SlideShare a Scribd company logo
1 of 19
Lesson 42: Looking at the Internet
   • different types of electronic communication
   • identifying users on communication systems
   • different communication methods
   • appropriate uses for electronic communication
   • advantages of electronic communication
   • how an e-mail address is structured
   • identifying e-mail components
   • using attachments effectively
   • understanding how junk mail works
   • common problems with electronic communication

© CCI Learning Solutions Inc.                        1
What is Electronic Communication?
   • Electronic Mail
          – Commonly known as e-mail and requires valid address to send messages
   • Instant Messages
          – Similar to having conversation involving two or more people, except in text and
            only one comment at a time can be received by everyone in that conversation
   • Text Messages
          – Similar to instant messages except created and sent from cellular phones with
            limit on number of characters allowed per message
   • VoIP
          – Voice over Internet Protocol; uses digital format that follows Internet protocol to
            enable audio conversations by two or more people in different areas
   • Online Conferencing
          – Enables numerous people to meet online using software designed for Internet use




© CCI Learning Solutions Inc.                                                                     2
What is Electronic Communication?
   • Chat Rooms
          – Can participate in main discussion or you can go into separate ―room‖ for
            different or private conversation
   • Social Networking Sites
          – Web sites you can join to connect with people you know or to meet new
            people
          – Create a profile and post pictures, video, or text about yourself, or play
            games
   • Blogs
          – Used as journals where one person writes on specific topic, and others
            then post comments for that topic
   • Message Boards or Newsgroups
          – Similar to bulletin boards where you can post comment about topic
            although you may have to subscribe to newsgroup

© CCI Learning Solutions Inc.                                                            3
What is Electronic Communication?
   • Communication methods can exchange data with each
     other
   • Limitations to technology that vary with device used
   • To achieve better exchange of data in future,
     communication protocol standards need to be developed
     and adhered to by device manufacturers, software
     developers, and service providers
   • Client component is ―user agent‖ or application program
     that works with specific set of protocols to access Web
   • Server component must be able to manage different
     types of services required

© CCI Learning Solutions Inc.                                  4
What is Electronic Communication
   • Identifying the Sender
          – Every form of electronic communication requires that sender have
            unique identifier
          – When using telephone to communicate, telephone number
            identifies who is calling
          – Some services require additional authentication methods to
            identify you when you login




© CCI Learning Solutions Inc.                                                  5
Using Electronic Communication
   • Generally faster to send message to one or more people instead of using
     telephone to try and contact them
   • Can print copy of conversations as record of communication
   • Can share information by sending files or attachments with e-mails, in instant
     messages, or through another online feature
   • Can post file as download from Web site
   • Can access e-mail and company’s intranet or Web site from any location
   • Use electronic messaging to set up meetings or inform others about them,
     and then meet using Web-based programs
   • Initial cost may be high but cost to maintain is low
   • Regardless of electronic communication methods, require server to provide
     services and computing device for client to use
   • Sharing and communicating with others can build sense of community



© CCI Learning Solutions Inc.                                                         6
Understanding an E-mail Address
   • To use e-mail address, must be set up as user on domain
               jsmith@ccilearning.com                               j.smith.909@myisp.uk.co

                  1              2         3                        1              2        3

                          1 Mailbox Name   2 Name of Organization       3 Domain Category



          – Mailbox Name: Identifies particular mailbox on e-mail server
          – Name of Organization: Identifies organization that owns server
          – Domain Category: Identifies type of domain
   • Not all commercial companies use .com and may use
     domain code to represent country of origin



© CCI Learning Solutions Inc.                                                                   7
Looking at E-mail Components
   • Components of e-mail: Addressing, Subject Line, Body,
     Attachments




© CCI Learning Solutions Inc.                                8
Looking at E-mail Components
   • Addressing
          – Identifies who will receive e-mail
   • Subject Line
          – Identifies topic of message, and usually short description of
            content or purpose of e-mail
   • Body
          – Where you type body of message
   • Attachments
          – When you want others to receive specific files




