Presentation is loading. Please wait.

Presentation is loading. Please wait.

√ Email and Features √Contacts√Related Terms attachmentaddress bookacronym email contacts emoticon forward distribution list shouting reply smiley reply.

Similar presentations


Presentation on theme: "√ Email and Features √Contacts√Related Terms attachmentaddress bookacronym email contacts emoticon forward distribution list shouting reply smiley reply."— Presentation transcript:

1

2 √ Email and Features √Contacts√Related Terms attachmentaddress bookacronym email contacts emoticon forward distribution list shouting reply smiley reply to all snail mail signaturespam subject linetelecommunications

3  Your email can be seen by your teachers and school officials.  Deleting the email makes it disappear from your view but the school has a copy of your current mail AND your deleted mail.  Misuse of your email account will be considered a disciplinary matter.  Use only appropriate language.  Do not disclose your password to others.  You are responsible for messages sent using your account and your password.  The same thing is true at work. Misuse of email is grounds for firing.

4  Change your password often or if you think others may know it.  Use a "good" password--one that you can remember but is not guessable by others. ◦ Passwords like shs, bulldogs, your name, and your pet's name, are too easy to guess. ◦ Most systems have a minimum length for passwords. ◦ Use a combination of letters and numbers. ◦ Passwords are usually case sensitive.

5 Email or electronic mail - messages, usually text, sent from one person to another via computer. E-mail is a vital telecommunications tool. Telecommunications - all data transmission using technology to communicate. Snail mail - a term used to refer to letters and other mailings sent through the U.S. Post Office. Signature - the lines that appear automatically at the bottom of every e-mail you send. It usually consists of the person's name, title, and company.

6 A contact is a person in the address book. An address book is a saved contact list of email addresses. A distribution list is a way to group people to whom you send the same message.

7 An emoticon is a "picture" made up of typed characters that express an emotion in e-mails. The term smiley is commonly used. It was first coined by Scott E. Fahlman at Carnegie Mellon University in 1982. These are a few common emoticons: :-) Happy :-( Sad ;-) Joking or sarcasm :-/ Wry humor

8 A subject line in the heading that should be a brief notice of what the email concerns. It should not be left blank. CC means that you are sending a copy to others. (CC is visible to all recipients of your email.) BCC means that you are sending a copy BUT others cannot tell that the copy is being sent. An attachment is a separate file that you include with e-mail -- a Word document, spreadsheet, graphic image, sound files, etc.

9 Shouting in an email is typing IN ALL CAPITAL LETTERS. It is considered rude. Spam is "junk" e-mail. It is an e-mail, often advertising, that is sent to a large number of people without their consent.

10 An acronym is a phrase derived from the first letter of each work and typed in all caps, such as FYI for for your information. E-mail acronyms are shorthand used in many email messages. ASAP--as soon as possible BTW--by the way FYI--for your information IMO--in my opinion JMO--just my opinion LOL--laughing out loud ROFL--rolling on the floor laughing

11 Forward means to send an e-mail message you receive to another e-mail address. Reply to Sender only sends your answer to the person who originally wrote it; not all of the people it has been sent to. Reply to All sends your answer to all of the people in that group or list and everyone who was copied. For example if you get a message that was sent from the secretary of the company to all employees. Reply to All will send your reply back to all employees. Be careful using Reply to All. Send - the last step in creating an e-mail correspondence

12 Follow the rules for e-mail and Internet safety. No one is immune. Realize that people on the Internet may not be who they say they are and may be criminals. Sometimes the 12- year-old girl is actually a sexual predator. Sometimes the legitimate businessman is an identity thief. Never give out personal information unless you are corresponding with a person you know. Delete e-mail from unknown sources. Never open attachment from an unknown source. Never click on links from unknown sources. Do not give out credit card numbers, telephone numbers, or Social Security numbers with companies in a response to an e-mail. It may be a phishing scheme. If you are ordering online, you should have initiated the contact. Be aware that e-mails from "legitimate-looking" companies are often part of a identity theft scams. Do not email photographs of yourself or your family to people you do not know. Only post these on personal web pages if they are password protected. Many sites allow you to make pages and designate friends and family who are allowed to access that page. Never arrange a face-to-face meeting with someone you've "met" online. Stay out of chat rooms. If you go there, do not give out identifying or personal information, including your name, address, school name, telephone number, age, marital status, gender, or financial information. Never respond to messages that are hostile, belligerent, or inappropriate. Show your message to your parent, teacher, or trusted adult to see if there is anything that can be done about it. Report suspicious messages to your parents, teacher, or the proper authorities. (You may be saving yourself or someone else.) Under no circumstances should you respond. They can go to www.cybertipline.com or call 1-800-843-5678, the National Center for Missing & Exploited Children's CyberTip Line. Realize that people on the Internet may not be who they say they are and may be criminals. Sometimes the 16-year-old girl is actually a sexual predator. Sometimes the legitimate businessman is an identity thief. Never give out personal information unless you are corresponding with a person you know. Do not give out credit card numbers, telephone numbers, or Social Security numbers with companies in a response to an e-mail. Be aware that e-mails from "legitimate-looking" companies are often part of a identity theft scams. It may be a phishing scheme. If you are ordering online, you should have initiated the contact.

13 Often email from unknown sources contain attachments or link to sites that attempt to harm your computer with malware—viruses, Trojan horses, worms, etc.  Delete email from unknown sources.  Never open attachment from an unknown source.  Never click on links from unknown sources.

14  Do not email photographs of yourself or your family to people you do not know.  Only post these on personal web pages if they are password protected.  Many sites allow you to make pages and designate friends and family who are allowed to access that page.

15  Never arrange a face-to-face meeting with someone you've "met" online.  Stay out of chat rooms. ◦ If you go there, do not give out identifying or personal information, including your name, address, school name, telephone number, age, marital status, gender, or financial information.

16 Report suspicious messages to your parents, teacher, or the proper authorities. (You may be saving yourself or someone else.) Under no circumstances should you respond. They can go to www.cybertipline.com or call 1-800-843-5678, the National Center for Missing & Exploited Children's CyberTip Line.www.cybertipline.com Never respond to messages that are hostile, belligerent, or inappropriate. Show your message to your parent, teacher, or trusted adult to see if there is anything that can be done about it.


Download ppt "√ Email and Features √Contacts√Related Terms attachmentaddress bookacronym email contacts emoticon forward distribution list shouting reply smiley reply."

Similar presentations


Ads by Google