SlideShare a Scribd company logo
1 of 14
E - mail
E - mail (short for electronic mail) is a fast and
convenient way to communicate with others
E - mail
Send and receive e - mail messages :
You can send an e - mail message to any person with an
e - mail address. The message arrives in the recipient's e -
mail inbox within seconds or minutes—despite whether he or
she is your next-door neighbor or lives halfway around the
world. You can receive messages from anyone who knows
your e - mail address, and then read and reply to those
messages.
E - mail
 Send and receive files :
In addition to typical text-based e-mail messages, you can send almost
any type of file in an e - mail message, including documents, pictures, and
music. A file sent in an e - mail message is called an attachment.
 Send messages to groups of people :
You can send an e - mail message to many people simultaneously.
Recipients can reply to the whole group, allowing for group discussions.
 Forward messages :
When you receive an e - mail message, you can forward it to others
without re-typing it.
Advantage of E - mail
 One advantage that e - mail has over the telephone or regular
mail is its convenience. You can send a message at any time of
day or night. If the recipients aren't in front of their
computers or online (connected to the Internet) when you
send the message, they'll find it waiting for them the next
time they check their e - mail. If they are online, you might
get a reply within minutes.
 Sending e - mail is also free. Unlike sending a regular letter,
no stamp or fee is required, no matter where the recipient
lives. The only charges that apply are those that you pay for
an Internet connection or a specific e - mail program.
To use e - mail, you need three things :
1. An Internet connection. To connect your computer to the Internet, you must first sign up
with an Internet service provider (ISP). An ISP provides you with access to the Internet,
usually for a monthly fee. You also need a modem. See What do I need to connect to the
Internet?
2. An e - mail program or web-based e - mail service. You can download or purchase e - mail
programs from Microsoft or another provider. E - mail programs often have more features
and are faster to search than most web-based e - mail services. Before you set up an e - mail
program, you'll need to get some information from your ISP: usually your e - mail address,
password, the names of your incoming and outgoing e - mail servers, and certain other
details.
If you don't want to download or purchase an e - mail program, you can instead sign up with a
free web-based e-mail service, such as Gmail, Windows Live Hotmail, or Yahoo! Mail. These
services allow you to check your e - mail with a web browser from any computer connected
to the Internet—even a computer that belongs to someone else or is in a public location such
as a library.
To use e - mail, you need three things :
3. An e - mail address :
You get an e - mail address from your ISP or web-based e -
mail service when you sign up. An e - mail address consists of
a user name (a nickname you choose, not necessarily your
real name), the @ sign, and the name of your ISP or web-
based e - mail provider—for example,
someone@example.com.
Creating and sending e - mail messages
i. In the To box, type the e - mail address of at least one recipient. If you're sending the
message to multiple recipients, type a semicolon (;) between e - mail addresses.
ii. In the Cc box, you can type the e - mail addresses of any secondary recipients—people who
should know about the message but don't need to act on it. They'll receive the same
message as the people in the To box. If there are no secondary recipients, leave this box
blank. Some e - mail programs also have a Bcc field, which allows you to send a message to
people while hiding certain names and e - mail addresses from other recipients.
iii. In the Subject box, type a title for your message.
iv. In the large blank area, type your message.
v. To attach a file to the message, click the Attach File button on the toolbar (located just
below the menu bar). Locate the file, select it, and then click Open. The file now appears in
the Attach box in the message header.
Creating and sending e - mail messages
vi. You're done! To send
the message, click the
Send button. It will zip
through the Internet to
your recipients.
E - mail etiquette
i. Be careful with humor and emotion. e - mail doesn't convey emotion well,
so the recipient might not understand your intended tone. Sarcastic
humor is particularly risky because the recipient might interpret it literally
and take offense. To convey emotion, consider using emoticons (see
"Using emoticons" in this article below).
ii. Think before you send. Writing and sending an e - mail message is fast and
easy—sometimes too easy. Make sure you've thought out your message
first, and avoid writing when you're angry.
iii. Use a clear and concise subject line. Summarize the contents of the
message in a few words. People who receive a large amount of e - mail
can use the subject to prioritize the message.
E - mail Eiquette
iv. Keep messages short. Although an e - mail message can be of
any length, e - mail is designed for quick communication.
Many people don't have the time or patience to read more
than a few paragraphs.
v. Avoid using ALL CAPITAL LETTERS. Many people perceive
sentences written in all uppercase letters as yelling and might
find it annoying or offensive.
vi. Be careful with sensitive or confidential information. Any
recipient can forward your message to others—either
intentionally or accidentally.
Tips for safely using e - mail and the web
i. Use caution when opening e - mail attachments :
E - mail attachments (files attached to e - mail messages) are a primary
source of virus infection. Never open an attachment from someone you
don't know. If you know the sender but were not expecting an
attachment, verify that the sender actually sent the attachment before
you open it.
ii. Guard your personal information carefully :
If a website asks for a credit card number, bank information, or other
personal information, make sure you trust the website and verify that its
transaction system is secure.
Tips for safely using e - mail and the web
iii. Be careful when clicking hyperlinks in e - mail messages:
Hyperlinks (links that open websites when you click them) are often
used as part of phishing and spyware scams, but they can also transmit
viruses. Only click links in e - mail messages that you trust.
iv. Only install add-ons from websites that you trust :
Web browser add-ons allow webpages to display things like toolbars,
stock tickers, video, and animation. However, add-ons can also install
spyware or other malicious software. If a website asks you to install an
add-on, make sure that you trust it before doing so.
Thank You
Presented by MUKUL
Source : Microsoft Wndows

