SlideShare a Scribd company logo
1 of 14
Lesson 8: Sending and Receiving Attachments




Return to the student web page
Assuring Internet Security
   Malware
     Software   installed without your consent, such as:
        Viruses

        Worms

        Spyware

        Adware




2
Assuring Internet Security
   Internet security (antimalware software)
     Detects  and erases potentially harmful programs and
      intrusions
     Examples:

         Norton   Internet Security
         Avast   Internet Security
         Macafee    Antivirus
              If your computer is connected to the Internet,
              you need antivirus software. Period.




3
Assuring Internet Security




    An Internet security program provides protection from
    a variety of threats




4
Assuring Internet Security




    Windows monitors the status of your computer’s protection


5
Assuring Internet Security
   Windows Update
     Can automatically download the latest updates for
      Windows and Microsoft programs
     Tells   you when updates are available to install




      Windows Update tracks new updates and
      helps you install them


6
Downloading Files from the Web
   Downloading
     Copying   a file from a remote computer to your computer




     Beware!   Some files could contain a virus!
   Uploading
     Copying  a file from your computer to a remote computer
      (such as when you send an attachment)



7
Downloading Files from the Web




    Downloading moves attachments from the Webmail server on
    the Internet down to your own computer




8
Receiving Email Attachments
   Attachment
     One   or more files sent with an email message, such as:
        Text   document
        Photo

        Slide   show of multiple photos




                   A paper clip icon indicates the
                   presence of an attachment



9
Receiving Email Attachments
    Saving attachments
      Attachments  remain embedded in their email message
       until you save them to your computer
      Yahoo!  Mail automatically scans for viruses before it
       lets you download an attachment


                                          Never open a attachment from
                                          someone you don't know




10
Sending Attachments
        Sending a file


          Attach   almost any file to an email message
          Size   limitations (up to 25 GB per message)

               When you forward a message with attachments,
               the attachments are forwarded as well.




11
Sending Attachments
    Sending multiple files
      Attachas many files as you like up to the total
       attachment size limit




                    Yahoo! Mail automatically scans the files you
                    send for viruses (so you don’t need to worry
                    about accidentally spreading a virus yourself)




12
Sending Attachments
    Forwarded attachments
      When      you forward a message, its attachments forward
       with it
      Handy  if you receive a message with photos you want
       to pass on to a family member or friend




13
Lesson 8: Sending and Receiving Attachments




Return to the student web page

More Related Content

What's hot

Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesVikas Chandwani
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentationRakibul islam
 
Tips to remove malwares
Tips to remove malwaresTips to remove malwares
Tips to remove malwaresanthnyq
 
information about virus
information about virusinformation about virus
information about virustoshan badiye
 
Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Satyendra Arora
 
week6
week6week6
week6ym
 
Endpoint Security
Endpoint Security Endpoint Security
Endpoint Security Zack Fabro
 

What's hot (11)

Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Network security
Network security Network security
Network security
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
 
Tips to remove malwares
Tips to remove malwaresTips to remove malwares
Tips to remove malwares
 
information about virus
information about virusinformation about virus
information about virus
 
Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)
 
Chap 2 lab2 (Ej Guevarra)
Chap 2 lab2 (Ej Guevarra)Chap 2 lab2 (Ej Guevarra)
Chap 2 lab2 (Ej Guevarra)
 
week6
week6week6
week6
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Endpoint Security
Endpoint Security Endpoint Security
Endpoint Security
 

Similar to Lesson 8

A dozen dangerous myths about computer viruses
A dozen dangerous myths about computer virusesA dozen dangerous myths about computer viruses
A dozen dangerous myths about computer virusesUltraUploader
 
Protecting Your PC or Laptop
Protecting Your PC or LaptopProtecting Your PC or Laptop
Protecting Your PC or LaptopSOBXTECH
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virussharing notes123
 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antivirusesSarhad Baez
 
Computer viruses
Computer virusesComputer viruses
Computer virusesSimiAttri
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakrabortyJoy Chakraborty
 
14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses14 household ways to protect your computer from viruses
14 household ways to protect your computer from virusesar-rifke.com
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirusBESOR ACADEMY
 

Similar to Lesson 8 (20)

