0% found this document useful (0 votes)
6 views

Topic 2-Internet & Email

The document provides an overview of the Internet's origins, distinguishing between the Internet and the World Wide Web, and discussing the use of web browsers and search engines. It covers email communication, including etiquette and safety, as well as online threats like spam and phishing. Additionally, it offers guidance on navigating the web and utilizing email applications effectively.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views

Topic 2-Internet & Email

The document provides an overview of the Internet's origins, distinguishing between the Internet and the World Wide Web, and discussing the use of web browsers and search engines. It covers email communication, including etiquette and safety, as well as online threats like spam and phishing. Additionally, it offers guidance on navigating the web and utilizing email applications effectively.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 48

Internet and e-Mail

Designed by Duba
1
Lesson Outcomes
Describe the origins of the Internet
Differentiate between the Internet and the Worldwide Web

Citing appropriate web terminology to describe the workings


of the Internet
Evaluate the Use Internet Browsers and search engines to navigate the
Internet
Internet as a
Explore the concept of "The Cloud"
phenomenon Critically discuss the key risks associated with using the
Internet for business and private use
Recall the basics of practising Internet Safety

Designed by Duba
Using an example such as MS Outlook or Gmail,
2 explain how
Explore email to to navigate and use an email application
communicate
List examples of good and poor email etiquette
The Beginnings of the Internet…

Designed by Duba
The Origin of the Internet
• D/ARPANET:
• ARPA - Advanced Research Projects Agency
• (Defence) Advanced Research Projects Agency
Network
• Funded by the US Government in the 1960s
• Allowed computers at leading universities and
research organizations to communicate with each
other over great distances

Designed by Duba
The Internet vs. The Web

• Internet – part of the system that is primarily


hardware infrastructure (telecommunications,
routers, servers, disk drives, etcetera) INTERNET

• Web - part of the system that contains


intellectual property in many multimedia formats
(test files, graphic files, sound files, video files, Web/www
etcetera): the means to access the Internet.

Designed by Duba
What Kind of Information is Available?
• In addition to text documents, the Internet makes available:
• graphics files (digitized photographs and artwork),
• files that contain digitized sound and video.
• Through the Internet, you can
• download software
• participate in interactive forums where users post and respond to public
messages
• join "chats," in which you and other users type (and, in some cases, speak)

Designed by Duba
messages that are received by the chat participants instantly.

6
Navigating the Web

Designed by Duba
Navigating the Web: Web Browsers
• There are several
applications called web
browsers that make it easy
to access the World Wide
Web.
• Popular browsers:
• Internet Explorer Edge
• Netscape Navigator

Designed by Duba
• Mozilla (firefox)
• Google Chrome
Exploring Browser Toolbars

Designed by Duba
Getting Around the Web
• Web sites
• URLs
• Hyperlinks

Designed by Duba
Web Sites
• Web site:
• Collection of related Web pages
• First page known as Home or Index page Home page
• Web page:
• HTML document
• Text and graphics
• Unique address
• Hyperlinks

Designed by Duba
Related pages
Uniform Resource Locator (URL)
• Every document and resource on the WWW has a unique address
known as its Uniform / Universal Resource Locator (URL)
• Uniform Resource Locator

Protocol Domain name Path


identifies contains the identifies the
the means host and top- subdirectories
of access level domain within the

Designed by Duba
Web site

URL http:// www.nytimes.com/ Pages/cartoons/


Domain
HTTP Pathname Document
name
Protocol

Designed by Duba
13
Current Top-Level Domains
• .aero Members of the air transport industry
• .biz Businesses
• .com Can be used by anyone
• .edu Degree granting institutions
• .gov Government
• .net Networking organizations
• .org Organizations (often nonprofits)
• .pro Credentialed professionals
• www World Wide Web
• Ac academic

Designed by Duba
• Org organisation
• Co company
• ZA South Africa
• UK United Kingdom

Hyperlinks

• Provide access to other Web pages via hyperlinks


• Specially coded text or graphics
• Cursor becomes a hand with finger pointing upward

