√ and Features √Contacts√Related Terms attachmentaddress bookacronym contacts emoticon forward distribution list shouting reply smiley reply to all snail mail signaturespam subject linetelecommunications
Your can be seen by your teachers and school officials. Deleting the makes it disappear from your view but the school has a copy of your current mail AND your deleted mail. Misuse of your account will be considered a disciplinary matter. Use only appropriate language. Do not disclose your password to others. You are responsible for messages sent using your account and your password. The same thing is true at work. Misuse of is grounds for firing.
Change your password often or if you think others may know it. Use a "good" password--one that you can remember but is not guessable by others. ◦ Passwords like shs, bulldogs, your name, and your pet's name, are too easy to guess. ◦ Most systems have a minimum length for passwords. ◦ Use a combination of letters and numbers. ◦ Passwords are usually case sensitive.
or electronic mail - messages, usually text, sent from one person to another via computer. is a vital telecommunications tool. Telecommunications - all data transmission using technology to communicate. Snail mail - a term used to refer to letters and other mailings sent through the U.S. Post Office. Signature - the lines that appear automatically at the bottom of every you send. It usually consists of the person's name, title, and company.
A contact is a person in the address book. An address book is a saved contact list of addresses. A distribution list is a way to group people to whom you send the same message.
An emoticon is a "picture" made up of typed characters that express an emotion in s. The term smiley is commonly used. It was first coined by Scott E. Fahlman at Carnegie Mellon University in These are a few common emoticons: :-) Happy :-( Sad ;-) Joking or sarcasm :-/ Wry humor
A subject line in the heading that should be a brief notice of what the concerns. It should not be left blank. CC means that you are sending a copy to others. (CC is visible to all recipients of your .) BCC means that you are sending a copy BUT others cannot tell that the copy is being sent. An attachment is a separate file that you include with -- a Word document, spreadsheet, graphic image, sound files, etc.
Shouting in an is typing IN ALL CAPITAL LETTERS. It is considered rude. Spam is "junk" . It is an , often advertising, that is sent to a large number of people without their consent.
An acronym is a phrase derived from the first letter of each work and typed in all caps, such as FYI for for your information. acronyms are shorthand used in many messages. ASAP--as soon as possible BTW--by the way FYI--for your information IMO--in my opinion JMO--just my opinion LOL--laughing out loud ROFL--rolling on the floor laughing
Forward means to send an message you receive to another address. Reply to Sender only sends your answer to the person who originally wrote it; not all of the people it has been sent to. Reply to All sends your answer to all of the people in that group or list and everyone who was copied. For example if you get a message that was sent from the secretary of the company to all employees. Reply to All will send your reply back to all employees. Be careful using Reply to All. Send - the last step in creating an correspondence
Follow the rules for and Internet safety. No one is immune. Realize that people on the Internet may not be who they say they are and may be criminals. Sometimes the 12- year-old girl is actually a sexual predator. Sometimes the legitimate businessman is an identity thief. Never give out personal information unless you are corresponding with a person you know. Delete from unknown sources. Never open attachment from an unknown source. Never click on links from unknown sources. Do not give out credit card numbers, telephone numbers, or Social Security numbers with companies in a response to an . It may be a phishing scheme. If you are ordering online, you should have initiated the contact. Be aware that s from "legitimate-looking" companies are often part of a identity theft scams. Do not photographs of yourself or your family to people you do not know. Only post these on personal web pages if they are password protected. Many sites allow you to make pages and designate friends and family who are allowed to access that page. Never arrange a face-to-face meeting with someone you've "met" online. Stay out of chat rooms. If you go there, do not give out identifying or personal information, including your name, address, school name, telephone number, age, marital status, gender, or financial information. Never respond to messages that are hostile, belligerent, or inappropriate. Show your message to your parent, teacher, or trusted adult to see if there is anything that can be done about it. Report suspicious messages to your parents, teacher, or the proper authorities. (You may be saving yourself or someone else.) Under no circumstances should you respond. They can go to or call , the National Center for Missing & Exploited Children's CyberTip Line. Realize that people on the Internet may not be who they say they are and may be criminals. Sometimes the 16-year-old girl is actually a sexual predator. Sometimes the legitimate businessman is an identity thief. Never give out personal information unless you are corresponding with a person you know. Do not give out credit card numbers, telephone numbers, or Social Security numbers with companies in a response to an . Be aware that s from "legitimate-looking" companies are often part of a identity theft scams. It may be a phishing scheme. If you are ordering online, you should have initiated the contact.
Often from unknown sources contain attachments or link to sites that attempt to harm your computer with malware—viruses, Trojan horses, worms, etc. Delete from unknown sources. Never open attachment from an unknown source. Never click on links from unknown sources.
Do not photographs of yourself or your family to people you do not know. Only post these on personal web pages if they are password protected. Many sites allow you to make pages and designate friends and family who are allowed to access that page.
Never arrange a face-to-face meeting with someone you've "met" online. Stay out of chat rooms. ◦ If you go there, do not give out identifying or personal information, including your name, address, school name, telephone number, age, marital status, gender, or financial information.
Report suspicious messages to your parents, teacher, or the proper authorities. (You may be saving yourself or someone else.) Under no circumstances should you respond. They can go to or call , the National Center for Missing & Exploited Children's CyberTip Line. Never respond to messages that are hostile, belligerent, or inappropriate. Show your message to your parent, teacher, or trusted adult to see if there is anything that can be done about it.