ICDL Module 7 PDF
ICDL Module 7 PDF
Web Browsing
and Communication
© Blackrock Education Centre 2012
ISBN 978-0-9563141-7-8
Microsoft" Windows•, Microsoft• Office•, Microsoft• Word •, Microsoft• Access•, Microsoft• Excel•, Microsoft•
PowerPoint", Microsoft" Internet Explorer• and Microsoft• Outlook" are either registered trademarks or tradema rks
of the Microsoft Corporation. The use of Winzip and the Winzip trademark is with the kind permission of
Winzip Computing Inco rporated.
Other products mentioned in this manual may be registered trademarks or trad emarks of their respective
companies or corporations.
The companies, organisations, products, the related people, their positions, names, addresses and other details
used for instructional purposes in this manual and its relat ed support ma terials on the manual's support website
www.becpublishing.com are fictitious. No association with any real company, organisations, products
or people are intended nor should any be inferred.
Every effort has been made to ensure that this book contains accurate information.
However, Blackrock Education Centre, its agents and the authors shall not be liable for any loss or damage
suffered by readers as a result of any information contained herein.
(£.J(_81Jl
BEC Director
Proofreading
Pat Seaver
Claire Rourke
BEC Production Lorna Bointon
Carrie Fonseca
Line Drawings
Claire Rourke
Note to Reader
Learn Office 2010: The Definitive Guide to Windows 7 and Office 2010 has been written
to enable the absolute beginner to arrive at an understanding of basic computer app lications.
It has been written in clear English with step-by-step instructions to be easily understood as
either a self-study guide or for the tutor- led environment. It is applicable for both desktop
PCs and laptops.
The Before You Begin section, unique to the Blackrock Education Centre computer
manuals, has been written for those students who arc absolute beginners. It starts with the
basics of how to switch the computer on and off, it exp lains the usc of the mouse, the
taskbar, and introduces the student to the keyboard and the cursor. The student is then
introduced to the windows, the ribbon, settings and the Help function.
Each new topic is full y and carefully explored, complemented with numerous exercises for
student practice. Small amounts of additiona l information have been inc luded to enhance the
students' understanding of very important topics.
Particular attention is given to ensuring that the content of the manual reflects the view on the
screen. The manual has large-format A4 pages and is fully illustrated with screen shots
throughout. The placing of the graphics and text side by side make this an ideal training
manual.
This manual wi ll usc Microso ft Outlook to teach the usc of the e-mail, with an opportunity to
practise creating and sending an e-mail. It wi ll also offer interactive website training at
www.becpublishing.com. There arc also FREE on line resources avai lable to download from
the website.
Web Browsing and Communication is divided into two sections. The first sect1on, Web
Browsing, requires the candidate to know about the internet and to use a web brows1ng
application.
The second section, Communication, requires the candidate to understand some of the
concepts of electronic mail (e-mail), to know about other communication options, and to
appreciate some security considerations involved in using e-mail.
Web Browsing
It is general ly accepted that the initia l development of the internet was prompted by the Cold War
between the US and Russia. To ensure that information could continue to flow should clements of
the communica tions structure be destroyed in a nuclear strike, the US decided to decen tralise its
information storage and to create a system where information could be accessed through a number
of di ffcrent routes. At the same time, US universities were demanding access to these powerful
computers for research purposes. In the late 1960s, super-computers were installed by the mi litary
in a number of locations around the US and a network was designed to enable the universities to
usc its resources.
The main users of thi s fl edgling internet were scientists, engineers and technica l experts. During
the 1960s and 1970s, US libraries automated their mdcxcs and, over the nex t decade, made their
catal ogues available online. Being online was the reserve of technical, scientific and research
experts for quite some time as the system was complex to usc. As well as the military, the
educa tional community, government bodies and research instituti ons dominated the internet's usc.
Mail services emerged in th e earl y 1980s and were predominantly used by educational insti tutions
that engaged at an internati onal level in information exchange.
The growth of accessible databases on the internet grew substantiall y in the late 1980s and early
1990s and the difficul ty of tracking through the huge vol ume of information prompted the
development o f catalogues. 'I hroughou t the 1990s, the development of systems that could retrieve
information linb from web-based indexes began to emerge. Parallel to this, technological
developmen ts in computing saw greater processing speeds and more user-friendly computer
interfaces, telecommunications and cable companies increased capacities and high-speed fibre
optic cable network s were being ro lled out. The commercial usc o f the internet did not really
begin unti l the early 1990s and, by th e late 1990s, particularly with the commercial provision o f
intcmet services, business traffic on the internet was w idespread. M ore recent developments in
the internet arc attempting to address the challenges presented by even greater capacity demands
in the delivery of multimedia, enticing more home users online and an ever increasing growth in
on line service provision from governmen t, educational and commerci al agencies.
The invention of I-IT M L greatly enhanced and cased the access across the web. Typically,
clicking a piece of text or an image in a IITM L document, called a I ink, moves to another page,
which can be on the same websi te or a different one entirely. This convenience revo lutionised
web usc, enabling users to browse a myriad of related topics.
1.1.4. Hyperlink (
As the cursor is moved around a web page, it w ill occasionally change to a hand with a pointing
finger. This ind icates that this particular piece of text or graphic is a hypcrlink.
NeV\.ti
A hyperl ink is a piece of text, an object or a graphic that acts like a button. Training
Clicking a hypcrlink per forms an action such as moving to a different part of
the same page, di splayi ng a new page or moving to anoth er site altogether. Pr~
~ ~I.L9.ru<
Anything that changes the cursor to the hand cursor as you move over it is nonnally a hypcrlink.
Graphics that include a hypcrl ink wi ll also change to the hand cursor.
A n ISP typical ly provides the customer w ith software, a uscrname, a password and a number to
enable access through thei r parti cular service. With large companies, ISPs oflen provide direct
connecti on between the company's networks through leased lines. The tenn internet access
provider ( l A P) is frequently used for ISP.
Scrccn!.hots and exampl es in this module arc taken from Internet Explorer Version 8.
Transferring a file from a remote computer to your own computer is called downloading the file .
Sending a file to a remote computer is called uploading the file.
Almost all modern search engines ust.: programs called spiders or automated crawlers to visit as
many other wcbs ites as possible, and catalogue their contt.:nts to produce a searchable index.
When a search engine is used as a result of a user entering a search term or terms on the relevant
website, powerful search algorithms query this index and return results or hits.
1 here arc also meta-sea rch engines that automatically perform searches against many normal
search engines and collate the rt.:sults together in attempt to prov ide the largest set of results possible.
Automated
Coogle http://www.google.com.
Microsoft Live Search http://seareh.live.com.
Yahoo! Search http://www.yahoo.com.
Lycos http ://www. lycos.com.
Meta-Search
OogPile http://www.dogpi lc.com.
lxQuick http://www. ixquick.eom.
MetaCrawler http://www.metacrawler.com.
Scarchmg for inforn1ation involves entering a search term on search engine page. 1\ list of
wcbsitcs that the search engine ha!. determined meet those criteria is then displayed. The
individual sites can then be accessed as req ui red. Searching the web is described in detail in
Section 1.7 ofthi s module.
