SlideShare a Scribd company logo
1 of 32
11Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express
Internet Explorer
and
Outlook Express
ByBy
Adedayo O.SAdedayo O.S
A Paper Delivered During the General Staff Training for Energy
Commission of Nigeria (ECN) Abuja, 2010
INTRODUCTIONINTRODUCTION
Windows Internet Explorer, is a seriesWindows Internet Explorer, is a series
of graphical web browsers developedof graphical web browsers developed
by Microsoft in 1995.by Microsoft in 1995.
AA web browserweb browser is a software applicationis a software application
for retrieving, presenting, and traversingfor retrieving, presenting, and traversing
information resources on the World Wideinformation resources on the World Wide
Web. Other web browsers – MozillaWeb. Other web browsers – Mozilla
Firefox, Opera etc.Firefox, Opera etc.
22Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express
INTRODUCTION cont.INTRODUCTION cont.
33Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express
The usage share of web
browsers.
Internet Explorer (54.50%);
Mozilla Firefox (30.96%;
Google Chrome (5.61%)
Safari (5.27%)
Opera (2.10%)
Other (1.78%)
Windows Internet ExplorerWindows Internet Explorer
44Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express
55Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express
E- MailE- Mail
Web-based emailWeb-based email or webmail is a term referringor webmail is a term referring
to an e-mail service intended to be primarilyto an e-mail service intended to be primarily
accessed via a web browser.accessed via a web browser.
Some of the earliest Webmail services wereSome of the earliest Webmail services were
Hotmail, Yahoo! Mail, Gmail and ECNmailHotmail, Yahoo! Mail, Gmail and ECNmail
A major advantage of web-based email overA major advantage of web-based email over
application-based emailapplication-based email is that a user has theis that a user has the
ability to access their inbox from any Internet-ability to access their inbox from any Internet-
connected computer around the world.connected computer around the world.
66Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express
Outlook ExpressOutlook Express
Outlook Express is an e-mail/news clientOutlook Express is an e-mail/news client
that is included with Internet Explorerthat is included with Internet Explorer
versions.versions.
Outlook Express is a different applicationOutlook Express is a different application
from Microsoft Office Outlook.from Microsoft Office Outlook.
The two programs do not share a commonThe two programs do not share a common
codebase, but do share a commoncodebase, but do share a common
architectural philosophy.architectural philosophy.
..
Outlook Express cont.Outlook Express cont.
77Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express
Creating A New emailCreating A New email
AccountAccount
There are many free email atThere are many free email at
www.yahoo.com, www.hotmail.com ,www.yahoo.com, www.hotmail.com ,
www.gmail.com, www.aol.com .www.gmail.com, www.aol.com .
Here are the basic steps to set up aHere are the basic steps to set up a
POP3 or IMAP email account withPOP3 or IMAP email account with
Outlook Express:Outlook Express:
88Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express
Creating A New AccountCreating A New Account
99Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express
Creating A New Account cont.Creating A New Account cont.
1010Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express
Creating A New email cont.Creating A New email cont.
1111Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express
Creating A New email cont.Creating A New email cont.
1212Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express
Creating A New email cont.Creating A New email cont.
1313Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express
Creating A New email cont.Creating A New email cont.
1414Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express
Creating A New email cont.Creating A New email cont.
1515Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express
How to Send EmailsHow to Send Emails
Opened up Outlook Express,Opened up Outlook Express,
Create a new account Just fill in theCreate a new account Just fill in the
To: with an email address.To: with an email address.
Fill in the Subject: With some subject.Fill in the Subject: With some subject.
In the big white area is where you writeIn the big white area is where you write
the actual letter.the actual letter.
Spelling. Before sending your emailSpelling. Before sending your email
you should just run the spell checkeryou should just run the spell checker
over your email.over your email.
1616Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express
Creating A New emailCreating A New email
1717Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express
How to Send Emails cont.How to Send Emails cont.
The paper clip Icon that has attachedThe paper clip Icon that has attached
below it. That's what you would click ifbelow it. That's what you would click if
you wanted to include a file, picture,you wanted to include a file, picture,
etc to this email. This will open a boxetc to this email. This will open a box
that will tell you to browse for the filethat will tell you to browse for the file
that you want to include with thisthat you want to include with this
email.email.
1818Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express
Avoid SpamAvoid Spam
It is wise to avoid spam since it canIt is wise to avoid spam since it can
contain malware which may usecontain malware which may use
vulnerabilities in your email program,vulnerabilities in your email program,
default web browser, or other programs todefault web browser, or other programs to
infect your computer. So you should guardinfect your computer. So you should guard
your email address carefully and possiblyyour email address carefully and possibly
run spam management or spamrun spam management or spam
prevention software.prevention software.
1919Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express
System ConfigurationSystem Configuration
ChangesChanges
Using an browser other than InternetUsing an browser other than Internet
Explorer when surfing the internet.Explorer when surfing the internet.
Changing your Internet Explorer settingsChanging your Internet Explorer settings