More Related Content

What's hot

History of Email PowerPoint presentation
History of Email PowerPoint presentationHistory of Email PowerPoint presentation
History of Email PowerPoint presentationSaad Zeeshan
 
Tutorial 2 - Basic Communication on the Internet: Email
Tutorial 2 - Basic Communication on the Internet: EmailTutorial 2 - Basic Communication on the Internet: Email
Tutorial 2 - Basic Communication on the Internet: Emaildpd
 
Presentasi Bahasa Inggris " Email "
Presentasi Bahasa Inggris " Email "Presentasi Bahasa Inggris " Email "
Presentasi Bahasa Inggris " Email "Ari Febrianto
 
E Mail Ppt
E Mail PptE Mail Ppt
E Mail Pptkevpatel
 
Benefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer CentreBenefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer Centrejatin batra
 
Email use in business ppt
Email use in business pptEmail use in business ppt
Email use in business pptJason Roy
 
Internet and Email 101 v1
Internet and Email 101 v1Internet and Email 101 v1
Internet and Email 101 v1Adam Ripsam
 
Email ppt
Email pptEmail ppt
Email pptmelgade
 
Email And Voicemail
Email And VoicemailEmail And Voicemail
Email And Voicemailu083133
 
Internet & email
Internet & email Internet & email
Internet & email chameera7
 
Email - electronic mail
Email - electronic mailEmail - electronic mail
Email - electronic mailkundana
 

What's hot (20)

History of Email PowerPoint presentation
History of Email PowerPoint presentationHistory of Email PowerPoint presentation
History of Email PowerPoint presentation
 
Email etiquette
Email etiquetteEmail etiquette
Email etiquette
 
Tutorial 2 - Basic Communication on the Internet: Email
Tutorial 2 - Basic Communication on the Internet: EmailTutorial 2 - Basic Communication on the Internet: Email
Tutorial 2 - Basic Communication on the Internet: Email
 
Presentasi Bahasa Inggris " Email "
Presentasi Bahasa Inggris " Email "Presentasi Bahasa Inggris " Email "
Presentasi Bahasa Inggris " Email "
 
E Mail Basic
E Mail BasicE Mail Basic
E Mail Basic
 
E Mail Ppt
E Mail PptE Mail Ppt
E Mail Ppt
 
Basics of E-Mail
Basics of E-MailBasics of E-Mail
Basics of E-Mail
 
Benefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer CentreBenefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer Centre
 
Intro to email for seniors
Intro to email for seniorsIntro to email for seniors
Intro to email for seniors
 
Email use in business ppt
Email use in business pptEmail use in business ppt
Email use in business ppt
 
Email: Introduction
Email: IntroductionEmail: Introduction
Email: Introduction
 
All about email
All about emailAll about email
All about email
 
E mail features
E mail featuresE mail features
E mail features
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
Internet and Email 101 v1
Internet and Email 101 v1Internet and Email 101 v1
Internet and Email 101 v1
 
