This document provides instructions on setting up a free email account and the basics of emailing. It recommends choosing from major email providers like Gmail, Yahoo, or Hotmail and explains how to set a username and password. The key parts of an email like the to, subject, and body are defined. It outlines how to send, receive, reply to, forward, and delete emails and how to be safe online by avoiding virus attachments or sharing private information. Netiquette tips are also provided along with reminding the reader to sign out when finished.
Definition, Mechanism, Format, Anatomy, Working with E-mail, Starting the email, Reading email, Composing email, Replying email, Deleting email, Exiting email, E-mail Protocols, Merits of E-mail, Limitation of E-mail etc.
Definition, Mechanism, Format, Anatomy, Working with E-mail, Starting the email, Reading email, Composing email, Replying email, Deleting email, Exiting email, E-mail Protocols, Merits of E-mail, Limitation of E-mail etc.
A device that computes, especially a programmable electronic machine that performs high-speed mathematical or logical operations or that assembles, stores, correlates, or otherwise processes information.
this is very good and easy to understand the basic things about electronic mail or simply e-mail. You can see the definition of e-mail, features and format of e-mail, email address and mail user agent and its sources.
This workshop is designed to teach the fundamentals of e-mail using Yahoo Mail - currently the largest supplier of free e-mails in the world. It is assumed that, at the beginning of this presentation, the student has setup an account.
A device that computes, especially a programmable electronic machine that performs high-speed mathematical or logical operations or that assembles, stores, correlates, or otherwise processes information.
this is very good and easy to understand the basic things about electronic mail or simply e-mail. You can see the definition of e-mail, features and format of e-mail, email address and mail user agent and its sources.
This workshop is designed to teach the fundamentals of e-mail using Yahoo Mail - currently the largest supplier of free e-mails in the world. It is assumed that, at the beginning of this presentation, the student has setup an account.
Benefits of email ! Batra Computer Centrejatin batra
Are you in search Basic Computer Training in Ambala? Now your search is end here BATRA COMPUTER provides best training in C, C++, S.E.O, web designing, web development and So much courses are available .
This SlideShare is a basic tutorial on how to use email. If you are unfamiliar with using email then this SlideShare will give you basic knowledge about Email.
First steps in learning how to use Email created for the Peer Technology Coaching Initiative - Older Adults and Access to Technology March 2016, Kitchener-Waterloo
Online Safety Data Privacy and Email Basics Digital Literacy Fundamentals a presentation by Ulak Matthew Thomas, a lecturer at Starford International University in Juba South Sudan
This presentation introduces memory on the computer. There are two types of storage discussed in this presentation which is Primary memory and Secondary memory. We also look at the basis on which memory is classified as well as the measuring units of storage on the computer. From the basic units the bits 1s/0s to units such as bytes, kilobytes and so on
SESSION 6 - Input Devices - Optical Scanners and Magnetic Ink Character Recog...Maxwell Musonda
This presentation exposes the learner to two types of scanners
Optical scanner - under which there are a number of scanners such as OMR, OCR and OBCR
MICR - Magnetic Ink Character Recognition
This presentation exposes the learner to the basic computer input devices, the keyboard and the mouse. The learner is introduced to the different types of keys found on the keyboard such as function keys, navigation keys, alphanumeric keys etc.
In this presentation we take a look at the development of computer generations and the technological advancements in computers for the first generation of computers to the fifth generation.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
2. What is email?
Short for electronic mail - Email
Send & receive messages over the internet
Must have an email account on-line.
3. What you need
a computer with internet access
an email account with a service provider such as
Yahoo, Gmail, Hotmail, etc
NOTE: Microsoft Outlook and Apple Mail, are
NOT email providers (which is why you can’t
email from library computers without an account)
4. Choosing an email provider
Most common are Hotmail (Microsoft), Gmail
(Google), Yahoo Mail (Yahoo!)