© CCI Learning Solutions Inc.                                               9
Using E-mail Appropriately
   • E-mail should never completely replace another form of
     communication
   • When writing e-mail, think about your audience
   • Use discretion when entering names in address fields
   • Include subject text that clearly identifies purpose of e-mail
   • Consider length of message
   • Consider how much of previous message should appear in reply
   • Remember business e-mails are official company correspondence
   • When replying to message with several addressees, is it necessary
     for everyone to get your reply
   • Review message carefully to ensure it meets general guidelines



© CCI Learning Solutions Inc.                                            10
Using E-mail Appropriately
   • If anything confidential, sensitive, or requires signature, is e-mail
     correct method of communication
   • Be careful about messages with personal jibes, ethnic jokes, or bad
     language
   • Avoid ―flaming‖ people
   • Refrain from using uppercase letters as this is considered ―shouting‖
   • Refrain from using abbreviations and acronyms in communications
   • Sites that encourage you to join and contribute personal information
     are generally accessible by general public
   • Use netiquette in all electronic communication
   • Send responses in timely manner
   • Always establish and follow rules and guidelines set up


© CCI Learning Solutions Inc.                                                11
Working with Attachments
   • Keep attachment file size as small as possible
   • Consider what attachment is and if e-mail best way to send it
   • If sending sensitive or confidential attachment, encrypt
     document to protect from unauthorized users
   • Include URL link in e-mail instead of large attachment
   • Consider file type and whether recipient can open it
   • Links and pictures can provide specific information but
     recipient may have security options set to prevent seeing
     these
   • Be aware of other security options
   • Always set antivirus program to automatically scan and check
     all incoming and outgoing mail

© CCI Learning Solutions Inc.                                        12
Managing Spam
   • Refers to unsolicited message to promote products and services or for
     political/religious purposes
          – Spammers buy e-mail address lists from companies specializing in e-mail
            marketing
   • Most e-mail programs filter and block spam or other junk e-mail
   • To avoid being placed on list that results in you receiving spam messages:
          – Do not allow e-mail address to be added to any marketing address lists
          – Set up e-mail account with Web-based e-mail for these types of requests
          – Do not reply to e-mail that is junk even if message says name will be removed
          – Avoid putting name and e-mail address on any public lists
          – Avoid giving e-mail address on any online forums or newsgroups
   • Avoid being flagged as spam by other servers by following general
     guidelines for sending e-mail



© CCI Learning Solutions Inc.                                                               13
Identifying Common Problems
   • Lost connection — Can be inconvenient if waiting for e-mail, if it
     occurs during Web conferencing session, or if in area where you
     cannot get service
   • Messages not being sent or received — Could indicate mail server
     at ISP is not connecting to system
   • Delivery failure message — When receive ―failure message,‖ read
     contents carefully to determine whether problem is something you
     can fix
   • Garbled messages — Arise when different mail formats used for
     sending and receiving messages
   • Hasty responses — Often result in unclear messages or poorly
     thought-out replies which end up taking more time and reflecting
     poorly than if you took time to respond carefully
   • Cannot download items — Likely restriction on computer

© CCI Learning Solutions Inc.                                             14
Identifying Common Problems
   • Blurring the communications line — Usually different approaches
     between professional and personal communication as in company or school
   • Paper trails — May need paper trail for archiving, but not always possible
     with other forms of communication
   • Too many messages — Use discretion when deciding who should receive
     new message or response
   • Junk mail — Automatically divert to Junk E-mail or Deleted Items folder
   • Unethical or illegal behavior — Enable questionable behavior to occur
   • Viruses — Use extreme caution with messages with attachments
   • Hoaxes — Be skeptical when get messages informing of virus being spread
     to computers
   • Security issues — Use caution when opening attachments




© CCI Learning Solutions Inc.                                                     15
Review Questions
  1. What types of electronic communications are available?
     a. E-mail
     b. Web conferencing
     c. Text messaging
     d. Blogs
     e. Any of the above
     f. a or c
  2. In the following e-mail address, which part represents the
     domain category?
                 p.f.92fallon@yahoo.com
     a. yahoo            c. p.f.92fallon
     b. @                d. com

© CCI Learning Solutions Inc.                                     16
Review Questions
  3. Why is it important to include something in the Subject line?
          a. To provide the recipient with a quick description of the
             message contents
          b. To prevent an ISP from marking this message as potential
             junk mail
          c. Because it is mandatory to fill it in when sending a
             message
          d. Any of the above
          e. a or b