M
MM
M
 
A dozen dangerous myths about computer viruses
A dozen dangerous myths about computer virusesA dozen dangerous myths about computer viruses
A dozen dangerous myths about computer viruses
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
Protecting Your PC or Laptop
Protecting Your PC or LaptopProtecting Your PC or Laptop
Protecting Your PC or Laptop
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virus
 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antiviruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
 
14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
computervirus.ppt
computervirus.pptcomputervirus.ppt
computervirus.ppt
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Viruses novice
Viruses noviceViruses novice
Viruses novice
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
Viruses novice
Viruses noviceViruses novice
Viruses novice
 

More from Ann Bentley

Things you can do on facebook
Things you can do on facebookThings you can do on facebook
Things you can do on facebookAnn Bentley
 
Chapter 18 common drugs
Chapter 18 common drugsChapter 18 common drugs
Chapter 18 common drugsAnn Bentley
 
Chapter 17 other environments
Chapter 17 other environmentsChapter 17 other environments
Chapter 17 other environmentsAnn Bentley
 
Chapter 16 hospital pharmacy
Chapter 16 hospital pharmacyChapter 16 hospital pharmacy
Chapter 16 hospital pharmacyAnn Bentley
 
Chapter 15 community pharmacy
Chapter 15 community pharmacyChapter 15 community pharmacy
Chapter 15 community pharmacyAnn Bentley
 
Chapter 14 financial issues
Chapter 14 financial issuesChapter 14 financial issues
Chapter 14 financial issuesAnn Bentley
 
Chapter 13 inventory management
Chapter 13 inventory managementChapter 13 inventory management
Chapter 13 inventory managementAnn Bentley
 
Chapter 12 information
Chapter 12 informationChapter 12 information
Chapter 12 informationAnn Bentley
 
Chapter 11 human variability
Chapter 11 human variabilityChapter 11 human variability
Chapter 11 human variabilityAnn Bentley
 
Chapter 10 basic pharmaceutics
Chapter 10 basic pharmaceuticsChapter 10 basic pharmaceutics
Chapter 10 basic pharmaceuticsAnn Bentley
 
Chapter 9 compounding
Chapter 9 compoundingChapter 9 compounding
Chapter 9 compoundingAnn Bentley
 
Chapter 8 parenterals
Chapter 8 parenteralsChapter 8 parenterals
Chapter 8 parenteralsAnn Bentley
 
Chapter 7 route and formulations
Chapter 7 route and formulationsChapter 7 route and formulations
Chapter 7 route and formulationsAnn Bentley
 
Chapter 6 pharmacy calculation
Chapter 6 pharmacy calculationChapter 6 pharmacy calculation
Chapter 6 pharmacy calculationAnn Bentley
 
Chapter 5 prescriptions
Chapter 5 prescriptionsChapter 5 prescriptions
Chapter 5 prescriptionsAnn Bentley
 
Chapter 4 terminology
Chapter 4 terminologyChapter 4 terminology
Chapter 4 terminologyAnn Bentley
 
Chapter 3 drug regulation and control
Chapter 3 drug regulation and controlChapter 3 drug regulation and control
Chapter 3 drug regulation and controlAnn Bentley
 
Chapter 2 the pharmacy technician
Chapter 2 the pharmacy technicianChapter 2 the pharmacy technician
Chapter 2 the pharmacy technicianAnn Bentley
 
Chapter 1 pharmacy and health care
Chapter 1 pharmacy and health careChapter 1 pharmacy and health care
Chapter 1 pharmacy and health careAnn Bentley
 

More from Ann Bentley (20)

Things you can do on facebook
Things you can do on facebookThings you can do on facebook
Things you can do on facebook
 
Chapter 18 common drugs
Chapter 18 common drugsChapter 18 common drugs
Chapter 18 common drugs
 
Chapter 17 other environments
Chapter 17 other environmentsChapter 17 other environments
Chapter 17 other environments
 
Chapter 16 hospital pharmacy
Chapter 16 hospital pharmacyChapter 16 hospital pharmacy
Chapter 16 hospital pharmacy
 
Chapter 15 community pharmacy
Chapter 15 community pharmacyChapter 15 community pharmacy
Chapter 15 community pharmacy
 
