Download presentation
Presentation is loading. Please wait.
Published byNathan Stanley Modified over 9 years ago
1
Unit 10 Communication, Collaboration, and Safety
2
Define time-shifted & real-time communication methods Describe the features & proper use of blogging, text messaging, and chatting Describe the features & proper use of social media sites Identify advantages & disadvantages of electronic communication Identify guidelines for creating effective personal and professional electronic communication
3
Delay between transmission & receipt of info Blog, Email, Discussion Board What’s the purpose of a blog? Follow netiquette ◦ Good manners & behavior over Internet
4
Need real-time? ◦ Use IM, chat room, webcam Need a paper trail? ◦ Use Email, text ◦ Most widely used Distance Learning? ◦ Video Conference Other ◦ Blog, message board, social media
5
Instant or no delay Texting/IM ◦ Conversational ◦ SMS (short messaging service) Up to 160 characters ◦ MMS (multimedia messaging service) Added multimedia (pictures/video/etc.) No limit on characters but could be split up ◦ iMessage Chatting VoIP Podcast Web/video conference/video chat
6
Keep in touch with friends, find people with similar interests, build relationships online Facebook, Twitter, Instagram, YouTube, Google+, LinkedIn
7
Netiquette & rules for communication Each group will list rules for their given communication method
8
Connect to people worldwide Speed Low cost/free Access from various devices, cell, or computer Transmit text, graphics, video, audio Forwarding of messages can be done Collaborate & share documents You can keep track of sites visited ◦ Stored on your computer One to one popular: Email
9
Attachments ◦ Size may be too big/too many ◦ Virus ◦ Blocked by program Delivery Failure ◦ Bounced Mistyped address Virus detected/spam filter You’ve been blocked by receiver Their mailbox is full
10
Written record or history ◦ Can be used in legal cases ◦ You may need proof ◦ Email can provide that Phone/audio conferences can’t
11
Say something you wish you could take back You get an email that makes you angry ◦ Discuss with someone/calm down ◦ Write email & leave out To: address until sure ◦ Save as draft & wait a day Reply, Reply All Proper spelling & grammar
12
Include a subject ◦ Brief yet descriptive enough Try to keep to 1 subject Keep message short Avoid ALL CAPS! Limit jokes, symbols :-o Proofread before sending Double check the addresses ◦ DON’T EMBARRASS YOURSELF! Email sent through company is NOT private
13
Face to face or letter may be better than electronic Content, tone, format must be appropriate for the audience Respond to message promptly Statements can harm people ◦ Flaming ◦ Cyberbullying ◦ Slander ◦ Libel
15
Spam ◦ Unsolicited ads ◦ Don’t reply to junk emails Typically, an e-mail message is sent to multiple recipients who did not ask to receive it. E-mail messages are not considered spam if a user has signed up to receive them.
16
Estimated 80% of email is spam 1978 - An e-mail spam is sent to 600 addresses 1994 - First large-scale spam sent to 6000 newsgroups, reaching millions of people. 2005 - 30 billion per day 2006 - 55 billion per day 2010- Spam is 92% of email sent
17
Be careful giving out your email ◦ Do not publish it online Check privacy statements ◦ They may share your email address DO NOT reply to junk mails ◦ They’ll know they have a valid email address ◦ You’ll get more junk! Use the junk email filter
18
Steals your personal info ◦ Spoofed sites & emails Emails that appear to come from original source Asks you to change password Link takes you to copied site User collects your info
19
How does it arrive? Spam: Sneaks in the back door Phishing: Walks in the front door How does it make its offer? Spam: Looks bad, seems far-fetched Phishing: Looks plausible, seems credible What is it trying to do? Spam: Tries to sell you something Phishing: Tries to steal something from you
20
What’s worse, spam or phishing? Let’s Play ◦ Phishing Scams- Avoid the Bait Phishing Scams- Avoid the Bait ◦ Spam Scam Slam Spam Scam Slam ◦ Follywood Squares Follywood Squares ◦ Phishing IQ Test Phishing IQ Test
21
Program written to cause disruption ◦ Attached to a file or email ◦ Spreads Worm- copies itself across network & slows it down Time Bomb- damage at certain time/date Trojan Horse- looks like something good, but isn’t Protect with Antivirus software ◦ Update regularly ◦ Be careful opening emails ◦ Scan attachments first
22
Virus program scan all emails (in & out) Virus program subscription ◦ Schedule scan Review emails & IMs before sending ◦ ISP can filter emails as well Understand netiquette & company rules Encrypt emails with private info Save & backup your emails ◦ Remember the “paper trail” Follow laws
23
T or F. Email paper trails cannot be used as legal documents. Junk email is also called _______. ______ refers o good manners when communicating electronically. ______ tries to get/steal your private info. ______ is just annoying!
24
Unit 10 Communication, Collaboration, and Safety
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.