SlideShare a Scribd company logo
1 of 19
By: Konradas Scerbavicius

E-mail sending











Slide3-4 Sending an email message to more than
one recipient
Slide 5-6 CC and BCC
Slide 7 Appropriate use of Forward FW and Reply
Slide 8-9 Using appropriate subjects and message
text in all emails.
Slide 10-11 opening mail attachments
Slide 12 How to protect your computer from
viruses
Slide 13-14 Creating and using an email signature
Slide 15-16 setting priority (high and low
importance) in the mail
Slide 17-18 Using of an address book to store
contacts
Slide 19 The End
Sending an email message to more than one recipient



How to add multiple
recipients to e-mail:



By adding multiple
recipient into to bar
if your are sending mail
range of recipient you
better use BCC to send an
email to more than one
person.


Screenshot to show how to add more than one recipient

This is where
the you add
recipients
CC and BCC
 Cc:

stands for "carbon copy."
Anyone listed in the Cc: field
of a message receives a copy
of that message when you
send it.
 Bcc: stands for "blind carbon
copy." This is similar to the Cc:
feature, except that Bcc:
recipients are invisible to all
the other recipients.
Screenshot to show where is CC and BCC bar

This is where
the CC and
BCC bar is
Appropriate use of Forward FW and Reply
 FW

is means Email
forwarding then you send
re-sending an mail across
 Reply is then you send
message back to the
person who Is already
text you before and you
texting him back
Using appropriate subjects and message text in all
emails

 Using

appropriate subject
and message text is very
important in mail because if
you are sending mail to
business you have to use
clear subject and formal
languish for present.
Screenshot to show subjects and message text in all emails

your Signature
in the end of
the mail so it
looks official

This is where
your mail text
goes

This is where
is the place for
subject of your
mail
opening email attachments.


Opening the emails with attachments are dangers
sometimes because some attachments might bring
viruses that might brake your computer so you
should be carful with opening the mails with
attachments.
Screen shot to show hot to add attachments in your mail

This is where
you add
attachments in
your mail
How to protect your computer from viruses
You can protect your computer
from the viruses by having
antivirus programme in your
computer witch protects your
computer by deleting viruses.
 Another way how to protect
your computer from viruses is
by simply don’t open emails
from people who you don’t
know.

Creating and using an email signature

The signatures are the
sight witch shows that
person’s what create this
mail signature.
 The signatures are used
for make your mail look
professional and official

Screen shot to show how to create signature

Signature can be create by
using signature creator
application separately

Signature also can be made by
using integrated logo creator in
the mail application
setting priority (high and low importance) in the mail

 Mail

importance can be
control by flag
 The priority of the mail can
be control by flagging your
mail with flag this says that
this mail is important.
 if the mail is not flagged this
means it’s not so important.
Screen shot to show flag of the email

This is there
the flag is in
mail
application
Using of an address book to store contacts
 The

contacts in your mail
can be stored into the
address book and this
works just like in your
phone
 The contacts in your
address book shows that
this person is important for
you
Screen shot to show how to add contacts in your mail

This is the contact book is in your mail. By using this
window your can create a new contact
Thank you for listening
Amy questions

More Related Content

What's hot

What's hot (20)

E Mail
E MailE Mail
E Mail
 
Another one on Email...
Another one on Email...Another one on Email...
Another one on Email...
 
Effective emailing ppt
Effective emailing pptEffective emailing ppt
Effective emailing ppt
 
Basic Email
Basic EmailBasic Email
Basic Email
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email Etiquette
 
Email Etiquettes
Email EtiquettesEmail Etiquettes
Email Etiquettes
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
Advantages & Disadvantages of Email
Advantages & Disadvantages of EmailAdvantages & Disadvantages of Email
Advantages & Disadvantages of Email
 
Internet Cookies
Internet CookiesInternet Cookies
Internet Cookies
 
All about email
All about emailAll about email
All about email
 
Email ppt
Email pptEmail ppt
Email ppt
 
E Mail Etiquette 4[1]
E Mail Etiquette 4[1]E Mail Etiquette 4[1]
E Mail Etiquette 4[1]
 
