Computer Concepts- M5-M6 Email Part 1 & 2
If you want to send and receive email messages containing images and formatted text, you need to ensue that your email program is configured to read ________________email messages.
HTML
Password protection- Make as long as possible. At least 6 characters, 2 being numeric. Mix up characters and punctuations. No personal info, not same as account #.
Message header- includes information about an email such as senders name, date sent, and subject.
Creating an email signature
click options gear top right click view all outlook settings click compose and reply click edit signature line, type in first and last name emal address and 3rd line of choice. choose your name twice and Save.
Sexual harrasment/ discrimination
includes one inappropriate joke sent through email.
Securities Law Violations
internet bulletin boards are hotbd of false info about companies with goal of moving stock price up or down. Stock manipulation. Can be held accountable for violation.
Spam
junk email or unsolicited mass electronic mail outs. Use spam protection such as Mailwasher, spam alarm.
networking site that allows users to exchange pictures
networking site that allows users to exchange short quick messages.
TikTok
networking site that allows users to exchange videos
application clients
progams where email accounts must be configured on a local machine before accessing. ex. microsoft outlook
a reply is a response to the person who sent you the email
reply all button top right corner
Create new folder
right click folders create new folder
True or False. Any email that you send is private and it cannot be read by anyone other than the person to whom it is addressed.
False
True or False. E-mails are completely private.
False
True or False. One disadvantage to using a webmail interface is that you can only access your email from your home computer.
False
When you are sending one email to all of your friends in your address book you should use the _____________ field to keep their addresses private.
Bcc:
BCC
Blind Carbon Copy. Private Carbon Copy. Copy sent to that person where only that person can see that it was sent to them.
social networking sites- allow people to interact w family and friends ex. fb
Blogs- online personal journals
When you set up a new email account, you may have to enter a distorted series of letters and numbers, called a_________________________ to ensure that you are a human and not a computer.
Captcha
An email claiming that you have won a lottery might be an example of ________.
Computer Fraud
Email that has NOT been opened is shown in BOLD.
Computer fraud ex. an email claiming you won the lottery.
Copyright Infringement
Copying and distributing someone else's work without their consent.
Toggling to Contacts/ Groups- Click All apps/ Click people
Creating new contact- Click new contact/ Fill out/ Save
To create new group- click drop down next to new contact/Click new group and give a name/ add members.
Editing/Deleting a group- Open/ Edit group on ribbon/ make changes/ save or delete
Which of the following is NOT true about email?
It cannot be accessed by hackers. (This is false)
An email containing a virus hoax is dangerous because ________.
It causes people to search for and delete important files.
FAQ (frequently asked questions) FWIW- for what its worth TTFN- tata for now
Legal considerations- misuse of companys email systems can have serious consequences.
Chat rooms- Electronic meeting places
List servs- electronic mailing lists of people with common interests
Formatting a text
changing things such as color, font, or size of a text.
ASAP- as soon as possible CU- see you NRN- not right now
PLS- please THX- thanks LOL-laugh out loud
An email supposedly from your IT department asking for your password so that it can troubleshoot your account is a form of _______________.
Phishing
When you receive an email and you want to reply back to the sender and all of the addresses that were included in the original message, you should use ____________.
Reply All
Unwanted or junk email is called_______________.
Spam
A conversation that takes place on a discussion board is called a _____________.
Thread
True or False. It is a good idea to obtain an email account that is not tied to your ISP, so that when you change service providers you wont lose your email account.
True
True or False. Once a computer is infected, a virus can use the email program to send out copies of itself.
True
True or False. One way to access email is to read it online through a webmail interface.
True
True or False. With a client-based email account, such as Microsoft Outlook, you are able to view your email only from the computer on which the client program is installed.
True
When you send an email to your professor, a server holds onto that email until the professor requests it. True or False.
True
Inbox is your primary folder. Email CAN be accessed by hackers.
Twitter is service to stay connect w fam/friends easy to do on cell.
Emails are not private and do not provide as secure environment to communicate.
Typing UPPERCASE is considered shouting and not acceptable to email ettique. Always use complete sentences.
All of the following are tips for professional e-mail etiquette, EXCEPT ____________________________.
Use abbreviations such as "u", "r", and "BRB".
Defamation/ Cyber Libel
Using companies name. ex employee participating in chat room.
The type of e-mal that is managed by your browser and enables you to access your email from anywhere you have Internet access is __________ email.
Web-based
Attachments can contain viruses.
You can open an attachment online if you have the associated software installed.
Virus
a computer code sent via email. Opening can activate code containing virus.
a contact stores personal information about a person.
a group is a collection of contacts. (Distribution list)
web based email clients
able to access email from any computer with internet access. ex. yahoo, gmail, ect..
phising
an email scam that lures internet users into revealing personal information. results in identity theft and fraud. Verify email b4 clicking on it.
CC
carbon copy. Email sent to that person to keep for their reference.
virus hoax is dangerous. it causes people to look for important info and delete it.
discussion board convo- thread once computer is infected, a virus can use email program to send out copies of itself to other people.
Move emails to new folder (3 ways)
drag email to desired folder right click email, choose move, to different folder left click email, choose move to on ribbon, to different folder
To read HTML email messages, must configure ur email program to send and recieve emails w images/ formatted texts.
email is not private. it can always be forwarded to someone else.