SlideShare a Scribd company logo
1 of 20
Introduction of Main window of
mailbox
Mrs. Rekha Bawa (Assistant Professor)
SSBS
Sharda University
Gmail Inbox for your Account
2
Composing a “New
Message”
 Click on “New” or
“Compose”
 Contacts
◦ Like an address book
◦ Contains email
addresses & contact
information
Properly Addressing a Message
 Subject:
◦ Brief description
 CC (Carbon Copy)
◦ To include other
people in an email
message
 BC (Blind Carbon
Copy)
◦ Addresses will not be
visible to other parties.
 Attachments
◦ Attach or Upload files
4
Draft or Send
 Draft:
◦ Save it to send
later
 Send
◦ Only click on
when the
message is
complete and
ready to go.
5.
Inbox
6
Shows all incoming mail you have
received
 Click on the email to read it.
 All unread emails are usually marked in
bold text
Reply or Reply All
 Reply
◦ When you want to respond to an
email
◦ New window will appear to
compose your message
 Reply All
◦ The message will be sent to all
parties in the email.
◦ **Caution** Always check the
“To” box before hitting the “send”
button to avoid embarrassment
of sending it to the wrong people.
Forwarding an Email
 Forward
◦ Share an email
message with
another individual
8
SPAM or Junk Email
 Spam
◦ Carries viruses and
fraudulent scams
◦ Do NOT open it
 Move it to the Spam Folder
 Do NOT open files with a
attachment that has a file
extension ending in:
◦ .exe
◦ .zip
◦ .scr
9
Folders or Labels
 Folders or Labels
◦ Allow you to organize
your emails for quicker
reference.
10
Trash or Deleted Items
 Deleted Items
◦ To delete click on the
“Delete” Command
◦ Once it is deleted from
the trash folder “it’s
gone”
 Trash Folder
◦ Items in the trash folder
are accessible
11
Email Etiquette
 Email Do’s:
◦ Keep emails clear and
concise
◦ Use a relevant subject
line
◦ Add a greeting and
closing line to your
email
 "Dear Angela”
 Closing
Sincerely
Thanks
Followed by your name
Be aware of your tone
in your email
12
Email Etiquette (cont.)
 Check your email before
sending
◦ Check it for spelling and
grammar errors
◦ Check the content and
wording
 Check your recipients
◦ To
◦ CC
◦ BCC
13
Email Etiquette
 Email Don’ts
◦ Don’t use caps lock
◦ An overlong
signature
◦ Don’t use hard-to-
read fonts or colors
 Don't overuse Reply to All
 Don't try to cover too
many topics
 Don't forward chain
emails
14
Professionalism in Emailing
 Professionalism
◦ Not too informal
◦ No profanity
◦ Never convey anger
 Always read your emails
before sending
◦ Don’t discuss confidential
information
 Think before you send!
15
Companies are
Monitoring
 Businesses today are
monitoring
 Don’t use your work
email to write anything
derogatory
 Social Media
◦ Is monitored
◦ Beware what you post
16
Online Phishing Scams
 Fishing for confidential
information
 Receive an e-mail which
appears to originate from a
financial institution
 Describes an urgent reason
you must "verify" or "re-submit
 Consumer may be asked to
provide Social Security
numbers, account numbers,
passwords or other information
 When the consumer provides
the information, those
perpetrating the fraud can
begin to access consumer
accounts or assume the
person's identity.
17
Protect Yourself from Phishing
 Don’t reply to emails that ask for
personal or financial information
 Never click links within emails
that ask for personal or financial
information
 Avoid cutting and pasting links
from an email message into a
new browser window
 Never call company phone
numbers listed in an email.
 Don’t email personal or financial
information
 Use anti-virus and anti-spyware
software, a firewall, and spam
filters.
18
Phishing
 Here is an
example of a
Phishing Scam
19
Fraudulent Emails
 Subject lines that:
◦ Look important
◦ Show concern
 Examples:
◦ Message Alert
◦ Unauthorized Log-In
Access Denied
◦ Email Verification
Required
20

