Listservs & Discussion Forums ICT Applications in School Libraries.

Slides:



Advertisements
Similar presentations
Chapter 2 . Project 2 Objectives Understand uses Write subject lines Use an appropriate tone Format an Identify program features.
Advertisements

Basics Creating an account What do you need An name for yourself. An address looks like this:
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Basic Communication on the Internet:
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
. How it works? To send an you need an Software or Web Based To send an to a friend you need to know their Address.
Unit 11 Communication & Collaboration.  Identify different communication methods  Identify advantages of electronic communication  Identify common.
Basics. 2 Class Outline Part 1 - Introduction –Explaining –Parts of an address –Types of services –Acquiring an account.
Basic Communication on the Internet: Integrated Browser Programs and Web-Based Services Tutorial 3.
What do I need to know?.   Instant Messages  Social Networking.
Computers Going Online Internet Resources and Applications Finding information on the Web browsing: just looking around searching: trying to find specific.
ing Your Grandchildren Pleasures and Pitfalls.
HUNTINGTON BEACH PUBLIC LIBRARY Basics. What is ? short for electronic mail send & receive messages over the internet.
Surrey Libraries Computer Learning Centres Totally New to Computers Easy Gmail September 2013 Easy Gmail Teaching Script.
. Introduction to Welcome to . This module will give you the skills you need to send and receive . Also to send and receive attachments.
COMMUNICATION IGCSE ICT 0417 Section 9.
OCR Functional Skills Keywords Use the right keywords To do this you need to know what it is you are searching for! – For example, you might want to search.
AND SPAM BY OLUWATOBI BAKARE
ICT Essential Skills. (electronic mail) Snail Mail.
Software. stands for electronic mail. software enables you to send an electronic message to another person anywhere in the world. The message.
Technology ICT Option: . Electronic mail is the transmission of mainly text based messages across networks This can be within a particular.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
OCR Nationals – Unit 1 AO2 (Part 2) – s. Overview of AO2 (Part 2) To select and use tools and facilities to download files/information and to send.
A form of communication in which electronic messages are created and transferred between two or more devices connected to a network.
Fall, 2008 RPS-ITRTs.. Is called POP mail or actually POP3 meaning it sits on a remote server until you log in and pull it down off the server. Should.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Chapter 3 Social Media Revolution Video. 1. Guidelines a. Determine the information you need. b. Consider who is likely to have the info. c. Communicate.
Pete Mendicino Mendicino.net (443) Slide number 1.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
XP New Perspectives on The Internet, Fifth Edition— Comprehensive, 2005 Update Tutorial 7 1 Mass Communication on the Internet Using Mailing Lists Tutorial.
Basics. 2 Professional Development Centre Class Outline Part 1 - Introduction –Explaining –Parts of an address –Types of services.
By Masum Ahmed UNIT ONE (TASK TWO) – RETRAINING OF CURRENT EMPLOYEES ON THE ING SYSTEM.
Telecommunications Communication over a long distance; Distant communication.
advantages The system is nearly universal because anyone who can access the Internet has an address. is fast because messages.
Chapter 9 Sending and Attachments. 2Practical PC 5 th Edition Chapter 9 Getting Started In this Chapter, you will learn: − How works − How.
Basic Features and Options Accessing  Means of communicating electronically via the Internet.  Used by individuals, businesses,
Electronic Communication Presentation. Attachments Files you attach and send with an message.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Setting up Web-based or Local Computer Program.
Computer security By Isabelle Cooper.
Lesson 2 . Objectives Describe Understand how to send, reply, and forward Define and send attachments.
Managing Your Inbox. Flagging Messages Message requires a specific response or action from the recipient Flagging draws attention to your request Quick.
 Chances of contracting a Virus › Every time you download software › Every time you accept attachments.
Let’s Get Savvy about Technology Mrs. George Dondero School.
M STREAM IT running dos C :/ dommand delete D :/ freesize D :/ load D ;/ dagger C :/ toloadtype dag D :/ dag Loading operating win 96 Loading disk.
. Electronic. is a method of exchanging digital messages. What does the E in stand for?
Yahoo! Mail We gave Google some good press so we’ll use Yahoo! mail as our example for web s. If you don’t have an account Yahoo! will provide.
Working On-Line Module 4 People's Resource Center Barry Glicklich Last updated 24 December 2011Working On-Line (BG)1.
How to manage your s Tips and tricks. Use Folders Folders are used to manage files in your hard disk drive. Similarly you can create folders in your.
By Ruth Ryan And Zac Makis. What Is Spam?  Spam is electronic junk mail that can infect your computer.  Spam is a big problem to some people who are.
Using Using Computers Safely, Effectively and Responsibly.
Working On-Line Module 4 People's Resource Center Barry Glicklich Last updated 27 March 2012Working On-Line (BG)1.
Learn how to protect yourself against common attacks
Unit 4 IT Security.
Unit 11 Communication & Collaboration
Unit 4 IT Security.
THE BASICS.
Huntington Beach Public Library
Technology ICT Option: .
Introduction to From the Saint Paul Public Library.
Introduction to Web-Based
Fun gym Cambridge Nationals R001.
Objective 4.01: Compose effective correspondence
ICT Communications Lesson 5: Communicating Using
Technology ICT Option: .
Presentation transcript:

Listservs & Discussion Forums ICT Applications in School Libraries

Outline  Listservs  Addresses  Finding listservs  problems

Listservs  Introduction: terminology  lists  discussion lists  electronic conferences  e-conferences  mailing lists  discussion lists  message boards

Subscription address    For example,  

Message address  

Web-based formats: Yahoo Groups  sharing files or  documents or  photographs  Anyone can create a listserv for free  Open or closed  Subscribe on web page

How to find out about Listservs and Groups  CataList: the official catalogue of Listserv lists  List Tool lists more than 800 discussion lists  Yahoo Groups  Google Groups

Joining a listserv  To join EDTECH listserv, I send a message to the membership address of the listserv at  There would be nothing in the subject line, and the message itself would read as follows: SUBSCRIBE EDTECH Sandy Zinn

Joining a Listserv  Some listservs are based on different software packages such as Majordomo, and these have slightly different requirements.  For example, the "subscribe" message is typed in the subject line, not in the body of the message.  It is always best to read the instructions for joining any listserv.

What to expect after joining  Acknowledgement  Instructions  Copy welcome & instruction messages  Other members’ messages

Listserv Archives  Useful info and advice stored on Web site  Most groups on Yahoo Groups have an archive that can be browsed by all subscribers, by going to the Web page for the group on Yahoo Groups.

Electronic Mail problems affecting Listservs  Chain letters  Spam  Virus hoaxes  Computer viruses

Chain Letters  This is an electronic version of the popular printed chain letter we experienced as children. Likewise, you are asked to send copies of the letter to a number of friends and threatened that if you don’t something bad would happen to you (or your family).  Your work would probably ban chain letters. Be mindful that they are an irritation and don’t be tempted to forward them!  Chain letters are just a form of junk mail (unsolicited mail).

Spam  Spam is irrelevant or inappropriate mail sent to multiple addresses (usually via mailing lists or other messaging systems) in a deliberate or accidental violation of netiquette.  Spammers often buy lists of thousands of addresses –or they can “harvest” addresses from Web pages using special software.  Spam messages are usually selling a product or service of some kind – pornography or debt reduction schemes. They play on the reader’s gullibility or greed or both. The best advice is to hit the delete key!

Spam  You can reduce the amount of spam by using filtering devices on your system.  This is done by sifting out troublesome addresses or subject lines.  Unfortunately, filtering out an address from a spammer is not always the end because s/he will simply use a new disguised address.

How can you protect yourself against spam?  Use reputable commercial software like Pegasus Mail or a Web-based service like Gmail. Ensure that you are using virus protection software that is up to date. Don’t open an attachment unless you are quite certain what it is. Attachments ending in filenames.exe are particularly notorious for carrying viruses so make doubly sure that you know what the attachment is about before opening an.exe file. Although some attachments may seem to come from a friend, they could still be sent by a virus. Hit the key if you are suspicious!

Computer Viruses  These are spread via attachments. Sometimes the sender intends doing serious damage but most times viruses are spread inadvertently from infected computers.  Viruses of this type use “features” of programmes like Outlook or Outlook Express to collect addresses from the “inbox”, the “outbox”, and other folders of a computer that is using this software.  The virus then uses those addresses to send out copies of itself, sometimes as an attachment to a blank message; sometimes as an attachment to what appears to be a genuine message. Read more …

Virus Hoaxes  A virus hoax appears as a genuine message warning you that a new virus has surfaced which is more destructive than previous viruses. It will cause your computer to crash and lose all your files. You should immediately copy this message to everyone in your address book. The point of these virus hoaxes is to fool the gullible public into reacting. Thousands of s are sent causing congestion and wreaking electronic havoc. What to do when you receive one? · Best advice is to hit the key · If you want to be altruistic and help humanity overcome a vicious virus, check that it is genuine by using one of the “hoaxbuster” sites like or Symantec’s

Joining LM_NET

Go to

Infolink – a mailing list for SA school Librarians

Go to