SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Lesson 27
Communications and
Collaboration
Computer Literacy
BASICS: A
Comprehensive Guide
to IC3, 4th Edition

1

Morrison / Wells
Objectives



Lesson 27








2

Explore communication methods.
Identify the advantages of electronic communication.
Solve electronic communication problems.
Protect against viruses and other security risks.
Engage in professional and effective
communications.
Use other e-mail options.
Follow guidelines for electronic communication.

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Vocabulary




Lesson 27







filtering
fraud
hoax
logic bomb
netiquette
phishing
pyramid scheme
RDF Summary











3

Morrison / Wells

spam
tagging
teleconferencing
time bomb
Trojan horse
urban legend
virus
worm
CLB: A Comp Guide to IC3 4E
Exploring Communication
Methods

Lesson 27



4

When you work with
computers to
communicate, you
can use a variety of
electronic
communication
methods, including
e-mail and texting.

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Exploring Communication
Methods (continued)

Lesson 27



5



Teleconferencing uses a telecommunications
system to serve groups, permitting the live
exchange and sharing of information
between two or more people.
Syndication (Really Simple Syndication, or
RSS), also known as Rich Site Summary and
RDF Summary, are formats widely used to
share the contents of blogs.

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Identifying the Advantages of
Electronic Communication


Electronic communication offers many
advantages over other types of communication:
–

Lesson 27

–
–
–

–

6

Not restricted to a specific place and time
You can use text and graphics
You can use more than one type of
correspondence
Fosters community building
Online document sharing

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Identifying the Advantages of Electronic
Communication (continued)


Other advantages include:
–

Lesson 27

–

7

–
–

Speed is almost instantaneous
Cost is minimal or even free
Access is available from various devices
Forwarding and routing of messages can be
accomplished in an instant

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Solving Electronic Communication
Problems


Lesson 27



Lost Internet Connection:
You may be able to repair the problem with
the Internet Connections troubleshooter.

8

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Solving Electronic Communication
Problems (continued)



Lesson 27




E-Mail Software Problems:
Your service provider’s connection could be down.
Often, waiting a few minutes and then trying to send
or receive messages results in success.
Problems with Downloading and Viewing E-Mail
Attachments:
–
–
–

9

Attachment is too big or too many attachments
Antivirus software or e-mail program is blocking
Sender or type of e-mail is being blocked

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Solving Electronic Communication
Problems (continued)


Lesson 27



10




Delivery Failure:
E-mail delivery failure refers to a returned or
“bounced” e-mail.
Garbled Messages/No Guaranteed
Delivery:
Occasionally, e-mail and other transmissions
over the Internet are lost or spliced together.

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Solving Electronic Communication
Problems (continued)



Lesson 27







11

Lost Formatting:
Not all e-mail programs support HTML-formatted
messages, so formatting is lost.
Lack of a Paper Trail:
A paper trail is a written record, history, or collection
of evidence created by a person or organization in
the course of activities. Not all types provide this.
Hasty Responses:
Don’t send quick replies that you might later regret.

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Solving Electronic Communication
Problems (continued)



Lesson 27







12

Professional and Informal Communication:
When writing professional communications, take
time to be more formal.
Volume of E-Mail Replies:
Netiquette refers to good manners when
communicating through electronic media.
Junk Mail (Spam):
Just as with regular mail, you might receive
unsolicited messages in your inbox.

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Solving Electronic Communication
Problems (continued)


Lesson 27



13




Frauds, Hoaxes, and Other False Information:
Electronic fraud is a computer crime that involves the
manipulation of a computer or computer data to
dishonestly obtain money, property, information, or
other things of value, or to cause loss.
Phishing messages are personal information scams.
Pyramid schemes are an illicit business model where
profits are based on the investor’s ability to recruit
other people who are enrolled to make payments to
their recruiters.

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Solving Electronic Communication
Problems (continued)


Lesson 27



14



Frauds, Hoaxes, and Other False Information
(continued):
A hoax is an attempt to deceive an audience into
believing that something false is real.
Urban legends are stories that at one time could
have been partially true but have grown from
constant retelling into a mythical yarn.

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Protecting Against Viruses and
Other Security Risks


Lesson 27



15

Viruses:
A program written to corrupt data on a computer.
– A worm makes many copies of itself,
consuming system resources so that the
computer slows down or actually halts tasks.
– A time bomb does not cause its damage until
a certain date or until the system has been
launched a certain number of times.