More Related Content

Similar to Main window of mailbox .pptx

E-Mail Etiquette PPT - BSMC
E-Mail Etiquette PPT - BSMCE-Mail Etiquette PPT - BSMC
E-Mail Etiquette PPT - BSMCPraneet Surti
 
Email etiquettes BY_College of digital marketing (Sakshi Mehra)
Email etiquettes BY_College of digital marketing (Sakshi Mehra)Email etiquettes BY_College of digital marketing (Sakshi Mehra)
Email etiquettes BY_College of digital marketing (Sakshi Mehra)Cnpl Cdm India
 
Effective Email communication
Effective Email communicationEffective Email communication
Effective Email communicationChetana Mehta
 
How to create Email at Gmail.com and Yahoo.com
How to create Email at Gmail.com and Yahoo.com How to create Email at Gmail.com and Yahoo.com
How to create Email at Gmail.com and Yahoo.com Amirul Islam
 
Email Best Practices Copy
Email Best Practices   CopyEmail Best Practices   Copy
Email Best Practices CopyKaruna Parmar
 
Email & Social Media Training
Email & Social Media TrainingEmail & Social Media Training
Email & Social Media TrainingWilliam Mann
 
Email information
Email informationEmail information
Email informationKyra Burns
 
Top 12-e-mail-mistakes[1]
Top 12-e-mail-mistakes[1]Top 12-e-mail-mistakes[1]
Top 12-e-mail-mistakes[1]Ozum Naz Batur
 
BASIC EMAIL ETIQUETTES , communication .pptx
BASIC EMAIL ETIQUETTES , communication .pptxBASIC EMAIL ETIQUETTES , communication .pptx
BASIC EMAIL ETIQUETTES , communication .pptxSandeepNayal1
 
Business emailing and communication tips: mails and TC TOP-10 rules
Business emailing and communication tips: mails and TC TOP-10 rulesBusiness emailing and communication tips: mails and TC TOP-10 rules
Business emailing and communication tips: mails and TC TOP-10 rulesAnastasia Arik
 

Similar to Main window of mailbox .pptx (20)

E-Mail Etiquette PPT - BSMC
E-Mail Etiquette PPT - BSMCE-Mail Etiquette PPT - BSMC
E-Mail Etiquette PPT - BSMC
 
Basic Email
Basic EmailBasic Email
Basic Email
 
Session 3 Gmail-Account.ppt
Session 3 Gmail-Account.pptSession 3 Gmail-Account.ppt
Session 3 Gmail-Account.ppt
 
Business writing~ email etiquette's
Business writing~ email etiquette'sBusiness writing~ email etiquette's
Business writing~ email etiquette's
 
Email etiquettes BY_College of digital marketing (Sakshi Mehra)
Email etiquettes BY_College of digital marketing (Sakshi Mehra)Email etiquettes BY_College of digital marketing (Sakshi Mehra)
Email etiquettes BY_College of digital marketing (Sakshi Mehra)
 
Effective Email communication
Effective Email communicationEffective Email communication
Effective Email communication
 
Good e mail practices
Good e mail practicesGood e mail practices
Good e mail practices
 
Polite email
Polite emailPolite email
Polite email
 
How to create Email at Gmail.com and Yahoo.com
How to create Email at Gmail.com and Yahoo.com How to create Email at Gmail.com and Yahoo.com
How to create Email at Gmail.com and Yahoo.com
 
Email Best Practices Copy
Email Best Practices   CopyEmail Best Practices   Copy
Email Best Practices Copy
 
Email & Social Media Training
Email & Social Media TrainingEmail & Social Media Training
Email & Social Media Training
 
Email information
Email informationEmail information
Email information
 
Email Etiquette.pptx
Email Etiquette.pptxEmail Etiquette.pptx
Email Etiquette.pptx
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email Etiquette
 
101 email etiquette tips
101 email etiquette tips101 email etiquette tips
101 email etiquette tips
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email Etiquette
 
Top 12-e-mail-mistakes[1]
Top 12-e-mail-mistakes[1]Top 12-e-mail-mistakes[1]
Top 12-e-mail-mistakes[1]
 