Gmail Basics
Gmail BasicsGmail Basics
Gmail Basics
 
Email etiquette
Email etiquetteEmail etiquette
Email etiquette
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
Introduction To Email
Introduction To EmailIntroduction To Email
Introduction To Email
 
Email Security and Awareness
Email Security and AwarenessEmail Security and Awareness
Email Security and Awareness
 
6437971 email-writing-ettiquettes-
6437971 email-writing-ettiquettes-6437971 email-writing-ettiquettes-
6437971 email-writing-ettiquettes-
 
Spamming and Spam Filtering
Spamming and Spam FilteringSpamming and Spam Filtering
Spamming and Spam Filtering
 
Writing a Business Email
Writing a Business EmailWriting a Business Email
Writing a Business Email
 

Similar to E-mail sending essentials

Easy methods to Validate Email Addresses
Easy methods to Validate Email AddressesEasy methods to Validate Email Addresses
Easy methods to Validate Email Addressesbillie4reid
 
Pranavi verma-class-9-email-messaging
Pranavi verma-class-9-email-messagingPranavi verma-class-9-email-messaging
Pranavi verma-class-9-email-messagingPranaviVerma
 
Pranavi verma-it 402 class ix-unit 11_presentation
Pranavi verma-it 402 class ix-unit 11_presentationPranavi verma-it 402 class ix-unit 11_presentation
Pranavi verma-it 402 class ix-unit 11_presentationPranaviVerma
 
Understanding And Mastering Email Basics: A Guide for Every Email User.
Understanding And Mastering Email Basics: A Guide for Every Email User. Understanding And Mastering Email Basics: A Guide for Every Email User.
Understanding And Mastering Email Basics: A Guide for Every Email User. Empowerhosting
 
Cyber security and emails presentation
Cyber security and emails presentationCyber security and emails presentation
Cyber security and emails presentationWan Solo
 
Email etiquette and effective email use guidance for staff and associates
Email etiquette and effective email use guidance for staff and associatesEmail etiquette and effective email use guidance for staff and associates
Email etiquette and effective email use guidance for staff and associatesThe Pathway Group
 
A look at business email etiquette basics
A look at business email etiquette basicsA look at business email etiquette basics
A look at business email etiquette basicsSkilldom
 
Sending Email Basics PHP
Sending Email Basics PHPSending Email Basics PHP
Sending Email Basics PHPProdigyView
 
Email etiquette
Email etiquetteEmail etiquette
Email etiquettePradnag
 
Ssw Presents Email Etiquette
Ssw Presents Email EtiquetteSsw Presents Email Etiquette
Ssw Presents Email EtiquetteSoft Skills World
 
Email Marketing Suicide
Email Marketing SuicideEmail Marketing Suicide
Email Marketing SuicideContent Krush
 
Cyber security and emails presentation refined
Cyber security and emails presentation refinedCyber security and emails presentation refined
Cyber security and emails presentation refinedWan Solo
 
What is E-Mail??
What is E-Mail??What is E-Mail??
What is E-Mail??ANASWARAKA
 
Email Best Practices Copy
Email Best Practices   CopyEmail Best Practices   Copy
Email Best Practices CopyKaruna Parmar
 
Email Communication
Email CommunicationEmail Communication
Email Communicationjjs1981
 
Online Safety Data Privacy and Email Basics Digital Literacy Fundamentals.pptx
Online Safety Data Privacy and Email Basics Digital Literacy Fundamentals.pptxOnline Safety Data Privacy and Email Basics Digital Literacy Fundamentals.pptx
Online Safety Data Privacy and Email Basics Digital Literacy Fundamentals.pptxExcellence Foundation for South Sudan
 

Similar to E-mail sending essentials (20)

Easy methods to Validate Email Addresses
Easy methods to Validate Email AddressesEasy methods to Validate Email Addresses
Easy methods to Validate Email Addresses
 
Pranavi verma-class-9-email-messaging
Pranavi verma-class-9-email-messagingPranavi verma-class-9-email-messaging
Pranavi verma-class-9-email-messaging
 
Pranavi verma-it 402 class ix-unit 11_presentation
Pranavi verma-it 402 class ix-unit 11_presentationPranavi verma-it 402 class ix-unit 11_presentation
Pranavi verma-it 402 class ix-unit 11_presentation
 
Understanding And Mastering Email Basics: A Guide for Every Email User.
Understanding And Mastering Email Basics: A Guide for Every Email User. Understanding And Mastering Email Basics: A Guide for Every Email User.
Understanding And Mastering Email Basics: A Guide for Every Email User.
 