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Protecting Against Viruses and
Other Security Risks (continued)

Lesson 27



16




Viruses (continued):
– A logic bomb is triggered by the appearance
or disappearance of specified data.
– A Trojan horse is a virus that does something
different from what it is expected to do.
General Security Risks:
The best way to protect data is to effectively
control access to it using passwords, firewalls, or
other methods.

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Engaging in Professional and Effective
Communications
–
–
–

Lesson 27

–
–
–
–
–

17

Content, tone, and format should be appropriate
Personal and social messages can be less formal
Select a method that suits the purpose
Respond quickly
Messages should be concise and to the point
Include one subject per e-mail
The purpose and recipients should determine the
level of formality
Don’t duplicate or repeat information

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Using Other E-Mail Options


Lesson 27



18

Control for viruses
and spam.
Protective tools and
procedures include
firewalls, encryption,
antivirus tools,
spam filters, and
user education.

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Using Other E-Mail Options


Lesson 27



19

Controlling Unsolicited E-Mail:
You can filter your incoming e-mail
messages to do the following:
–
–
–
–

Sort incoming messages into folders
Automatically tag messages
Forward messages
Discard messages

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Using Other E-Mail Options
(continued)


Lesson 27



20

Filtering Mail by Mail Servers:
E-mail servers are usually set up to catch
obvious spam and remove it before it is
transferred to users.

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Following Guidelines for Electronic
Communication
–
–
–

Lesson 27

–
–
–
–
–

21

Check all messages for viruses
Verify communication is appropriate before sending
Apply rules of netiquette and other policies
Encrypt e-mail messages
Back up and archive correspondence
Understand the sensitive nature of data sent online
Be aware communication can leave an “electronic
trail”
Follow school and organization guidelines

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Lesson 27

Summary

22

In this lesson, you learned:
 Teleconferencing uses a telecommunications
system to serve groups, permitting the live
exchange and sharing of information between
two or more people.
 Syndication (Really Simple Syndication or RSS),
also known as Rich Site Summary and RDF
Summary, are formats originally developed to
facilitate the syndication of news articles.
Morrison / Wells

CLB: A Comp Guide to IC3 4E
Summary (continued)

Lesson 27



23

Electronic communication offers many
advantages over other types of
communication. For example, the
communication is not restricted to a specific
place and time. Secondly, in most instances,
it uses text and graphics rather than voice.
These tools also provide for different types of
correspondence such as one to one, one to
many, or many to many.

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Summary (continued)

Lesson 27



24



Typical communication problems include failing to
connect to the Internet or to your e-mail server.
Being unable to download or view an e-mail
attachment could be due to the size of the
attachment, a virus in the message, the sender, or
the type of e-mail.
Communications netiquette, a combination of the
words net and etiquette, refers to good manners
and proper behaviors when communicating
through electronic media.

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Summary (continued)


Lesson 27



25



Fraud is a computer crime that involves manipulating a
computer or computer data to dishonestly obtain money,
property, or other things of value or to cause loss.
A virus is a program that has been written, usually by a
hacker, to corrupt data on a computer. The virus is
attached to a file and then spreads from one file to
another once the program is started.
Computer security can keep hardware, software, and
data safe from harm or destruction. The best way to
protect data is to effectively control access to it.

Morrison / Wells

CLB: A Comp Guide to IC3 4E

Weitere ähnliche Inhalte

Was ist angesagt?

Computer Literacy Lesson 30
Computer Literacy Lesson 30Computer Literacy Lesson 30
Computer Literacy Lesson 30cpashke
 
L26 communication services
L26   communication servicesL26   communication services
L26 communication servicesheidirobison
 
Computer Literacy Lesson 29
Computer Literacy Lesson 29Computer Literacy Lesson 29
Computer Literacy Lesson 29cpashke
 
Computer Literacy Lesson 28
Computer Literacy Lesson 28Computer Literacy Lesson 28
Computer Literacy Lesson 28cpashke
 
Computer Literacy Lesson 6
Computer Literacy Lesson 6Computer Literacy Lesson 6
Computer Literacy Lesson 6cpashke
 
Input and Output Devices worksheet
Input and Output Devices worksheetInput and Output Devices worksheet
Input and Output Devices worksheetmasharks
 
