Module 7 PDF
Module 7 PDF
n ternationa INTERNATIONAL
l
COMPUTER
Com p
IC
ce
DL
DRIVING
cen
ut
er Li
D riving ã LICENCE ã
MODULE 7
TABLE OF CONTENTS
INTRODUCTION ............................................................................. 4
Purpose of this Study Guide...................................................... 4
BOOKMARKS/FAVORITES ............................................................. 57
Create a Bookmark ................................................................ 57
How to Add Pages to a Bookmark Folder ................................ 58
To Add a Web Page to a Particular Bookmark Folder................ 58
How to Create a New Bookmark Folder .................................. 59
How to Delete a Bookmark Folder .......................................... 59
How to Open a Bookmarked Page when Working Offline ......... 60
Trouble Shooting .................................................................... 60
Getting Started with Electronic Mail.......................................... 62
What is Electronic Mail............................................................ 62
Net Etiquette (Netiquette) ........................................................ 65
Unsolicited E-mail .................................................................. 67
How to Open Microsoft Outlook Express ................................. 68
The Microsoft Outlook Express Screen .................................... 69
Opening a Mail Inbox.............................................................. 70
How to Use the Outlook Express Help Facility .......................... 71
Adjust Basic Settings .............................................................. 71
To Display or Hide a Toolbar ................................................... 73
MESSAGING .................................................................................. 74
How to Send a Message ......................................................... 74
To Spell Check your Message .................................................. 76
Message Priorities .................................................................. 77
How to Read Messages, and Open Attachments...................... 81
How To Switch Between Open Message Windows .................... 83
How To Close a Message Window ........................................... 83
How to Remove/Add a Message Inbox Headings...................... 83
Using the Mail Bin .................................................................. 85
To Move a Message to a Different Folder .................................. 85
To Copy Text from another Application into a Message ............. 86
To Flag a Mail Message .......................................................... 86
To Remove a Flag Mark from a Mail Message .......................... 86
How to Reply to Messages ...................................................... 87
To Delete a File Attachment from an Outgoing Message .......... 88
Using the Reply to all Function ................................................ 88
ADDRESSING ................................................................................ 89
How to Use the Address Book ................................................ 89
How to Update the Address Book from Incoming Mail ............. 90
How to Send Messages to Several Addresses .......................... 90
The Blind Copy Tool ............................................................... 91
INTRODUCTION
This study guide is part of the complete set of World Links training material
which includes:
Phase O: Computer Literacy (seven modules)
Phase I: Introduction to the Internet for Teaching and Learning
Phase II: Introduction to Telecollaborative Learning Projects
Phase III: Curriculum and Technology Integration
Phase IV: Evaluation and Diffusion of Technological Innovations
Phase V: Planning for School-Based Telecenters
Phase VI: The World of ICT: A Seminar for Policy Makers
PRACTICAL E XERCISES
This study guide is based on practical work, and the user should have
access to a computer to try each of the instruction steps described. There
are also practical exercises, designed to meet the requirements of the ICDL
test, that the user should attempt. For ease of identification, the exercises
have all been put into boxes like the one below.
Exercise
TIPS
The study guide will also contain tips, to help shed light on some
of the instructions.
E- MAIL
Electronic mail or e-mail allows computer users locally (the sending and
receiving computers could be next to each other) and world-wide (from
one continent to another) to exchange messages. Each e-mail user has a
mailbox address to which messages are sent. Messages sent through e-
mail can arrive within a matter of seconds. But delays do occur.
E-MAIL ATTACHMENTS
Files may be attached to e-mail messages as e-mail attachments. These
files are referred to as MIME attachments. MIME stands for Multimedia
Internet Mail Extension and was developed to help e-mail software handle
a variety of file types. For example, a document created in Microsoft Word
can be attached to an e-mail message and retrieved by the recipient with
the appropriate e-mail program. Many e-mail programs, including Eudora,
Netscape Messenger, and Microsoft Outlook Express, offer the ability to
read files written in HTML, which is itself a MIME type.
U SENETS/N EWSGROUPS
Usenet News is a global electronic bulletin board system in which millions
of computer users exchange information on a vast range of topics. The
major difference between Usenet News and e-mail discussion groups is
the fact that Usenet messages are stored on central computers, and users
must connect to these computers to read the messages posted to these
groups. This is distinct from e-mail distribution, in which messages arrive
in the electronic mailboxes of each list member.
