ECDL Online Essentials

Transcription

ECDL Online Essentials
Online
Essentials
ECDL Notes – Online Essentials
1 Web Browsing Concepts
1.1 Key Concepts
1.1.1 Understand the terms: Internet, World Wide Web (WWW), Uniform Resource Locator
(URL), hyperlink.
Internet
The internet relates to the hardware and software. It is a global system of interconnected computer
networks, which makes file sharing, communication and various services like internet banking, one
click away from the comfort of your home.
World Wide Web (WWW)
The World Wide Web is just a small part of the Internet. The World Wide Web is basically the text
and pictures that you can view using your browser such as Microsoft Internet Explorer
Uniform Resource Locator (URL)
URL stands for Uniform Resource Locator (another name for web address / website address) The
URL consists of the name of the protocol (usually HTTP); followed by the name of the website you
want to connect to.
Hyperlink
HYPERLINK is a piece of text or a picture on a web page that when clicked on will
automatically do one of the following:1.
2.
3.
4.
5.
Take you to a different part on the same page.
Take you to a different page within the web site
Take you to a page in a different web site
Enable you to download a file.
Launch an application, video or sound.
You can tell that a piece of text or a picture is a hyperlink, as when you point to it with your
mouse, the mouse pointer will change into the shape of a hand.
TIP: Hyperlink text is usually blue and underlined.
1.1.2 Understand the structure of a web address. Identify common types of domains like:
geographical, organisation (.org, .edu, .com, .gov).
Here‘s a typical web address:
http://www.nypl.org
There are four parts to a web address:

A web address always begins with ―http://‖ which stands for hypertext transfer
protocol and refers to the manner (also know as the―scheme‖) in which web
©TCTC
2
ECDL Notes – Online Essentials
pages are sent over the Internet. In current versions of Internet Explorer, the http://
is automatically inserted for you, so you don‘t need to struggle with typing it in.

A web address typically includes ―www‖ which is short for World Wide Web.
However, some web addresses do not have the www as part of their address. If
you‘re not sure whether the website you‘d like to visit has a www as part of its
address, try it both ways. One of the two is bound to work.

A web address includes a site name. In the example above, the site name is ―nypl‖,
which stands for New York Public Library.

A web address includes a domain name. In the example above the category is
―.org‖. There is occasionally a slash (―/‖) and some text following the domain
name. This typically represents a specific web page within the website.
o Some of the largest, most common domains are .com (commercial
site),
.edu
(educational
institution),
.gov (government site), .mil
(military site), .net (network site), and .org (non profit or private
organization) . So, when you next see a web address that ends in .edu, you‘ll
know that web site belongs to an educational institution.

There are never any empty spaces in a web address but underscored
spaces, i.e. ―_‖ are OK. Also, don‘t worry too much about using capital
letters. Very rarely is any distinction made between upper and lower case
letters.
1.1.3 Define the term web browser. Identify common web browsers.
A web browser is a software program that interprets the coding language of the World Wide
Web in graphic form, displaying the translation rather than the coding. This allows anyone
to ―browse the Web‖ by simple point and click navigation, bypassing the need to know
commands used in software languages.
Examples of web browsers include: Internet Explorer, Mozilla Firefox, Google Chrome.
1.1.4 Outline different Internet activities like: information searching, shopping, learning,
publishing, banking, government services, entertainment, communication.
Information Searching
People browse internet for information. They love to browse various search engines like Google,
Yahoo to know about any necessary information. Also people love browsing websites like Wikipedia
which is a complete encyclopedia on internet.
©TCTC
3
ECDL Notes – Online Essentials
Entertainment
There is a very close relation of internet to entertainment. It’s watching videos in YouTube, playing
live games, or downloading movies; internet proves its domination everywhere.
Communication
Communication is another way to use internet. People connect via each other through
various IM services likeGtalk, Skype, and Yahoo messenger. There are lots of other services
through which people send messages.
Shopping – E-Commerce
Increasingly you can purchase directly via a Web site by selecting the goods or services
which you require and entering your credit card details. When you send your credit
card details these SH OULD be encrypted by the site operators so that no one can intercept
your details. Most sites which accept credit card payment are on secure services and your
Internet browser program (i.e. Microsoft Internet Explorer or Netscape Communicator)
will normally inform you (via a popup) when you are entering or leaving a secure server.
There are numerous web sites from where you can purchase online, a famous example
being amazon.com. Most Internet based shopping sites use a virtual “shopping cart”
system. As you browse the site you can add any products you want to purchase to your cart.
Once you have placed items in the cart you can then move to the checkout stage. At the
checkout you enter your name & address, select the type of delivery you want and enter
your payment details.
Advantages of e-commerce
There are many advantages in using e-commerce:
 Services available 24/7
 Large stock range
 Detailed product information
 Ability to compare prices
 Right to return defective goods
Learning
E-learning refers to learning via the Internet or working through a disk based tutorial.
There are many advantages, but also some disadvantages.
One trainer can train many people at many different locations. If the training is solely
computer based, then the students can work at their own pace, and repeat parts of a course
which they do not understand. Also the teaching can be at any time, 24 hours a day, and 7
days a week. Often e- learning solutions are cheaper to provide than other more traditional
teaching methods.
©TCTC
4
ECDL Notes – Online Essentials
Publishing
One can also publish a book by using the internet which is also called an e-book.
Banking
Now internet can save time and money of people. The facility is known as internet banking
facility through which people can deposit any bill, transfer money through accounts, and
make internet reservations on time from their home.
Government services
E-Government (short for electronic government) is a diffused neologism used to refer
to the use of information and communication technology to provide and improve
government services, transactions and interactions with citizens, businesses, and other
arms of government.
1.2 Security and Safety
1.2.1 Recognise ways to protect yourself when online: purchase from secure reputable
websites, avoid unnecessary disclosure of personal and financial information, log off
from websites.
Purchase from Secure Reputable Websites
Shop safely. If you plan to order from an online store, be sure that the Web site uses secure
technology. When you are at the checkout screen, verify that the Web address begins with
https. Also, check to see if a tiny locked padlock symbol appears at the bottom right of the
checkout screen, or that there is a statement on the checkout screen stating that the pages
are secure with a security technology vendor. Check that the security technology does exist
by checking the security technology company’s web site.
Avoid unnecessary disclosure of personal and financial information
Do not give any personal or financial over the internet if the website is not Secure. In case of
chatting and you are using example IM write your nickname instead of your name. Never
accept strangers into your IM groups. Be smart about how you use IM at work because your
employer has the right to monitor and view your messages.
Log off from Websites
It’s important that when you log in a website using a username and password it’s important
that when you finish you log out this is because if other people use that computer and you
did not log out other people can see your personal information
1.2.2 Define the term encryption.
©TCTC
5
ECDL Notes – Online Essentials
Encryption is the conversion of data into a form, called a ciphertext, that cannot be easily
understood by unauthorized people. Decryption is the process of converting encrypted
data back into its original form, so it can be understood.
The use of encryption/decryption is as old as the art of communication. In wartime, a
cipher, often inaccurately called a code, can be employed to keep the enemy from
obtaining the contents of transmissions. Simple ciphers include the substitution of letters
for numbers, the rotation of letters in the alphabet, and the "scrambling" of voice signals by
inverting the sideband frequencies. More complex ciphers work according to sophisticated
computer algorithms that rearranges the data bits in digital signals.
In order to easily recover the contents of an encrypted signal, the correct decryption key is
required. The key is an algorithm (sequence of instructions) that undoes the work of
the encryption algorithm. Alternatively, a computer can be used in an attempt to break the
cipher. The more complex the encryption algorithm, the more difficult it becomes to
eavesdrop on the communications without access to the key.
1.2.3 Identify a secure website: https, lock symbol
Whenever you use a website that handles private or financial information, make sure the website is
secure.
To see if a website is secure, make sure that a lock icon appears in the window's title bar and that
the website's address begins with "https" (instead of "http"). If the website is not secure, you may
have been given a choice between a secure and insecure connection when logging into the site. Go
back to the page where you logged in, and check for a link to a secure login. Even if you do not plan
to view private information, it's best to use a secure login whenever possible, to ensure that your
login information is encrypted.
Try typing the following URL in your web browser:
©TCTC
6
ECDL Notes – Online Essentials
www.hsbc.com.mt
Note that the URL automatically changes to add https at the front of the web address, and you will
also see the padlock. This means that this website is safe to use.
The same applies if you try the below URL:
www.bov.com
Then click on Log in.
Why https?
Hypertext Transfer Protocol Secure (HTTPS) is a combination of the Hypertext Transfer
Protocol and a cryptographic protocol (also referred to as a security / encryption protocol).
HTTPS connections are often used for payment transactions on the World Wide Web and for
sensitive transactions in corporate information systems.
1.2.4 Define the term digital certificate.
E-commerce has flourished because of the ability to perform secure transactions online
using the proper tools. These tools are public key encryption and digital certificates.
©TCTC
7
ECDL Notes – Online Essentials
Public key encryption uses SSL (Secure Sockets Layer) to encrypt all data between the
customer's computer and the e-commerce website. Information is sent in encrypted form to
the site using the site's public key. Upon receiving the information, the site uses its private
key to decrypt the information. This is called a key pair. Interlopers that might capture data
en route will find it unreadable.
The problem, however, is that anyone can create a website and key pair using a name that doesn't
belong to them. This is where digital certificates come in. Digital certificates are trusted ID cards in
electronic form that bind a website's public encryption key to their identity for purposes of public
trust.
Digital certificates are issued by an independent, recognized and mutually trusted third party that
guarantees that the website operating is who it claims to be. This third party is known as a
Certification Authority (CA). Without digital certificates, the public has little assurance as to the
legitimacy of any particular website.
A digital certificate contains an entity's name, address, serial number, public key, expiration date and
digital signature, among other information. When a Web browser like Firefox or Internet Explorer
makes a secure connection, the digital certificate is automatically turned over for review. The
browser checks it for anomalies or problems, and pops up an alert if any are found. When digital
certificates are in order, the browser completes secure connections without interruption.
Though rare, there have been cases of phishing scams duplicating a website and 'hijacking' the site's
digital certificate to fool customers into giving up personal information. These scams involved
redirecting the customer to the real site for authentication, then bringing them back to the duped
website. Other phishing scams use self- signed digital certificates to dispose of the trusted third
party or Certificate Authority altogether. The issuer of the digital certificate and the signer are one in
the same. A browser will alert in this case, but most users click through anyway, not understanding
the difference.
Digital certificates play an integral role in keeping online commerce safe. If your browser alerts
you to a problem with a digital certificate, you are well-advised not to click through. Instead, call the
©TCTC
8
ECDL Notes – Online Essentials
business using a telephone number from your statements or phone book, and inquire as to the
problem.
Not all Certificate Authorities are equal. Some CAs are newer and less well known. Two examples of
highly trusted CAs are VeriSign and Thawte. If your browser does not recognize a Certificate
Authority, it will alert you.
1.2.5 Recognise options for controlling Internet use like: supervision, web browsing
restrictions, download restrictions.
It is highly recommendable that parents are aware of
their kids‘ activities online. Parental control includes
features such as:



Supervision
Web browsing restrictions
Download restrictions
Through Internet Explorer parents can enable the
content advisor, allowing their children to visit certain
sites which are safe, and restricting other sites which
are not safe.
To enable the content advisor:
 Open the Internet Explorer
 Click Tools.
 Choose Internet Options.
 Click on the Content tab.
 Click Enable.
 A new window will open.
 From the Ratings tab choose the level of rating
you wish to set.
 From the Approved Sites tab you can set which websites can be allowed (regardless of their
rating) and which websites you wish to block.
©TCTC
9
ECDL Notes – Online Essentials
2 Web Browsing
2.1 Using the Web Browser
2.1.1 Open, close a web browsing application.

To open the browser, double-click on the icon of the Internet Explorer.

To close the web browser you just have to click on the close icon in the title bar.
2.1.2 Enter a URL in the address bar and go to the URL.
In order to browse to a specific website you need to enter its URL in the address bar. Then
hit the Enter button on your keyboard.
©TCTC
10
ECDL Notes – Online Essentials
2.1.3 Refresh a web page, stop a web page downloading.
Refresh a Web Page
Click on the Refresh icon (near the address bar).
Stop a Web Page
Click on the Stop icon to stop the Web Page from downloading
2.1.4 Activate a hyperlink.
To activate a hyperlink simply click once on the link.
2.1.5 Open a web page in a new tab, new window.
To display a webpage in a new window:

Click Page, New Window.

Right click on the link that opens the webpage and click Open in New Window.
Or
To display a webpage in a new tab:

Right click on the link that opens the webpage and click Open in New Tab.
2.1.6 Open, close tabs, windows. Switch between tabs, windows.
To open a new tab click on the new tab icon and to close the tab click on the x button on
shown on the tab which you want to close. On the other hand to switch from one tab to
another click on the name shown on the tab and automatically it will direct to that tab
2.1.7 Navigate between pages: backwards, forwards, home page.
 To Navigate backward click on the backward icon next to the Address bar
 To Navigate forward click on the forward icon next to the backward icon
 To Navigate to home click on the icon that shows a house
2.1.8 Show previously visited URLs using history.
By default, Internet Explorer keeps tracks of the most-recent websites you have visited. This
way, you can easily return to a website you have recently visited even if you forgot its web
address.
©TCTC
11
ECDL Notes – Online Essentials
To view the browsing history:
Click on the Star to the left of your website tabs and click "History" on the pop-up that
follows.
Expand or collapse history items:
Click on one of the calendar icons such as "Today", "Last Week", or "2 Weeks Ago". History
items are then sorted by website. Click on one of the yellow icons to see what pages you
visited at a particular site.
2.1.9 Complete, submit, reset a web based form.
Sometimes when using the Internet for subscribing to a website, creating an e-mail account,
filling an online survey and so on, you will be asked to fill what we call ‗web-based forms‘.
These are forms that usually use text fields, drop- down fields and check boxes amongst
others to help you fill your information more efficiently and accurately.
Below is an example of a web-based form used by hotmail when creating a new account:
©TCTC
12
ECDL Notes – Online Essentials
Normally you need to use the Tab key (not the Enter key) to move from one field to the next
field within the form.
Many times, in a web-based form you will find the Submit and Reset buttons.

