SlideShare a Scribd company logo
1 
Lesson 26 
Communications and Collaboration 
Computer Literacy 
BASICS: A 
Comprehensive Guide 
to IC3, 3rd Edition 
Morrison / Wells
Lesson 26 
Objectives 
 Identify appropriate uses for different 
communication methods. 
 Identify the advantages of electronic 
communications. 
 Identify common problems associated with 
electronic communications. 
 Identify the elements of professional and 
effective electronic communications. 
2 Morrison / Wells CLB: A Comp Guide to IC3 3E
Lesson 26 
Objectives (continued) 
 Identify appropriate use of e-mail attachments 
and other supplementary information. 
 Identify issues regarding unsolicited e-mail. 
 Describe how to minimize or control 
unsolicited e-mail. 
 Identify effective procedures for ensuring the 
safe and effective use of electronic 
communications. 
3 Morrison / Wells CLB: A Comp Guide to IC3 3E
Lesson 26 
Vocabulary 
 biometric security 
measures 
 filtering 
 fraud 
 hoax 
 logic bomb 
 netiquette 
 phishing 
 pyramid schemes 
 RDF Summary 
 spam 
 tagging 
 teleconferencing 
 time bomb 
 Trojan horse 
 urban legend 
 virus 
 worm 
Morrison / Wells CLB: A Comp Guide to IC3 3E 
4
Lesson 26 
Communication Methods 
 E-mail is best when the correspondence requires a 
paper trail, covers multiple points, and needs to be 
accessed frequently. 
 Instant messaging is best when the correspondence 
needs to be in real time. 
 Teleconferencing permits the live exchange and 
sharing of information between two or more people. 
 RDF Summary is a format used to share the content 
of blogs. 
Morrison / Wells CLB: A Comp Guide to IC3 3E 
5
Lesson 26 
Advantages of Electronic 
Communications 
– Not restricted to time and space 
– Uses text and graphics rather than voice 
– Speed is almost instantaneous 
– Cost is minimal or even free 
– Access is available from various devices 
– Forwarding and routing can be accomplished 
– Collaborative communication allows interaction 
– Community building connects group members 
– Online document sharing possible 
Morrison / Wells CLB: A Comp Guide to IC3 3E 
6
Lesson 26 
Solving Communication Problems 
 Troubleshooting tools help identify problems. 
 Lost Internet Connection: 
 The Network Connection Repair tool can 
help. 
Morrison / Wells CLB: A Comp Guide to IC3 3E 
7 
Windows Network Diagnostics dialog box
Lesson 26 
Solving Communication Problems 
(continued) 
 E-Mail Software 
Problems: 
 Windows Help 
and Support 
provides 
answers. 
Morrison / Wells CLB: A Comp Guide to IC3 3E 
8 
Troubleshoot problems with Windows Mail window
Lesson 26 
Solving Communication Problems 
(continued) 
 Downloading and Viewing E-Mail Attachment 
Problems: 
 Could be due to attachment size, a virus, or the 
sender may be blocked. 
 Delivery Failure: 
 E-mail can “bounce” because the address was 
mistyped; it may have a virus; it was identified as 
spam; the sender is blocked; or the mailbox is full. 
Morrison / Wells CLB: A Comp Guide to IC3 3E 
9
Lesson 26 
Solving Communication Problems 
(continued) 
 Garbled Messages/No Guaranteed 
Delivery: 
 Occasionally e-mail and other transmissions 
over the Internet are lost or spliced together. 
 Lost Formatting: 
 If the recipient’s e-mail program does not 
support HTML, the message will display as 
plain text. 
Morrison / Wells CLB: A Comp Guide to IC3 3E 
10
Lesson 26 
Solving Communication Problems 
(continued) 
 Lack of a Paper Trail: 
 Paper trails have been used in legal cases 
for evidence proof and in other situations. 
 Some types of electronic communications do 
not produce a paper trail. 
 Hasty Responses: 
 Avoid sending messages you may later 
regret. 
Morrison / Wells CLB: A Comp Guide to IC3 3E 
11
Lesson 26 
Professional Versus Informal 
Communication 
 Volume of E-mail Replies: 
 Communication netiquette refers to good manners 
and proper behaviors when communicating through 
electronic media. 
 Use guidelines when replying to messages. 
 Junk Mail (Spam): 
 Prevent by using caution giving out your e-mail 
address; checking Web site privacy statements; not 
replying to junk e-mail; and using a filter. 
Morrison / Wells CLB: A Comp Guide to IC3 3E 
12
Lesson 26 
Fraud, Hoaxes, and Other False 
Information 
 This type of computer crime involves the manipulation 
of a computer or computer data in order to dishonestly 
obtain money, property, information, or other things of 
value, or to cause loss. 
 E-Mail Fraud: 
 Phishing involves sending messages that appear to 
come from legitimate sources asking to update or 
