Electronic Mail Opening Activity: 411 of

Slides:



Advertisements
Similar presentations
Basic Communication on the Internet:
Advertisements

Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Computer Literacy 1 Transition Plus Services.
  Cyberbullying can be as simple as continuing to send e- mail or text harassing someone who has said they want no further contact with the sender.
Basics. 2 Class Outline Part 1 - Introduction –Explaining –Parts of an address –Types of services –Acquiring an account.
HUNTINGTON BEACH PUBLIC LIBRARY Basics. What is ? short for electronic mail send & receive messages over the internet.
Surrey Libraries Computer Learning Centres Totally New to Computers Easy Gmail September 2013 Easy Gmail Teaching Script.
Surrey Libraries Computer Learning Centres Totally New to Computers Easy Gmail March 2013 Easy Gmail Teaching Script.
ICASAS206A Detect and protect from spam and destructive software Identify and Stop Spam Warren Toomey North Coast TAFE Port Macquarie campus.
Threats to I.T Internet security By Cameron Mundy.
WEBPAGE DESIGN Electronic Mail Anatomy of an Message Messages Contain Two Parts: HHeader AAddressing information To From Subject MMessage.
Technology ICT Option: . Electronic mail is the transmission of mainly text based messages across networks This can be within a particular.
COMPUTER TECHNOLOGY Electronic Mail Advantages of Using Less intrusive than a phone call Cheaper and faster than a letter Less hassle than a.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
A beginner’s guide to Webmail. What do you need? A computer, or a smartphone An internet connection An account with an service provider.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Computer stuff LIBS100.
Basics. 2 Professional Development Centre Class Outline Part 1 - Introduction –Explaining –Parts of an address –Types of services.
Unit 10 Communication Services
Computer Technology Michael Viphongsay 4B. Electronic mail Internet or Intranet.
How to use ? By Martyna Haliniak. How to log on? In order to log on, you have to type in your username & password in the text boxes, and then click.
Basic Features and Options Accessing  Means of communicating electronically via the Internet.  Used by individuals, businesses,
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
Preparing s Using Etiquette Lesson A4-3.
Preparing s Using Etiquette. Learning Objectives Define . List the parts of an and an header. List rules for etiquette.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
A Matter of Your Personal Security Phishing. Beware of Phishing s Several employees received an that looked legitimate, as if it was being.
Let’s Talk About ! Instructor: Robert Griffiths Spring 2010 (original presentation developed by Jill Bond)
A Matter of Your Personal Security Phishing Revised 11/30/15.
Internet safety By Kenan.  Viruses are written by malicious programmers who wish to cause problems for other computer users.  The primary source of.
This Guide is going to be about how to  attach files  create a signature  send to multiple recipients with using ‘Cc’ and ‘Bcc’  change the priority.
Basics. Stands for “electronic mail” Digital message sent over the internet Primarily text but can include pictures, sound and attachments.
Internet Safety By. Connor G. Passwords  Never share your password online to strangers.  A password should be a combination of letters and numbers.
Do Now: Describe the steps used to access the comments tool in MS Word. ( review your notes for the answer) Ex: Step 1. Select the text or item you want.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
By Sarah Anderson and Tony Christensen. PARTS OF Header Body Attachments.
Electronic Mail. Gmail Accounts USERNAME Skyward PASSWORD Same password as you use to log in to your computer.
Jeopardy By Katrina Cox & Gordon Moses © July 2008.
. Electronic. is a method of exchanging digital messages. What does the E in stand for?
is short for electronic mail!. What is ? An electronic message sent from one computer to another. saves money and time compared to regular.
Computer Literacy 1 Transition Plus Services.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
When one person sends an electronic message to another person or to a group of people.
Important Information Provided by Information Technology Center
Internet Safety.
Communications and Networks
3.2 Introduction to .
& Google Gmail.
Class Name: Online Safety & Privacy Basics
Lesson 3 Safe Computing.
is short for electronic mail!
What to be aware of and how to avoid problems.
Information Security 101 Richard Davis, Rob Laltrello.
Computer Literacy.
Huntington Beach Public Library
Electronic Mail.
Technology ICT Option: .
An Overview.
The prudent man looketh well to his going.
Electronic Mail.
3.2 Introduction to .
Fun gym Cambridge Nationals R001.
Basics HURY DEPARTMENT OF COMPUTER SCIENCE M.TEJASWINI.
Electronic Mail.
Electronic Mail.
.
ICT Communications Lesson 5: Communicating Using
Technology ICT Option: .
Basic Features and Options
Basic Features and Options
Presentation transcript:

Electronic Mail Opening Activity: 411 of Email

Same password as you use to log in to your computer Gmail Accounts www.gmail.com USERNAME Skyward Login @alpinesd.org Password Same password as you use to log in to your computer

Info about E-mail Definition of Email: The first e-mails required both the sender and the receiver to be on-line at the same time Definition of Email: Messages that are sent and received through an internet server

Parts of e-mail Header Body Attachment To Cc Bcc Subject Line Message Signature Attachment Files that are sent with e-mails

Ways to Respond Reply Reply To All Forward

Netiquette A set of social on-line rules Spell Check DO NOT USE ALL CAPS (THIS IS YELLING) Always fill in the subject line Be careful with emoticons and abbreviations Type what you mean

Passwords The most hacked passwords in 2014 were: 123456 Baseball football The best and most secure passwords include: At least 8 characters long Upper Case & Lower Case Number Special Character (!@#$%^&*<>?) Qwerty Abc123 123456789 dragon

How Secure is your password? https://howsecureismypassword.net/

Be Careful Out There Spam Phishing Cyberbullying Unsolicited unwanted bulk emails (Like Junk mail on the internet) Phishing Attempting to acquire information such as usernames, passwords and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication Cyberbullying Use of technology aimed to hurt someone

Avoid Being Hooked Watch out for weird e-mails or domain endings Weird hyperlinks Misspelled words Not addressing you with your name but using Customer or even “To Whom it may concern” Making you feel like you’ve been invited or won a special prize A threat given when you don’t do something within a given amount of time