Second Part REAL
Second Part REAL
The language used by people when writing emails should follow an acceptable code of practice. The following is
a list of unacceptable content to be used in emails, text messages and online forums:
» obscene images
» language that is regarded as abusive, profane, inflammatory, coercive, defamatory or blasphemous
» racist, exploitative or violent messages
» use of illegal materials or messages. This list does not cover everything, but gives some idea of what is not acceptable
when sending emails.
It is not regarded as adequate that recipients can simply delete images or messages. It is essential that anyone writing
emails, or posting messages on bulletin boards, etc. is aware of the above constraints.
Guidelines set by an employer It is imperative that any company (no matter how small or large) that employs people
publishes guidelines regarding use of emails and other electronic communications. Guidelines must follow the laws in the
particular country in which the company operates. Companies must indicate how they will ensure that all of their staff are
following the rules. Figure 10.2 shows an example of the kind of things that might be included within a company’s guidelines.
Prepared By: Laila Fakhoury
Prepared By: Laila Fakhoury
Copyright and security of emails
It is very important to realise that emails are subject to copyright laws. Just because it is relatively easy to forward
an email does not mean it is always legal to do so. This is also true of any attachments sent with an email.
As with web pages, the copyright in an email is determined by its content. Printing, copying or forwarding emails is
generally not considered a breach of copyright unless the sender has indicated clearly that the message is
confidential or the subject of copyright law.
It is important that the recipient checks this out before forwarding it on to somebody else. Most companies or
organisations will clearly set out their policies on sending emails and the material that they contain.
This will be particularly true if the sender’s email address is part of the company’s name, for example,
A.N.User@company_name.com.
Emails and attachments from companies and organizations will usually contain some copyright statement, such as:
Any dissemination or copying of this email or attachment is strictly prohibited unless you are the intended recipient
or are responsible for delivering the message to the intended recipient. If you have received this email in error,
please let us know and then delete the original email and any attachments.
» using strong passwords when logging on to your email account (for example, the name of your pet is a weak password;
strong passwords contain a combination of letters, numbers and other symbols: Sy12@#TT90kj=0 would be regarded as a
strong password)
» using spam filters to remove certain suspicious emails to a ‘junk folder’ or even to block the email entirely
» running anti-virus and anti-spam software at all times on your computer, to protect against emails from unknown or
malicious sources.
https://www.youtube.com/watch?v=gF_j5wquens
Pre
pa
re
dB
y:
La
ila
Fa
k ho
u
ry
Prepared By: Laila Fakhoury
Prepared By: Laila Fakhoury
Prepared By: Laila Fakhoury
Prepared By: Laila Fakhoury
Prepared By: Laila Fakhoury
Prepared By: Laila Fakhoury
Prepared By: Laila Fakhoury
• Explain why email groups are used (syllabus)
dave@hothouse-design.co.uk.
You have decided to forward all of your emails to dave2468@yahoo.com where you can read them at your leisure. This
means that all your emails, including spam, will be sent to this yahoo address.
Two problems exist here:
1 Some internet service providers (ISPs) do not recognise the true source of emails and regard all emails as actually coming
from the hothouse-design.co.uk domain, including spam, because they will have been forwarded from that domain.
2 Some ISPs have spam filters in place based on email volumes from just one address.
Attachments Always treat attachments with great caution. Spam and phishing (see Chapter 8) emails can potentially
contain malicious attachments. Your computer can become infected if the attachment contains an executable file.
Examples of executable files are those ending in: .exe, .msi, .bat, .cmd, and so on.
It is also important to remember when sending attachments that the ISP will have a limit on the size of file that can be
sent. Emails were never intended to include large files. It is probably better to look at alternatives when sending large
files, such as:
» file compression
» selecting a web service that allows files to be transferred: upload the file(s) and then create a link. This link can be
sent in an email and the recipient can then easily download very large files by clicking on it.
?? ???
n th e m
b etwee
e renc es
i f f
n ow any d
o u K
e l lm e if y
a n t
Who c
1. Is only a part of the internet which users can access using web browser software.
2. The World Wide Web consists of a massive collection of web pages, and has been based on the hypertext transfer
protocol (http) since 1989.
3. The World Wide Web is a way of accessing information using the internet; so, the internet and the World Wide Web are
actually quite different.
An intranet is defined as ‘a computer network based on internet technology but designed to meet the internal needs for
Access to an intranet is usually confined to a company or organisation and, unlike the internet, is not available to the
general public.
