Module 2: Communication Technology
USING E-MAIL
Almost everyone today uses e-mail. But there are some things that you might not know about e-mail. For example, did you know that when you send an e-mail message, it is actually broken up into many pieces, with each piece traveling independently to its destination? The message is reassembled in its proper format when it reaches its destination. Learning some of the things you don't already know about e-mail could help you get more out of this form of communication. Consider the following:
- Is e-mail considered synchronous or asynchronous communication?
E-mail is referred to as asynchronous communication because all the parties don't have to be using e-mail at the same time. One person can send while another person is off-line.
- How can you send e-mail to multiple people at one time?
E-mail can be sent to many people at the same time. In the TO: field, enter multiple e-mail addresses separated by commas in most email clients. In Outlook on e-MU, separate each name with a colon.
- When you address e-mail, you can fill in a recipient in the TO: field, and also in the CC: and BCC: fields. What do these mean?
CC: refers to carbon copy. These people also receive the e-mail, but are officially not the primary person to whom the message is addressed. BCC: refers to a blind carbon copy. This person also receives the e-mail, but no one else knows it has been sent to that person.
- What are attachments and how do you send them?
Attachments are files (such as an HTML document, a picture, or a sound file) that you send along with your written e-mail message. Simply select ATTACH in your e-mail program, and then select the file(s) to be sent. Note that some e-mail services limit the size of attached files that you can send and/or receive.
- How can I organize my e-mail?
You can create folders in which to store messages. Doing this will help keep your e-mail less cluttered.
- What is a signature file?
A signature file is a standard closing that is attached at the bottom of all e-mail messages. Most signature files consist of your name, e-mail address, other contact information (optional), and a favorite quotation (optional).
- Can I fetch messages from other e-mail accounts through Gmail or Misericordia's mail?
Yes. Many mail servers allow you to check your e-mail remotely over the Web. To accomplish this, you will be asked to enter the following information:
- POP mail host name (e.g., mail.epix.net)
- user name
- password
Keeping Your Computer Healthy
- What is a virus?
Viruses are computer programs that propogate themselves by attaching to programs files (.EXE files) on your hard drive.
- When were the first computer viruses created?
The theory behind computer viruses, the concept of a self-replicating program, started in 1949. Computer viruses have been around since the first Apple computers, in 1981.
Read a Timeline of Computer Viruses.
- How do most people contract a computer virus?
Computer viruses commonly come from the following sources:
- Opening e-mail attachments.
- The viruses are embedded within infected program (executable) files (.EXE files).
- Contained in macros inside Microsoft Office documents (i.e., Word or Excel).
- File sharing (infected programs or music files (mp3's)).
Read about how computer viruses spread at HowStuffWorks.com.
- What are the main types of viruses?
According to the AVP Virus Encycolpedia and HowStuffWorks.com, there are four main types of infection:
- file viruses: Infect executable (.exe) files.
- boot viruses: Save themselves into the disk boot sector or the Master Boot Record of a disk or hard drive.
- macro viruses: Live in macros within Microsoft office data files.
- network viruses: Infect network servers, and are spread through e-mail.
- e-mail viruses: Spread through e-mail attachments. This type of virus usually replicates itself by automatically mailing itself to people listed in the victim's e-mail address book.
- worms: A virus that uses computer networks and security holes to replicate itself.
- Trojan horses: This type of virus is embedded within a computer program (like a game). When you download and run the program, it does damage to your computer. These viruses do not replicate themselves automatically.
- How do I know if I have a virus, and what can I do about it?
Find valuable information at VirusList.com
- How can I avoid getting a virus?
Being prepared is the best defense for avoiding a computer virus. Take the following steps:
- Watch out for suspicious e-mail messages that have file attachments.
Don't fear plain text e-mail messages. If you receive an e-mail with an attached file, and you don't know who the sender is, just delete it! If you do know who the sender is, and that person sends you a suspicious message or a suspicious attached file, you might want to verify that person actually sent the attached file to you! (Some virus programs send virus-laden e-mails to people on the victim's address book.)
- Install a virus checker program, and keep it updated with the latest .DAT files.
- Turn on the Windows firewall utility (or install a firewall program).
Firewall software monitors your Internet connection and alerts you to any attempted intrusions. This is essential if your computer is online all the time (through DSL or cable modem). Firewall software can also automatically block any system trying to probe your PC, and can prevent your personal data (such as real name, address, e-mail address) from being sent to Web sites without your knowledge. Access the Windows firewall by selecting: start menu -- control panel -- Windows firewall. Learn more:
- Keep your copy of Windows updated.
Many hackers and virus creators seek out weaknesses in Windows as a way to attack your computer. Installing periodically released Windows updates will help you guard against this. Turn on automatic updates by selecting: start menu -- control panel -- system -- automatic updates.
- What are virus hoaxes?
Some people enjoy preying on people's fear and ignorance of viruses. These people enjoy sending hoax warning messages. The classic signs you have received a hoax message are:
- Subject line states a stern warning that a new virus has just been found.
- The message claims that a large company (like IBM or Microsoft) has just announced that this virus has been found.
- The message describes in graphic detail the horrors that will befall your computer if you don't heed the warning.
- The message prompts you to forward the message to everyone you know.
Read about virus hoaxes at Wikipedia.
 
View Dr. Steve's presentation on email etiquette for TED students: Email Etiquette
Being a good 'Net citizen requires using good Netiquette. Learn something about Netiquette through the following links:
In using the Internet as a means of communication, some aspects of the human element are missing, which can result
in a misunderstanding of the author's intent or feelings. To add the human element of emotion into e-mail, writers often use emoticons and acronymns. Check some out through the following links: