Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 NCDesk E-mail 1 10-12% of the test will be Telecommunication/Internet Questions.

Similar presentations


Presentation on theme: "1 NCDesk E-mail 1 10-12% of the test will be Telecommunication/Internet Questions."— Presentation transcript:

1 1 NCDesk E-mail 1 10-12% of the test will be Telecommunication/Internet Questions.

2 2 If you don’t remember how something works when you are taking the test, click on the button that is in the NCDesk program. It is there for that reason.

3 3 Electronic Mail, usually called email, is a fast and efficient way to send messages, documents, pictures, and other files from your computer to just about anywhere in the world. If you are working on a class project with another student and you both have email accounts, you can send each other your work by attaching it to an email. Or if you need someone to edit your work, you can email it to them so they can make editing notations, and when they are finished, they can email it back to you.

4 4 While all email programs are slightly different, most have a few things in common. This image is what a typical email “send” or “message” window looks like:

5 5 You have three buttons. The first is the send button. If you click that it will send your email. The second button looks like a paperclip, it is the attach button. Use that to attach a file to your email. The third is the “un- attach” button. Click that to remove an attachment if you accidentally attached the wrong file. When your file is properly attached it will show up in the Attachments box.

6 6 When you are working with email. There are four things you need to be sure are correct: To line From line Subject Message To line

7 7 From and To require a correct address Addresses have two parts: the user name of the person the email is going to and the domain that is hosting their email account. The @ symbol is called the “at” symbol and it separates the user name from the domain name. An example might be: student_one@school.edu user namedomain Check to make sure your address is on the From line Check to make sure the address of the person you are sending to is typed on the To line

8 8 Subject Subject Clearly summarize the contents of your message in the subject line. Properly titled messages help people organize and prioritize their email. Add a Subject to the Subject line, so the person knows what your email is about and won’t think it is junk mail, (which is called SPAM and delete it without reading it.) SPAM

9 9 Message E-mail is not as private as a letter. It's more like a post card. Messages can be intercepted and read by people who really shouldn't be looking at it. Avoid including any confidential information unless you have a way to encrypt it.encrypt Do not use all caps Keep message brief Proofread and run spell checker

10 10 Encryption The translation of data into a secret code. Encryption is the most effective way to achieve data security. To read an encrypted file you must have access to a key or password that enables you to decrypt it. Encrypted data is referred to a cipher text.

11 11 SPAM is electronic junk mail, often advertisements and commercials sent to a large number of unrelated and uninterested persons. Most persons consider it highly annoying. SPAM @ back to e-mail

12 12 someone their If you need someone to have a copy of the email you are sending to someone else you would put their email address on the CC line. CC address There is also the CC address. CC stands for Carbon Copy (Courtesy Copy or Complimentary Copy, depending upon your reference source).

13 13 Attachments Files sent by email to accompany the message. There are a variety of file types that can be sent. Select the file to send. 2

14 14 Do you know the extensions for these files? What type of files do they represent? These are the files in NCDesk to insert into email as attachments. This might be a good time to review File Extensions.

15 15 File Extensions Three letter (sometimes 2 letter) identifiers automatically added to the end of filenames to identify the program or application. budget.ss or budget.xls book report.wp or book report.doc

16 16 Common 3-Letter File Extension.txt.wp.doc.pdf.gif.bmp.jpeg.avi.mov.wmgr.mail.ncsh.ncdt.nced Word processing documents Spreadsheet documentsPresentation/ Multimedia Programs Multimedia movies/video Multimedia (sound) Internet Database documents NCDesk.ss.xls Archive documents.zip.db.mdb.html.htmls.wav.midi.mp3.ppt.exe.pub Desktop Publishing Graphic, clipart, pictures

17 17 How many can you associated with a program or a document?.txt.wp.doc.pdf.ss.xls.zip.gif.bmp.jpeg.db.mdb.html.htmls.avi.mov.wav.midi.mp3.exe.ppt.wmgr.mail.ncsh.ncdt.nced.pub

18 18 File Extension Differ Depending Upon the Program Word processing documents Spreadsheet documents Presentation/Multimedia Programs Multimedia movies/video Multimedia (sound) Internet Database documents NCDesk Archive documents Desktop Publishing Graphic, clipart, pictures Many computer users prefer to identify the files by their icons Take a look.

19 19 Common Icons Some file types use the same picture.

20 20 Remove Attachment Select the attachment to remove, then click the Remove Attachment button. 20

21 21 Remember Read the test questions carefully. Some directions say send, others just talking about sending. DO NOT If you are told to Send the email, this message will appear on the screen. DO NOT close the window. Click the NEXT button.

22 22 If you are going to send out emails to a mailing list or even just a few people, you may want to hide the email addresses from everyone on the list. Usually when someone sends an email to say, four people, they will just list them in the "to:" or "cc:" field. The problem with this practice is simple: everyone who receives the email also receives all of the email addresses. This is wonderful for spammers, but most of us would rather our email addresses were at least somewhat protected. BCC address *NCDesk does not show BCC Address See example

23 23 You can protect your friends email addresses by using the Blind Carbon Copy field. This works just like the Carbon Copy (cc:) field, except that the email addresses are not forwarded to each recipient.

24 24 2.http://www.microsoft.com/athome/security/e mail/attachments.mspx 1.http://www.learnthenet.com/english/section/ email.html Graphic Sources


Download ppt "1 NCDesk E-mail 1 10-12% of the test will be Telecommunication/Internet Questions."

Similar presentations


Ads by Google