Presentation is loading. Please wait.

Presentation is loading. Please wait.

Lesson 7: Business, , & Personal Information Management

Similar presentations


Presentation on theme: "Lesson 7: Business, , & Personal Information Management"— Presentation transcript:

1 Lesson 7: Business, E-Mail, & Personal Information Management

2 is not dead is still the preferred standard communication tool for businesses. Benefits: ability to write lengthy messages Include attachments displayed as a separate link, such as an icon. The organization scans attachments to ensure that they contain no malicious code the scanning takes place at the server. Having an trail of your communication In an message recipients must possess a software necessary to open or edit the attached file to view a file attachment is the software necessary

3 E-mail Protocols Two types of protocols: outgoing and incoming
Outgoing server: Simple Mail Transfer Protocol (SMTP) is used to send messages Incoming server: Mail delivery agent (MDA) server program that receives sent messages and delivers them to their proper destination.

4 Composing s Reply all=is the following response option that you should use to respond to the original sender of an message and include everyone who was copied Reply=is the following response option that you should use to respond only to the original sender of an message Forward=is the following response option that you should use to send an message to users who did not receive the original The appearance of right-pointing angle brackets (>) in the text of an message indicates that the message contains: forwarded text Unread messages are seen as a closed-envelope (or similar) icons in an Inbox’s Message list represent

5 Writing s Emotion=is the term for a combination of characters that you read sideways that helps convey emotion in an message. Netiquette Shouting or anger is when someone uses all capital letters in an You should you use an out-of-office messages when you will be out of the office for an extended period of time to explain why you may not respond to messages within a reasonably short period of time. Auto responder =is the term for the feature in an client that automatically sends a specified response to anyone who sends to your address. thread=an message that includes information from the original message in a response.

6 By default, clients typically save a copy of every message you send in that Standard postal service When you use an client to send and receive mail messages stored in your Outbox s are sent, a copy of each sent message is stored in the Sent Items folder, and incoming messages are routed to your Inbox. Set up a spam filter in your client to filter out spam messages is a client-side action that can be taken to reduce the amount of spam you receive. Outbox folder=was designed for users with dial-up accounts who want to work offline and accumulate messages, then connect to the Internet and send all their queued messages at once.

7 You receive from an incoming mail server using POP3 or IMAP (they are used to store and access s). POP3 AKA Post Office Protocol version 3 is known as a “store-and-forward” service. IMAP AKA Internet Message Access Protocol is known as “store-and-hold” Local access to messages are important for those who use IMAP servers because if a network problem occurs, IMAP server users may not have access to their messages

8 E-mail addresses dwight.oneal@ocps.net Which is (username@domain)
message headers consist of: the To, CC, Bcc, Subject and Attachment components In order to send you have to have an address in the To Field, but you do not have to have a subject

9 E-mail message headers consist of: the To, CC, Bcc, Subject and Attachment components
In order to send you have to have an address in the To Field, but you do not have to have a subject

10 When you receive an transmission with an attachment your browser knows which application or plug-in to open to view or play the attachment by having the MIME definition for the application or plug-in that is located inside the HTTP header at the beginning of the transmission

11 Web-Based Messages Advantages: You can add an attachment
Disadvantages: Your user name and password reside on a third-party server.

12 Attachments The organization scans attachments to ensure that they contain no malicious code the scanning takes place at the server. Pretty Good Privacy (PGP) and GNU Privacy Guard (GPU) encrypt: the message and its attachments

13 Spam Spam =term for unsolicited and unwanted e-mail message.
Administrators can use IP addresses of known spammers to filter out the Blackhole list. CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart)= used to detect automated systems used by spammers for registering accounts. Open relay =The term for an SMTP server that allows the third party relay of messages that spammers use to send spam?

14 Definitions Multipurpose internet Mail Extensions (MIME)=a protocol that can be used by application to automatically process files downloaded from the internet. Secure Multipurpose Internet Mail Extensions (S/MIME) and Pretty Good Privacy (PGP)= supports the encryption and decryption of messages. You would use a personal information management (PIM) program to schedule appointments and meetings, store contact information, and manage tasks.

15 GNU Privacy Guard (GPU)=is an open-source implementation of Pretty Good Privacy (PGP) that does not use patented algorithms Electronic mail ( )=is considered the de facto standard communication tool for business


Download ppt "Lesson 7: Business, , & Personal Information Management"

Similar presentations


Ads by Google