Each time a s ite is visited, the browser saves the contents of the visited pages into a temporary
storage area on the hard disk, usually a folder dedicated to temporary intemet Iiies called a cache.
This speeds up the future download111g of these pages. It i ~ possible to adjust the amount of space
used to store these pages, as they can take up large amounts of disk space.
To read this information, an aggregator or reed reader is used. This can be a stand-a lone
appl icati on or integrated into a web browser. The aggrcgator wi ll handle all RSS subscriptions
and automatically check them from time to time, presenting any new items in summary form.
This usually happens in the form of small pop-up windows on the screen, which removes the need
to check these websites. The summary items can be clicked on to open them and the full item can
be read as it appears on the originating website.
The illustration on
the right shows the
Sharp Reader I S.>t<h
-
5p•ce· tome should be descnbed u a contonuum.' L•t the phys ocs
onfogh tong begon •
Sharp Reader
----------------------------------~
The feed can be opened and items read by clicking the pop-up. In nonnal operation, the RSS
reader window is not visible, and all that will be seen is the occasional pop-up as items come in ,
enabling users to stay up-to-date but not requiring them to switch appl ications and chec(.. websitcs
constantly.
It makes sense to choose a strong password, Tho s•rv•r www.bocpubhshong.com 11 ECDL Syllobus 4 r•quuos 1
U't!tname 1nd password
containi ng a lengthy mi xture of upper and
lower case letters, numbers and non-alphabetic Wtfntng- Thts no rver ts rtqutstmg that your uurn1me and p1ssword bt
sent '" an tnsecure manntt (~stc authtnttutJon wtthout a secure
characters, such as underscores. M any networks connKtton).
OK ) I Conctl
The URL begins with https:/1 rather than the normal http://. This =-1
.......,~in~d~ic~a=te=s=th~a=t=th~e=s~e=c=u=r=e=v=e=rs=io~n=o=f=t~he=""H~T~T=P=p~r~o~to=c=o=li=s=b=e=in=g=u-s'"'e""d=. """""........~
Not all parts of a websi te w ill be secure. For example, on shopping sites the sections w here
products arc selected arc normally unsecured and secure pages only appear at the checkout
secti on, w here personal information must be entered.
The Firefox browser will display a padlock icon in the bottom right of the window, and
show the page URL in yellow in the address bar along with another lock icon.
( www amazon. com
Typically, users w ill register w ith an organisation that issues digital certifica tes. T his registration
usually requires the checking of confidential informati on, e.g. credit card nu mbers and companies,
to confirm identity. Companies conducting business across the intern et w ill al so register in a
similar manner. T he certi fy ing authority then facilitatcl> the secure communica tion between users
and the recipient w hen, for example, a hotel booking is being paid for online.
1.2.5. Malware (
T he term mal ware is used to descri be a range of unsolicited and usually malicious sonware
programs. They transfer between computers across networks and the internet using various
methods for example from malicious wcbsitcs and e-mail attachments by infecting program
files or by exploiting security weaknesses in operating systems. Some act ively destroy data, some
stea l passwords and private informati on, and some remain dormant until they arc activated to usc
the host computer as part o f a huge attack on a corporate or government network.
They arc generally grouped into the headings of viruses, worms, spyware and trojans.
Virus: This is a type of software that spreads from an infected program to other programs.
Generally, viruses can be found tn executable programs (.exe files). When the infected
executable program is run, the virus spreads to other programs and performs a damaging
functton. Whatever function the virus performs is known as a payload . A payload can be
anything that the virus is programmed to do, such as delete data from the hard drive or flash a
message on users' screens.
Worm: This is a type of software that spreads across computer networks. Similar to viruses,
worms have a payload. One of the most common worm payloads is to use up network
bandwidth and slow down the transfer of data across a network.
Spyware: This refers to a range of programs that monitor and collect users' personal
information and behaviour. This information is then used for marketing purposes or to redirect
users to a specific website. Spyware can also have undesirable effects, such as slowing down
an internet connection or a computer's performance in general. Most spyware programs infect
a computer by getting users to install them unknowingly, much like Trojan horses.
Trojans· This is a type of program that is destgned to resemble another type of software. By
deceiving users, a Trojan horse actually gets them to install malicious code on their computers
in the belief that they are actually installing a different program. Once installed, the Trojan
horse doesn't spread like a virus or worm, but creates what is known as a 'backdoor' that
enables access to the infected hard drive without detection.
1.2.7 Firewalls •
A computer connected to the internet is connected to millions of other computers worldwide. This
carries a huge risk of unauthorised access by malicious individuals or criminal organisations.
Fircwalls act as a barrier between individual computers or computer network!> and the wider
internet, and essentially make them invisible. rircwalls can exist in hardwa re, for example inside
a broadband router, or in software. They can be con figured to provide alerts if someone
attempts to intntdc.
Online harassment might seem rather unlikely because of the anonymous nature of the internet,
but it is that anonymity that enables cybcr-bullies and on li ne predators to operate success fully.
'I hcsc criminals often masquerade as seemingly harmless people asking normal questions based
on genuine interest. In other instances, cybcr-bullics and online predators target a speci fic victim
by gathering personal information from online profiles or wcbsitcs that might contain contact
details. Never provide your phone number, postal address or e-mail address on any public profile.
Fortunately, following some simple rules and employing common sense wi ll minimise these risks.
Use anttvirus software and keep it up to date.
Never reveal your entire name, full date of birth, contact details or other personal information
to anyone whose identity you are not absolutely certain of.
Use strong passwords and change them frequently.
Ensure th e operating system is kept up to date, especially with updates designed to fix
security loopholes.
Never open an unexpected e-mail attachment, even if it appears to be from a known sender.
Learn to recognise phishing attempts (see Section 2.2.2).
Where possible and appropriate, avoid entering real personal details, such as name, age, sex
or location, into forms on websites. It is necessary, for example, to use correct personal
information for banks or where credit card details are needed, but an invented online identity,
called an alias or handle should be used for web forums, etc.
If a broadband internet connection is being used, the browser window will appear almost
immediately.
• If a dial-up internet connection is being used, there may be a prompt to use the connection.
The Connect name bar usually displays the name of your ISP.
Your username and password - received from the ISP upon setup - may be entered
automatically. Note that the 'connect' window may vary in its appearance according to
connection type and the version of software being used.
Enter a
username and [!) Save oanword
password 0 Connect avton\lltocally
~.....:;;;.;:.;;;.;.;....J [ s~ ,. .[-c.,-nc-el---.
Click
Connect Dlelino ettl!ml)t 1.
The first web page that appears is called the home page, initially it is chosen by your computer, but
you can change it to a page that is more relevant for you (see Section 1.4.1).
Close X
button
........,,.
_,.
.......
..,_.........,
_,......,. w_.,..
............ ..,.....
- Recentne1NS
PateweJio learnut 0 C.n1fnn
...-
~ "'- ...._. ......... c.....~~~o•,._a--o
c - ....,.,..,.r,.......Jtii T,.,.......,...
c---............. _ .............
--..