to make the browser less vulnerable toto make the browser less vulnerable to
being compromised if an attack occurs.being compromised if an attack occurs.
Changing your system to show fileChanging your system to show file
extensions for known file names which isextensions for known file names which is
contrary to Microsoft's default setting.contrary to Microsoft's default setting.
2020Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express
2121Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express
Application for protectionApplication for protection
2222Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express
Internet Best PracticesInternet Best Practices
Reduce the risk of viruses. Use of anti-virus softwareReduce the risk of viruses. Use of anti-virus software
and keeping it current.and keeping it current.
Never open suspicious e-mail messages or fileNever open suspicious e-mail messages or file
attachmentsattachments
Use Windows Security Centre to manage yourUse Windows Security Centre to manage your
settings. Adjust to the level of protection you aresettings. Adjust to the level of protection you are
comfortable with.comfortable with.
Download internet files from trusted sources only andDownload internet files from trusted sources only and
scan the files with your virus scanner.scan the files with your virus scanner.
Use a firewall, Install a Microsoft Internet ConnectionUse a firewall, Install a Microsoft Internet Connection
firewall as a basic line of defence against outsidefirewall as a basic line of defence against outside
intruders.intruders.
Use strong passwords that are at least eightUse strong passwords that are at least eight
characters long and a combination of lower and uppercharacters long and a combination of lower and upper
case letters, numbers and symbols.case letters, numbers and symbols.
2323Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express
Block Pop-upsBlock Pop-ups
2424Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express
How to download CorrectlyHow to download Correctly
2525Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express
Web SearchingWeb Searching
Searching the Web is not easy. There is aSearching the Web is not easy. There is a
lot of junk out there, and it can belot of junk out there, and it can be
frustrating to sift through it all. I wouldfrustrating to sift through it all. I would
imagine you have tried to use the searchimagine you have tried to use the search
engines likeengines like Google, yahoo, Alta Vista orGoogle, yahoo, Alta Vista or
Lycos,Lycos, and have run into the fact that itsand have run into the fact that its
difficult to easily find the information youdifficult to easily find the information you
needneed
2626Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express
Search TermsSearch Terms
Phrase searchingPhrase searching
Boolean logicBoolean logic
Pseudo-Boolean logicPseudo-Boolean logic
2727Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express
Phrase SearchingPhrase Searching
Phrase searching is the most powerful ofPhrase searching is the most powerful of
the combination techniques, andthe combination techniques, and youyou
should always useshould always use it if possible. Whenit if possible. When
you are creating your search terms, ifyou are creating your search terms, if
there are words that usually go together inthere are words that usually go together in
a phrase, you can indicate that by placinga phrase, you can indicate that by placing
them in quotes (such as "PC-Compatiblethem in quotes (such as "PC-Compatible
computer" or "Scott Nicholson").computer" or "Scott Nicholson").
2828Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express
Boolean LogicBoolean Logic
This is placing the words AND, OR, andThis is placing the words AND, OR, and
NOT to indicate a relationship between theNOT to indicate a relationship between the
search terms for the web database.search terms for the web database.
AND - By putting the word AND betweenAND - By putting the word AND between
two terms, you are telling the databasetwo terms, you are telling the database
"I want to find pages that have both of"I want to find pages that have both of
these terms.these terms.
For example "buy" AND "PC "For example "buy" AND "PC "
2929Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express
Pseudo-Boolean LogicPseudo-Boolean Logic
Many of the search engines allow "naturalMany of the search engines allow "natural
language" searching, which involves twolanguage" searching, which involves two
symbols, + and - for psuedo-boolean operations.symbols, + and - for psuedo-boolean operations.
If you include a - before a search term orIf you include a - before a search term or
phrase, it means that the term should NOT be inphrase, it means that the term should NOT be in
all sites that are returned. It's similar to theall sites that are returned. It's similar to the
Boolean NOT.Boolean NOT.
If you include a + before a search term or aIf you include a + before a search term or a
phrase, it means that the term MUST be in allphrase, it means that the term MUST be in all
sites that are returned. It's very similar to asites that are returned. It's very similar to a
Boolean ANDBoolean AND
E.gE.g +"Scott Nicholson"+"Scott Nicholson"
3030Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express
Steps to using Search EnginesSteps to using Search Engines
Specify and Simplify your search request.Specify and Simplify your search request.
Break the request up into search facets.Break the request up into search facets.
Develop synonyms for each facet.Develop synonyms for each facet.
Create phrases when possible.Create phrases when possible.
3131Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express
Steps to using…Steps to using… cont’dcont’d
Link the synonyms for each facetLink the synonyms for each facet
together with OR, and link the facetstogether with OR, and link the facets
together with AND.together with AND.
Go through at least 50 results beforeGo through at least 50 results before
starting again.starting again.
Use pages that are similar to the oneUse pages that are similar to the one
you want for new synonyms andyou want for new synonyms and
facets to add.facets to add.
3232Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express
THANK YOU SIRTHANK YOU SIR

