SlideShare a Scribd company logo
1 of 5
Picture Emailing Emma Hoggett
Background Picture emailing has become more and more popular and is a simple way of sharing images. Many use email to share images with family, friends, colleagues and so on. 
Stage 1 Stage 1: Firstly you choose the name of the recipient wishing to send to. You then  click the button highlighted attachments in your email and a box appears with all your files on your computer. You then click on the image you wish to send and click the choose button.
Stage 2     You then write any messages in the box below like any normal email and the email is ready to send.
Here is the image sent to the recipient. Its quick, simple and an effective way of sharing photos.

More Related Content

Viewers also liked

Bluetooth pres 1
Bluetooth pres 1Bluetooth pres 1
Bluetooth pres 1
hoggette4
 
Northside college prep elizabet powerpoint
Northside college prep elizabet powerpointNorthside college prep elizabet powerpoint
Northside college prep elizabet powerpoint
crazyelizabet
 
Performance analysis of wimax mobile
Performance analysis of wimax mobilePerformance analysis of wimax mobile
Performance analysis of wimax mobile
Aatzaz Latif
 
Nima the case 2012 dirk van lier rockpanel online marketing
Nima the case 2012 dirk van lier   rockpanel online marketingNima the case 2012 dirk van lier   rockpanel online marketing
Nima the case 2012 dirk van lier rockpanel online marketing
Dirk van Lier
 
il primo database italiano di prodotti conformi ai requisiti dei crediti LEED®
il primo database italiano di prodotti conformi ai requisiti dei crediti LEED®il primo database italiano di prodotti conformi ai requisiti dei crediti LEED®
il primo database italiano di prodotti conformi ai requisiti dei crediti LEED®
greenmap
 
The marketing campaign
The marketing campaignThe marketing campaign
The marketing campaign
hoggette4
 
92349448 reaksi-browning-pencoklatan-pada-makanan
92349448 reaksi-browning-pencoklatan-pada-makanan92349448 reaksi-browning-pencoklatan-pada-makanan
92349448 reaksi-browning-pencoklatan-pada-makanan
Novita Ardyanti
 

Viewers also liked (8)

Bluetooth pres 1
Bluetooth pres 1Bluetooth pres 1
Bluetooth pres 1
 
Northside college prep elizabet powerpoint
Northside college prep elizabet powerpointNorthside college prep elizabet powerpoint
Northside college prep elizabet powerpoint
 
Performance analysis of wimax mobile
Performance analysis of wimax mobilePerformance analysis of wimax mobile
Performance analysis of wimax mobile
 
Nima the case 2012 dirk van lier rockpanel online marketing
Nima the case 2012 dirk van lier   rockpanel online marketingNima the case 2012 dirk van lier   rockpanel online marketing
Nima the case 2012 dirk van lier rockpanel online marketing
 
il primo database italiano di prodotti conformi ai requisiti dei crediti LEED®
il primo database italiano di prodotti conformi ai requisiti dei crediti LEED®il primo database italiano di prodotti conformi ai requisiti dei crediti LEED®
il primo database italiano di prodotti conformi ai requisiti dei crediti LEED®
 
Thierry henry
Thierry henryThierry henry
Thierry henry
 
The marketing campaign
The marketing campaignThe marketing campaign
The marketing campaign
 
92349448 reaksi-browning-pencoklatan-pada-makanan
92349448 reaksi-browning-pencoklatan-pada-makanan92349448 reaksi-browning-pencoklatan-pada-makanan
92349448 reaksi-browning-pencoklatan-pada-makanan
 

Recently uploaded

CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
Wonjun Hwang
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
Overkill Security
 

Recently uploaded (20)

CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 

Pictureemailing

  • 2. Background Picture emailing has become more and more popular and is a simple way of sharing images. Many use email to share images with family, friends, colleagues and so on. 
  • 3. Stage 1 Stage 1: Firstly you choose the name of the recipient wishing to send to. You then click the button highlighted attachments in your email and a box appears with all your files on your computer. You then click on the image you wish to send and click the choose button.
  • 4. Stage 2 You then write any messages in the box below like any normal email and the email is ready to send.
  • 5. Here is the image sent to the recipient. Its quick, simple and an effective way of sharing photos.