√ Email and Features √Contacts√Related Terms attachmentaddress bookacronym email contacts emoticon forward distribution list shouting reply smiley reply.

Slides:



Advertisements
Similar presentations
Instant Messages: I am bored. Social Networks: Facebook, Myspace.
Advertisements

+ Internet Safety – Overview and Discussion. + The Internet is a Great Tool The Internet is a great tool and can make your life easier and more fun: It.
How to protect yourself, your computer, and others on the internet
Basic Communication on the Internet:
Internet Safety James Fuller Internet Rules To Remember When asked by friends or strangers, online or offline, never share Account IDs and Passwords.
INTERNET SAFETY FOR STUDENTS
© Vera Castleman Electronic Communication Grade 10.
What do I need to know?.   Instant Messages  Social Networking.
June is an easy way to communicate. It costs nothing to send an , but it does require a connection to the Internet. You can.
HUNTINGTON BEACH PUBLIC LIBRARY Basics. What is ? short for electronic mail send & receive messages over the internet.
By Laura Trawin.
{ Etiquette Handbook. Feature Creating an Font, colour and sizes etc Sending an Sending using Cc Sending using Bcc Creating a signature.
Do you know how to keep yourself safe?
INTERNET SAFETY FOR STUDENTS
GROUP 3: APRIL, DELICIA, LISA, SHEILAH.  Your child spends large amounts of time on-line, especially at night.  You find pornography on your child's.
This is group I have made.  Deleted all the s we didn’t need to clear out our .  Then created folders for the s we would receive.
ICT Essential Skills. (electronic mail) Snail Mail.
user guide Having a strong password allows other users to struggle to guess. To make a strong password you should use up to 12 letters and 1 or 2.
User Guide Joseph Harris. Open To open an you need to double click on it and the selected should open.
. Open a Click on your inbox and click on a you want to open then it will open.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Digital Citizenship Project
Information guide.
A Student’s Guide to Proper and Safe Web Behavior
. Open a Click on your inbox and click on a you want to open then it will open.
By: Brandee Burke.  This is an interactive slideshow that is going to teach you all about how to be safe while using the internet and also other kinds.
INTERNET SAFETY Tips for becoming a “surfer” dude!
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
By Ciaran carney. ADD COM  Etiquette – Acceptable Use Policy  Use a suitable subject in the - this helps the reader to understand what the message.
NETIQUETTE GUIDELINES FOR DISTANCE EDUCATION COURSES.
Communicating electronically: one computer to another computer.
Santa’s s By Chloe Warman.
Dylan Bayliff. Contents: 1- Sending s & Using etiquette 2- Staying safe and Accessing 3- Open s 4- Replying to s 5- Setting up contacts.
Etiquette – a list of rules that we observe Phishing - sending an to a user falsely claiming to be a legitimate company to scam the user into providing.
How to use ? By Martyna Haliniak. How to log on? In order to log on, you have to type in your username & password in the text boxes, and then click.
Evidence Including tools and etiquette.
Microsoft Office Illustrated Introductory, Second Edition Started with Outlook 2003 Getting.
Basic Features and Options Accessing  Means of communicating electronically via the Internet.  Used by individuals, businesses,
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Online Safety and You!. Introduction The good and the bad about the internet Protecting your Personal Information –Password protection Safety.
Preparing s Using Etiquette Lesson A4-3.
Company Guidelines and Basic Rules for …. No text words or slang, all s sent have to be polite and formal Use suitable, relevant subject lines.
s This presentation is all about s, etiquette and software. I will go through these things step by step to give you a clear understanding.
Digital Citizen Project Xiomara Hernandez. Topics Defined Netiquette on Social Media Sites Copyright and Fair Use Plagiarism Safety on the Internet Safety.
Preparing s Using Etiquette. Learning Objectives Define . List the parts of an and an header. List rules for etiquette.
 When you receive a new you will be shown a highlighted in yellow box where your can be found  To open your new just double click.
STAYING SAFE: Here are some safety tips when using Change your password regularly and keep it in a safe place. Don’t share your password with anyone.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
Review Make a review sheet by numbering as shown below. The test is timed. You can practice again if needed. Click the mouse when you are ready to.
RESPONSIBLE DIGITAL CITIZENSHIP At the Safety Booth.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
OCR Nationals Unit 1 – ICT Skills for Business. Using in business What bad practice can you see in this ? Annotate your copy.
tool kit. USER GUIDE Etiquette (Acceptable use policy) – a list of rules that we observe Use a suitable subject in the - this helps.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
Electronic Mail. Gmail Accounts USERNAME Skyward PASSWORD Same password as you use to log in to your computer.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Guidelines for polite online interaction; words “Internet” and “etiquette” Don’t type in all capital letters; this is interpreted as SHOUTING Do use correct.
Appropriate Use of Technology
Huntington Beach Public Library
Electronic Mail.
Year 10.
Basics HURY DEPARTMENT OF COMPUTER SCIENCE M.TEJASWINI.
Setting up a Gmail Account & Safety Kamlesh Singh Bisht IT Specialist.
Presentation transcript:

√ and Features √Contacts√Related Terms attachmentaddress bookacronym contacts emoticon forward distribution list shouting reply smiley reply to all snail mail signaturespam subject linetelecommunications

 Your can be seen by your teachers and school officials.  Deleting the makes it disappear from your view but the school has a copy of your current mail AND your deleted mail.  Misuse of your account will be considered a disciplinary matter.  Use only appropriate language.  Do not disclose your password to others.  You are responsible for messages sent using your account and your password.  The same thing is true at work. Misuse of is grounds for firing.