verify personal information, are in fact used to commit 
identity theft. 
 Pyramid schemes are an illicit business model. 
Morrison / Wells CLB: A Comp Guide to IC3 3E 
13
Lesson 26 
Fraud, Hoaxes, and Other False 
Information (continued) 
 Hoaxes: 
 A hoax is an attempt to deceive an audience 
into believing that something false is real. 
 Urban legends are stories that at one time 
could have been partially true, but have 
grown from constant retelling into mythical 
yarn. 
Morrison / Wells CLB: A Comp Guide to IC3 3E 
14
Lesson 26 
Viruses and Security 
 Viruses: 
 A virus is a program that has been written, 
usually by a hacker, to cause corruption of 
data on a computer. Types include: 
– Worm 
– Time bomb 
– Logic bomb 
– Trojan horse 
Morrison / Wells CLB: A Comp Guide to IC3 3E 
15
Lesson 26 
Viruses and Security (continued) 
 Viruses (cont): 
 How a virus can spread 
Morrison / Wells CLB: A Comp Guide to IC3 3E 
16
Lesson 26 
General Security Risks 
 The best way to protect data is to effectively 
control access using passwords, electronic 
identification cards, firewalls, and antivirus 
software. 
 Use precautions by instituting a selective 
hiring process, regularly backing up data, 
and employing biometric security measures. 
Morrison / Wells CLB: A Comp Guide to IC3 3E 
17
Lesson 26 
Professional and Effective 
Communications 
 Rules of etiquette and formality apply to 
business communications. 
 Consider whether the type of communication 
is business, social, or professional. 
 The purpose and the recipients of the 
message will determine the level of formality. 
Morrison / Wells CLB: A Comp Guide to IC3 3E 
18
Lesson 26 
Other E-Mail Options 
 Attachments and hyperlinks can be added to e-mail 
messages. 
 Controlling Unsolicited E-Mail: 
 Filtering allows you to define rules to manage 
incoming e-mail by sorting, tagging, forwarding, and 
deleting messages. 
 Filtering Mail by Mail Servers: 
 Software filtering can cut down or eliminate most junk 
mail. 
Morrison / Wells CLB: A Comp Guide to IC3 3E 
19
Lesson 26 
Guidelines for Electronic 
Communications 
 A checklist of guidelines for electronic 
communications: 
– Attachments should be checked for viruses. 
– Review communication prior to sending 
– Understand and apply rules of netiquette 
– Encrypt messages 
– Filter messages 
– Back up and archive regularly 
– Be aware of leaving an “electronic trail” 
– Follow school and company guidelines 
Morrison / Wells CLB: A Comp Guide to IC3 3E 
20
Lesson 26 
Summary 
In this lesson, you learned: 
 Teleconferencing uses a telecommunications 
system to serve groups, permitting the live 
exchange and sharing of information between 
two or more people. 
 Syndication (Really Simple Syndication or RSS), 
also known as Rich Site Summary and RDF 
Summary, are formats originally developed to 
facilitate the syndication of news articles. 
21 
Morrison / Wells CLB: A Comp Guide to IC3 3E
Lesson 26 
Summary (continued) 
 Electronic communication offers many advantages. The 
communication is not restricted to a specific place and 
time. Secondly, in most instances, it uses text and 
graphics rather than voice. These tools also provide for 
different types of correspondence such as one to one, 
one to many, or many to many. 
 Typical communication problems include failing to 
connect to the Internet or to your e-mail server. Being 
unable to download or view an e-mail attachment could 
be due to the size of the attachment, a virus in the 
message, or the sender and the type of e-mail. 
22 
Morrison / Wells CLB: A Comp Guide to IC3 3E
Lesson 26 
Summary (continued) 
 Communications netiquette, a combination of the 
words net and etiquette, refers to good manners 
and proper behaviors when communicating 
through electronic media. 
 Fraud and false information are computer crimes 
that involve the manipulation of a computer or 
computer data in order to dishonestly obtain 
money, property, or other value or to cause loss. 
23 
Morrison / Wells CLB: A Comp Guide to IC3 3E
Lesson 26 
Summary (continued) 
 A virus is a program that has been written, 
usually by a hacker, to cause corruption of data 
on a computer. The virus is attached to a file and 
then spreads from one file to another once the 
program is executed. 
 Computer security is necessary in order to keep 
hardware, software, and data safe from harm or 
destruction. The best way to protect data is to 
effectively control access. 
24 
Morrison / Wells CLB: A Comp Guide to IC3 3E

