Gen AI in Business - Global Trends Report 2024.pdf
7 module web based email
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
Notas do Editor
Instructor- Inform students that posyal mail is often referred to as “snail” mail to distinguish it from email.
70% of all Email is spam It could be offers for anything. INSTRUCTOR: If you have a personal story about spam, please share it here. Let participants know that we will be discussing Spam and scams in more depth later in the module.
Instructor - Talk about the importance of not sharing your password with others.
Instructor: let the students know that email addresses are not case sensitive, while passwords are.
Instructor: Make sure each student is able to get to gmail and find this button. If any student comes to a gmail account where a previous user is still logged in, show them how to log out. Talk about the importance of logging out of a public computer.
Instructor: Walk students through these steps. The handout is located at http://www.indianprairie.lib.il.us/images/stories/Computers/email/Your%20Account.pdf
Instructor: Walk through the handout ( http://www.indianprairie.lib.il.us/images/stories/Computers/email/Email Terms.pdf) and go over each term.
Instructor - let students walk through the steps
Instructor - let students walk through the steps
Instructor - let students walk through the steps
Instructor - Discuss the permanence of an email. It’s more difficult to “take back” things you regret saying when they are recorded via email.
Instructor: Walk through each method finding the spam folder and reporting spam.
“ .EXE” files are executable files that will run a program on your computer. Don’t ever give any personal info - SSN, Credit Card, bank accounts, phone number or address - as the result of an e-mail. Many thieves posing as your bank use this tactic. It is called phishing. Hoaxes – snopes.com
Descriptive subjects will make the recipient feel safer opening your E-mail. If you think something might be a virus do NOT open it – Create a new email and tell the people who sent it you thought it might be a virus aand ask them to reply to your email if it wasn’t and they still want you to get the information they originally sent you.