M.Florence Dayana Web Design-UNit 1
  M.Florence Dayana  Web Design-UNit 1  M.Florence Dayana  Web Design-UNit 1
M.Florence Dayana Web Design-UNit 1Dr.Florence Dayana
 
PST SC015 Chapter 3 Internet Technology (II) 2017/2018
PST SC015 Chapter 3 Internet Technology (II)  2017/2018PST SC015 Chapter 3 Internet Technology (II)  2017/2018
PST SC015 Chapter 3 Internet Technology (II) 2017/2018Fizaril Amzari Omar
 
Md.sajal khan(182482510)
Md.sajal khan(182482510)Md.sajal khan(182482510)
Md.sajal khan(182482510)SajalKhan18
 
IT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for MidtermIT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for MidtermMark John Lado, MIT
 
182482043, hridoy sutradhar
182482043, hridoy sutradhar 182482043, hridoy sutradhar
182482043, hridoy sutradhar HridoySutradhar
 
Digital communication protocols, methods and devices
Digital communication protocols, methods and devicesDigital communication protocols, methods and devices
Digital communication protocols, methods and devicessims1uni
 

Was ist angesagt? (20)

Lesson 25
Lesson 25Lesson 25
Lesson 25
 
Lesson 28
Lesson 28Lesson 28
Lesson 28
 
Computer Literacy Lesson 30
Computer Literacy Lesson 30Computer Literacy Lesson 30
Computer Literacy Lesson 30
 
L26 communication services
L26   communication servicesL26   communication services
L26 communication services
 
Computer Literacy Lesson 29
Computer Literacy Lesson 29Computer Literacy Lesson 29
Computer Literacy Lesson 29
 
Computer Literacy Lesson 28
Computer Literacy Lesson 28Computer Literacy Lesson 28
Computer Literacy Lesson 28
 
3.1 Network Basic
3.1 Network Basic3.1 Network Basic
3.1 Network Basic
 
Computer Literacy Lesson 6
Computer Literacy Lesson 6Computer Literacy Lesson 6
Computer Literacy Lesson 6
 
3.2.1 The Internet
3.2.1 The Internet3.2.1 The Internet
3.2.1 The Internet
 
amaha internet course
amaha internet courseamaha internet course
amaha internet course
 
Input and Output Devices worksheet
Input and Output Devices worksheetInput and Output Devices worksheet
Input and Output Devices worksheet
 
M.Florence Dayana Web Design-UNit 1
  M.Florence Dayana  Web Design-UNit 1  M.Florence Dayana  Web Design-UNit 1
M.Florence Dayana Web Design-UNit 1
 
PST SC015 Chapter 3 Internet Technology (II) 2017/2018
PST SC015 Chapter 3 Internet Technology (II)  2017/2018PST SC015 Chapter 3 Internet Technology (II)  2017/2018
PST SC015 Chapter 3 Internet Technology (II) 2017/2018
 
3.2.2 World Wide Web (WWW)
3.2.2 World Wide Web (WWW)3.2.2 World Wide Web (WWW)
3.2.2 World Wide Web (WWW)
 
computer Unit 9
computer Unit 9computer Unit 9
computer Unit 9
 
Md.sajal khan(182482510)
Md.sajal khan(182482510)Md.sajal khan(182482510)
Md.sajal khan(182482510)
 
IT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for MidtermIT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for Midterm
 
Punit kumar
Punit kumarPunit kumar
Punit kumar
 
182482043, hridoy sutradhar
182482043, hridoy sutradhar 182482043, hridoy sutradhar
182482043, hridoy sutradhar
 
Digital communication protocols, methods and devices
Digital communication protocols, methods and devicesDigital communication protocols, methods and devices
Digital communication protocols, methods and devices
 

Ähnlich wie Lesson 27

Computer Literacy Lesson 25
Computer Literacy Lesson 25Computer Literacy Lesson 25
Computer Literacy Lesson 25cpashke
 
Computer Literacy Lesson 24
Computer Literacy Lesson 24Computer Literacy Lesson 24
Computer Literacy Lesson 24cpashke
 
Computer Literacy Lesson 31
Computer Literacy Lesson 31Computer Literacy Lesson 31
Computer Literacy Lesson 31cpashke
 
