Unit 11 Communication & Collaboration

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
The Internet.
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Unit 11 Communication & Collaboration.  Identify different communication methods  Identify advantages of electronic communication  Identify common.
Netiquette Rules.
HUNTINGTON BEACH PUBLIC LIBRARY Basics. What is ? short for electronic mail send & receive messages over the internet.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
AND SPAM BY OLUWATOBI BAKARE
ICT Essential Skills. (electronic mail) Snail Mail.
Security Issues: Phishing, Pharming, and Spam
Unit 10 Communication, Collaboration, and Safety.
OCR Nationals – Unit 1 AO2 (Part 2) – s. Overview of AO2 (Part 2) To select and use tools and facilities to download files/information and to send.
Unit 9 Communication Services
Information guide.
Lesson 27 Communications and Collaboration
Digital Citizenship Jessica L. Webb ED 505. Netiquette Netiquette Social Media- interactive dissemination of information through the internet. Netiquette-
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Digital Citizenship Project.  The etiquette guidelines that govern behavior when communicating on the internet have become known as netiquette.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Unit 10 Communication Services
Unit 2—Using the Computer Lesson 14 and Electronic Communication.
1 Lesson 26 Communications and Collaboration Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Etiquette – a list of rules that we observe Phishing - sending an to a user falsely claiming to be a legitimate company to scam the user into providing.
Basic Features and Options Accessing  Means of communicating electronically via the Internet.  Used by individuals, businesses,
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
ED 505: Magen Anthony. Netiquette on Social Media site is the etiquette or guideline for posting on social media or other online sites. This helps individuals.
Electronic Communication Presentation. Attachments Files you attach and send with an message.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
And more……. ‘Leadership and communication are inseparable. You can’t have one without the other.’ ---Claude I. Taylor.
Digital Citizen Project By: Frances Murphey Technology and Education.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
Definitions. Inbox – Incoming s are stored in the Inbox Sent Box – Set your system to save your sent messages.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Unit 9 Communication Services.  Describe the components for electronic communication  Explain the purpose of usernames, passwords, and credentials 
Communication services
Internet Safety.
Communications and Networks
What they are and how to protect against them
Digital Citizenship.
DIGITAL CITIZENSHIP What You Should Know!.
Technology in society, safety & ethics
Class Name: Online Safety & Privacy Basics
Learn how to protect yourself against common attacks
Ways to protect yourself against hackers
Lesson 3 Safe Computing.
Using Apps to Get and Share Information
Unit 10 Communication, Collaboration, and Safety
is short for electronic mail!
Unit 10 Communication, Collaboration, and Safety
Unit 4 IT Security.
Protect Your Computer Against Harmful Attacks!
Computer Literacy.
Huntington Beach Public Library
August 17, 2015 J. Boles, J.Burnias and M.Garcia Office 2013
Sending an with attachments
Internet Safety Vocabulary
CBP Program – Business Etiquette
Basics HURY DEPARTMENT OF COMPUTER SCIENCE M.TEJASWINI.
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Communication & Collaboration
ICT Communications Lesson 3: Internet Life and Privacy
Basic Features and Options
Basic Features and Options
Presentation transcript:

Unit 11 Communication & Collaboration Living Online Unit 11 Communication & Collaboration

Objectives Identify different communication methods Identify advantages of electronic communication Identify common problems with electronic communication Identify elements of professional electronic communication Identify appropriate use of email attachments Identify issues with unsolicited email Describe how to control unsolicited email Identify procedures for safe electronic communication

Communication Methods Need real-time? Use IM Need a paper trail? Use Email Most widely used Distance Learning? Video Conference Other Blog, message board

Advantages of Electronic Communication Speed Low cost/free Access from various devices, cell or computer Forwarding of messages can be done Collaborative Share documents You can keep track of sites visited Stored on your computer (on next slide) One to one popular: Email

Viewing Browser History Favorites Center Options: By site By date By most visited Search

Problems with Electronic Communication: Email Issues Attachments Size may be too big/too many Virus Blocked by program Delivery Failure Bounced Mistyped address Virus detected/spam filter You’ve been blocked by receiver Their mailbox is full

Problems with Electronic Communication: Paper Trail Written record or history Can be used in legal cases You may need proof Email can provide that IM, phone/online conferences can’t

Problems with Electronic Communication: Hasty Responses Say something you wish you could take back You get an email that makes you angry Discuss with someone/calm down Write email & leave out To: address until sure Save as draft & wait a day Reply, Reply All Proper spelling & grammar

Email Ettiquete Include a subject Try to keep to 1 subject Brief yet descriptive enough Try to keep to 1 subject Keep message short Avoid ALL CAPS! Limit jokes, symbols :-o Proofread before sending Double check the addresses DON’T EMBARRASS YOURSELF! Email sent through company is NOT private

Which is Best?

Unwanted Email Spam Unsolicited ads Don’t reply to junk emails Typically, an e-mail message is sent to multiple recipients who did not ask to receive it. E-mail messages are not considered spam if a user has signed up to receive them.

Spam Facts- FYI Estimated 80% of email is spam 1978 - An e-mail spam is sent to 600 addresses 1994 - First large-scale spam sent to 6000 newsgroups, reaching millions of people. 2005 - 30 billion per day 2006 - 55 billion per day 2010- Spam is 92% of email sent

Spam Be careful giving out your email Check privacy statements Do not publish it online Check privacy statements They may share your email address DO NOT reply to junk mails They’ll know they have a valid email address You’ll get more junk! Use the junk email filter

Phishing Steals your personal info Spoofed sites & emails Emails that appear to come from original source Asks you to change password Link takes you to copied site User collects your info

Spam vs. Phishing How does it arrive? How does it make its offer? Spam: Sneaks in the back door Phishing: Walks in the front door How does it make its offer? Spam: Looks bad, seems far-fetched Phishing: Looks plausible, seems credible What is it trying to do? Spam: Tries to sell you something Phishing: Tries to steal something from you

Review What’s worse, spam or phishing? Let’s Play Phishing Scams- Avoid the Bait Spam Scam Slam Follywood Squares Phishing IQ Test

Viruses Program written to cause disruption Attached to a file or email Spreads Worm- copies itself across network & slows it down Time Bomb- damage at certain time/date Trojan Horse- looks like something good, but isn’t Protect with Antivirus software Update regularly Be careful opening emails Scan attachments first

Safe Guidelines Virus program scan all emails (in & out) Virus program subscription Schedule scan Review emails & IMs before sending ISP can filter emails as well Understand netiquette & company rules Encrypt emails with private info Save & backup your emails Remember the “paper trail” Follow laws

Review T or F. Email paper trails cannot be used as legal documents. Junk email is also called _______. ______ refers o good manners when communicating electronically. ______ tries to get/steal your private info. ______ is just annoying!

Unit 11 Communication & Collaboration Living Online Unit 11 Communication & Collaboration