SlideShare a Scribd company logo
1 of 32
CEL1:  Electronic Mail and Dangers of the Internet
Objectives ,[object Object],[object Object],[object Object],[object Object]
1.1 Sending E-mail ,[object Object],[object Object],[object Object]
1.1 Sending E-mail ,[object Object]
1.1 Sending E-mail ,[object Object]
1.1 Sending E-mail ,[object Object]
1.1 Sending E-mail ,[object Object]
1.2 How E-mail Works
1.1 Sending E-mail ,[object Object]
1.3 E-mail Netiquette ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1.3 E-mail Netiquette
1.3 E-mail Netiquette ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
1.3 E-mail Netiquette ,[object Object],[object Object],[object Object],[object Object],[object Object]
1.3 E-mail Netiquette
1.4 Dangers of the Internet ,[object Object],[object Object],[object Object],[object Object]
1.4 Dangers of the Internet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
1.4 Dangers of the Internet ,[object Object],[object Object],[object Object]
1.5 How to be Safe on the Internet ,[object Object],[object Object]
1.5 How to be Safe on the Internet ,[object Object],[object Object]
1.5 How to be Safe on the Internet ,[object Object],[object Object]
1.5 How to be Safe on the Internet ,[object Object],[object Object]
1.5 How to be Safe on the Internet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
1.5 How to be Safe on the Internet ,[object Object],[object Object],[object Object]
1.5 How to be Safe on the Internet ,[object Object],[object Object],[object Object],[object Object]
1.5 How to be Safe on the Internet ,[object Object]
1.5 How to be Safe on the Internet ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object],Summary
[object Object],[object Object],[object Object],Summary
Summary ,[object Object],[object Object],[object Object]
Summary ,[object Object],[object Object]
Summary ,[object Object],[object Object]

More Related Content

What's hot

Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussain
aisha747
 
Internet Safety Final Copy
Internet Safety Final CopyInternet Safety Final Copy
Internet Safety Final Copy
guestc88a00
 
Internet Safety Final Copy
Internet Safety Final CopyInternet Safety Final Copy
Internet Safety Final Copy
guest42858f
 
Tutorial iPhone
Tutorial iPhoneTutorial iPhone
Tutorial iPhone
Saumon
 

What's hot (17)

How to Secure Your Outlook Account - 8 Easy Steps
How to Secure Your Outlook Account - 8 Easy StepsHow to Secure Your Outlook Account - 8 Easy Steps
How to Secure Your Outlook Account - 8 Easy Steps
 
Email phising and spoofing hurting your business
Email phising and spoofing hurting your businessEmail phising and spoofing hurting your business
Email phising and spoofing hurting your business
 
Internet safety at work presentation
Internet safety at work presentationInternet safety at work presentation
Internet safety at work presentation
 
CDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness PostersCDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness Posters
 
10 tips to prevent phishing attacks
10 tips to prevent phishing attacks10 tips to prevent phishing attacks
10 tips to prevent phishing attacks
 
Test Your Internet Security IQ Quiz
Test Your Internet Security IQ QuizTest Your Internet Security IQ Quiz
Test Your Internet Security IQ Quiz
 
Online secuirty
Online secuirtyOnline secuirty
Online secuirty
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussain
 
Internet Safety Final Copy
Internet Safety Final CopyInternet Safety Final Copy
Internet Safety Final Copy
 
Instagram account hack
Instagram account hackInstagram account hack
Instagram account hack
 
Internet Safety Final Copy
Internet Safety Final CopyInternet Safety Final Copy
Internet Safety Final Copy
 
An introduction to the Basics of Twitter!
An introduction to the Basics of Twitter!An introduction to the Basics of Twitter!
An introduction to the Basics of Twitter!
 
