This Guide is going to be about how to  attach files  create a signature  send to multiple recipients with using ‘Cc’ and ‘Bcc’  change the priority.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

AO- 2 (part 2 of 2) Pass + Send. Receive. Reply. Forward. With more than 1 attachment.
Coursework Task By Miles Fajembola 10E. Send An Here is the I sent to wacky mountain bikes.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Computer Maintenance & Safety Spring Internet Safety Keeping your computer safe What is a computer virus? A computer program that can copy itself.
  Cyberbullying can be as simple as continuing to send e- mail or text harassing someone who has said they want no further contact with the sender.
Computer Viruses.
Evidence. Sending with attachment As you can see I have attached a file which I would then continue to send to the recipient.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
By Laura Trawin.
OCR Functional Skills Keywords Use the right keywords To do this you need to know what it is you are searching for! – For example, you might want to search.
Utica Community Schools Technology Department
Security Advice Georgie Pepper Campsmount Acadamy.
ICT Essential Skills. (electronic mail) Snail Mail.
Technology ICT Option: . Electronic mail is the transmission of mainly text based messages across networks This can be within a particular.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Name: alex lewis Form:.  You must make sure that you include the following in your presentation:  Transitions between slides.  Speaker notes (what.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
etiquette Etiquette s always go to any of the following: Staff
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
The KS3 online test -The software. - You must be really familiar with this application to show what you can do! In the test all the detailed.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
Name: Ryan Lugg Form: 10B . How can businesses make use of . (P) can be a very useful tool, it can be very cost effective and efficient.
By Masum Ahmed UNIT ONE (TASK TWO) – RETRAINING OF CURRENT EMPLOYEES ON THE ING SYSTEM.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Involving What is and how does it work? Difference between CC and Bcc Virus How to compress a large file? Advantages and Disadvantages.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
 Subject: The topic you are talking about. So they understand what it is a about and explain to the point.  clients usually display it in a.
Pasewark & Pasewark Microsoft Office 2003: Introductory 1 INTRODUCTORY MICROSOFT OUTLOOK Lesson 1 – Outlook Basics and .
 Subject: The topic you are talking about. So they understand what it is a about and explain to the point.  clients usually display it in a.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
safety Bailey mullan. dangers ing has become on of the main sources for communicating. When using it is more likely for someone.
What is Spam? d min.
Internet safety By Kenan.  Viruses are written by malicious programmers who wish to cause problems for other computer users.  The primary source of.
What is a spam? w abuse-faq/spam-faq.html w Spam is flooding the Internet with many copies of the same message,
Internet safety By Suman Nazir
Introduction to Your OUSD and other district technology applications Leah Jensen, Instructional Technologist (510) (office), (510)
Electronic Mail. Gmail Accounts USERNAME Skyward PASSWORD Same password as you use to log in to your computer.
This is a basic guide that is going to include  How to open outlook  How to create an and how to send it.  How to reply and forward an .
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Extra Credit Presentation: Allegra Earl CSCI 101 T 3:30.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
is short for electronic mail!. What is ? An electronic message sent from one computer to another. saves money and time compared to regular.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
– Purposes & Uses 20 – Purposes & Uses 20.
Using Using Computers Safely, Effectively and Responsibly.
An Introduction to Phishing and Viruses
Unit 4 IT Security.
Venture A guide to Advance ing
Lesson 3 Safe Computing.
Electronic Mail.
Technology ICT Option: .
An Overview.
Electronic Mail.
Electronic Mail Opening Activity: 411 of
Introduction to Web-Based
Year 10.
Electronic Mail.
Computer Security.
Electronic Mail.
Technology ICT Option: .
.
What devices use the internet?
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

This Guide is going to be about how to  attach files  create a signature  send to multiple recipients with using ‘Cc’ and ‘Bcc’  change the priority  add contacts to address book  block a contact.  use safely 25th October, 2012Nisha Malik Zaman1

 Step 1:How to attach files Step2: How to create a signature 1.Attach files with the attachment button 1. Go to Options 2.Go to Settings 3. Add signature and save it. 25th October, 2012Nisha Malik Zaman2

 Step4: How to open an attachment 25th October, 2012Nisha Malik Zaman3 1.Right Click on the attachment and Save Target As, but don’t open suspicious s and attachments as they might contain files that may cause harm to your computer.

 Step 5: How send to multiple recipients with using ‘Cc’ and ‘Bcc’ 1.You can use ‘Cc ‘(carbon copy) to send to multiple recipients, you can also use the ‘To’ column to send it to multiple recipients. 2.‘Cc’ is used to send to people just for information purposes 3.‘To’ is used to send to people who it is really aimed at. 4.‘Bcc’(blind carbon copy) is used to send to multiple recipients but hiding the people you are sending to 5.To open Bcc ’, open ‘Cc’ and below there, at the bottom is ‘Bcc’ column. 25th October, 2012Nisha Malik Zaman4

 Step 6: How to change the priority of the 25th October, 2012Nisha Malik Zaman5 Open a new and there are two buttons High Priority Low Priority

 Step 4: How to add contacts to the Address Book. 25th October, 2012Nisha Malik Zaman6 1.Click Add Contact 2. A box will appear in which you have to write of the person you want to add and click on ‘Invite’.

 Step 6: How to block and unblock a contact 25th October, 2012Nisha Malik Zaman7 1.Right Click on that person’s Name/ in the Contact List you would like to block 2.Click on the Block icon. 3.You can unblock it as well when you click on that contact again.

 Step7: How to use safely 25th October, 2012Nisha Malik Zaman8 One of the most common tools we are using on a daily basis is . Due to this fact, is also a major security problem. Outlook has an option to block attachments that are potentially dangerous. 1.Use an antivirus that also has the ability to scan incoming/outgoing . AVG and Norton is an example of such product. 2.It is very important to keep your antivirus updated on a daily basis. 3.Do not open attachments from people that you do not know or seem suspicious.

 Step8: What is Phishing and Spam? 25th October, 2012Nisha Malik Zaman9 Phishing: Phishing is to get information such as usernames, passwords and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. Phishing s may contain links to websites that are infected with malware. What is spam? Spam is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Most spam is commercial advertising, often for dubious products, get-rich-quick schemes, or quasi-legal services. Spam costs the sender very little to send -- most of the costs are paid for by the recipient or the carriers rather than by the sender.

 Step9: What is Scam and Virus? 25th October, 2012Nisha Malik Zaman10 Computer Virus: A computer virus that can be spread from one computer to another. The term "virus" is also commonly used to refer to other types of malware such as spyware. A virus is a program that runs against your wishes. A spyware spies on your computer of what you are doing and information that you have without letting you know but if you have a spyware you might experience that your internet is slower than usual.