Email ppt
Email pptEmail ppt
Email ppt
 
Email And Voicemail
Email And VoicemailEmail And Voicemail
Email And Voicemail
 
Internet & email
Internet & email Internet & email
Internet & email
 
Rajasvi 6d
Rajasvi 6dRajasvi 6d
Rajasvi 6d
 
Email - electronic mail
Email - electronic mailEmail - electronic mail
Email - electronic mail
 

Similar to E‑mail

Benefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer CentreBenefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer Centrejatin batra
 
L5_Electronic communication.pptx
L5_Electronic communication.pptxL5_Electronic communication.pptx
L5_Electronic communication.pptxenukahansana
 
Cyber security and emails presentation refined
Cyber security and emails presentation refinedCyber security and emails presentation refined
Cyber security and emails presentation refinedWan Solo
 
Cyber security and emails presentation
Cyber security and emails presentationCyber security and emails presentation
Cyber security and emails presentationWan Solo
 
EMAIL INTRODUCTION (ALL FEATURES INCLUDED).pptx
EMAIL INTRODUCTION (ALL FEATURES INCLUDED).pptxEMAIL INTRODUCTION (ALL FEATURES INCLUDED).pptx
EMAIL INTRODUCTION (ALL FEATURES INCLUDED).pptxpkm16499
 
the best file here.ppt
the best file here.pptthe best file here.ppt
the best file here.pptssuser929d7c
 
Internet 8th level imen tek bouaziz 2016
Internet 8th level imen tek bouaziz 2016Internet 8th level imen tek bouaziz 2016
Internet 8th level imen tek bouaziz 2016imen Tekaya Bouaziz
 
Internet Tutorial 02
Internet  Tutorial 02Internet  Tutorial 02
Internet Tutorial 02dpd
 
L26 communication services
L26   communication servicesL26   communication services
L26 communication servicesheidirobison
 
Online Safety Data Privacy and Email Basics Digital Literacy Fundamentals.pptx
Online Safety Data Privacy and Email Basics Digital Literacy Fundamentals.pptxOnline Safety Data Privacy and Email Basics Digital Literacy Fundamentals.pptx
Online Safety Data Privacy and Email Basics Digital Literacy Fundamentals.pptxExcellence Foundation for South Sudan
 

Similar to E‑mail (20)

Benefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer CentreBenefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer Centre
 
Email
EmailEmail
Email
 
L5_Electronic communication.pptx
L5_Electronic communication.pptxL5_Electronic communication.pptx
L5_Electronic communication.pptx
 
Cyber security and emails presentation refined
Cyber security and emails presentation refinedCyber security and emails presentation refined
Cyber security and emails presentation refined
 
Cyber security and emails presentation
Cyber security and emails presentationCyber security and emails presentation
Cyber security and emails presentation
 
EMAIL INTRODUCTION (ALL FEATURES INCLUDED).pptx
EMAIL INTRODUCTION (ALL FEATURES INCLUDED).pptxEMAIL INTRODUCTION (ALL FEATURES INCLUDED).pptx
EMAIL INTRODUCTION (ALL FEATURES INCLUDED).pptx
 
l1email.ppt
l1email.pptl1email.ppt
l1email.ppt
 
the best file here.ppt
the best file here.pptthe best file here.ppt
the best file here.ppt
 
l1email.ppt
l1email.pptl1email.ppt
l1email.ppt
 
l1email.ppt
l1email.pptl1email.ppt
l1email.ppt
 
Internet 8th level imen tek bouaziz 2016
Internet 8th level imen tek bouaziz 2016Internet 8th level imen tek bouaziz 2016
Internet 8th level imen tek bouaziz 2016
 
Internet Tutorial 02
Internet  Tutorial 02Internet  Tutorial 02
Internet Tutorial 02
 
Another one on Email...
Another one on Email...Another one on Email...
Another one on Email...
 
