Jeopardy By Katrina Cox & Gordon Moses © July 2008.

Slides:



Advertisements
Similar presentations
ACDV B50 Joyce Kirst. Content Consider whether what you have to say is best said through Consider whether the person you are writing to needs to.
Advertisements

AO- 2 (part 2 of 2) Pass + Send. Receive. Reply. Forward. With more than 1 attachment.
.  The sender and recipient(s) of an message do not have to be online at the same time. When one person sends a message, it is stored on an.
Coursework Task By Miles Fajembola 10E. Send An Here is the I sent to wacky mountain bikes.
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
. How it works? To send an you need an Software or Web Based To send an to a friend you need to know their Address.
Understanding and Building Basic Networks Chapter 3 The Other Internet.
Fundamentals of Electronic Mail From Greenlaw/Hepp, In-line/On-line: Fundamentals of the Internet and the World Wide Web 1 Introduction Advantages.
HUNTINGTON BEACH PUBLIC LIBRARY Basics. What is ? short for electronic mail send & receive messages over the internet.
This is the first page of the log in, this is were you enter your unique details.
ICT Essential Skills. (electronic mail) Snail Mail.
user guide Having a strong password allows other users to struggle to guess. To make a strong password you should use up to 12 letters and 1 or 2.
Anya Brookman. How to create a new message Unwanted messages Folders Messages you have sent to someone Logging out when you have finished sending.
. Open a Click on your inbox and click on a you want to open then it will open.
How to use safely and efficiently
Unit 9 Communication Services
Information guide.
. Open a Click on your inbox and click on a you want to open then it will open.
etiquette Etiquette s always go to any of the following: Staff
Electronic Communication Is the process of sending and receiving messages. Text Message File Transfer Sending messages from one computer.
Santa’s s By Becky.
Computer Technology Michael Viphongsay 4B. Electronic mail Internet or Intranet.
This is a presentation, It will show all I have leaned about .
 Subject: The topic you are talking about. So they understand what it is a about and explain to the point.  clients usually display it in a.
 Subject: The topic you are talking about. So they understand what it is a about and explain to the point.  clients usually display it in a.
Evidence Including tools and etiquette.
Making enquieries Letter of enquiry (inquiry). Making inquiries = asking for information.
Preparing s Using Etiquette Lesson A4-3.
Company Guidelines and Basic Rules for …. No text words or slang, all s sent have to be polite and formal Use suitable, relevant subject lines.
Preparing s Using Etiquette. Learning Objectives Define . List the parts of an and an header. List rules for etiquette.
How to Read Outlook . Make sure the computer is on.
Electronic Communication Presentation. Attachments Files you attach and send with an message.
BASIC ETIQUETTE Use the BCC and CC appropriately. 3.
Lesson 2 . Objectives Describe Understand how to send, reply, and forward Define and send attachments.
user guide Having a strong password allows other users to struggle to guess. To make a strong password you should use up to 12 letters and 1 or 2.
Basics. Stands for “electronic mail” Digital message sent over the internet Primarily text but can include pictures, sound and attachments.
tool kit. USER GUIDE Etiquette (Acceptable use policy) – a list of rules that we observe Use a suitable subject in the - this helps.
Santa’s s By Alexander Britton. Sending an .
and the business environment Explain what is and how is it used in a business environment A02 .
RYAN HICKLING. WHAT IS AN An messages distributed by electronic means from one computer user to one or more recipients via a network.
Introduction to Your OUSD and other district technology applications Leah Jensen, Instructional Technologist (510) (office), (510)
Do Now: Describe the steps used to access the comments tool in MS Word. ( review your notes for the answer) Ex: Step 1. Select the text or item you want.
Etiquette Paige Cross. Home Creating a new Fonts, colours, sizes etc Sending an Send using CC Send using BCC Create a signature Include.
√ and Features √Contacts√Related Terms attachmentaddress bookacronym contacts emoticon forward distribution list shouting reply smiley reply.
By Sarah Anderson and Tony Christensen. PARTS OF Header Body Attachments.
Electronic Mail. Gmail Accounts USERNAME Skyward PASSWORD Same password as you use to log in to your computer.
Use the subject field to indicate the purpose of the .
Definitions. Inbox – Incoming s are stored in the Inbox Sent Box – Set your system to save your sent messages.
. Electronic. is a method of exchanging digital messages. What does the E in stand for?
1. Setting up an account- technical
is short for electronic mail!. What is ? An electronic message sent from one computer to another. saves money and time compared to regular.
BASICS. Objectives Choose an provider Fill out an online form Learn about usernames and addresses Learn about Capcha Explore the organization.
When one person sends an electronic message to another person or to a group of people.
Guidelines for polite online interaction; words “Internet” and “etiquette” Don’t type in all capital letters; this is interpreted as SHOUTING Do use correct.
Communication services
Inbox Sent Box Subject New Message New Message Delete Password
is short for electronic mail!
Huntington Beach Public Library
Electronic Mail.
An Overview.
Electronic Mail.
Electronic Mail Opening Activity: 411 of
Lesson 2 .
Basics HURY DEPARTMENT OF COMPUTER SCIENCE M.TEJASWINI.
Electronic Mail.
Electronic Mail.
Professional Communications
.
Setting up a Gmail Account & Safety Kamlesh Singh Bisht IT Specialist.
What are Computers? B Use this tutorial alongside the numbers coded in your workbook and answer the related questions in each section.
Presentation transcript:

Jeopardy By Katrina Cox & Gordon Moses © July 2008

Jeopardy Functions NetiquetteThreatsParts of

Credits  That’s all folks. Exit Carl Lyman © 2007

Functions $100 To “mail” the

Functions $100 What is Send?

Functions $200 s are deposited into your mailbox.

Functions $200 What is Receive?

Functions $300 Respond only to an ’s Sender.

Functions $300 What is Reply?

Functions $400 Respond to everyone an was originally sent to.

Functions $400 What is, Reply All:

Functions $500 Send a Copy of an you Received to Someone else.

Functions $500 What is, to Forward (FWD)?

Netiquette $100 Using all Capital Letters in a Message. DEAR SIR, THANKS FOR THE FILE. SINCERELY, BOB

Netiquette $100 What is YELLING?

Netiquette $200 OR : )

Netiquette $200 What is an Emoticon?

Netiquette $300 A Cutesy Ending in a Business . Subject: Company File Dear Sir, Thanks for the file. Hugs and kisses, Jane

Netiquette $300 What Is An Inappropriate Closing Remark?

Netiquette $400 Subject: RE: job FWD:Tools RE: xmas party Dear Sir, The game was great. Sincerely, Tom

Netiquette $400 What is an Inappropriate Subject Line?

Netiquette $500 An Useless Forwarded To Many People Just Because It Told You To. To: From: Subject: The wishing game Write your wish in the space below and this file to 50 of your friends and your wish will come true!!!!!!!!

Netiquette $500 What is a “Chain ”?

Threats$100 From: To: Subject: Here’s my Login Name & Password I hope this helps! Login: trustingBob Password: iamstupid Bye,

Threats$100 What is Giving Someone Your Network Account Information?

Threats$200 Information you DO NOT give out in chat rooms, Person to Person chats, blogs, unsecure access WIKI’s or any other unsecure site

Threats$200 What is your, SSN, Bank Account #, PIN Numbers, Student Numbers, Credit Card Numbers, Full name, Age, Address?

Threats$300 “I Love You” “Code Red” “NIMDA” “Melissa” “Michael Angelo” “NYC”

Threats$300 What are infamous Viruses?

Threats$400 Sending or Receiving mass junk

Threats$400 What is SPAM?

Threats$500 An from a supposedly valid source that asks for secure personal information

Threats $500 What is phishing?

Parts of $100 To:

Parts of $100 What is the address of the receiver?

Parts of $200 A list of names, addresses, s, and phone numbers

Parts of $200 What is an Address Book?

Parts of $300 CC:

Parts of $300 What is a Carbon Copy sender?

Parts of $400 BCC:

Parts of $400 What is a Blind Carbon Copy or An to multiple people that are hidden

Parts of $500 Paper Clip Icon

Parts of $500 What Is The Symbol For An Attachment?