» Intranets are safer because there is less chance of external hacking or viruses.
» It is easier to prevent external links to, for example, certain websites.
» Companies can ensure that the information available is specific to their internal audience’s needs.
» It is easier to send out sensitive messages in the knowledge that they will remain within the company.
» Intranets offer better bandwidth than the internet, therefore there are fewer connection limits than with the internet
(that is, the number of bits per second that can be transmitted are usually higher within an intranet).
It is also possible to create extranets that allow intranets to be extended outside the organisation, but with the same
advantages as an intranet; this allows, for example, trading partners to have controlled access to some information
(commercially-sensitive information is password protected).
» As discussed, the term internet comes from the phrase: INTERconnected NETwork.
» The term intranet comes from the phrase: INTernal Restricted Access NETwork.
» An intranet is used to give local information relevant to the company or organisation; whereas the internet covers everything.
» It is possible to block out certain websites using the intranet; while this is also possible with the internet, it is more difficult.
» An intranet often requires a password and user ID, and can only be accessed from agreed points/computers; whereas the
internet can be accessed by anyone from anywhere in the world, provided the user has an ISP account.
» An intranet is behind a firewall, which gives some protection against hackers, viruses, and so on; there is much less protection
» Information used in intranets is usually stored on local servers, which makes it more secure from outside users for the same
reasons as above.
Wikis are :
web applications or websites that allow any user to create and edit their web pages using any web browser. A wiki will
support hyperlinks and uses a very simple syntax (known as wiki markup) to create pages. They have often been described as
‘web pages with an button’.
Features of wikis:
» Anyone can edit, delete or modify the content
» Many authors can be involved in a wiki
» It is possible to organise a page any way the author(s) wish(es)
» Shows/keeps track of all entries – that is, stores a document history
» Can be easily edited using a web browser
» Allows large documents to be seen by many people – it is easier than emailing several people.
1. An internet service provider (ISP) is a company that provides users with access to the internet.
2. It is normal to pay a monthly fee for this service.
3. When a user registers with an ISP, an account is set up and they are given login details that include a user ID and
password.
4. An ISP has the equipment and telecommunications lines required to access the internet – usually broadband
connections which, in many cases, use fibre optic cables.
A web browser is software that allows a user to display a web page on their computer screen. They interpret or translate the
HTML from websites and show the result of the translation. This can often be in the form of videos, images or sound.
An error will occur if any part of the URL is incorrect. Most frequently, error page ‘HTTP 404’ will display on the computer
screen.
Prepared By: Laila Fakhoury
Prepared By: Laila Fakhoury
One of the most useful and powerful aspects of the internet :
Is the ability to easily search through vast amounts of information on almost any given topic.
There are basically two ways of locating information from the internet:
1. The first way is to type in the URL if you know the name of the website you wish to access.
2. The second method is to use a search engine if you do not know where to find the information you are looking for.
It is very important to acknowledge your sources of information when using information from a website in your own work,
both to avoid plagiarism and because the information will be subject to copyright. As we have already said, the internet is a
vast and very useful source of information, but it is important to be aware of its disadvantages as well as its advantages.
» Similarly, mobile phone companies offer a similar service and can block access to certain websites. It is not fool-proof,
but is an additional safety net.
» Schools and textbooks can also play their part by educating users about the correct use of the internet – what to look out
for and what precautions to take. Teachers are an excellent source of information; if a student wishes to access a new
website, it is always worth checking with the teacher first to see if it is safe to go online and access the website
Three from:
Blog usually has a single author/ a Wiki usually has many authors
Blog is usually in reverse chronological structure/ a Wiki has a structure determined
by content and users
Blog is usually personal/someone’s opinion/ a Wiki is usually objective
Can’t edit a blog/ a Wiki can be edited/ Can only add comments to a blog
Discuss the use of blogs and social networking sites as means of communication.
Six from:
Blog is public/anyone can see it
Blog is online diary/personal opinions
Viewers can only add comments on blogs/authors can reply to comments
Only author can edit blog
Social networking sites might only be available to friends of user
Social networking site enable users to send messages to small group of ‘friends’ to
arrange meetings
Friends can respond more quickly to messages within the group to confirm
availability
Easier to share photographs with others
Social networking sites can lead to seclusion from society
Social networking sites can lead to cyber bullying