---- -
Mltil.ln.IJ II I(II.Uh! lhr. f•t~oretJ,' P.'*ct
-----------·~._. ........ 0.
Send
Import Md Export ...
If a dial-up connection is being used, one of these ]
Properties
actions may or may not close the connection as well.
Work Offline
Tabbed browsing enables multipl e pages to be open in one Internet Explorer wi ndow, but on
separate tabs. T his is an invaluable feature that reduces desktop clutter.
IECPulllhhing · Wi
0 ~- bKpubhshong.com r
becpublishing.com
- Our Publlcatlona
In th e above image, there arc three separate wcbsitcs open on different tabs. Each tab can be
clicked to make it acti ve, and the address bar will change to rcncct its URL .
To open a new w indow in Internet bplorcr, do the following: Edt Yew Fovonltl To
Click the File menu and select New Window. Ctr1+T
Alternatively, use the keyboard shortcut CTRL + N or select New
Open... Ctr1+0
Window from the Page menu on the Command Bar. Eatwo111Not"Pi'd
A separate Internet Explorer window opens.
I $e¥~ AJ .. ,
~T~ Ctr1tW
To open a new tab, do the following:
Pq Setl.o. ..
0
In the File menu , select New Tab.
Pl'nt... Ctr1+P
Alternatively, use the keyboard shortcut CTRL + Tor click the New Tab Pl'nt Pr...........
button: Send
(3 Recent news Sote Import ond Export .••
Properbtl
A new tab opens in the current browse . WO<I<OH~fw:
EXIt
A new Internet Explorer window with the linked URL ll()pen =-~r~~• • •. ,• • • •l]
~~.,~-
opens. •·
Save Target As ...
Pr.,tTarget
A similar procedure is used to open pages in new
tabs, except Open in New Tab would be chosen.
COpy Shorta.ot
p
ProperUes
l
The I lclp facility can also be opened by clicking th e llclp Onflnt Support
button on the Comma nd Bv r· a About lnttrntt E>plortr
-: P1gt • S.ftty • Tooll Iti •
Using the I lclp function is described in detai l in Section 7 of the Before You Begin modu le.
Click Use
current
Multipl e home pages can also be specified, w ith each opening in a different tab w hen Internet
Explorer i s launched.
Page i
Click Add or
Change Home
B!B
Choose an
option and click
Yes Would you like to use the lollowtng as your home pa~?
http://www ,tj,adqodK,If!/
Remov~
JI No
Cooki es can also be used to track what sites have been visited, and thi s information can be used to
target advertising at users. T his makes them a potential security concern.
T he cookie settings as described above can be overridden on a si te-by-si te basis. For example, i t
might be necessary to always accept cookies from a banking site.
-
Otflo<l
from the menu .
The Internet Options window opens. ,,.,.lhlloo<l~""·
r..........tho, ..R<oolo¥t
ond- bUion -""'-"'"'"-·
Select the Privacy tab.
Click the Sites button. ~~
~~
...-.
----------------~
The Per Site Privacy Actions window opens. ;:::::::::::::::::
Enter a website URL in the Address of website field.
Click Block or Allow for all cookies
from that site to be blocked or allowed
regardless of the global cookie settings.
Click OK.
Enter tho
site's URL
All this stored information takes up disk space, and also creates securi ty and privacy concerns.
For th is reason, the contents of the cache and the temporary internet files can be deleted.
,...........
Savod - d o thot •• ~UII)ntotuliy ftltd n whon you ~q~n
to • Ml>ottr you've pr._..y wotod.
Click
j -a tt! fltt!rln9 dAta
Delete
Savod do~ Ulod by lnl'rovltl! f'ltorr.o ID dot«t - · wobsoti!S may
lomltuly otwr.o do,.lbout )'OU' . . ,.
llowevcr, keeping a browsing history means a privacy, and possibly a security, risk i s created, so
Internet Explorer can be set to cl ear addresses after a certain number of days.
J 1JKI:ory
Click Ust of wd>sob!s you have .,..ted.
History
[ ormdata
Saved onformatlon !hilt you have typed rotD forms.
e..swonk
saved -01ds !hilt •• outoo~ot>ealv fikd on when vou 11111 on
to • Mblob! you've pre'o!IOU>Iy IIIli ted.
lnl'rivate Filtering data
Saved datA used by lrf>rivab! Flt<mg tD deb!ct ~e webtottt INIY
be outO!Mt>ealy ohanog deta.. about 'fOIIWil.
Click Delete
Carnl
When a website is visi ted, Internet Explorer wil l intercept any attempts by the si te to show pop-up
windows and display a pop-up bar to highlight this.
Pop-up bar
The site used in the above illustration (http://www.popuptest.com) is usefu l for testing pop-up
blocking. In the above examp le, if th e pop-up bar is clicked, a menu opens allowing pop-ups to be
enabled for th e curren t site on a temporary or pcnnanent basis.
You can adjust th e filter level of th e pop-up blocker to regulate what type o f pop-ups you want to
block. To adjust the filter level, do the following:
Start Internet Explorer.
In the Tools menu, select Pop-up Blocker.
A sub-menu appears.
Select Turn On Pop-up Blocker from the sub-menu to block pop-ups.
OR
Select Turn Off Pop-up Blocker
'. 1 • G:;l • "'l , • Pag• • Safety •
from the sub-menu to allow
pop-ups. 1 0:
The desired setting is applied. ~ Reoptn last BrowSing Seu1on
You can adjust the filter level of the pop-up blocker to regulate what type of pop-ups you want to
block.
Pop-up llochr Solt1ft9'
To adj ust the filter level, do the following :
£.,:-
In the Tools menu, select Pop-up Blocker. r:il Pot>_ . . ~blod<ocl Youcon_pap_,_opoctc
A sub-menu appears. l.,f.'J -llbyfldd01Qth0101110tl\o . . boiow
U • I@ p wv.w bll!krockec.oe +, X ~~ ~ p •
Command bar
The Navigation/Address bar is where website URLs are entered, and the arrow buttons for
navigation are located.
The Search bar to the right enables a search to be performed using the default Search
Provider.
The Command bar contains the tabs for any websites that are open, and th e Home, Feeds ,
Print, Page and Tools buttons.
.,1 Menu Blr
Additional bars such as the Favorites bar, Menu bar and Favontes Bar
Statu s bar can be displayed or hidden by right-clicking on a .,I Compatobohty Votw Button
blank area of the Command bar and ticking or unticking the .,I Command Bar
relevant option on the menu that opens. .,I Status Bar
AOL Toolbar
.,I Google Toolbar
0 6r It is not normally necessary to enter the http:// part, or even the www. Entering just ~
not e digg.com in the example above would still connect to the website - and save some typ~~
The address bar always displays the URL of the page being viewed. It will change to rcncct a
change to a new website during browsing.
Individual U RLs in the drop-down list can be clicked to revisit them. Only U RLs that were
manually typed into th e Address Bar arc avai lable here any visited by clicking on hy perlinks
arc not.
Sl11ft + Ent~r
http://www. blocltrockec.•~
http://www.becpubl•sh•ng.com/
http://www. bllnl~rn~.com/
http:// www.msn.eo.uk/
http://med•of~r~.com/
The browsing history can also be permanently displayed in a llistory panel to the left of the
Internet Explorer w indow.
