Ahad, 12 Ogos 2018

M-1 Non delivery of message

M-1

1) Non delivery of message




video of non delivery of message from the email and the solution also been shown in the above video. 

2) Error message



Error message from the internet when we type incorrect address it will show error message, above video has been shown.

3) Too many hits on search engine



too many hits on search engine when we choose a particular company for example we search shoe you can able to see the results when you add more the results will be reducing.above video has shown.

4) Blocking email




Blocking email if you are receiving unnecessary email you can able to block that email it has been shown in the above video. 












Sabtu, 11 Ogos 2018

P-3, Email

P-3 Email

1) charity event sponsorship 

screenshot of the reply from Miss Nadirah

4) Introducing new product in the market




screenshot-2






Isnin, 16 Julai 2018

P-4

1) A password is a string of characters used to verify the identity of a user during the authentication process. Passwords are ordinarily utilized as a part of conjuncture with a username; they are intended to be known just to the client and enable that client to access a gadget, application or site.  Passwords can vary in length and can contain letters, numbers and special characters. Different terms that can be utilized conversely are passphrase for when the secret word utilizes in excess of single word, and pass-code and passkey for when the watchword utilizes just numbers rather than a blend of characters, such as a personal identification number.

Setting up a password

1) Choose a password that no one will easily guess or hack. 

Don't use a word or phrase of special importance to you—like a birthday or family member. That's the kind of information that can be discovered by someone doing a little digging.

2) Do not share passwords.
This is an open invitation to your online accounts, and it's often exploited to accomplish online identity theft.

3) Make sure your password is longIt should be at least eight-to-10 characters long, and longer passwords are even more secure. A few locales or applications may confine the watchword length, be that as it may.


Fig-1


4) Use at least one capital letter and one lowercase letter in your password. 
The capital and lowercase letters should not be grouped together blending them up makes the secret key harder to foresee. This sort of methodology may prompt "JeCaMiJe_" in the main case or "HouseOnSpooner#1500" in the second case.











Fig-2



5) Use spaces in your password

Many password systems don't allow actual spaces, in any case, it can be helpful to embed one into the center of a secret key with frameworks that do. Then again, an underscore "_" or two can serve a comparative capacity.

6) Generate similar but distinct passwords for separate accounts.













Fig-3

You can use similar base words to help you remember your passwords easily without making them too easy to crack. So "JeCaMiJe_" may be altered as "my children JeCaMiJe," "HouseOnSpooner#1500" may progress toward becoming "1500*my first House on Snooper."


7) Make sure your password is written down and kept in a safe place.
 Choose a location away from your computer (and from prying eyes), but make sure you can easily access it. if you forget your password, you can retrieve it without much trouble.













Fig-4


When recording your watchword, consider coding it with a counterbalance example to make your secret key more troublesome for others to unravel. Accordingly ri7%Gi6_ll may be composed as 2tk9&Ik8_nn. This would mean that each subsequent coded character is two alphabetical letters or numbers greater than the actual password character.


3) data backup is the result of copying or archiving files and folders for the purpose of being able to restore them in case of data loss. Data loss can be caused by many things ranging from computer viruses to hardware failures to file corruption to fire, flood, or theft etc.



1) Connect an external hard drive to your Windows computer

• Your external hard drive must be formatted for use with a PC for this to work
•You can also use a high-capacity flash drive for this step.


2) Open Start 

Image titled Windowsstart.png

• Click the Windows logo in the bottom-left corner of the screen.


3) Open Settings 

Image titled Windowssettings.png

• Click the gear-shaped icon in the lower-left side of the Start.


4) Click 

Image titled Windows10 Update.png

 • Update & Security. You'll find this option in the Settings window.








Fig-1



5) Click the Backup tab.


• It's in the upper-left side of the Update & Security page.











Fig-2


6) Click Add a drive.

• This is at the top of the page. A drop-down menu will appear.


7) Select your external drive.

• Click your external drive's name in the drop-down menu. This will set it as your PC's backup drive.

8) Click More options. 

• It's a link below the "On" switch near the top of the page.











Fig-3


9) lick Back up now. 

• This option is in the upper-left side of the page. Doing as such will provoke Windows to gather the backup and start stacking it onto your external drive.

• You may need to click Back up now several times previously your drive will begin backing up.


10) Wait for your backup to complete. 

• You'll see a "Backup completed" notification in the bottom-right corner of your screen once the backup finishes,and soon thereafter you can launch and evacuate the outer hard drive.








