Email etiquette. 1. language Use the right language because the email will have to keep correcting your mistake and it will like better if you don’t misspell.

Slides:



Advertisements
Similar presentations
Setting up a Gmail Account & Safety
Advertisements

The basics that we should all remember while communicating digitally.
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Business Etiquette Are you being Rude? by Paula N. Strozier.
What is Spam  Any unwanted messages that are sent to many users at once.  Spam can be sent via , text message, online chat, blogs or various other.
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
Information and Communication Technology
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Unit 11 Communication & Collaboration.  Identify different communication methods  Identify advantages of electronic communication  Identify common.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
This PowerPoint presentation will show you how to use your productively and successfully.
Quiz Review.
 To: means to the person you are sending the to.  CC: Carbon copy, to add additional addresses.  BBC: Blind carbon copy, to add additional addresses.
Practical PC, 7 th Edition Chapter 9: Sending and Attachments.
Threats to I.T Internet security By Cameron Mundy.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
A Student’s Guide to Proper and Safe Web Behavior
Technology Skills and the Workplace Practicum in Human Services.
World Wide Web and Internet Communications. Definitions O Adware – unwanted advertising banners, pop- ups, pop-unders, etc. in your web browser O Anti-virus.
Matthew Hardaway CSCI101 Thursday 3:30pm.  Fishing (Encyclopedia Britannica): ◦ Sport of catching fish—freshwater or saltwater— typically with rod, line,
Keeping Information Safe Task 4. Basic security measures Passwords Change password on regular basis Do not use names or words easily linked to yourself.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
NETIQUETTE. WHAT IS IT??? Netiquette refers to the rules of online etiquette that guide users while working, communicating, and utilizing resources in.
Electronic Etiquette Communication Skills for and Blogs.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Computer Technology Michael Viphongsay 4B. Electronic mail Internet or Intranet.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Etiquette – a list of rules that we observe Phishing - sending an to a user falsely claiming to be a legitimate company to scam the user into providing.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
This PowerPoint presentation will show you how to use your productively and successfully.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
. Here is me sending an with an attachment, you click onto the paper clip icon in order to send the attachment.
Chapter 9 Sending and Attachments. 2Practical PC 5 th Edition Chapter 9 Getting Started In this Chapter, you will learn: − How works − How.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
s By Adam Dallaway Unit 1. Sending an .
Etiquette. Sending s 1. Make sure your includes a courteous greeting and closing. Helps to make your not seem demanding or terse.
 Pretty much any kind of file can be sent on such as a photo or even a virus. .exe files are usually always viruses. (never open these even if.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
And more……. ‘Leadership and communication are inseparable. You can’t have one without the other.’ ---Claude I. Taylor.
Etiquette. Spam  spam, also known as junk or unsolicited bulk (UBE), is a subset of electronic spam involving nearly identical.
BY JESSICA SCHOLEY p1. Id Fraud Is When Someone Pretends To Be Someone Else Using There Address, Birthday And Other Information. People Also Use Id Fraud.
Don’t send offensive pictures  This can badly offend people in many ways or they could take you to court and may get charged. Also it is illegal to send.
Internet safety By Kenan.  Viruses are written by malicious programmers who wish to cause problems for other computer users.  The primary source of.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
tool kit. USER GUIDE Etiquette (Acceptable use policy) – a list of rules that we observe Use a suitable subject in the - this helps.
Santa’s s By Alexander Britton. Sending an .
By Sarah Anderson and Tony Christensen. PARTS OF Header Body Attachments.
Electronic Mail. Gmail Accounts USERNAME Skyward PASSWORD Same password as you use to log in to your computer.
M STREAM IT running dos C :/ dommand delete D :/ freesize D :/ load D ;/ dagger C :/ toloadtype dag D :/ dag Loading operating win 96 Loading disk.
Etiquette & Safety This is based on things you might experience when using you’re .
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
. Electronic. is a method of exchanging digital messages. What does the E in stand for?
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
What it is and how to stop it.  What spam is.  Why it can be dangerous.  How to handle it.
Internet Safety.  Ethics-moral standards or values  Netiquette-rules for proper online behavior.
Unit 4 IT Security.
Lesson 3 Safe Computing.
What to be aware of and how to avoid problems.
Unit 4 IT Security.
Electronic Mail Opening Activity: 411 of
Electronic Mail.
Computer Security.
Electronic Mail.
Setting up a Gmail Account & Safety Kamlesh Singh Bisht IT Specialist.
Presentation transcript:

etiquette

1. language Use the right language because the will have to keep correcting your mistake and it will like better if you don’t misspell things and it will look professional and if you are applying for a job it will make the job want you more because you can spell probably.

2. spam spam, also known as junk or unsolicited bulk (UBE), is a subset of electronic spam involving nearly identical messages sent to numerous recipients by . Clicking on links in spam may send users to phishing web sites or sites that are hosting malware.

3. Don’t open s you don’t know If you open s from people you don’t know you can get hacked or people sending different things none witch can be not necessary for people of young ages to be looking at.

4. Attachments When sending large attachments, always "zip" or compress them before sending. Never send large attachments without notice! Always ask what would be the best time to send them first. Learn how to resample or resize graphics to about 600 pixels in width before attaching them to an . This will greatly reduce download time. Never open an attachment from someone you don't know. Be sure your virus, adware and spyware programs are up to date and include scanning of your s and attachments both incoming and outgoing. It is better to spread multiple attachments over several s rather than attaching them all to one to avoid clogging the pipeline.

5. Rules for Don’t give your password Don’t give any details to the other person on the Don’t spam someone Don’t open attachments

Don't forward s that say to do so--no matter how noble the cause may be. Most are hoaxes or hooey and may not be appreciated by those you send to. If someone asks you to refrain from forwarding s they have that right and you shouldn't get mad or take it personally. When forwarding , if you cannot take the time to type a personal comment to the person you are forwarding to--then don't bother. Don't forward anything without editing out all the forwarding >>>>, other addresses, headers and commentary from all the other forwarders. Forwarding