Download presentation
Presentation is loading. Please wait.
Published byLorena Butler Modified over 8 years ago
1
This Guide is going to be about how to attach files create a signature send to multiple recipients with using ‘Cc’ and ‘Bcc’ change the priority add contacts to address book block a contact. use e-mail safely 25th October, 2012Nisha Malik Zaman1
2
Step 1:How to attach files Step2: How to create a signature 1.Attach files with the attachment button 1. Go to Options 2.Go to Settings 3. Add signature and save it. 25th October, 2012Nisha Malik Zaman2
3
Step4: How to open an attachment 25th October, 2012Nisha Malik Zaman3 1.Right Click on the attachment and Save Target As, but don’t open suspicious emails and attachments as they might contain files that may cause harm to your computer.
4
Step 5: How send to multiple recipients with using ‘Cc’ and ‘Bcc’ 1.You can use ‘Cc ‘(carbon copy) to send to multiple recipients, you can also use the ‘To’ column to send it to multiple recipients. 2.‘Cc’ is used to send to people just for information purposes 3.‘To’ is used to send to people who it is really aimed at. 4.‘Bcc’(blind carbon copy) is used to send to multiple recipients but hiding the people you are sending to 5.To open Bcc ’, open ‘Cc’ and below there, at the bottom is ‘Bcc’ column. 25th October, 2012Nisha Malik Zaman4
5
Step 6: How to change the priority of the email 25th October, 2012Nisha Malik Zaman5 Open a new email and there are two buttons High Priority Low Priority
6
Step 4: How to add contacts to the Address Book. 25th October, 2012Nisha Malik Zaman6 1.Click Add Contact 2. A box will appear in which you have to write email of the person you want to add and click on ‘Invite’.
7
Step 6: How to block and unblock a contact 25th October, 2012Nisha Malik Zaman7 1.Right Click on that person’s Name/email in the Contact List you would like to block 2.Click on the Block icon. 3.You can unblock it as well when you click on that contact again.
8
Step7: How to use email safely 25th October, 2012Nisha Malik Zaman8 One of the most common tools we are using on a daily basis is email. Due to this fact, email is also a major security problem. Outlook has an option to block email attachments that are potentially dangerous. 1.Use an antivirus that also has the ability to scan incoming/outgoing email. AVG and Norton is an example of such product. 2.It is very important to keep your antivirus updated on a daily basis. 3.Do not open email attachments from people that you do not know or seem suspicious.
9
Step8: What is Phishing and Spam? 25th October, 2012Nisha Malik Zaman9 Phishing: Phishing is to get information such as usernames, passwords and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. Phishing emails may contain links to websites that are infected with malware. What is spam? Spam is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Most spam is commercial advertising, often for dubious products, get-rich-quick schemes, or quasi-legal services. Spam costs the sender very little to send -- most of the costs are paid for by the recipient or the carriers rather than by the sender.
10
Step9: What is Scam and Virus? 25th October, 2012Nisha Malik Zaman10 Computer Virus: A computer virus that can be spread from one computer to another. The term "virus" is also commonly used to refer to other types of malware such as spyware. A virus is a program that runs against your wishes. A spyware spies on your computer of what you are doing and information that you have without letting you know but if you have a spyware you might experience that your internet is slower than usual.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.