E-mail. Introduction to E-mail Welcome to Email. This module will give you the skills you need to send and receive Email. Also to send and receive attachments.

Slides:



Advertisements
Similar presentations
Viruses. Viruses, Trojans, Worms Virus - a program that attaches itself to a host, and copies itself onto new files/disks Macro viruses - small program.
Advertisements

Privacy & Other Issues. Acceptable Use Policies When you sign up for an account at school or from an Internet Service Provider, you agree to their rules.
1 Advanced with GMail A CYC Electives Module
Guide to using the Pharos Course Forums PHAROS TUTORS.
Surrey Public Library Electronic Classrooms Essentials.
Google Apps: Google Mail Got Gmail?....Need Help? Mrs. Connor.
( ) Basics Apr 2011 Public Computer Center Moore Memorial Library | Greene, NY.
Basics. 2 Class Outline Part 1 - Introduction –Explaining –Parts of an address –Types of services –Acquiring an account.
Discussions. Overview Introduction Composing Sending an Attachment Viewing Downloading an Attachment Replying.
Mail. Overview Introduction Composing Sending an Attachment Viewing Downloading an Attachment Replying Deleting.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Browser and Basics Tutorial 1. Learn about Web browser software and Web pages The Web is a collection of files that reside on computers, called.
Introduction to . What is ? is electronic mail that allows users to send messages and files (pictures, documents, etc) to another person.
Advanced Last Updated: May Class Outline Part 1 - Review –Review of basics –Review of files and folders Part 2 - Attachments –Sending.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Outlook Web Access (OWA) is a web mail service of Microsoft Exchange; allow users to connect remotely via a Web browser OWA is used to access ,
Company LOGO Exploring Using TWIG (Webmail) at ACC.
Technology ICT Option: . Electronic mail is the transmission of mainly text based messages across networks This can be within a particular.
Online Safety Workshop Stephanie Rojas, IMG Krystle Donnelly, IMG Cyndi Backstrom, UNLV OIT.
Topics Basic Internet Concepts. Types of Information. Search Tools & Techniques. Managing Internet Resources. Browsing a mail. Composing a mail. Attaching.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Information guide.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
Communicating Information: and Attachments.
IT security By Tilly Gerlack.
Computer Viruses.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
B ALTIMORE C ITY P UBLIC S CHOOLS Applying TS3 to Improve Achievement and Work Habits Julius Zuke, Facilitator 1.
A beginner’s guide to Webmail. What do you need? A computer, or a smartphone An internet connection An account with an service provider.
Encryption Cisco Ironport using Click here to begin Press the ‘F5’ Key to Begin.
Open the Goodyear Homepage Click on Teacher Tools.
Basics. 2 Professional Development Centre Class Outline Part 1 - Introduction –Explaining –Parts of an address –Types of services.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
© All Rights Reserved What is a computer virus? A computer virus is a piece of software or programming code.
Types of Electronic Infection
Week Rainey Community ICT Classes ICT – The Basics.
Basics.
Made by : Mohamed kullab DR. Sanaa el sayegh.  Most personal computers are now connected to the Internet and to local area networks, facilitating the.
Basic Features and Options Accessing  Means of communicating electronically via the Internet.  Used by individuals, businesses,
How to Attach a File to an . Step One Log onto the Internet and then onto Click on Student Resources.
Introduction to Student Name Student Class.
The Internet 8th Edition Tutorial 3 Using Web-Based Services for Communication and Collaboration.
All about viruses, hacking and backups By Harriet Thomas.
Theme 1: Expansion of the home office Topic 3: Become more comfortable with Internet Explorer and Textbook: Chapter 1.2, P
By Liam Wright Manga comic group Japan SAFETY on your computer.
A Computer Virus is a software program that is designed to copy itself over and over again and to attach itself to other programs. They don’t affect hardware,
Outlook Web Access (OWA) is a web mail service of Microsoft Exchange; allow users to connect remotely via a Web browser OWA is used to access ,
Viruses. Learning Objectives: At the end of this lesson you should be able to:
Amanda Fristy Damara Thea Bayu Gerhana Yuda Evita Fitri Ila Uswatun Hasanah Putri Ayuning Kartika Presented by :
Introduction to Your OUSD and other district technology applications Leah Jensen, Instructional Technologist (510) (office), (510)
Do Now: Describe the steps used to access the comments tool in MS Word. ( review your notes for the answer) Ex: Step 1. Select the text or item you want.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Setting up Suitable for: Beginner.
 Chances of contracting a Virus › Every time you download software › Every time you accept attachments.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
PEMBINA TRAILS Portal System User Guide Prepared by: Jo-Anne Gibson Acadia Junior High Teacher-Librarian.
Take a tour around my slideshow to learn more about viruses.
Module 4 Creating EMC Files, Uploading EMC Files and Downloading Reports PC-ACE Pro32.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
is short for electronic mail!. What is ? An electronic message sent from one computer to another. saves money and time compared to regular.
Working On-Line Module 4 People's Resource Center Barry Glicklich Last updated 24 December 2011Working On-Line (BG)1.
Computer Security Keeping you and your computer safe in the digital world.
Windows Vista Configuration MCTS : Productivity Applications.
What it is and how to stop it.  What spam is.  Why it can be dangerous.  How to handle it.
Using Using Computers Safely, Effectively and Responsibly.
Creating an Electronic Mail. What is an E- mail?  is widely available via Web-based e- mail accounts.  In messages, you can create and.
Online Training Course
Using iLocker.
Step 1: Search “Microsoft 365” on google
Presentation transcript:

Introduction to Welcome to . This module will give you the skills you need to send and receive . Also to send and receive attachments.

Accessing (electronic mail) is a method of sending messages and attaching files over the Internet. is the Internet’s version of the postal service and a great way to communicate with people. The best of is that you can also send a message with attachments. This means you can send text documents, pictures etc. Accessing 1. Go to 2. Enter your Username: rathboneuser1 Enter your Password: userone and click on login

Receiving, Creating & Sending Messages Receiving s When logged in, enter your Inbox by clicking on it. Then, click on the message you wish to read

Receiving, Creating & Sending Messages 1.Click on compose to create a new 2.Enter the address in the ‘to’ box 3.Put a heading in the ‘subject’ box 4.Type your message in the ‘message’ box 5.Click on send to send the Creating a new

Replying to an 1.Select Reply on the message you have read 2. Type your message in the ‘message’ box. There is no need to enter an e- mail`address or heading 3. Click on send to send the Receiving, Creating & Sending Messages

Adding Attachments to an 1.Click on Browse to attach a file 2. Locate the file you wish to attach and click on Open Receiving, Creating & Sending Messages

Viruses can spread through attachments. Always check attachments for viruses Opening unknown attachments could cause serious damage to the computer and spread viruses further. Never open unknown attachments! Always check any attachments you are going to send for viruses. Viruses

Viruses are small computer programs able to copy themselves and written with the purpose of causing annoyance or destruction. They can range from simply being a nuisance to deleting files, using up memory or even corrupting the hard drive. The answer is antivirus software but as virus writers continually change or produce new viruses, the antivirus software must be updated at least monthly and ideally should update itself automatically online. A virus can gain access to a computer via: 1.A floppy disc or CD 2.A networked machine (2 or more pc’s linked together) 3.The internet – from , web sites or downloaded files A virus introduced on a floppy disc will ‘hide’ on the hard drive It will then copy itself to any other floppy disc put into the machine by attaching itself to a file Viruses