How to Read Outlook Email. Make sure the computer is on.

Slides:



Advertisements
Similar presentations
Netscape Mail. Starting Out Launch Netscape From the menu bar select Edit - Preferences The next slides show the configuration for the mail preferences.
Advertisements

Computer Technology Timpview High School. is inexpensive and easy to use and track Spam – s sent in bulk to many peoples accounts;
How to Use Google Docs and Google Drive
E-Safety By Ruby H and Tomasz. S.M.A.R.T S You will have to keep safe on the internet, don’t send a picture of yourself. M Only meet someone if you know.
Parents Guide to Online Admissions We suggest you read this guide before you apply for your child’s school place or have it open in a separate window to.
Exchange 2010 Unified Messaging Creating an Inbox Rule to Notify your Pager.
Surrey Public Library Electronic Classrooms Essentials.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
( ) Basics Apr 2011 Public Computer Center Moore Memorial Library | Greene, NY.
Introduction to Your Name Goes Here
Using Pine to send your ICS111 homework First Log in into UNIX using SSH either from home (If you have previously installed SSH or from the Lab. Once in.
1 RVCC Phone MIS Help Desk, Ext 4357 (HELP) Holly Smythe, Instructional Designer, Ext 8451 Lonny Buinis, Instructional Designer, Ext 8306.
MStreamIT Toolkit
Using your School Account. All Breck Co Student Accts. – First part is unique to you – Last part.
Practical PC, 7 th Edition Chapter 9: Sending and Attachments.
ICT Essential Skills. (electronic mail) Snail Mail.
PARTS OF A COMPUTER AND INTERNET SAFETY For the 3 rd Grade Classroom.
Technology ICT Option: . Electronic mail is the transmission of mainly text based messages across networks This can be within a particular.
Information guide.
SAFETY What to be aware of and how to avoid problems. **This is not meant to make you fearful of . The goal of this discussion is to make sure.
etiquette Etiquette s always go to any of the following: Staff
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Computer Technology Timpview High School.  is inexpensive and easy to use and track  Spam – s sent in bulk to many people’s .
A beginner’s guide to Webmail. What do you need? A computer, or a smartphone An internet connection An account with an service provider.
The Internet contains an infinite number of high- quality, interesting, intriguing, and well-designed sites, and surfing on the Web is usually a source.
Jack LaytonJack Layton Logging InLogging Off Opening s Forwarding s Deleting s Microsoft Outlook Website.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
Basics.
 Subject: The topic you are talking about. So they understand what it is a about and explain to the point.  clients usually display it in a.
Company Guidelines and Basic Rules for …. No text words or slang, all s sent have to be polite and formal Use suitable, relevant subject lines.
Go on to the Greensward Academy website and click on webmail.
Student Deployment. Logging In When you receive your computer, you will log in using your PS Connect login. This is the username and password you use.
Internet Safety Internet Safety LPM
Create an Account. the good, the bad, the ugly Good: communication on your own schedule Bad: Hard to communicate on the go, even with a.
BY JESSICA SCHOLEY p1. Id Fraud Is When Someone Pretends To Be Someone Else Using There Address, Birthday And Other Information. People Also Use Id Fraud.
Creating a Parent/Guardian Account. Step 2: You will be presented with a login screen. To create a Guardian account click the “New Account” button. To.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
By :Mitchell Christie by :Mitchell Christie safety.
RYAN HICKLING. WHAT IS AN An messages distributed by electronic means from one computer user to one or more recipients via a network.
Introduction to Your OUSD and other district technology applications Leah Jensen, Instructional Technologist (510) (office), (510)
A presentation about communicating electronically.
By: Austin Kellogg. What’s the difference Phishing Scam where frauds send pop-up messages to lure personal information.
Creating an Account on Our School Website
Chapter 9 Sending and Attachments. Sending and Attachments FAQs: – How does work? – How do I use local ? – How do I use Web-based.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
. Electronic. is a method of exchanging digital messages. What does the E in stand for?
September 12, 2011 – Laptops!. Today you are going to learn how to log on to your computer with a password that you created. You will also activate your.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
BARDEN JUNIOR SCHOOL How to Use School . By C Carey.
Using Using Computers Safely, Effectively and Responsibly.
3.2 Introduction to .
Phishing, identity theft, and more
Introduction to Your Name Goes Here
CCN sFTP Reporting Guide for Partners
What to be aware of and how to avoid problems.
Welcome To Hotmail Support Number
Call Outlook customer support toll free number Ireland.
Fix TalkTalk Login Error Call TalkTalk Support
2. The following page  will open thereafter
Technology ICT Option: .
What is it? Why do I keep getting from Barracuda? SPAM.
Introduction to From the Saint Paul Public Library.
3.2 Introduction to .
Introduction to Your Name Goes Here
Logging in to CIITS.
MyPMI Mail Your MyPMI Mail comes with all these great features!
Setting up a Gmail Account & Safety Kamlesh Singh Bisht IT Specialist.
Technology ICT Option: .
How to work on your Stage 2 Application Form
Tips for Importing into Another Gmail Account | GMAIL CUSTOMER SERVICE NUMBER
Presentation transcript:

How to Read Outlook

Make sure the computer is on

Login to your account See log-in screen and copy of letter with username & password (arrows show where to enter each)

Open Outlook Show PC screen with Outlook shortcut icon Do we want to have other icons on the screen too? Perhaps Word? Are there other programs the center would likely have for clients?

The Outlook window

The Outlook program

safety? Who’s it from? Images here that represent spam, phishing, other scams…

safety – things to avoid Various type of scams & fraud Spam (junk mail) Phishing (don’t fall for the ‘bait’ in a message that tells you to go to a website and give personal information) Viruses (dangerous attachments) Chain letters (it’s a way to get lists of addresses) Remember, it’s cheaper to send than mail, so be very careful.

The Outlook Inbox

Logging off Need new picture of opened message…