More Related Content

Similar to Internet Explorer and Outlook Express

Intergen Smarts 9 (2005)
Intergen Smarts 9 (2005)Intergen Smarts 9 (2005)
Intergen Smarts 9 (2005)Intergen
 
Basic internet pnhs inset
Basic internet   pnhs insetBasic internet   pnhs inset
Basic internet pnhs insetMaxie Santos
 
Christopher C. Johnson Portfolio
Christopher C. Johnson   PortfolioChristopher C. Johnson   Portfolio
Christopher C. Johnson Portfoliochristopherjohnson
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreWilliam Mann
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.Khalil Jubran
 
Office web applications when how why
Office web applications   when how whyOffice web applications   when how why
Office web applications when how whypearce.alex
 
Computing at SC&I
Computing at SC&IComputing at SC&I
Computing at SC&IRU asis&t
 
Web mail vs Desktop
Web mail vs Desktop Web mail vs Desktop
Web mail vs Desktop Ericka jolley
 
Hackers Prey on Windows XP
Hackers Prey on Windows XPHackers Prey on Windows XP
Hackers Prey on Windows XPrftclouds
 
Extending Your Experience to the Office
Extending Your Experience to the OfficeExtending Your Experience to the Office
Extending Your Experience to the Officegoodfriday
 
SplunkLive! Frankfurt 2018 - Intro to Security Analytics Methods
SplunkLive! Frankfurt 2018 - Intro to Security Analytics MethodsSplunkLive! Frankfurt 2018 - Intro to Security Analytics Methods
SplunkLive! Frankfurt 2018 - Intro to Security Analytics MethodsSplunk
 
Microsoft Office Latest Tutorial 2019 By Chetan Darji
Microsoft Office Latest Tutorial 2019 By Chetan Darji Microsoft Office Latest Tutorial 2019 By Chetan Darji
Microsoft Office Latest Tutorial 2019 By Chetan Darji Stud Mentor
 
RU MLIS Computing
RU MLIS ComputingRU MLIS Computing
RU MLIS ComputingRU asis&t
 
The Evil Friend in Your Browser
The Evil Friend in Your BrowserThe Evil Friend in Your Browser
The Evil Friend in Your BrowserAchim D. Brucker
 
