Presentation is loading. Please wait.

Presentation is loading. Please wait.

Setting up a Gmail Account & Safety Kamlesh Singh Bisht IT Specialist.

Similar presentations


Presentation on theme: "Setting up a Gmail Account & Safety Kamlesh Singh Bisht IT Specialist."— Presentation transcript:

1 Setting up a Gmail Account & Email Safety Kamlesh Singh Bisht IT Specialist

2 Email Basics Send & receive digital messages and content over the internet Productivity Tool Calendar Address book Web-based email can be accessd anytime & anywhere

3 Email Addresses  Format:  Username  @  Provider’s domain  Ex. peter101@yahoo.com  Free Email Account Providers:  Yahoo  Microsoft’s Hotmail  Google’s Gmail

4 Setting up a Gmail Account  Go to: www.gmail.comwww.gmail.com  Click here to Create your Account 4

5 Creating a Gmail Account  Enter a password  Enter or choose a security question or write your own. 5

6 Creating a Gmail Account  Type in your birthdate month/day/year  Type in the word in the “word verification” box  Click on the I accept. Create my account button  You can either use Google as your home page or a tab on your home page 6

7 Creating a Gmail Account  Congratulations  Click on Show me my account 7

8 Gmail Inbox for your Account  Notice the 3 email from Google in your inbox  3 tutorials explaining some of the features of Gmail. 8

9 Composing a “New Message”  Click on “New” or “Compose”  Contacts  Like an address book  Contains email addresses & contact information

10 Properly Addressing a Message  Subject:  Brief description  CC (Carbon Copy)  To include other people in an email message  BC (Blind Carbon Copy)  Addresses will not be visible to other parties.  Attachments  Attach or Upload files 10

11 Draft or Send  Draft:  Save it to send later  Send  Only click on when the message is complete and ready to go. 11.

12 Inbox Shows all incoming mail you have received  Click on the email to read it.  All unread emails are usually marked in bold text 12

13 Reply or Reply All  Reply  When you want to respond to an email  New window will appear to compose your message  Reply All  The message will be sent to all parties in the email.  **Caution** Always check the “To” box before hitting the “send” button to avoid embarrassment of sending it to the wrong people. 13

14 Forwarding an Email  Forward  Share an email message with another individual 14

15 SPAM or Junk Email  Spam  Carries viruses and fraudulent scams  Do NOT open it  Move it to the Spam Folder  Do NOT open files with a attachment that has a file extension ending in: .exe .zip .scr 15

16 Folders or Labels  Folders or Labels  Allow you to organize your emails for quicker reference. 16

17 Trash or Deleted Items  Deleted Items  To delete click on the “Delete” Command  Once it is deleted from the trash folder “it’s gone”  Trash Folder  Items in the trash folder are accessible 17

18 Email Etiquette  Email Do’s:  Keep emails clear and concise  Use a relevant subject line  Add a greeting and closing line to your email  "Dear Angela”  Closing  Sincerely  Thanks  Followed by your name  Be aware of your tone in your email 18

19 Email Etiquette (cont.)  Check your email before sending  Check it for spelling and grammar errors  Check the content and wording  Check your recipients  To  CC  BCC 19

20 Email Etiquette  Email Don’ts  Don’t use caps lock  An overlong signature  Don’t use hard-to-read fonts or colors  Don't overuse Reply to All  Don't try to cover too many topics  Don't forward chain emails 20

21 Professionalism in Emailing  Professionalism  Not too informal  No profanity  Never convey anger  Always read your emails before sending  Don’t discuss confidential information  Think before you send! 21

22 Companies are Monitoring  Businesses today are monitoring  Don’t use your work email to write anything derogatory  Social Media  Is monitored  Beware what you post 22

23 Online Phishing Scams  Fishing for confidential information  Receive an e-mail which appears to originate from a financial institution  Describes an urgent reason you must "verify" or "re-submit  Consumer may be asked to provide Social Security numbers, account numbers, passwords or other information  When the consumer provides the information, those perpetrating the fraud can begin to access consumer accounts or assume the person's identity. 23

24 Protect Yourself from Phishing  Don’t reply to emails that ask for personal or financial information  Never click links within emails that ask for personal or financial information  Avoid cutting and pasting links from an email message into a new browser window  Never call company phone numbers listed in an email.  Don’t email personal or financial information  Use anti-virus and anti-spyware software, a firewall, and spam filters. 24

25 Phishing  Here is an example of a Phishing Scam 25

26 Fraudulent Emails  Subject lines that:  Look important  Show concern  Examples:  Message Alert  Unauthorized Log-In Access Denied  Email Verification Required 26

27 Questions  Questions or Comments?  Get Email Support Now..!!Email Support  Toll-Free 1-877-637-1326 27


Download ppt "Setting up a Gmail Account & Safety Kamlesh Singh Bisht IT Specialist."

Similar presentations


Ads by Google