Clicking the Pin button will cause the 'il.) Add to FovontH .. T
•J
Favorites Center to be permanently
locked in place.
Fovorlt~ JFeed~ History l
I[v•.w By Date
Q 3 Weeks Ago
rJ
i:lll 2 Weeks Ago
01 L1st Week f
I. ... 1··
I
I I
bt.cktod.tc ('NWW.blackroc kK.te) Click a t•me hm1t or v1ew by a spec1fic date
--'t-- A history of websites
viewed Today
In a text link the text is underlined in a different onaire T Boone Pickens is planmng to
colour to the surrounding text, and the cursor y be the world's larges~md farm It wil
changes to a pointing finger icon when moved 1 to power 1 3 million hUes The first E
over it.
Si ngle-clicking a hyperli nk wi ll navigate to the linked location and display the contents, whether
that location is somewhere else on the same page, on a different page on the current website or on
a different website altogether. The linked location can be displayed either in the current browser
window or in a new browser window or a new tab (sec cction 1.3.2).
• The arrow pointing left is the Backward button - it goes back to the page that was being
viewed before the current one. If the current page was the first to be viewed, this button will be
greyed out.
• The arrow pointing right is the Forward button. If the Backward button has been used to find
previous pages , clicking this bu tton will take the user forward again, through the chain of
pages that have been viewed.
e History Ctri+Silft-+ti
Examples include:
Booking flights- items such as name, address and contact phone numbers are required.
Ordering groceries - name, address and a list of items must be supplied.
Web forms often include a variety of controls designed for users to enter or select information.
All of the common elements that will be encountered are included in the sample form below.
First Name:
Surname: J
0 Married 0 Single
Country: Ireland v
~
Choose one of the folowing: Option 1
Opt iOn 2
Option 3
[SUbmit]
If the form i s ei ther incorrect or incomplete, there is usually a prompt to correct or complete the
form before resubmitting it. To reset a web-based form and clear ali the fields, either the Reset or
Cancel button can be clicked on the web page.
Add a ravotile
The Name will have been filled in Addtl•~ooel•"""• To~~CCM~yourlovcw'CM ,...the
fa.,Ot'eec..tw
automatically with the name of the website,
but this can be changed if needed.
Click Add. ~·"
Click Delete
Clock Close
Add • r.wor~.
• Select the correct Favorites folder from the Mdttw....,.•••f•vort• To.a:... )'OIIft~"M•. •the
Create In list. Fa .. c,.OICMitf
• Click Add .
-~------
•
Click Yes.
The selected folder is deleted.
Click Close to close the Organize
·--
-
1<00.-
~~tnoUt<402
Favorites window.
l!t"'•
A sear ch engine is a program that helps you to lind information on th e web. I t stores listings of
wcbsitcs from all over the world and makes them easily available. Th ere arc many di fferen t
search engines associated w ith th e internet, such as AltaVista, Yahoo!, Googlc and Wcbcrawlcr.
To open th e Googlc search engine, do the following:
Click the Address bar with your mouse.
Type www.google. ie.
Click th e Go button to right of the Address bar.
The web page for Google will be displayed.
Go >gle
Search Settings
LanguJ911
Oh s.. predtcted toarchu and rtl&ult• as you type
Location
Click on
I
Select the On button.
The On button will display •
Select the Save button at the bottom of th e page to save the new setting.
Click OK.
Open www.google.co.uk, www.google.com or www.google.ie.
In the search box, enter blackrock education.
Gog!~
Enter search term
---:...
L
Predictive results are displayed as the search criteria is entered and the Search button displays
as a magnifying glass:
·-...
i(
, \.
wwwttt.cboca.c ..
~
,.,.'
•....:,....,.
...
""""'''""'I ;(
•, ... ••011ll t d« ••jon r "'"• te:.1 ..... .\
11M wt>b
P~••omll..t.nd CW··• iJ
-OO.L-Co.,
..• \
\~
lU•(•fotk. I d...-•tklfl t•nut .,
Mor•ttMti'IIOC i
A..-. OU..t~• CG
,,... J.
ca.- ._,_.n.aY•..._
-
Choose to only see pages from selected Cltck a ltnk to open a web page A map and dtrecttons are also dtsplayed
locatton such as Ireland or UK
The results page wi ll show the number of hils the web pages that the Google search algorithms
decide match the words blackrock and cducncion, with the most relevant listed first.
Search
- 0
To turn off Google Instant predictive results and search for a phrase using Coogle, do the
fo llowing:
Coogle
Unauthorised Photocopying is Unlawful
Enter search term
--- 33
Module 7 ~ Web Browsing and Communication Training for ICDL
The results page will show the number of hits the web pages that the Googlc search algorithms
decide match the words blackrock and education , with the most relevant li sted fi rst.
Goo )0 )0 .. ., gIe ~
1 zJ ~ ~ .§ z .e. ~ lQ N ext
Click the Next or Previous links to move back or forwards through the page numbers.
To choose the number of results that are displayed each time a search is performed, select
the Options button (gear 1con) and then Search Settings.
• In the results per page section of the Settings window, select the amount of results to be
returned when a search is performed. Click Save and then click OK.
The specrfied rr
amount of results
determines the
speed thai searc
results are
Resulls per pago
10
F
1
'
20 30 40 100
Sbwer
Results can bo
returned opened rn a new
Where results open ~ wrndow
Search Settings
Langua~s ! Ireland
Locatron
A locatton helps Googfe find more teltvant rnformatton when you use Search Maps 1nd other Googlt
products Learn how Google SINVS locatron 111formatron on th1s computer
t1elp
Encyclopaedias
Wikipcdia has become a very popular free online encyclopaedia.
To access Wikipcdia, do the foll owing:
Open Internet Explorer. WIKIPEDIA
Browse to www.wikipedia.org. Englleh Oeutech
n.hHf o..h..•ffV)<.Iop<><H I" -.
Enter a search term (in a J.DII -'\.. • 'MOOOtoM W
returned. Ned•r1•nde
.....,.,..J..
Portugu ••
o.~ A .,.._"lop.. ••Mt
41':71C10•~4o- ....... ...
E• p•l'lol Sv•n•k•
.............
ta M(KIQp41Jf.allbft t>tn ~r,. 4POC;4)l'~Hdn
)"10«>• ..,....... Click
Enter search term search
, , . ,ch to,Kf>t rtd-•'1tott ""~ · - •nt ttl ...... ,y•fUbutton
I . . . . . ,.. .... I • • ' f f l,. 0 tlf 'W I ...... 14frtf I ···/lfrf ....
•rkrock fi,.,G.r- ~ ·
·-·-··
tlf• • luMif . ., ••
a search engine, the searches \tl!.\!:'~
111 online encyclopaedias
arc performed against a
.,.,....
.~. , ~
.,.,.,......_...
........... , . . . . , . .. M>e fl ""'"' ......
• ...,..._.
ll't•t••
-"'....--·~·....._._.... • .._tn ct,
..
,,
· ·. ·~··
..... ... ,.....