Browsers .
Browsers .Browsers .
Browsers .seripa3
 
Microsoft office web apps product guide final
Microsoft office web apps product guide finalMicrosoft office web apps product guide final
Microsoft office web apps product guide finalSteven XU
 

Similar to Internet Explorer and Outlook Express (20)

Intergen Smarts 9 (2005)
Intergen Smarts 9 (2005)Intergen Smarts 9 (2005)
Intergen Smarts 9 (2005)
 
Basic internet pnhs inset
Basic internet   pnhs insetBasic internet   pnhs inset
Basic internet pnhs inset
 
Christopher C. Johnson Portfolio
Christopher C. Johnson   PortfolioChristopher C. Johnson   Portfolio
Christopher C. Johnson Portfolio
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & More
 
Broucher '16
Broucher '16Broucher '16
Broucher '16
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.
 
Office web applications when how why
Office web applications   when how whyOffice web applications   when how why
Office web applications when how why
 
Computing at SC&I
Computing at SC&IComputing at SC&I
Computing at SC&I
 
Web mail vs Desktop
Web mail vs Desktop Web mail vs Desktop
Web mail vs Desktop
 
Hackers Prey on Windows XP
Hackers Prey on Windows XPHackers Prey on Windows XP
Hackers Prey on Windows XP
 
Hackers prey on windows xp
Hackers prey on windows xpHackers prey on windows xp
Hackers prey on windows xp
 
Extending Your Experience to the Office
Extending Your Experience to the OfficeExtending Your Experience to the Office
Extending Your Experience to the Office
 
SplunkLive! Frankfurt 2018 - Intro to Security Analytics Methods
SplunkLive! Frankfurt 2018 - Intro to Security Analytics MethodsSplunkLive! Frankfurt 2018 - Intro to Security Analytics Methods
SplunkLive! Frankfurt 2018 - Intro to Security Analytics Methods
 
Microsoft Office Latest Tutorial 2019 By Chetan Darji
Microsoft Office Latest Tutorial 2019 By Chetan Darji Microsoft Office Latest Tutorial 2019 By Chetan Darji
Microsoft Office Latest Tutorial 2019 By Chetan Darji
 
RU MLIS Computing
RU MLIS ComputingRU MLIS Computing
RU MLIS Computing
 
The Evil Friend in Your Browser
The Evil Friend in Your BrowserThe Evil Friend in Your Browser
The Evil Friend in Your Browser
 
Browsers .
Browsers .Browsers .
Browsers .
 
Seguridad Corporativa Con Internet Explorer 8(1)
Seguridad Corporativa Con Internet Explorer 8(1)Seguridad Corporativa Con Internet Explorer 8(1)
Seguridad Corporativa Con Internet Explorer 8(1)
 
Microsoft office web apps product guide final
Microsoft office web apps product guide finalMicrosoft office web apps product guide final
Microsoft office web apps product guide final
 
Browsers
BrowsersBrowsers
Browsers
 

More from Love Steven

Job and Task Analysis
Job and Task AnalysisJob and Task Analysis
Job and Task AnalysisLove Steven
 
Malicious Software ,Good Internet Habits and ICT general Application usage
Malicious Software ,Good Internet Habits and ICT general Application usageMalicious Software ,Good Internet Habits and ICT general Application usage
Malicious Software ,Good Internet Habits and ICT general Application usageLove Steven
 
Cyber Security – Virus and the Internet
Cyber Security –  Virus and the Internet Cyber Security –  Virus and the Internet
Cyber Security – Virus and the Internet Love Steven
 
Personnel Management Software Developing and Processes
Personnel Management Software Developing and ProcessesPersonnel Management Software Developing and Processes
Personnel Management Software Developing and ProcessesLove Steven
 
Information warfare, assurance and security in the energy sectors
Information warfare, assurance  and security in the energy sectorsInformation warfare, assurance  and security in the energy sectors
Information warfare, assurance and security in the energy sectorsLove Steven
 
Information and Communications Technology (ICT) General Application Software
 Information and Communications Technology (ICT)  General Application Software Information and Communications Technology (ICT)  General Application Software
Information and Communications Technology (ICT) General Application SoftwareLove Steven
 