Email Lesson
Email LessonEmail Lesson
Email Lesson
 
Cyber security and emails presentation
Cyber security and emails presentationCyber security and emails presentation
Cyber security and emails presentation
 
Email etiquette and effective email use guidance for staff and associates
Email etiquette and effective email use guidance for staff and associatesEmail etiquette and effective email use guidance for staff and associates
Email etiquette and effective email use guidance for staff and associates
 
A look at business email etiquette basics
A look at business email etiquette basicsA look at business email etiquette basics
A look at business email etiquette basics
 
Sending Email Basics PHP
Sending Email Basics PHPSending Email Basics PHP
Sending Email Basics PHP
 
Using E-mail In The Office
Using E-mail In The OfficeUsing E-mail In The Office
Using E-mail In The Office
 
Email etiquette
Email etiquetteEmail etiquette
Email etiquette
 
Ssw Presents Email Etiquette
Ssw Presents Email EtiquetteSsw Presents Email Etiquette
Ssw Presents Email Etiquette
 
Dipin's E-Newsletter
Dipin's E-NewsletterDipin's E-Newsletter
Dipin's E-Newsletter
 
Email Marketing Suicide
Email Marketing SuicideEmail Marketing Suicide
Email Marketing Suicide
 
Cyber security and emails presentation refined
Cyber security and emails presentation refinedCyber security and emails presentation refined
Cyber security and emails presentation refined
 
What is E-Mail??
What is E-Mail??What is E-Mail??
What is E-Mail??
 
Email Best Practices Copy
Email Best Practices   CopyEmail Best Practices   Copy
Email Best Practices Copy
 
Email quiz (qwizdom)
Email quiz (qwizdom)Email quiz (qwizdom)
Email quiz (qwizdom)
 
Email Communication
Email CommunicationEmail Communication
Email Communication
 
Online Safety Data Privacy and Email Basics Digital Literacy Fundamentals.pptx
Online Safety Data Privacy and Email Basics Digital Literacy Fundamentals.pptxOnline Safety Data Privacy and Email Basics Digital Literacy Fundamentals.pptx
Online Safety Data Privacy and Email Basics Digital Literacy Fundamentals.pptx
 

More from konradv19

Media Magazine Evaluation Intro Part 1
Media Magazine Evaluation Intro Part 1Media Magazine Evaluation Intro Part 1
Media Magazine Evaluation Intro Part 1konradv19
 
Media Magazine Evaluation Techniques Part 2
Media Magazine Evaluation Techniques Part 2Media Magazine Evaluation Techniques Part 2
Media Magazine Evaluation Techniques Part 2konradv19
 
Media Magazine Evaluation Problems Part 4
Media Magazine Evaluation Problems Part 4Media Magazine Evaluation Problems Part 4
Media Magazine Evaluation Problems Part 4konradv19
 
Media Magazine Evaluation Social Groups Part 5
Media Magazine Evaluation Social Groups Part 5Media Magazine Evaluation Social Groups Part 5
Media Magazine Evaluation Social Groups Part 5konradv19
 
Media Magazine Evaluation Audience Part 7
Media Magazine Evaluation Audience Part 7Media Magazine Evaluation Audience Part 7
Media Magazine Evaluation Audience Part 7konradv19
 
Media Magazine Evaluation Attracts-adress audience Part 8
Media Magazine Evaluation Attracts-adress audience Part 8 Media Magazine Evaluation Attracts-adress audience Part 8
Media Magazine Evaluation Attracts-adress audience Part 8 konradv19
 
Media Magazine Evaluation What I have Learned Part 9
Media Magazine Evaluation What I have Learned Part 9Media Magazine Evaluation What I have Learned Part 9
Media Magazine Evaluation What I have Learned Part 9konradv19
 
Task 3 barriers powerpoint
Task 3 barriers powerpointTask 3 barriers powerpoint
Task 3 barriers powerpointkonradv19
 
