SlideShare uma empresa Scribd logo
1 de 24
Web Based Email ,[object Object],7-22-10
What’s email? ,[object Object],[object Object],[object Object]
Email versus regular  (or “snail”) mail: Email Snail Mail ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Advantages of email: ,[object Object],[object Object],[object Object],[object Object]
Disadvantages of email ,[object Object],[object Object]
Spam ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What do I need to have  an email account? ,[object Object],[object Object]
How can I open an email account? ,[object Object],[object Object]
What do I get with  an email account?  ,[object Object],[object Object],[object Object],[object Object]
Tips for creating a  username and password ,[object Object],[object Object],[object Object],[object Object]
What will my email address be? ,[object Object],[object Object],[object Object]
Let’s sign up! ,[object Object],[object Object]
Let’s sign up! ,[object Object],[object Object],[object Object]
You’ve arrived at your in-box! ,[object Object],[object Object]
Now let’s write an email. ,[object Object],[object Object]
Reading and replying ,[object Object],[object Object],[object Object],[object Object]
Cleaning out your inbox ,[object Object],[object Object],[object Object],[object Object]
To archive a message: ,[object Object],[object Object]
Email etiquette ,[object Object],[object Object],[object Object]
Avoiding Spam ,[object Object],[object Object],[object Object],[object Object]
E-Mail Safety Tips ,[object Object],[object Object],[object Object],[object Object]
E-Mail Safety Tips ,[object Object],[object Object],[object Object]
Sources ,[object Object],[object Object],[object Object],14
Creative Commons License ,[object Object]

Mais conteúdo relacionado

Mais procurados

Session 2: Opening an email account
Session 2: Opening an email accountSession 2: Opening an email account
Session 2: Opening an email accountEmma Meow
 
Use Email Marketing wisely; Stand out from Junk Mail
Use Email Marketing wisely; Stand out from Junk MailUse Email Marketing wisely; Stand out from Junk Mail
Use Email Marketing wisely; Stand out from Junk Mailbelieve52
 
Use Email Marketing wisely; Stand out from Junk Mail
Use Email Marketing wisely; Stand out from Junk MailUse Email Marketing wisely; Stand out from Junk Mail
Use Email Marketing wisely; Stand out from Junk Mailbelieve52
 
Module 03 communication on internet
Module 03 communication on internetModule 03 communication on internet
Module 03 communication on internetthinkict
 
Top Ten Reasons to use Gmail
Top Ten Reasons to use GmailTop Ten Reasons to use Gmail
Top Ten Reasons to use GmailJoel May
 
Getting to the Gmail Inbox: Gmail Deliverability
Getting to the Gmail Inbox: Gmail DeliverabilityGetting to the Gmail Inbox: Gmail Deliverability
Getting to the Gmail Inbox: Gmail DeliverabilityEmail Delivered
 
Email etiquette[1]
Email etiquette[1]Email etiquette[1]
Email etiquette[1]101jennyj
 
E mail etiquette
E mail etiquette E mail etiquette
E mail etiquette Nanda Palit
 
Green Hectares Rural Tech Factsheet – Gmail
Green Hectares Rural Tech Factsheet – GmailGreen Hectares Rural Tech Factsheet – Gmail
Green Hectares Rural Tech Factsheet – GmailGreen Hectares
 
How to add your hotmail account to ipad
How to add your hotmail account to ipadHow to add your hotmail account to ipad
How to add your hotmail account to ipadstaefenia sun
 
The 4 dos and 8 donts of getting your emails delivered
The 4 dos and 8 donts of getting your emails deliveredThe 4 dos and 8 donts of getting your emails delivered
The 4 dos and 8 donts of getting your emails deliveredAlesha Drew
 
How to unlock gmail account
How to unlock gmail accountHow to unlock gmail account
How to unlock gmail accountitinfomration
 
