Presentation is loading. Please wait.

Presentation is loading. Please wait.

Unit 10 Communication, Collaboration, and Safety.

Similar presentations


Presentation on theme: "Unit 10 Communication, Collaboration, and Safety."— Presentation transcript:

1 Unit 10 Communication, Collaboration, and Safety

2  Define time-shifted & real-time communication methods  Describe the features & proper use of blogging, text messaging, and chatting  Describe the features & proper use of social media sites  Identify advantages & disadvantages of electronic communication  Identify guidelines for creating effective personal and professional electronic communication

3  Delay between transmission & receipt of info  Blog, Email, Discussion Board  What’s the purpose of a blog?  Follow netiquette ◦ Good manners & behavior over Internet

4  Need real-time? ◦ Use IM, chat room, webcam  Need a paper trail? ◦ Use Email, text ◦ Most widely used  Distance Learning? ◦ Video Conference  Other ◦ Blog, message board, social media

5  Instant or no delay  Texting/IM ◦ Conversational ◦ SMS (short messaging service)  Up to 160 characters ◦ MMS (multimedia messaging service)  Added multimedia (pictures/video/etc.)  No limit on characters but could be split up ◦ iMessage  Chatting  VoIP  Podcast  Web/video conference/video chat

6  Keep in touch with friends, find people with similar interests, build relationships online  Facebook, Twitter, Instagram, YouTube, Google+, LinkedIn

7  Netiquette & rules for communication  Each group will list rules for their given communication method

8  Connect to people worldwide  Speed  Low cost/free  Access from various devices, cell, or computer  Transmit text, graphics, video, audio  Forwarding of messages can be done  Collaborate & share documents  You can keep track of sites visited ◦ Stored on your computer  One to one popular: Email

9  Attachments ◦ Size may be too big/too many ◦ Virus ◦ Blocked by program  Delivery Failure ◦ Bounced  Mistyped address  Virus detected/spam filter  You’ve been blocked by receiver  Their mailbox is full

10  Written record or history ◦ Can be used in legal cases ◦ You may need proof ◦ Email can provide that  Phone/audio conferences can’t

11  Say something you wish you could take back  You get an email that makes you angry ◦ Discuss with someone/calm down ◦ Write email & leave out To: address until sure ◦ Save as draft & wait a day  Reply, Reply All  Proper spelling & grammar

12  Include a subject ◦ Brief yet descriptive enough  Try to keep to 1 subject  Keep message short  Avoid ALL CAPS!  Limit jokes, symbols :-o  Proofread before sending  Double check the addresses ◦ DON’T EMBARRASS YOURSELF!  Email sent through company is NOT private

13  Face to face or letter may be better than electronic  Content, tone, format must be appropriate for the audience  Respond to message promptly  Statements can harm people ◦ Flaming ◦ Cyberbullying ◦ Slander ◦ Libel

14

15  Spam ◦ Unsolicited ads ◦ Don’t reply to junk emails  Typically, an e-mail message is sent to multiple recipients who did not ask to receive it.  E-mail messages are not considered spam if a user has signed up to receive them.

16  Estimated 80% of email is spam  1978 - An e-mail spam is sent to 600 addresses  1994 - First large-scale spam sent to 6000 newsgroups, reaching millions of people.  2005 - 30 billion per day  2006 - 55 billion per day  2010- Spam is 92% of email sent

17  Be careful giving out your email ◦ Do not publish it online  Check privacy statements ◦ They may share your email address  DO NOT reply to junk mails ◦ They’ll know they have a valid email address ◦ You’ll get more junk!  Use the junk email filter

18  Steals your personal info ◦ Spoofed sites & emails  Emails that appear to come from original source  Asks you to change password  Link takes you to copied site  User collects your info

19  How does it arrive?  Spam: Sneaks in the back door  Phishing: Walks in the front door  How does it make its offer?  Spam: Looks bad, seems far-fetched  Phishing: Looks plausible, seems credible  What is it trying to do?  Spam: Tries to sell you something  Phishing: Tries to steal something from you

20  What’s worse, spam or phishing?  Let’s Play ◦ Phishing Scams- Avoid the Bait Phishing Scams- Avoid the Bait ◦ Spam Scam Slam Spam Scam Slam ◦ Follywood Squares Follywood Squares ◦ Phishing IQ Test Phishing IQ Test

21  Program written to cause disruption ◦ Attached to a file or email ◦ Spreads  Worm- copies itself across network & slows it down  Time Bomb- damage at certain time/date  Trojan Horse- looks like something good, but isn’t  Protect with Antivirus software ◦ Update regularly ◦ Be careful opening emails ◦ Scan attachments first

22  Virus program scan all emails (in & out)  Virus program subscription ◦ Schedule scan  Review emails & IMs before sending ◦ ISP can filter emails as well  Understand netiquette & company rules  Encrypt emails with private info  Save & backup your emails ◦ Remember the “paper trail”  Follow laws

23  T or F. Email paper trails cannot be used as legal documents.  Junk email is also called _______.  ______ refers o good manners when communicating electronically.  ______ tries to get/steal your private info.  ______ is just annoying!

24 Unit 10 Communication, Collaboration, and Safety


Download ppt "Unit 10 Communication, Collaboration, and Safety."

Similar presentations


Ads by Google