More Related Content

What's hot

Computer Literacy Lesson 26
Computer Literacy Lesson 26Computer Literacy Lesson 26
Computer Literacy Lesson 26
cpashke
 
Lesson 25
Lesson 25Lesson 25
Lesson 25
Tracie King
 
Computer Literacy Lesson 24
Computer Literacy Lesson 24Computer Literacy Lesson 24
Computer Literacy Lesson 24
cpashke
 
Computer Literacy Lesson 29
Computer Literacy Lesson 29Computer Literacy Lesson 29
Computer Literacy Lesson 29
cpashke
 
Computer Literacy Lesson 28
Computer Literacy Lesson 28Computer Literacy Lesson 28
Computer Literacy Lesson 28
cpashke
 
Computer Literacy Lesson 6
Computer Literacy Lesson 6Computer Literacy Lesson 6
Computer Literacy Lesson 6
cpashke
 
Lesson 28
Lesson 28Lesson 28
Lesson 28
Tracie King
 
Computer Literacy Lesson 1: Computer and Operating Systems
Computer Literacy Lesson 1: Computer and Operating SystemsComputer Literacy Lesson 1: Computer and Operating Systems
Computer Literacy Lesson 1: Computer and Operating Systems
cpashke
 
3.1 Network Basic
3.1 Network Basic3.1 Network Basic
3.1 Network Basic
Fizaril Amzari Omar
 
3.2.1 The Internet
3.2.1 The Internet3.2.1 The Internet
3.2.1 The Internet
Fizaril Amzari Omar
 
Computer Literacy Lesson 28
Computer Literacy Lesson 28Computer Literacy Lesson 28
Computer Literacy Lesson 28
cpashke
 
Input and Output Devices worksheet
Input and Output Devices worksheetInput and Output Devices worksheet
Input and Output Devices worksheet
masharks
 
PST SC015 Chapter 3 Internet Technology (II) 2017/2018
PST SC015 Chapter 3 Internet Technology (II)  2017/2018PST SC015 Chapter 3 Internet Technology (II)  2017/2018
PST SC015 Chapter 3 Internet Technology (II) 2017/2018
Fizaril Amzari Omar
 
IT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for MidtermIT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for Midterm
Mark John Lado, MIT
 
All Chapter
All ChapterAll Chapter
All Chapter
Sumon Paul
 
Punit kumar
Punit kumarPunit kumar
Punit kumar
Punit Kumar
 
Synopsis
SynopsisSynopsis
Synopsis
Kak Yong
 
computer Unit 9
computer Unit 9computer Unit 9
computer Unit 9
Aqeel Rehman
 
Computer Worksheet Class 8 with answers
Computer Worksheet Class 8 with answersComputer Worksheet Class 8 with answers
Computer Worksheet Class 8 with answers
Alithea Barbosa
 
amaha internet course
amaha internet courseamaha internet course
amaha internet course
Amaha Z Egziabeher Alemayehu
 

What's hot (20)

Computer Literacy Lesson 26
Computer Literacy Lesson 26Computer Literacy Lesson 26
Computer Literacy Lesson 26
 
Lesson 25
Lesson 25Lesson 25
Lesson 25
 
Computer Literacy Lesson 24
Computer Literacy Lesson 24Computer Literacy Lesson 24
Computer Literacy Lesson 24
 
Computer Literacy Lesson 29
Computer Literacy Lesson 29Computer Literacy Lesson 29
Computer Literacy Lesson 29
 
Computer Literacy Lesson 28
Computer Literacy Lesson 28Computer Literacy Lesson 28
Computer Literacy Lesson 28
 
Computer Literacy Lesson 6
Computer Literacy Lesson 6Computer Literacy Lesson 6
Computer Literacy Lesson 6
 
Lesson 28
Lesson 28Lesson 28
Lesson 28
 
Computer Literacy Lesson 1: Computer and Operating Systems
Computer Literacy Lesson 1: Computer and Operating SystemsComputer Literacy Lesson 1: Computer and Operating Systems
Computer Literacy Lesson 1: Computer and Operating Systems
 
3.1 Network Basic
3.1 Network Basic3.1 Network Basic
3.1 Network Basic
 
3.2.1 The Internet
3.2.1 The Internet3.2.1 The Internet
3.2.1 The Internet
 
Computer Literacy Lesson 28
Computer Literacy Lesson 28Computer Literacy Lesson 28
Computer Literacy Lesson 28
 