Discover This Copy & Paste Trick That Will Instantly Increase Conversion
Discover This Copy & Paste Trick That Will Instantly Increase ConversionDiscover This Copy & Paste Trick That Will Instantly Increase Conversion
Discover This Copy & Paste Trick That Will Instantly Increase ConversionMatthew Woodward
 

Mais procurados (19)

Session 2: Opening an email account
Session 2: Opening an email accountSession 2: Opening an email account
Session 2: Opening an email account
 
E-Mail Basics
E-Mail BasicsE-Mail Basics
E-Mail Basics
 
Email Essentials
Email EssentialsEmail Essentials
Email Essentials
 
Email Basics
Email BasicsEmail Basics
Email Basics
 
Use Email Marketing wisely; Stand out from Junk Mail
Use Email Marketing wisely; Stand out from Junk MailUse Email Marketing wisely; Stand out from Junk Mail
Use Email Marketing wisely; Stand out from Junk Mail
 
Use Email Marketing wisely; Stand out from Junk Mail
Use Email Marketing wisely; Stand out from Junk MailUse Email Marketing wisely; Stand out from Junk Mail
Use Email Marketing wisely; Stand out from Junk Mail
 
Module 03 communication on internet
Module 03 communication on internetModule 03 communication on internet
Module 03 communication on internet
 
Top Ten Reasons to use Gmail
Top Ten Reasons to use GmailTop Ten Reasons to use Gmail
Top Ten Reasons to use Gmail
 
Getting to the Gmail Inbox: Gmail Deliverability
Getting to the Gmail Inbox: Gmail DeliverabilityGetting to the Gmail Inbox: Gmail Deliverability
Getting to the Gmail Inbox: Gmail Deliverability
 
Email etiquette[1]
Email etiquette[1]Email etiquette[1]
Email etiquette[1]
 
E mail etiquette
E mail etiquetteE mail etiquette
E mail etiquette
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email Etiquette
 
Email Ethics
Email Ethics Email Ethics
Email Ethics
 
E mail etiquette
E mail etiquette E mail etiquette
E mail etiquette
 
Green Hectares Rural Tech Factsheet – Gmail
Green Hectares Rural Tech Factsheet – GmailGreen Hectares Rural Tech Factsheet – Gmail
Green Hectares Rural Tech Factsheet – Gmail
 
How to add your hotmail account to ipad
How to add your hotmail account to ipadHow to add your hotmail account to ipad
How to add your hotmail account to ipad
 
The 4 dos and 8 donts of getting your emails delivered
The 4 dos and 8 donts of getting your emails deliveredThe 4 dos and 8 donts of getting your emails delivered
The 4 dos and 8 donts of getting your emails delivered
 
How to unlock gmail account
How to unlock gmail accountHow to unlock gmail account
How to unlock gmail account
 
Discover This Copy & Paste Trick That Will Instantly Increase Conversion
Discover This Copy & Paste Trick That Will Instantly Increase ConversionDiscover This Copy & Paste Trick That Will Instantly Increase Conversion
Discover This Copy & Paste Trick That Will Instantly Increase Conversion
 

Destaque

KP Compass Demo Instructions
KP Compass Demo InstructionsKP Compass Demo Instructions
KP Compass Demo InstructionsNai Wang
 
KP Compass Teacher Training Slides
KP Compass Teacher Training SlidesKP Compass Teacher Training Slides
KP Compass Teacher Training SlidesNai Wang
 

Destaque (6)

KP Compass Demo Instructions
KP Compass Demo InstructionsKP Compass Demo Instructions
KP Compass Demo Instructions
 
5 module data storage
5 module data storage5 module data storage
5 module data storage
 
4 module windows operating system
4 module windows operating system4 module windows operating system
4 module windows operating system
 
3 module basic hardware
3 module basic hardware3 module basic hardware
3 module basic hardware
 
KP Compass Teacher Training Slides
KP Compass Teacher Training SlidesKP Compass Teacher Training Slides
KP Compass Teacher Training Slides
 
