Chapter 10
Chapter 10
COMMUNICATION
EMAIL
Communicate
with other ICT
users using Spam
email
Email
Group
CONSTRAINTS
Apart from the person you are sending the email to, there are other options available, such as:
carbon copies (cc)
blind carbon copy (bcc)
forward
attachments
CARBON COPIES (CC) AND BLIND CARBON COPIES (BCC)
The difference between carbon copies (Cc) and blind carbon copies (Bcc) is that he Bcc address details are
invisible to everyone receiving the email, apart from the Bcc recipient.
However, all recipients in a Cc list, can be seen by all other recipients.
The use of Cc is really just netiquette; those on the ‘To’ are the main recipients and those in the ‘Cc’ list are
interested parties.
Bcc is often used as a security measure when using email groups.
When sending an email to many recipients, the following is an added security to keep the addresses of everyone
safe:
Put your own email address in the ‘To’ field.
Set up an email group containing all the recipients and give it a name; then store this.
Put this named email group in the ‘Bcc’ field.
This will provide some additional protection, because anyone seeing the email (authorised or unauthorised) will
not be able to see the email addresses of the individual recipients.
FORWARDING OF EMAILS
Forwarding of emails should be treated with great care.
Suppose your name is Dave and you work for a company with the domain hothouse-design.co.uk.
You have been given a company email address box where all your emails are received: [email protected].
You have decided to forward all of your emails to [email protected] where you can read them at your leisure.
This means that all your emails, including spam, will be sent to this yahoo address.
Two problems exist here:
1 Some internet service providers (ISPs) do not recognize the true source of emails and regard all emails as actually
coming from the hothouse-design.co.uk domain, including spam, because they will have been forwarded from that
domain.
2 Some ISPs have spam filters in place based on email volumes from just one address.
Both outcomes are undesirable, because there will now be an increased risk that many of the emails sent to the Yahoo
address will be spam.
You could end up being blacklisted by your ISP.
ATTACHMENTS
Always treat attachments with great caution. Spam and phishing emails can potentially contain malicious
attachments.
Your computer can become infected if the attachment contains an executable file.
It is also important to remember when sending attachments that the ISP will have a limit on the size of file that can
be sent.
Emails were never intended to include large files.
SPAM
Advantages
Easier- only need to use the single group name as recipient
Areas of interest- target email to specific groups
Ensure all correct people receive email
Saves a lot of time
10.2 EFFECTIVE USE OF THE INTERNET
INTERNET
Private internet
Outsiders can’t connect
Exist between building & company
Need login id & password before can start using it
REASON FOR ADOPTING INTRANETS RATHER THAN INTERNET
Public Cloud
Clients and service providers are from different entities
Example: Google, Amazon, IBM, Microsoft
Private Cloud
Clients and service providers operates as single entity
Server can be located at client’s place, or provider’s place
Hybrid Cloud
Combination of public & private
Less sensitive data can be transferred to public cloud
Advantages Disadvantages
• Data can be accessed anytime ( with • Security aspects
internet) • Data privacy
• No need to carry external storage • hacking
devices • Need a good internet connection
• As a remote backup • Cost can be high
• Allow recovery of data • Potential failure
• Almost unlimited storage capacity
GENERAL INTERNET TERMS
WWW
HTTP/HTTPs
Web browser
URL
FTP
ISP
Search Engine
WWW
HTTP HTTPS
Have ‘Home’
Ability to store user favorite website
Keep browsing history
Can backward & forward
Have hyperlinks that allow user to navigate between web page
URL
Domain Domain
host type
https://www.google.com.mm/
protocol Country
Domain
code
name
FTP
Software system that is designed to search the world wide web in a systematic way
for particular information specified in a textual web search query
BLOGS
Web logs (blogs) are personal internet journals where the writer (blogger) will type in their observations on a topic
(for example, a review about the latest movie release) and perhaps provide links to some relevant websites.
Features of blogs:
updated on a regular basis by the author
usually organized in reverse chronological order (most recent to least recent entry)
other internet users cannot change blogs – they can only read them.
Microblogs are similar to blogs, but are most often used on social networking sites to make short, frequent posts.
The posts can be done using instant messaging, emails or use other social networking vehicles (such as tweets).
Social networking sites use microblogs to allow members to update their personal profiles,
WIKIS
Wikis are web applications or websites that allow any user to create and edit their web pages using any web browser.
A wiki will support hyperlinks and uses a very simple syntax (known as wiki markup) to create pages.
They have often been described as ‘web pages with an <edit> button’.
Features of wikis:
anyone can edit, delete or modify the content
many authors can be involved in a wiki
it is possible to organize a page any way the author(s) wish(es)
shows/keeps track of all entries – that is, stores a document history
can be easily edited using a web browser
allows large documents to be seen by many people – it is easier than emailing several people
SOCIAL NETWORKING SITES
Social networking sites focus on building online communities of users who share the same interests and activities.
They enable people to share photos, videos and music, hobbies, favorite eating places, and so on.
The members do this by creating public profiles and thus form relationships with other users.
Features of social networking sites:
Each member is provided with free web space.
Each member can build their own private and public profiles.
It is possible to upload content such as text messages, photos and videos.
It is possible to ‘write on each other’s walls’.
Members are given free instant messaging and video chatting.
It is possible to email other members within the community.
Members can create pages where they can post photos, articles, and so on.
It is possible to invite people to become friends.
Members have control over who can access their private or personal data.
FORUM
A moderated forum refers to an online discussion forum in which all the posts are checked by an administrator
before they are allowed to be posted.
The moderator can not only prevent spam, but can also filter out any posts that are inappropriate, rude or
offensive, or even those that wander off the main topic.
The internet is essentially a huge unmoderated forum.
No one ‘owns’ the internet, and it is essentially not policed.
The only real safeguards are a voluntary cooperation between the users and the network operators.
However, most social forums or networking groups on the internet have a set of rules or protocols that members
are requested to follow or they will be deleted.
QUESTIONS