Designed by Duba
Designed by Duba
Search Engines
General Search Engines
• Google
• Allows you to download software, articles, music lyrics
• You can search for institutions, shops, sport, people’s profiles, other search
engines.
• You can also create an e-mail account
• Google’s URL address: www.google.com
• Yahoo Search
• Allows you to download articles, play games, watch videos, you can also

Designed by Duba
create an e-mail account
• Yahoo’s URL address: www.yahoo.com
17
Search Engines for Academic Research
• Google Scholar
• This search engine is used for research purposes.
• Allows you to search for authors, books, journal articles,
reports etc.
• Google Scholar’s URL address: www.scholar.google.com

• SEALS
• South-East Academic Libraries System
• Finds books in the libraries of UFH, WSU, NMMU, Rhodes

Designed by Duba
• SEALS’s URL is http://opac.seals.ac.za/search
• Or go to http://www.ufh.ac.za/library/ and click on Search
the Library Catalogue.
18
Communicating via the Internet

Designed by Duba
Communicating Through the Internet

Designed by Duba
Why E-mail

• Electronic mail, or e-mail, is the most frequently used service on


the Internet for many reasons:
• Send a message any time, anywhere and the recipient can read it at his or
her convenience.
• Send the same message to multiple recipients.
• Forward information without retyping it.
• E-mail is fast, usually taking no more than a few seconds to be received.
• Attach digital files to your messages, including electronic documents, video
clips, music and photos.

Designed by Duba
• Send messages around the world as easily as to someone down the block.
21
Sending a new e-mail

• Click on New button

• A screen will appear Attach Item icon


Send button
as follows:
To textbox/line

Cc textbox/line

Designed by Duba
Subject
textbox/line

22
Chat Rooms
• Real time text-based conversations
• Rooms focus on specific topics or interests
• Identity protection
• Username

Designed by Duba
Instant Messaging
• Real time text based conversations
• Set up a list of contacts
• Buddy list
• Contacts must be online
• IM software detects presence
• Example: AOL Instant Messenger

Designed by Duba
Annoyances and Threats associated with the
Internet

Designed by Duba
Online Annoyances
Annoyances:
• Spam – electronic junk mail
• Pop-ups – intrusive advertising
• Cookies – tracking user’s browsing habits

More dangerous threats:


• Spyware – Programs that collect data from a user’s computer

Designed by Duba
• Phishing and Hoaxes – Ruses to fool and maybe steal from users.
Spam
• Junk E-Mail
• Spam filters
• Anti-spam practices

Designed by Duba
Pop-ups

• Usually advertising
• Pop-up automatically
• Pop-up blockers

Designed by Duba
Cookies
• Text files stored on client computers when visiting Web sites
• Used on return visits to Web sites
• Unique ID number
• Personal information remembered
• Privacy risk
• Selling information

Designed by Duba
Spyware
• Added as a program piggybacked
with a requested program
• Gathers information, usually
about surfing habits
• Anti-virus software doesn’t detect
it
• Anti-spyware programs are
required

Designed by Duba
Phishing and Hoaxes
• Phishing is a phony communication
• Attempts to scam someone into sending vital information
• Hoaxes are attempts to scam people into sending money, or join a
chain letter.

Designed by Duba
Designed by Duba
Email
Getting Started
• Go to www.ufh.ac.za/webmail. Alternatively, go to Outlook or Gmail (web-
based)
• Enter your e-mail logon details (use the same login details that you use
when you logon to the computer)
• Click Log On
• You will find the Inbox folder as the automatic page

Designed by Duba
33
Basic Operations & Considerations
• Inbox
• Sent Items Folder
• Deleting email
• Composing and sending a new email
• Attaching a file
• Attaching a folder
• Adding your Signature

Designed by Duba
• Etiquette
The Inbox
• The Inbox allows you to view e-mails that were sent to you by other people.
• You can also search for a specific e-mail that was sent to you by typing in the name of the item in the search textbox and click
the search icon
Search textbox

Search Icon

• To view an e-mail: Double click on it.