Fig-4



2)  Downloading materials from email

E-mail security is about a lot more than just using a good password on your POP or IMAP server. Perhaps the most important part of e-mail security is ensuring you don't shoot yourself in the foot. There's a lot of information out there about securing your e-mail. Much of it is advanced and doesn't apply to the typical end user. Configuring spam filters such as spam assassin, setting up encrypted authentication on mail servers, and e-mail gateway virus scanner management are not basic end-user tasks.

 If you have a mail client such as Microsoft Outlook or Mozilla Thunderbird that can render HTML e-mails, you should configure it to render only simplified HTML rather than rich HTML - or "Original HTML," as some clients label the option. Even better is to configure it to render only plain text. When rendering HTML, you run the risk of identifying yourself as a valid recipient of spam or getting successfully phished by some malicious security cracker or identity thief

You do not want some malicious security cracker listening in on your authentication session with the mail server. Somebody who does this would then be able to send messages as you, get your email, and by and large reason a wide range of issues for you (including spammers). Check with your ISP's approaches to decide if authentication is scrambled and even how it is encrypted.

Know about both your virtual and physical surroundings when conveying by means of email. Be cautious. Trust nobody that you don't completely need to trust, and perceive the perils and potential outcomes of that trust. Even if the e-mail account itself is not compromised, your computer may be if you do not take reasonable care with how you deal with e-mails - and that, in turn, can lead to affecting both you and others adversely as well.



3)Why we need to backup data?


Hardware Failure 
Inevitably, your hard drive will die, and even an external hard drive isn’t safe from viruses or external destruction like water or drop damage. the average lifespan of a decent bad hard drive is 5-6 years, which is scarcely enough time to fill it with information.






Fig-1



Virus/Hackers

Software issues are another reason why computer back up is necessary. virus can be downloaded unintentionally without anyone else's input, relatives or perniciously sent to users in your office. When they grab hold, it can be hard to have them evacuated without harming your current databases.












Fig-2


Hackers also implant viruses in order to gather important information, usually credit card numbers, passwords, or other classified information that can be used against you or your business.While there are moves you can make if your PC is hacked, going down your PC will secure your private data and furthermore give you an additional level of barrier against programmers hoping to take your data or personality.

Theft

• While hackers steal digital information, thieves will have no problem stealing actual computers, smart phones, hard drives, or even servers from homes, businesses, or storage facilities.










Fig-3


• Indeed, even with encryption codes and passwords, the most skilled thieves will just dismantle your PC or telephone and offer the parts. Once stolen, it is unlikely you’ll ever see it again. If you back up your data to an external space such as the Cloud, despite everything you'll have the capacity to get to it regardless of whether your PC is stolen, and you'll have the capacity to re-download the data to your new programming and hard drives.











Sabtu, 2 Jun 2018

By using the business of your choice, describe the use of internet for different types of business activities.


Content-P3

Explain the uses of internet for business activities.
Information can be easily transmitted to any destination in matter of seconds, so organizations use internet for fast and smooth running.

24/7 Business Services

Fig-1











Internet is running all the time. People are using the internet around the world. Now to take advantage of internet you can create, market product and services on the internet 24 hours. An E- commerce website can sell 24 hours. This is not possible in offline business. In offline business customers come when you open the shutter of your shop. At today, you can get those order, you could business product, accept installment what's more administrations anytime, also anyplace in the universe.

Promotion

Fig-2









Promotion, as a general term, includes all the ways available to make a product and/or service known to and available to purchase by customers. Word of mouth is considered by many to be the most effective way to promote a business, and best of all it is free. Studies have shown that over 90 percent of consumers use recommendations from friends or family when choosing products or services. 

Marketing automation platforms

Fig-3












The utilization of advertising mechanization platforms for business may be an additional focal point that is presently sought after. Automation mean internet application, software is used to manage, run and grow the business. You can automate social media marketing, content marketing and email marketing, sales, customer management, employee management and business inventory management works.

Employee training and development

Employee training and development is very important to grow and run a business successfully. On the internet, there are various methods that your staff can access and they can improve their skill in their own pace. Abilities and ability improvement on the internet is altogether not difficult. On online courses, YouTube, blog need aid different wellsprings to workers will enhance employment aptitudes.


By using contrasting businesses, describe examples of how the internet is used.

P2-Content 

Comparison between John Lewis & Marks & Spencer

The Internet is a worldwide network of computers that can send data over long distances in short periods of time. That objective for business is on aggravating profits, which obliges effectiveness what's more benefit. Companies can use the internet to boost efficiency in many ways. Some companies have business models that are completely reliant upon the Internet.

