OCR Nationals – Unit 1 AO2 (Part 2) – Emails. Overview of AO2 (Part 2) To select and use tools and facilities to download files/information and to send.

Slides:



Advertisements
Similar presentations
©M Robinson (All Saints College) Replace this with your full name OCR Unit 1 ICT Skills for Business c1 Instructions (this slide should be deleted before.
Advertisements

AO- 2 (part 2 of 2) Pass + Send. Receive. Reply. Forward. With more than 1 attachment.
Coursework Task By Miles Fajembola 10E. Send An Here is the I sent to wacky mountain bikes.
Evidence. Sending with attachment As you can see I have attached a file which I would then continue to send to the recipient.
Surrey Libraries Computer Learning Centres Totally New to Computers Easy Gmail September 2013 Easy Gmail Teaching Script.
Goodbye Snail Mail, Hello
By Laura Trawin.
Surrey Libraries Computer Learning Centres Totally New to Computers Easy Gmail March 2013 Easy Gmail Teaching Script.
OCR Functional Skills Keywords Use the right keywords To do this you need to know what it is you are searching for! – For example, you might want to search.
evidence. Safety To stay safe on the internet there are many points you need to follow. The first point is to change your password regularly, you.
This is the first page of the log in, this is were you enter your unique details.
This PowerPoint presentation will show you how to use your productively and successfully.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
Evidence By Jordan Shurety. This I where you write who you are going to send the to. Cc in an means carbon copy or courtesy copy. You.
This is group I have made.  Deleted all the s we didn’t need to clear out our .  Then created folders for the s we would receive.
ICT Essential Skills. (electronic mail) Snail Mail.
Software. stands for electronic mail. software enables you to send an electronic message to another person anywhere in the world. The message.
Anya Brookman. How to create a new message Unwanted messages Folders Messages you have sent to someone Logging out when you have finished sending.
Technology ICT Option: . Electronic mail is the transmission of mainly text based messages across networks This can be within a particular.
Matt Crocker. What's in a ? Cc=carbon copy To…=who will receive Bcc…=blind carbon copy Attachments=file can be sent through Text area.
Information guide.
This presentation will be all about s, etiquette and software. I will be going through each one of these individually and thoroughly step.
Tool Kit Natasha Donovan.
Microsoft Outlook 2007 Basics Distance Learning (860) 343 – 5756 Chapman 633/632 Middlesex Community College Visit
FAIRTRADE FOUNDATION OCR Nationals in ICT Unit 1 ICT Skills for Business AO2.
December 2010Brad Hudson AO3 Homework Task > All you need to know about sending s.
Name: Ryan Lugg Form: 10B . How can businesses make use of . (P) can be a very useful tool, it can be very cost effective and efficient.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
What is and How Does it Work?  Electronic mail ( ) is the most popular use of the Internet. It is a fast and inexpensive way of sending messages.
 Save you auto reply.  You can set a day and time when your message will be sent to people that try to wright to you.  Go to the Automatic Replies.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
Dylan Bayliff. Contents: 1- Sending s & Using etiquette 2- Staying safe and Accessing 3- Open s 4- Replying to s 5- Setting up contacts.
Etiquette – a list of rules that we observe Phishing - sending an to a user falsely claiming to be a legitimate company to scam the user into providing.
How to use ? By Martyna Haliniak. How to log on? In order to log on, you have to type in your username & password in the text boxes, and then click.
This PowerPoint presentation will show you how to use your productively and successfully.
 Subject: The topic you are talking about. So they understand what it is a about and explain to the point.  clients usually display it in a.
 Subject: The topic you are talking about. So they understand what it is a about and explain to the point.  clients usually display it in a.
Evidence Including tools and etiquette.
Microsoft Office Illustrated Introductory, Second Edition Started with Outlook 2003 Getting.
Basic Features and Options Accessing  Means of communicating electronically via the Internet.  Used by individuals, businesses,
s This presentation is all about s, etiquette and software. I will go through these things step by step to give you a clear understanding.
OCR Nationals Unit 1: ICT Skills for Business AO2 - Using appropriate software, select and use tools and facilities to download files/information and to.
Lesson 2 . Objectives Describe Understand how to send, reply, and forward Define and send attachments.
OCR Nationals Unit 1: ICT Skills for Business AO2 - Using appropriate software, select and use tools and facilities to download files/information and to.
Learning Intentions: To understand what is required to achieve a Pass, Merit or Distinction for Task 3.
tool kit. USER GUIDE Etiquette (Acceptable use policy) – a list of rules that we observe Use a suitable subject in the - this helps.
and the business environment Explain what is and how is it used in a business environment A02 .
Amanda Fristy Damara Thea Bayu Gerhana Yuda Evita Fitri Ila Uswatun Hasanah Putri Ayuning Kartika Presented by :
Do Now: Describe the steps used to access the comments tool in MS Word. ( review your notes for the answer) Ex: Step 1. Select the text or item you want.
Name: Peter Thomson Form: 10A.  You must make sure that you include the following in your presentation:  Transitions between slides.  Speaker notes.
. Electronic. is a method of exchanging digital messages. What does the E in stand for?
1. Setting up an account- technical
Your File System LIBS100 January 26, Word of the Day Network Administrator An information technology professional responsible for setting up, maintaining,
is short for electronic mail!. What is ? An electronic message sent from one computer to another. saves money and time compared to regular.
Yahoo! Mail We gave Google some good press so we’ll use Yahoo! mail as our example for web s. If you don’t have an account Yahoo! will provide.
Sending effective and professional s . Session aims and objectives Lesson Aims and Objectives send s that are fit for purpose and audience.
Using Using Computers Safely, Effectively and Responsibly.
Chapter 1 Managing Messages with Outlook
Internet Business Associate v2.0
is short for electronic mail!
An Overview.
Introduction to Web-Based
Year 10.
Fun gym Cambridge Nationals R001.
Hearth Bulk System Divisional Secretaries Briefing 2011.
Lesson 2 .
Instructions (this slide should be deleted before final hand-in)
.
Presentation transcript:

OCR Nationals – Unit 1 AO2 (Part 2) – s

Overview of AO2 (Part 2) To select and use tools and facilities to download files/information and to send and receive messages

Success Criteria Pass Receive, Open, reply to s Save attachment to a suitable folder in your work area All you s must have some text and header Send an to multiple recipients Make a brief comment on risks of attachments Merit Send/receive/reply /forward s with multiple attachments Always use appropriate subjects and message text Send an to multiple recipients using CC Set the importance of s (High and Low) Summarise the risks of attachments Distinction Create an signature for all outgoing messages Use CC and BCC appropriately, considering privacy issues Store, retrieve and use personal contacts in s Suggest actions to reduce risks of attachments

What can you remember about s?

Recap of what s are o stands for electronic mail o software enables you to send an electronic message to another person anywhere in the world oThe message sent is stored on their server until they log on and download it

Basic Features of a

The interface The address of anyone you will be sending copies to. The address of the person you are sending the to. The title of the . This is the main body of the . Put your message in here. Attachments are files you want to send with the message. There are no attachments with this . Formatting tools

Problems with oSpam is the equivalent of junk mail oIt is often sent by companies trying to sell their products to people who haven’t asked for information about them oSpam takes up a lot of Internet bandwidth and it is annoying for people to have to wade through lots of messages they don’t want to find the ones they do. oMany countries are trying to make it illegal to send spam.

Problems with o A virus is a piece of code which can sometimes damage the files on your computer o It is possible to pass a virus on through o It is best not to open an unless you know where it has come from, especially if it has attachments o You should always virus check all s, even from people you do know

Encryption o Encryption means using a system to translate the data into a secret code o To access an encrypted file the recipient will need to have a special secret key or password which will decrypt the file o Encryption is the most effective way to ensure that data sent by is secure However, governments worry about encryption because it makes it difficult for them to check s, even when national security is involved.

What evidence do you need to produce?

Evidence of: Sending s to multiple recipients On all your s that you create you should have the following Recipient Subject Text Signature. On the to the left you can see I have sent this to multiple addresses.

Evidence of: Receiving s Above we can see an image of my inbox showing the mails I have received.

Evidence of: Saving s to a suitable folder Here you can see I have created an folder for Downloadable Tunes I have saved an important inside my Downloadable Tunes folder.

Evidence of: Forwarding s Alongside you can see I have inserted an address of whom I want to forward the to.

Evidence of: Replying to an Here you can see I am replying back to the person who wrote to me.

Evidence of: Adding an attachment to an Here you can see I have added two attachments to an . I have also sent the same to two people as well as adding appropriate text message.

Evidence of: Opening an attachment Here you can see I have been sent an with an attachment. Here we can see the attachment open

Evidence of: Saving an attachment Here you can see I have saved the attachment inside an appropriate folder.

Evidence of: The risks of opening s and attachments s comes from using attachments. While attachments represent a useful addition to functionality, as a way to send files via , they are also risky due to the fact that attachments can contain not just documents, but also binary attachments like executable files. s comes from using attachments. While attachments represent a useful addition to functionality, as a way to send files via , they are also risky due to the fact that attachments can contain not just documents, but also binary attachments like executable files. Attachments and Risks One of the most common tools we are using on a daily basis, is . Due to this fact, is also a major security problem, due to the fact that a lot of worms and Trojans are using to get into our computers. The main problem with

Evidence of: The risks of opening s and attachments Such attachments can be dangerous as they may contain worms and Trojans that can immediately infect our computers, once opened by the unsuspecting user. The first one is that opening an , especially from some one you do not know, lets the sender of the spam know that your address is valid and they send you more of more of it. Second risk being there is a possibility of a virus or some other 'bug' in the you open, the infection does not have to be in an attachment anymore.