Multimedia - computerized and electronic devices, media, cameras, audio and video recorders, tv installation, DVD, bluetooth. Advices on hardware and software - computer parts, laptop computers, repair and security programs, software installation. Advices on mobile phones - mobile applications, iphone deals, cell phone providers, smartphones.
How to use email netiquette / label
How to use e-mail
how to use the internet without using e-mail -. We use it at work and private contacts Not everyone understands, but how to use it, to respect and not insult our recipients and the more you make a good impression on them .
top of this we have gathered a few basic principles regarding the use of electronic mail, which we then on the effective use of communication tools, and with respect for other people.
The most important may be closed on the following seven principles: in Subject / u - as I write
Who are you writing for that purpose - in fact, use of the seafront and a field copy, blind carbon copy - to cc, bcc - / u Be careful with the seafront message format / u writes u not / u seafront Use abbreviations rarely
/ u seafront write off / in the right way Be careful with u message / u BR b 1 Subject - as I write
/ b Subject
important? because thanks to him, the recipient can quickly figure out what is the message, and therefore can not ignore the case and relevant information. In addition, the a later time post with a good topic to easily find the senders and receivers. Try
topic was brief, but enough is said about the content of messages
b 2 Who you are writing for a purpose -. appropriate use of the field, copy, blind copy - that is, cc, bcc - / b recipients of our messages, we can enter in three different fields. To, CC, BCC
Their purpose is
u field / u - to - in this field, enter the main recipients - recipient - our message box u copy / u - in another way: messages, DW, is called cc - copy - in this field, enter your e-mail people who should know that you sent and to know its contents, not the main recipient May eventually want to join in the discussion of the Blind Carbon Copy u / u - in another way: the invisible copy, BCC, BCC called - for blind carbon copy - in this field, enter the recipients who should receive a copy of the message but whose address should be visible to other recipients / ul
in practice: first use
seafront field / . to think seriously before using fields seafront copy / u, or Bcc u / u, in the first case: is it really that person must receive a copy of each message, whether you want the copies Blank copies of the case - whether the reason for creating a strange atmosphere and hide the fact from others send another message if this person wants to get the news and realizes that there is a hidden list of the most useful application in the field Hidden u? Copy / u it to the message to a large group who do not know each other, people, and if you have already sent such a message, enter all the addresses in the Bcc u / u to respect privacy and not share all of their other e-mail / ul
b 3 Carefully message format / b E
allows us to use different fonts, sizes, images, backgrounds, etc., etc. However, there are strong reasons to try to keep as the simplest form of messaging:
never got to the end to determine how a message will appear in the receiver, depending on the operating system, e-mail program or device, many people read
Especially in the subject line, such as shortcuts Re: - answer -, FWD: - Message sent -, FYI - For your information - a good solution and are often automatically included in the e-mail program.
Do not forget to whom you write, and that not everyone is able to grasp the significance of its shortcuts. Adjust the use of abbreviations recipient of your message and do not go overboard with them, and especially to avoid their use in formal correspondence.
important issue is the business plan. emoticons that represent certain emotions by post. For example:
wink: - dissatisfaction
Emoticons should be used only in informal correspondence. Use smileys can be viewed as a lack of respect, especially in business correspondence. Smilies are suitable for communicating with friends or with people with whom we basically loose - then indeed be beneficial, because it complemented our message about the emotions, which allows a better understanding of our intentions and feelings.
b 6 Written in the right way / b The basic rule: You do not have to answer to all those who sent the message that you write. Think about who is actually supposed to write back, and if others will not only unnecessary bother.
Second, carefully read the message and try to write back to referring to all the questions / requirements set out in the news, even if that statement will refer later, I do not know the addressee, etc. Realize that you have read the message, and do not would feel that something is missed or especially przemilczałeś.
is good practice to quote the post you reply: Quotes should begin with a shot of the author citation and date and time to send your message. Each bid must be marked, usually do e-mail program automatically lines before a. Let us remember that our answers were different from the citations. For example, in the correct form: Your name written
DN. 28th April 2008: / pre
response / pre
another question / pre
second response / pre
Third , to remove the message that is sent in response to all the unnecessary information. This applies to the specified prior correspondence and messages received from you, which do not relate to the message.
b 7 Be careful with the transfer of messages / b Getting the message refers to two issues: Protecting
given time buyers / ul
In the first case: before pzekażesz one message is received from another person, make sure that they fit in the contract, it is not ethical behavior and urazisz this one. This applies, in particular, business correspondence, where internal communication is often confidential and may not be delivered. This applies to both substance and form of such communication. Sure, it looks like in private correspondence - should respect the confidentiality of correspondence and take into account the simple fact that the sender of a message directed to us, and do not necessarily want someone else to read.
second problem relates to all kinds of information that the attackers, including particularly unpleasant messages that are spam, or so rumor. chain letters. Simple rule: do not pass on unconfirmed news and messages that are sure to be appreciated by the recipient. Every owner of an e-mail he gets enough spam even further express something. Most of the disseminated information about special events, special hazards, etc. are simple naciągactwo or a joke. Many people are getting stupid enough to box in the form of jokes, videos and other unnecessary things. In addition, such messages are often replaced several times by a few friends who respect our time.
simple principle: forwards the message only if you really believe that the person wishes to receive messages.
b General / b In addition to the above principles are worth mentioning about the principles that apply in all correspondence:
thoughtful design save the message, use the items to separate different parts of the message is sent using the appropriate forms of politeness to write correctly , with Polish characters, avoid spelling error - inattention in this regard were met with terrible reception, perceived as a lack of respect and creates a negative image of the sender, do not indulge in the belief of anonymity on the Internet - the disappointment can be very unpleasant respect others time - many people do not want every piece that you come across the network, not all have the same sense of humor, and do not pay attention or distribute the content gently speak incorrectly - pornography, racism, etc., etc. -
Before posting, read it in full and correct all errors / ul
last important thing to communicate via e-mail: Remember deficiencies in the written form of communication. The written word is the imperfect means of communication: it is not really able to communicate our intentions, thoughts and emotions. Many studies show that people misinterpret the meaning of received messages, which leads to many conflicts and misunderstandings. It should take into consideration both the message and write messages to others.
> What is defragmentation?
> Phishing how to avoid scammers
> What is the best camera cell phone - cell phones with good camera
> How to speed up your computer - slow performance, computer
> The best games for the Playstation 2, the list of the best games for PS2, PS2 games for children
> How does the battery
> How to reduce the bill for mobile phone
> How to install Windows 7 from a USB stick? | Computers
> What is the basic difference between ZIP and RAR compression programs zipanje, WinZip or WinRAR?
> Nintendo DS Games, Nintendo DS consoles, games for the Nintendo DS
> How to choose a digital camera
> What is ajfon?
> Most Expensive Mobile Phones in the World - Luxury Mobile Phones
> How to develop photos? | Photo and Camera
> How to fix scratched disk
> How to put music on the iPhone
> What is Java, the Java programming language, programming in Java
> Dual SIM Mobile Phone - Mobile Phone with two cards
> What is the tab key, tab function keys, the keys on the keyboard
> Internet at work so do not waste your time