Basic Communication on the Internet:

Slides:



Advertisements
Similar presentations
The Internet 8th Edition Tutorial 3 Using Web-Based Services for Communication and Collaboration.
Advertisements

COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
. How it works? To send an you need an Software or Web Based To send an to a friend you need to know their Address.
Basic Communication on the Internet: Integrated Browser Programs and Web-Based Services Tutorial 3.
Lesson 7: Business, , & Personal Information Management
Chapter 29 Structure of Computer Names Domain Names Within an Organization The DNS Client-Server Model The DNS Server Hierarchy Resolving a Name Optimization.
Tutorial 5 Downloading and Storing Data. XP Objectives Learn what FTP is and how it works Explore how to use a Web browser to transfer files Navigate.
Tutorial 2 Basic Communication on the Internet: New Perspectives on The Internet, Seventh Edition.
Fundamentals of Electronic Mail From Greenlaw/Hepp, In-line/On-line: Fundamentals of the Internet and the World Wide Web 1 Introduction Advantages.
Chapter 30 Electronic Mail Representation & Transfer
By Laura Trawin.
XP New Perspectives on The Internet, Fifth Edition— Comprehensive, 2005 Update Tutorial 3 1 Evaluating Integrated Browser Programs and a Web-Based.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
ICT Essential Skills. (electronic mail) Snail Mail.
Technology ICT Option: . Electronic mail is the transmission of mainly text based messages across networks This can be within a particular.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
Unit 9 Communication Services
Outlook 2000 Summertime Technology 2002 Vicki Blackwell Tangipahoa Parish Schools.
Prepared by: Ms Melinda Chung Chapter 3: Basic Communication on the Internet: .
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 1 Evaluating an Program and a Web-Based Service Basic Communication.
Electronic Mail Originally –Memo sent from one user to another Now –Memo sent to one or more mailboxes Mailbox –Destination point for messages.
A form of communication in which electronic messages are created and transferred between two or more devices connected to a network.
This presentation will be all about s, etiquette and software. I will be going through each one of these individually and thoroughly step.
This presentation will be all about s, etiquette and software. I will be going through each one of these individually and thoroughly step.
Tutorial 2: Basic Communication on the Internet: .
WXET1143 Lecture7: , Chat and Messaging. Introduction  Electronic mail is everywhere.  Now many people in business, government, and education use.
CPT 499 Internet Skills for Educators Electronic Mail Session Five.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
Electronic Communication Is the process of sending and receiving messages. Text Message File Transfer Sending messages from one computer.
1 Using Messages sent from machine to machine and stored for later reading. You will use a client to read –Type mail or pine in UNIX to read.
(or ?) Short for Electronic Mail The transmission of messages over networks.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
1 Blackboard To Log In: Go To: Click On: Login Username: Firstname.Lastname Password: Last 4 digits of S.S. # View often for.
What is and How Does it Work?  Electronic mail ( ) is the most popular use of the Internet. It is a fast and inexpensive way of sending messages.
Unit 2—Using the Computer Lesson 14 and Electronic Communication.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 5 1 Downloading and Storing Data Using FTP and Other Services to Transfer and.
Telecommunications Communication over a long distance; Distant communication.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
The Internet The internet is simply a worldwide computer network that uses standardised communication protocols to transmit and exchange data.
advantages The system is nearly universal because anyone who can access the Internet has an address. is fast because messages.
Microsoft Office Illustrated Introductory, Second Edition Started with Outlook 2003 Getting.
Microsoft Office XP Illustrated Introductory, Enhanced Started with Outlook 2002 Getting.
Basic Features and Options Accessing  Means of communicating electronically via the Internet.  Used by individuals, businesses,
Concepts  messages are passed through the internet by using a protocol called simple mail transfer protocol.  The incoming messages are.
Preparing s Using Etiquette Lesson A4-3.
s This presentation is all about s, etiquette and software. I will go through these things step by step to give you a clear understanding.
This presentation will be all about s, etiquette and software. I will be going through each one of these individually and thoroughly step.
Preparing s Using Etiquette. Learning Objectives Define . List the parts of an and an header. List rules for etiquette.
Introduction to Student Name Student Class.
The Internet 8th Edition Tutorial 3 Using Web-Based Services for Communication and Collaboration.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 1 Evaluating an Program and a Web-Based Service Basic Communication.
XP Browser and Basics COM111 Introduction to Computer Applications.
Managing Your Inbox. Flagging Messages Message requires a specific response or action from the recipient Flagging draws attention to your request Quick.
Living Online Lesson 3 Using the Internet IC3 Basics Internet and Computing Core Certification Ambrose, Bergerud, Buscge, Morrison, Wells-Pusins.
NetTech Solutions Microsoft Outlook and Outlook Express Lesson Four.
INTERNET PROTOCOLS. Microsoft’s Internet Information Server Home Page Figure IT2031 UNIT-3.
A Quick Look At How Works Understanding the basics of how works can make life a lot easier for any user. Especially those who are interested.
(Electronic Mail) a message sent and received electronically via telecommunication links between computers.
Amanda Fristy Damara Thea Bayu Gerhana Yuda Evita Fitri Ila Uswatun Hasanah Putri Ayuning Kartika Presented by :
RYAN HICKLING. WHAT IS AN An messages distributed by electronic means from one computer user to one or more recipients via a network.
Do Now: Describe the steps used to access the comments tool in MS Word. ( review your notes for the answer) Ex: Step 1. Select the text or item you want.
Electronic Mail. Gmail Accounts USERNAME Skyward PASSWORD Same password as you use to log in to your computer.
Chapter 9 Sending and Attachments. Sending and Attachments FAQs: – How does work? – How do I use local ? – How do I use Web-based.
is short for electronic mail!. What is ? An electronic message sent from one computer to another. saves money and time compared to regular.
CIW LESSON 7 PART A. INTRODUCTION TO BUSINESS ELECTRONIC MAIL The use of has given rise to the term ______________________, which is a slang term.
Communication services
Internet Business Associate v2.0
is short for electronic mail!
CIW Lesson 7 Part A Name: _______________________________________
Presentation transcript:

Basic Communication on the Internet: Email Tutorial 2 Basic Communication on the Internet: Email

Objectives Learn about email and how it works Learn about different email clients Learn about viruses, antivirus software, and spam Configure and use Windows Live Mail to send, receive, and print email messages Create and maintain contacts in Windows Live Mail New Perspectives on the Internet, 8th Edition

What is Email and How Does It Work? Electronic mail, or email, is a form of communication in which electronic messages are created and transferred between two or more devices connected to a network Email is one of the most popular forms of business communication, and for many people it is their primary use of the Internet When you send an email message, the message is sent to a mail server, which is a hardware and software system that determines from the recipient’s address one of several electronic routes on which to send the message New Perspectives on the Internet, 8th Edition

What is Email and How Does It Work? Special protocols, or rules that determine how the Internet handles message packets flowing on it, are used to interpret and transmit email SMTP (Simple Mail Transfer Protocol) determines which paths an email message takes on the Internet Another protocol called POP (Post Office Protocol) handles incoming messages Other protocols used to deliver mail include IMAP (Internet Message Access Protocol) and MIME (Multipurpose Internet Mail Extensions) New Perspectives on the Internet, 8th Edition

What is Email and How Does It Work? The software that requests mail delivery from the mail server to an Internet device is known as mail client software, or an email program To route an email message to an individual, you must identify that person by his or her account name, or user name, and also by the name of the mail server that manages email sent to the domain New Perspectives on the Internet, 8th Edition

Common Features of an Email Message The message header contains information about the message, and the message body contains the actual message content An optional signature might appear at the bottom of an email message and contain standard information about the sender, which the recipient can use to contact the sender in a variety of ways New Perspectives on the Internet, 8th Edition

Common Features of an Email Message New Perspectives on the Internet, 8th Edition