© CCI Learning Solutions Inc.                                           17
Review Questions
  4. When sending a business e-mail, what should you consider
     when writing the message?
          a. The writing style should be formal.
          b. The Subject line should clearly identify the topic of the
             message.
          c. The message should be brief and concise.
          d. Avoid using a tone that’s too personal or emotional, or
             using uppercase letters to represent shouting.
          e. Any of the above




© CCI Learning Solutions Inc.                                            18
Review Questions
  5. For what reason might you be unable to download a video
     from a particular Web site?
          a. You do not have enough access rights to download items.
          b. You need to use a special login to gain access to all
             Internet items.
          c. The security is set too high for you to download items.
          d. The company has set up a policy that no downloading is
             possible by any of its users.




© CCI Learning Solutions Inc.                                          19

More Related Content

Similar to L42 slides

Emailppt 111110054525-phpapp02
Emailppt 111110054525-phpapp02Emailppt 111110054525-phpapp02
Emailppt 111110054525-phpapp02galaxy201
 
Electronic communication grade 10 cat
Electronic communication grade 10 catElectronic communication grade 10 cat
Electronic communication grade 10 catRaeesa A
 
Memos and E-mail
Memos and E-mailMemos and E-mail
Memos and E-mailmcneilkc
 
Using Technology to Improve Communication
Using Technology to Improve CommunicationUsing Technology to Improve Communication
Using Technology to Improve CommunicationSophia Abigayle
 
7 ways to write more effective email presentation slideshow
7 ways to write more effective email presentation slideshow7 ways to write more effective email presentation slideshow
7 ways to write more effective email presentation slideshowSteuart G. Snooks
 
webservices.pptx
webservices.pptxwebservices.pptx
webservices.pptxHelenToms3
 
Internet & Email & collaborative Computing & Social Networking by Abeer Ali 👍...
Internet & Email & collaborative Computing & Social Networking by Abeer Ali 👍...Internet & Email & collaborative Computing & Social Networking by Abeer Ali 👍...
Internet & Email & collaborative Computing & Social Networking by Abeer Ali 👍...AbeerTariq7
 
Tech Training - Session 8
Tech Training - Session 8Tech Training - Session 8
Tech Training - Session 8William Mann
 

Similar to L42 slides (20)

Email
EmailEmail
Email
 
Email Forensics
Email ForensicsEmail Forensics
Email Forensics
 
email bba s6.pptx
email bba s6.pptxemail bba s6.pptx
email bba s6.pptx
 
L50 slides
L50 slidesL50 slides
L50 slides
 
Emailppt 111110054525-phpapp02
Emailppt 111110054525-phpapp02Emailppt 111110054525-phpapp02
Emailppt 111110054525-phpapp02
 
IT CLASS.pptx
IT CLASS.pptxIT CLASS.pptx
IT CLASS.pptx
 
Presentation2.pptx
Presentation2.pptxPresentation2.pptx
Presentation2.pptx
 
IT PPT class 9.pptx
IT PPT class 9.pptxIT PPT class 9.pptx
IT PPT class 9.pptx
 
Electronic communication grade 10 cat
Electronic communication grade 10 catElectronic communication grade 10 cat
Electronic communication grade 10 cat
 
Memos and E-mail
Memos and E-mailMemos and E-mail
Memos and E-mail
 
Using Technology to Improve Communication
Using Technology to Improve CommunicationUsing Technology to Improve Communication
Using Technology to Improve Communication
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
L44 slides
L44 slidesL44 slides
L44 slides
 
7 ways to write more effective email presentation slideshow
7 ways to write more effective email presentation slideshow7 ways to write more effective email presentation slideshow
7 ways to write more effective email presentation slideshow
 
L48 slides
L48 slidesL48 slides
L48 slides
 
E mail
E mailE mail
E mail
 
Intro to email for seniors
Intro to email for seniorsIntro to email for seniors
Intro to email for seniors
 
webservices.pptx
webservices.pptxwebservices.pptx
webservices.pptx
 
Internet & Email & collaborative Computing & Social Networking by Abeer Ali 👍...
Internet & Email & collaborative Computing & Social Networking by Abeer Ali 👍...Internet & Email & collaborative Computing & Social Networking by Abeer Ali 👍...
Internet & Email & collaborative Computing & Social Networking by Abeer Ali 👍...
 