Computer Literacy Lesson 30
Computer Literacy Lesson 30Computer Literacy Lesson 30
Computer Literacy Lesson 30cpashke
 
Cyber security and emails presentation
Cyber security and emails presentationCyber security and emails presentation
Cyber security and emails presentationWan Solo
 
L5_Electronic communication.pptx
L5_Electronic communication.pptxL5_Electronic communication.pptx
L5_Electronic communication.pptxenukahansana
 
E-mail and Instant MessagingChapter 16Principles of Co.docx
E-mail and Instant MessagingChapter 16Principles of Co.docxE-mail and Instant MessagingChapter 16Principles of Co.docx
E-mail and Instant MessagingChapter 16Principles of Co.docxbrownliecarmella
 
Cyber security and emails presentation refined
Cyber security and emails presentation refinedCyber security and emails presentation refined
Cyber security and emails presentation refinedWan Solo
 
Enhancing Email Security: A Comprehensive Examination of Email Verification...
Enhancing Email Security: A  Comprehensive Examination of Email  Verification...Enhancing Email Security: A  Comprehensive Examination of Email  Verification...
Enhancing Email Security: A Comprehensive Examination of Email Verification...madhumadhu542020
 
E-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) Protocol
E-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) ProtocolE-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) Protocol
E-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) ProtocolVishal Kumar
 
Hhs en09 email_security
Hhs en09 email_securityHhs en09 email_security
Hhs en09 email_securityShoaib Sheikh
 
Computer System Security PPT’s | ESHAN COLLEGE OF ENGINEERING
Computer System Security  PPT’s | ESHAN COLLEGE OF ENGINEERINGComputer System Security  PPT’s | ESHAN COLLEGE OF ENGINEERING
Computer System Security PPT’s | ESHAN COLLEGE OF ENGINEERINGsudoherogit
 
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEYPHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEYIJNSA Journal
 
SULTHAN's ICT-2 for UG courses
SULTHAN's ICT-2 for UG coursesSULTHAN's ICT-2 for UG courses
SULTHAN's ICT-2 for UG coursesSULTHAN BASHA
 
Virtual Bridge Sessions: The National Cyber Security Centre at Your Service
Virtual Bridge Sessions: The National Cyber Security Centre at Your ServiceVirtual Bridge Sessions: The National Cyber Security Centre at Your Service
Virtual Bridge Sessions: The National Cyber Security Centre at Your ServiceCollege Development Network
 
Data Communication Networking Issues in Real World
Data Communication Networking Issues in Real World Data Communication Networking Issues in Real World
Data Communication Networking Issues in Real World Thamalsha Wijayarathna
 

Ähnlich wie Lesson 27 (20)

Computer Literacy Lesson 25
Computer Literacy Lesson 25Computer Literacy Lesson 25
Computer Literacy Lesson 25
 
Lesson 31
Lesson 31Lesson 31
Lesson 31
 
Computer Literacy Lesson 24
Computer Literacy Lesson 24Computer Literacy Lesson 24
Computer Literacy Lesson 24
 
Computer Literacy Lesson 31
Computer Literacy Lesson 31Computer Literacy Lesson 31
Computer Literacy Lesson 31
 
Computer Literacy Lesson 30
Computer Literacy Lesson 30Computer Literacy Lesson 30
Computer Literacy Lesson 30
 
Cyber security and emails presentation
Cyber security and emails presentationCyber security and emails presentation
Cyber security and emails presentation
 
L5_Electronic communication.pptx
L5_Electronic communication.pptxL5_Electronic communication.pptx
L5_Electronic communication.pptx
 
Ums(2007)
Ums(2007)Ums(2007)
Ums(2007)
 
E-mail and Instant MessagingChapter 16Principles of Co.docx
E-mail and Instant MessagingChapter 16Principles of Co.docxE-mail and Instant MessagingChapter 16Principles of Co.docx
E-mail and Instant MessagingChapter 16Principles of Co.docx
 
Cyber security and emails presentation refined
Cyber security and emails presentation refinedCyber security and emails presentation refined
Cyber security and emails presentation refined
 
Enhancing Email Security: A Comprehensive Examination of Email Verification...
Enhancing Email Security: A  Comprehensive Examination of Email  Verification...Enhancing Email Security: A  Comprehensive Examination of Email  Verification...
Enhancing Email Security: A Comprehensive Examination of Email Verification...
 