BASIC EMAIL ETIQUETTES , communication .pptx
BASIC EMAIL ETIQUETTES , communication .pptxBASIC EMAIL ETIQUETTES , communication .pptx
BASIC EMAIL ETIQUETTES , communication .pptx
 
12 Basic Email Etiquettes
12 Basic Email Etiquettes12 Basic Email Etiquettes
12 Basic Email Etiquettes
 
Business emailing and communication tips: mails and TC TOP-10 rules
Business emailing and communication tips: mails and TC TOP-10 rulesBusiness emailing and communication tips: mails and TC TOP-10 rules
Business emailing and communication tips: mails and TC TOP-10 rules
 

More from rekhabawa2

Marketing of financial products and services.pptx
Marketing of financial products and services.pptxMarketing of financial products and services.pptx
Marketing of financial products and services.pptxrekhabawa2
 
ROLE OF credit score WHILE SanctionING LOAN .pptx
ROLE OF credit score  WHILE SanctionING LOAN .pptxROLE OF credit score  WHILE SanctionING LOAN .pptx
ROLE OF credit score WHILE SanctionING LOAN .pptxrekhabawa2
 
Unit 3 customer relationship management.pptx
Unit 3 customer relationship management.pptxUnit 3 customer relationship management.pptx
Unit 3 customer relationship management.pptxrekhabawa2
 
Chapter 6 commercial bank management .pptx
Chapter 6 commercial bank management .pptxChapter 6 commercial bank management .pptx
Chapter 6 commercial bank management .pptxrekhabawa2
 
securities analysis portfolio management.pptx
securities analysis portfolio management.pptxsecurities analysis portfolio management.pptx
securities analysis portfolio management.pptxrekhabawa2
 
Major functions performed by all the banks
Major functions performed by all the banksMajor functions performed by all the banks
Major functions performed by all the banksrekhabawa2
 
marketing of financial products nad services
marketing of financial products  nad servicesmarketing of financial products  nad services
marketing of financial products nad servicesrekhabawa2
 
Chapter 1.pptx
Chapter 1.pptxChapter 1.pptx
Chapter 1.pptxrekhabawa2
 
11 Overall Hierarchy,.pptx
11  Overall Hierarchy,.pptx11  Overall Hierarchy,.pptx
11 Overall Hierarchy,.pptxrekhabawa2
 
loans and advances.pptx
loans and advances.pptxloans and advances.pptx
loans and advances.pptxrekhabawa2
 
Unit 1 pptx.pptx
Unit 1 pptx.pptxUnit 1 pptx.pptx
Unit 1 pptx.pptxrekhabawa2
 
foreign-exchange-market.pdf
foreign-exchange-market.pdfforeign-exchange-market.pdf
foreign-exchange-market.pdfrekhabawa2
 
Chapter16TechnicalAnalysis.ppt
Chapter16TechnicalAnalysis.pptChapter16TechnicalAnalysis.ppt
Chapter16TechnicalAnalysis.pptrekhabawa2
 
Chapter13EquityValuation.ppt
Chapter13EquityValuation.pptChapter13EquityValuation.ppt
Chapter13EquityValuation.pptrekhabawa2
 
Chapter7PortfolioTheory.ppt
Chapter7PortfolioTheory.pptChapter7PortfolioTheory.ppt
Chapter7PortfolioTheory.pptrekhabawa2
 
Chapter6FinancialStatementAnalysis.ppt
Chapter6FinancialStatementAnalysis.pptChapter6FinancialStatementAnalysis.ppt
Chapter6FinancialStatementAnalysis.pptrekhabawa2
 

More from rekhabawa2 (16)

Marketing of financial products and services.pptx
Marketing of financial products and services.pptxMarketing of financial products and services.pptx
Marketing of financial products and services.pptx
 
ROLE OF credit score WHILE SanctionING LOAN .pptx
ROLE OF credit score  WHILE SanctionING LOAN .pptxROLE OF credit score  WHILE SanctionING LOAN .pptx
ROLE OF credit score WHILE SanctionING LOAN .pptx
 