Tech Training - Session 8
Tech Training - Session 8Tech Training - Session 8
Tech Training - Session 8
 

Recently uploaded

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 

Recently uploaded (20)

The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 

L42 slides

  • 1. Lesson 42: Looking at the Internet • different types of electronic communication • identifying users on communication systems • different communication methods • appropriate uses for electronic communication • advantages of electronic communication • how an e-mail address is structured • identifying e-mail components • using attachments effectively • understanding how junk mail works • common problems with electronic communication © CCI Learning Solutions Inc. 1
  • 2. What is Electronic Communication? • Electronic Mail – Commonly known as e-mail and requires valid address to send messages • Instant Messages – Similar to having conversation involving two or more people, except in text and only one comment at a time can be received by everyone in that conversation • Text Messages – Similar to instant messages except created and sent from cellular phones with limit on number of characters allowed per message • VoIP – Voice over Internet Protocol; uses digital format that follows Internet protocol to enable audio conversations by two or more people in different areas • Online Conferencing – Enables numerous people to meet online using software designed for Internet use © CCI Learning Solutions Inc. 2
  • 3. What is Electronic Communication? • Chat Rooms – Can participate in main discussion or you can go into separate ―room‖ for different or private conversation • Social Networking Sites – Web sites you can join to connect with people you know or to meet new people – Create a profile and post pictures, video, or text about yourself, or play games • Blogs – Used as journals where one person writes on specific topic, and others then post comments for that topic • Message Boards or Newsgroups – Similar to bulletin boards where you can post comment about topic although you may have to subscribe to newsgroup © CCI Learning Solutions Inc. 3
  • 4. What is Electronic Communication? • Communication methods can exchange data with each other • Limitations to technology that vary with device used • To achieve better exchange of data in future, communication protocol standards need to be developed and adhered to by device manufacturers, software developers, and service providers • Client component is ―user agent‖ or application program that works with specific set of protocols to access Web • Server component must be able to manage different types of services required © CCI Learning Solutions Inc. 4
  • 5. What is Electronic Communication • Identifying the Sender – Every form of electronic communication requires that sender have unique identifier – When using telephone to communicate, telephone number identifies who is calling – Some services require additional authentication methods to identify you when you login © CCI Learning Solutions Inc. 5
  • 6. Using Electronic Communication • Generally faster to send message to one or more people instead of using telephone to try and contact them • Can print copy of conversations as record of communication • Can share information by sending files or attachments with e-mails, in instant messages, or through another online feature • Can post file as download from Web site • Can access e-mail and company’s intranet or Web site from any location • Use electronic messaging to set up meetings or inform others about them, and then meet using Web-based programs • Initial cost may be high but cost to maintain is low • Regardless of electronic communication methods, require server to provide services and computing device for client to use • Sharing and communicating with others can build sense of community © CCI Learning Solutions Inc. 6
  • 7. Understanding an E-mail Address • To use e-mail address, must be set up as user on domain jsmith@ccilearning.com j.smith.909@myisp.uk.co 1 2 3 1 2 3 1 Mailbox Name 2 Name of Organization 3 Domain Category – Mailbox Name: Identifies particular mailbox on e-mail server – Name of Organization: Identifies organization that owns server – Domain Category: Identifies type of domain • Not all commercial companies use .com and may use domain code to represent country of origin © CCI Learning Solutions Inc. 7
  • 8. Looking at E-mail Components • Components of e-mail: Addressing, Subject Line, Body, Attachments © CCI Learning Solutions Inc. 8
  • 9. Looking at E-mail Components • Addressing – Identifies who will receive e-mail • Subject Line – Identifies topic of message, and usually short description of content or purpose of e-mail • Body – Where you type body of message • Attachments – When you want others to receive specific files © CCI Learning Solutions Inc. 9
  • 10. Using E-mail Appropriately • E-mail should never completely replace another form of communication • When writing e-mail, think about your audience • Use discretion when entering names in address fields • Include subject text that clearly identifies purpose of e-mail • Consider length of message • Consider how much of previous message should appear in reply • Remember business e-mails are official company correspondence • When replying to message with several addressees, is it necessary for everyone to get your reply • Review message carefully to ensure it meets general guidelines © CCI Learning Solutions Inc. 10