Linux fundamentals Training
Linux fundamentals TrainingLinux fundamentals Training
Linux fundamentals TrainingLove Steven
 
Energy Databank in Nigeria: Management ,Technology and Security
Energy Databank in Nigeria:   Management ,Technology and SecurityEnergy Databank in Nigeria:   Management ,Technology and Security
Energy Databank in Nigeria: Management ,Technology and SecurityLove Steven
 

More from Love Steven (8)

Job and Task Analysis
Job and Task AnalysisJob and Task Analysis
Job and Task Analysis
 
Malicious Software ,Good Internet Habits and ICT general Application usage
Malicious Software ,Good Internet Habits and ICT general Application usageMalicious Software ,Good Internet Habits and ICT general Application usage
Malicious Software ,Good Internet Habits and ICT general Application usage
 
Cyber Security – Virus and the Internet
Cyber Security –  Virus and the Internet Cyber Security –  Virus and the Internet
Cyber Security – Virus and the Internet
 
Personnel Management Software Developing and Processes
Personnel Management Software Developing and ProcessesPersonnel Management Software Developing and Processes
Personnel Management Software Developing and Processes
 
Information warfare, assurance and security in the energy sectors
Information warfare, assurance  and security in the energy sectorsInformation warfare, assurance  and security in the energy sectors
Information warfare, assurance and security in the energy sectors
 
Information and Communications Technology (ICT) General Application Software
 Information and Communications Technology (ICT)  General Application Software Information and Communications Technology (ICT)  General Application Software
Information and Communications Technology (ICT) General Application Software
 
Linux fundamentals Training
Linux fundamentals TrainingLinux fundamentals Training
Linux fundamentals Training
 
Energy Databank in Nigeria: Management ,Technology and Security
Energy Databank in Nigeria:   Management ,Technology and SecurityEnergy Databank in Nigeria:   Management ,Technology and Security
Energy Databank in Nigeria: Management ,Technology and Security
 

Recently uploaded

Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfStefano Stabellini
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identityteam-WIBU
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...confluent
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsChristian Birchler
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfMarharyta Nedzelska
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...OnePlan Solutions
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commercemanigoyal112
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Matt Ray
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 

Recently uploaded (20)

Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdf
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identity
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdf
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commerce
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 