Contents page
Contents pageContents page
Contents pagekonradv19
 
Double page spread
Double page spreadDouble page spread
Double page spreadkonradv19
 

More from konradv19 (12)

Media Magazine Evaluation Intro Part 1
Media Magazine Evaluation Intro Part 1Media Magazine Evaluation Intro Part 1
Media Magazine Evaluation Intro Part 1
 
Media Magazine Evaluation Techniques Part 2
Media Magazine Evaluation Techniques Part 2Media Magazine Evaluation Techniques Part 2
Media Magazine Evaluation Techniques Part 2
 
Media Magazine Evaluation Problems Part 4
Media Magazine Evaluation Problems Part 4Media Magazine Evaluation Problems Part 4
Media Magazine Evaluation Problems Part 4
 
Media Magazine Evaluation Social Groups Part 5
Media Magazine Evaluation Social Groups Part 5Media Magazine Evaluation Social Groups Part 5
Media Magazine Evaluation Social Groups Part 5
 
Media Magazine Evaluation Audience Part 7
Media Magazine Evaluation Audience Part 7Media Magazine Evaluation Audience Part 7
Media Magazine Evaluation Audience Part 7
 
Media Magazine Evaluation Attracts-adress audience Part 8
Media Magazine Evaluation Attracts-adress audience Part 8 Media Magazine Evaluation Attracts-adress audience Part 8
Media Magazine Evaluation Attracts-adress audience Part 8
 
Media Magazine Evaluation What I have Learned Part 9
Media Magazine Evaluation What I have Learned Part 9Media Magazine Evaluation What I have Learned Part 9
Media Magazine Evaluation What I have Learned Part 9
 
Task 3 barriers powerpoint
Task 3 barriers powerpointTask 3 barriers powerpoint
Task 3 barriers powerpoint
 
Cover page
Cover pageCover page
Cover page
 
House style
House styleHouse style
House style
 
Contents page
Contents pageContents page
Contents page
 
Double page spread
Double page spreadDouble page spread
Double page spread
 

Recently uploaded

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

E-mail sending essentials

  • 2.           Slide3-4 Sending an email message to more than one recipient Slide 5-6 CC and BCC Slide 7 Appropriate use of Forward FW and Reply Slide 8-9 Using appropriate subjects and message text in all emails. Slide 10-11 opening mail attachments Slide 12 How to protect your computer from viruses Slide 13-14 Creating and using an email signature Slide 15-16 setting priority (high and low importance) in the mail Slide 17-18 Using of an address book to store contacts Slide 19 The End
  • 3. Sending an email message to more than one recipient  How to add multiple recipients to e-mail:  By adding multiple recipient into to bar if your are sending mail range of recipient you better use BCC to send an email to more than one person. 
  • 4. Screenshot to show how to add more than one recipient This is where the you add recipients
  • 5. CC and BCC  Cc: stands for "carbon copy." Anyone listed in the Cc: field of a message receives a copy of that message when you send it.  Bcc: stands for "blind carbon copy." This is similar to the Cc: feature, except that Bcc: recipients are invisible to all the other recipients.
  • 6. Screenshot to show where is CC and BCC bar This is where the CC and BCC bar is
  • 7. Appropriate use of Forward FW and Reply  FW is means Email forwarding then you send re-sending an mail across  Reply is then you send message back to the person who Is already text you before and you texting him back
  • 8. Using appropriate subjects and message text in all emails  Using appropriate subject and message text is very important in mail because if you are sending mail to business you have to use clear subject and formal languish for present.
  • 9. Screenshot to show subjects and message text in all emails your Signature in the end of the mail so it looks official This is where your mail text goes This is where is the place for subject of your mail
  • 10. opening email attachments.  Opening the emails with attachments are dangers sometimes because some attachments might bring viruses that might brake your computer so you should be carful with opening the mails with attachments.
  • 11. Screen shot to show hot to add attachments in your mail This is where you add attachments in your mail
  • 12. How to protect your computer from viruses You can protect your computer from the viruses by having antivirus programme in your computer witch protects your computer by deleting viruses.  Another way how to protect your computer from viruses is by simply don’t open emails from people who you don’t know. 
  • 13. Creating and using an email signature The signatures are the sight witch shows that person’s what create this mail signature.  The signatures are used for make your mail look professional and official 
  • 14. Screen shot to show how to create signature Signature can be create by using signature creator application separately Signature also can be made by using integrated logo creator in the mail application
  • 15. setting priority (high and low importance) in the mail  Mail importance can be control by flag  The priority of the mail can be control by flagging your mail with flag this says that this mail is important.  if the mail is not flagged this means it’s not so important.
  • 16. Screen shot to show flag of the email This is there the flag is in mail application
  • 17. Using of an address book to store contacts  The contacts in your mail can be stored into the address book and this works just like in your phone  The contacts in your address book shows that this person is important for you
  • 18. Screen shot to show how to add contacts in your mail This is the contact book is in your mail. By using this window your can create a new contact
  • 19. Thank you for listening Amy questions

