Software. E-mail stands for electronic mail. E-mail software enables you to send an electronic message to another person anywhere in the world. The message.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

. Today you will: Learn about how an is processed once it has been sent Learn some advantages and disadvantages of using Learn how.
1 NCDesk % of the test will be Telecommunication/Internet Questions.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
. How it works? To send an you need an Software or Web Based To send an to a friend you need to know their Address.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Introduction to Your Name Goes Here
COS 125 DAY 4. Agenda Questions from last Class?? Today’s topics Communicating on the Internet Assignment #1 due Assignment #2 will be posted next week.
Security Security is critical in the storage and transmission of information loss of information can not only cause problems to the organisation but can.
The World of the Computer How We Use Computers. My home computer allows me to work at home. Otherwise, I would have to spend many hours in my car to travel.
Surrey Libraries Computer Learning Centres Totally New to Computers Easy Gmail September 2013 Easy Gmail Teaching Script.
Goodbye Snail Mail, Hello
. Introduction to Welcome to . This module will give you the skills you need to send and receive . Also to send and receive attachments.
Surrey Libraries Computer Learning Centres Totally New to Computers Easy Gmail March 2013 Easy Gmail Teaching Script.
Created by Mr. Hemmert.  Have you ever received a mean or instant message? Have you ever sent one? This is called cyberbullying. A cyberbully uses.
Quiz Review.
Threats to I.T Internet security By Cameron Mundy.
Technology ICT Option: . Electronic mail is the transmission of mainly text based messages across networks This can be within a particular.
Methods of communication
OCR Nationals – Unit 1 AO2 (Part 2) – s. Overview of AO2 (Part 2) To select and use tools and facilities to download files/information and to send.
Introductory Communications Objectives  To gain an overview of: Modems and digital telephone lines Analogue to digital conversion and digital to analogue.
Staying Safe Online Keep your Information Secure.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Electronic Communication Is the process of sending and receiving messages. Text Message File Transfer Sending messages from one computer.
A beginner’s guide to Webmail. What do you need? A computer, or a smartphone An internet connection An account with an service provider.
Internet Safety Dangers and Netiquette Trust No One You Don’t Know! A shark is a predator. Predators swim around looking for victims. The ocean is beautiful.
Communications and Networks Standard Grade Computing Studies.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
Section 4 – Computer Networks Setting up a small network.
The Role of Communication Systems Karen Cheesbrough.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
9/4/01Mary Price ( )1 ELECTRONIC MAIL. 9/4/01Mary Price ( )2 Electronic Mail ( ) A facility which allows text messages and computer files.
 Save you auto reply.  You can set a day and time when your message will be sent to people that try to wright to you.  Go to the Automatic Replies.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Types of Electronic Infection
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Key Terms. Online Communication Online community A virtual community which exists only online. It may be open to anyone (eg. a bulletin board) or restricted.
advantages The system is nearly universal because anyone who can access the Internet has an address. is fast because messages.
ELECTRONIC COMMUNICATIONS Standard Grade Computing ELECTRONIC COMMUNICATIONS CHAPTER 10.
Chapter 9 Sending and Attachments. 2Practical PC 5 th Edition Chapter 9 Getting Started In this Chapter, you will learn: − How works − How.
Listservs & Discussion Forums ICT Applications in School Libraries.
Introduction to Student Name Student Class.
UNIT 12 The Internet By Nahed AlSalah 1 Computer Terminologieg unit12 Nahed AlSalah.
Electronic Communication Presentation. Attachments Files you attach and send with an message.
Chapter 3.  Help you understand and compare different types of facilities found in: ◦ Fax ◦ ◦ Bulletin (Discussion Boards) ◦ Video Conferencing.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
InternetInternet ISYS 1050 K. Steere. What is the Internet? A collection of local, regional, national, and international computer networks that are linked.
1 3/13/08 Michael O’Connor Nicoleta Kourouniotis Michelle LaNasa Samantha Bonar Michael O’Connor Nicoleta Kourouniotis Michelle LaNasa Samantha Bonar.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Electronic Mail. Gmail Accounts USERNAME Skyward PASSWORD Same password as you use to log in to your computer.
PEMBINA TRAILS Portal System User Guide Prepared by: Jo-Anne Gibson Acadia Junior High Teacher-Librarian.
Safety in the digital world. Survey Thank you for completing the Information Security Survey!
By Toby Reed.
. Electronic. is a method of exchanging digital messages. What does the E in stand for?
is short for electronic mail!. What is ? An electronic message sent from one computer to another. saves money and time compared to regular.
Working On-Line Module 4 People's Resource Center Barry Glicklich Last updated 24 December 2011Working On-Line (BG)1.
– Purposes & Uses 20 – Purposes & Uses 20.
What it is and how to stop it.  What spam is.  Why it can be dangerous.  How to handle it.
Network System Security - Task 2. Russell Johnston.
Communications and Networks
Chapter 40 Internet Security.
is short for electronic mail!
Introduction to Your Name Goes Here
Introduction to Your Name Goes Here
9 ways to avoid viruses and spyware
Presentation transcript:

Software

stands for electronic mail. software enables you to send an electronic message to another person anywhere in the world. The message sent is stored on their e- mail server until they log on and download it.

can be used by anyone who wants to send messages via computer. It can be used for: keeping in touch with friends and family communications between businesses advertising by companies journalists sending stories to their newspaper keeping in touch on the move, through laptops or WAP-enabled mobile phones group projects between workers or students in different places. Sending is fast, and in most cases only costs a local rate phone call.

Spam is the equivalent of junk mail. It is often sent by companies trying to sell their products to people who haven’t asked for information about them. Spam takes up a lot of Internet bandwidth and it is annoying for people to have to wade through lots of messages they don’t want to find the ones they do. Many countries are trying to make it illegal to send spam.

A virus is a piece of code which can sometimes damage the files on your computer. It is possible to pass a virus on through . It is best not to open an unless you know where it has come from, especially if it has attachments. You should always virus check all s, even from people you do know.

Encryption Encryption means using a system to translate the data into a secret code. To access an encrypted file the recipient will need to have a special secret key or password which will decrypt the file. Encryption is the most effective way to ensure that data sent by is secure.

Summary stands for electronic mail. It allows you to send messages anywhere in the world. You can attach files. You can forward messages you have received. You can send messages to groups of people. Junk , or spam, is a nuisance. s can carry viruses which can damage files on a computer. s can be encrypted to prevent them being read.