You are on page 1of 5

10.

1 COMMUNICATE WITH OTHER ICT USERS USING


EMAIL
Emails are electronic messages that are sent between computers or devices either on a
network or over the internet.

Email Groups
Email Groups are list of contacts which are grouped together so that emails can be sent to
multiple recipients.
When sending an email to a group you would just have to write the name of the group rather
than writing everyone's email address.

Carbon Copy (Cc)

Cc is where you send an email to someone but also want other people to see a copy of the
email as well.

Blind Carbon Copy (Bcc)


Bcc emails are similar to carbon copies but any email addresses entered are hidden from the
view.

CONSTRAINTS THAT AFFECT THE USE OF EMAILS

i. Copyright
ii. The need for security
iii. Password protection
iv. LAWS FOR GENERAL USE OF EMAILS

Below are some laws which companies and individuals have to follow when using email:
 Ensuring emails do not have false or misleading subject lines.
 Organisations must include valid postal address.
 Organisations are not allowed capture and store lists of email addresses.
 Organisations are required to ask for permission before they can send emails to
individuals.
 There should be a clear way for recipients to “optout”(unsubscribe) from receiving
email.
 Organisations must ensure privacy policy is clear and that subscribers are made aware
of such policies.

v. ACCEPTABLE LANGUAGE
When sending an email the language and content within the email needs to be appropriate.
 If the emails is being sent to an employee within a business then the language should
be formal
vi. NETIQUETTE
Netiquette is a set of rules that users of email should try and follow when sending emails.
These rules include:
 Do not type all in capital letters. This is seen as being aggressive.
 Only use reply to all if absolutely necessary.
 Fill in the subject line with something meaningful. Gives the reader an idea what the
content is.
 Do not email any personal information.
 Keep emails short and to the point.
 Use bcc: to ensure privacy. Bcc hides email addresses from recipients.
 Compress files attachments so that larger files can be sent quicker.

10.2 EFFECTIVE USE OF THE INTERNET


INTERNET TERMS
1. HTTPS(HyperText Transfer Protocol Secure)
a. Secure version of HTTP
b. All data is encrypted
c. Secure protocol identifier

DIFFERENCES BETWEEN HTTP AND HTTPS

 HTTP is not secure while HTTPS is secure.


 HTTP uses SSL while HTTP does not use SSL.
 HTTPS transmits data over the internet in an encrypted form while HTTP transmits
data over the internet in an unencrypted form.
 HTTPS requires additional processing power in its servers which could result in
slowdown of responses.

2. FTP (File Transfer Protocol) is used to transfer files from one computer to another.

DIFFERENCES BETWEEN HTTPS AND FTP

 HTTP is used to access the world wide web/web sites


 FTP is used to download from file servers whereas http is used to download from web
servers
 FTP – files are transferred from one device to another and copied into memory
 HTTP transfers the contents of a web page into a browser for viewing.
 FTP upload is used in cases when the file size is very large
 HTTP upload is used for smaller files.

3. ISP(Internet Service Provider) provides Internet access.

WHAT ISP OFFERS ITS CUSTOMERS


 Often offers web space to create own website.
 Provides email address.
 Router to connect to the internet.
 Domain name to have own website.
 Storage space to save data in the cloud.
 DNS service to convert URLs to IP addresses.

4. URL-A URL is a Uniform Resource Locator is the unique address for a file that is
accessible on the Internet.

It consists of a;

 protocol usually http or https


 domain name that identifies a specific computer on the Internet
 pathname that specifies the location of a file in that computer.

STRUCTURE OF A WEB ADDRESS


https://www.hothouse-design.co.uk/portfolios

https:// - This is the hypertext transfer protocol secure. Set of rules/protocol.

hothouse-design - this shows the domain name that the company have purchased.

.uk - The company/domain is registered in the UK.

/portfolios - The folder in which the work is stored on hothouse’s server.

WEB BROWSER
A web browser is a software application that provides a way to view and interact with pages
on the World Wide Web.

SEARCH ENGINE
A Search engine is a database on the World Wide Web that helps us to quickly and easily
find the web pages we want.

The user enters 'key words' or phrases on the subject that they are interested in. The search
engine searches its database looking for references to the key words. It then returns web
pages with links to the relevant websites it found.
The most popular or most visited websites are usually put near to the top of the results page.

Some examples of search engines are:

 Google
 AltaVista
 Yahoo

BLOG
A regularly updated website or web page run by an individual or small group.

The owner can only edit it. It is written in an informal or conversational style and it’s an
Online journal/diary for writing personal opinions.

WIKI
A website or database used for collaboration by a community of users/members of a group

-Allowing any member to add and edit content.

VOIP

Voice Over Internet Protocol is a method for the delivery of voice communications over
Internet /Internet.

-Protocol/ IP networks.Examples: IP/internet/broadband telephone/broadband phone service.

WAYS YOU COULD MINIMISE THE CHANCE OF FINDING


UNRELIABLE INFORMATION WHEN SEARCHING THE INTERNET
 avoid using information from sites that have excessive advertising
 avoid using sites where the information from sites where advertising is related only to
its own products.
 avoid sites where the date of the last update was a long time ago.
 avoid using wikis/sites which the user can edit.
 avoid using blogs/sites which are clearly the owner’s point of view/social networking
sites.
 Avoid using sites which have grammatical/spelling mistakes
 Don’t just rely on using first website you come to in the results of using a search
engine
 use information from sites where responsible bodies have endorsed the site/sites
which have links to other reliable sites/sites which have testimonials.
 use sites where the author’s credentials are good
 use sites which have .ac… , .gov, .edu as the final part of the URL/only use
government/academic sites.
 Compare information from different sites/ reliable/authenticated text books to see if
the results are similar.
 Ask teachers for advice on a site.

HOW YOU WOULD EVALUATE THE RELIABILITY OF


INFORMATION FOUND ON THE INTERNET
 Internet is not policed so information is not necessarily reliable.
 Anybody can have a website so information is not necessarily reliable.
 Anybody can publish their understanding of a topic so information is not necessarily
reliable.
 If site has excessive advertising it could be unreliable.
 If the advertising is related only to its own products it could be unreliable.
 The final part of a URL can help to identify reliability. e.g. ac, .gov, .org
government/academic sites are usually fairly reliable.
 If site is endorsed by reliable/reputable people/organisations it can be accepted as
being reliable.
 If it has links to other reliable sites/ sites which have testimonials it is usually reliable.
 If it has testimonials it is likely to be reliable.
 If the author’s credentials are good it is likely to be reliable.
 If information is comparable to information from reliable/authenticated text books it
is likely to be reliable.
 If the date of the last update was a long time ago it is likely to be unreliable.
 Sites which have grammatical/spelling mistakes are likely to be unreliable.
 Compare information from different sites/text books to see if the results are similar. If
it has been recommended by teachers it is likely to be reliable.

You might also like