Presentation1
Presentation1Presentation1
Presentation1
 
Safe Email Practices
Safe Email PracticesSafe Email Practices
Safe Email Practices
 
L26 communication services
L26   communication servicesL26   communication services
L26 communication services
 
Online Safety Data Privacy and Email Basics Digital Literacy Fundamentals.pptx
Online Safety Data Privacy and Email Basics Digital Literacy Fundamentals.pptxOnline Safety Data Privacy and Email Basics Digital Literacy Fundamentals.pptx
Online Safety Data Privacy and Email Basics Digital Literacy Fundamentals.pptx
 
Internet
InternetInternet
Internet
 
Good e mail practices
Good e mail practicesGood e mail practices
Good e mail practices
 
Email Lesson
Email LessonEmail Lesson
Email Lesson
 

More from Mukul Kumar

Some Medicinal plants & Their Uses
Some Medicinal plants & Their UsesSome Medicinal plants & Their Uses
Some Medicinal plants & Their UsesMukul Kumar
 
History of computers
History of computersHistory of computers
History of computersMukul Kumar
 
Computer communication
Computer communicationComputer communication
Computer communicationMukul Kumar
 
General principles and processes of isolation of elements
General principles and processes of isolation of elementsGeneral principles and processes of isolation of elements
General principles and processes of isolation of elementsMukul Kumar
 
Wireless computing
Wireless computingWireless computing
Wireless computingMukul Kumar
 
Microsoft office word 2007
Microsoft office word 2007Microsoft office word 2007
Microsoft office word 2007Mukul Kumar
 
Computer generations
Computer generationsComputer generations
Computer generationsMukul Kumar
 
Effects of drug abuse and addiction
Effects of drug abuse and addictionEffects of drug abuse and addiction
Effects of drug abuse and addictionMukul Kumar
 
Effects of drug abuse and addiction
Effects of drug abuse and addictionEffects of drug abuse and addiction
Effects of drug abuse and addictionMukul Kumar
 
Getting started with paint
Getting started with paintGetting started with paint
Getting started with paintMukul Kumar
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computingMukul Kumar
 
Parts of computer
Parts of computerParts of computer
Parts of computerMukul Kumar
 
Golden Temple Picture Collection
Golden Temple Picture CollectionGolden Temple Picture Collection
Golden Temple Picture CollectionMukul Kumar
 
Introducing power point 2007
Introducing power point 2007 Introducing power point 2007
Introducing power point 2007 Mukul Kumar
 
What is direct X ?
What is direct X ?What is direct X ?
What is direct X ?Mukul Kumar
 
What is direct X ?
What is direct X ?What is direct X ?
What is direct X ?Mukul Kumar
 

More from Mukul Kumar (20)

Some Medicinal plants & Their Uses
Some Medicinal plants & Their UsesSome Medicinal plants & Their Uses
Some Medicinal plants & Their Uses
 
The solid state
The solid stateThe solid state
The solid state
 
Printers
PrintersPrinters
Printers
 
History of computers
History of computersHistory of computers
History of computers
 
Computer communication
Computer communicationComputer communication
Computer communication
 
General principles and processes of isolation of elements
General principles and processes of isolation of elementsGeneral principles and processes of isolation of elements
General principles and processes of isolation of elements
 
Wireless computing
Wireless computingWireless computing
Wireless computing
 
Microsoft office word 2007
Microsoft office word 2007Microsoft office word 2007
Microsoft office word 2007
 
Computer generations
Computer generationsComputer generations
Computer generations
 
Effects of drug abuse and addiction
Effects of drug abuse and addictionEffects of drug abuse and addiction
Effects of drug abuse and addiction
 
Effects of drug abuse and addiction
Effects of drug abuse and addictionEffects of drug abuse and addiction
Effects of drug abuse and addiction
 
Getting started with paint
Getting started with paintGetting started with paint
Getting started with paint
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computing
 
Parts of computer
Parts of computerParts of computer
Parts of computer
 
Virus
VirusVirus
Virus
 
Golden Temple Picture Collection
Golden Temple Picture CollectionGolden Temple Picture Collection
Golden Temple Picture Collection
 
Introducing power point 2007
Introducing power point 2007 Introducing power point 2007
Introducing power point 2007
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
What is direct X ?
What is direct X ?What is direct X ?
What is direct X ?
 
What is direct X ?
What is direct X ?What is direct X ?
What is direct X ?
 