Phishing
PhishingPhishing
Phishing
 
Securitytips
SecuritytipsSecuritytips
Securitytips
 
Viruses
VirusesViruses
Viruses
 
Tutorial iPhone
Tutorial iPhoneTutorial iPhone
Tutorial iPhone
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 

Viewers also liked

VIEs on health & wellness
VIEs on health & wellnessVIEs on health & wellness
VIEs on health & wellness
angbeelee
 
VIEs - Sports
VIEs - SportsVIEs - Sports
VIEs - Sports
angbeelee
 
VIE on Similes 2014
VIE on Similes 2014VIE on Similes 2014
VIE on Similes 2014
angbeelee
 
VIEs on Hyperbole
VIEs on HyperboleVIEs on Hyperbole
VIEs on Hyperbole
angbeelee
 
VIEs on Technology
VIEs on TechnologyVIEs on Technology
VIEs on Technology
angbeelee
 
VIEs on Environment
VIEs on EnvironmentVIEs on Environment
VIEs on Environment
angbeelee
 
VIE on Similes 2014
VIE on Similes 2014VIE on Similes 2014
VIE on Similes 2014
angbeelee
 
VIEs on Proverbs
VIEs on ProverbsVIEs on Proverbs
VIEs on Proverbs
angbeelee
 
VIEs on similes
VIEs on similesVIEs on similes
VIEs on similes
angbeelee
 
VIE - Metaphors
VIE - MetaphorsVIE - Metaphors
VIE - Metaphors
angbeelee
 
VIEs on family & friends
VIEs on family & friendsVIEs on family & friends
VIEs on family & friends
angbeelee
 
National ICT Sharing 2010
National ICT Sharing 2010National ICT Sharing 2010
National ICT Sharing 2010
angbeelee
 
VIE on Social Issues
VIE on Social IssuesVIE on Social Issues
VIE on Social Issues
angbeelee
 
VIEs on Irony
VIEs on IronyVIEs on Irony
VIEs on Irony
angbeelee
 
VIEs on Personification
VIEs on PersonificationVIEs on Personification
VIEs on Personification
angbeelee
 
Vi es on metaphors
Vi es on metaphorsVi es on metaphors
Vi es on metaphors
angbeelee
 
Volume of Cubes and Cuboid
Volume of Cubes and CuboidVolume of Cubes and Cuboid
Volume of Cubes and Cuboid
angbeelee
 

Viewers also liked (18)

VIEs on health & wellness
VIEs on health & wellnessVIEs on health & wellness
VIEs on health & wellness
 
VIEs - Sports
VIEs - SportsVIEs - Sports
VIEs - Sports
 
VIE on Similes 2014
VIE on Similes 2014VIE on Similes 2014
VIE on Similes 2014
 
VIEs on Hyperbole
VIEs on HyperboleVIEs on Hyperbole
VIEs on Hyperbole
 
VIEs on Technology
VIEs on TechnologyVIEs on Technology
VIEs on Technology
 
VIEs on Environment
VIEs on EnvironmentVIEs on Environment
VIEs on Environment
 
VIE on Similes 2014
VIE on Similes 2014VIE on Similes 2014
VIE on Similes 2014
 
VIEs on Proverbs
VIEs on ProverbsVIEs on Proverbs
VIEs on Proverbs
 
VIEs on similes
VIEs on similesVIEs on similes
VIEs on similes
 
VIE - Metaphors
VIE - MetaphorsVIE - Metaphors
VIE - Metaphors
 
VIEs on family & friends
VIEs on family & friendsVIEs on family & friends
VIEs on family & friends
 
National ICT Sharing 2010
National ICT Sharing 2010National ICT Sharing 2010
National ICT Sharing 2010
 
VIE on Social Issues
VIE on Social IssuesVIE on Social Issues
VIE on Social Issues
 
VIEs on Irony
VIEs on IronyVIEs on Irony
VIEs on Irony
 
VIEs on Personification
VIEs on PersonificationVIEs on Personification
VIEs on Personification
 
Mechanisms
MechanismsMechanisms
Mechanisms
 
Vi es on metaphors
Vi es on metaphorsVi es on metaphors
Vi es on metaphors
 
Volume of Cubes and Cuboid
Volume of Cubes and CuboidVolume of Cubes and Cuboid
Volume of Cubes and Cuboid
 

Similar to Cel1

Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notes
Linda Barron
 
Mac Kenzi D. Group#3
Mac Kenzi D. Group#3Mac Kenzi D. Group#3
Mac Kenzi D. Group#3
guest3e462b5
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
guest5558240
 
Ways To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdfWays To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdf
Chinmayee Behera
 

Similar to Cel1 (20)

Email strategies
Email strategiesEmail strategies
Email strategies
 
E‑mail
E‑mailE‑mail
E‑mail
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
Email Essentials
Email EssentialsEmail Essentials
Email Essentials
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notes
 