Marks & Spencer



Marks & Spencer was established in 125 years ago. Firstly the new stores were called ' Penny Bazaars and the idea of it were in order to inspire customers to buy products without any hesitation. By 1900, Makes & Spencer had expanded to include 36 penny Bazaars and 12 High Street shops. And there are over 76,000 people works for Marks & Spencer both in the UK and they also expend their business to overseas with 40 areas outside the U.K.

John Lewis


The first shop of John Lewis was begun at London's Oxford Street in 1864. With the slogan of 'Never Knowingly Undersold', John Lewis attracted lots of customer to come because their impressive brand image, which means the price of their selling products, will always be the lowest around the neighborhood. And this lasts for over 75 years. The co-own business pattern encourage the employees serving customers with high quality goods and services as suppliers.

Uses of internet for the companies


⦿ John Lewis


Communication

Communication is one of the primary uses of the Internet in business. Email permits laborers will convey rapidly for you quit offering on that one another, benefits of the business accomplices furthermore customers. Businesses can also conduct meetings over the internet using video conferencing software, which can potentially save on the cost of business travel.

Advertising


Fig-1









Advertising is another way businesses use the Internet.Internet pages are essentially like billboards that are transmitted right into the homes of consumers. Companies pay websites for ad space where they can attempt to entice consumers to buy their products or visit their website, advantage of web advertising over advertising in media like magazines, television, Facebook, twitter etc. It allows consumers to purchase goods within a minute or two of seeing the advertisement.

Sales

Many companies use the Internet to generate sales. Companies often have online sales systems that customers can use to browse products and place orders by entering credit card information. Online shopping will be helpful for customers, since they can shop at anytime from anywhere, without having to visit a specific retail location. Internet shopping additionally permits clients to analyze costs the middle of distinctive vendors rapidly furthermore effortlessly.

⦿ Marks & Spencer

Communication

Fig-1











Communication is one of the primary uses of the Internet in business. Email permits laborers will convey rapidly for you quit offering on that one another, benefits of the business accomplices furthermore customers. Businesses can also conduct meetings over the Internet using video conferencing software, which can potentially save on the cost of business travel.

Advertising

Advertising is another way businesses use the Internet. Web pages are essentially like billboards that are transmitted right into the homes of consumers. Companies pay websites for ad space where they can attempt to entice consumers to buy their products or visit their website, advantage of web advertising over advertising in media like magazines, television, Facebook, twitter etc. It allows consumers to purchase goods within a minute or two of seeing the advertisement.

Sales

Fig-2









Many companies use the Internet to generate sales. Companies often have online sales systems that customers can use to browse products and place orders by entering credit card information. Online shopping will be helpful for customers, since they can shop at anytime from anywhere, without having to visit a specific retail location. 

Gauge Customer Interest

Business owners use the Internet to monitor customer purchasing trends and interests. To discover what everyday people think about a particular product or service, business owners can visit online social networking sites and message boards. Taking in this input serves benefits of the business managers aggravate their items preferred.

Explain the uses of internet for business activities.

Information can be easily transmitted to any destination in matter of seconds, so organizations use internet for fast and smooth running.

24/7 Business Services

Fig-1









Internet is running all the time people are using the internet around the world. Now to take advantage of internet you can create, market product and services on the internet 24 hours. An E- commerce website can sell 24 hours. This is not possible in offline business. In offline business customers come when you open the shutter of your shop. At today, you can get those order, you could business product, accept installment what's more administrations anytime, also anyplace in the universe.

Promotion

Fig-2







Promotion, as a general term, includes all the ways available to make a product and/or service known to and available to purchase by customers. Word of mouth is considered by many to be the most effective way to promote a business, and best of all it is free. Studies have shown that over 90 percent of consumers use recommendations from friends or family when choosing products or services. 


Marketing automation platforms

Fig-3













The utilization of advertising mechanization platforms for business may be an additional focal point that is presently sought after. Automation mean internet application, software is used to manage, run and grow the business. You can automate social media marketing, content marketing and email marketing, sales, customer management, employee management and business inventory management works.

Employee training and development

Employee training and development is very important to grow and run a business successfully. On the internet, there are various methods that your staff can access and they can improve their skill in their own pace. Abilities and ability improvement on the internet is altogether not difficult. On online courses, YouTube, blog need aid different wellsprings to workers will enhance employment aptitudes.











M-1 Non delivery of message

M-1 1) Non delivery of message video of non delivery of message from the email and the solution also been shown in the above video...