The WWW uses client computers (the ones we use) and server computers
that handle multimedia documents with hypertext links built into them.
Clicking on these links brings that particular document located on a distant
server to your screen, irrespective of the server’s geographic location.
Documents on the web may contain text, images, sound or motion or a
combination of these, referred to as multimedia.
The operation of the Web relies primarily on hypertext as its means of
information retrieval. Hypertext is a document containing words that
connect to other documents. These words are called links and are selectable
by the user. A single hypertext document can contain links to many
documents. Producing hypertext for the Web is accomplished by creating
documents with a language called HyperText Markup Language or
HTML.
In order to fetch a web page for you, your web browser must “talk” to a
web server somewhere else. When web browsers talk to web servers, they
speak a language known as HTTP, which stands for HyperText Transfer
Protocol
The third part of the URL is the path at which this particular web page is
located on the web server. In this case, the path is /country/germany.html.
Similar to a filename, a path usually indicates where the web page is located
within the web space of the web site; in this case it is located in the germany
sub-folder of the country folder, which is located in the top- level web page
directory of the ecdl web site.
IRC, CHAT
IRC is the Internet Relay Chat service in which participants around the
world can “talk” to each other by typing in real time on hundreds of channels.
These channels are usually based on a particular topic. While some topics
are frivolous, substantive conversations are also taking place.
Chat programs are sometimes included as a feature of a Web site, where
users can log into the “chat room” to exchange comments and information
about the topics addressed on the site. Chat may take other, more wide-
ranging forms. For example, America Online is well known for sponsoring
a number of topical chat rooms.
INSTANT M ESSAGING
A variation of chat is the phenomenon of instant messaging. With instant
messaging, a user on the Web can contact another user currently logged
in and type a conversation. Most famous is America Online’s Instant
Messenger. ICQ is another commonly used chat program on the Web.
MUD/MUSH/MOO/MUCK/DUM/MUSE
MUD stands for Multi User Dimension. MUDs, and their variations listed
above, are multi-user virtual reality games based on simulated worlds.
MUDs are accessible by Telnet.
BUSINESS-TO-BUSINESS E-COMMERCE
Many corporations are now dealing with their trading partners through
Internet transactions.
ENTERTAINMENT
In environments with sufficient bandwidth, full motion video can be
downloaded from the Internet. Thus the Internet can become a vehicle for
distribution of films and concerts. A number of radio stations (e.g. BBC)
offer internet broadcasts. Some are real-time but usually the programme
is archived on the web so that the listener can choose the time to listen.
WAP PHONES
Intelligent cell phones with wireless application protocols are now able to
connect to the Internet to send and receive email, and log into special WAP
sites.
C OOKIE
Cookies are pieces of information generated by a Web server and stored in
the user’s computer, ready for future access. Cookies are embedded in the
HTML information flowing back and forth between the user’s computer
and the servers. Cookies were implemented to allow user-side customisation
of Web information. For example, cookies are used to personalize Web
search engines, with customisable Web search engines like My Yahoo! a
user selects categories of interest from the Web page. The Web server then
creates a specific cookie, so that it can ‘remember’ the selection. The cookie
is then stored on the user’s computer.
Cookies are based on a two-stage process. First the cookie is stored in the
user’s computer without their consent or knowledge. The user’s Web
browser receives the cookie and stores it in a special file called a cookie list.
This happens without the users knowledge. As a result, personal information
(in this case the user’s category preferences) is formatted by the Web server,
transmitted, and saved by the user’s computer.
During the second stage, the cookie is transferred from the user’s machine
to a Web server. Whenever a user directs her Web browser to display a
certain Web page the browser will transmit the cookie containing personal
information to the Web server.
Most cookies are harmless but because they are created and transmitted
without the users knowledge someone could use them to obtain information
that you don’t want to give out. It is possible to refuse to accept cookies but
unless you really understand how cookies work it is best to set your browser
to accept them.