For this class, we’ll be using Yahoo
5. Setting up your account
Parts of an email address:
Username and domain
Example
snoopy@yahoo.com
user name : snoopy- you create your own - each
must be unique
@ symbol : unique to email addresses (Shift key
+ 2) Separates user name from domain
email provider’s name: yahoo
domain : .com - others could be .net or .org
6. Password
Something easy to remember, but difficult to guess
Do NOT use sensitive information, such as SSN,
bank PIN, etc.
Usually a combination of letters and numbers is
best
Verification questions in case you forget your
password may be required on accounts.
9. Yahoo.com
Click on “Create new account”
Be sure to have user name and password ready
Fill in as many blanks as required
When finished – “Create new Account”
http://yahoo.com
10. Let’s compose an email!
Click on NEW
Have email address ready for the person to receive
your email
11. Parts of an email
To : Enter the exact email address of your recipient
Remember: name@provider.domain
For multiple recipients, separate each address
with a comma (semi colon)
CC : carbon copy
BCC : BLIND carbon copy – is anonymous
Subject : the topic of your email – very important –
keep it brief and to the point.
12. Parts of an email
Body : the message of your email
Attachments : Use the ATTACH button for files or
photos or other emails
13. Sending an email
Communication can be tough with written
correspondence. No body language or facial cues
to help set the tone properly. Can be easily
misunderstood
Err on the side of too formal
Punctuation & spelling
Greeting & closing signature
ATTACH a file from a flash drive
ALWAYS - Spell-check & proofread!
14. Sending an email
Click on SEND to mail your letter
Message will now appear in your SENT folder
Once an email is sent, you cannot stop it or take it
back
Check your SENT box now
Check your inbox for your BCC
15. Draft Emails
Drafts:
When creating an e-mail the computer will
automatically save your work periodically. If for
any reason you should be interrupted (i.e. lapse
in internet connection) you can retrieve your
latest work in the DRAFT BOX.
16. Receiving email
If you have any messages you should see them
listed in your Inbox
At the top of each message is a header with
information about the sender, date, and routing of
each message.
17. Receiving email
From: snoopy@yahoo.com
To: you@yahoo.com
CC:
Subject: Email Basics class
Date:Tues, 1 March 2011 10:31 PST
18. Replying to an email
Reply vs Reply All
When you click on Reply, your message will
automatically be sent to the person who sent
you the email (FROM field in header.)
When you click on Reply All, your message will
automatically be sent to the person who sent
you the email AND everyone in the CC fields in
the header.
19. Forwarding an email
When you click on FORWARD, you may share the
email you’ve received by sending it to others.
You may add your own message before sending.
Enter the TO’s and CC’s if using
Click on SEND
20. Opening attachments
Usually photos or documents are attached
If you don’t know the sender, do NOT open the
attachment(s)
SAVE vs OPEN the attachment FILE dialog box
21. Deleting email
Once you’ve read an email, you should decide if
you want to save/file it or delete it.
Click on delete to send the email to the TRASH
CAN(delete folder)
The message disappears from your list of
messages but is not truly deleted, so if you make a
mistake you can get the message back – look in
the trash folder.
22. Deleting email
Once you exit the program, the messages are
usually deleted for good.
24. Privacy, viruses, & spam
Privacy: CC vs BCC
Viruses: Never open attachments from unknown
senders.
Safety: Never send personal financial information
via email, even if it looks like a legitimate request
from your bank or financial institution.
Spam: unsolicited commercial email
Delete - Click on Report Spam
SPAM BOX on Yahoo
25. Chatting
Chatting
This is real-time communication with no delay.
Usually done with those you know online. Be
selective who you chat with. As with spam and
phishing, scams can occur with chatting as well
27. Signing off
Be sure to log off the account before shutting down
28. Next Steps
Visit the Computer Coaches
Most hours that the library is open
Hours are subject to change. Please call ahead
to confirm: 714-842-4481 ext. 6
Don’t forget that we’re here to help!
Good luck!