SlideShare une entreprise Scribd logo
1  sur  18
Features of E-mail




1 of 10             © Boardworks Ltd 2007
Learning objectives
              At the end of this presentation you will:
                Understand what e-mail is
                Know the features of e-mail
                Describe what an attachment is, what form it
                can take and why it is used.
                Learn about encryption and how it can help
                prevent e-mail fraud.
                Be able to explain at least two advantages of
                email
                Be able to explain at least two disadvantages
                of email



    2 of 10                                               © Boardworks Ltd 2007
                                                          © Boardworks Ltd 2007
What is e-mail

   E-mail stands for electronic mail.


   E-mail allows users to
   communicate electronically
   with other people who have
   e-mail.
   E-mail costs nothing to
   send and is very fast.




    3 of 10                             © Boardworks Ltd 2007
What does the software do?




    4 of 10                  © Boardworks Ltd 2007
Contacts

   The e-mail addresses of
   the people you know can
   be stored as contacts in
   your address book.


   A contact group is a list of
   contacts that are grouped
   together under a single
   name. Often called a
   distribution list.




    5 of 10                       © Boardworks Ltd 2007
E-mail layout

 E-mails appear in your inbox. When you open an e-mail:

 It tells you who it’s from.
 It gives a description
 of the content.
 It also provides the
 name of any
 attached files.
 The message
 appears below.




     6 of 10                                   © Boardworks Ltd 2007
Sending a reply

 To reply to an e-mail, you just have to click on the reply button.

 The e-mail address of the person you are replying to will
 appear automatically
 Addresses can be
 added if you want to
 reply to more people.
 Attachments can be
 added.
 The new message is
 typed here.
 The original message will appear below the new message.


    7 of 10                                         © Boardworks Ltd 2007
An e-mail address


 Made up of 3 parts:
 • username (of e-mail box holder)
 • organisation that hosts the e-mail account
 • country of origin

 • eg. cjrobertson@tiscali.co.uk

          username    organisation/     country
                      ISP
 • an ISP is an Internet Service Provider



    8 of 10                                     © Boardworks Ltd 2007
Signature

   Signatures can be set up that will be
   automatically placed at the bottom of the
   email before it is sent.
   These can be formal or informal




    9 of 10                                    © Boardworks Ltd 2007
Attachments

 All e-mails are text files.


   Other types of files can be forwarded as an
   attachment to an e-mail, such as pictures,
   software, audio and movie clips
   The symbol for an attachment is a paper clip.
   E-mails and attachments can be saved
   and/or deleted just like any other files.




     10 of 10                                      © Boardworks Ltd 2007
Out of Office Reply



   An automated reply to an email that states
   you are not available to reply.
   People who use email for business will find
   that when they are unable to check their mail
   this is useful.
   The date of your return would normally be
   sent with the out-of-office reply.




    11 of 10                                       © Boardworks Ltd 2007
Calendar


  Can be used to enter events, special
  dates and birthdays.
  Appointments with reminders can be
  set up.
  Meetings can be scheduled, contacts
  added and e-mails automatically sent to
  the invited attendees
  Calendars can be shared between
  many people.




    12 of 10                                © Boardworks Ltd 2007
Problems with e-mail

 Spam is the e-mail equivalent of junk mail.
 It is often sent by companies trying to sell their products to
 people who haven’t asked for information about them.
 Spam takes up a lot of Internet bandwidth and it can be
 annoying for people to have to wade through lots of
 messages they don’t want to find the ones they do.
 Many countries are trying to make it illegal to
 send spam.




    13 of 10                                         © Boardworks Ltd 2007
Phishing and fraud

 E-mails are sometimes used by criminals to steal money.
 They send e-mails to thousands of people in the hope
 that a few will fall for their trick.
 Phishing e-mails pretend to be from banks. They ask the
 customer to enter their bank details because of some
 problem. They then use these details to steal money.
 Other frauds pretend to give away free gifts or prizes.
 Another common fraud is to pretend to need help to get
 lots of money out of another country. They just need a
 bank account to pay it into…
 The websites that fraudsters set up are usually closed
 after a few days, which makes them difficult to trace.


