 In businesses if you need to send an email and don’t want to have to type their email over and over again. Using contacts is quick and simple. All you.

Slides:



Advertisements
Similar presentations
. How it works? To send an you need an Software or Web Based To send an to a friend you need to know their Address.
Advertisements

Etiquette This is my slideshow about tools and etiquette that help you to communicate with others in a business context. By Jake Alaia.
Evidence. Sending with attachment As you can see I have attached a file which I would then continue to send to the recipient.
 When you receive a new you will be shown a highlighted in yellow box where your can be found  To open your new just double click.
{ Etiquette Handbook. Feature Creating an Font, colour and sizes etc Sending an Sending using Cc Sending using Bcc Creating a signature.
COMMUNICATION IGCSE ICT 0417 Section 9.
evidence. Safety To stay safe on the internet there are many points you need to follow. The first point is to change your password regularly, you.
This is the first page of the log in, this is were you enter your unique details.
 To: means to the person you are sending the to.  CC: Carbon copy, to add additional addresses.  BBC: Blind carbon copy, to add additional addresses.
Evidence By Jordan Shurety. This I where you write who you are going to send the to. Cc in an means carbon copy or courtesy copy. You.
This is group I have made.  Deleted all the s we didn’t need to clear out our .  Then created folders for the s we would receive.
user guide Having a strong password allows other users to struggle to guess. To make a strong password you should use up to 12 letters and 1 or 2.
Evidence.
Anya Brookman. How to create a new message Unwanted messages Folders Messages you have sent to someone Logging out when you have finished sending.
Hello Employee, Welcome to MStreamIT!
Technology ICT Option: . Electronic mail is the transmission of mainly text based messages across networks This can be within a particular.
Etiquette. Automatic reply Here I have created a automatic reply for when I am not able to contact people when I have ed then.
Evidence. Sending with attachment with zip folder.
Name: alex lewis Form:.  You must make sure that you include the following in your presentation:  Transitions between slides.  Speaker notes (what.
. Open a Click on your inbox and click on a you want to open then it will open.
I have attached a file to this by selecting the paperclip on the bottom of the page.
ETIQUETTE AND EVIDENCE
How to use safely and efficiently
Matt Crocker. What's in a ? Cc=carbon copy To…=who will receive Bcc…=blind carbon copy Attachments=file can be sent through Text area.
Information guide.
WRITING AN . What equipment do I need if I want to write an ? A computer with installed appropriate software A computer with installed appropriate.
This presentation will be all about s, etiquette and software. I will be going through each one of these individually and thoroughly step.
This presentation will be all about s, etiquette and software. I will be going through each one of these individually and thoroughly step.
. Open a Click on your inbox and click on a you want to open then it will open.
etiquette Etiquette s always go to any of the following: Staff
Tool Kit Natasha Donovan.
EVIDENCE BY JOE KINTON. SENDING AND WITH AN ATTACHMENT I have sent an with an attachment in order to show them the logo that was spoken.
Name: Ryan Lugg Form: 10B . How can businesses make use of . (P) can be a very useful tool, it can be very cost effective and efficient.
Computer Technology Michael Viphongsay 4B. Electronic mail Internet or Intranet.
 Save you auto reply.  You can set a day and time when your message will be sent to people that try to wright to you.  Go to the Automatic Replies.
Dylan Bayliff. Contents: 1- Sending s & Using etiquette 2- Staying safe and Accessing 3- Open s 4- Replying to s 5- Setting up contacts.
This is a presentation, It will show all I have leaned about .
Tools  Subject- a title to your to give an idea what the will be about before the receiver opens it.  Attachment- a file or document.
How to use ? By Martyna Haliniak. How to log on? In order to log on, you have to type in your username & password in the text boxes, and then click.
This PowerPoint presentation will show you how to use your productively and successfully.
 Subject: The topic you are talking about. So they understand what it is a about and explain to the point.  clients usually display it in a.
 Subject: The topic you are talking about. So they understand what it is a about and explain to the point.  clients usually display it in a.
Evidence Including tools and etiquette.
Evidence By Ryan Owen. Basic This means who I am sending the to. This how who I am sending a copy of the to. The Bcc is a copy.
A subject line is the topic of the so the recipient of the has a preview of what the is about. It will be no longer than a couple.
Preparing s Using Etiquette Lesson A4-3.
Company Guidelines and Basic Rules for …. No text words or slang, all s sent have to be polite and formal Use suitable, relevant subject lines.
s This presentation is all about s, etiquette and software. I will go through these things step by step to give you a clear understanding.
This presentation will be all about s, etiquette and software. I will be going through each one of these individually and thoroughly step.
Preparing s Using Etiquette. Learning Objectives Define . List the parts of an and an header. List rules for etiquette.
 When you receive a new you will be shown a highlighted in yellow box where your can be found  To open your new just double click.
STAYING SAFE: Here are some safety tips when using Change your password regularly and keep it in a safe place. Don’t share your password with anyone.
Lesson 2 . Objectives Describe Understand how to send, reply, and forward Define and send attachments.
user guide Having a strong password allows other users to struggle to guess. To make a strong password you should use up to 12 letters and 1 or 2.
Adding attachments to s This power point is to help people to know what an attachment is and also I will show you how to do it with screen shots to.
Basics. Stands for “electronic mail” Digital message sent over the internet Primarily text but can include pictures, sound and attachments.
tool kit. USER GUIDE Etiquette (Acceptable use policy) – a list of rules that we observe Use a suitable subject in the - this helps.
Professional Communications Mrs. Lopez-Wyatt. Why is etiquette important? We interact more with written word and the number of users and usage rates.
Objective 4.01: Compose effective correspondence.
Sending effective and professional s . Session aims and objectives Lesson Aims and Objectives send s that are fit for purpose and audience.
Inbox Sent Box Subject New Message New Message Delete Password
Technology ICT Option: .
Introduction to Web-Based
Year 10.
Fun gym Cambridge Nationals R001.
Lesson 2 .
Professional Communications
Objective 4.01: Compose effective correspondence
Technology ICT Option: .
.
Presentation transcript:

 In businesses if you need to send an and don’t want to have to type their over and over again. Using contacts is quick and simple. All you got to do is fill all their information in once and the rest is simple. PTO

When writing an if you want to look professional you should add a signature. So this should usually contain your name and address with a phone number.

Being polite and getting your point across quickly. Make sure spellings and grammar are correct. There are no slang in the or text speak. Like hi m8 hw r u? You should change it into ‘Hello Mike, How are you today?’ Also do not use capitalised letters to influence you are shouting to the sender. If you use all of this you will not only look professional but show you are committed.

Reply - When you respond to the that has been sent to you and can then be found in their inbox Forward - When you have received an , and you want someone to see the that they sent you Cc : When you are sending an and you want other people to be included in this conversation. Carbon Copy. Bcc : When you are sending an and you want other people to be included in this conversation without others being able to see who was included. Blind Carbon Copy. Subject : The topic that you are talking about that is shown when an is in your inbox. This is essential if you don't want it to go in their junk mail. Attachment : If you want to add a file to the that could be a word document or a picture. This can be useful if you want to send and receive files. But these can be intercepted.

CC ( Carbon Copy) BCC ( Blind Carbon Copy) Subject Line Attachments

Reply

Forward

If you are looking into advanced mail, then you can sort your inbox to filter s as the come in. So if you want certain people to go in different folders. Like if you want to separate your work and personal s, then that address wont be shown in your work s. Or you can manually transfer the s across. If you want a simple inbox.

This feature is also called ‘out of office’ and is used if you have left work and if someone was to contact you. The sender will receive an with a personalised back. Without your assistance. You will still receive the from them and when you get back can deal with it then. You can set certain dates, or times. This is perfect for buisnesses. PTO

If you are on the senders behalf you will receive an close to this. And this is virtually instant and is great for if you are going on holiday or just for a weekend. Many businesses use this… Including banks. Showing its secure

The reason I created different is so I can sort out between personal and school s so I do not get confused between s, therefore creating a cleaner inbox. If someone was to send me an attachment I could save it as a file in my hard drive and have a copy on my personal computer.

The good things about having a group is it is easier to send group s to more than one person, making is speedier and easier

 Cables unplugged – Check cables correct  Internet Service Provider error – Contact ISP for details and solution from their centre.  Stolen password – Recover password through services and seek support.  software corruption – Creating copies of the files. Back ups.