Common Features of an Email Message You type the recipient’s full email address in the To line of a message header You can use the optional courtesy copy (Cc) and the blind courtesy copy (Bcc) lines to send mail to people who should be aware of the email message, but are not the message’s main recipients Sometimes an email address is not one person’s address, but rather, a special address called a group or a category New Perspectives on the Internet, 8th Edition

Common Features of an Email Message The From line of an email message includes the sender’s name, the sender’s email address, or both The content of the Subject line is very important An attachment provides a simple and convenient way of transmitting files to one or more people Some programs refer to the process of saving an email attachment as detaching the file If you are using email for business communication, a signature file usually contains your name, title, and your company’s name New Perspectives on the Internet, 8th Edition

Common Features of an Email Message New Perspectives on the Internet, 8th Edition

Common Features of an Email Message Netiquette, a term coined from the phrase “Internet etiquette,” is the set of commonly accepted rules that represent proper behavior on a network An emoticon is a group of keyboard characters that when viewed together represent a human expression New Perspectives on the Internet, 8th Edition

Common Features of Email Programs A message can be queued, or temporarily held with other messages, and then sent when you either exit the program, connect to your ISP or network, or check to see if you have received any new email Some programs let you define and use a filter to move incoming mail into a specific folder or to delete it automatically based on the content of the message Filters are especially useful for moving messages from certain senders into designated folders, and for moving junk mail (or spam), which is unsolicited mail, usually advertising or selling an item or service, to a trash folder New Perspectives on the Internet, 8th Edition

Common Features of Email Programs When you forward a message to another recipient, a copy of the original message is sent to the new recipient you specify without the original sender’s knowledge A quoted message is a copy of the sender’s original message with your inserted comments When you reply to a message that you received, the email program creates a new message and automatically addresses it to the original sender (when you select the Reply option) or to the original sender and all of the original To and Cc recipients of the message (when you select the Reply All option) New Perspectives on the Internet, 8th Edition

Maintaining an Address Book You use an address book to save email addresses and other optional contact information about the people and organizations with which you correspond Messages that are routed through a domain in this way are called POP messages or POP3 messages because of the protocol used to send them New Perspectives on the Internet, 8th Edition

Mozilla Thunderbird Mozilla Thunderbird is part of the Mozilla open source project New Perspectives on the Internet, 8th Edition

Mozilla Thunderbird To make it easy to find messages based on criteria that you specify, Thunderbird lets you create Saved Search folders A Saved Search folder looks like a regular mail folder, but when you click it, it searches every folder and message for matches using criteria that you specify New Perspectives on the Internet, 8th Edition

Opera Mail Another popular email program is the Opera Mail built-in email client, which is installed with the Opera Web browser New Perspectives on the Internet, 8th Edition

Protecting Your Computer from Viruses Email attachments, just like any other computer files, can contain malicious programs called viruses that can harm your computer and its files Software that only detects viruses and eliminates them is called an antivirus program The category of software that detects viruses and other common security threats on the Internet is called Internet security software A virus signature (also called a virus pattern or a virus definition) is a sequence (string) of characters that is always present in a particular virus New Perspectives on the Internet, 8th Edition

“You’ve Got Spam!” Spam, also known as unsolicited commercial email (UCE) or bulk mail, includes unwanted solicitations, advertisements, or email chain letters sent to an email address One way to limit the amount of spam an organization or individual receives is to reduce the likelihood that a spammer can automatically generate their email addresses New Perspectives on the Internet, 8th Edition

“You’ve Got Spam!” Another way to reduce spam is to control the exposure of your email address in places where spammers look for them Some individuals use multiple email addresses to thwart spam Many U.S. jurisdictions have passed laws that provide penalties for sending spam New Perspectives on the Internet, 8th Edition

“You’ve Got Spam!” In January 2004, the U.S. CAN-SPAM law (the law’s name is an acronym for “Controlling the Assault of Non-Solicited Pornography and Marketing”) went into effect New Perspectives on the Internet, 8th Edition

Summary How email works Different email clients Viruses, antivirus software, and spam New Perspectives on the Internet, 8th Edition