C ACHE
A cache is a means of increasing the efficiency of the Web. When you
download information from the Web it has to be sent to your computer
from the one that it was originally stored on. This can be slow. It stands to
reason that a web page will take longer to get to a PC in Zimbabwe from
the United States for example, than from an ISP in Harare. When the
information is downloaded for the first time it is stored in a Cache on a
local computer so that it is readily available for future reference. The danger
is that you could be unknowingly reading out of date information.
DIGITAL CERTIFICATES
When using the web or e-mail it is very difficult to be 100% sure that you
are dealing with the person you think you are dealing with. For example
you cannot ask anyone to e-mail a document that had been authenticated
by a commissioner of oaths. The document could be scanned into the
computer but you have no way of checking that it was not altered after it
was scanned. To get around this problem the digital certificate was
developed.
A digital certificate is an electronic “credit card” that establishes your
credentials when doing business or other transactions on the Web. It is
issued by a certification authority (CA). It contains your name, a serial
number, expiration dates, a copy of the certificate holder’s public key (used
for encrypting messages and digital signatures), and the digital signature
of the certificate-issuing authority so that a recipient can verify that the
certificate is real
The average user is unlikely to require digital certificates.
ENCRYPTION
A message written in English may be read by anyone who can read English.
One way of ensuring the confidentiality of a message is to encrypt, or
translate it into a code that only the sender and receiver knows. There are
a number of encryption programmes available and both the sender and
receiver must use the same programme. In addition the receiver must
have the “key” to the code.
Do not send encrypted messages for fun, especially since the terrorist
attack on the World Trade Centre. In some countries it is illegal to encrypt
messages sent via the Web.
F IREWALL
A firewall is a programme that runs on your PC and checks all incoming
and outgoing messages. With a firewall you select the permitted addresses
and any messages that come from a site that the firewall has not been told
to accept will be blocked. They offer a high degree of security but are not
infallible and must be kept u to date. They can also slow down the Web
access.
ISP
An Internet Service Provider (ISP) is a company that allows you access to
browse along with some technical help. A lot of ISPs will also have an e-
mail account for the specified use.
Once you have a modem (you can buy one at an accredited computer
shop), ISPs usually offer a monthly rate and special rates to attract
customers into signing contracts with them. How then does one choose
an ISP? You need to consider the following aspects:
Email – Does the ISP provide you with an email account and can you
access that account outside the ISP area.
Cost – As described before, there are payments or subscriptions to be
paid monthly . This will depend on how much you can afford. Remember
that you can ask for an email account without access to the Internet. Watch
out for specials on peak hours etc.
Bandwith – This is the amount of space allocated for sending and receiving
information through the internet. A big bandwith, if there are few users
results in data being transferred faster from one point to the next.
Support – Does the ISP offer online help or toll-free support lines all hours
of the day? Do you pay for such support? This is important when allocating
costs in your budget.
Newsgroups – Which newsgroups are available from the ISP?
Once you have chosen an ISP, contact them in order to be registered.
They will provide you with a password, an email address and a user ID.
The home page of the computer used to write this module is shown below.
URL stands for Uniform Resource Locator. The URL specifies the Internet
address of a file stored on a host connected to the Internet. Every file on
the Internet, no matter what its access protocol, has a unique URL. Web
software programs use the URL to retrieve the file from the host computer
and the directory in which it resides. This file is then displayed on the monitor
connected to the user’s local machine.
A hyperlink is the URL embedded in another document so that if you click
on the text or button you can explore that link. From the diagram above, if
you click on the Contact hyperlink you will be taken to the web page that
has contact details for the ECDL foundation.
The address bar is the text box in which you type in the URL address of the
web page you want to view.
If you have used this web page before, you can click the address bar drop-
down arrow, click on the address required and then the Go button. It will
then be displayed on the address bar for you.
REMEMBER that information available on the Internet is always changing.
Some of the sites used in this module might not be accessible in the future.
Toolbar Buttons
BACK This button returns you to the document/web page
you previously viewed.
STOP If you think a link is taking too long to load onto your
computer, click this button so that Explorer will stop attempting
to retrieve the page.
REFRESH Click this button if you think a page has not been
completely displayed or if you think it has been updated with
new information since the time you retrieved the page.
However web pages can be saved on your computer, in one of four ways
available from the ‘Save As’ dialog box (from the File menu).