E-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) Protocol
E-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) ProtocolE-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) Protocol
E-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) Protocol
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Hhs en09 email_security
Hhs en09 email_securityHhs en09 email_security
Hhs en09 email_security
 
Computer System Security PPT’s | ESHAN COLLEGE OF ENGINEERING
Computer System Security  PPT’s | ESHAN COLLEGE OF ENGINEERINGComputer System Security  PPT’s | ESHAN COLLEGE OF ENGINEERING
Computer System Security PPT’s | ESHAN COLLEGE OF ENGINEERING
 
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEYPHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
 
grade 6.pptx
grade 6.pptxgrade 6.pptx
grade 6.pptx
 
SULTHAN's ICT-2 for UG courses
SULTHAN's ICT-2 for UG coursesSULTHAN's ICT-2 for UG courses
SULTHAN's ICT-2 for UG courses
 
Virtual Bridge Sessions: The National Cyber Security Centre at Your Service
Virtual Bridge Sessions: The National Cyber Security Centre at Your ServiceVirtual Bridge Sessions: The National Cyber Security Centre at Your Service
Virtual Bridge Sessions: The National Cyber Security Centre at Your Service
 
Data Communication Networking Issues in Real World
Data Communication Networking Issues in Real World Data Communication Networking Issues in Real World
Data Communication Networking Issues in Real World
 

Mehr von Tracie King

The career search project
The career search projectThe career search project
The career search projectTracie King
 
The career search project word
The career search project wordThe career search project word
The career search project wordTracie King
 
Roles and Responsibilities: Developing the Team
Roles and Responsibilities: Developing the TeamRoles and Responsibilities: Developing the Team
Roles and Responsibilities: Developing the TeamTracie King
 
Interface: Creating the connection
Interface: Creating the connectionInterface: Creating the connection
Interface: Creating the connectionTracie King
 
Gameplay: Creating the Experience
Gameplay:  Creating the ExperienceGameplay:  Creating the Experience
Gameplay: Creating the ExperienceTracie King
 
Game Story and Character Development
Game Story and Character DevelopmentGame Story and Character Development
Game Story and Character DevelopmentTracie King
 
Production and Management: Developing the Process
Production and Management: Developing the ProcessProduction and Management: Developing the Process
Production and Management: Developing the ProcessTracie King
 
98 374 Lesson 02-slides
98 374 Lesson 02-slides98 374 Lesson 02-slides
98 374 Lesson 02-slidesTracie King
 
98 374 Lesson 01-slides
98 374 Lesson 01-slides98 374 Lesson 01-slides
98 374 Lesson 01-slidesTracie King
 
98 374 Lesson 06-slides
98 374 Lesson 06-slides98 374 Lesson 06-slides
98 374 Lesson 06-slidesTracie King
 
98 374 Lesson 05-slides
98 374 Lesson 05-slides98 374 Lesson 05-slides
98 374 Lesson 05-slidesTracie King
 
98 374 Lesson 04-slides
98 374 Lesson 04-slides98 374 Lesson 04-slides
98 374 Lesson 04-slidesTracie King
 
98 374 Lesson 03-slides
98 374 Lesson 03-slides98 374 Lesson 03-slides
98 374 Lesson 03-slidesTracie King
 

Mehr von Tracie King (20)

The career search project
The career search projectThe career search project
The career search project
 
The career search project word
The career search project wordThe career search project word
The career search project word
 
Roles and Responsibilities: Developing the Team
Roles and Responsibilities: Developing the TeamRoles and Responsibilities: Developing the Team
Roles and Responsibilities: Developing the Team
 
Interface: Creating the connection
Interface: Creating the connectionInterface: Creating the connection
Interface: Creating the connection
 
Gameplay: Creating the Experience
Gameplay:  Creating the ExperienceGameplay:  Creating the Experience
Gameplay: Creating the Experience
 
Game Story and Character Development
Game Story and Character DevelopmentGame Story and Character Development
Game Story and Character Development
 
Production and Management: Developing the Process
Production and Management: Developing the ProcessProduction and Management: Developing the Process
Production and Management: Developing the Process
 
98 374 Lesson 02-slides
98 374 Lesson 02-slides98 374 Lesson 02-slides
98 374 Lesson 02-slides
 
98 374 Lesson 01-slides
98 374 Lesson 01-slides98 374 Lesson 01-slides
98 374 Lesson 01-slides
 