 Change your password often or if you think others may know it.  Use a "good" password--one that you can remember but is not guessable by others. ◦ Passwords like shs, bulldogs, your name, and your pet's name, are too easy to guess. ◦ Most systems have a minimum length for passwords. ◦ Use a combination of letters and numbers. ◦ Passwords are usually case sensitive.

or electronic mail - messages, usually text, sent from one person to another via computer. is a vital telecommunications tool. Telecommunications - all data transmission using technology to communicate. Snail mail - a term used to refer to letters and other mailings sent through the U.S. Post Office. Signature - the lines that appear automatically at the bottom of every you send. It usually consists of the person's name, title, and company.

A contact is a person in the address book. An address book is a saved contact list of addresses. A distribution list is a way to group people to whom you send the same message.

An emoticon is a "picture" made up of typed characters that express an emotion in s. The term smiley is commonly used. It was first coined by Scott E. Fahlman at Carnegie Mellon University in These are a few common emoticons: :-) Happy :-( Sad ;-) Joking or sarcasm :-/ Wry humor

A subject line in the heading that should be a brief notice of what the concerns. It should not be left blank. CC means that you are sending a copy to others. (CC is visible to all recipients of your .) BCC means that you are sending a copy BUT others cannot tell that the copy is being sent. An attachment is a separate file that you include with -- a Word document, spreadsheet, graphic image, sound files, etc.

Shouting in an is typing IN ALL CAPITAL LETTERS. It is considered rude. Spam is "junk" . It is an , often advertising, that is sent to a large number of people without their consent.

An acronym is a phrase derived from the first letter of each work and typed in all caps, such as FYI for for your information. acronyms are shorthand used in many messages. ASAP--as soon as possible BTW--by the way FYI--for your information IMO--in my opinion JMO--just my opinion LOL--laughing out loud ROFL--rolling on the floor laughing

Forward means to send an message you receive to another address. Reply to Sender only sends your answer to the person who originally wrote it; not all of the people it has been sent to. Reply to All sends your answer to all of the people in that group or list and everyone who was copied. For example if you get a message that was sent from the secretary of the company to all employees. Reply to All will send your reply back to all employees. Be careful using Reply to All. Send - the last step in creating an correspondence

Follow the rules for and Internet safety. No one is immune. Realize that people on the Internet may not be who they say they are and may be criminals. Sometimes the 12- year-old girl is actually a sexual predator. Sometimes the legitimate businessman is an identity thief. Never give out personal information unless you are corresponding with a person you know. Delete from unknown sources. Never open attachment from an unknown source. Never click on links from unknown sources. Do not give out credit card numbers, telephone numbers, or Social Security numbers with companies in a response to an . It may be a phishing scheme. If you are ordering online, you should have initiated the contact. Be aware that s from "legitimate-looking" companies are often part of a identity theft scams. Do not photographs of yourself or your family to people you do not know. Only post these on personal web pages if they are password protected. Many sites allow you to make pages and designate friends and family who are allowed to access that page. Never arrange a face-to-face meeting with someone you've "met" online. Stay out of chat rooms. If you go there, do not give out identifying or personal information, including your name, address, school name, telephone number, age, marital status, gender, or financial information. Never respond to messages that are hostile, belligerent, or inappropriate. Show your message to your parent, teacher, or trusted adult to see if there is anything that can be done about it. Report suspicious messages to your parents, teacher, or the proper authorities. (You may be saving yourself or someone else.) Under no circumstances should you respond. They can go to or call , the National Center for Missing & Exploited Children's CyberTip Line. Realize that people on the Internet may not be who they say they are and may be criminals. Sometimes the 16-year-old girl is actually a sexual predator. Sometimes the legitimate businessman is an identity thief. Never give out personal information unless you are corresponding with a person you know. Do not give out credit card numbers, telephone numbers, or Social Security numbers with companies in a response to an . Be aware that s from "legitimate-looking" companies are often part of a identity theft scams. It may be a phishing scheme. If you are ordering online, you should have initiated the contact.

Often from unknown sources contain attachments or link to sites that attempt to harm your computer with malware—viruses, Trojan horses, worms, etc.  Delete from unknown sources.  Never open attachment from an unknown source.  Never click on links from unknown sources.

 Do not photographs of yourself or your family to people you do not know.  Only post these on personal web pages if they are password protected.  Many sites allow you to make pages and designate friends and family who are allowed to access that page.

 Never arrange a face-to-face meeting with someone you've "met" online.  Stay out of chat rooms. ◦ If you go there, do not give out identifying or personal information, including your name, address, school name, telephone number, age, marital status, gender, or financial information.

Report suspicious messages to your parents, teacher, or the proper authorities. (You may be saving yourself or someone else.) Under no circumstances should you respond. They can go to or call , the National Center for Missing & Exploited Children's CyberTip Line. Never respond to messages that are hostile, belligerent, or inappropriate. Show your message to your parent, teacher, or trusted adult to see if there is anything that can be done about it.