Use the Submit button when you are
ready to submit your form (transmit the
form across the internet).
 Use the Reset button if you wish to empty
your form to start afresh.
©TCTC
13
ECDL Notes – Online Essentials
2.1.10 Use a web tool to translate a web page, text.
Google's free online language translation service instantly translates web pages and text to
other languages
Translate a Web Page

Enter the URL http://itools.com/tool/google-translate-web-page-translator in the address
bar
 Write the URL in the translation box
 Choose language From and To
 Click on Translate
Translate Text

Enter the URL http://itools.com/tool/google-translate-text-translator in the address bar
 Write the Text in the translation box
 Choose language From and To
 Click on Translate
©TCTC
14
ECDL Notes – Online Essentials
2.2 Tools and Settings
2.2.1 Set the web browser home page.
What is a Home Page?
The Home Page is the website that appears every time you click on the internet explorer
icon. You can set the homepage to any website you wish. To change the home page you
have to: Click on Tools.
 Then click on Internet Options.
 Click on the General Tab of the Internet Options.
 If you wish to use the currently displayed page as your home page click on Use
current.
 If you wish to use the default the website you had before click on Use default.
 If you wish that you will have a blank page click on Use blank.
 If you wish to use another home page enter the full URL into the address box.
 Click OK to close the Internet Options.
©TCTC
15
ECDL Notes – Online Essentials
2.2.2 Understand the term pop-up. Allow, block pop-ups.
Pop-ups are windows that open automatically when you visit particular websites. Such popups may be pornographic, games-related and unnecessary. Many pop-ups are dangerous to
your computer; others are not harmful at all
What is a pop-up blocker?
Pop-up Blocker is a feature in Internet Explorer that lets you limit or block most pop-ups. You can
choose the level of blocking you prefer, from blocking all pop-up windows to allowing the pop-ups
that you want to see. When Pop- up Blocker is turned on, the Information bar displays a message
saying "Pop- up blocked. To see this pop-up or additional options click here."
To allow pop-ups:


Click Tools, Pop-up Blocker, Turn On
Pop-up Blocker.
To block pop-ups:


Click Tools, Pop-up Blocker, Turn Off
Pop-up Blocker.
2.2.3 Understand the term cookie. Allow, block cookies.
Cookies are used by Web sites to keep track of their visitors. Internet cookies raise privacy concerns,
although they can also make the Web easier to navigate.
Allowing / blocking cookies


In Internet Explorer, on the Tools menu, then click Internet Options.
Click the Privacy tab, and then click Advanced.
©TCTC
16
ECDL Notes – Online Essentials





Click Override automatic cookie handling, and then specify how you want Internet Explorer
to handle cookies from first-party Web sites and third-party Web sites (a Web site other
than the one you are currently viewing).
To specify that you want Internet Explorer to always allow cookies to be saved on your
computer, click Accept.
To specify that you want Internet Explorer to never allow cookies to be saved on your
computer, click Block.
To specify that you want Internet Explorer to ask whether or not you want to allow a cookie
to be saved on your computer, click Prompt.
If you want Internet Explorer to always allow session cookies (cookies that will be deleted
from your computer when you close Internet Explorer) to be saved on your computer, click
Always allow session cookies.
2.2.4 Use available help functions.
As in most applications Outlook has a built-in support feature. To use Help, simply click on
the Help menu in the main view. Then choose Microsoft Office Outlook Help
The Help window will be displayed as illustrated:
Select one of the available help topics, or click on the Search Box to search for a topic by
entering a keyword.
2.2.5 Display, hide built-in toolbars. Restore, minimise the ribbon.
Display, hide built-in toolbars
 Click Tools, and then choose Toolbars.
 The menu that appears will show you the available toolbars in your web browser.
 The toolbars that are currently switched on are marked with a tick on the left hand
side.
 You can toggle between displaying and hiding toolbars by clicking on them.
©TCTC
17
ECDL Notes – Online Essentials
Minimise the Ribbon

To quickly minimize the Ribbon, double-click the name of the active tab. Double-click
a tab again to restore the Ribbon.

Keyboard shortcut To minimize or restore the Ribbon, press CTRL+F1.
Restore the Ribbon



Click Customize Quick Access Toolbar Button image.
In the list, click Minimize the Ribbon.
Keyboard shortcut To minimize or restore the Ribbon, press CTRL+F1.
2.2.6 Delete history, temporary internet files, saved form data.




Click on the "Tools" menu and select Internet Options
From the General Tab click Delete
Then tick which options would you like to delete
Click Delete
2.3 Bookmarks
2.3.1 Add, delete a bookmark / favourite.
Have you ever gone to a site and liked it so much you wanted to keep going back? You can bookmark
it, which means that you save it, so next time all you have to do is choose it from a menu.
Add a bookmark:

Go to the website that you wish to set as a bookmark.

Click the Add to Favourites button
©TCTC
, and then click Add to Favourites.
18
ECDL Notes – Online Essentials

Give a name to your bookmark, Choose the folder which you want to add the bookmark to
and then click Add.
Delete a Bookmark



Click on the Star at the left hand side of your Internet Explorer browser.
Click on Favourites.
Right click on the bookmark that you wish to delete and click delete from the
menu that appears.
2.3.2 Show bookmarks / favourites.
Click on the Favourites (Star) button in your browser.
 Click Favourites.
 Then click on the webpage that you wish to display.
2.3.3 Create; delete a bookmarks / favourites folder. Add web pages to a bookmarks /
favourites folder.(Refer also to 2.3.1
Create a Bookmark Folder
 Open Favourites.
 Right click anywhere in the favourites pane.
 Choose Create New Folder.
 Type in a name for your folder and press Enter.
Delete a bookmark folder:
 Open Favourites.
 Right click on the bookmark folder that you wish to delete.
 Click Delete.
©TCTC
19
ECDL Notes – Online Essentials
2.4 Web Outputs
2.4.1 Download, save files to a location.
There are two ways how one can download files from a web page.
 Left click on the download hyperlink.
 A window will open, as illustrated:
 Click Save and choose a destination for your file(s).
OR
 Right-click on the download hyperlink.
 Click Save Target As…
 Choose a destination where you wish to save your file.
©TCTC
20
ECDL Notes – Online Essentials
2.4.2 Copy text, image, URL to another location like: document, e-mail.
Copy Text to a document/email
 Highlight the text you wish to copy.
 Right-click on the highlighted text and
choose Copy.
 Open the document where you wish to
paste your text. Right-click and choose
Paste.
Copy an image from a web page to a document:
 Right-click on the image you wish to copy.
 Click Copy.
 You can then paste your picture on a document, by clicking Edit, Paste or right-click
and Paste.
Copy a URL from a website:




Right click on the website URL in the address bar.
Click Copy.
Open the document where you wish to paste the URL.
Right-click and choose Paste.
©TCTC
21
ECDL Notes – Online Essentials
2.4.3 Preview, print a web page, selection from a web page using available printing
options.
Preview a Web Page
 Click on the arrow next to the printer icon in your web browser.
 Choose Print Preview.
Print a Web Page or a Selection from a web page
 Click on the arrow next to the Printer icon in your browser.
 Click Print.
 This will open the Print dialog box.
 You can use this dialog box to change several settings before giving the actual print
command.
 In the Page Range section you can choose to:
o Print all the pages in a specific webpage.
o Print a Selection from the webpage (you need to highlight the text
beforehand).
o Print a range of pages.
o You can also set the number of copies for a specific print page.
 When you have made all the necessary changes click the Print button.
©TCTC
22
ECDL Notes – Online Essentials
3 Web-Based Information
3.1 Search
3.1.1 Define the term search engine and name some common search engines.
A search engine is a tool designed to
search for information on the World Wide
Web. The search results are usually
presented in a list and are commonly
called hits.
Searching on a search engine is simple:
just type a keyword in the search box, hit
Enter or click on the Search button, and the search engine will search the web for pages that
are relevant to your query.
Examples of Search engines are:
www.google.com
www.yahoo.com
www.msn.com
3.1.2 Carry out a search using a keyword, phrase.
Many people think that when
you use a search engine such
as Google, it will magically
search the entire Web and find
information that you require.
The first thing to understand is
that a search engine like
Google will only search through
a list that it maintains of sites
that have been registered with
that particular search engine.
This accounts in part for widely differing results you sometimes get when you search using
different search engines. Also, each search engine has different criteria for ranking search
results. These search results are often displayed 10 per page, with a brief description about
each site that it has found matching your requirements.
Here are some tips that one should keep in mind when using a search engine:


Use two or more words, or a short phrase when searching for information.
Try to use unique words that directly relate to what you are searching for.
©TCTC
23
ECDL Notes – Online Essentials






