Page 1 :
INTERNET —, ONLINE SURFING, , fr refer ta sheep oni 79% A, , Youngoters 5 “i, , eyppero inh inadba, , ', , ', Internet users and online ob :, ', , are in the age group of J5 te W years, , oo igi, , «, @* INTRODUCTION, ‘, , Hey friends, you must have used, Internet in one of other ways, no ?, For searching some information, of, for writing an email or checking your, school’s website or for playing some, game, no ? In this chapter. we shall, talk about how you can use Internet, in a better way and safe way.
Page 2 :
COMPU *, UTER STUDIES — Class 6 |, e AL I, , VUE RANT Usacit, *, , We using Interne, femet, you should deve, belavions, , lop safe surfing habits and a right online, , |, Sate Sorting Habits, , WY Do not downtoad fee media, , as it may be infected with virus or malware etc,, (HY Do not give, , AQY Petsonal information online without asking your parents,, GH) Change passwords regularly,, , QYY Do not give any Payment related information, ever. Let your parents handle that., Wy not to use public networks and computers., Netiquettes, , ), , White surting net, you should exhibit certain online behaviour called etiquettes, You, should follow these netiquettes :, , ZT) Never abuse anyone online., , o>), ws, , Take a STAND against cyberbullying by bringing it in the notice of responsible, elders or teachers., , SF) Don't spam. That is, don’t repeatedly send or post unwanted mails or messages., , 4) Write in clear language. Do not use slang., —S ) Remember that whatever you post online is public. Anyone can read it., , 6 ) Never steal anyone else's work and if you need to use it then ask permission, for it and give credit to the creator., , Potential Threats, , You should be aware of some potential threats of working online., Theft and Fraud, , Digital criminals may get hold of your personal information such as login_id and, , password and start using your account. Or they may send mails/messages on your, behalf to others. Thus,, , * never post/give personal information online., * keep changing your passwords regularly.
Page 3 : INTERNET ONLINE SURFING, , assment, , ht harass, stalk or bully you online. Do not panic, but do the following, , , , respond to abusive messages, , a copy of abusive message and bring it to notice of your parents, elders, , , , and teachers., jij) Keep strength, do not be perturbed., , +) But never be provoked with such message. Keep yourself busy in productive, (iv) Bu ¢, , activities and stay calm., , , , Ser,, 2 E-Mail My, 3 USING E-MAIL, 1 FE Mail stands for Electronic, The most widely used tool on the Internet is elec- Mail. It is the most widely, 3 . «1 es « used tool Lo send messages, tronic mail, or e-mail. E-mail is used to send written ‘ :, ~ ges ee electronically (/.e., through., messages between individuals or groups of individuals, commputersiion’a network, often geographically separated by large distances. N, A. E-mail Account and Address, Although sending and receiving mail is extremel Se eR,, . : e y Advantages of, simple. However, there are a few parameters you must E-mail, , be clear about before you start sending and receiving, mails. One such parameter is E-mail address. E-mail, addresses commonly take this form :, username@hostname, Here are a number of typical e-mail addresses (well,, almost typical) :,
[email protected],
[email protected],,
[email protected],
[email protected],, Wada. Sachin@InfoMeet . com, J) Username. On the left side of @ separator is the !, , user name. A Limitations of, , fe. A user name can not have blanks. E-mail, , &) rey name for the host server. The, " sd ‘s the right of @ identifies the server, is som or network that services your e-mail. It, , etimes also called the e-mail server., , F
Page 5 :
INTERNET — ONLINE SURFING, , This is the address of the sender of the e-mail. Apart from the e-mail address, tne |, , FROM, , , , from field may contain the name of the sender also. |, sas |, ‘ This is the email address or addresses to which the mail is sent. \, CC stands for Carbon Copy. Here you can specify the email address/addresses of those to \, . whom you want to send a copy of the mail. The CC recipient's name is visible to all, recipients., ae BCC is for Blind Carbon Copy. This is also a tist of email addresses. These people will |, also receive a copy of the message. But a BCC recipient’s name is not visible to the |, other recipients. The BCC recipients can see the TO and CC addresses. |, a - 7 - oO 4, suBJECT A short title for the mail. It ideally should speak about contents of the message. |, —— ——, BODY The message. |, ceases — Se is weeilles! ~~ ae — |, , ATTACHMENTS | You can attach one or more pictures and documents or any other with your e-mail. |, Some computers specify a maximum size for the mails they can handle and so you |, , have to keep that in mind if you intend to send very big attachments. |, | aT - - - RE ST, DATE This is the date and time on which the message was sent from the sender's computer. \, {, , S., 3, , , , Sending Mail, , To send mail(s) to your friends and relatives, you need to first log in to your e-mail, account and then follow these steps :, , (J) After logging in to your e-mail accounts, you need to click at Compose (or, New Mail or Compose Mail in some accounts) button to compose a new mail, message to be sent., , @) In the Compose Message window, you'll see various fi i, , s fields,, used for the following things : wich ate to be, , To: Mail-id of recipient, cc:, , Mail-ids of recipients of Carbon Copy of this mail-message., Bee :, , Mail-ids of recipients of Blind Carbon Copy., , Subject : Title of the mail message., , , , ty]