. . . u._. ........ ~....-fiC.N\17~
t
• IIIM"**II ._..,.. "'''-"""""""' ..... ~I~P"'-IWl"-tf,..,fl""'•
,...,
" J ..... •••U..t
.....,....k.,....• .,..,..._...,~ ... occ.,..., .. ..,.... ..,..,
ellct.n.itt•·N_...._,"'' ~'~~th.......,.....,..
Dictionaries
To usc an online dictionary, do the following: e Search the Comoact
Go to www.askoxford.com. Ox[ord English
A search box is provided to enter a word . Dlctlonarv
Enter the word to search, e.g. heliotrope.
!heliotrope Go' I
Stirch r~uiU
A web page displayed in the browser is bui lt from a variety of files behind the scenes. Any
graphics present arc not embedded in the page but exist as separate files on the web server that
the website resides on. When saving, either the page text on ly can be saved, or the page and all
the supporting flies that go with it can be saved.
To practi se downloading a text ril e, image rile, sound rile and v ideo ril e, go the webs ite
www.becpublishing.com, click on the blue Online Practice bullon and enter the usern ame
blackrock and password practice as required.
Choose the Download Media Files link on the web page you access to choose from a variety o f
information th at you can download as practice.
Right clod< the sound fole or your chooc• and choose the
•poropr1att command from the shortcut menu
To download an item, do the following:
• Right-click on the link.
• Select Save Target As from the menu.
-··-
you can use the Web Page complete
(*. htm, *.html) file type option.
If you want to save the web page
..
without the graphics, you can choose
to save it as a Text File (*.txt).
Click Save. --- ,._"'-""'-...: ..........
,.....~,,..- """~
~,...,
Experiment with the different options and files available on the site.
Go to the web page www.becpublishing.com.
• Click the blue Online Practice button on the right-hand-side of the home page.
A login box opens, which has to be completed before the website can be accessed.
Enter the username blackrock and the password practice.
Click the Download Media Files link .
In the Type Of Media column, scroll down to Video File.
• Right-click a link and select Save Target As.
~ ll71<S01100C
T-·lifo
o.-..1 to C\ lJooro\Colropaq\lloaJ \'o1doo32il<b '"'
J2]1(81Soc
Go to www.bccpublishing.com to practise (remember click the blue Online Practice button and
enter the uscrnamc blackrock and the password practice in the login box).
Foll ow the steps below to copy text from a web page to a document.
Click the Learn About Text link.
Highlight the text by dragging the mouse over it.
There is usually an Advanced Search button. Note the links that help with advanced
searches.
Right-click the selected text and select Copy.
Open a word processing document in an application such as Microsoft Word.
In the Clipboard group (Home tab) in the word processing document, select Paste, or press
CTRL + V.
or press CTRL + V.
Add to Favorrtes•. •
Proper lies
In Internet Explorer, print options arc accessed by clicking the Print •• ... Gi1 ...
button on the Command bar (or click the Print arrow and then
Pnnt... Ctri+P
Print).
~.. Pnnt Prevr- ...
(j Page Setup...
.-----······
-- .. -·--
.. -·... ..... -........ ·--
__---- .....-_.
....___··---
.. -·--
__
........... _ - __
-··-
-·--···---
-·-~..
,.... __.
----·--------~-
............. ........ ..._.., __
- __ -.......·-· ~·
The preview window has a toolbar that provides printing, page set-up and navigation options.
Pr,nt Pagj Setup
., f ~ l 19 1 Page View
V1ew Options
Shnnk To Fit ....
Orientat1on Headers/Footers
Changing Orientation
T here arc two types of page orientation, Portrait and Landscape. Portrait is a vertical
orientation. Landscape is a horizontal orientat ion.
This is portrait
Th1s Is landscape onontat1on
orientation
Paper Size
To change the pa pe r s ize, do the fo llow ing:
Open the desired web page in Print Preview.
Select the Page Setup button
Alternatively, from the Print menu on the
Command Bar, select Page Setup.
The Page Setup window opens.
In the Paper Options section, click the Page Size box to display
the drop-down list.
Select the desired Paper size from the list.
Click OK.
1 9 4. Additional Options
Aller the page orientation, margin!> and paper si/c arc specified the page can be printed. This can
be done from the Print Preview window by click ing the Print button on the toolbar. This di splays
the Print window, the main points of which arc descri bed below.
Select a printer
..
Specify
number of
COPIOS
range
Ere•-•
--~--~12
.,.q.--..
I
.,.q.
Options Tab
Some web pages usc frames, which arc multiple sections each having its own scroll bar and
which can be scrolled independently. In effect, they arc separate small web pages all displayed on
the same screen.
If frames have been used, the Print Frames option will be available in the Print window under
the Options tab.
Each frame can be printed on a separate sheet.
The selected frame can be printed.
• The page can be printed as it appears on screen.
Visit www.becpublishing.com for an example of the usc of frames. Click the blue Online
Practice button and enter the uscrnamc blackrock and password practice in the login box.
~~~'-d~on
C ~the ooiocted ,..,.
() "'-' ~
Electronic Communication
The number of c-mails now sent every day is hard to estimate but at the time of writing in 20 I0,
there cou ld be as many as 62 billion .
E-mail messages can be prepared in advance before you go onl ine or connect via your ISP. This
saves on telephone costs when using a dial-up connection. When you arc preparing mail without
being connected, you arc working ofnine. When you arc connected, you arc online.
A different way to usc e-mail is by using webmail. This provides huge flexibility, because all e-
mail is stored on a remote computer belonging to the wcbmai l provider. All that is needed to usc
it is a web browser, meaning that these c-mai ls can be read and sent from any location that has a
browser and any sort of internet connection a hotel departures lounge, for example, or a portable
device such as an iPhonc. There arc many wcbmai l providers offering free accounts examples
include www.googlemail.com and www.fastmail.fm. You should note, though, that mail scrv1cc
providers normally have limitations on the size and number of c-mails you can store.
Traditionally, software applications called e-mail clients have been used to receive, store, read,
send and organise cmai ls. Some examples arc Windows Live Mail, Microsoft Outlook and
Thunderbird.
In this example, Ethna Boland has an e-mail address in Ireland wi th Blackrock Education Centre.
She has chosen ethnab as her username. ll er address would be read aloud as 'ethna bat
blackrockec dot ie', but written as shown below.
Each e-mai l address must be unique. T he part after the (?t) symbol is usually the same for a
particular ISP or company, so the person's actual name before the~~ symbol cannot be
duplica ted. People often usc a variation of their actual name to distinguish them from others wi th
simi lar names. ~or example, if Ethna Boland wanted to have the name eboland, she may discover
th at thi s particu lar name has already been tak en. She would then have to choose another name.
Some mobile devices, such as the Blackberry and the iPhone, can send and receive
e-mails in the true sense - this rs not the same as SMS.
The free Skypc applicati on is popular among home users. Usi ng a headset with a microphone it
enables:
Free voice and video calls to other Skype
users worldwide.
f J M.t'PI' C•MC
• Calls from Skype to normal telephones at • .,., ......... "'""'"" *'.,.,
much cheaper rates than those offered by
telephone companies.