For instance if you are searching for information about computer training then
search for ―computer training‖, not just ―training‖, which would include all sorts of
training.
Use the + logical operator if you want to narrow your search to retrieve only
websites containing ALL your keywords.
Usin g + a n d “ symbols to narrow your search
If you search using two words such as computer training, then often a search engine
will go off and find all the pages that it knows about relating to ―computer‖,
―training‖ and ―computer training‖. This could include all types of training, not
just computer training.
To get round this problem most search engines allow you to insert a + symbol
between your words, this means that you only want to find pages containing all your
words.
Sometimes you would be better enclosing your search phrase with quotation (―).
This will then mean that you want to find the exact phrase that you have entered.
Thus if you search for ―TCTC Computer Training‖, using the quotation marks, then
you should find the company easier than not using the quotes.
3.1.3 Refine a search using advanced search features like: exact phrase, date, language,
media type.
Type the below URL in your web
browser and hit the Enter key:
www.google.co.uk
To use advanced search options,
simply click on Advanced Search to
the right of the Google search box.
Google‘s advanced search lets you search by:
- Exact phrase
- By excluding words
- By file format, etc…
©TCTC
24
ECDL Notes – Online Essentials
If you wish to search by date, you can click on the link towards the bottom of the Advanced
Search page
3.1.4 Search a web-based encyclopaedia, dictionary.
Encyclopedia
There are several online encyclopaedias and dictionaries available on the web. In this
section we will look at some examples.
Type the below URL in your web browser:
http://www.britannica.com/EBchecked/topic/186436/Encarta
©TCTC
25
ECDL Notes – Online Essentials
To use Encarta‘s online encyclopaedia, use the search box to type your keyword / phrase
and hit the Search Encarta button.
Dictionary
Type the below URL in your web browser:
http://dictionary.reference.com/
To use online Dictionary, use the search box to type your keyword / phrase and hit the
Search button.
Type the word that you wish to search for, in the Find box. Then, hit the Enter key on your
keyboard.
Other examples of online encyclopaedias / dictionaries include:





www.encyclopedia.com
www.britannica.com
www.wikipedia.org
www.yourdictionary.com
www.alphadictionary.com
TIP:
To force a search engine to give you definitions from web based dictionaries, type define:
before your actual keyword.
Example:
©TCTC
26
ECDL Notes – Online Essentials
3.2 Critical Evaluation
3.2.1 Understand the importance of critically evaluating online information. Understand
the purpose of different sites like: information, entertainment, opinion, sales.
Familiarity with the criteria for evaluating online information is an impetus to information
literacy. Information literacy is the ability to locate, evaluate and recognize pertinent
information and their concrete use. Students will benefit significantly from the said
competency skills set especially when they consistently weigh the value of given information
via either CARS or RADCAB.
CARS stands for Credibility, Accuracy, Reasonableness and Support while RADCAB stands for
Relevance, Appropriateness, Detail, Currency, Authority and Bias. Regardless of the
acronym, the said 2 sets of criteria centers on 3 factors: authorship, publishing body and
timeliness.
The most basic site is informational. This is a site that tells a potential customer or visitor
what your business is, where it’s located, its hours, how to contact you and maybe a bit
more. These sites are fast and easy to construct and usually only involve a page or two. All
sites have some basic information on them.
The next is a site that educates and/or is used as a reference. It might be a site like
Wikipedia or Grammar Girl with information on everything or just on grammar and writing.
Or it could be a health site with information on conditions or illnesses.
Some sites are inspirational. They provide you with stories and photography and music on
various topics like personal development, spirituality, psychology and new age practices.
Promotional sites are also common. They generally promote a celebrity, a rock band, an
author, a product and more.
Then there are those that entertain. While YouTube certainly has educational and
inspirational purposes, it is most often turned to for its entertainment value.
Finally, there are e-commerce sites. These sites exist primarily to sell you something.
Amazon.com is one. Ebay is another. The best e-commerce sites combine many of the
features of other sites (education, entertainment, etc.).
3.2.2 Outline factors that determine the credibility of a website like: author, referencing,
up-to-date content. And 3.2.3 Recognise the appropriateness of online information
for a particular audience.
Using the internet for research
Before using information you find on the internet for assignments and research, it is
important to judge its accuracy and to establish that the information comes from a reliable
and appropriate source.
©TCTC
27
ECDL Notes – Online Essentials
Consider the following criteria and ask yourself the following questions:
Audience
Who is the website’s intended audience? Academics? The general public? School children?
Does it appropriately address the target audience? Is it relevant for your assignment or
research?
Authority
Is the author identified? If the author has chosen to remain anonymous, ask yourself 'why?'
Is the author a person you recognise as an expert in his field? If not, is there enough
information provided to establish the author’s credibility? Is she qualified to write about the
subject? Can you find references to her elsewhere? Is the author affiliated to an academic
institution or credible organisation? If the information is part of a journal or other online
publication, you should try to establish the authority of that publication: Is the name of the
publication obvious? Are contact details and ‘about’ information provided? Do you
recognise the name of the publisher? Does it look like a professional publication? Is there
associated branding? Is the publication referenced elsewhere?
Accuracy
Is it free from spelling errors? Is the text well-written and grammatically correct? Has the
content been through an editing process or been peer reviewed? Has the author included a
bibliography? Are the sources cited reliable and can they be verified elsewhere? Are
research methodologies adequately explained?
Objectivity
Does the author present objective arguments or make it clear when he is expressing biased
opinions? Are other points of view explored? Is it a personal website? Does it express
personal opinions? Is the website part of a commercial organisation, a political party or an
organisation with a specific agenda? If yes, question the motives for publishing the
information. Does the website promote a biased viewpoint?
Currency
Can you tell when the information was published? Is the information up to date? How
frequently is the website updated? Are the links up to date and working? A good website
will show when it was ‘last updated’ or give a clear indication of the timeliness of the
information. Working links indicate the website is being maintained and updated regularly.
The URL
Look at the URL (web address) of the website. The domain name can help you establish if
the information has been published by a credible source.
For example:
Domain
Published by
.edu
an educational website
.gov
a government website
You still need to apply the same criteria mentioned above to establish reliability, and don’t
forget to check the information is up to date.
©TCTC
28
ECDL Notes – Online Essentials
3.3 Copyright, Data Protection
3.3.1 Define the terms copyright, intellectual property. Recognise the need to acknowledge
sources and/or seek permission as appropriate.
Most programs which you purchase are copyrighted and you must not copy them. Many people will
buy a copy of a game and make a copy for their friends or other family member. This is also normally
unlawful. There are numerous organisations, such as FAST (the Federation Against Software Theft),
which are dedicated to preventing the illegal copying of software.
When downloading a software application from the internet, it might be freeware or shareware.
When the software is freeware, you will download the software for free, and you will be able to use
all the features of the program without having to pay anything. If you pass on a copy of the software
to other people, you should do so free of charge. Shareware is computer software that is distributed
for free on a trial basis on the understanding that if you want to continue to use the software after
the trial is over e.g. 30 days, then you will voluntarily send the author of the software the required
payment.
As a general guide, permission is more likely to be needed if
the source material is short or the excerpt which you wish to
use represents a significant portion of either of the work in
which you found it or in which you intend to use it. Also, any
material which constitutes or represents the heart or key
elements of the source material, such that your use could
possibly serve as a substitue for the original, will also require
permission. More specifically, you should always secure
permission for:
1. A single quotation or several shorter quotes from a fulllength book, more than 300 words in toto.
2. A single quotation of more than 50 words from a newspaper, magazine, or journal.
3. Artwork, photographs, or forms, whether or not from a published source. Sometimes more than
one permission is required for a photograph, e.g., from the photographer and also from the creator
of the underlying work shown in the photograph.
4. Charts, tables, graphs, and other representations where, inevitably, you are using the entire
representation, since the copyrighted features are complete in themselves and inherent in the
whole work.
5. Material which includes all or part of a poem or song lyric (even as little as one line), or the title of
a song.
6. Computer representations, such as the depiction of results of research on computerized
databases, the on-screen output of software, reproduction of web pages, and the capture of
Internet or other online screen shots. (For small and insignificant portions, "fair use" may apply; see
description below). Please note, however, that if a website invites or authorizes copying and there is
nothing to indicate it contains material which is original to others and therefore would require
permission from the original source, then you do not need to get permission.
©TCTC
29
ECDL Notes – Online Essentials
7. Any third party software to be distributed as an electronic component with your book. A separate
form letter and tracking table are available for such permissions. Please contact your editor.
In addition to the above guidelines to obtain copyright permission, you are also responsible for
securing all other required clearances, including permissions for the use of trademarks and releases
from privacy claims. For example:
A release may be required for photographs or reproductions of specific brand-name products and
for use of trade names and logos. Contact the company.
You may need releases for photographs of people, especially private citizens as opposed to public
officials and public figures. This is particularly necessary if such material will be used on the cover or
in part of the promotion of the work and does not specifically illustrate material in the text. You
should contact your editor for the Wiley-approved release form.
3.3.2 Recognise the main data protection rights and obligations in your country.
If your computer system holds information about
individuals, then you have a moral and legal duty to
treat that information with respect. For instance if a
police force computer is used by unscrupulous people
to gain unauthorised information about a person’s
private life, that would be a clear breach of trust. In the
same way doctors, government departments and credit
agencies often hold vast amounts of information about
the general public, which is both sensitive and private.
In a free society you have the right to ensure that the
information held about you is not abused. In many
countries, this right is enshrined under data protection
laws.
Obligations in our country are:






It must be collected for explicit and legitimate purposes and used accordingly;
It must be adequate, relevant and not excessive in relation to the purposes for which it is
collected and/or further processed;
It must be accurate, and updated where necessary;
Data controllers must ensure that data subjects can rectify, remove or block incorrect data
about themselves;
Data that identifies individuals (personal data) must not be kept any longer than strictly
necessary;
Data controllers must protect personal data against accidental or unlawful destruction, loss,
alteration and disclosure, particularly when processing involves data transmission over
networks. They shall implement the appropriate security measures;
©TCTC
30
ECDL Notes – Online Essentials
4 Communication Concepts
4.1 Online Communities
4.1.1 Understand the concept of an Online (virtual) community. Identify examples like:
social networking websites, Internet forums, web conferencing, chat, online
computer games.
A virtual community, e-community or online community is a group of people that primarily interact
via communication media such as newsletters, telephone, email, internet social network service or
instant messages rather than face to face, for social, professional, educational or other purposes. If
the mechanism is a computer network, it is called an online community. Virtual and online
communities have also become a supplemental form of communication between people who know
each other primarily in real life. Many means are used in social software separately or in
combination, including text-based chat rooms and forums that use voice, video text or avatars.
Social Networking Websites
There are a lot of social networking sites through which
virtual communities are usually created. Social
networking websites offer
you the possibility to find old and new friends,
communicate with your friends through messages and
instant messages, upload your photos and comment on
friend‘s photos, and even much more than this!
Two examples of Social Networking websites
are
Facebook (www.facebook.com) and Hi5
(www.hi5.com).
Internet Forums
An Internet forum is a discussion area on a website. Website members can post discussions and read
and respond to posts by other forum members. An Internet forum can be focused on nearly any
subject and a sense of an online community, or virtual community, tends to develop among forum
members.
An Internet forum is also called a message board,
discussion group, bulletin board or web forum.
However, it differs from a blog, the name for a web log,
as a blog is usually written by one user and usually only
allows for the responses of others to the blog material.
An Internet forum usually allows all members to
make posts and start new topics.
An Internet forum is also different from a chat room.
Members in a chat room usually all chat or
communicate at the same time, while members in an
Internet forum post messages to be read by others whenever they happen to log on. Internet
forums also tend to be more topic-focused than chat rooms.
Before a prospective member joins an Internet forum and makes posts to others, he or she is usually
required to register. The prospective member must usually agree to follow certain online rules,
©TCTC
31
ECDL Notes – Online Essentials
sometimes called netiquette, such as to respect other members and refrain from using profanity.
When a member is approved by the administrator or moderator of the Internet forum, the member
usually chooses his or her own user name and password. Sometimes, a password is supplied. An
avatar, or photograph or picture, supplied by the member can appear under the member's user
name in each post.
The separate conversations in an Internet forum are called threads. Threads are made up of
member-written posts. Internet forum members can start new topics, post in their choice of threads
and edit their profile. A profile usually lists optional information about each forum member such as
the city they are located in and their interests.
Web Conferencing
Web conferencing is a form of real-time communications RTC in which multiple computer users, all
connected to the Internet, see the same
screen at all times in their Web browsers.
Some Web conferencing systems include
features such as texting, VoIP (voice over IP)
and full-motion video.
Web conferencing allows users to carry on
business meetings and seminars, make
presentations, conduct demonstrations,
provide online education and offer direct
customer support. Control of the session can
be passed among users so that any attendee
can act as the main presenter. The most effective Web conferencing solutions require high-speed
Internet connections at all user sites.
Chat
A chat room is a virtual place on the Internet where people from all walks of life from around the
world can get
together in one place and textually chat with one
another. The only two things a person needs to connect
to a chat room are a computer and an internet
connection of any speed.
Chat room etiquette
Because Chat Rooms are place where so many different
types of people come together to communicate with one
another, certain rules need to be in place to keep the
peace. Nearly all of the larger Chat Rooms are constantly
moderated for any offensive activity, but quite a few smaller Chat Rooms lack such moderation and
it is therefore up to the users to be sure that no offensive activities take place.
Online computer Games
Online computer games such as World of Warcraft are also another type of
online communities. Such games enable thousands of players from across
the globe to come together online through computer gaming.
©TCTC
32
ECDL Notes – Online Essentials
4.1.2 Outline ways that users can publish and share content online: blogs, microblogs,
podcasts, images, audio and video clips.
Blogs
A blog (a combination of the words web and log) is a website on which chronological entries
that can be viewed by visitors. The word Blog is used as a verb
and describes the activity of maintaining a blog. Blogs can provide
information on a vast range of subjects, and often contain
personalised views on a particular subject. Some are devoted to
news, politics or current affairs. Readers can often comment
interactively on the blog while other blogs are more like a shared,
personal diary. Some blogs have become incredibly popular and
been made into published books. Blogs are mainly text based
with the odd picture, but they may also contain music and video contents.
Microblogs
Microblogging is a broadcast medium in the form of blogging. A
microblog differs from a traditional blog in that its content is
typically smaller in both actual and aggregate file size. Microblogs
"allow users to exchange small elements of content such as short
sentences, individual images, or video links
Podcasts
A podcast is a way of providing content such as radio
programs in a form which can be easily downloaded and listened to
later on a PC or mobile device such as an Apple iPod. The term
"podcast" is a combination of the words "iPod" and "broadcast".
Many web sites allow you to manually download content.The thing
that makes a podcast different is that once you subscribe to a
podcast it will be downloaded automatically for you.
Images , Audio and Video Clips
Images, Aufio and Video clips can be published in several ways such as Youtube, Facebook,
and much more
4.1.3 Recognise ways to protect yourself when using online communities: apply
appropriate privacy settings, restrict available personal information, use private
messaging when appropriate, disable location information, block/report unknown
users.