1. highlight the text you wish to copy and select the copy command
2. insert your mouse pointer where you wish the text to appear in the
document and use the paste command from the menu bar.
Right click on the image within the web page, and select the Copy command.
This will copy the image to the Clipboard. The image can then be pasted
into a document using the normal Paste command. If this does not work
for some reason you will have to select the Save Picture As command, and
save the image to disk. This picture can then be imported into the document.
Right-click over a web address hyperlink and then select the Copy Shortcut
command. You can then paste the web address from the Clipboard into
your document.
METHOD 1
1. Click on File
2. Select Close
METHOD 2
1. Click on Explorer’s Program Control
menu
2. Select Close
METHOD 3
Click on Internet Explorer’s Close button
METHOD 4
Press Alt+F4
This is the keyboard shortcut
METHOD 5
1. Right-click on the button for the Internet Explorer page currently
displayed on the taskbar
2. From the pop-up menu select Close
A protected site is a site which allows only restricted access. Usually that is
via a password. If you do not supply the correct password when you access
the site, you are not allowed to view the sites contents. Many companies
may use the restrictions to allow information to be widely distributed, but
in a controlled manner to its employees. Other examples are sites operated
by commercial companies which are selling some type of information such
as share information. Societies and organizations who issue newsletters
may allow only access to registered users.
3. From the list of topics click on the icon for Printing and Saving
Information
1. Click on Help
2. Select For Netscape Users
3. You are presented with a screen which
allows to select a specific section
4. Select Browser terms in Navigator and
Internet Explorer
5. A screen will display which shows the
different terms used in the two browsers
History Feature
1. Move to a blank portion of the address bar. Click on it. When it changes
its shape to a cross hair shape , drag it until it is on the menu bar.
Refer to the figure below.
2. Move to the left border edge of the address bar. Drag it to the right so
that all of the menus of the menu bar are visible. Refer to the figure
below.
3. Click on View
4. Select Explorer Bar and then
History
The left pane displays History
information as shown by the
figure below. Note that the
same information could have
been made available by
clicking the History button
on the Standard toolbar.
Steps 3 and 4 can be repeated
to show information for
Favorites or for Search.
Apart from keeping a record of which sites you visited and when you visited
them History can be used to re-view a page while off line and as temporary
bookmarks. They are a convenient way to revisit a page that you forgot to
bookmark or didn’t think you would need again. Simply click on the desired
page. If you browsed more than one page at a Web site the history will
show the main visit as a folder with
each page as files within the folder.
Just click on the folder to display the
individual pages. To sort the history
pages, click on the small arrow next
to the View option in the history bar.
The drop-down menu appears and it
can be sorted by the options as shown
in the figure.
To clear history, you need to do the following;
1. Click on Tools
2. Go to Internet Options
3. Can you see the General settings. The history subsection is situated
at the bottom.
4. Click on the option Clear History
5. Click OK
History may be deleted by right clicking on the folder or file. Be careful not
to left click on the file first or the file you want to delete will be added to the
section marked “Today”.
3. Click on the Content tab and you will see the option Enable.
Click on it
A web page may start loading within your web browser and take so long to
display anything that you may wish to stop the download and look at
something else.
Click on the Stop icon on the toolbar to stop the download. You may also
use the stop option in the VIEW drop down menu.
If the pictures on the current page are still visible after you clear
the Show pictures check box, you can hide them by clicking
the Refresh button.
WEB NAVIGATION
A Web Site comprises a Home Page, accessed directly by providing the
web address, and subsidiary pages, accessed by clicking on links within
the home page. Some home pages will also provide links to allow direct
access of other sites.
In the domain name after the dot are letters indicating the type of domain.
Examples of the common domain type extensions include:
edu educational institution
com commercial enterprise
gov government entity
mil military entity
net network access provider
org normally non-profit making organisations
For some sites a further dot and letters are available. Domain names have
been assigned to identify and locate files stored on host computers in
countries around the world. These are referred to as two-letter Internet
country codes, and have been standardised by the International Standards
Organisation as ISO 3166. For example:
au Australia ca Canada
ch Switzerland cu Cuba
de Germany fr France
jp Japan uk United Kingdom
za South Africa zw Zimbabwe
URLs are translated into numeric addresses using the Internet Domain
Name System (DNS). The numeric address is actually the “real” URL.