Chapter 14 financial issues
Chapter 14 financial issuesChapter 14 financial issues
Chapter 14 financial issues
 
Chapter 13 inventory management
Chapter 13 inventory managementChapter 13 inventory management
Chapter 13 inventory management
 
Chapter 12 information
Chapter 12 informationChapter 12 information
Chapter 12 information
 
Chapter 11 human variability
Chapter 11 human variabilityChapter 11 human variability
Chapter 11 human variability
 
Chapter 10 basic pharmaceutics
Chapter 10 basic pharmaceuticsChapter 10 basic pharmaceutics
Chapter 10 basic pharmaceutics
 
Chapter 9 compounding
Chapter 9 compoundingChapter 9 compounding
Chapter 9 compounding
 
Chapter 8 parenterals
Chapter 8 parenteralsChapter 8 parenterals
Chapter 8 parenterals
 
Chapter 7 route and formulations
Chapter 7 route and formulationsChapter 7 route and formulations
Chapter 7 route and formulations
 
Chapter 6 pharmacy calculation
Chapter 6 pharmacy calculationChapter 6 pharmacy calculation
Chapter 6 pharmacy calculation
 
Chapter 5 prescriptions
Chapter 5 prescriptionsChapter 5 prescriptions
Chapter 5 prescriptions
 
Chapter 4 terminology
Chapter 4 terminologyChapter 4 terminology
Chapter 4 terminology
 
Chapter 3 drug regulation and control
Chapter 3 drug regulation and controlChapter 3 drug regulation and control
Chapter 3 drug regulation and control
 
Chapter 2 the pharmacy technician
Chapter 2 the pharmacy technicianChapter 2 the pharmacy technician
Chapter 2 the pharmacy technician
 
Chapter 1 pharmacy and health care
Chapter 1 pharmacy and health careChapter 1 pharmacy and health care
Chapter 1 pharmacy and health care
 
L41 slides
L41 slidesL41 slides
L41 slides
 

Recently uploaded

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 

Recently uploaded (20)

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 

Lesson 8

  • 1. Lesson 8: Sending and Receiving Attachments Return to the student web page
  • 2. Assuring Internet Security  Malware  Software installed without your consent, such as:  Viruses  Worms  Spyware  Adware 2
  • 3. Assuring Internet Security  Internet security (antimalware software)  Detects and erases potentially harmful programs and intrusions  Examples:  Norton Internet Security  Avast Internet Security  Macafee Antivirus If your computer is connected to the Internet, you need antivirus software. Period. 3
  • 4. Assuring Internet Security An Internet security program provides protection from a variety of threats 4
  • 5. Assuring Internet Security Windows monitors the status of your computer’s protection 5
  • 6. Assuring Internet Security  Windows Update  Can automatically download the latest updates for Windows and Microsoft programs  Tells you when updates are available to install Windows Update tracks new updates and helps you install them 6
  • 7. Downloading Files from the Web  Downloading  Copying a file from a remote computer to your computer  Beware! Some files could contain a virus!  Uploading  Copying a file from your computer to a remote computer (such as when you send an attachment) 7
  • 8. Downloading Files from the Web Downloading moves attachments from the Webmail server on the Internet down to your own computer 8
  • 9. Receiving Email Attachments  Attachment  One or more files sent with an email message, such as:  Text document  Photo  Slide show of multiple photos A paper clip icon indicates the presence of an attachment 9
  • 10. Receiving Email Attachments  Saving attachments  Attachments remain embedded in their email message until you save them to your computer  Yahoo! Mail automatically scans for viruses before it lets you download an attachment Never open a attachment from someone you don't know 10
  • 11. Sending Attachments  Sending a file  Attach almost any file to an email message  Size limitations (up to 25 GB per message) When you forward a message with attachments, the attachments are forwarded as well. 11
  • 12. Sending Attachments  Sending multiple files  Attachas many files as you like up to the total attachment size limit Yahoo! Mail automatically scans the files you send for viruses (so you don’t need to worry about accidentally spreading a virus yourself) 12
  • 13. Sending Attachments  Forwarded attachments  When you forward a message, its attachments forward with it  Handy if you receive a message with photos you want to pass on to a family member or friend 13
  • 14. Lesson 8: Sending and Receiving Attachments Return to the student web page