Privacy Settings: Always check the default privacy settings when opening an account on a
social media website. The default privacy settings on many social media websites are
typically broad and may permit sharing of information to a vast online community. Modify
the setting, if appropriate, before posting any information on a social media website.
Biographical Information: Many social media websites require biographical information to
open an account. You can limit the information made available to other social media users.
©TCTC
33
ECDL Notes – Online Essentials




Consider customizing your privacy settings to minimize the amount of biographical
information others can view on the website.
Account Information: Never give account information, Social Security numbers, bank
information or other sensitive financial information on a social media website. If you need to
speak to a financial professional, use a firm-sponsored method of communication, such as
telephone, letter, firm e-mail or firmsponsored website.
Friends/Contacts: When choosing
friends or contacts on a social media
site, think about why you use the
website. Decide whether it is
appropriate to accept a “friend” or
other membership request from a
financial service provider, such as a
financial adviser or broker-dealer. There
is no obligation to accept a “friend”
request of a service provider or anyone
you do not know or do not know well.
Site Features: Familiarize yourself with
the functionality of the social media website before broadcasting messages on the site. Who
will be able to see your messages -- only specified recipients, or all users?
Disable Location so when you post no one will know from where you are posting
4.2 Communication Tools
4.2.1 Define the term Instant Messaging (IM).
IM – short for instant messaging – is a type of real-time communication
service. It is somewhat like email, but much more like a chat room. Both
parties are online at the same time, and they "talk" to each other by typing
text and sending small pictures in instantaneous time.
4.2.2 Define the terms short message service (SMS), multimedia message service (MMS).
The acronym SMS stands for short message service. SMS is also often
referred to as texting, sending text messages or text messaging. The service
allows for short text messages to be sent from one cell phone to another cell
phone or from the Web to another cell phone.
Multimedia Messaging Service (MMS) is a standard way to send messages that
include multimedia content to and from mobile phones. It extends the core SMS
(Short Message Service) capability that allowed exchange of text messages only up
to 160 characters in length.
The most popular use is to send photographs from camera-equipped handsets, although it is also
popular as a method of delivering news and entertainment content including videos, pictures, text
pages and ringtones.
©TCTC
34
ECDL Notes – Online Essentials
4.2.3 Define the term Voice over Internet Protocol (VoIP).
VoIP (Voice over Internet Protocol) is simply the transmission of voice traffic over IP-based networks.
4.2.4 Recognise good practice when using electronic communication: be accurate and
brief, use clear subject headings, do not inappropriately disclose personal details, do not
circulate inappropriate content, spell check content.
4.3 E-mail Concepts
4.3.1
Define the term e-mail and outline its main uses.
Email is simply the shortened form of electronic mail, a protocol for
receiving, sending and storing electronic messages. In many cases, email has
become the preferred method of communication.
4.3.2
Identify the structure of an e-mail address.
Take a typical e-mail address: ecdl@tctcmalta.com
 The first part of the address ―ecdl‖, indicates the department/person to whom the
email is addressed
 The second part of the address ―tctcmalta.com‖ indicates the e-mail address of the
company or organization where the individual works (Sometimes it is of the ISP).
From this e-mail address we can see that tctcmalta is the host for this particular email address.
 In some cases you may use an email address such as adrian@yahoo.com,
which normally indicates a private email address, but in this case, one that is hosted
by a company called Yahoo.
4.3.3
Be aware of possible problems when sending file attachments like: file size limits, file type
restrictions.
One might encounter problems when sending e-mail attachments. Such problems include:
 File-size limits – be cautious when sending large files… compression might be an
option.
©TCTC
35
ECDL Notes – Online Essentials

4.3.4
File type restrictions – most executable files are recognised as containing
viruses, thus e-mailing of such files may give problems – a solution might be to
rename the file using a different extension.
Outline the difference between the To, Copy (Cc), Blind copy (Bcc) fields and recognise their
appropriate use.
To: Contains the name(s) or email address(es) of the recipients of the message, separated by a
semicolon.
Cc (Copy): Contains the name(s) or email address(es) of persons receiving a copy of the message.
Bcc (Blind Carbon Copy): Names and e-mail addresses of persons listed in Bcc can not be viewed by
other individuals receiving the e-mail message.
4.3.5
Be aware of the possibility of receiving fraudulent and unsolicited e-mail. Be aware of the
possibility of an e-mail infecting the computer.
Spamming is very prevalent on the Internet. Redirect unrecognized mail to a
Spam folder and delete messages.
Phishing is a type of deception designed to steal your valuable personal data, such as credit card
numbers, Windows Live IDs, other account data and passwords, or other information.
You might see a phishing scam:






In e-mail messages, even if they appear to be from a co-worker or someone you know.
On your social networking Web site.
On a fake Web site that accepts donations for charity.
On Web sites that spoof your familiar sites using slightly different Web addresses, hoping
you won't notice.
In your instant message program.
On your cell phone or other mobile device.
Often phishing scams rely on placing links in e-mail messages, on Web sites, or in instant messages
that seem to come from a service that you trust, like your bank, credit card Company, or social
networking site.
Email messages with attachments can spread viruses, and usually attachments from unknown
origin do so. Viruses that spread via attachments are activated when the attached file is
opened. Just by reading the email your computer cannot get infected. However, as soon as the
attachment is opened, the possible virus infects the computer. This is why you should be very careful
when sending and especially when receiving attachments.
©TCTC
36
ECDL Notes – Online Essentials
To avoid viral infection use the following precautions:




If an attachment looks the least bit suspicious, destroy it without opening.
If you are not sure about the authenticity of the attachment, ask the sender what it contains
and why they sent it. Many viruses send email to all recipients in the victim's address book
without them knowing about it.
Even when the attachment is coming from a familiar person and it is expected, you should
check it for viruses before opening it. The attachment sender might not know that a
virus is present on his system. Checking the file for viruses is done by saving the
attachment to a folder on the computer and checking the contents of that folder with a virus
scanner.
Keep your anti-virus software up to date.
4.3.6 Define the term phishing.
Anyone who has ever used PayPal or does their banking
online has probably received dozens of emails with titles
such as, "URGENT: Update Account Status". These emails
are all attempts by a spammer to "phish" your account
information. Phishing refers to spam emails designed to
trick recipients into clicking on a link to an insecure
website. Typically, phishing attempts are executed to
steal account information for e-commerce sites such as
eBay, payments processors such as PayPal, or regular
financial institutions' websites. A phishing email supplies
you with a link to click on, which will take you to a page where you can re-enter all your
account details including credit card number(s) and/or passwords. Of course, these sites
aren't the actual bank's site, even though they look like it.
5 Using E-mail
5.1 Sending E-mail
5.1.1 Access an e-mail account.
To start Microsoft Outlook 2007




Click Start
All Programs
Microsoft Office
Microsoft Outlook 2007
©TCTC
37
ECDL Notes – Online Essentials
Below is a screen shot of how the Microsoft Outlook 2007 Screen looks like.
5.1.2 Outline the main purpose of standard e-mail folders: Inbox, Outbox, Sent, Deleted /
Trash Items, Draft, Spam/Junk.

The Inbox, as the name suggests, is the computerized equivalent of the traditional
in-tray. All incoming messages are placed in the inbox. You can then read, print, reply
to these messages as required.

An Outbox is where outgoing e-mail messages are temporarily stored. While you are
composing a message, most mail programs automatically save a draft of your
message in the outbox. The message is then stored in the outbox until it is
successfully sent to the recipient.