Unit 3 customer relationship management.pptx
Unit 3 customer relationship management.pptxUnit 3 customer relationship management.pptx
Unit 3 customer relationship management.pptx
 
Chapter 6 commercial bank management .pptx
Chapter 6 commercial bank management .pptxChapter 6 commercial bank management .pptx
Chapter 6 commercial bank management .pptx
 
securities analysis portfolio management.pptx
securities analysis portfolio management.pptxsecurities analysis portfolio management.pptx
securities analysis portfolio management.pptx
 
Major functions performed by all the banks
Major functions performed by all the banksMajor functions performed by all the banks
Major functions performed by all the banks
 
marketing of financial products nad services
marketing of financial products  nad servicesmarketing of financial products  nad services
marketing of financial products nad services
 
Chapter 1.pptx
Chapter 1.pptxChapter 1.pptx
Chapter 1.pptx
 
11 Overall Hierarchy,.pptx
11  Overall Hierarchy,.pptx11  Overall Hierarchy,.pptx
11 Overall Hierarchy,.pptx
 
loans and advances.pptx
loans and advances.pptxloans and advances.pptx
loans and advances.pptx
 
Unit 1 pptx.pptx
Unit 1 pptx.pptxUnit 1 pptx.pptx
Unit 1 pptx.pptx
 
foreign-exchange-market.pdf
foreign-exchange-market.pdfforeign-exchange-market.pdf
foreign-exchange-market.pdf
 
Chapter16TechnicalAnalysis.ppt
Chapter16TechnicalAnalysis.pptChapter16TechnicalAnalysis.ppt
Chapter16TechnicalAnalysis.ppt
 
Chapter13EquityValuation.ppt
Chapter13EquityValuation.pptChapter13EquityValuation.ppt
Chapter13EquityValuation.ppt
 
Chapter7PortfolioTheory.ppt
Chapter7PortfolioTheory.pptChapter7PortfolioTheory.ppt
Chapter7PortfolioTheory.ppt
 
Chapter6FinancialStatementAnalysis.ppt
Chapter6FinancialStatementAnalysis.pptChapter6FinancialStatementAnalysis.ppt
Chapter6FinancialStatementAnalysis.ppt
 

Recently uploaded

Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterMateoGardella
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 

Recently uploaded (20)

Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 

Main window of mailbox .pptx

  • 1. Introduction of Main window of mailbox Mrs. Rekha Bawa (Assistant Professor) SSBS Sharda University
  • 2. Gmail Inbox for your Account 2
  • 3. Composing a “New Message”  Click on “New” or “Compose”  Contacts ◦ Like an address book ◦ Contains email addresses & contact information
  • 4. Properly Addressing a Message  Subject: ◦ Brief description  CC (Carbon Copy) ◦ To include other people in an email message  BC (Blind Carbon Copy) ◦ Addresses will not be visible to other parties.  Attachments ◦ Attach or Upload files 4
  • 5. Draft or Send  Draft: ◦ Save it to send later  Send ◦ Only click on when the message is complete and ready to go. 5.
  • 6. Inbox 6 Shows all incoming mail you have received  Click on the email to read it.  All unread emails are usually marked in bold text
  • 7. Reply or Reply All  Reply ◦ When you want to respond to an email ◦ New window will appear to compose your message  Reply All ◦ The message will be sent to all parties in the email. ◦ **Caution** Always check the “To” box before hitting the “send” button to avoid embarrassment of sending it to the wrong people.
  • 8. Forwarding an Email  Forward ◦ Share an email message with another individual 8
  • 9. SPAM or Junk Email  Spam ◦ Carries viruses and fraudulent scams ◦ Do NOT open it  Move it to the Spam Folder  Do NOT open files with a attachment that has a file extension ending in: ◦ .exe ◦ .zip ◦ .scr 9
  • 10. Folders or Labels  Folders or Labels ◦ Allow you to organize your emails for quicker reference. 10
  • 11. Trash or Deleted Items  Deleted Items ◦ To delete click on the “Delete” Command ◦ Once it is deleted from the trash folder “it’s gone”  Trash Folder ◦ Items in the trash folder are accessible 11
  • 12. Email Etiquette  Email Do’s: ◦ Keep emails clear and concise ◦ Use a relevant subject line ◦ Add a greeting and closing line to your email  "Dear Angela”  Closing Sincerely Thanks Followed by your name Be aware of your tone in your email 12
  • 13. Email Etiquette (cont.)  Check your email before sending ◦ Check it for spelling and grammar errors ◦ Check the content and wording  Check your recipients ◦ To ◦ CC ◦ BCC 13
  • 14. Email Etiquette  Email Don’ts ◦ Don’t use caps lock ◦ An overlong signature ◦ Don’t use hard-to- read fonts or colors  Don't overuse Reply to All  Don't try to cover too many topics  Don't forward chain emails 14
  • 15. Professionalism in Emailing  Professionalism ◦ Not too informal ◦ No profanity ◦ Never convey anger  Always read your emails before sending ◦ Don’t discuss confidential information  Think before you send! 15
  • 16. Companies are Monitoring  Businesses today are monitoring  Don’t use your work email to write anything derogatory  Social Media ◦ Is monitored ◦ Beware what you post 16
  • 17. Online Phishing Scams  Fishing for confidential information  Receive an e-mail which appears to originate from a financial institution  Describes an urgent reason you must "verify" or "re-submit  Consumer may be asked to provide Social Security numbers, account numbers, passwords or other information  When the consumer provides the information, those perpetrating the fraud can begin to access consumer accounts or assume the person's identity. 17
  • 18. Protect Yourself from Phishing  Don’t reply to emails that ask for personal or financial information  Never click links within emails that ask for personal or financial information  Avoid cutting and pasting links from an email message into a new browser window  Never call company phone numbers listed in an email.  Don’t email personal or financial information  Use anti-virus and anti-spyware software, a firewall, and spam filters. 18
  • 19. Phishing  Here is an example of a Phishing Scam 19
  • 20. Fraudulent Emails  Subject lines that: ◦ Look important ◦ Show concern  Examples: ◦ Message Alert ◦ Unauthorized Log-In Access Denied ◦ Email Verification Required 20