Input and Output Devices worksheet
Input and Output Devices worksheetInput and Output Devices worksheet
Input and Output Devices worksheet
 
PST SC015 Chapter 3 Internet Technology (II) 2017/2018
PST SC015 Chapter 3 Internet Technology (II)  2017/2018PST SC015 Chapter 3 Internet Technology (II)  2017/2018
PST SC015 Chapter 3 Internet Technology (II) 2017/2018
 
IT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for MidtermIT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for Midterm
 
All Chapter
All ChapterAll Chapter
All Chapter
 
Punit kumar
Punit kumarPunit kumar
Punit kumar
 
Synopsis
SynopsisSynopsis
Synopsis
 
computer Unit 9
computer Unit 9computer Unit 9
computer Unit 9
 
Computer Worksheet Class 8 with answers
Computer Worksheet Class 8 with answersComputer Worksheet Class 8 with answers
Computer Worksheet Class 8 with answers
 
amaha internet course
amaha internet courseamaha internet course
amaha internet course
 

Viewers also liked

Computer Literacy Lesson 25
Computer Literacy Lesson 25Computer Literacy Lesson 25
Computer Literacy Lesson 25
cpashke
 
Computer Literacy Lesson 18
Computer Literacy Lesson 18Computer Literacy Lesson 18
Computer Literacy Lesson 18
cpashke
 
Computer Literacy Lesson 23
Computer Literacy Lesson 23Computer Literacy Lesson 23
Computer Literacy Lesson 23
cpashke
 
Computer Literacy Lesson 29
Computer Literacy Lesson 29Computer Literacy Lesson 29
Computer Literacy Lesson 29
cpashke
 
Computer Literacy Lesson 20
Computer Literacy Lesson 20Computer Literacy Lesson 20
Computer Literacy Lesson 20
cpashke
 
Computer Literacy Lesson 17
Computer Literacy Lesson 17Computer Literacy Lesson 17
Computer Literacy Lesson 17
cpashke
 
Computer Literacy Lesson 30
Computer Literacy Lesson 30Computer Literacy Lesson 30
Computer Literacy Lesson 30
cpashke
 
Computer Literacy Lesson 21
Computer Literacy Lesson 21Computer Literacy Lesson 21
Computer Literacy Lesson 21
cpashke
 
Computer Literacy Lesson 22
Computer Literacy Lesson 22Computer Literacy Lesson 22
Computer Literacy Lesson 22
cpashke
 
Computer Literacy Lesson 13
Computer Literacy Lesson 13Computer Literacy Lesson 13
Computer Literacy Lesson 13
cpashke
 
Computer Literacy Lesson 14
Computer Literacy Lesson 14Computer Literacy Lesson 14
Computer Literacy Lesson 14
cpashke
 
Computer Literacy Lesson 10
Computer Literacy Lesson 10Computer Literacy Lesson 10
Computer Literacy Lesson 10
cpashke
 
Computer Literacy Lesson 11
Computer Literacy Lesson 11Computer Literacy Lesson 11
Computer Literacy Lesson 11
cpashke
 
Computer Literacy Lesson 12
Computer Literacy Lesson 12Computer Literacy Lesson 12
Computer Literacy Lesson 12
cpashke
 
Computer Literacy Lesson 15
Computer Literacy Lesson 15Computer Literacy Lesson 15
Computer Literacy Lesson 15
cpashke
 
Computer Literacy Lesson 16
Computer Literacy Lesson 16Computer Literacy Lesson 16
Computer Literacy Lesson 16
cpashke
 
Computer Literacy Lesson 19
Computer Literacy Lesson 19Computer Literacy Lesson 19
Computer Literacy Lesson 19
cpashke
 

Viewers also liked (17)

Computer Literacy Lesson 25
Computer Literacy Lesson 25Computer Literacy Lesson 25
Computer Literacy Lesson 25
 
Computer Literacy Lesson 18
Computer Literacy Lesson 18Computer Literacy Lesson 18
Computer Literacy Lesson 18
 
Computer Literacy Lesson 23
Computer Literacy Lesson 23Computer Literacy Lesson 23
Computer Literacy Lesson 23
 
Computer Literacy Lesson 29
Computer Literacy Lesson 29Computer Literacy Lesson 29
Computer Literacy Lesson 29
 
Computer Literacy Lesson 20
Computer Literacy Lesson 20Computer Literacy Lesson 20
Computer Literacy Lesson 20
 