Phishing mails: Bonnes pratiques
Phishing mails: Bonnes pratiques Phishing mails: Bonnes pratiques
Phishing mails: Bonnes pratiques
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
Common Email Security Mistakes
Common Email Security MistakesCommon Email Security Mistakes
Common Email Security Mistakes
 
Email basics
Email basicsEmail basics
Email basics
 
Online Safety Data Privacy and Email Basics Digital Literacy Fundamentals.pptx
Online Safety Data Privacy and Email Basics Digital Literacy Fundamentals.pptxOnline Safety Data Privacy and Email Basics Digital Literacy Fundamentals.pptx
Online Safety Data Privacy and Email Basics Digital Literacy Fundamentals.pptx
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
Mac Kenzi D. Group#3
Mac Kenzi D. Group#3Mac Kenzi D. Group#3
Mac Kenzi D. Group#3
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
Ways To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdfWays To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdf
 
email_
email_email_
email_
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Business English - Writing Workplace1.ppt
Business English - Writing Workplace1.pptBusiness English - Writing Workplace1.ppt
Business English - Writing Workplace1.ppt
 
Business English - Writing Workplace1.ppt
Business English - Writing Workplace1.pptBusiness English - Writing Workplace1.ppt
Business English - Writing Workplace1.ppt
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the bait
 

More from angbeelee

VIE on Similes 2014
VIE on Similes 2014VIE on Similes 2014
VIE on Similes 2014
angbeelee
 
VIE on Similes 2014
VIE on Similes 2014VIE on Similes 2014
VIE on Similes 2014
angbeelee
 
VIEs on Puns
VIEs on PunsVIEs on Puns
VIEs on Puns
angbeelee
 
VIEs on Oxymorons
VIEs on Oxymorons VIEs on Oxymorons
VIEs on Oxymorons
angbeelee
 
VIEs on Personification
VIEs on PersonificationVIEs on Personification
VIEs on Personification
angbeelee
 
Flash fiction writing contest
Flash fiction writing contestFlash fiction writing contest
Flash fiction writing contest
angbeelee
 
Flash fiction writing contest
Flash fiction writing contestFlash fiction writing contest
Flash fiction writing contest
angbeelee
 
VIEs on Mass Media
VIEs on Mass MediaVIEs on Mass Media
VIEs on Mass Media
angbeelee
 
VIEs on Technology
VIEs on TechnologyVIEs on Technology
VIEs on Technology
angbeelee
 
VIEsfamily & friends
VIEsfamily & friendsVIEsfamily & friends
VIEsfamily & friends
angbeelee
 
VIEs on health & wellness
VIEs on health & wellnessVIEs on health & wellness
VIEs on health & wellness
angbeelee
 
COB4 Computer Crime
COB4 Computer CrimeCOB4 Computer Crime
COB4 Computer Crime
angbeelee
 

More from angbeelee (12)

VIE on Similes 2014
VIE on Similes 2014VIE on Similes 2014
VIE on Similes 2014
 
VIE on Similes 2014
VIE on Similes 2014VIE on Similes 2014
VIE on Similes 2014
 
VIEs on Puns
VIEs on PunsVIEs on Puns
VIEs on Puns
 
VIEs on Oxymorons
VIEs on Oxymorons VIEs on Oxymorons
VIEs on Oxymorons
 
VIEs on Personification
VIEs on PersonificationVIEs on Personification
VIEs on Personification
 
Flash fiction writing contest
Flash fiction writing contestFlash fiction writing contest
Flash fiction writing contest
 
Flash fiction writing contest
Flash fiction writing contestFlash fiction writing contest
Flash fiction writing contest
 
VIEs on Mass Media
VIEs on Mass MediaVIEs on Mass Media
VIEs on Mass Media
 
VIEs on Technology
VIEs on TechnologyVIEs on Technology
VIEs on Technology
 
VIEsfamily & friends
VIEsfamily & friendsVIEsfamily & friends
VIEsfamily & friends
 
VIEs on health & wellness
VIEs on health & wellnessVIEs on health & wellness
VIEs on health & wellness
 
COB4 Computer Crime
COB4 Computer CrimeCOB4 Computer Crime
COB4 Computer Crime
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

Cel1