Sent Folder is where all the messages that were sent will be shown in that folder

Deleted/Trash Items is where all the items that have been deleted will be shown
there till you delete them again from the deleted/Trash items folder

Spam/Junk is where the emails that are read junk by the software or you have
selected them as junk will be received in that folder
©TCTC
38
ECDL Notes – Online Essentials
5.1.3 Create an e-mail. And 5.1.4 Enter one or more e-mail addresses, distribution list in
the To, Copy (Cc), Blind copy (Bcc) fields. And 5.1.5 Enter an appropriate title in the subject
field and enter, paste text into the body of an e-mail.
To create a new email




Click on New
Mail Message
Enter your message into the message text area in the lower half of the dialog box.
Type the email address of the person you wish to send the message to into the To… text box.
The following may be used:
Send the message to the selected person.
Send a Carbon Copy of the message to the selected person.
Send the message to the selected person as a Blind Carbon Copy. A blind carbon copy is a
copy of the message that is sent to someone in secret, other recipients of the message will not know
that the selected person has received the message.
To send a copy of a message to another address
Whilst composing your message in the Message window, enter the address of the person you
want to send a copy to into the Cc… text box.
Enter a short overview of the message into the Subject: text box.
5.1.6 Add, remove a file attachment.
Email is not restricted to just simple text messages; you can also insert files into messages. For
example, if you had to send a copy of your sales report to your manager, simply insert a copy of the
spreadsheet into a message.
Once you have finished entering the text of your message, click on the paperclip icon on
the toolbar.
Browse to the file that you wish to attach to the message. Select OK to close the Insert
©TCTC
39
ECDL Notes – Online Essentials
File dialog box. Another box with the name Attached under Subject will appear to indicate the
presence of a file.
Note: To remove an attachment from an e-mail message, select the attachment and press the
Delete button on your keyboard.
5.1.7 Send an e-mail with, without priority.
To set emails to Low or High Priority choose:

For High Priority

For Low Priority
From the Toolbar Message
5.2 Receiving E-mail
5.2.1
Open, close an e-mail.
To open an email double click on the email received and to close the email click on the close button
5.2.2
Use the reply, reply to all function, and identify when these should be used.
To reply to the sender of a message (to reply only to the person sending this message)

Select the message you want to reply to.

Click on the Reply icon on the Standard toolbar
The Message dialog box will open and the text of the original message appears in the
message window. Type your reply above the text of the original message and then click
the Send icon on the Message dialog box toolbar
To reply to the sender and all recipients of a message (to reply to the sender and all those person s
that are copied in that email)


Select the message you want to reply to.
Click the Reply to All icon on the Standard toolbar.
The Message dialog box will open and the text of the original message appears in the message
window. Type your reply above the text of the original message and then click the Send icon on the
Message dialog box toolbar.
©TCTC
40
ECDL Notes – Online Essentials
5.2.3





5.2.4
Forward an e-mail.
Open the e-mail message that you wish to forward.
Select the Forward icon from the Message toolbar.
Type the email address of the person(s) you wish to forward the message to into the
To… text box.
You may enter any comments about the message above the original message in the message
text area of the Message dialog box.
Send the message by clicking the Send icon on the Message dialog box toolbar.
Open, save a file attachment to a location.
To open a file attachment one just have to double click on it
Let‘s say you have received an important file via e-mail and you wish to save in to your documents.





5.2.5
Click on the email message to display it‘s preview.
Right Click on the file attachment
Click Save As
Choose the Location where you want to save our file
Then click Save.
Preview, print a message using available printing options.
To Print or Preview a message:

Click on the Office button
Click on Print if you want to print the email

Click on Print Preview if you want to see the email before printing
OR
©TCTC
41
ECDL Notes – Online Essentials
5.3 Tools and Settings
5.3.1 Use available help functions.

As in most applications Outlook has a built-in support feature. To use Help, simply
click on the Help menu in the main view. Then choose Microsoft Office Outlook Help

The Help window will be displayed as illustrated:

Select one of the available help topics, or click on the Search Box to search for a topic
by entering a keyword.
5.3.2 Display, hide built-in toolbars. Restore, minimise the ribbon.
To Display and hide built-in toolbars:• Click View
• Click Toolbars
• Choose one of them
Minimise the Ribbon

To quickly minimize the Ribbon, double-click the name of the active tab. Double-click
a tab again to restore the Ribbon.

Keyboard shortcut To minimize or restore the Ribbon, press CTRL+F1.
©TCTC
42
ECDL Notes – Online Essentials
Restore the Ribbon



Click Customize Quick Access Toolbar Button image.
In the list, click Minimize the Ribbon.
Keyboard shortcut To minimize or restore the Ribbon, press CTRL+F1.
5.3.3 Create and insert a text e-mail signature.
Create a Signature
In a new message, on the Message tab, in the Include group,
click Signature, and then click Signatures.



On the E-mail Signature tab, click New.
Type a name for the signature, and then click OK.
In the Edit signature box, type the text that you want
to include in the signature.
5. To format the text, select the text, and then use the style and formatting buttons to select
the options that you want.
©TCTC
43
ECDL Notes – Online Essentials
Insert a Signature
You can set a signature to be added automatically to outgoing messages, or you can manually insert
a signature when needed.
You can insert only one signature per e-mail message; you cannot include multiple signatures.
If you want to include more information, create one signature with all the information, and then
save it with a new name.
Insert a signature automatically
 Signature menu In a new message, on the Message tab, in the Include group, click Signature,
and then click Signatures.





Under Choose default signature, in the E-mail account list, click an e-mail account with which
you want to associate the signature.
In the New messages list, select the signature that you want.
Select the signature you want to use
If you want a signature to be included in message replies and in forwarded messages, in the
Replies/forwards list, select the signature. If not, select none.
Click OK.
©TCTC
44
ECDL Notes – Online Essentials
Insert a signature manually
 Insert the signature you want In a new message, on the Message tab, in the Include group,
click Signature, and then select the signature that you want.
5.3.4 Turn on, turn off an automatic out of office reply.


On the Tools menu, click Out of Office Assistant.
Out of Office command on Tools menu
Note The Tools menu appears on the main Outlook window. The main window is the same
window that appears when you start Outlook and includes the File, Edit, View, Go, Tools,
Actions, and Help menus. There is no Tools menu in windows where you create or view
items such as e-mail messages, contacts, or tasks.
If the Out of Office Assistant command does not appear, an alternative method to
automatically reply to messages is available for all Outlook users. Go to Automatically reply
to messages.



Click Send Out of Office auto-replies.
If you want, select the Only send during this time range check box to schedule when
your out of office replies are active. If you do not specify a start and end time, autoreplies will be sent until you click Do not send Out of Office auto-replies.
On the Inside My Organization tab, type the response that you want to send while
you are out of the office.
©TCTC
45
ECDL Notes – Online Essentials


To send auto-replies to people out of your organization, continue with steps 4 and 5.
On the Outside My Organization tab, select the Auto-reply to people outside my
organization check box, and then type the response that you want to send while you
are out of the office.
Organization is usually defined as your company and includes people who have an Exchange
Server account on your e-mail system.


When the Auto-reply to people outside my organization check box is selected, the
Outside My Organization tab displays (On) next to the tab name.
On the Outside My Organization tab, click My Contacts only or Anyone outside my
organization to specify the people to whom auto-replies are to be sent.
The contact must exist in your Exchange Server Contacts folder. If the contact exists only in
a folder that is a part of a Personal Folders file (.pst), the auto-reply message will not be
sent.
5.3.5 Recognise e-mail status as read, unread. Mark an e-mail as read, unread. Flag, unflag
an e-mail.
Recognise e-mail status as read, unread. Mark an e-mail as read, unread
After opening an e-mail message, you might wish to mark the e-mail message
as unread. To do this, click on the button ―Mark as Unread‖ On the Message
Toolbar. Or right click on the email and click on mark as unread
If you want to mark it again as read, repeat the same step
choosing ―Mark as Read
©TCTC
46
ECDL Notes – Online Essentials
Flag, unflag an e-mail.
Flagging is a method of marking messages which you want to stand out as being important.

To flag a message, open the message, click on Follow up and choose one of the list.

To remove the flag repeat the same steps but choose Clear Flag
5.3.6 Create, delete, update a contact, distribution list / mailing list.
Add a new contact
To add a new contact to the address book, first open the Address Book from:
 Tools
 Address Book
Then click on:
 File
 New Entry
 New Contact
 OK
©TCTC
47
ECDL Notes – Online Essentials
Fill in the contact details as appropriate and click Save and Close.
Delete a contact



Right Click on the Contact you want to delete
Click Delete




Open the Address Book again f
Select the Contact you want to delete
Go to File
Click delete
OR
Create; update a distribution list/mailing list.
You can create a single group name (or alias) to use when sending a message to
several contacts at once. Simply create a group name and add individual contacts to the
group. Then, just type the group name in the To box when you send e-mail.