    14 of 10                                      © Boardworks Ltd 2007
Other problems with e-mail

 A virus is a piece of code which can sometimes damage
 the files on your computer.

 It is possible to pass a virus on through e-mail.

 It is best not to open an e-mail
 unless you know where it has
 come from, especially if it
 has attachments.
 You should always virus
 check e-mails, even from
 people you do know.


    15 of 10                                         © Boardworks Ltd 2007
Advantages of e-mail



  •   Fast communication
  •   Cheap
  •   Attachments can be sent with the e-mail
  •   Provides a written document
  •   Can be sent to many people at one time




      16 of 10                         © Boardworks Ltd 2007
Disadvantages of e-mail



  • Virus can be sent with the email unknown
    to the recipient
  • May be insecure
  • Used for spam
  • Used for phishing




    17 of 10                         © Boardworks Ltd 2007
Summary

  E-mail stands for electronic mail.
  E-mails arrive in your inbox and you can reply to them
  or forward them to other people.
  E-mails can be sent to more than one person at a time.
  You store details of contacts in your address book.
  Contact groups or distribution lists can be set up.
  Signatures and out-of-office replies are useful.
  Attachments are files sent with e-mails. These can be
  text documents, graphics, photos, videos, audio,
  programs.
  Security is a disadvantage



   18 of 10                                    © Boardworks Ltd 2007

Contenu connexe

Tendances

Tendances (20)

Another one on Email...
Another one on Email...Another one on Email...
Another one on Email...
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
Email - electronic mail
Email - electronic mailEmail - electronic mail
Email - electronic mail
 
Email: Introduction
Email: IntroductionEmail: Introduction
Email: Introduction
 
Email Ppt
Email PptEmail Ppt
Email Ppt
 
Email
EmailEmail
Email
 
Email basics
Email basicsEmail basics
Email basics
 
E Mail Basic
E Mail BasicE Mail Basic
E Mail Basic
 
Email Basics
Email BasicsEmail Basics
Email Basics
 
Webmail and Mail Clients
Webmail and Mail ClientsWebmail and Mail Clients
Webmail and Mail Clients
 
Microsoft word
Microsoft wordMicrosoft word
Microsoft word
 
MAIL MERGE.ppt
MAIL MERGE.pptMAIL MERGE.ppt
MAIL MERGE.ppt
 
Gmail introduction
Gmail introductionGmail introduction
Gmail introduction
 
An introduction to microsoft office 2007 lecture
An introduction to microsoft office 2007 lectureAn introduction to microsoft office 2007 lecture
An introduction to microsoft office 2007 lecture
 
E-Mail Basics
E-Mail BasicsE-Mail Basics
E-Mail Basics
 
Internet
InternetInternet
Internet
 
Introduction to Email
Introduction to EmailIntroduction to Email
Introduction to Email
 
Business communication-email
Business communication-emailBusiness communication-email
Business communication-email
 
Email use in business ppt
Email use in business pptEmail use in business ppt
Email use in business ppt
 
Lecture 5 sending and receiving e-mail
Lecture 5   sending and receiving e-mailLecture 5   sending and receiving e-mail
Lecture 5 sending and receiving e-mail
 

Similaire à Essential Email Features Explained

Library email services
Library email servicesLibrary email services
Library email servicesDheeraj Negi
 
E-mails and Attachments
E-mails and AttachmentsE-mails and Attachments
E-mails and AttachmentsMAILYNVIODOR1
 
email clients and webmail (presentation)
email clients and webmail   (presentation)email clients and webmail   (presentation)
email clients and webmail (presentation)kay2
 
Understanding And Mastering Email Basics: A Guide for Every Email User.
Understanding And Mastering Email Basics: A Guide for Every Email User. Understanding And Mastering Email Basics: A Guide for Every Email User.
Understanding And Mastering Email Basics: A Guide for Every Email User. Empowerhosting
 
All about email
All about emailAll about email
All about emailestefana4
 
Benefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer CentreBenefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer Centrejatin batra
 