...... ' II .
~·~-
o ...... ~,....... li...-..:~~ ... (Ddf
Other types o f virtual communities include in ternet forums , where users can ask questions and
receive answers or discuss a par1i cular subject. C hat rooms arc a virtual community where users
can send and receive messages, and participate in discussions and pri vate conversations in real
time. Internet forums and chat rooms arc often contro lled by moderators who ensure that no users
violate the ru les of the community or send abusi ve or inappropriate messages.
Online computer ga mes o ften crea te virtual communities where the members play games aga inst
each other. T hese types of virtual communities can vary in si/C from a small number of players to
a global game involv ing thousands of players scattered across hundreds of countries. On I inc
computer games arc o ften character-based, role-playing games, but also include games such as
chess and tennis as well as even cas ino games w here users ca n register their credit card detai ls
and gamble online.
. • Appear offline
• Sign out
M ost e-mail client so ftware applications have a bui lt-in facility fo r filtering out junk mai l. The
software w ill guess whether or not a message is junk based on the conten ts of the subject I inc and
other indicators. It w ill then be moved to a junk mail fo lder if necessary. Periodica ll y, users check
the junk mail folder and can either confirm messages as being junk mail or legitimate. In this way,
the e-mail client can learn over time to identify unwanted mail. In business and educati ona l
networks, thi s e-mail filtering generally takes place at the point o f entry and the indiv idual users
may sec little or no j unk mail at all.
Unsolicited e-mail is a major problem it has been estimated at times that up to 75 per cen t of all
e-mails during a given period arc spam. Never rep ly to unsolicited e-mai l messages, even those
that claim to o ffer a method of unsubscribing. All this will do i s indicate to the sender that th ey
have hit a ' live' e-mail address. Distribute personal and business e-mail addresses extremely
carefully. When using online forms supply a fake e-ma il address w here poss ible to red uce the risk
of the address being harvested for usc by spammcrs.
2.2.2. Phishing (7 5
Phishing is in essence impersonation. A user may receive cmai ls supposedly from their bank or
maj or online entities such as Pay Pal or eBay. T he e-mail w ill detail some reason or other that
req uires the user to re-enter th eir usernamc and password, and a link to the bank website will be
provided. Jl owcver, the link wi ll actually go to a different website that has been cloned to look
like the real thing. In thi s way, any uscrnamcs and passwords entered arc stored away and used
lor criminal purposes later. Some examples o fphishing attempts purporting to be c-mai ls from
eBay arc displayed at: http://pagcs.cbay.com/ cduca ti on/ spooftutorial/.
Most modern e-mail clients and web browsers can spot attempted phishing attempts and alert the
user, however, these arc not foolproo f and so it fall s on the user to employ caution. Some on line
banks, for example, w ill ask for a piece of personal information that a third party could not know,
and include this in their c-mails.
No legitimate online entity such as a bank w ill ever ask for persona l detai ls in an e-mail.
The fo llowing images illustrate a phishing scam that resembles th e Pay pal login wcbpagc. Paypa l
is an internet-based financial service that enables registered users to make secure transactions
online. The phishing scam worked by sending c-mails worded to lure recipients into believing the
email was from Paypal. The e-mail also stated that the recipient should go to th e Pay pal site to
update their personal detail s. The e-mail contains a link that appeared legitimate.
I !owcvcr, the actual link differed from th e displayed link and, once cl icked, took recipien ts to a
website des igned to resemble the legitimate Pay Pal login page.
No lock
Different
symbol
link "• · C • ·
0
~ • 0 ,.,. • U· ."' i
ltll(lll~ I Lolllo 1 -
Member Log ln
..
c.,~ ,~ote 1"'
:JOf.lol .,. '"~ . . .,. ,...... ~
lr (I!Jili!JIQ~'~IIIIIW
T here arc two indi cati ons that a link or website is a phishing scam. T he first th ing to look for is
the link. The displayed link should be the same as th e actual link. In the example, th e displayed
link is as follows: https://www.paypal.com/us/cgi-bin/wcbscr? _ cmd=_ login- run.
However, the actual link o f the website is as follows:
hII p:/1218.246.203/icons/.cgi-bin/paypa1/cgi-bin/wcbscrcmd_login.1>h p.
Clicking the lock symbol will display the website's certilicate which is designed to authenttcate
the website's legitimacy. The certificate will display the tssu1ng authority, usually VeriSign, as
well as the website the ccrti ficate 1s issued to.
The m<tlicious software will sometimes come in the form of an cxcculablc atcachmcnl, in other
words a program that can be saved or run directly fi·omthe e-mail. It may appear to be a game, or
a joke thus leading the recipient to believe it is harmless but it will in fact introduce m<tlware into
the system when executed. Other malware has spread via e-mail by taking advantages of security
naws or bugs 111 the operating system, for example by including a graphic file that when opened
can create a hidden method of entry for an attacker.
Fortunately, the threat of mal ware spreading' ta e-mai l under Ubuntu is minimal compared to
other operating systems because of its secure design . Users should sti ll be careful, however, never
to open unexpected executable attachments, even if they arc from a known sender.
----
M1crosoft OffiCe Tools
When Outlook 2010 opens, it will look similar to the following illustration .
v Close X
D~•on,.n•• n RflllfncJitJVf'tnMw
button
. . .chftq,.ftf.
::Jro.oo .., •
....
,....... ()p,,.,.,.,..Wtnd..
§~uMital
Ptllptlll ,.I'M Wind.,..
'"""
p 4 J•nU-J•J1012 •
Mo fYWt 1l\ rr St Su
,, , ,.,. I
tlOIIUUUU
"17[11 " "' Zl l1
na.nMnaa
110 Jl
Status .............
ru1'.4tl ~l . l l:v,
bar
' '"•"'"'
Clicking the e-mail once will display the message in the Reading Pane (which is can be
displayed at the bottom or the right of the Outlook window).
RtCIP•trtt Namt
..
Rtctl'wtd . Silt
Januory lOll
Mo Tu Wt fh rr Sa Su
!!]
Drag and drop the required ~ FieldChocKof
Fr-dr....odfleldo
r~
column name to its position
in the Outlook window.
'" U/OI/.hli11~;0'J nn
IMAPS14u .
.Mossaor
Red arrows will indicate lhv 17A!l/20111617 HI Orogna!Or ~rROCIUHW<I
where the column will lhu 11/02/2011 lU7 JKI R•ad
lle<fflod R!!!tten~ """"'
appear in the window.
RSSF..-d
..:. S<niobVI!y
Sen! •
StarlO.tr
-
.~
Tosl: S<b)O<I
To -
.. I .. ] "*"'
To remove a heading either drag the column header out of the Outlook w111dow or right-
click on the header and select Remove this column from the pop-up list.
The results of adding th e Recipient Name column as the seventh column arc shown below.