Since numeric strings are difficult for humans to use, alphanumeric
addresses are employed by end users. Once the translation is made, the
Web server can send the requested page to the user’s Web browser.
Some fields will have a star next to them – this means that they must be
completed before you can submit the form. Should you submit the form
without completing these sections you will normally be notified by a message
telling you what fields must be completed before the submission will be
accepted.
Clicking on this button will transmit the form across the Internet. You may
see a web page displayed thanking or acknowledging you for your
submission.
Exercise
1. Make sure you are connected to the Internet
2. In the address bar, enter the Computer Society of Zimbabwe
website address www.csz.org.zw
3. Can you see the web page
4. Click on the tab headed membership
5. Fill out the Individual Membership form. Where you able
to understand all its requirements?
6. After filling out the form, send it to your own email address.
DO NOT send it to the email [email protected] unless you
want to become a member
7. Well done. Filling in a form is as easy as doing it manually.
WEB SEARCHING
Information can be searched for on the Internet using one of the methods
given below:
! Join an e-mail discussion group or Usenet newsgroup
! Go directly to a site if you have the address
! Browse/surf the web
! Explore a subject directory
! Conduct a search using a web search engine
! Explore “the invisible web”
Direct Search
http://gwis2.circ.gwu.edu/~gprice/direct.htm
Large compilation of links to the search interfaces of a wide variety of
research resources on the Web compiled by Gary Price of George
Washington University
Search.Com
http://www.search.com/
Dozens of topic-based databases from CNET
Be careful when you use NOT. The term you do want may be
present in an important way in documents that also contain the
word you wish to avoid.
This example holds true for the many search engines that interpret the
space between keywords as the Boolean OR. To find out which logic the
engine is using as the default, consult the help files at the site.
Query: I’m interested in dyslexia in adults
Boolean logic: AND
Search: +dyslexia +adults
14. In the dialog box that appears, type ICDL logo as the name of the
picture
Make sure you know the location that you are saving this file in
15. Open the Paint program
16. Open the ICDL logo file
17. Click on Edit
18. Click on Select All
Instead of steps 16 & 17 you can right-click on the picture and choose
Select All from the pop-up menu
19. Click on Edit
20. Select Copy
Instead of steps 18 & 19 you can right-click on the picture and choose
Copy from the pop-up menu
21. Switch to Microsoft Word
22. Click the Paste button
The logo is pasted into a Microsoft Word document
There are a number of search engines available on the web. Only experience
will show which is best suited t your needs. Some well known ones are
Google, Lycos, Dogpile, Metacrawler, Yahoo and Alta Vista. Experiment
with different search engines, you could also try searching for search
engines.
The header and footer text boxes allow you to specify the text you want to
appear at the top of every page and bottom of every page respectively. The
table gives the meanings of various codes you can make use of.
Printing
Printing web pages is easily achieved by selecting the print command from
the File menu.
Should you be working in an environment where you do not have a printer,
you can always save your information and then print it when you have
access to a printer. This is achieved by selecting the Print to file check box.
If you select this option it means the document is printed to a file instead of
routing it directly to a printer. You will be prompted to specify a filename
and the location you want to save in as in the Print to File dialog box
diagram. (To print the file go to Start/Run and type copy <filename>
lpt1: /b and press enter or click OK. This can also be done through the
MS DOS prompt.)
BOOKMARKS/FAVORITES
Internet Explorer uses the name Favorites, (spelt in the American way)
instead of Bookmark which is used by Netscape Navigator. This list of
favorites is a convenient way of storing web site addresses for sites that
are visited regularly, and clicking on a favorite will save you re-typing the
web site address.
As your list of favorite pages grows, you can organise the favorites into
folders.
Create a Bookmark
1. Click the Favorites button
2. Click on one of the links there or click on a bookmark folder and then
click one of the links in it.
