Lesson 7: Business, , & Personal Information Management

Slides:



Advertisements
Similar presentations
Basic Communication on the Internet:
Advertisements

COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
Introduction to Your Name Goes Here
Basic Communication on the Internet: Integrated Browser Programs and Web-Based Services Tutorial 3.
PYP002 Intro.to Computer Science Working with 1 Working With Chapter 18.
Information Networking Security and Assurance Lab National Chung Cheng University Guidelines on Electronic Mail Security
Internet Basics The World Wide Web. Page 1 Web Basics The World Wide Web The Web is a collection of files organized as a giant hypertext Many of these.
Tutorial 2 Basic Communication on the Internet: New Perspectives on The Internet, Seventh Edition.
Exploring Microsoft Office Outlook Microsoft Outlook 2000 A Desktop Information Manager By Robert T. Grauer Maryann Barber.
Fundamentals of Electronic Mail From Greenlaw/Hepp, In-line/On-line: Fundamentals of the Internet and the World Wide Web 1 Introduction Advantages.
Copyright © 2007 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Web 101 Third Edition by Wendy G. Lehnert & Richard L. Kopec Chapter 3: .
Chapter 30 Electronic Mail Representation & Transfer
Guide to Operating System Security Chapter 10 Security.
POP Configuration Microsoft Outlook Express 6.x.
XP New Perspectives on The Internet, Fifth Edition— Comprehensive, 2005 Update Tutorial 3 1 Evaluating Integrated Browser Programs and a Web-Based.
Surrey Libraries Computer Learning Centres Totally New to Computers Easy Gmail March 2013 Easy Gmail Teaching Script.
-I CS-3505 Wb_ -I.ppt. 4 The most useful feature of the internet 4 Lots of different programs, but most of them can talk to each.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
Practical PC, 7 th Edition Chapter 9: Sending and Attachments.
Copyright © 2007 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Web 101 Third Edition by Wendy G. Lehnert & Richard L. Kopec Modified by.
E – Mail History of s What is an ? What happens when we sent an ? messages Folders Address Attachments Types of.
Technology ICT Option: . Electronic mail is the transmission of mainly text based messages across networks This can be within a particular.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
Computer Concepts 2014 Chapter 7 The Web and .
Unit 9 Communication Services
Outlook 2000 Summertime Technology 2002 Vicki Blackwell Tangipahoa Parish Schools.
Prepared by: Ms Melinda Chung Chapter 3: Basic Communication on the Internet: .
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
Electronic Mail Originally –Memo sent from one user to another Now –Memo sent to one or more mailboxes Mailbox –Destination point for messages.
Syllabus outcomes Describes and applies problem-solving processes when creating solutions Designs, produces and evaluates appropriate solutions.
A form of communication in which electronic messages are created and transferred between two or more devices connected to a network.
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
Tutorial 2: Basic Communication on the Internet: .
CPT 499 Internet Skills for Educators Electronic Mail Session Five.
Electronic Communication Is the process of sending and receiving messages. Text Message File Transfer Sending messages from one computer.
1 Using Messages sent from machine to machine and stored for later reading. You will use a client to read –Type mail or pine in UNIX to read.
(or ?) Short for Electronic Mail The transmission of messages over networks.
Windows Tutorial 4 Working with the Internet and
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
1 Blackboard To Log In: Go To: Click On: Login Username: Firstname.Lastname Password: Last 4 digits of S.S. # View often for.
What is and How Does it Work?  Electronic mail ( ) is the most popular use of the Internet. It is a fast and inexpensive way of sending messages.
Microsoft Office Illustrated Introductory, Second Edition Started with Outlook 2003 Getting.
Microsoft Office XP Illustrated Introductory, Enhanced Started with Outlook 2002 Getting.
Chapter 9 Sending and Attachments. 2Practical PC 5 th Edition Chapter 9 Getting Started In this Chapter, you will learn: − How works − How.
Preparing s Using Etiquette Lesson A4-3.
Preparing s Using Etiquette. Learning Objectives Define . List the parts of an and an header. List rules for etiquette.
The Internet 8th Edition Tutorial 3 Using Web-Based Services for Communication and Collaboration.
Advantages Convenience Speed Inexpensive Saves on natural resources Reliable Not limited to text.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 1 Evaluating an Program and a Web-Based Service Basic Communication.
INTERNET PROTOCOLS. Microsoft’s Internet Information Server Home Page Figure IT2031 UNIT-3.
Security fundamentals Topic 9 Securing internet messaging.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
A Quick Look At How Works Understanding the basics of how works can make life a lot easier for any user. Especially those who are interested.
Amanda Fristy Damara Thea Bayu Gerhana Yuda Evita Fitri Ila Uswatun Hasanah Putri Ayuning Kartika Presented by :
RYAN HICKLING. WHAT IS AN An messages distributed by electronic means from one computer user to one or more recipients via a network.
CITA 310 Section 6 Providing Services (Textbook Chapter 8)
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Chapter 9 Sending and Attachments. Sending and Attachments FAQs: – How does work? – How do I use local ? – How do I use Web-based.
By Toby Reed.
Definitions. Inbox – Incoming s are stored in the Inbox Sent Box – Set your system to save your sent messages.
26.1 Electronic Mail Sending/Receiving Mail Addresses User Agent MIME Mail Transfer Agent Mail Access Protocols.
CIW LESSON 7 PART A. INTRODUCTION TO BUSINESS ELECTRONIC MAIL The use of has given rise to the term ______________________, which is a slang term.
Internet Business Associate v2.0
Introduction to Your Name Goes Here
CIW Lesson 7 Part A Name: _______________________________________
Technology ICT Option: .
Introduction to Your Name Goes Here
ICT Communications Lesson 5: Communicating Using
Technology ICT Option: .
Chapter 7 Network Applications
Presentation transcript:

Lesson 7: Business, E-Mail, & Personal Information Management

E-mail is not dead E-mail is still the preferred standard communication tool for businesses. Benefits: ability to write lengthy messages Include attachments displayed as a separate link, such as an icon. The organization scans e-mail attachments to ensure that they contain no malicious code the scanning takes place at the e-mail server. Having an email trail of your communication In an e-mail message recipients must possess a software necessary to open or edit the attached file to view a file attachment is the software necessary

E-mail Protocols Two types of protocols: outgoing and incoming Outgoing server: Simple Mail Transfer Protocol (SMTP) is used to send e-mail messages Incoming server: Mail delivery agent (MDA) e-mail server program that receives sent messages and delivers them to their proper destination.

Composing E-mails Reply all=is the following e-mail response option that you should use to respond to the original sender of an e-mail message and include everyone who was copied Reply=is the following e-mail response option that you should use to respond only to the original sender of an e-mail message Forward=is the following e-mail response option that you should use to send an e-mail message to users who did not receive the original The appearance of right-pointing angle brackets (>) in the text of an e-mail message indicates that the message contains: forwarded text Unread messages are seen as a closed-envelope (or similar) icons in an Inbox’s Message list represent

Writing E-mails Emotion=is the term for a combination of characters that you read sideways that helps convey emotion in an e-mail message. Netiquette Shouting or anger is when someone uses all capital letters in an e-mail You should you use an out-of-office messages when you will be out of the office for an extended period of time to explain why you may not respond to e-mail messages within a reasonably short period of time. Auto responder =is the term for the feature in an e-mail client that automatically sends a specified response to anyone who sends e-mail to your address. E-mail thread=an e-mail message that includes information from the original e-mail message in a response.

By default, e-mail clients typically save a copy of every message you send in that Standard postal service When you use an e-mail client to send and receive mail messages stored in your Outbox e-mails are sent, a copy of each sent message is stored in the Sent Items folder, and incoming messages are routed to your Inbox. Set up a spam filter in your e-mail client to filter out spam messages is a client-side action that can be taken to reduce the amount of spam you receive. Outbox folder=was designed for users with dial-up accounts who want to work offline and accumulate messages, then connect to the Internet and send all their queued messages at once.

You receive e-mail from an incoming mail server using POP3 or IMAP (they are used to store and access e-mails). POP3 AKA Post Office Protocol version 3 is known as a “store-and-forward” e-mail service. IMAP AKA Internet Message Access Protocol is known as “store-and-hold” Local access to e-mail messages are important for those who use IMAP servers because if a network problem occurs, IMAP server users may not have access to their messages

E-mail addresses dwight.oneal@ocps.net Which is (username@domain) E-mail message headers consist of: the To, CC, Bcc, Subject and Attachment components In order to send email you have to have an address in the To Field, but you do not have to have a subject

E-mail message headers consist of: the To, CC, Bcc, Subject and Attachment components In order to send email you have to have an address in the To Field, but you do not have to have a subject

When you receive an e-mail transmission with an attachment your browser knows which application or plug-in to open to view or play the attachment by having the MIME definition for the application or plug-in that is located inside the HTTP header at the beginning of the transmission

Web-Based Messages Advantages: You can add an attachment Disadvantages: Your user name and password reside on a third-party server.

Attachments The organization scans e-mail attachments to ensure that they contain no malicious code the scanning takes place at the e-mail server. Pretty Good Privacy (PGP) and GNU Privacy Guard (GPU) encrypt: the e-mail message and its attachments

Spam Spam =term for unsolicited and unwanted e-mail message. Administrators can use IP addresses of known spammers to filter out the Blackhole list. CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart)= used to detect automated systems used by spammers for registering e-mail accounts. Open relay =The term for an SMTP server that allows the third party relay of e-mail messages that spammers use to send spam?

Definitions Multipurpose internet Mail Extensions (MIME)=a protocol that can be used by application to automatically process files downloaded from the internet. Secure Multipurpose Internet Mail Extensions (S/MIME) and Pretty Good Privacy (PGP)= supports the encryption and decryption of e-mail messages. You would use a personal information management (PIM) program to schedule appointments and meetings, store contact information, and manage tasks.

GNU Privacy Guard (GPU)=is an open-source implementation of Pretty Good Privacy (PGP) that does not use patented algorithms Electronic mail (e-mail)=is considered the de facto standard communication tool for business