Computer Literacy Lesson 17
Computer Literacy Lesson 17Computer Literacy Lesson 17
Computer Literacy Lesson 17
 
Computer Literacy Lesson 30
Computer Literacy Lesson 30Computer Literacy Lesson 30
Computer Literacy Lesson 30
 
Computer Literacy Lesson 21
Computer Literacy Lesson 21Computer Literacy Lesson 21
Computer Literacy Lesson 21
 
Computer Literacy Lesson 22
Computer Literacy Lesson 22Computer Literacy Lesson 22
Computer Literacy Lesson 22
 
Computer Literacy Lesson 13
Computer Literacy Lesson 13Computer Literacy Lesson 13
Computer Literacy Lesson 13
 
Computer Literacy Lesson 14
Computer Literacy Lesson 14Computer Literacy Lesson 14
Computer Literacy Lesson 14
 
Computer Literacy Lesson 10
Computer Literacy Lesson 10Computer Literacy Lesson 10
Computer Literacy Lesson 10
 
Computer Literacy Lesson 11
Computer Literacy Lesson 11Computer Literacy Lesson 11
Computer Literacy Lesson 11
 
Computer Literacy Lesson 12
Computer Literacy Lesson 12Computer Literacy Lesson 12
Computer Literacy Lesson 12
 
Computer Literacy Lesson 15
Computer Literacy Lesson 15Computer Literacy Lesson 15
Computer Literacy Lesson 15
 
Computer Literacy Lesson 16
Computer Literacy Lesson 16Computer Literacy Lesson 16
Computer Literacy Lesson 16
 
Computer Literacy Lesson 19
Computer Literacy Lesson 19Computer Literacy Lesson 19
Computer Literacy Lesson 19
 

Similar to Computer Literacy Lesson 26

Computer Literacy Lesson 31
Computer Literacy Lesson 31Computer Literacy Lesson 31
Computer Literacy Lesson 31
cpashke
 
Cybercrimes
CybercrimesCybercrimes
Security AwarenessChapter 3Internet Security1S.docx
Security AwarenessChapter 3Internet Security1S.docxSecurity AwarenessChapter 3Internet Security1S.docx
Security AwarenessChapter 3Internet Security1S.docx
kenjordan97598
 
A review of spam filtering and measures of antispam
A review of spam filtering and measures of antispamA review of spam filtering and measures of antispam
A review of spam filtering and measures of antispam
Alexander Decker
 
Data Communication Networking Issues in Real World
Data Communication Networking Issues in Real World Data Communication Networking Issues in Real World
Data Communication Networking Issues in Real World
Thamalsha Wijayarathna
 
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEYPHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
IJNSA Journal
 
SULTHAN's ICT-2 for UG courses
SULTHAN's ICT-2 for UG coursesSULTHAN's ICT-2 for UG courses
SULTHAN's ICT-2 for UG courses
SULTHAN BASHA
 
Cyber security and emails presentation
Cyber security and emails presentationCyber security and emails presentation
Cyber security and emails presentation
Wan Solo
 
E-mail and Instant MessagingChapter 16Principles of Co.docx
E-mail and Instant MessagingChapter 16Principles of Co.docxE-mail and Instant MessagingChapter 16Principles of Co.docx
E-mail and Instant MessagingChapter 16Principles of Co.docx
brownliecarmella
 
The Detection of Suspicious Email Based on Decision Tree ...
The Detection of Suspicious Email Based on Decision Tree                     ...The Detection of Suspicious Email Based on Decision Tree                     ...
The Detection of Suspicious Email Based on Decision Tree ...
IRJET Journal
 
L5_Electronic communication.pptx
L5_Electronic communication.pptxL5_Electronic communication.pptx
L5_Electronic communication.pptx
enukahansana
 
Cmc in education
Cmc in educationCmc in education
Cmc in education
AncyMolMA
 
Digital literacy 2
Digital literacy 2Digital literacy 2
Digital literacy 2
mj_jamal
 
Lesson 03
Lesson 03Lesson 03
Lesson 03
Tracie King
 
Data Communication Networking Issues in Real World
Data Communication Networking Issues in Real WorldData Communication Networking Issues in Real World
Data Communication Networking Issues in Real World
Thamalsha Wijayarathna
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Editor IJCATR
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Editor IJCATR
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Editor IJCATR
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Editor IJCATR
 
Cyber security and emails presentation refined
Cyber security and emails presentation refinedCyber security and emails presentation refined
Cyber security and emails presentation refined
Wan Solo
 

Similar to Computer Literacy Lesson 26 (20)