JoinMe by AnotherGroup
JoinMe by AnotherGroupJoinMe by AnotherGroup
JoinMe by AnotherGroup
 

Semelhante a 7 module web based email

email basics for yahoo
email basics for yahooemail basics for yahoo
email basics for yahooLisa Lindsay
 
Online Safety Data Privacy and Email Basics Digital Literacy Fundamentals.pptx
Online Safety Data Privacy and Email Basics Digital Literacy Fundamentals.pptxOnline Safety Data Privacy and Email Basics Digital Literacy Fundamentals.pptx
Online Safety Data Privacy and Email Basics Digital Literacy Fundamentals.pptxExcellence Foundation for South Sudan
 
Benefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer CentreBenefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer Centrejatin batra
 
Understanding And Mastering Email Basics: A Guide for Every Email User.
Understanding And Mastering Email Basics: A Guide for Every Email User. Understanding And Mastering Email Basics: A Guide for Every Email User.
Understanding And Mastering Email Basics: A Guide for Every Email User. Empowerhosting
 
NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28
NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28
NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28Dave Archer
 
A Quick Email Etiquette Education
A Quick Email Etiquette EducationA Quick Email Etiquette Education
A Quick Email Etiquette EducationChelse Benham
 
Email etiquette
Email etiquetteEmail etiquette
Email etiquetteWebmaster
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email Etiquettemoodledevs
 
My E-mail appears as spam | The 7 major reasons | Part 5#17
My E-mail appears as spam | The 7 major reasons | Part 5#17My E-mail appears as spam | The 7 major reasons | Part 5#17
My E-mail appears as spam | The 7 major reasons | Part 5#17Eyal Doron
 
KNOWLEDGE MANAGEMENT
KNOWLEDGE MANAGEMENTKNOWLEDGE MANAGEMENT
KNOWLEDGE MANAGEMENTkaranjae
 
Final paper
Final paperFinal paper
Final paperJDonpfd3
 

Semelhante a 7 module web based email (20)

email basics for yahoo
email basics for yahooemail basics for yahoo
email basics for yahoo
 
Online Safety Data Privacy and Email Basics Digital Literacy Fundamentals.pptx
Online Safety Data Privacy and Email Basics Digital Literacy Fundamentals.pptxOnline Safety Data Privacy and Email Basics Digital Literacy Fundamentals.pptx
Online Safety Data Privacy and Email Basics Digital Literacy Fundamentals.pptx
 
Email Curriculum
Email CurriculumEmail Curriculum
Email Curriculum
 
Benefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer CentreBenefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer Centre
 
Good e mail practices
Good e mail practicesGood e mail practices
Good e mail practices
 
Introduction to Gmail - Instructions
Introduction to Gmail - InstructionsIntroduction to Gmail - Instructions
Introduction to Gmail - Instructions
 
Understanding And Mastering Email Basics: A Guide for Every Email User.
Understanding And Mastering Email Basics: A Guide for Every Email User. Understanding And Mastering Email Basics: A Guide for Every Email User.
Understanding And Mastering Email Basics: A Guide for Every Email User.
 
NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28
NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28
NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28
 
Email Lesson
Email LessonEmail Lesson
Email Lesson
 
Filing Client Email
Filing Client EmailFiling Client Email
Filing Client Email
 
A Quick Email Etiquette Education
A Quick Email Etiquette EducationA Quick Email Etiquette Education
A Quick Email Etiquette Education
 
Gmail introduction
Gmail introductionGmail introduction
Gmail introduction
 
Email etiquette
Email etiquetteEmail etiquette
Email etiquette
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email Etiquette
 
My E-mail appears as spam | The 7 major reasons | Part 5#17
My E-mail appears as spam | The 7 major reasons | Part 5#17My E-mail appears as spam | The 7 major reasons | Part 5#17
My E-mail appears as spam | The 7 major reasons | Part 5#17
 