Recently uploaded

Protecting Your Little Explorer at Home!
Protecting Your Little Explorer at Home!Protecting Your Little Explorer at Home!
Protecting Your Little Explorer at Home!andrekr997
 
Impact Of Educational Resources on Students' Academic Performance in Economic...
Impact Of Educational Resources on Students' Academic Performance in Economic...Impact Of Educational Resources on Students' Academic Performance in Economic...
Impact Of Educational Resources on Students' Academic Performance in Economic...AJHSSR Journal
 
AI Virtual Influencers: The Future of Influencer Marketing
AI Virtual Influencers:  The Future of Influencer MarketingAI Virtual Influencers:  The Future of Influencer Marketing
AI Virtual Influencers: The Future of Influencer MarketingCut-the-SaaS
 
Online Social Shopping Motivation: A Preliminary Study
Online Social Shopping Motivation: A Preliminary StudyOnline Social Shopping Motivation: A Preliminary Study
Online Social Shopping Motivation: A Preliminary StudyAJHSSR Journal
 
Add more information to your upload Tip: Better titles and descriptions lead ...
Add more information to your upload Tip: Better titles and descriptions lead ...Add more information to your upload Tip: Better titles and descriptions lead ...
Add more information to your upload Tip: Better titles and descriptions lead ...SejarahLokal
 
Spotify AI DJ Deck - The Agency at University of Florida
Spotify AI DJ Deck - The Agency at University of FloridaSpotify AI DJ Deck - The Agency at University of Florida
Spotify AI DJ Deck - The Agency at University of Floridajorirz24
 
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...AJHSSR Journal
 
Mastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdfMastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdfTirupati Social Media
 
Dubai Call Girls O528786472 Diabolic Call Girls In Dubai
Dubai Call Girls O528786472 Diabolic Call Girls In DubaiDubai Call Girls O528786472 Diabolic Call Girls In Dubai
Dubai Call Girls O528786472 Diabolic Call Girls In Dubaihf8803863
 
Call Girls In Patel Nagar Delhi 9654467111 Escorts Service
Call Girls In Patel Nagar Delhi 9654467111 Escorts ServiceCall Girls In Patel Nagar Delhi 9654467111 Escorts Service
Call Girls In Patel Nagar Delhi 9654467111 Escorts ServiceSapana Sha
 
Call^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call Me
Call^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call MeCall^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call Me
Call^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call MeMs Riya
 
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一ra6e69ou
 
"Ready to elevate your Instagram? Let's go
"Ready to elevate your Instagram? Let's go"Ready to elevate your Instagram? Let's go
"Ready to elevate your Instagram? Let's goSocioCosmos
 
Unlock Your Social Media Potential with IndianLikes - IndianLikes.com
Unlock Your Social Media Potential with IndianLikes - IndianLikes.comUnlock Your Social Media Potential with IndianLikes - IndianLikes.com
Unlock Your Social Media Potential with IndianLikes - IndianLikes.comSagar Sinha
 

Recently uploaded (20)

Protecting Your Little Explorer at Home!
Protecting Your Little Explorer at Home!Protecting Your Little Explorer at Home!
Protecting Your Little Explorer at Home!
 
Impact Of Educational Resources on Students' Academic Performance in Economic...
Impact Of Educational Resources on Students' Academic Performance in Economic...Impact Of Educational Resources on Students' Academic Performance in Economic...
Impact Of Educational Resources on Students' Academic Performance in Economic...
 
AI Virtual Influencers: The Future of Influencer Marketing
AI Virtual Influencers:  The Future of Influencer MarketingAI Virtual Influencers:  The Future of Influencer Marketing
AI Virtual Influencers: The Future of Influencer Marketing
 
Online Social Shopping Motivation: A Preliminary Study
Online Social Shopping Motivation: A Preliminary StudyOnline Social Shopping Motivation: A Preliminary Study
Online Social Shopping Motivation: A Preliminary Study
 
young Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Service
young Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Serviceyoung Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Service
young Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Service
 
Bicycle Safety in Focus: Preventing Fatalities and Seeking Justice
Bicycle Safety in Focus: Preventing Fatalities and Seeking JusticeBicycle Safety in Focus: Preventing Fatalities and Seeking Justice
Bicycle Safety in Focus: Preventing Fatalities and Seeking Justice
 
Add more information to your upload Tip: Better titles and descriptions lead ...
Add more information to your upload Tip: Better titles and descriptions lead ...Add more information to your upload Tip: Better titles and descriptions lead ...
Add more information to your upload Tip: Better titles and descriptions lead ...
 
