Computer Skills 2 for Humanities E-Mail (Electronic Mail)

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Basic Communication on the Internet:
Introduction to Your Name Goes Here
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Computers Going Online Internet Resources and Applications Finding information on the Web browsing: just looking around searching: trying to find specific.
Introduction to . What is ? is electronic mail that allows users to send messages and files (pictures, documents, etc) to another person.
Surrey Libraries Computer Learning Centres Totally New to Computers Easy Gmail September 2013 Easy Gmail Teaching Script.
. Introduction to Welcome to . This module will give you the skills you need to send and receive . Also to send and receive attachments.
Surrey Libraries Computer Learning Centres Totally New to Computers Easy Gmail March 2013 Easy Gmail Teaching Script.
Outlook Web Access (OWA) is a web mail service of Microsoft Exchange; allow users to connect remotely via a Web browser OWA is used to access ,
1 Computer Security: Protect your PC and Protect Yourself.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
AND SPAM BY OLUWATOBI BAKARE
Software. stands for electronic mail. software enables you to send an electronic message to another person anywhere in the world. The message.
E – Mail History of s What is an ? What happens when we sent an ? messages Folders Address Attachments Types of.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
INFORMATION SECURITY STUDENT GUIDE. There is only one true way to secure a computer. 1.Cut off all the cables, bury the computer in concrete 2.Put the.
OCR Nationals – Unit 1 AO2 (Part 2) – s. Overview of AO2 (Part 2) To select and use tools and facilities to download files/information and to send.
Unit 9 Communication Services
Introduction to Window Understanding the Internet Using Lecture 2 Chapter 2.
Prepared by: Ms Melinda Chung Chapter 3: Basic Communication on the Internet: .
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
A form of communication in which electronic messages are created and transferred between two or more devices connected to a network.
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
Unit 10 Communication Services.  Identify types of electronic communication  Describe users of electronic communication  Identify major components.
Windows Internet Explorer 9 Chapter 1 Introduction to Internet Explorer.
1 ITGS - introduction A computer may have: a direct connection to a net (cable); or remote access (modem). Connect network to other network through: cables.
Dr. Omar Al Jadaan The Internet. Internet Service Provider (ISP) Content Providers: create and maintained material that can be accessed using the internet.
WXET1143 Lecture7: , Chat and Messaging. Introduction  Electronic mail is everywhere.  Now many people in business, government, and education use.
Staying Safe Online Keep your Information Secure.
Windows Internet Explorer 9 Chapter 1 Introduction to Internet Explorer.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Introduction to Internet
The Internet for Beginners Section Four of Four From the Richard Sugden Library Spencer, MA Jillian M. Parsons.
Network Installation. Internet & Intranets Topics to be discussed Internet. Intranet. .
(or ?) Short for Electronic Mail The transmission of messages over networks.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Unit 10 Communication Services
What is and How Does it Work?  Electronic mail ( ) is the most popular use of the Internet. It is a fast and inexpensive way of sending messages.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
The Internet The internet is simply a worldwide computer network that uses standardised communication protocols to transmit and exchange data.
advantages The system is nearly universal because anyone who can access the Internet has an address. is fast because messages.
Chapter 9 Sending and Attachments. 2Practical PC 5 th Edition Chapter 9 Getting Started In this Chapter, you will learn: − How works − How.
Huda AL-Omairl - Network91 The Internet. Huda AL-Omairl - Network92 What is Internet? The world’s largest computer network, consisting of millions of.
Introduction to Student Name Student Class.
The Internet 8th Edition Tutorial 3 Using Web-Based Services for Communication and Collaboration.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 1 Evaluating an Program and a Web-Based Service Basic Communication.
Internet 1) John R. Levine, Margaret Levine Young, The Internet for Dummies. Wiley Publishing, 12 th Edition, 2010.
  is a system of electronic communication that allows the user to exchange messages over the internet  Everyone’s address is unique  Two.
Outlook Web Access (OWA) is a web mail service of Microsoft Exchange; allow users to connect remotely via a Web browser OWA is used to access ,
(Electronic Mail) a message sent and received electronically via telecommunication links between computers.
Amanda Fristy Damara Thea Bayu Gerhana Yuda Evita Fitri Ila Uswatun Hasanah Putri Ayuning Kartika Presented by :
RYAN HICKLING. WHAT IS AN An messages distributed by electronic means from one computer user to one or more recipients via a network.
WHAT IS E-COMMERCE? E-COMMERCE is a online service that helps the seller/buyer complete their transaction through a secure server. Throughout the past.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
The Internet, Fourth Edition-- Illustrated 1 The Internet – Illustrated Introductory, Fourth Edition Unit B Understanding Browser Basics.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Chapter 9 Sending and Attachments. Sending and Attachments FAQs: – How does work? – How do I use local ? – How do I use Web-based.
By Toby Reed.
1 Web Technologies Website Publishing/Going Live! Copyright © Texas Education Agency, All rights reserved.
Computer Skills (1) .
3.1 Types of Servers.
Internet Business Associate v2.0
What is a Firewall?.
3.1 Types of Servers.
Introduction to Your Name Goes Here
Introduction to Justin R. Scott CIS Introduction to .
Introduction to Your Name Goes Here
Presentation transcript:

Computer Skills 2 for Humanities (Electronic Mail)

Definition - Shortcut for (Electronic mail). إختصار ل -Electronic Mail service. خدمة المراسلات الإلكترونية - Likes a Normal Mail service.تشبه البريد العادي - A method of connection between people in the world.وسيلة للتواصل بين الناس في أنحاء العالم - The connection : is by ability to send and receive messages between people in the internet.التواصل عن طريق القدرة على إرسال رسائل - Ability to send and receive attachments. القدرة على إرسال ملفات على شكل ملحقات مع نص الرسالة - Each sender and receiver has to have an Addressكل مرسل أو مستقبل يجب أن يملك عنوان لبريد إلكتروني

basic work Using SMTP (Simple Mail Transfer Protocol) for sending messages. server This protocol establishes a connection to an server (like Yahoo or Hotmail) that the receiver deals with it, and then send the message. The sending message is stored in the receiver inbox in the Server by using his address, until he becomes Online and Reads his . The sending time for the message is not more than 20 seconds and depends on the network load.

E-Message Contents Likes a traditional mail message. Consists of: 1. Introduction: - Sender and receiver address. - Sending Time. - Message Subject. 2. Message Body: written text. 3. Attachments: Files, pictures, documents,…etc.

- كتابة الرسالة - كتابة عنوان المرسل - إرسال الرسالة - ستذهب الرسالة الى Server شركتك المزودة للخدمة - ستتحقق من صحة عنوان الرسالة - ستحدد المسار الذي ستسير به حتى تصل الى Server المستقبل للرسالة - ستخزن في بريده الخاص الموجود على ال Server - عندما يستطيع قراءتها في أي وقت سيفتح الرسالة ويقرأها

Address The general construction: Host_Name.Domain Where: -User_Name: User address. -Host_Name: Host Name. Server Name or company name (Yahoo, Hotmail, Gmail…etc.) - Domain: Network Type. - You can find the Country symbol in the last position of the address (.JO,.UK,.SY ……)

Address (cont.) Domain typeDescription ComCommercial companies EduEducational Foundations GovGovernment Foundations MilMilitary Foundation NetNetwork Services Companies OrgOrganizational Foundations IntInternational Foundations

Types Web mail: is a traditional , and used by any browser (ex. Yahoo, Hotmail web mail). Forwarding mail: is used to send a message from one address to another through Forwarding mail. it is a suitable sending method for any user who not want to reveal his address.

مثال : - إذا كان لديك إيميل ال Forwarding ، والجميع يراسلك عليه ، ويقوم هذا البريد بتوصيل تلك الرسائل إلى بريد آخر لك ، أي أن الشخص الذي أرسل لك رسالة بريدية لا يعرف عنوان بريدك الحقيقي. POP3 Mail (Post Office Protocol): like the Web mail, but is differ from it by using special applications like MS Outlook.

The Risks Spam Messages: السبام : أي رسالة إلكترونية لا ترعب باستقبالها Spam is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not receive it. Most spam messages are: -Commercial advertising. -News messages. -Questioners. -etc.

How spam targets individual users with direct mail messages? How spam targets individual users with direct mail messages? spam lists are often created by: 1.The Revealing of address for the user. أنت تكشف عن عنوان بريدك عن طريق وضعه في صفحات المزادات العلنية ، المجلات ، الإعلانات ، الأخبار ، المنتديات 2. Stealing Internet mailing lists. 3. Searching the Web for addresses using special software (Rolling addresses randomly). 4. Selling the your Address by some companies to spammers

Risks-Hackers Hackers: Hacker is a term used by some to mean "a clever programmer" and by others, especially those in popular media, to mean "someone who tries to break into computer systems." أشخاص يحاولون الوصول الى معلومات إلكترونية بطرق غير شرعية

How to protect our system from spammers and hackers? A- Using Antivirus software: there are Two Types: - Programs that located in User’s Personal Computer. - Programs that located in free web sites. Antivirus applications in user’s PC: 1. Norton Antivirus. 2. Mcafee. 3. PC-cillin.

How to protect our system from spammers and hackers? Antivirus applications in free web sites: 1. Symantec Security Check. 2. HouseCall. لكن لا يمكن إستخدام هذا النوع الا عندما نعمل على الشبكة B- Using Firewall: A system designed to prevent unauthorized access to or from a private network. accessnetwork

Firewalls Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet.Internet All messages entering or leaving the Internet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.security

How to defend ourselves from Spammers and Hackers? From Spammers: 1. Don’t give your Address except to your closed Friends. 2. Don’t open any Junk messages with unknown address. 3. Don’t open any Attachments with unknown address. 4. Use Anti-spam Tools that supported by the Applications. 5. Unsubscribe from commercial and general lists, and unwanted groups.

How to defend ourselves from Spammers and Hackers? From Hackers: 1. Don’t put your Personal IP address on any website. 2. Ensure that your antivirus program is active and updated always. 3. Disconnect the connection to internet when you not need it. 4. Use a good and effective firewall