MIUOSOft 0utto011 Mtaosoft Outtool ltd Mraw,gr louw lomlon fnU ~I f20U l'l.OS 71191
...1
0.1< 06dft
GNillta"' lmport your conltch and old rJN•I lofnA lo•nlon Thu 17A>2!20lll617 HI
t:l en....r ..... Customf.l~ Cnwt With lotofS Md thftfMs Lorn.alotnton JKB
I '"" 11102/2011 16.17
l
MtQHUzt lhf RIDDen
4 Fa'IOrttU
~;uuomtzt Quick Accus Toolbar-
)jh ow Qu1c~ Autu Toolbar Btlow tht R1bbon
C) tnbor
p
I
UrotadMo1/ Cu1tom11t lht Bibbon ...
~ Stnl Rtml [ o/ MIQimllt tht Ribbon
----
In common w ith most Windows applications, commands can also be added to and removed from
the ribbon.
. ...
command to the ribbon.
Select a command from
,, ,..,.c..,.•.,
,.._,,,. flt-o•
IIi ~
-·-
::;--·
( twlf•f ( OIWf~
~ =····. . --'""''
"'
the Customize the ribbon ....."..
.....
~ ~'
\MofAI
list on the right of the Outlook
Options wtndow to remove • w.t• Oft'lr>•
Commands can be added to the Quick Access Toolbar by selecting the arrow at the end
of the toolbar and selecting Customize Quick Access Toolbar 1· J., · Click More
Commands to see the Customize window
Gma1ITtam Import your con tacts and old email Wed 18/01/2012 16:17 HB
Gm;aoi Te;am Custom•ze Gm ail w1th colors ;and themes Wed 18/01/2012 16:17 3 KB
To mark all messages in the lnbox as read, right-click the particular folder in the folder
list and select Mark All As Read.
To send an e-mai l w ith a high priori ty, do the fo ll owing: ,.. Follow Up ..
Create a new e-mail in Outlook (see Section 2.6. 1). ! Htgh Jmportance
Before sending, click the High Importance button
in the Tags group (Message tab). .. Low Importance
Tag •
An indication of the higher priority will appear at the top of the address section of the e-mail.
When the message appears in the recipient's lnbox, there is an indicator (the exclamation
mark in the illustration) that it is high priority.
Different e-mail clients have different ways of indicating the importance of the message.
r~
~t ~
From: Lorna Bomton (litem, 1 unread)
Jo Lorna Bointon High Priority
I
To send an e-mai l w ith a low pri ority , do the fo llowing:
'f" Follow Up • ]
• Create a new e-mail in Outlook. ! High Importance
• Before sending, click the Low Importance button.
J Low Importance
x
Ho me
• Open Outlook 2010.
,t ~ ~ fF~ ,.Ignore
Click New E-mail from the Home tab.
LJ-1 'i{Zill " Clu n Up •
Ntw New Delete
E mall ltem1 . , ~ JuM •
New Otitl t
Additional recipients can be entered in the To, Cc and Bee fields (to insert the Bee field; select
the Bee command from the Options tab and Show Fields group). Addresses should be
separated by semi-colons.
Subject field
/I
Click here to
start writing
e-mail
1
I,
ll
To send the message, do the following:
• Click Send on the New Message window toolbar.
The subject box will have the text Re: and the original subject line.
Subject
Wayne
Enter the text of the reply in the body section. Whether or not it should be entered above or
below the quoted text is the subject of much debate, but for most users entering it above the
quoted text is the standard , especially for long messages.
Click Send .
..,_. f'l
Close Or!QinJI mtuagc wtndow wnen replying or forwarding
Prtft<t commenh wtth rn•llolnton
[t=j
8
When (otw.,dlng a mtuagr. lndudt ortgln.l mcuagt ltd
[j
J
fJtfJ ft tach ltnt In • pbtn ttr1 rr .. !h. ..,
MObllt
Use the Outlook Options window to control quoting the original message when
forwarding an e-mail.
The body text of the original message is quoted in the message to be forwarded.
Enter a recipient, or recipients, e-mail address in the To: box.
Click Send.
[!;] [~I
d G;] [
~
SubJtrt
-----Original Message - -- --
From: Pete Steele [mailto:[email protected]]
Sent: 18 January 2912 14 :53
To: becdemo@swift -mail. com
Subject: Dave's Party
Morning!
Incorrectly spelled words in the message body text or subject lines will be underlined in red.
Right-clicking the underlined word will display
a pop-up menu with suggestions as to the correct spelling.
Selecting an item from this menu will replace the incorrect
word.
HIIO
H~ot
Clicking the Spelling and AutoCorrection button , opens the Editor Options window.
r
~ Specify how Outlook cor rrcts and formats the conttnts of your t ma•ls
Clicking the AutoCorrect Options button in the Editor Options window opens the
AutoCorrect window in which d1fferent options can be selected.
~ c.-.ectrwoa...,~
c...............,..,........
~
J
~ c.p.............. .,_ll*
Individual a-mails can be spell checked at ~ c:oo....... _.,do,.
1 eor.... -._., ,~LOO<I.ot
any time by clicking the Spelling button in
the Proofing group of the Review tab. J PIIMto l'>t • yoy " -
1\ooH<t: llo\tnl Ploon 10>1 f(>ONI!Od "'''
I T
I..) ..
Sptlhno &
Grammar
c.nctl 1
2.7. Attachments
Inserting an Attachment
To attach the fi le to an e-mai l, do the following :
Create a new e-mail message in Outlook 2010.
Enter a recipient e-mail address in the To: field, and a subject in the
Subject field. Attach Attach Sl9naturt
flit lttm • •
Enter some body text. Jnd udt
Click the Attach File button in the Include group of the Message tab.
The Insert File window opens.
Locate the file to attach.
Click Insert.
,_ Pocturts
• Vodto•
~ Homrgroup
IIi Computot
C, COMPAQ (C l
u FACTORY IMAGI • ,
~-------------------
Folr nome: Ployt r •ul>«nptoon<
Tool• •
HI
Attached art the pllyer subscnpuons.
Removing an Attachment
To remove an attachment, do the fol lowing:
Right-click the attachment in the
attachment list.
• Select Remove from the menu.
Atttch tct
Ht
Attach~d ar~ th~ play~r subscnpuons.
CUt
Reaurds
Copy
Btll
Paperclip icon
;)Jh•1RIN14
•u~·
''"' ...,,.....,..~....__.-,.
Attachment •• -411--•·..,
Cc
~'"' , ...ao.t..,Mil
I ~Pf•rfltubUttphOnlllhl • • "'
••••.,•cfut rlt.c:N\IInlvnuon~t
••
Right-click the attachment.
• Select Save As from the menu that opens.
frnttw
The Save Attachment window opens.
Choose a location to save the file and give the fi le a meaningful name. Quo< I 'I..
Click Save. 53~NAt
When an attachment has been saved, it can be opened in the same ~ wt AU Alta<hfnf'Of ~
.. "'
!l"J Stlf(t"ll
When an attachment is received, it can also be opened straight from the e-mail message.
Right-click the attachment and choose Open from the pop-up list.
The Opening Mail Attachment window opens giving options to open the file or save it.
Click Open .
The file opens in the appropriate application (e.g. Excel or Word).
.......
........ _
mark and deactivates the ,,.,., ,,..,.
option.