E Mail Ethics and Etiquettes
E Mail Ethics and EtiquettesE Mail Ethics and Etiquettes
E Mail Ethics and Etiquettes
 
Basic Email
Basic EmailBasic Email
Basic Email
 
KNOWLEDGE MANAGEMENT
KNOWLEDGE MANAGEMENTKNOWLEDGE MANAGEMENT
KNOWLEDGE MANAGEMENT
 
E‑mail
E‑mailE‑mail
E‑mail
 
Final paper
Final paperFinal paper
Final paper
 

Mais de ConnectYourCommunity (15)

2012 cyc participant survey
2012 cyc participant survey2012 cyc participant survey
2012 cyc participant survey
 
7 module web based email
7 module web based email7 module web based email
7 module web based email
 
4 module windows operating system
4 module windows operating system4 module windows operating system
4 module windows operating system
 
1 - Mouse Basics
1 - Mouse Basics1 - Mouse Basics
1 - Mouse Basics
 
3 module basic hardware
3 module basic hardware3 module basic hardware
3 module basic hardware
 
E4 ms word a1
E4 ms word   a1E4 ms word   a1
E4 ms word a1
 
E2 module google docs and calendar
E2   module google docs and calendarE2   module google docs and calendar
E2 module google docs and calendar
 
Cyc fundamentals training courses
Cyc fundamentals training coursesCyc fundamentals training courses
Cyc fundamentals training courses
 
Curriculum computer fundamentals
Curriculum computer fundamentalsCurriculum computer fundamentals
Curriculum computer fundamentals
 
E3 microsoft office
E3 microsoft officeE3 microsoft office
E3 microsoft office
 
E1 cyc elective advanced e mail
E1 cyc elective advanced e mailE1 cyc elective advanced e mail
E1 cyc elective advanced e mail
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
 
8 module search techniques
8 module search techniques8 module search techniques
8 module search techniques
 
4 module windows operating system
4 module windows operating system4 module windows operating system
4 module windows operating system
 
5 module data storage 1
5 module data storage 15 module data storage 1
5 module data storage 1
 

Último

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Último (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

7 module web based email

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.

Notas do Editor

  1. Instructor- Inform students that posyal mail is often referred to as “snail” mail to distinguish it from email.
  2. 70% of all Email is spam It could be offers for anything. INSTRUCTOR: If you have a personal story about spam, please share it here. Let participants know that we will be discussing Spam and scams in more depth later in the module.
  3. Instructor - Talk about the importance of not sharing your password with others.
  4. Instructor: let the students know that email addresses are not case sensitive, while passwords are.
  5. Instructor: Make sure each student is able to get to gmail and find this button. If any student comes to a gmail account where a previous user is still logged in, show them how to log out. Talk about the importance of logging out of a public computer.
  6. Instructor: Walk students through these steps. The handout is located at http://www.indianprairie.lib.il.us/images/stories/Computers/email/Your%20Account.pdf
  7. Instructor: Walk through the handout ( http://www.indianprairie.lib.il.us/images/stories/Computers/email/Email Terms.pdf) and go over each term.
  8. Instructor - let students walk through the steps
  9. Instructor - let students walk through the steps
  10. Instructor - let students walk through the steps
  11. Instructor - Discuss the permanence of an email. It’s more difficult to “take back” things you regret saying when they are recorded via email.
  12. Instructor: Walk through each method finding the spam folder and reporting spam.
  13. “ .EXE” files are executable files that will run a program on your computer. Don’t ever give any personal info - SSN, Credit Card, bank accounts, phone number or address - as the result of an e-mail. Many thieves posing as your bank use this tactic. It is called phishing. Hoaxes – snopes.com
  14. Descriptive subjects will make the recipient feel safer opening your E-mail. If you think something might be a virus do NOT open it – Create a new email and tell the people who sent it you thought it might be a virus aand ask them to reply to your email if it wasn’t and they still want you to get the information they originally sent you.