  • 11. Using E-mail Appropriately • If anything confidential, sensitive, or requires signature, is e-mail correct method of communication • Be careful about messages with personal jibes, ethnic jokes, or bad language • Avoid ―flaming‖ people • Refrain from using uppercase letters as this is considered ―shouting‖ • Refrain from using abbreviations and acronyms in communications • Sites that encourage you to join and contribute personal information are generally accessible by general public • Use netiquette in all electronic communication • Send responses in timely manner • Always establish and follow rules and guidelines set up © CCI Learning Solutions Inc. 11
  • 12. Working with Attachments • Keep attachment file size as small as possible • Consider what attachment is and if e-mail best way to send it • If sending sensitive or confidential attachment, encrypt document to protect from unauthorized users • Include URL link in e-mail instead of large attachment • Consider file type and whether recipient can open it • Links and pictures can provide specific information but recipient may have security options set to prevent seeing these • Be aware of other security options • Always set antivirus program to automatically scan and check all incoming and outgoing mail © CCI Learning Solutions Inc. 12
  • 13. Managing Spam • Refers to unsolicited message to promote products and services or for political/religious purposes – Spammers buy e-mail address lists from companies specializing in e-mail marketing • Most e-mail programs filter and block spam or other junk e-mail • To avoid being placed on list that results in you receiving spam messages: – Do not allow e-mail address to be added to any marketing address lists – Set up e-mail account with Web-based e-mail for these types of requests – Do not reply to e-mail that is junk even if message says name will be removed – Avoid putting name and e-mail address on any public lists – Avoid giving e-mail address on any online forums or newsgroups • Avoid being flagged as spam by other servers by following general guidelines for sending e-mail © CCI Learning Solutions Inc. 13
  • 14. Identifying Common Problems • Lost connection — Can be inconvenient if waiting for e-mail, if it occurs during Web conferencing session, or if in area where you cannot get service • Messages not being sent or received — Could indicate mail server at ISP is not connecting to system • Delivery failure message — When receive ―failure message,‖ read contents carefully to determine whether problem is something you can fix • Garbled messages — Arise when different mail formats used for sending and receiving messages • Hasty responses — Often result in unclear messages or poorly thought-out replies which end up taking more time and reflecting poorly than if you took time to respond carefully • Cannot download items — Likely restriction on computer © CCI Learning Solutions Inc. 14
  • 15. Identifying Common Problems • Blurring the communications line — Usually different approaches between professional and personal communication as in company or school • Paper trails — May need paper trail for archiving, but not always possible with other forms of communication • Too many messages — Use discretion when deciding who should receive new message or response • Junk mail — Automatically divert to Junk E-mail or Deleted Items folder • Unethical or illegal behavior — Enable questionable behavior to occur • Viruses — Use extreme caution with messages with attachments • Hoaxes — Be skeptical when get messages informing of virus being spread to computers • Security issues — Use caution when opening attachments © CCI Learning Solutions Inc. 15
  • 16. Review Questions 1. What types of electronic communications are available? a. E-mail b. Web conferencing c. Text messaging d. Blogs e. Any of the above f. a or c 2. In the following e-mail address, which part represents the domain category? p.f.92fallon@yahoo.com a. yahoo c. p.f.92fallon b. @ d. com © CCI Learning Solutions Inc. 16
  • 17. Review Questions 3. Why is it important to include something in the Subject line? a. To provide the recipient with a quick description of the message contents b. To prevent an ISP from marking this message as potential junk mail c. Because it is mandatory to fill it in when sending a message d. Any of the above e. a or b © CCI Learning Solutions Inc. 17
  • 18. Review Questions 4. When sending a business e-mail, what should you consider when writing the message? a. The writing style should be formal. b. The Subject line should clearly identify the topic of the message. c. The message should be brief and concise. d. Avoid using a tone that’s too personal or emotional, or using uppercase letters to represent shouting. e. Any of the above © CCI Learning Solutions Inc. 18
  • 19. Review Questions 5. For what reason might you be unable to download a video from a particular Web site? a. You do not have enough access rights to download items. b. You need to use a special login to gain access to all Internet items. c. The security is set too high for you to download items. d. The company has set up a policy that no downloading is possible by any of its users. © CCI Learning Solutions Inc. 19