• If the e-mail contains an attachment ,

Designed by Duba
double click on the attachment
to save or view it.
• The screen shown on the right will appear
• Click the Save button to Save it or
35
• Open button to View it.
Sent Item Folder

• Allows you to view e-mails that you have sent to other people.
• It works just like the Inbox i.e. it has the same features of the Inbox
• You view Sent Items the same way you do when you view items in
the Inbox

Designed by Duba
36
Deleting e-mail Items
To delete an item from Inbox or Sent Items Folder or Drafts folder.
• Select an Item that you want to delete by Right clicking on it, then click on
Delete.
• Or click on the X icon. Selected item

Designed by Duba
37
Deleting e-mail Items
• Deleted items are kept in the Deletes Items folder
• You can view deleted items from this folder
• Deleted Items folder works the same as the other folders i.e. It allows you
to view, reply, forward, delete e-mail items
• You can also delete items from the Deleted Items folder but this time you
will be permanently deleting the item

Designed by Duba
38
Sending a new e-mail
• Click on New button

Attach Item icon


• The screen shown below will appear

Send button

To textbox/line

Cc textbox/line

Designed by Duba
Subject
textbox/line

39
Sending a new email
• In the To… textbox, write the e-mail address of the person to
whom you wish to send the e-mail.
• In the Cc… textbox, write the e-mail address of the person to
whom you wish to send a copy of the e-mail.
• In the Subject textbox, write the subject of the e-mail. It helps to
find an email if you have given it a meaningful subject.
• You can also format the text of the e-mail by changing the font
name, size, colour etc. You format text the same way you do when

Designed by Duba
formatting in MS Word.
• Once your e-mail is ready, click the Send button. 40
Attaching a file to a new e-mail
• You can attach a file by clicking on the attach
file button
• The screen shown shown to the right will
appear
• Click Browse to search for the file.
• Once you have found the file, double click on it
and the file path will appear on the Browse
textbox
• Then Click the Attach button
• If you want to attach more than one file, click

Designed by Duba
choose
• more files and do the same thing that you did
when attaching the first file 41
Attaching a folder to a new e-mail
• To attach a folder in an e-mail, you need to zip the folder first, otherwise the e-mail will not allow you to
attach the folder
• You zip a folder by Right clicking on the folder
• Click Add to archive and click OK
Zipped folder

Normal Folder

Designed by Duba
• Once you have zipped your folder, you can now attach it to your e-mail the same way you did
42 when attaching a file.
Adding a signature to an e-mail
• To add a signature to an e-mail…
• Click on Options button
• Go to the E-mail Signature section and type in your signature
• Click the check box button next to “Automatically include my signature on outgoing messages”
• Click the save button.
• Your signature will appear in every e-mail that you send
• You can also format your signature by changing its font name, size, colour etc.

Designed by Duba
Signature

43
Checkbox
button
Email Etiquette (Personal)

The Set of Rules and Guidelines to communicate more effectively

• Include a Greeting • Limit Text Formatting


• Be Clear and concise • Use a short signature
• Check your tone • Avoid CAPSLOCK
• Reply Carefully • Ignore Chain Emails
• Review before sending

Designed by Duba
https://edu.gcfglobal.org/en/email101/email-etiquette-and-safety/1/
Email Etiquette (For Business)

• Use a basic email address


• Be Courteous & Polite
• Never use Profanity e.g $%&#@!
• Be Cautious & Discreet
• Check you Recipients

Designed by Duba
https://edu.gcfglobal.org/en/email101/email-etiquette-and-safety/1/
Designed by Duba
UFH Library
UFH’s Library
• To access UFH’ s Databases
• Go to www.ufh.ac.za/Library
• Click Online Resources and Select Subscription Databases
• In Subscription Databases, you will find a variety of categories from A to Z
• Click a letter e.g. E to view resources that are in the E category
• Click the resource that you want to use
• If you have clicked Emerald for example,
• Type in what you want on the search textbox

Designed by Duba
• click GO (next to the textbox) and the hits will come out
• Double click on the hit that you find interesting to view or download
• Read and start typing your assignment!!!! 47
End – Enjoy the Internet

Designed by Duba
48

You might also like