Email Extras Plus! Pepper. Objectives E-mail extra knowledge Cookies Picture handling when creating site.

Slides:



Advertisements
Similar presentations
The Web Wizards Guide to Freeware/Shareware Chapter Three Customizing Your Online Experience.
Advertisements

Netscape Mail. Starting Out Launch Netscape From the menu bar select Edit - Preferences The next slides show the configuration for the mail preferences.
Basic Communication on the Internet:
6 C H A P T E R © 2001 The McGraw-Hill Companies, Inc. All Rights Reserved1 Electronic Mail Electronic mail has revolutionized the way people communicate.
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
Chapter 7: The Web and 1 The Web and Chapter 7.
Basic Communication on the Internet: Integrated Browser Programs and Web-Based Services Tutorial 3.
Lesson 7: Business, , & Personal Information Management
6/10/2015Cookies1 What are Cookies? 6/10/2015Cookies2 How did they do that?
XP Browser and Basics1. XP Browser and Basics2 Learn about Web browser software and Web pages The Web is a collection of files that reside.
Internet Basics The World Wide Web. Page 1 Web Basics The World Wide Web The Web is a collection of files organized as a giant hypertext Many of these.
Computer, Internet, Web, and Basics C HAPTER 1.
1 The World Wide Web. 2  Web Fundamentals  Pages are defined by the Hypertext Markup Language (HTML) and contain text, graphics, audio, video and software.
Browser and Basics Tutorial 1. Learn about Web browser software and Web pages The Web is a collection of files that reside on computers, called.
Boris Tshibangu. What is a proxy server? A proxy server is a server (a computer system or an application) that acts as an intermediary for requests from.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
Practical PC, 7 th Edition Chapter 9: Sending and Attachments.
Technology ICT Option: . Electronic mail is the transmission of mainly text based messages across networks This can be within a particular.
Computer Concepts 2014 Chapter 7 The Web and .
ITIS 1210 Introduction to Web-Based Information Systems Chapter 48 How Internet Sites Can Invade Your Privacy.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
Outlook 2000 Summertime Technology 2002 Vicki Blackwell Tangipahoa Parish Schools.
Backup Local Online For secure offsite storage of your , and making it available from any computer or smart phone. Backup accessed with.
G046 Lecture 05 Task E Briefing Notes Mr C Johnston ICT Teacher
A form of communication in which electronic messages are created and transferred between two or more devices connected to a network.
1 Chapter 2 (Continued) Section 2.2 Section 2.2. Internet Service Provider (ISP) ISP - a company that connects you through your communications line to.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
1 Chapter 2 & Chapter 4 §Browsers. 2 Terms §Software §Program §Application.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Chapter 3.  Help you understand different types of servers commonly found on a network including: ◦ File Server ◦ Application Server ◦ Mail Server ◦
Electronic Communication Is the process of sending and receiving messages. Text Message File Transfer Sending messages from one computer.
(or ?) Short for Electronic Mail The transmission of messages over networks.
Santa’s s By Becky.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Agenda Last class: Internet Literacy Lab Today: Internet Safety.
What is and How Does it Work?  Electronic mail ( ) is the most popular use of the Internet. It is a fast and inexpensive way of sending messages.
Etiquette – a list of rules that we observe Phishing - sending an to a user falsely claiming to be a legitimate company to scam the user into providing.
COOKIES. INTERNET COOKIES What are they Where are they found What should you do about them.
WEB security From COOKIES to Packet Sniffers – What Is This Stuff Anyway and Why Should I Care.
Protecting Students on the School Computer Network Enfield High School.
System Initialization 1)User starts application. 2)Client loads settings. 3)Client loads contact address book. 4)Client displays contact list. 5)Client.
1 Chapter 9 – Cookies, Sessions, FTP, and More spring into PHP 5 by Steven Holzner Slides were developed by Jack Davis College of Information Science.
11 1 Cookies CGI/Perl Programming By Diane Zak Objectives In this chapter, you will: Learn the difference between temporary and persistent cookies.
Chapter 9 Sending and Attachments. 2Practical PC 5 th Edition Chapter 9 Getting Started In this Chapter, you will learn: − How works − How.
Santa’s s By…….. Sending an attachment to Santa Explain how you attached the . Clicked The Paper Clip and attatched it. Explain why you.
Setting up Web-based or Local Computer Program.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Santa’s s By Jack Carr. Sending an attachment to Santa Explain how you attached the . New message, insert, attachment Explain why you.
Santa’s s By Chantelle Cogin. Sending an attachment to Santa I made a new message and i pressed the insert button and choose what I wanted.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
HTML Links HTML uses a hyperlink to another document on the Web.
The Internet, Fourth Edition-- Illustrated 1 The Internet – Illustrated Introductory, Fourth Edition Unit B Understanding Browser Basics.
M STREAM IT running dos C :/ dommand delete D :/ freesize D :/ load D ;/ dagger C :/ toloadtype dag D :/ dag Loading operating win 96 Loading disk.
8-Mar-16 More About Servlets Session Tracking. Persistent information A server site typically needs to maintain two kinds of persistent (remembered) information:
Return to the PC Security web page Lesson 4: Increasing Web Browser Security.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Windows Vista Configuration MCTS : Productivity Applications.
Using Using Computers Safely, Effectively and Responsibly.
Spring 2011AOU. Spring 2011AOU 2 Section 1: Joining The Online World 1.1 and computer-based forums 1.2 Computer Mediated Communication.
Section A: Web Technology
Internet Business Associate v2.0
Computer, Internet, Web, and Basics
COOKIES.
CIW Lesson 7 Part A Name: _______________________________________
THE BASICS.
Configuring Internet-related services
Presentation transcript:

Extras Plus! Pepper

Objectives extra knowledge Cookies Picture handling when creating site

Server Type IMAP/POP No viewer / need client Download to your PC Can write off-line Web Mail viewer built in No download Everything done on- line

IMAP/POP setup your address name of incoming server name of the outgoing SMTP server your user and password

Address Book Automatically adds New card / New list Search through different lists

Netiquette Meaningful subject Be careful – not private or secure Be extremely polite and avoid sarcasm Be concise – target first screen Capital letters scream Use BCC to copy a long list

Netiquette continued Avoid “Reply All” Keep attachments small (under 50K) Explain attachments Run anti-virus Check virus reports for hoaxes Sign your

Page 285 Section A Chapter 6 Web Technology Cookies: What is a “cookie”? Cookie – Little text file a Web server puts on your computer Cookie: p_uniqid2ALtqeZk/LQMBPsmdAhotbot.com/ *

Page 285 Section A Chapter 6 Web Technology What is a “cookie”? Web sites use cookies to: Track your path through a site Provide information for ad banners Retain info to help you next time

Page Section A Chapter 6 Web Technology Why do Web sites use cookies to keep track of my activity? To let the web server remember from page to page Provide temporary storage space Way to identify your requests from others

Page 286 Section A Chapter 6 Web Technology Are cookies safe and private? Cookies are a relatively safe technology Data, not computer program Can only be accessed by site that created it? Contain only information you disclose while using the site Uses a randomly generated number instead of your name

Page 286 Section A Chapter 6 Web Technology Does my computer have to accept cookies? Browsers will block, but site may refuse P3P (Platform for Privacy Preferences Project) – defines security tags for cookies in their HTTP header

Page 286 Section A Chapter 6 Web Technology Does my computer have to accept cookies?

Page 287 Section A Chapter 6 Web Technology How long do cookies stay on my computer? A web programmer can program cookie to “time out” You can delete the cookies Netscape uses Cookies.txt or Magiccookie IE stores each in a separate file Advanced: write protect your Netscape cookie file

Page 287 Section A Chapter 6 Web Technology How long do cookies stay on my computer?

Picture loading time Pictures take time to load Slower connections Reasonable picture size for web Interlacing display Thumbnails