Advanced Guide to E-Mailing. Introduction In this e-mail guide you and explain will learn how to use e-mailing in an advanced way. I will go through on.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

s How to send an 1.Log on to your using the correct addrss, when you first log in it will look something like this. 2.Towards the.
Task 1b. Georgia Crich.. attachments. An attachment is a file such as a picture or a document and any file in your computer that you send in an .
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
 When you receive a new you will be shown a highlighted in yellow box where your can be found  To open your new just double click.
Adding attachments on an Attachments are files e.g. Videos, Photos, Word, PowerPoint, and work these are sent with an . Attachments are very.
evidence. Safety To stay safe on the internet there are many points you need to follow. The first point is to change your password regularly, you.
This is the first page of the log in, this is were you enter your unique details.
This PowerPoint presentation will show you how to use your productively and successfully.
User Guide Joseph Harris. Open To open an you need to double click on it and the selected should open.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Technology ICT Option: . Electronic mail is the transmission of mainly text based messages across networks This can be within a particular.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Information guide.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
. Open a Click on your inbox and click on a you want to open then it will open.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
A beginner’s guide to Webmail. What do you need? A computer, or a smartphone An internet connection An account with an service provider.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
By Masum Ahmed UNIT ONE (TASK TWO) – RETRAINING OF CURRENT EMPLOYEES ON THE ING SYSTEM.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Etiquette – a list of rules that we observe Phishing - sending an to a user falsely claiming to be a legitimate company to scam the user into providing.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
How to use ? By Martyna Haliniak. How to log on? In order to log on, you have to type in your username & password in the text boxes, and then click.
This PowerPoint presentation will show you how to use your productively and successfully.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
 Subject: The topic you are talking about. So they understand what it is a about and explain to the point.  clients usually display it in a.
. Here is me sending an with an attachment, you click onto the paper clip icon in order to send the attachment.
Santa’s s By Morgan Johnson. Sending an attachment to Santa  Explain how you attached the . Just click attach and click the folder I.
 To send a you need to first click new.  Then type in the name off the person you want to send it to.  Then write something.  And to finish.
Company Guidelines and Basic Rules for …. No text words or slang, all s sent have to be polite and formal Use suitable, relevant subject lines.
s This presentation is all about s, etiquette and software. I will go through these things step by step to give you a clear understanding.
Santa’s s By…….. Sending an attachment to Santa Explain how you attached the . Clicked The Paper Clip and attatched it. Explain why you.
 When you receive a new you will be shown a highlighted in yellow box where your can be found  To open your new just double click.
Features Help (Adding Attachments) (Adding Auto Signatures) (Setting Priorities)
STAYING SAFE: Here are some safety tips when using Change your password regularly and keep it in a safe place. Don’t share your password with anyone.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Attachments. By Lisa Law. Attachments. An attachment is a file eg pictures, videos and file Microsoft word, power points, spreadsheet as, websites.
Tool Kit. Receiving an When you receive an , it will appear on the white box, which is the conversation list. To do this you will have.
safety Bailey mullan. dangers ing has become on of the main sources for communicating. When using it is more likely for someone.
Santa’s s By Chantelle Cogin. Sending an attachment to Santa I made a new message and i pressed the insert button and choose what I wanted.
In this document I will explain what attachments are, why attachments are useful and a screen shot of the following showing how to add attachments.
This Guide is going to be about how to  attach files  create a signature  send to multiple recipients with using ‘Cc’ and ‘Bcc’  change the priority.
How to use in outlook 365. Opening outlook 365 Firstly you want to click the windows button in the bottom left corner of your screen which will.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Setting up Suitable for: Beginner.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
screen shots Emma Jarman. Adding attachments What is an attachment? An attachment is an that has a file attached to it. The file could be.
1. Setting up an account- technical
Yahoo! Mail We gave Google some good press so we’ll use Yahoo! mail as our example for web s. If you don’t have an account Yahoo! will provide.
What it is and how to stop it.  What spam is.  Why it can be dangerous.  How to handle it.
Working On-Line Module 4 People's Resource Center Barry Glicklich Last updated 27 March 2012Working On-Line (BG)1.
Windows Tutorial 5 Protecting Your Computer
Learn how to protect yourself against common attacks
Unit 4 IT Security.
Venture A guide to Advance ing
Lesson 3 Safe Computing.
Protect Your Computer Against Harmful Attacks!
What is it? Why do I keep getting from Barracuda? SPAM.
What you can do to support people to be safe online
Santa’s s By……..
ADVANCED GUIDE TO ING This guide is for people who can already use and send to a good standard but cant use the more advanced.
Presentation transcript:

Advanced Guide to ing

Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on how to use folders, making an , setting priorities, setting auto- signatures, and adding attachments. This e- mail guide is for beginners who have never e- mailed before.

Adding Attachments To add an attachments you need to make an . To make an , press ‘new’ underneath your inbox. In the corner press ‘add attachment’. Click the paperclip under the ‘send’ button and press ‘browse’ and find your file.

Using folders A folder is a group of s in your inbox that you can put underneath the ‘folder’ section. This way you can sort your s into different sections you would like, for example ‘school’, ‘coursework’, ‘personal’, ‘spam’ etc. Right click ‘inbox’ and press ‘create new folder’.

Changing Password As your account password has a default as ‘password’ you can easily change your password. Press ‘options’ at the top hand corner where your name is and there will be message options at the left hand side. Click ‘change password’ and put your old and new password in and press ok.

Dangerous Attachments Sometimes people can put harmful links onto your computer via through risky links and they can spread through viruses, worms and Trojan Horses and they can spread through one computer to another. Every link can potentially be a hazard so you have to be careful and never open a link from an e- mail if you don’t know who the sender is. Also, having an updated anti virus software on your computer that can scan the link can help you from clicking on harmful links that can cause viruses.

Junk Mail and Spam Junk mail, also known as spam, is becoming increasingly popular around the Internet and many people can send it via to advertise something that they want people to see and as ing is reasonably inexpensive many senders can send it millions than sending it by the post and it can be send in a matter of seconds. Many spam s can contain viruses which can harm your computer. To prevent junk mail you can block junk , which already many built in programs have to stop spammers. You can avoid listing your address on the Internet and you can also hide your address from spammers by setting up a separate address dedicated just to Web transactions. A good way to also not get as much spam is to never reply to the s and simply delete them.

Protecting Against Phishing (Spoofing) Phishing is a method that uses spam or pop up methods to steal identities. Typically, it involves an that looks official like from a bank yet they try and hack your computer and get personal information off you in which you may trust them but they’re a different link and it’s not actually an official company. If you suspect a link is not official, do not reply and don’t click on the link and fill in your information as it could be fake. If you aren’t too sure, contact the organisation using a legitimate phone number or open a browser and type in the bank’s name and make sure it’s the correct address before typing in information.

I hope this guide has helped you use the basics on . Happy ing!