Computer Literacy Lesson 31
Computer Literacy Lesson 31Computer Literacy Lesson 31
Computer Literacy Lesson 31
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Security AwarenessChapter 3Internet Security1S.docx
Security AwarenessChapter 3Internet Security1S.docxSecurity AwarenessChapter 3Internet Security1S.docx
Security AwarenessChapter 3Internet Security1S.docx
 
A review of spam filtering and measures of antispam
A review of spam filtering and measures of antispamA review of spam filtering and measures of antispam
A review of spam filtering and measures of antispam
 
Data Communication Networking Issues in Real World
Data Communication Networking Issues in Real World Data Communication Networking Issues in Real World
Data Communication Networking Issues in Real World
 
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEYPHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
 
SULTHAN's ICT-2 for UG courses
SULTHAN's ICT-2 for UG coursesSULTHAN's ICT-2 for UG courses
SULTHAN's ICT-2 for UG courses
 
Cyber security and emails presentation
Cyber security and emails presentationCyber security and emails presentation
Cyber security and emails presentation
 
E-mail and Instant MessagingChapter 16Principles of Co.docx
E-mail and Instant MessagingChapter 16Principles of Co.docxE-mail and Instant MessagingChapter 16Principles of Co.docx
E-mail and Instant MessagingChapter 16Principles of Co.docx
 
The Detection of Suspicious Email Based on Decision Tree ...
The Detection of Suspicious Email Based on Decision Tree                     ...The Detection of Suspicious Email Based on Decision Tree                     ...
The Detection of Suspicious Email Based on Decision Tree ...
 
L5_Electronic communication.pptx
L5_Electronic communication.pptxL5_Electronic communication.pptx
L5_Electronic communication.pptx
 
Cmc in education
Cmc in educationCmc in education
Cmc in education
 
Digital literacy 2
Digital literacy 2Digital literacy 2
Digital literacy 2
 
Lesson 03
Lesson 03Lesson 03
Lesson 03
 
Data Communication Networking Issues in Real World
Data Communication Networking Issues in Real WorldData Communication Networking Issues in Real World
Data Communication Networking Issues in Real World
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
 
Cyber security and emails presentation refined
Cyber security and emails presentation refinedCyber security and emails presentation refined
Cyber security and emails presentation refined
 

More from cpashke

Chapter4
Chapter4Chapter4
Chapter4
cpashke
 
Chapter3
Chapter3Chapter3
Chapter3
cpashke
 
Web Design Chapter3
Web Design Chapter3Web Design Chapter3
Web Design Chapter3
cpashke
 
Pscs6 ch09 ppt
Pscs6 ch09 pptPscs6 ch09 ppt
Pscs6 ch09 ppt
cpashke
 
Pscs6 ch08 ppt
Pscs6 ch08 pptPscs6 ch08 ppt
Pscs6 ch08 ppt
cpashke
 
Pscs6 ch07 ppt
Pscs6 ch07 pptPscs6 ch07 ppt
Pscs6 ch07 ppt
cpashke
 
Pscs6 ch06 ppt
Pscs6 ch06 pptPscs6 ch06 ppt
Pscs6 ch06 ppt
cpashke
 
Photo ch05 ppt
Photo ch05 pptPhoto ch05 ppt
Photo ch05 ppt
cpashke
 
PS cs6 ch04 ppt
PS cs6 ch04 pptPS cs6 ch04 ppt
PS cs6 ch04 ppt
cpashke
 
Lesson 2 Importing media
Lesson 2 Importing mediaLesson 2 Importing media
Lesson 2 Importing media
cpashke
 
Exploring Movie Maker
Exploring Movie MakerExploring Movie Maker
Exploring Movie Maker
cpashke
 
Computer Literacy Lesson 24
Computer Literacy Lesson 24Computer Literacy Lesson 24
Computer Literacy Lesson 24
cpashke
 

More from cpashke (12)

Chapter4
Chapter4Chapter4
Chapter4
 
Chapter3
Chapter3Chapter3
Chapter3
 
Web Design Chapter3
Web Design Chapter3Web Design Chapter3
Web Design Chapter3
 
Pscs6 ch09 ppt
Pscs6 ch09 pptPscs6 ch09 ppt
Pscs6 ch09 ppt
 
Pscs6 ch08 ppt
Pscs6 ch08 pptPscs6 ch08 ppt
Pscs6 ch08 ppt
 
Pscs6 ch07 ppt
Pscs6 ch07 pptPscs6 ch07 ppt
Pscs6 ch07 ppt
 
Pscs6 ch06 ppt
Pscs6 ch06 pptPscs6 ch06 ppt
Pscs6 ch06 ppt
 
Photo ch05 ppt
Photo ch05 pptPhoto ch05 ppt
Photo ch05 ppt
 
PS cs6 ch04 ppt
PS cs6 ch04 pptPS cs6 ch04 ppt
PS cs6 ch04 ppt
 
Lesson 2 Importing media
Lesson 2 Importing mediaLesson 2 Importing media
Lesson 2 Importing media
 