Internet technology
Internet technologyInternet technology
Internet technologyDivyaKS12
 
History of Email PowerPoint presentation
History of Email PowerPoint presentationHistory of Email PowerPoint presentation
History of Email PowerPoint presentationSaad Zeeshan
 
KNOWLEDGE MANAGEMENT
KNOWLEDGE MANAGEMENTKNOWLEDGE MANAGEMENT
KNOWLEDGE MANAGEMENTkaranjae
 
Tech Training - Session 8
Tech Training - Session 8Tech Training - Session 8
Tech Training - Session 8William Mann
 
Internet Tutorial 02
Internet  Tutorial 02Internet  Tutorial 02
Internet Tutorial 02dpd
 

Similaire à Essential Email Features Explained (20)

Library email services
Library email servicesLibrary email services
Library email services
 
Presentation1
Presentation1Presentation1
Presentation1
 
E-mails and Attachments
E-mails and AttachmentsE-mails and Attachments
E-mails and Attachments
 
email clients and webmail (presentation)
email clients and webmail   (presentation)email clients and webmail   (presentation)
email clients and webmail (presentation)
 
Understanding And Mastering Email Basics: A Guide for Every Email User.
Understanding And Mastering Email Basics: A Guide for Every Email User. Understanding And Mastering Email Basics: A Guide for Every Email User.
Understanding And Mastering Email Basics: A Guide for Every Email User.
 
All about email
All about emailAll about email
All about email
 
Benefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer CentreBenefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer Centre
 
Emailbasics
EmailbasicsEmailbasics
Emailbasics
 
Internet technology
Internet technologyInternet technology
Internet technology
 
All about email
All about emailAll about email
All about email
 
Emailbasicsclass
EmailbasicsclassEmailbasicsclass
Emailbasicsclass
 
History of Email PowerPoint presentation
History of Email PowerPoint presentationHistory of Email PowerPoint presentation
History of Email PowerPoint presentation
 
Email
EmailEmail
Email
 
Using E-mail In The Office
Using E-mail In The OfficeUsing E-mail In The Office
Using E-mail In The Office
 
KNOWLEDGE MANAGEMENT
KNOWLEDGE MANAGEMENTKNOWLEDGE MANAGEMENT
KNOWLEDGE MANAGEMENT
 
Tech Training - Session 8
Tech Training - Session 8Tech Training - Session 8
Tech Training - Session 8
 
Filing Client Email
Filing Client EmailFiling Client Email
Filing Client Email
 
Internet Tutorial 02
Internet  Tutorial 02Internet  Tutorial 02
Internet Tutorial 02
 
email.pptx
email.pptxemail.pptx
email.pptx
 
Email
EmailEmail
Email
 

Plus de mrscjrobertson

Plus de mrscjrobertson (8)

36 class presentations
36 class presentations36 class presentations
36 class presentations
 
Backup strategy
Backup strategyBackup strategy
Backup strategy
 
Lan networks
Lan networksLan networks
Lan networks
 
Wan internet
Wan internetWan internet
Wan internet
 
Organisational information systems
Organisational information systemsOrganisational information systems
Organisational information systems
 
Robots
RobotsRobots
Robots
 
Section 1 for blog
Section 1 for blogSection 1 for blog
Section 1 for blog
 
Using information
Using informationUsing information
Using information
 

Dernier

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Dernier (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Essential Email Features Explained