Editor's Notes

  1. Hello and welcome to my presentation of the e-mails
  2. In this presentation I goanna be talking about: Sending an email message to more than one recipient, CC and BCC, Appropriate use of Forward FW and Reply, Using appropriate subjects and message text in all emails, opening mail attachments, How to protect your computer from viruses, Creating and using an email signature, setting priority (high and low importance) in the mail and Using of an address book to store contacts
  3. Sending an email message to more than one recipient can be by: adding multiple recipient you have to include more then one contact into to bar Is well if you choose to send mail to lots of recipient you have to make sure you use BCC.
  4. This is a Screenshot to show how to add more than one recipient the top box is where you add you contacts you can put any e-mail address in here for example Gmail, Yahoo mail and Microsoft Outlook.
  5. The CC is stands for "carbon copy." Anyone listed in the Cc: field of a message receives a copy of that message when you send it. And the Bcc: stands for "blind carbon copy." This is similar to the Cc: feature, except that Bcc: recipients are invisible to all the other recipients.
  6. This is a Screenshot to show where is CC and BCC bar CC means Cc: stands for "carbon copy." Anyone listed in the Cc field of a message receives a copy of that message when you send it. Bcc: stands for "blind carbon copy." This is similar to the Cc feature, except that Bcc recipients are invisible to all the other recipients of the message (including other Bcc: recipients).
  7. Appropriate use of Forward FW and Reply: FW is means Email forwarding then you send re-sending an mail across Reply is then you send message back to the person who Is already text you before and you texting him back.
  8. Using appropriate subjects and message text in all emails is very important in mail because if you are sending mail to business you have to use clear subject and formal languish for present.
  9. This is the Screenshot to show subjects and message text in all emails all E-mails Will have a subject and text on it if you send the e-mail to the business this makes the E-mail Look official and attractive.
  10. Opening the emails with attachments are dangers sometimes because some attachments might bring viruses that might brake your computer so you should be carful with opening the mails with attachments.
  11. This Is the place where you click and add the attachment into your e-mail attachments are the files documents what you want to pass across to other person or people It might be the Microsoft Office file or iWork document.
  12. Protecting your computer from viruses is very important because if you not protecting your computer it might crash where two ways to protect your computer You can protect your computer from the viruses by having antivirus programme in your computer witch protects your computer by deleting viruses. Another way how to protect your computer from viruses is by simply don’t open emails from people who you don’t know.
  13. The signature is the personal sing that proves who send this e-mail because every signature is different. The signature is always on the end of the email and is very important to have a signature in the business because it makes the e-mails look official.
  14. This screenshot shows how to create the signature by signature creator. Signature also can be made by using integrated logo creator in the mail application.
  15. the priority in the e-mail can be controlled by flagging the e-mail by different colour flags the red one means the e-mail is very important. If the E-mail is not flagged this means the e-mail is not important.
  16. This is a screenshot to show the flagged e-mail you can control the flags by finding the flag logo command bottoms in your email program.
  17. The contacts in your mail can be stored into the address book and this works just like in your phone. Using the address book in your e-mail is important to store your favourite contacts into your address book in your email program
  18. This screenshot show how to add the Contacts into your E-mail address book then you create the favourite contact into you address you book you can put the information in here such as Job tittle, company, name, surname, Email address name and a lot more but if you don’t want to fill these boxes you can skip some of them.
  19. Thank you for listening my presentation of the E-mail do you have any question?