Editor's Notes

  1. Pg378-379Objective 3-2.1.1, 3-2.1.2, 3-2.1.3, 3-2.3.1This and the next slide discusses different ways you can communicate with others using the Internet. Be sure to introduce each term to students even if they have used it before. Some advantages and disadvantages are also introduced here.One way to open discussions is to have students discuss any they have used and the pros and cons they have experienced, especially for messaging options such as texting or IM.
  2. Pg378-379Objective 3-2.1.1, 3-2.1.2, 3-2.1.3, 3-2.3.1Continue with the introduction of different communication options using the Internet. Wherever possible, try to provide examples of popular sites that offer these types of services, such as Facebook or MySpace which includes chats and blogs.
  3. Pg379Objective 3-2.1.1, 3-2.1.2, 3-2.1.3, 3-2.3.1Discuss how the advent of new technologies greatly enhances our ability to communicate and exchange data although there is no standard between the devices or methods. The examples we provide in the book are by no means a full list and you should be able to provide more examples of the limitations we currently face as well as those being developed for future use, e.g., storage space, limitations on texting, etc.
  4. Pg379Objective 3-2.1.1, 3-2.1.2, 3-2.1.3, 3-2.3.1The point here is to reassure people that even though there are multiple ways to communicate electronically, there are also ways to identify who is trying to contact you. Despite what is shown on television or movies, for the most part, you can identify who is sending you something and you can then decide what to do with that information.Discuss how security issues are more of a concern these days given the different types of activities that can occur via the Internet, due to the fact that some people feel there is a bit of anonymity when using the Internet. Open the discussion to how you can still easily identify who is contacting you and when unknown, never take the information further without some sort of review with someone who has a bit more experience with that form of communication.
  5. Pg379Objective 3-2.3.1, 3-2.3.2This topic discusses some of the advantages of using electronic communications but also options you have available to keep track of what the communications are. You may want to include the idea of going to a “paperless” society and how much truth there may be to that idea, e.g., people still want hard copies, helping the forestry industry, etc.Open a discussion about the community idea and whether this would be applicable to the students. Some types of students such as seniors may not readily accept this idea and prefer the “real life” scenarios to being online. Those who “grew up” with technology are likely to be very comfortable with this idea and may already embrace or live it.
  6. PgAs time permits, go over these questions with the class to ensure they have a good grasp of the concepts learned in this lesson.Answers are found on the CCI microsite (ic3.ccilearning.com); you must be logged in as an instructor. Alternatively, if you received the instructor resources in electronic form, they will be located in the root folder.On completion of the Review Questions, have students navigate to the CCI microsite to begin the additional review there.
  7. PgAs time permits, go over these questions with the class to ensure they have a good grasp of the concepts learned in this lesson.Answers are found on the CCI microsite (ic3.ccilearning.com); you must be logged in as an instructor. Alternatively, if you received the instructor resources in electronic form, they will be located in the root folder.On completion of the Review Questions, have students navigate to the CCI microsite to begin the additional review there.
  8. PgAs time permits, go over these questions with the class to ensure they have a good grasp of the concepts learned in this lesson.Answers are found on the CCI microsite (ic3.ccilearning.com); you must be logged in as an instructor. Alternatively, if you received the instructor resources in electronic form, they will be located in the root folder.On completion of the Review Questions, have students navigate to the CCI microsite to begin the additional review there.
  9. PgAs time permits, go over these questions with the class to ensure they have a good grasp of the concepts learned in this lesson.Answers are found on the CCI microsite (ic3.ccilearning.com); you must be logged in as an instructor. Alternatively, if you received the instructor resources in electronic form, they will be located in the root folder.On completion of the Review Questions, have students navigate to the CCI microsite to begin the additional review there.