98 374 Lesson 06-slides
98 374 Lesson 06-slides98 374 Lesson 06-slides
98 374 Lesson 06-slides
 
98 374 Lesson 05-slides
98 374 Lesson 05-slides98 374 Lesson 05-slides
98 374 Lesson 05-slides
 
98 374 Lesson 04-slides
98 374 Lesson 04-slides98 374 Lesson 04-slides
98 374 Lesson 04-slides
 
98 374 Lesson 03-slides
98 374 Lesson 03-slides98 374 Lesson 03-slides
98 374 Lesson 03-slides
 
Max2015 ch01
Max2015 ch01Max2015 ch01
Max2015 ch01
 
Max2015 ch03
Max2015 ch03Max2015 ch03
Max2015 ch03
 
Max2015 ch02
Max2015 ch02Max2015 ch02
Max2015 ch02
 
Max2015 ch05
Max2015 ch05Max2015 ch05
Max2015 ch05
 
Max2015 ch04
Max2015 ch04Max2015 ch04
Max2015 ch04
 
Max2015 ch06
Max2015 ch06Max2015 ch06
Max2015 ch06
 
Max2015 ch07
Max2015 ch07Max2015 ch07
Max2015 ch07
 

Kürzlich hochgeladen

Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 

Kürzlich hochgeladen (20)

Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 

Lesson 27

  • 1. Lesson 27 Communications and Collaboration Computer Literacy BASICS: A Comprehensive Guide to IC3, 4th Edition 1 Morrison / Wells
  • 2. Objectives   Lesson 27      2 Explore communication methods. Identify the advantages of electronic communication. Solve electronic communication problems. Protect against viruses and other security risks. Engage in professional and effective communications. Use other e-mail options. Follow guidelines for electronic communication. Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 3. Vocabulary    Lesson 27      filtering fraud hoax logic bomb netiquette phishing pyramid scheme RDF Summary         3 Morrison / Wells spam tagging teleconferencing time bomb Trojan horse urban legend virus worm CLB: A Comp Guide to IC3 4E
  • 4. Exploring Communication Methods Lesson 27  4 When you work with computers to communicate, you can use a variety of electronic communication methods, including e-mail and texting. Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 5. Exploring Communication Methods (continued) Lesson 27  5  Teleconferencing uses a telecommunications system to serve groups, permitting the live exchange and sharing of information between two or more people. Syndication (Really Simple Syndication, or RSS), also known as Rich Site Summary and RDF Summary, are formats widely used to share the contents of blogs. Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 6. Identifying the Advantages of Electronic Communication  Electronic communication offers many advantages over other types of communication: – Lesson 27 – – – – 6 Not restricted to a specific place and time You can use text and graphics You can use more than one type of correspondence Fosters community building Online document sharing Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 7. Identifying the Advantages of Electronic Communication (continued)  Other advantages include: – Lesson 27 – 7 – – Speed is almost instantaneous Cost is minimal or even free Access is available from various devices Forwarding and routing of messages can be accomplished in an instant Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 8. Solving Electronic Communication Problems  Lesson 27  Lost Internet Connection: You may be able to repair the problem with the Internet Connections troubleshooter. 8 Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 9. Solving Electronic Communication Problems (continued)   Lesson 27   E-Mail Software Problems: Your service provider’s connection could be down. Often, waiting a few minutes and then trying to send or receive messages results in success. Problems with Downloading and Viewing E-Mail Attachments: – – – 9 Attachment is too big or too many attachments Antivirus software or e-mail program is blocking Sender or type of e-mail is being blocked Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 10. Solving Electronic Communication Problems (continued)  Lesson 27  10   Delivery Failure: E-mail delivery failure refers to a returned or “bounced” e-mail. Garbled Messages/No Guaranteed Delivery: Occasionally, e-mail and other transmissions over the Internet are lost or spliced together. Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 11. Solving Electronic Communication Problems (continued)   Lesson 27     11 Lost Formatting: Not all e-mail programs support HTML-formatted messages, so formatting is lost. Lack of a Paper Trail: A paper trail is a written record, history, or collection of evidence created by a person or organization in the course of activities. Not all types provide this. Hasty Responses: Don’t send quick replies that you might later regret. Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 12. Solving Electronic Communication Problems (continued)   Lesson 27     12 Professional and Informal Communication: When writing professional communications, take time to be more formal. Volume of E-Mail Replies: Netiquette refers to good manners when communicating through electronic media. Junk Mail (Spam): Just as with regular mail, you might receive unsolicited messages in your inbox. Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 13. Solving Electronic Communication Problems (continued)  Lesson 27  13   Frauds, Hoaxes, and Other False Information: Electronic fraud is a computer crime that involves the manipulation of a computer or computer data to dishonestly obtain money, property, information, or other things of value, or to cause loss. Phishing messages are personal information scams. Pyramid schemes are an illicit business model where profits are based on the investor’s ability to recruit other people who are enrolled to make payments to their recruiters. Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 14. Solving Electronic Communication Problems (continued)  Lesson 27  14  Frauds, Hoaxes, and Other False Information (continued): A hoax is an attempt to deceive an audience into believing that something false is real. Urban legends are stories that at one time could have been partially true but have grown from constant retelling into a mythical yarn. Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 15. Protecting Against Viruses and Other Security Risks  Lesson 27  15 Viruses: A program written to corrupt data on a computer. – A worm makes many copies of itself, consuming system resources so that the computer slows down or actually halts tasks. – A time bomb does not cause its damage until a certain date or until the system has been launched a certain number of times. Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 16. Protecting Against Viruses and Other Security Risks (continued) Lesson 27  16   Viruses (continued): – A logic bomb is triggered by the appearance or disappearance of specified data. – A Trojan horse is a virus that does something different from what it is expected to do. General Security Risks: The best way to protect data is to effectively control access to it using passwords, firewalls, or other methods. Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 17. Engaging in Professional and Effective Communications – – – Lesson 27 – – – – – 17 Content, tone, and format should be appropriate Personal and social messages can be less formal Select a method that suits the purpose Respond quickly Messages should be concise and to the point Include one subject per e-mail The purpose and recipients should determine the level of formality Don’t duplicate or repeat information Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 18. Using Other E-Mail Options  Lesson 27  18 Control for viruses and spam. Protective tools and procedures include firewalls, encryption, antivirus tools, spam filters, and user education. Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 19. Using Other E-Mail Options  Lesson 27  19 Controlling Unsolicited E-Mail: You can filter your incoming e-mail messages to do the following: – – – – Sort incoming messages into folders Automatically tag messages Forward messages Discard messages Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 20. Using Other E-Mail Options (continued)  Lesson 27  20 Filtering Mail by Mail Servers: E-mail servers are usually set up to catch obvious spam and remove it before it is transferred to users. Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 21. Following Guidelines for Electronic Communication – – – Lesson 27 – – – – – 21 Check all messages for viruses Verify communication is appropriate before sending Apply rules of netiquette and other policies Encrypt e-mail messages Back up and archive correspondence Understand the sensitive nature of data sent online Be aware communication can leave an “electronic trail” Follow school and organization guidelines Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 22. Lesson 27 Summary 22 In this lesson, you learned:  Teleconferencing uses a telecommunications system to serve groups, permitting the live exchange and sharing of information between two or more people.  Syndication (Really Simple Syndication or RSS), also known as Rich Site Summary and RDF Summary, are formats originally developed to facilitate the syndication of news articles. Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 23. Summary (continued) Lesson 27  23 Electronic communication offers many advantages over other types of communication. For example, the communication is not restricted to a specific place and time. Secondly, in most instances, it uses text and graphics rather than voice. These tools also provide for different types of correspondence such as one to one, one to many, or many to many. Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 24. Summary (continued) Lesson 27  24  Typical communication problems include failing to connect to the Internet or to your e-mail server. Being unable to download or view an e-mail attachment could be due to the size of the attachment, a virus in the message, the sender, or the type of e-mail. Communications netiquette, a combination of the words net and etiquette, refers to good manners and proper behaviors when communicating through electronic media. Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 25. Summary (continued)  Lesson 27  25  Fraud is a computer crime that involves manipulating a computer or computer data to dishonestly obtain money, property, or other things of value or to cause loss. A virus is a program that has been written, usually by a hacker, to corrupt data on a computer. The virus is attached to a file and then spreads from one file to another once the program is started. Computer security can keep hardware, software, and data safe from harm or destruction. The best way to protect data is to effectively control access to it. Morrison / Wells CLB: A Comp Guide to IC3 4E