GMT eBizOS DOs and DON’Ts DOs 1. Access to GMT Portal(http://www.globe.com.my/gmtportal) to view all the system, user guide, application form & procedure.

Slides:



Advertisements
Similar presentations
RULES FOR SENDING EFFECTIVE AND PROFESSIONAL S Netiquette.
Advertisements

Managing Incoming Chapter 3 Bit Literacy. Terminology client – program which retrieves s from a mail server, lets you read the mails,
OBJECTIVE: THE STUDENT WILL REVIEW SKILLS ON TELECOMMUNICATIONS & KEYBOARDING –UNIT
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
C O A L I T I O N Corner Coalition Corner: Business training tools for HR staff, real estate licensees and other service professionals in the relocation.
Formal Writing Rules E mail –etiquette Formal Writing Rules.
. How it works? To send an you need an Software or Web Based To send an to a friend you need to know their Address.
XP Practical PC, 3e Chapter 9 1 Sending and Attachments.
Browser and Basics Tutorial 1. Learn about Web browser software and Web pages The Web is a collection of files that reside on computers, called.
1 Look for the blue arrow on each slide to progress to the next slide.
COMMUNICATION IGCSE ICT 0417 Section 9.
This PowerPoint presentation will show you how to use your productively and successfully.
Evidence By Jordan Shurety. This I where you write who you are going to send the to. Cc in an means carbon copy or courtesy copy. You.
Netiquette. APK Mrs. Batichon sent a thank you , but forgot to change the name of the receiver. Embarrassing. Sent a text or letter to the wrong.
user guide Having a strong password allows other users to struggle to guess. To make a strong password you should use up to 12 letters and 1 or 2.
Company LOGO Exploring Using TWIG (Webmail) at ACC.
By Chloe.
User Guide Joseph Harris. Open To open an you need to double click on it and the selected should open.
Hello Employee, Welcome to MStreamIT!
Technology ICT Option: . Electronic mail is the transmission of mainly text based messages across networks This can be within a particular.
Etiquette. Automatic reply Here I have created a automatic reply for when I am not able to contact people when I have ed then.
Aaron Cauchi Nurse Informatics
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Information guide.
guide book. USER GUIDE Etiquette – (acceptable use policy) Use a suitable subject in the - this helps the reader to understand what.
This presentation will be all about s, etiquette and software. I will be going through each one of these individually and thoroughly step.
NETIQUETTE. WHAT IS IT??? Netiquette refers to the rules of online etiquette that guide users while working, communicating, and utilizing resources in.
s By Mollie.
Computer Technology Timpview High School.  is inexpensive and easy to use and track  Spam – s sent in bulk to many people’s .
Windows Tutorial 4 Working with the Internet and
By Ciaran carney. ADD COM  Etiquette – Acceptable Use Policy  Use a suitable subject in the - this helps the reader to understand what the message.
Santa’s s By Chloe Warman.
Etiquette – a list of rules that we observe Phishing - sending an to a user falsely claiming to be a legitimate company to scam the user into providing.
Business English Upper Intermediate U1S09 John Silberstein
Santa’s s By Brandon. Sending an attachment to Santa I attached the by pressing the attachment button above the recipient box I used.
How to use ? By Martyna Haliniak. How to log on? In order to log on, you have to type in your username & password in the text boxes, and then click.
Do’s and Don'ts For Office s
Microsoft Outlook Objective The learner will be able to perform basic tasks in Microsoft Outlook 2003.
By Sasha Radjuk. - Etiquette and User Guide Give some basic notes on how to log in. To login go on Google and type in outlook web app and the type.
Managing Incoming Chapter 3 Bit Literacy. Terminology client – program which retrieves s from a mail server, lets you read the mails,
Effectively Managing Your Ways to Manage Your that Save Time and Headaches Presenter: Andrew Sanderbeck.
Santa’s s By Morgan Johnson. Sending an attachment to Santa  Explain how you attached the . Just click attach and click the folder I.
Introduction to WebFX. Summary of Last Lectures n Introduction to computers n Computer hardware and software –computer microcomputer minicomputer mainframe.
Computer Labs Orientation September 2003 Prepared by Computer Services.
Comunicación y Gerencia 10 Commandments For effectvie communication.
Santa’s s By…….. Sending an attachment to Santa Explain how you attached the . Clicked The Paper Clip and attatched it. Explain why you.
 When you receive a new you will be shown a highlighted in yellow box where your can be found  To open your new just double click.
STAYING SAFE: Here are some safety tips when using Change your password regularly and keep it in a safe place. Don’t share your password with anyone.
is a shortened form of electronic mail allowing you to send messages over the internet, store and retrieve messages which you have received. So.
Santa’s s By Chantelle Cogin. Sending an attachment to Santa I made a new message and i pressed the insert button and choose what I wanted.
Theme 1: Expansion of the home office Topic 3: Become more comfortable with Internet Explorer and Textbook: Chapter 1.2, P
By Liam Wright Manga comic group Japan SAFETY on your computer.
tool kit. USER GUIDE Etiquette (Acceptable use policy) – a list of rules that we observe Use a suitable subject in the - this helps.
ETIQUETTES “ - when it absolutely positively has to get lost at the speed of light.”
M STREAM IT running dos C :/ dommand delete D :/ freesize D :/ load D ;/ dagger C :/ toloadtype dag D :/ dag Loading operating win 96 Loading disk.
management management using Gmail Ceri Clark.
Staff Induction Log On Credentials & Security Resources Web Applications / Software LanSchool Projectors / Cameras / Printing Laptops / WiFi.
BASICS. Objectives Choose an provider Fill out an online form Learn about usernames and addresses Learn about Capcha Explore the organization.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
etiquette and effective use A brief guide on etiquette for Pathway Group Staff and Associates By Safaraz Ali
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Unit 4 IT Security.
The Top 32 Most Important Rules
Unit 4 IT Security.
Sending and Attachments
Technology ICT Option: .
Induction Program IT Briefing by MIS Last Update 2018.
CBP Program – Business Etiquette
Santa’s s By……..
Technology ICT Option: .
Presentation transcript:

GMT eBizOS DOs and DON’Ts DOs 1. Access to GMT Portal( to view all the system, user guide, application form & procedure 2.Retrieve your password at eBizOS system main page if your forgot your password 3.Raise eService to report any software or hardware issue 4.Follow the Off-Office Hours Duty Roaster if support is needed after working hours 5.Follow the GMT procedure: System Requisition (for system enhancement/development) Reverse Transaction if any data amendment is needed & Internet Application

DON’Ts 1. Share your username and password 2. Open/log in more than 1 Internet Explorer to perform your daily task in a single PC 3. Key in the “TEST/DUMMY DATA” in the LIVE SYSTEM 4. Refresh (or PRESS F5) the page while transaction is processing 5. Click more than once on a button to submit/confirm your transaction, if the transaction is still in processing 6. Change your PC’s system date & time

Hardware DOs and DON’Ts Dos – Microsoft Outlook Straight to the point Write as short as you can and straight to the point. This long will resulting annoying for recipients to read Practice proper spelling, grammar & punctuation You is easy to read and understand. Moreover, this will improve your impression and reputation for recipients Always double check your before you send Always double check your before you send so that you don’t need to recall your which it always not works Write with good subject Good subject is very important to get recipients attraction. Moreover, is easily to keep for future business record reference Always do your housekeeping This is because it will result your mailbox full and not able to receive and send to others. Moreover, it will also corrupted your mailbox or personal folder

DON’Ts – Microsoft Outlook Attached unnecessary files or big files Not every company s account is able to receive big files. Always compress or try to reduce the attachment files size before you send to customer so that it wont be bounce back or bring the recipients system down. Send files only necessary, as bandwidth is valuable for every company as it is very costly Write with CAPITALS words CAPITALS WORD MAKE READERS FEEL LIKE YOU ARE SHOUTING TO HIM/HER Overuse Reply to All Only use Reply to All if you really need your message to be seen by each person who received the original message Send/ forward chain letter, virus hoaxes letter or s containing libelous, defamatory, offensive, racist or obscene remarks Doing this will wasting company valuable bandwidth and leading company to court case. Moreover, high chances will be infected by virus or spyware if you forward virus hoaxes letter. So don’t waste your time to read or forwarded, just delete it. Say hi to spam Don’t reply or unsubscribe to spam mail as it will result you to receive more spam mail. So, when you see it next time, just delete it. Subscribe non-business related news letter or personal Internet application Company is for company business related purpose and not for personal interest used, doing so will resulting high chances of spam or virus attack and wasting company valuable bandwidth and storage spaces

Dos – Printer Make sure no paper clip & staple bullet attached to recycle paper when printing. Don’ts – Printer Don’t use shape object to remove stuck paper. Don’ts – PC/Desktop Employees are strictly prohibited from installing any pirated or illegal software. No games or non-related programs should be installed at all time. No personal storage media for example diskettes, CD-RW, portable hard disk, laptop or USB drive are not allow to bring into company. Installation any type of media from employees or vendors to be used in company must obtained approval.

Internet/ Policy No abuse on internet and usage e.g chatting virus spreading, personal business activities, porno graphic material, leaking confidential material and hacking activities. If violate, warning letter will be issue. Practice good house keeping of Microsoft Outlook Online folder and Personal Folders. Incoming and outgoing mail size - 2MB Mailbox capacity - 30MB Public folder is for departmental information sharing purposes, personal are prohibited. GMT IT Policy – full details to be extracted from Microsoft Outlook - >Public Folder -> All Public Folder -> Forms -> GMT -> IT Policy Rev.2.0 -> IT Policy Rev2.doc