Editor's Notes

  1. This is the inbox for your Gmail account. Notice the 3 emails from Google. Each of these are a tutorial of some of the features in Google mail.
  2. • It’s important to include a brief description of what your email is about in the subject line. This is a courtesy to the recipient and helps them to efficiently decide which emails to read, if their time is limited. It also makes it easier to search for an email at a later date. • CC: stands for carbon copy and is often used in the workplace. You may want to include other people in an email message to keep them informed, even though they may not be the recipient of the email. You can do this by entering their email address in the CC box. • BC: stands for blind carbon copy. Just like CC it copies other people; however, those recipients (and their addresses) will not visible to others in the email. • Attachments & Uploads: You can attach or upload digital files for documents, images, videos, and presentations and more to your email. These attachments can be opened or downloaded by the recipients.
  3. • Drafts: contain email messages that you have composed, but have not sent. When composing a message, you can click on save to save your message to the drafts folder until you are ready to finish the message or send it. • Send: When your email is complete, you will click on the “send” to deliver it to the recipients.
  4. When you receive an email from someone, you can click on the “reply” to respond to someone. A new window will appear with the original message in the body. You can now compose your response and click the “send” button. Reply All Sometimes an email has been sent to other people besides yourself. When you respond to these emails, you need to decide if you want to respond to just the sender or all of the recipients. If you want the message to be sent to everyone, you can click on the “reply all’ button. To avoid trouble or embarrassment, it is a good idea to double check the “To” box before you click “send” to make sure your message is being delivered to the right recipient.
  5. When you want to share an email message that you have received, you can click forward to send it to another person.
  6. Just like at home in your mailbox, at some point you will receive Junk Email or Spam. Spam often carries viruses or fraudulent scams, so you don’t want to open these messages. Usually your email provider will filter these suspicious emails into a Spam folder, but if you get one in your inbox, you should select the checkbox to the left of the message and click on the “Spam” button. This lets your email provider know that this is Spam and to block it from your inbox in the future. Don’t open files with the extensions such as: .exe, .zip, or .scr. These could contain hazardous files that could destroy or steal information. You should occasionally open your Spam Folder and see if any pertinent messages that you need got caught in the Spam Folder and you can send those to your inbox and allow them to bypass the Spam Folder in the future.
  7. Most email providers have features that allow you to build folders to organize and manage your incoming emails. Others let you group emails with labels for topics like Family, Facebook, EBay etc.
  8. To delete a message you simply click on the “delete” command. Some email providers will allow you to retrieve a deleted message from the trash. However, once it is deleted from the trash it is unrecoverable. Other providers allow you to archive a message, which, moves it out of your inbox, but does not permanently delete it.
  9. Like any form of online communication, it's important to practice good etiquette and safety when using email. Etiquette is a set of rules or guidelines that people use to communicate better and aid in other social interactions. Using good email etiquette can help you get your point across and show that you are considerate of the person that you are talking to. You should also be aware of important safety tips that you can use to protect yourself from things like malware or phishing. Email Do's: • Keep emails clear and concise. Make sure that your recipient can tell what the email is about. Avoid rambling, but provide enough detail to make the point of the email clear. • Use a relevant subject line. The subject line lets the recipient know what to expect in the email. Make it clear and relevant. • Add a greeting and closing line to your email. Just like a written letter, it's nice to add a greeting such as "Dear Amelia," and a closing line such as "Sincerely" or "Thanks" followed by your name. •Be aware that your tone may not be obvious in an email. Your recipients may not be able to recognize irony and sarcasm in your emails, and this can lead to misinterpretation or confusion. It's best to phrase things in the clearest way possible.
  10. Before sending your email, it’s a good habit to always check your email before sending it. You need to check for spelling and grammar errors. Don’t just rely on spell check, because we all know that spell check will see that a word is correct in spelling; however, it may be the wrong word in reference to content. Always check your recipients too to make sure that you are not mailing to the wrong person. This is crucial especially if you are sending sensitive information that should not be seen by anyone other than the party you want to send it to. Not checking your recipients could place you in an uncomfortable situation, so protect yourself by double checking before sending.
  11. Let’s talk about some don’ts. • Using caps lock. Writing in all caps is equivalent to shouting. Your recipient may mistakenly think that you're angry, which can backfire (especially in a business email). Also, emails written in all caps are harder to read. • Using an overly long signature. It may be tempting to create an elaborate signature that includes your name, title, address, multiple phone numbers, a Facebook or Twitter link, a picture, a quote, and other information. However, this can quickly turn into a ten-line signature, which may make it harder for your recipients to know how you prefer to be contacted. Instead of including all of your contact info, it's better to focus on your most important or preferred contact info. • Using hard-to-read fonts or colors. Your email service may have various text formatting options, but you should be aware that some of them may make your emails difficult to read. In many cases, too much text formatting can also look unprofessional or annoying. • Overuse of Reply to All. Ask yourself whether every person in the group needs to see your reply. If you're only intending the message for one person, use Reply. On the other hand, if you want to keep everybody in the group informed use Reply to All. • Trying to cover too many topics. If you find that your email is covering several unrelated topics, consider splitting it into separate emails. • Forwarding chain emails, even if they sound interesting. Chain emails can quickly spread throughout the world because they are forwarded to large numbers of people, who then forward them to even more people, and so on. Many of them are hoaxes, and even the ones that aren't may irritate your recipients.
