OCR Nationals – Unit 1 AO2 (Part 2) – s
Overview of AO2 (Part 2) To select and use tools and facilities to download files/information and to send and receive messages
Success Criteria Pass Receive, Open, reply to s Save attachment to a suitable folder in your work area All you s must have some text and header Send an to multiple recipients Make a brief comment on risks of attachments Merit Send/receive/reply /forward s with multiple attachments Always use appropriate subjects and message text Send an to multiple recipients using CC Set the importance of s (High and Low) Summarise the risks of attachments Distinction Create an signature for all outgoing messages Use CC and BCC appropriately, considering privacy issues Store, retrieve and use personal contacts in s Suggest actions to reduce risks of attachments
What can you remember about s?
Recap of what s are o stands for electronic mail o software enables you to send an electronic message to another person anywhere in the world oThe message sent is stored on their server until they log on and download it
Basic Features of a
The interface The address of anyone you will be sending copies to. The address of the person you are sending the to. The title of the . This is the main body of the . Put your message in here. Attachments are files you want to send with the message. There are no attachments with this . Formatting tools
Problems with oSpam is the equivalent of junk mail oIt is often sent by companies trying to sell their products to people who haven’t asked for information about them oSpam takes up a lot of Internet bandwidth and it is annoying for people to have to wade through lots of messages they don’t want to find the ones they do. oMany countries are trying to make it illegal to send spam.
Problems with o A virus is a piece of code which can sometimes damage the files on your computer o It is possible to pass a virus on through o It is best not to open an unless you know where it has come from, especially if it has attachments o You should always virus check all s, even from people you do know
Encryption o Encryption means using a system to translate the data into a secret code o To access an encrypted file the recipient will need to have a special secret key or password which will decrypt the file o Encryption is the most effective way to ensure that data sent by is secure However, governments worry about encryption because it makes it difficult for them to check s, even when national security is involved.
What evidence do you need to produce?
Evidence of: Sending s to multiple recipients On all your s that you create you should have the following Recipient Subject Text Signature. On the to the left you can see I have sent this to multiple addresses.
Evidence of: Receiving s Above we can see an image of my inbox showing the mails I have received.
Evidence of: Saving s to a suitable folder Here you can see I have created an folder for Downloadable Tunes I have saved an important inside my Downloadable Tunes folder.
Evidence of: Forwarding s Alongside you can see I have inserted an address of whom I want to forward the to.
Evidence of: Replying to an Here you can see I am replying back to the person who wrote to me.
Evidence of: Adding an attachment to an Here you can see I have added two attachments to an . I have also sent the same to two people as well as adding appropriate text message.
Evidence of: Opening an attachment Here you can see I have been sent an with an attachment. Here we can see the attachment open
Evidence of: Saving an attachment Here you can see I have saved the attachment inside an appropriate folder.
Evidence of: The risks of opening s and attachments s comes from using attachments. While attachments represent a useful addition to functionality, as a way to send files via , they are also risky due to the fact that attachments can contain not just documents, but also binary attachments like executable files. s comes from using attachments. While attachments represent a useful addition to functionality, as a way to send files via , they are also risky due to the fact that attachments can contain not just documents, but also binary attachments like executable files. Attachments and Risks One of the most common tools we are using on a daily basis, is . Due to this fact, is also a major security problem, due to the fact that a lot of worms and Trojans are using to get into our computers. The main problem with
Evidence of: The risks of opening s and attachments Such attachments can be dangerous as they may contain worms and Trojans that can immediately infect our computers, once opened by the unsuspecting user. The first one is that opening an , especially from some one you do not know, lets the sender of the spam know that your address is valid and they send you more of more of it. Second risk being there is a possibility of a virus or some other 'bug' in the you open, the infection does not have to be in an attachment anymore.