Email is a method of sending digital messages between computers or mobile devices. While email is a popular form of communication, some countries have laws around appropriate email use and content to prevent misuse. Effective security practices like strong passwords and antivirus software can help protect email.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
216 views31 pages
Short Note in Ict (Igcse)
Email is a method of sending digital messages between computers or mobile devices. While email is a popular form of communication, some countries have laws around appropriate email use and content to prevent misuse. Effective security practices like strong passwords and antivirus software can help protect email.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 31
Email is short form for Electronic Mail.
It is a method of sending digital messages from one
computer to another (this can also be done using mobile phones). Email is very popular form of communication between people. However many countries have laws to protect people from the misuse of emails. When sending an email the language and content within the email needs to be appropriate. If the emails is being sent to an employee within a business then the language should be formal. Examples of using inappropriate language: Abusive, threatening language. Obscene Images / illegal content Racist, violent messages The content of an email can be protected by the copyright law. If the sender of an email states the message is confidential then it is important the email is not forwarded onto a third party. It could also be a case of attachments being downloaded and also passed on. Sometimes organisations will send an email with a copyright statement at the bottom of the email. Some methods of increasing the security of emails include: Strong password – combination of letters, numbers, special characters Changing password regularly Using spam filters – moving suspicious emails to a junk folder – blocking email Running anti virus and anti spam at times Passive attacks - learn or make use of information from the system but does not affect system resources Active attacks - attempts to alter system resources or effect their operations Internet etiquette Don’t be abusive Don’t send spam Be clear and succinct with your message Remember posts are public in most cases and read by everyone Always check your spelling and grammar Respect peoples privacy Forgive peoples mistakes – don’t be compelled to respond to an error Don’t use capital letters – appears as shouting Don’t plagiarise Don’t use too many emoticons Unsolicited email - basically unwanted emails Spam (junk) email is sent out to multiple recipients from a mailing list The email could be part of a phishing scam or could be to promote certain products Dangerous - may contain viruses Email Groups are contacts which are grouped together So that emails can be sent to multiple recipients. When sending an email to a group you would just have to write the name of the group rather than writing everyone's email address. Worldwide Collection of Networks Browse the internet Social Networking & Communication Online shopping & banking Transfer files from computer to computer World Wide Web (WWW) World Wide Web is part of the internet. Can be accessed using a web browser. Consists of a massive collection of webpages. Defined as a computer network based on internet technology Normally accessible by internal members of the company via a username and password. Information is specific to the needs of the company Less chance of external threats such hacking and viruses Possible to prevent external links Easier to send out sensitive information – they will remain with the organisation Better bandwidth Possible to create extranets – intranet extended outside the organisation but with same advantage of intranet Online storage medium used to backup files. Files can be accessed from any device with an internet connection. Data is saved on more than one server so in case of maintenance or repair data is always accessible. Public cloud : customers/client and cloud storage provider are different companies Private cloud : customers/client and cloud storage provider are a part of a single entity Hybrid cloud : combination of both Is the rules which are followed when transferring information across the internet. Rules are agreed between the sender and recipient when data is being transferred. Difference between http and https is that https is much more secure compared to http In HTTP, Encryption is absent and Encryption is present in HTTPS – HTTPS slower than HTTP A web browser is a software that allows the user to display a webpage. They have a home page Ability to store users favourite websites /pages History of websites visited Can move forward and backward through web sites Hyperlinks – helps user to navigate between web pages A web browser will use URLs to access specified websites. URLs are represented by numbers (http://100.100.100.1) However it is not very user friendly. So therefore an alphanumeric format (http://www.yahmad.o.uk) Protocol – http/https Website address Domain host (www) Domain name(name of website) Domain type(.com, .org, .co, .net, .gov) Country codes(.uk, .us, .in) Path – root directory of website Filename – item on web page FTP is a network protocol used when transferring files from one computer to another over the internet.
FileZilla is popular FTP application which is
used to upload web pages so that they can be hosted and viewed on the internet. ISP is a company which provides internetaccess to users.
Normally the users would have to pay a monthly
fee.
Broadband Connections tend to use fire-optic
cables for increased bandwidth. A blog is a personal internet journal Usually updated by one author. Blog entries are in order (most recent entries are shown first). Blogs can not be changed by other users of the internet. Bloggers can be prosecuted for posting offensive material. Microblogs – often used on social networking sites to make short, frequent post B blog – business blog – promote business on internet Web applications or websites that allow users to create and edit web pages using any web browser A wiki is a collaboration from users (many authors) to create content. Wikis can be edited by anyone (content can be edited or deleted). Social Networking sites allow users to interact and communicate with each other. You can connect with people with similar interests. Each member has a free web space Users are able to share content such as photos, video and status updates They can create their own public and private profiles Instant messaging and video chatting Members have control over who can access their public and private data Email within the community Write on each others wall Invite people to become friends 2 ways to locate information Type in URL Use a search engine
OPENING A WEBSITE FROM A URL
Type the URL in the address bar of the web browser A web search engine or Internet search engine is a software system that is designed to carry out web search (Internet search) Search the World Wide Web in a systematic way for particular information specified in a textual web search query When we want to find some information but don’t know where to look Due to amount of information available on the internet it is difficult to find specific information quickly. Search engines will not necessarily post the website in order of usefulness so you may have to look through different websites to find your information. Content on the internet is not regulated. Any body can make a website and post any content which is not factually correct. Wikis can be edited to contain false information. Information may be biased depending on who was the author. Checking the websites URL address (ending in .gov or .ac more likely to be reliable) Check links or endorsements from other reliable websites. Check the last time the website was updated. Check multiple websites If a website has excessive advertisement – unreliable