Presented by: Sehar Munawar Registration no: B2F17ASOC0035 Presented to: Sir Waseem Iqbal & management & spam.

Slides:



Advertisements
Similar presentations
. WHAT IS ? Electronic method of transferring information directly from one PC to another. Electronic method of transferring information directly.
Advertisements

A brief guide to web-based . What do you need? A computer, a tablet or a smartphone An internet connection (ethernet, wifi or 3G) An account with.
. Today you will: Learn about how an is processed once it has been sent Learn some advantages and disadvantages of using Learn how.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Surrey Public Library Electronic Classrooms Essentials.
Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Introduction to Your Name Goes Here
Exploring Microsoft Office Outlook Microsoft Outlook 2000 A Desktop Information Manager By Robert T. Grauer Maryann Barber.
Surrey Libraries Computer Learning Centres Totally New to Computers Easy Gmail September 2013 Easy Gmail Teaching Script.
Surrey Libraries Computer Learning Centres Totally New to Computers Easy Gmail March 2013 Easy Gmail Teaching Script.
E – Mail History of s What is an ? What happens when we sent an ? messages Folders Address Attachments Types of.
Technology ICT Option: . Electronic mail is the transmission of mainly text based messages across networks This can be within a particular.
1 WELCOME TO BASIC Instructor Donna DeMedicis ♦ 22 Years of Library Service ♦ BPL Support Staff In Opening The Regional Library Computer Center (Gates.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Unit 10 Communication Services.  Identify types of electronic communication  Describe users of electronic communication  Identify major components.
and VOIP. Definitions Storage- the action or method of storing something for future use. Forward system- Address book- A book for recording the.
A beginner’s guide to Webmail. What do you need? A computer, or a smartphone An internet connection An account with an service provider.
Computer Technology Michael Viphongsay 4B. Electronic mail Internet or Intranet.
9/4/01Mary Price ( )1 ELECTRONIC MAIL. 9/4/01Mary Price ( )2 Electronic Mail ( ) A facility which allows text messages and computer files.
What is and How Does it Work?  Electronic mail ( ) is the most popular use of the Internet. It is a fast and inexpensive way of sending messages.
Telecommunications Communication over a long distance; Distant communication.
Chapter 9 Sending and Attachments. 2Practical PC 5 th Edition Chapter 9 Getting Started In this Chapter, you will learn: − How works − How.
Introduction to Student Name Student Class.
How to Read Outlook . Make sure the computer is on.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
safety Bailey mullan. dangers ing has become on of the main sources for communicating. When using it is more likely for someone.
1 E- Mail. 2 Electronic Mail ( ) is simply a means of sending messages via computer Business is using more and fax To access you must.
Let’s Talk About ! Instructor: Robert Griffiths Spring 2010 (original presentation developed by Jill Bond)
Internet safety By Suman Nazir
RYAN HICKLING. WHAT IS AN An messages distributed by electronic means from one computer user to one or more recipients via a network.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Electronic Mail. Gmail Accounts USERNAME Skyward PASSWORD Same password as you use to log in to your computer.
Investigating Methods for Reducing Spam By: Steven Siggers Instructor: Marko Puljic.
Chapter 9 Sending and Attachments. Sending and Attachments FAQs: – How does work? – How do I use local ? – How do I use Web-based.
By Toby Reed.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
Definitions. Inbox – Incoming s are stored in the Inbox Sent Box – Set your system to save your sent messages.
. Electronic. is a method of exchanging digital messages. What does the E in stand for?
Working On-Line Module 4 People's Resource Center Barry Glicklich Last updated 24 December 2011Working On-Line (BG)1.
Week-2 (Lecture-1) An electronic message sent from one computer to another. contains account i.e. How does.
Internet Security TEAMS March 18 th, ISP:Internet Service Provider.
Using Using Computers Safely, Effectively and Responsibly.
Communications and Networks
3.2 Introduction to .
& Google Gmail.
Learn how to protect yourself against common attacks
Electronic Mail.
Introduction to Your Name Goes Here
Fix Thunderbird Error 5.7.1 Call Toll-free
Computer Literacy.
Introduction to Justin R. Scott CIS Introduction to .
Electronic Mail.
Technology ICT Option: .
Electronic Mail.
Electronic Mail Opening Activity: 411 of
3.2 Introduction to .
Fun gym Cambridge Nationals R001.
Introduction to Your Name Goes Here
Electronic Mail.
Electronic Mail.
.
ICT Communications Lesson 5: Communicating Using
Technology ICT Option: .
Security in mobile technologies
Computer Technology.
Wireless Spoofing Attacks on Mobile Devices
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Go to the page Set here the address for receiving the s sent to the mailing lists to which you are subscribing.
Presentation transcript:

Presented by: Sehar Munawar Registration no: B2F17ASOC0035 Presented to: Sir Waseem Iqbal & management & spam

-Electronic Mail  Send mail electronically via the Internet  Requires an account on a mail server and supporting software on your PC  The username and password will allow you to access your account  All programs allow you to Send, Compose, Reply, and Forward mail  Send mail electronically via the Internet  Requires an account on a mail server and supporting software on your PC  The username and password will allow you to access your account  All programs allow you to Send, Compose, Reply, and Forward mail

Obtaining an Account  You will need an server (post office) in order to send and receive .  Internet  Electronic device  You can get free accounts:    You will need an server (post office) in order to send and receive .  Internet  Electronic device  You can get free accounts:  

Adv and Disadv of  Advantage  cheap  Fast  Permanent  Disadvantages  Spam  Viruses  Sending by mistake  Data storage  Advantage  cheap  Fast  Permanent  Disadvantages  Spam  Viruses  Sending by mistake  Data storage

management  management is a specific field of communications management for managing high volumes of inbound electronic mail received by organizations. Customer service call centers currently employ response management agents along with telephone support agents, and typically use software solutions to manage s.

Spam  It is invented by George Hormel & co. in To name a food product named SP iced h AM.  Irrelevant or unsolicited messages sent over the Internet, typically to a large number of users, for the purposes of advertising, phishing, spreading malware, etc.  It is invented by George Hormel & co. in To name a food product named SP iced h AM.  Irrelevant or unsolicited messages sent over the Internet, typically to a large number of users, for the purposes of advertising, phishing, spreading malware, etc.

How to prevent Spam  Always use an update trustworthy spam filtering program.  Never share your address with untrusted websites.  Avoid responding suspected .  Use sign or any combination of words or numbers after your address.  Always use an update trustworthy spam filtering program.  Never share your address with untrusted websites.  Avoid responding suspected .  Use sign or any combination of words or numbers after your address.