Hot Sexy call girls in Ramesh Nagar🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Ramesh Nagar🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Ramesh Nagar🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Ramesh Nagar🔝 9953056974 🔝 Delhi escort Service
 
Spotify AI DJ Deck - The Agency at University of Florida
Spotify AI DJ Deck - The Agency at University of FloridaSpotify AI DJ Deck - The Agency at University of Florida
Spotify AI DJ Deck - The Agency at University of Florida
 
FULL ENJOY Call Girls In Mohammadpur (Delhi) Call Us 9953056974
FULL ENJOY Call Girls In Mohammadpur  (Delhi) Call Us 9953056974FULL ENJOY Call Girls In Mohammadpur  (Delhi) Call Us 9953056974
FULL ENJOY Call Girls In Mohammadpur (Delhi) Call Us 9953056974
 
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
 
Mastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdfMastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdf
 
Dubai Call Girls O528786472 Diabolic Call Girls In Dubai
Dubai Call Girls O528786472 Diabolic Call Girls In DubaiDubai Call Girls O528786472 Diabolic Call Girls In Dubai
Dubai Call Girls O528786472 Diabolic Call Girls In Dubai
 
looking for escort 9953056974 Low Rate Call Girls In Vinod Nagar
looking for escort 9953056974 Low Rate Call Girls In  Vinod Nagarlooking for escort 9953056974 Low Rate Call Girls In  Vinod Nagar
looking for escort 9953056974 Low Rate Call Girls In Vinod Nagar
 
Call Girls In Patel Nagar Delhi 9654467111 Escorts Service
Call Girls In Patel Nagar Delhi 9654467111 Escorts ServiceCall Girls In Patel Nagar Delhi 9654467111 Escorts Service
Call Girls In Patel Nagar Delhi 9654467111 Escorts Service
 
Call^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call Me
Call^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call MeCall^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call Me
Call^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call Me
 
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
 
"Ready to elevate your Instagram? Let's go
"Ready to elevate your Instagram? Let's go"Ready to elevate your Instagram? Let's go
"Ready to elevate your Instagram? Let's go
 
Enjoy ➥8448380779▻ Call Girls In Noida Sector 93 Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Noida Sector 93 Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Noida Sector 93 Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Noida Sector 93 Escorts Delhi NCR
 
Unlock Your Social Media Potential with IndianLikes - IndianLikes.com
Unlock Your Social Media Potential with IndianLikes - IndianLikes.comUnlock Your Social Media Potential with IndianLikes - IndianLikes.com
Unlock Your Social Media Potential with IndianLikes - IndianLikes.com
 