Internet Explorer and Outlook Express

  • 1. 11Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express Internet Explorer and Outlook Express ByBy Adedayo O.SAdedayo O.S A Paper Delivered During the General Staff Training for Energy Commission of Nigeria (ECN) Abuja, 2010
  • 2. INTRODUCTIONINTRODUCTION Windows Internet Explorer, is a seriesWindows Internet Explorer, is a series of graphical web browsers developedof graphical web browsers developed by Microsoft in 1995.by Microsoft in 1995. AA web browserweb browser is a software applicationis a software application for retrieving, presenting, and traversingfor retrieving, presenting, and traversing information resources on the World Wideinformation resources on the World Wide Web. Other web browsers – MozillaWeb. Other web browsers – Mozilla Firefox, Opera etc.Firefox, Opera etc. 22Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express
  • 3. INTRODUCTION cont.INTRODUCTION cont. 33Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express The usage share of web browsers. Internet Explorer (54.50%); Mozilla Firefox (30.96%; Google Chrome (5.61%) Safari (5.27%) Opera (2.10%) Other (1.78%)
  • 4. Windows Internet ExplorerWindows Internet Explorer 44Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express
  • 5. 55Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express E- MailE- Mail Web-based emailWeb-based email or webmail is a term referringor webmail is a term referring to an e-mail service intended to be primarilyto an e-mail service intended to be primarily accessed via a web browser.accessed via a web browser. Some of the earliest Webmail services wereSome of the earliest Webmail services were Hotmail, Yahoo! Mail, Gmail and ECNmailHotmail, Yahoo! Mail, Gmail and ECNmail A major advantage of web-based email overA major advantage of web-based email over application-based emailapplication-based email is that a user has theis that a user has the ability to access their inbox from any Internet-ability to access their inbox from any Internet- connected computer around the world.connected computer around the world.
  • 6. 66Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express Outlook ExpressOutlook Express Outlook Express is an e-mail/news clientOutlook Express is an e-mail/news client that is included with Internet Explorerthat is included with Internet Explorer versions.versions. Outlook Express is a different applicationOutlook Express is a different application from Microsoft Office Outlook.from Microsoft Office Outlook. The two programs do not share a commonThe two programs do not share a common codebase, but do share a commoncodebase, but do share a common architectural philosophy.architectural philosophy. ..
  • 7. Outlook Express cont.Outlook Express cont. 77Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express
  • 8. Creating A New emailCreating A New email AccountAccount There are many free email atThere are many free email at www.yahoo.com, www.hotmail.com ,www.yahoo.com, www.hotmail.com , www.gmail.com, www.aol.com .www.gmail.com, www.aol.com . Here are the basic steps to set up aHere are the basic steps to set up a POP3 or IMAP email account withPOP3 or IMAP email account with Outlook Express:Outlook Express: 88Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express
  • 9. Creating A New AccountCreating A New Account 99Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express
  • 10. Creating A New Account cont.Creating A New Account cont. 1010Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express
  • 11. Creating A New email cont.Creating A New email cont. 1111Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express
  • 12. Creating A New email cont.Creating A New email cont. 1212Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express
  • 13. Creating A New email cont.Creating A New email cont. 1313Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express
  • 14. Creating A New email cont.Creating A New email cont. 1414Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express
  • 15. Creating A New email cont.Creating A New email cont. 1515Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express
  • 16. How to Send EmailsHow to Send Emails Opened up Outlook Express,Opened up Outlook Express, Create a new account Just fill in theCreate a new account Just fill in the To: with an email address.To: with an email address. Fill in the Subject: With some subject.Fill in the Subject: With some subject. In the big white area is where you writeIn the big white area is where you write the actual letter.the actual letter. Spelling. Before sending your emailSpelling. Before sending your email you should just run the spell checkeryou should just run the spell checker over your email.over your email. 1616Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express
  • 17. Creating A New emailCreating A New email 1717Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express
  • 18. How to Send Emails cont.How to Send Emails cont. The paper clip Icon that has attachedThe paper clip Icon that has attached below it. That's what you would click ifbelow it. That's what you would click if you wanted to include a file, picture,you wanted to include a file, picture, etc to this email. This will open a boxetc to this email. This will open a box that will tell you to browse for the filethat will tell you to browse for the file that you want to include with thisthat you want to include with this email.email. 1818Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express
  • 19. Avoid SpamAvoid Spam It is wise to avoid spam since it canIt is wise to avoid spam since it can contain malware which may usecontain malware which may use vulnerabilities in your email program,vulnerabilities in your email program, default web browser, or other programs todefault web browser, or other programs to infect your computer. So you should guardinfect your computer. So you should guard your email address carefully and possiblyyour email address carefully and possibly run spam management or spamrun spam management or spam prevention software.prevention software. 1919Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express