Click on File -> New Entry
Choose Distribution List
Click OK
©TCTC
48
ECDL Notes – Online Essentials
Add a contact to an existing group
In the Address Book list, double-click the group you want. The group's Properties dialog box
opens.



You can add people to the group in several ways —and in some cases you can add
them to your Address Book as well.
To add a person from your Address Book list, click Select Members, and then double
click a name from the Address Book list and then click OK.
To add a person directly to the group without adding the name to your Address
Book, Click on Add New type the person's name and e-mail address in the boxes
provided in the open window and then click OK
Using the Address Book
You can use the Address book at any time when creating an e-mail message. Let‘s say I have
added my friend Tom to my address book. How will I use the address book to send an e-mail
to Tom?
Follow the below steps…
 Click File – New – Mail Message

Click on To:


The address book will be displayed, as illustrated:
Double Click on the name of the person to whom
you wish to send the e-mail.
Click OK.

©TCTC
49
ECDL Notes – Online Essentials
5.4 Organising E-mails
5.4.1 Add, remove message inbox headings like: sender, subject, date received.




On the View menu, point to Arrange by, point to Current View, and then click Customize
Current View.
Click Fields.
In the Available fields list, click ex Subject.
Click Add.
5.4.2 Search for an e-mail by sender, subject, e-mail content.
 Click on Search box under the Heading Inbox and write what you need to find
OR
 Click on Tools
• Instant Search
• Advanced Find
• The Find Message window will be displayed, as illustrated:
Use the Advanced Find window to search for a message by Sender, Receiver, Subject, etc…
5.4.3 Sort e-mails by name, by date, by size.
To sort e-mails you simply have to click on the heading by which you need to sort. For
example, if you wish to sort your e-mails by subject, click on the Subject field heading.
©TCTC
50
ECDL Notes – Online Essentials
Note that a triangle appears near the Subject. When the triangle is pointing upwards, it
means that the e-mails are sorted by Subject in ascending order. But if you wish to sort by
descending order click again on the field heading. The triangle will then be pointing
downwards.
5.4.4 Create, delete an e-mail folder/label. Move e-mails to an email folder/label.
By default, Outlook has 6 main folders:






Inbox
Outbox
Sent Items
Deleted Items
Drafts
Junk Mail
These 6 folders cannot be deleted as they serve the main purposes in Outlook.
You might however need to add other folders to organise your e-mails better. Click on File –
New – Folder…
The Create Folder window will appear. From here you can give a name to your folder and
you can also decide whether this folder should be an independent folder, or a sub-folder of
an existing folder, such as Inbox.
©TCTC
51
ECDL Notes – Online Essentials


To create an independent folder, make sure that you click on Personal
Folders before clicking OK.
The new folder will be displayed as in the illustration below:

On the other hand, if you wish to create a sub-folder, click on the name of the folder
in which you wish to create your sub-folder before clicking OK.
In the illustration below, a new folder called Computer Training has been created as a subfolder in TCTC
To delete a folder that you have created, right click on the folder and click on Delete.
Move e-mails to an e-mail folder.
To move an e-mail from one folder to another, open the folder which contains the e-mail that
you wish to move. Then click on the e-mail to select it and drag it on the folder in which you
want to place it.
©TCTC
52
ECDL Notes – Online Essentials
5.4.5 Delete an e-mail. Restore a deleted e-mail.
Delete an email
There are several methods how you can delete an e-mail. First, you need to select it, and
then you can:




Click on the Delete icon in the toolbar.
Click Edit, Delete.
Right click on the e-mail message and choose Delete.
Press the Delete button on your keyboard.
Once you delete an e-mail message it will move to the Deleted Items folder.
Restore an email
To restore an e-mail which you have deleted, find it from the Deleted Items folder. Then,
right click on the e-mail and choose ―Move to Folder
The below window will be displayed, from where you can choose the destination for
the e-mail in question.
©TCTC
53
ECDL Notes – Online Essentials
5.4.6 Empty the e-mail bin/deleted items /trash folder.
To permanently delete items held in the trash bin, right click on Deleted Items and choose
Empty ‘Deleted Items’ Folder
Outlook will ask you whether you are sure that you wish to permanently delete all items
contained in the e-mail bin. Click Yes if you want to confirm the operation.
5.4.7 Move a message to, remove a message from a junk folder.

In Mail, click the Junk E-mail folder in the Navigation Pane.

Right-click any message that you do not want to be marked as junk.

On the shortcut menu, point to Junk E-mail, and then click Mark as Not Junk.
A message that is marked as not junk is moved to your Inbox or to the folder that it was
previously in. When you mark a message as not junk, you see a prompt about adding the
sender or mailing list name to your Safe Senders or Safe Recipients List.
5.5 Using Calendars
5.5.1 Create, cancel, and update a meeting, 5.5.2 Add invitees, resources to a meeting in a
calendar. Remove invitees, resources from a meeting in a calendar.
Create a meeting
©TCTC
54
ECDL Notes – Online Essentials
1. On the File menu, click New, and choose Meeting Request, OR with the Calendar open, on the
toolbar click New and choose Meeting Request
2. Enter a Subject
3. Enter a Location
4. Edit the Start time date and time information
5. Edit the End time date and time information
Let's go back to the To: line and discuss that more. You have a few options here. You can type
in the attendees just like you do for an email message OR you can actually see if they are
available for your meeting.
6. Click the Scheduling Assistant button on the Ribbon
7. Click Add Attendees at the bottom
©TCTC
55
ECDL Notes – Online Essentials
8. The Select Attendees and Resources window appears

Depending on your settings you will see the Global Address List or your Contacts
9. Select the people you want to attend your meeting
10. You can add them to the Required or Optional fields
11. You can also add resources, such as a conference room
12. When you have all the people and resources added, click OK and you are returned to the
Meeting window
13. You can now see if the people you invited are free or busy
14. NOTE: If you do not receive a similar picture shown at the lower right, click Options at the
bottom, and choose Show Calendar Details (it should be checked)
15. If necessary, you can change the date and/or time to fit their schedules

You could also select a date from the Suggested Times on the right
16. When you are ready to send the invitation, click Send
17. The recipients of this meeting request will receive a note in their Inbox. Once they open the
meeting request, they can Accept, Decline, or decide later (tentative).
Update a Meeting

Open the Meeting on your Calendar
©TCTC
56
ECDL Notes – Online Essentials

Make changes to the meeting attendees, subject, date, location, and/or time

Choose the Send Update command
Cancel a Meeting
Sometimes it is necessary to cancel a meeting. Outlook removes the meeting from your
schedule. You have an option to send a cancellation notice to the attendees.




Open the meeting you want to cancel
Click the Cancel Meeting button on the Ribbon
Enter a message for the recipients if desired
Click Send Cancellation
5.5.3 Accept, decline an invitation. a calendar.
When you receive a meeting request in your email, you can either accept, decline, or decide
later (make the meeting tentative).
To read a meeting request, double-click the message in your Inbox
You should check your availability by clicking the Calendar button on the Ribbon
Depending on your schedule, click Accept, Tentative (you'll decide later), Decline, or
Propose New Time (see below)
©TCTC
57
ECDL Notes – Online Essentials


If you click Accept, Tentative, or Propose New Time, Outlook will enter the meeting
item in your Calendar
If you click Decline, the meeting will not be added to your Calendar
You will receive a response window asking if you want to add comments to a response, send
a response now, or don't send a response. If you choose "don't send a response, the
meeting organizer doesn't receive a message that you accepted. Make your decision and
click OK.
©TCTC
58