Note that the selected page is displayed on your screen
3. Type www.ecdl.com in the address bar
This is the page we want to add to your Favorites list
4. Click on Favorites
5. Select Add to Favorites
6. Click the Create in button
7. From the dialog box that appears, click
the New Folder button
8. Type in ICDL
9. Click the OK button
You are returned to the
Add Favorite dialog
box
10. Type Home Page in
the Name box
11. Click on the ICDL
folder
12. Click on the OK button
3. Select the folder to which you wish to add the Favorites, Click on the
OK command.
4. As seen below, the name of the web page is displayed and you are
prompted to make the page available offline. This means that you will
be able to access that web page without connecting to the Internet as
it will be saved on your computer.
Trouble Shooting
INTERNET EXPLORER
There are rare occasions when the Internet Explorer software may have
been corrupted, possibly by power problems or hard disk errors, or viruses.
Once this has happened it will be necessary to re-install the Internet Explorer
software from the original CD-ROM
that just because e-mail is new and fast that there are no rules. Business
letters used to be typed by a secretary but e-mails are seldom passed to a
qualified typist so e-mails are seldom of the same high standard but..
DO NOT SHOUT. A MESSAGE WRITTEN ALL IN CAPITALS IS
DESCRIBED AS SHOUTING AND IN A WAY IT IS. IF YOU HAVE EVER
RECEIVED AN ALL UPPERCASE LETTER YOU WILL SEE HOW IT
JUMPS OUT AT YOU AS SOON AS YOU OPEN IT. IT IS NOT THAT
EASY TO READ. A letter written all in lower case is better but if the person
is important enough to write to surely he is important enough for you to
take the trouble to use the shift key and correct punctuation
Take the trouble to run the spell check. A message with lots of spelling
mistakes tells the recipient that the sender does not consider him important
enough to take trouble over. ‘If you cannot be bothered to write to me
properly, why should I be bothered to read the message?”
Do not use the abbreviations that are common with SMS. You have a proper
keyboard, it is only one keystroke per letter you are not repeatedly pressing
the same key. In addition you do not have to compress an e-mail into a
limited space.
On the other hand do not make your e-mails unnecessary long. Do not
send large unsolicited attachments especially to business addresses. It is
very frustrating to wait for half an hour for a file to download only to find
that you don’t want it. Even worse is when the telephone connection is lost
after downloading a file for twenty five minutes and you have to wait at
least another twenty six minutes before you can see what is being sent.
When sending attachments always add a short note to tell the recipient
that you have attached something. That way he knows that is not something
that was added by a virus. It is also polite to state what programme you
used to create the attachment. The recipient may not be as computer
literate as you and may not know how to open the attachment. Finally give
a short description of what the attachment is so he can decide if and when
he wants to open it.
All e mails have a Subject line – just as business letters usually start with
Re: … Take trouble over the subject, it helps the recipient when sorting his
mail.
In short before you send an e-mail ask yourself if you would like to receive
an e-mail like the one you are about to send.
Unsolicited E-mail
You will receive unsolicited e-mails, just as you receive unsolicited post via
snail mail. You will probably never know how the sender got your address
and they are almost impossible to stop. Just delete them. If the number
increases to an unmanageable flood ask your ISP for advice. But be wary
of them. Unsolicited e-mails are a common way of spreading a virus. The
safest course is to delete all e-mails from addresses you don’t recognise
and or with subjects that don’t seem to relate to your business without
opening them.
The status bar will also reflect the status of messages in the inbox.
You can read messages either in a separate window or in the preview pane.
CHANGE INFORMATION
DISPLAYED ABOUT MESSAGES
1. Click on View
2. Select Columns
The columns that are visible on
your screen are the ones that have
check marks. The order of the
columns can be changed simply
by selecting the column and then
pressing either the Move Up or
Move Down button to move the
column to where you want
3. Click the Cancel button
This will close the dialog box
without making any changes.
4. Click on View
5. Select Current View
6. Select Hide Read Messages
The display will show that there
are no new messages to display.
Next time you check for mail, only
the unread mail will remain
visible on the screen.
MESSAGING
Regards”
6. Click on Insert
7. Select File Attachment OR instead of steps 6 and 7, click the Attach
button
Once the spell check has been completed, a dialog box will be displayed.
Click the OK button or press Enter to close the dialog box.