  12. Even though an email may be less formal than a written letter, you should avoid being too informal. This is especially important when you are contacting a person for the first time. Once you get to know someone, you can then become less formal. Profanity or Anger: Using profanity in a business email is unprofessional and in some cases could get you in serious trouble. Remember once you send the message, you can’t get it back so watch what you are saying and how the person who is receiving this message is going to receive it. Sometimes emails can be taken out of context so watch what you write. It’s a good habit to re-read your emails before hitting the “send” button. Keep it Professional: Never convey anger, use profanity or make racist or sexist remarks. Remember, inappropriate words or images sent via email can come back to haunt you. Avoid using ALL CAPS. This is interpreted as yelling. Don't send or forward emails containing libelous, defamatory, offensive, racist or obscene remarks - even if they are meant to be a joke. Don’t Discuss Confidential Information: Most email is insecure unless it has been encoded or encrypted. So, sending an email is like sending a postcard for many eyes to see. Don’t send confidential information. Think Before You Send: Don’t treat email casually. Play it safe. In general, don't write anything in email that you wouldn't feel comfortable saying in a crowded elevator.
  13. Be aware that your company may read your email. Using your work email to write anything derogatory about your co-workers is a bad idea, and it could come back to haunt you later. Also you should never use your work email to forward jokes that are offensive or inappropriate for the office. Emailing, texting and social networking may be second nature forms of communication for many of us, but it seems like every day we are encountering more and more stories about people getting into real trouble due to embarrassing emails or online postings. What about this medium makes us write and post things that we would likely not say to an individual face to face? Perhaps the impersonal nature of the technology makes us feel safe, even when the reality sometimes proves just the opposite.
  14. The term "phishing" – as in fishing for confidential information - refers to a scam that encompasses fraudulently obtaining and using an individual's personal or financial information. This is how it works: • A consumer receives an e-mail which appears to originate from a financial institution, government agency, or other well-known/reputable entity. • The message describes an urgent reason you must "verify" or "re-submit" personal or confidential information by clicking on a link embedded in the message. • The provided link appears to be the Web site of the financial institution, government agency or other well-known/reputable entity, but in "phishing" scams, the Web site belongs to the fraudster/scammer. • Once inside the fraudulent Web site, the consumer may be asked to provide Social Security numbers, account numbers, passwords or other information used to identify the consumer, such as the maiden name of the consumer's mother or the consumer's place of birth. • When the consumer provides the information, those perpetrating the fraud can begin to access consumer accounts or assume the person's identity.
  15. Don’t reply to emails that ask for personal or financial information. Legitimate companies that you are already doing business with do not ask for personal or financial information via email. •Never click links within emails that ask for personal or financial information. Hackers can retrieve information from your computer in numerous ways including accessing stored information and monitoring keystrokes. •Avoid cutting and pasting links from an email message into a new browser window. Many people think this will help them determine if a website is legitimate; however, phishers can make links appear to go to a legitimate site, while sending you to another website they control. •Never call company phone numbers listed in an email. A common scam asks you to call the phone number listed in the email to update your account information. Sophisticated technology can mask an area code and divert the call anywhere. If you need to reach a company, call the number printed on your financial statements, credit card, or the company website. •Don’t email personal or financial information and always keep your account passwords private. •Use anti-virus and anti-spyware software, a firewall, and spam filters. Update these regularly! •Be wary of emails that seem urgent. Phishing emails often state that immediate action is required to tempt you to respond without thinking. •Pay close attention to the web address if you choose to access a company’s website through an email link. Some phishers register domain names that look very similar to the legitimate domain name of a company. If there is any doubt, open a new browser window and type the web address yourself.
  16. Here is an example of a Phishing Scam. As you can see the email looks authentic; however, your bank will never ask you for account information or your password by email. If you should ever get an email like this you need to report it to the bank and contact the Internet Crime Complaint Center (www.ic3.gov), a partnership between the FBI and the National White Collar Crime Center. Look closely at this address and notice that it is bankofamerican with an “n” added. A scammer can place any address they want in the “From” field, so sometimes the email will appear to be totally authentic (this is known as “email spoofing”). That means you can NOT always rely on the from field to tell whether the email is from a legitimate source.
  17. Fraudulent emails often have subject lines that look important and appear to show concern for your safety. And who wouldn’t be concerned about an alert on their bank account. Here are just a few examples of Subject lines that have been used on fraudulent emails: Message Alert: You have one important message Important Online Banking Settings have been changed New Privacy program (2011) Unauthorized Log-In access denied Bank of America Security Update Your Bank of America Account has been compromised. If there is a LOGO on the email, be aware that Logos can be copied and placed within an email.