E‑mail

  • 1. E - mail E - mail (short for electronic mail) is a fast and convenient way to communicate with others
  • 2. E - mail Send and receive e - mail messages : You can send an e - mail message to any person with an e - mail address. The message arrives in the recipient's e - mail inbox within seconds or minutes—despite whether he or she is your next-door neighbor or lives halfway around the world. You can receive messages from anyone who knows your e - mail address, and then read and reply to those messages.
  • 3. E - mail  Send and receive files : In addition to typical text-based e-mail messages, you can send almost any type of file in an e - mail message, including documents, pictures, and music. A file sent in an e - mail message is called an attachment.  Send messages to groups of people : You can send an e - mail message to many people simultaneously. Recipients can reply to the whole group, allowing for group discussions.  Forward messages : When you receive an e - mail message, you can forward it to others without re-typing it.
  • 4. Advantage of E - mail  One advantage that e - mail has over the telephone or regular mail is its convenience. You can send a message at any time of day or night. If the recipients aren't in front of their computers or online (connected to the Internet) when you send the message, they'll find it waiting for them the next time they check their e - mail. If they are online, you might get a reply within minutes.  Sending e - mail is also free. Unlike sending a regular letter, no stamp or fee is required, no matter where the recipient lives. The only charges that apply are those that you pay for an Internet connection or a specific e - mail program.
  • 5. To use e - mail, you need three things : 1. An Internet connection. To connect your computer to the Internet, you must first sign up with an Internet service provider (ISP). An ISP provides you with access to the Internet, usually for a monthly fee. You also need a modem. See What do I need to connect to the Internet? 2. An e - mail program or web-based e - mail service. You can download or purchase e - mail programs from Microsoft or another provider. E - mail programs often have more features and are faster to search than most web-based e - mail services. Before you set up an e - mail program, you'll need to get some information from your ISP: usually your e - mail address, password, the names of your incoming and outgoing e - mail servers, and certain other details. If you don't want to download or purchase an e - mail program, you can instead sign up with a free web-based e-mail service, such as Gmail, Windows Live Hotmail, or Yahoo! Mail. These services allow you to check your e - mail with a web browser from any computer connected to the Internet—even a computer that belongs to someone else or is in a public location such as a library.
  • 6. To use e - mail, you need three things : 3. An e - mail address : You get an e - mail address from your ISP or web-based e - mail service when you sign up. An e - mail address consists of a user name (a nickname you choose, not necessarily your real name), the @ sign, and the name of your ISP or web- based e - mail provider—for example, someone@example.com.
  • 7. Creating and sending e - mail messages i. In the To box, type the e - mail address of at least one recipient. If you're sending the message to multiple recipients, type a semicolon (;) between e - mail addresses. ii. In the Cc box, you can type the e - mail addresses of any secondary recipients—people who should know about the message but don't need to act on it. They'll receive the same message as the people in the To box. If there are no secondary recipients, leave this box blank. Some e - mail programs also have a Bcc field, which allows you to send a message to people while hiding certain names and e - mail addresses from other recipients. iii. In the Subject box, type a title for your message. iv. In the large blank area, type your message. v. To attach a file to the message, click the Attach File button on the toolbar (located just below the menu bar). Locate the file, select it, and then click Open. The file now appears in the Attach box in the message header.
  • 8.
  • 9. Creating and sending e - mail messages vi. You're done! To send the message, click the Send button. It will zip through the Internet to your recipients.
  • 10. E - mail etiquette i. Be careful with humor and emotion. e - mail doesn't convey emotion well, so the recipient might not understand your intended tone. Sarcastic humor is particularly risky because the recipient might interpret it literally and take offense. To convey emotion, consider using emoticons (see "Using emoticons" in this article below). ii. Think before you send. Writing and sending an e - mail message is fast and easy—sometimes too easy. Make sure you've thought out your message first, and avoid writing when you're angry. iii. Use a clear and concise subject line. Summarize the contents of the message in a few words. People who receive a large amount of e - mail can use the subject to prioritize the message.
  • 11. E - mail Eiquette iv. Keep messages short. Although an e - mail message can be of any length, e - mail is designed for quick communication. Many people don't have the time or patience to read more than a few paragraphs. v. Avoid using ALL CAPITAL LETTERS. Many people perceive sentences written in all uppercase letters as yelling and might find it annoying or offensive. vi. Be careful with sensitive or confidential information. Any recipient can forward your message to others—either intentionally or accidentally.
  • 12. Tips for safely using e - mail and the web i. Use caution when opening e - mail attachments : E - mail attachments (files attached to e - mail messages) are a primary source of virus infection. Never open an attachment from someone you don't know. If you know the sender but were not expecting an attachment, verify that the sender actually sent the attachment before you open it. ii. Guard your personal information carefully : If a website asks for a credit card number, bank information, or other personal information, make sure you trust the website and verify that its transaction system is secure.
  • 13. Tips for safely using e - mail and the web iii. Be careful when clicking hyperlinks in e - mail messages: Hyperlinks (links that open websites when you click them) are often used as part of phishing and spyware scams, but they can also transmit viruses. Only click links in e - mail messages that you trust. iv. Only install add-ons from websites that you trust : Web browser add-ons allow webpages to display things like toolbars, stock tickers, video, and animation. However, add-ons can also install spyware or other malicious software. If a website asks you to install an add-on, make sure that you trust it before doing so.
  • 14. Thank You Presented by MUKUL Source : Microsoft Wndows