  • 1. Features of E-mail 1 of 10 © Boardworks Ltd 2007
  • 2. Learning objectives At the end of this presentation you will: Understand what e-mail is Know the features of e-mail Describe what an attachment is, what form it can take and why it is used. Learn about encryption and how it can help prevent e-mail fraud. Be able to explain at least two advantages of email Be able to explain at least two disadvantages of email 2 of 10 © Boardworks Ltd 2007 © Boardworks Ltd 2007
  • 3. What is e-mail E-mail stands for electronic mail. E-mail allows users to communicate electronically with other people who have e-mail. E-mail costs nothing to send and is very fast. 3 of 10 © Boardworks Ltd 2007
  • 4. What does the software do? 4 of 10 © Boardworks Ltd 2007
  • 5. Contacts The e-mail addresses of the people you know can be stored as contacts in your address book. A contact group is a list of contacts that are grouped together under a single name. Often called a distribution list. 5 of 10 © Boardworks Ltd 2007
  • 6. E-mail layout E-mails appear in your inbox. When you open an e-mail: It tells you who it’s from. It gives a description of the content. It also provides the name of any attached files. The message appears below. 6 of 10 © Boardworks Ltd 2007
  • 7. Sending a reply To reply to an e-mail, you just have to click on the reply button. The e-mail address of the person you are replying to will appear automatically Addresses can be added if you want to reply to more people. Attachments can be added. The new message is typed here. The original message will appear below the new message. 7 of 10 © Boardworks Ltd 2007
  • 8. An e-mail address Made up of 3 parts: • username (of e-mail box holder) • organisation that hosts the e-mail account • country of origin • eg. cjrobertson@tiscali.co.uk username organisation/ country ISP • an ISP is an Internet Service Provider 8 of 10 © Boardworks Ltd 2007
  • 9. Signature Signatures can be set up that will be automatically placed at the bottom of the email before it is sent. These can be formal or informal 9 of 10 © Boardworks Ltd 2007
  • 10. Attachments All e-mails are text files. Other types of files can be forwarded as an attachment to an e-mail, such as pictures, software, audio and movie clips The symbol for an attachment is a paper clip. E-mails and attachments can be saved and/or deleted just like any other files. 10 of 10 © Boardworks Ltd 2007
  • 11. Out of Office Reply An automated reply to an email that states you are not available to reply. People who use email for business will find that when they are unable to check their mail this is useful. The date of your return would normally be sent with the out-of-office reply. 11 of 10 © Boardworks Ltd 2007
  • 12. Calendar Can be used to enter events, special dates and birthdays. Appointments with reminders can be set up. Meetings can be scheduled, contacts added and e-mails automatically sent to the invited attendees Calendars can be shared between many people. 12 of 10 © Boardworks Ltd 2007
  • 13. Problems with e-mail Spam is the e-mail equivalent of junk mail. It is often sent by companies trying to sell their products to people who haven’t asked for information about them. Spam takes up a lot of Internet bandwidth and it can be annoying for people to have to wade through lots of messages they don’t want to find the ones they do. Many countries are trying to make it illegal to send spam. 13 of 10 © Boardworks Ltd 2007
  • 14. Phishing and fraud E-mails are sometimes used by criminals to steal money. They send e-mails to thousands of people in the hope that a few will fall for their trick. Phishing e-mails pretend to be from banks. They ask the customer to enter their bank details because of some problem. They then use these details to steal money. Other frauds pretend to give away free gifts or prizes. Another common fraud is to pretend to need help to get lots of money out of another country. They just need a bank account to pay it into… The websites that fraudsters set up are usually closed after a few days, which makes them difficult to trace. 14 of 10 © Boardworks Ltd 2007
  • 15. Other problems with e-mail A virus is a piece of code which can sometimes damage the files on your computer. It is possible to pass a virus on through e-mail. It is best not to open an e-mail unless you know where it has come from, especially if it has attachments. You should always virus check e-mails, even from people you do know. 15 of 10 © Boardworks Ltd 2007
  • 16. Advantages of e-mail • Fast communication • Cheap • Attachments can be sent with the e-mail • Provides a written document • Can be sent to many people at one time 16 of 10 © Boardworks Ltd 2007
  • 17. Disadvantages of e-mail • Virus can be sent with the email unknown to the recipient • May be insecure • Used for spam • Used for phishing 17 of 10 © Boardworks Ltd 2007
  • 18. Summary E-mail stands for electronic mail. E-mails arrive in your inbox and you can reply to them or forward them to other people. E-mails can be sent to more than one person at a time. You store details of contacts in your address book. Contact groups or distribution lists can be set up. Signatures and out-of-office replies are useful. Attachments are files sent with e-mails. These can be text documents, graphics, photos, videos, audio, programs. Security is a disadvantage 18 of 10 © Boardworks Ltd 2007