and facilities to download files/information and to.
BASIC ETIQUETTE Use the BCC and CC appropriately. 3.
 In businesses if you need to send an and don’t want to have to type their over and over again. Using contacts is quick and simple. All you.
user guide Having a strong password allows other users to struggle to guess. To make a strong password you should use up to 12 letters and 1 or 2.
Written by Keith C. Ivey Presentation by Jonathan Tang.
Learning Intentions: To understand what is required to achieve a Pass, Merit or Distinction for Task 3.
tool kit. USER GUIDE Etiquette (Acceptable use policy) – a list of rules that we observe Use a suitable subject in the - this helps.
Santa’s s By Alexander Britton. Sending an .
and the business environment Explain what is and how is it used in a business environment A02 .
Memos, Netiquette, .  A memo is short for memorandum, which is a written reminder of something important that has occurred or will occur.  Memos.
How to set up an account- Non-Technical Aimee Lilley.
Name: Peter Thomson Form: 10A.  You must make sure that you include the following in your presentation:  Transitions between slides.  Speaker notes.
Use the subject field to indicate the purpose of the .
“ Etiquette” By Keith C. Ivey Presentation by Allison Lange.
M STREAM IT running dos C :/ dommand delete D :/ freesize D :/ load D ;/ dagger C :/ toloadtype dag D :/ dag Loading operating win 96 Loading disk.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
GOOGLE LEARNING TO USE YOUR G-MAIL ACCOUNT.
Sending effective and professional s . Session aims and objectives Lesson Aims and Objectives send s that are fit for purpose and audience.
Using Using Computers Safely, Effectively and Responsibly.
.
Instructions (this slide should be deleted before final hand-in)
Presentation transcript:

OCR Nationals Unit 1 – ICT Skills for Business

Using in business What bad practice can you see in this ? Annotate your copy.

bad practice no subject using 'text' language “i” and “u” inappropriate tone - too informal to send as a business spelling mistakes Emoticons included incorrect or missing punctuation missing upper-case letters Capital letters (shouting) 'flaming' - sending a rude or aggressive inappropriate use of to sell and make deals Numbers not spelt but written “1” Copied to everyone for no reason

Scenario People can be quite annoying when they send s out! You’ve got tired of the employees at your gym/spa not knowing how to use their business accounts correctly. You are going to put on a presentation/training session to demonstrate to your staff the different parts of and how they work.

Task You will need to design and create a presentation that can be used to illustrate a talk on the appropriate use of relating to your gym/spa. You will produce a presentation, of at least 5 slides, using appropriate text and graphics. You are only required to demonstrate an understanding of the use in a business context, however it would be to your benefit to use your school system during the course of this task to give screenshots as evidence that you understand.

Write your answer on your whiteboard. Stands for ‘Carbon copy’ if you want someone to see an but don’t really expect a reply signature Cc Bcc Setting priority Address book Spam filter Automatic response

Write your answer on your whiteboard. A hidden copy of an signature Cc Bcc Setting priority Address book Spam filter Automatic response

Write your answer on your whiteboard. Stores contacts signature Cc Bcc Setting priority Address book Spam filter Automatic response

Write your answer on your whiteboard. Allows the sender to see if the message is of high, low or normal importance upon arrival signature Cc Bcc Setting priority Address book Spam filter Automatic response

Write your answer on your whiteboard. Sends an automatic reply informing people you are out of the office signature Cc Bcc Setting priority Address book Spam filter Automatic response

Write your answer on your whiteboard. Is a block of text automatically appended at the bottom of an including poster's name, phone number and address signature Cc Bcc Setting priority Address book Spam filter Automatic response

Write your answer on your whiteboard. Automatically rejecting by blocking particular senders or particular subject lines signature Cc Bcc Setting priority Address book Spam filter Automatic response

Answers TitleExplanation BCCA hidden copy of an Address BookStores contacts CCStands for ‘Carbon copy’ if you want someone to see an but don’t really expect a reply SignatureIs a block of text automatically appended at the bottom of an including poster's name, phone number and address Setting priorityAllows the sender to see if the message is of high, low or normal importance upon arrival Spam filterAutomatically rejecting by blocking particular senders or particular subject lines Automatic responseSends an automatic reply informing people you are out of the office

attachment viruses Some viruses and Trojans will attach themselves to the address book on the infected computer and automatically everyone in the group. Probably have seen this if you’ve received an from a friend and yet you’ll know they haven’t seen it. e.g. An trying to sell you something?!

Task You need to use the template on the shared area to create your presentation. You need to alter the design of it to match your house style that you have already created. Think about adding the following: Transitions between slides. Speaker notes (what you would say if you were to do the presentation yourself in front of your employees). Find some animations off the internet and put them on their too. For all of the different areas you need to explain "when" & "why" you would use them rather than "how" to use them.

REVIEW Unit 1 – ICT Skills for Business Success Criteria Pass Understand business s and why we use subject and appropriate messages; Comments about the risks of opening attachments; Merit More detail about attachments; Explain two features: signature; cc; Distinction Explain actions that could be taken to reduce the risks of opening attachments; Explain four features: signature; cc; bcc; setting priority. How are you getting on? Review the success criteria and set yourself a target for the last section of the lesson.

Extension - What is this?

Phishing s Don’t rush to respond. Don’t just believe blindly what is said in the , instead wait and think about it for a few seconds. Check where links are pointing. Just hover on the link and your browser will tell you the actual link where you will go when you click that link. Manually write website address in address bar. Even if you are sure about the genuineness of the , don’t just click on the links in the , but type in the address manually. If you see the mail is from Facebook, just enter facebook.com in the browser and log in. Spelling or grammatical mistakes are a possible sign of a phishing scam. Large organisations would not send out s with errors. By being careful you can improve your chances of avoiding phishing scams.