Exploring Movie Maker
Exploring Movie MakerExploring Movie Maker
Exploring Movie Maker
 
Computer Literacy Lesson 24
Computer Literacy Lesson 24Computer Literacy Lesson 24
Computer Literacy Lesson 24
 

Recently uploaded

PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 

Recently uploaded (20)

PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 

Computer Literacy Lesson 26

  • 1. 1 Lesson 26 Communications and Collaboration Computer Literacy BASICS: A Comprehensive Guide to IC3, 3rd Edition Morrison / Wells
  • 2. Lesson 26 Objectives  Identify appropriate uses for different communication methods.  Identify the advantages of electronic communications.  Identify common problems associated with electronic communications.  Identify the elements of professional and effective electronic communications. 2 Morrison / Wells CLB: A Comp Guide to IC3 3E
  • 3. Lesson 26 Objectives (continued)  Identify appropriate use of e-mail attachments and other supplementary information.  Identify issues regarding unsolicited e-mail.  Describe how to minimize or control unsolicited e-mail.  Identify effective procedures for ensuring the safe and effective use of electronic communications. 3 Morrison / Wells CLB: A Comp Guide to IC3 3E
  • 4. Lesson 26 Vocabulary  biometric security measures  filtering  fraud  hoax  logic bomb  netiquette  phishing  pyramid schemes  RDF Summary  spam  tagging  teleconferencing  time bomb  Trojan horse  urban legend  virus  worm Morrison / Wells CLB: A Comp Guide to IC3 3E 4
  • 5. Lesson 26 Communication Methods  E-mail is best when the correspondence requires a paper trail, covers multiple points, and needs to be accessed frequently.  Instant messaging is best when the correspondence needs to be in real time.  Teleconferencing permits the live exchange and sharing of information between two or more people.  RDF Summary is a format used to share the content of blogs. Morrison / Wells CLB: A Comp Guide to IC3 3E 5
  • 6. Lesson 26 Advantages of Electronic Communications – Not restricted to time and space – Uses text and graphics rather than voice – Speed is almost instantaneous – Cost is minimal or even free – Access is available from various devices – Forwarding and routing can be accomplished – Collaborative communication allows interaction – Community building connects group members – Online document sharing possible Morrison / Wells CLB: A Comp Guide to IC3 3E 6
  • 7. Lesson 26 Solving Communication Problems  Troubleshooting tools help identify problems.  Lost Internet Connection:  The Network Connection Repair tool can help. Morrison / Wells CLB: A Comp Guide to IC3 3E 7 Windows Network Diagnostics dialog box
  • 8. Lesson 26 Solving Communication Problems (continued)  E-Mail Software Problems:  Windows Help and Support provides answers. Morrison / Wells CLB: A Comp Guide to IC3 3E 8 Troubleshoot problems with Windows Mail window
  • 9. Lesson 26 Solving Communication Problems (continued)  Downloading and Viewing E-Mail Attachment Problems:  Could be due to attachment size, a virus, or the sender may be blocked.  Delivery Failure:  E-mail can “bounce” because the address was mistyped; it may have a virus; it was identified as spam; the sender is blocked; or the mailbox is full. Morrison / Wells CLB: A Comp Guide to IC3 3E 9
  • 10. Lesson 26 Solving Communication Problems (continued)  Garbled Messages/No Guaranteed Delivery:  Occasionally e-mail and other transmissions over the Internet are lost or spliced together.  Lost Formatting:  If the recipient’s e-mail program does not support HTML, the message will display as plain text. Morrison / Wells CLB: A Comp Guide to IC3 3E 10
  • 11. Lesson 26 Solving Communication Problems (continued)  Lack of a Paper Trail:  Paper trails have been used in legal cases for evidence proof and in other situations.  Some types of electronic communications do not produce a paper trail.  Hasty Responses:  Avoid sending messages you may later regret. Morrison / Wells CLB: A Comp Guide to IC3 3E 11
  • 12. Lesson 26 Professional Versus Informal Communication  Volume of E-mail Replies:  Communication netiquette refers to good manners and proper behaviors when communicating through electronic media.  Use guidelines when replying to messages.  Junk Mail (Spam):  Prevent by using caution giving out your e-mail address; checking Web site privacy statements; not replying to junk e-mail; and using a filter. Morrison / Wells CLB: A Comp Guide to IC3 3E 12