~~LA
Open m New ~mdow
~~
ta)c topy folder
~Sent Items
@ Delet~ Item~ [2) •
Unauthorised Photocopying is Unlawful 61
Module 7 ~ Web Browsing and Communication Training for ICOL
NtwFolder•..
Bename Folder
-'opy Folder
f1 Jun~
fia1 Outll Mo~e Foldtr
RSS l 4it Qeleh Folder
Show In fa~orrtes
fropertles ...
,Q) AJI Mod lim>> Ptlt Stult Da•• 1 Party Wed 18(1(2012 14 Sl
~~--~
~~- ••
wt
~.----~
s~
~ ~ ~ ,.-~ ~~~~----------~~
• Mtkt Patton M onthlt Rtport
~--I
You can also move a message to folders in other ways from the Outlook window.
2. Using right-click
Right-click the message to be moved and select Move and then select Other Folder
to move the message or Copy to folder to copy the message from the drop-down list.
Choose the folder to which the message should be moved/copied from the Move
Items window that opens.
If a message has been opened it can be moved to a folder by clicking the Move button
in the Move group of the Message tab. The folder to which the message is to be
moved can then be selected from the pop-up menu that opens .
....
The e-mail will be sent to the Deleted Items folder in the folder list at the left of the Outlook
window.
When the Deleted Items fo lder has been emptied, thee-mails arc deleted permanently .
..... - ,.
Three contacts are
displayed as
·;
Ql ......
X 'rl • a.
,.... ..... -.. ~
Mlrt O.Vttte•
Bus1ness cards
• Mf(..U.Il
£~'~"" tftl.cft
11C~tt ....
Ml~·~
Card v1ew
..........f . . . . . .
-
,;IJ .....
--
2.9.2. Deleting a Contact · -.1.)
To delete n contact, do the following:
Open the main Contact s window.
Select the contact to be deleted .
Click the Delete button on the Home ribbon.
group
Contact
The contact group name will be displayed in the To: field. Enter a subject and message text
and click Send . The message will be sent to each of the contacts listed in the Contacts List.
.. " ,~
1
~
~nd
~ ....
11<<...
',,.,
fr c·A·Sic!•
(H"'·.Jile•t
a.
Add
·f
R,.
a!. ~ Q:.1
~ontut (iroup
-&
[mall MtthnQ
~
CJ El 1:3
1:) 0
TaQI
Instant Search
There is an ' Instant search' fi eld above the message section of the Outlook w indow.
Th is wil l search the subject lines of the messages in the currentl y selected folder for the tex t entered,
returning a list of matching messages which can be opened or replied to as normal. To clear the
search and return to the normal message list, click the X button to the ri ght o f the search fi eld.
l oo tbal~ I_~ I
! I D_l~ 118 from • Sub)tct _I RtctiVtd : Sltt
~· --··-----~·-~-··~--·~----------~-------------~-----
Advanced Search
M ore thorough searching is ava ilable w hereby other parts o f the Outlook folders can be searched.
<uurnt "roldtrj
AI! Mao!
All Subfoldm
From Sub)tct Ha~ Catroomtd
io., Stnt To • ! lmport.nt $J
Rtcrnt ~Ur<h Ctost
+ Mort •
f!tml ~I'll Outlook lttmo
_ Scopt
1
Choose what to search
Att1chmtnt1
v
Refine the search
Unrnd
7
Surchtl • Toull • St1r<h
Clolt
Selecting Advanced Find from the earch Tools menu wi ll open the Advanced Find window:
Choose an
Outlook item '"
wh1ch to
0
(3 l Click Browse ... to
search 9 In: lnbo• change the folder
to be searched
Look for: This field indicates the part of Outlook to be searched (contacts, messages, etc.).
In (to the right of Look for): Using this field, the
folder to be searched can be identified . Clicking
Browse ... opens the Select Folder window. • 0 p ~ooch Foldtn
Select the folder by placing a tick next to its name. [J.aj Sug!jtStod Contocu
'' ~ Tosl•
J loonob360gmoolcom
..., l ........ (1)
...J (Gm•ol]
._, tJ Junk E· mo•l
0 PtO>ONI
0 R«coptJ
OOJ S..•ch Fold.,,
0 Torvtl
(J Wotk
From ... /Sent.. .: These options open the Contacts window so that the names of senders
and recipients can be entered to narrow the search and make it more focused.
,
-
Time: This option allows users to enter details T._ none ....
J
about the time the message being searched for none
was sent, created, received, etc. Click the arrow to ...,, ~
cU!
the right of the Time: box to show the options. u pns
Click to select an option. aut..d
modtMd
If there are results from the search, the bottom of the window will expand to list them.
Messages in this list can be opened, replied to, etc. in the normal way.
The column being used to sort the messages is indicated by an arrow in the column
header.
To change the sort order (e.g. from ascending order to descending order), click the
arrow.
Messages can be sorted on any column displayed in the message list in the same way .
To sort by subject, click the title of the Subject column.
• To sort by the received date, click the title of the Date column.
• To sort by message size, click the title of the Size column.
'S. ..
~ C::rOtlp&lrll~
r• ~~tw scu•no'
Print
Print button. Only
click this button ----1~:..:..,.:....;:.;;,_--- ~pcot'lfy hOW)'O\I w•nt lh4 l(m"!IO bt pt•nted tnd
lht, tholk'f""
once all settings ""• '""'
have been chosen Optn
Printer to be
....
Print...
----used
Print Options -
button
-----+-:;Ht-;lp:::::--~---=p,,,..
1.l
,,.,
o.uon•
()phon•
Sottlnll'
Style to be
0
used. Memo
style Is the usual
} style for email
messages
,...,._._.
-
----r~-,._
=- ... ...,..........._ """"'_......,......
Print preview
-.--..
.........
o.-.... ... \'.............
\ •-»ll.tlt'l _ . . , . . . NM.._ ~ •• ..-..11"'11
Printer to be '""'
used
-·
-·
s....
TVI)e ~
""""""'
c.-on ftl600 lfftl!l
Prr!ttf~ ~
Style to be used.
-·~-~ -]
{I ~
Table5i'l4o
Memo style is
the usual style for
email messages
_s.,.. -·'-''
Cillo,._
Number of copies and
number of pages
,.,~
Q;JG'PJQ!J Collate copies
Pages to be
printed ·-"'
Prnlalt.td~flrt At~tl,.pmttot.
'dolaAt "''""....,
Option to print
attachments
. . ' '.,
'
" '
·t:. \ ,•::,.. ' "'··· :·' . ..... ,..... , ...,. • ,. ·, ·.v·',) .·,, •.. :~· :: • .....!;!·. M ..... ,•• • ·, •• '"if;'".. ·.! .•:.:.,,../ .• · .,...; ..; "-,. ·~~ .. ~ ·.;,··:.~ ., .
Practrce fri es needed fo r the lessons rn the d rfferent modules are ava rl ba le fo r clownloadrng from
www aspbooks corn/download/icdl) 2010 eng zrp
u 9J-W Li .P':fL'U-1
nln ll ii..J.J onil b .JI
1
• '
... J->U J
11 1111111111111 111111111
!J f!HiltiO 105/01 www.t~•.p ( orn lh www ..t·~pt wok~.corn