Message Priorities
When you send a new message or reply to a message, you can assign the
message a priority so the recipient knows to either look at it right away
(High Priority) or read it when time permits
(Low Priority). A high priority message has
an exclamation point next to it, while a down
arrow indicates a low priority message.
When you click the Send button for the first
time (or always if you do not check the Don’t
show me this again box) you will see the
following screen.
This means that all messages are sent first to the Outbox folder. When
they have been successfully sent to the recipients, they will then appear in
the Sent Items folder.
When you issue the Send or Receive command (Tools menu), Outlook
Express will connect you to your service provider for transmission of the
message.
3. Click on File
4. Select New
5. Select Mail Message
6. Create a new message as
illustrated in the diagram
below
7. Click the button for the first message ( )
on the taskbar (to make this message active)
8. Select the text for the
second paragraph
9. Click on Edit
10. Select Cut
Use the backspace
or Delete key to
remove any extra
lines that might
have been left when
the text was cut.
11. Create a new paragraph at the end of the message
12. Click the Paste button ( )
13. Click the button for the second message ( )
on the taskbar (to make this message active)
14. Select the text for the second paragraph
15. Press Ctrl+X (to ‘Cut’ the text)
16. Click the button for the first message ( )
on the taskbar (to make this message active)
17. Create a new paragraph at the end of the message
18. Click on Edit and select Paste
The text beginning with One of us will be coming…will become the
last sentence of the message with the title Use of Cut and Paste
tools.
19. Press Ctrl+Home to move to the beginning of the message
21. Click the Close button for the message. DO NOT save any changes
for this message.
Click the Flag for Follow Up icon on the Message dialog box toolbar to
display the Flag for Follow Up dialog box.
8. At times you may come across mail that you would want to send to
colleagues. The easiest way to send the message is by using the Forward
button . All you will need to do is to type in the recipients’ names
separated by semi-colons. In addition you can type in text to include
with the forwarded message.
The Reply All function will result in you being able to send a reply to the
person(s) in the From To and Cc boxes of the message.
If the Reply function ( or from the Message menu select Reply to
Sender)is used, the message below from Ted Tipler will only be sent (replied
to) to Ted Tipler.
Use of the Reply All function ( or from the Message menu select
Reply to All) will result in the reply being sent to Ted Tipler, Mupinda
Justin(Chy) and carbon copied (Cc) to Whiley Jean as illustrated below.
ADDRESSING
How to Use the Address Book
The Address Book provides a convenient place to store contact details
including e-mail addresses of colleagues and associates. In addition the
address book allows you access to Internet directory services, which you
can use to look up people and businesses on the Internet.
The address book can store details such as e-mail addresses, home and
work addresses, phone and fax numbers, digital IDs, conferencing
information, instant messaging addresses and personal information such
as birthdays, anniversaries and family members.
1. While in Outlook Express, click the Address button
2. Click on New
3. Select New Contact
4. Enter the details of two people you want to add to the
address book
5. When you have completed all the relevant information from
the various tabs, close the Address Book.
The Outlook Express program now has two new contacts as shown
below. The other figure is a screen in which you fill in details of a
person to be added to the address list.
MESSAGE MANAGEMENT
How to Organise Messages
Microsoft Outlook Express uses main folders for handling messages as
follows:
Inbox For messages which have been received
Outbox For messages which have been prepared off-line and
are ready to send next time the computer is successfully
connected and on-line
Sent Items For messages which have already been sent
Deleted Items For messages which have been deleted. These can be
“undeleted” by moving to a different folder, during the
Outlook Express session. However, this folder is usually
emptied, (i.e. the messages irrevocably deleted) at the
end of the session when the user closes the Outlook
Express program (if this option has been selected)
It is often useful to move received and sent messages into other folders,
and use Outlook Express as an electronic filing system to maintain copies
of messages. For example, you could have folders relating to subjects, or
to correspondents or keep different types of messages in different folders.
3. Click on the Find Now button. Outlook will perform the search and list
any messages which match the search criteria. Double click on a
message to view its contents.
10. Press the Delete key (or press Ctrl+D or select Delete from the Edit
menu)
The message is deleted. If you click on the Deleted Items folder you
will find it.
You have now learnt about the Internet and email and are now ready to
store using the internet and e-mail. Well done for completing this module.
Welcome to the information age .