  • 13. Lesson 26 Fraud, Hoaxes, and Other False Information  This type of computer crime involves the manipulation of a computer or computer data in order to dishonestly obtain money, property, information, or other things of value, or to cause loss.  E-Mail Fraud:  Phishing involves sending messages that appear to come from legitimate sources asking to update or verify personal information, are in fact used to commit identity theft.  Pyramid schemes are an illicit business model. Morrison / Wells CLB: A Comp Guide to IC3 3E 13
  • 14. Lesson 26 Fraud, Hoaxes, and Other False Information (continued)  Hoaxes:  A hoax is an attempt to deceive an audience into believing that something false is real.  Urban legends are stories that at one time could have been partially true, but have grown from constant retelling into mythical yarn. Morrison / Wells CLB: A Comp Guide to IC3 3E 14
  • 15. Lesson 26 Viruses and Security  Viruses:  A virus is a program that has been written, usually by a hacker, to cause corruption of data on a computer. Types include: – Worm – Time bomb – Logic bomb – Trojan horse Morrison / Wells CLB: A Comp Guide to IC3 3E 15
  • 16. Lesson 26 Viruses and Security (continued)  Viruses (cont):  How a virus can spread Morrison / Wells CLB: A Comp Guide to IC3 3E 16
  • 17. Lesson 26 General Security Risks  The best way to protect data is to effectively control access using passwords, electronic identification cards, firewalls, and antivirus software.  Use precautions by instituting a selective hiring process, regularly backing up data, and employing biometric security measures. Morrison / Wells CLB: A Comp Guide to IC3 3E 17
  • 18. Lesson 26 Professional and Effective Communications  Rules of etiquette and formality apply to business communications.  Consider whether the type of communication is business, social, or professional.  The purpose and the recipients of the message will determine the level of formality. Morrison / Wells CLB: A Comp Guide to IC3 3E 18
  • 19. Lesson 26 Other E-Mail Options  Attachments and hyperlinks can be added to e-mail messages.  Controlling Unsolicited E-Mail:  Filtering allows you to define rules to manage incoming e-mail by sorting, tagging, forwarding, and deleting messages.  Filtering Mail by Mail Servers:  Software filtering can cut down or eliminate most junk mail. Morrison / Wells CLB: A Comp Guide to IC3 3E 19
  • 20. Lesson 26 Guidelines for Electronic Communications  A checklist of guidelines for electronic communications: – Attachments should be checked for viruses. – Review communication prior to sending – Understand and apply rules of netiquette – Encrypt messages – Filter messages – Back up and archive regularly – Be aware of leaving an “electronic trail” – Follow school and company guidelines Morrison / Wells CLB: A Comp Guide to IC3 3E 20
  • 21. Lesson 26 Summary In this lesson, you learned:  Teleconferencing uses a telecommunications system to serve groups, permitting the live exchange and sharing of information between two or more people.  Syndication (Really Simple Syndication or RSS), also known as Rich Site Summary and RDF Summary, are formats originally developed to facilitate the syndication of news articles. 21 Morrison / Wells CLB: A Comp Guide to IC3 3E
  • 22. Lesson 26 Summary (continued)  Electronic communication offers many advantages. The communication is not restricted to a specific place and time. Secondly, in most instances, it uses text and graphics rather than voice. These tools also provide for different types of correspondence such as one to one, one to many, or many to many.  Typical communication problems include failing to connect to the Internet or to your e-mail server. Being unable to download or view an e-mail attachment could be due to the size of the attachment, a virus in the message, or the sender and the type of e-mail. 22 Morrison / Wells CLB: A Comp Guide to IC3 3E
  • 23. Lesson 26 Summary (continued)  Communications netiquette, a combination of the words net and etiquette, refers to good manners and proper behaviors when communicating through electronic media.  Fraud and false information are computer crimes that involve the manipulation of a computer or computer data in order to dishonestly obtain money, property, or other value or to cause loss. 23 Morrison / Wells CLB: A Comp Guide to IC3 3E
  • 24. Lesson 26 Summary (continued)  A virus is a program that has been written, usually by a hacker, to cause corruption of data on a computer. The virus is attached to a file and then spreads from one file to another once the program is executed.  Computer security is necessary in order to keep hardware, software, and data safe from harm or destruction. The best way to protect data is to effectively control access. 24 Morrison / Wells CLB: A Comp Guide to IC3 3E