  • 20. System ConfigurationSystem Configuration ChangesChanges Using an browser other than InternetUsing an browser other than Internet Explorer when surfing the internet.Explorer when surfing the internet. Changing your Internet Explorer settingsChanging your Internet Explorer settings to make the browser less vulnerable toto make the browser less vulnerable to being compromised if an attack occurs.being compromised if an attack occurs. Changing your system to show fileChanging your system to show file extensions for known file names which isextensions for known file names which is contrary to Microsoft's default setting.contrary to Microsoft's default setting. 2020Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express
  • 21. 2121Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express Application for protectionApplication for protection
  • 22. 2222Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express Internet Best PracticesInternet Best Practices Reduce the risk of viruses. Use of anti-virus softwareReduce the risk of viruses. Use of anti-virus software and keeping it current.and keeping it current. Never open suspicious e-mail messages or fileNever open suspicious e-mail messages or file attachmentsattachments Use Windows Security Centre to manage yourUse Windows Security Centre to manage your settings. Adjust to the level of protection you aresettings. Adjust to the level of protection you are comfortable with.comfortable with. Download internet files from trusted sources only andDownload internet files from trusted sources only and scan the files with your virus scanner.scan the files with your virus scanner. Use a firewall, Install a Microsoft Internet ConnectionUse a firewall, Install a Microsoft Internet Connection firewall as a basic line of defence against outsidefirewall as a basic line of defence against outside intruders.intruders. Use strong passwords that are at least eightUse strong passwords that are at least eight characters long and a combination of lower and uppercharacters long and a combination of lower and upper case letters, numbers and symbols.case letters, numbers and symbols.
  • 23. 2323Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express Block Pop-upsBlock Pop-ups
  • 24. 2424Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express How to download CorrectlyHow to download Correctly
  • 25. 2525Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express Web SearchingWeb Searching Searching the Web is not easy. There is aSearching the Web is not easy. There is a lot of junk out there, and it can belot of junk out there, and it can be frustrating to sift through it all. I wouldfrustrating to sift through it all. I would imagine you have tried to use the searchimagine you have tried to use the search engines likeengines like Google, yahoo, Alta Vista orGoogle, yahoo, Alta Vista or Lycos,Lycos, and have run into the fact that itsand have run into the fact that its difficult to easily find the information youdifficult to easily find the information you needneed
  • 26. 2626Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express Search TermsSearch Terms Phrase searchingPhrase searching Boolean logicBoolean logic Pseudo-Boolean logicPseudo-Boolean logic
  • 27. 2727Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express Phrase SearchingPhrase Searching Phrase searching is the most powerful ofPhrase searching is the most powerful of the combination techniques, andthe combination techniques, and youyou should always useshould always use it if possible. Whenit if possible. When you are creating your search terms, ifyou are creating your search terms, if there are words that usually go together inthere are words that usually go together in a phrase, you can indicate that by placinga phrase, you can indicate that by placing them in quotes (such as "PC-Compatiblethem in quotes (such as "PC-Compatible computer" or "Scott Nicholson").computer" or "Scott Nicholson").
  • 28. 2828Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express Boolean LogicBoolean Logic This is placing the words AND, OR, andThis is placing the words AND, OR, and NOT to indicate a relationship between theNOT to indicate a relationship between the search terms for the web database.search terms for the web database. AND - By putting the word AND betweenAND - By putting the word AND between two terms, you are telling the databasetwo terms, you are telling the database "I want to find pages that have both of"I want to find pages that have both of these terms.these terms. For example "buy" AND "PC "For example "buy" AND "PC "
  • 29. 2929Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express Pseudo-Boolean LogicPseudo-Boolean Logic Many of the search engines allow "naturalMany of the search engines allow "natural language" searching, which involves twolanguage" searching, which involves two symbols, + and - for psuedo-boolean operations.symbols, + and - for psuedo-boolean operations. If you include a - before a search term orIf you include a - before a search term or phrase, it means that the term should NOT be inphrase, it means that the term should NOT be in all sites that are returned. It's similar to theall sites that are returned. It's similar to the Boolean NOT.Boolean NOT. If you include a + before a search term or aIf you include a + before a search term or a phrase, it means that the term MUST be in allphrase, it means that the term MUST be in all sites that are returned. It's very similar to asites that are returned. It's very similar to a Boolean ANDBoolean AND E.gE.g +"Scott Nicholson"+"Scott Nicholson"
  • 30. 3030Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express Steps to using Search EnginesSteps to using Search Engines Specify and Simplify your search request.Specify and Simplify your search request. Break the request up into search facets.Break the request up into search facets. Develop synonyms for each facet.Develop synonyms for each facet. Create phrases when possible.Create phrases when possible.
  • 31. 3131Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express Steps to using…Steps to using… cont’dcont’d Link the synonyms for each facetLink the synonyms for each facet together with OR, and link the facetstogether with OR, and link the facets together with AND.together with AND. Go through at least 50 results beforeGo through at least 50 results before starting again.starting again. Use pages that are similar to the oneUse pages that are similar to the one you want for new synonyms andyou want for new synonyms and facets to add.facets to add.
  • 32. 3232Internet Explorer and Outlook ExpressInternet Explorer and Outlook Express THANK YOU SIRTHANK YOU SIR