COSC 1301
Discussion of tools used in course

In this module, we discuss some of the tools that you will be using during this course. Among these are email and search engines. You already have some knowledge of the use of these tools because you have already used them in this course.

Email is a wonderful communication tool. With tremendous ease and minimal expense, users can send messages to one individual or a group of individuals. Since files can be attached to emails, it is possible for several people to simultaneously review material, make suggestions and reply back to the sender. Emailing has revolutionized the process of writing, editing and decision making.

However, as with every application or tool, there are advantages and disadvantages. By being aware of the disadvantages, these negative effects can be minimized. Email etiquette (netiquette), viruses and spam are just a few of the email minefields discussed in this module

One of the benefits of email is the ability to communicate quickly and concisely. Compose your thoughts before you write an email. Keep in mind that your messages can be forwarded to others without your consent. Avoid long-winded messages when a short concise message will work. Don't use the anonymity of email to send hurtful email.

Email should be checked frequently, meaning daily or more often. Email senders expect their messages to be read and answered quickly. If correspondents cannot be counted on to check email frequently, the advantages of emailing disappear. Delays may even hinder communication.

Since email messages are read on a computer screen, they should be brief (a screen full - about 25 lines). Longer messages can be sent as attachments that are more easily read and printed out. As computer and connection reliability increase, this attitude may change. It is very discouraging to write a long email and then be ready to click the send button when the computer crashes or the connection is lost.

Email is an informal means of communication. With its speed and interactivity, email messages tend to be very conversational. Conventional (snail) mail is better suited for communicating serious matters.

Although an email exchange has the interactive quality of a phone call, tone of voice and inflection are absent. When you add in email's tendency to be brief and informal, it is easy to see why electronic messages sometimes results in misunderstanding. Electronic communication is not a substitute for personal contact. Some matters should still be handled by phone or in person.

Email is never completely secure. If absolute confidentiality is required, choose another communication vehicle.

Be cautious with the use of acronyms and abbreviations, such as

  • LOL - Laughing Out Loud
  • TTFN - Ta Ta For Now
  • IMO - In My Opinion (IMHO - In My Humble Opinion)
  • BCNU - Be seeing you
  • DYGI - Did you get it?
Surveys show that most people don't know what these 'e-breviations' mean. In business communication, it is important to be as clear as possible; if people don't understand something, there is a possibility for miscommunication.

All email addresses must be precise, much like phone numbers. Just one mistaken letter or number typed in the email address could route the email to another email address or back to the sender, accompanied by a discouraging email message.

Avoid using all caps in your email messages. Similarly, avoid using only small caps. USING ALL CAPS IS THE EQUIVALENT OF SHOUTING. Remember, email is a communications tool and good grammar and good manners are essential for effective communications.

Another area that needs to be mentioned is forwarding messages. Many people enjoy forwarded messages but others will immediately delete anything that is forwarded. Recently, I saw a forwarded email message that had over 500 addresses in it. That is a gold mine of valid 'live' email addresses. Valid email addresses are collected and sold to the folks that send junk email (spam). If you must forward something, then suppress the address list by using the BCC (blind carbon copy) option. In this course, we will use a mailing list (egroups) to hide addresses - more on this in a later module.

SPAM is unwanted junk email. Rule #1 of spam management is never to respond to a piece of junk email asking to be removed or unsubscribed. Identifying your email address as an active address - and one where unsolicited messages get read - begs for more spam.

Bulk emailers and unethical email abusers abound on the Internet. One way to combat this abuse is to sign up for a free email account with YAHOO, HOTMAIL, NETADDRESS or any of the many other email services. When asked for an email address, give out this account. Keep an account for personal email - but only give this address to friends and those who will not abuse it.

The majority of the virus warnings you receive from well-meaning friends are hoaxes. Once you have seen a few, they are easy to spot. Hoaxes usually attempt to panic you by describing devastating destruction to both your computer's software and hardware. Hoaxes often name a reliable company as the source of the message, but don't say exactly who is issuing the message. And they usually urge you to forward the message to everyone that you know. Even if the message seems authentic, don't forward it to your entire mailing list until you check it out. Here are some resources that you can use:

  • www.scambusters.com
  • www.symantec.com/avcenter/hoax.html
  • www.f-secure.com/virus-info
  • www.av.ibm.com
  • http://vil.nai.com/villib/alpha.asp
  • www.vmyths.com
  • http://hoaxbusters.ciac.org
Viruses are usually sent as attachments. Unless you know exactly what a file is and where it is from, don't open it. If you get a message that says, "Hey, you gotta read this," email back and ask why. If the sender doesn't have a clue, then trash the file and move on. Remember, the data on your computer is valuable. What would happen if you lose that information? Protect your data by using common sense.
Search engines are used to help users find information on the Internet. Because the Internet is so huge and is always changing, search engines must be constantly finding and indexing new information. Special programs called 'spiders' follow every link on a given page and sends a report about the page's contents back to the index site. This information is indexed and stored in the search engine's files - waiting for the user to make a request.

Some search engines such as YAHOO and ASK JEEVES don't use automated spiders. Instead human editors manually compile the web directories. In either case, search engines are the number one method used to find information on the web.

To begin a search, the user will enter one or more search words, select a search style and click a button to start the search. Most search sites offer three basic search styles: any words, all words and exact phrase.

  • Any words - lists all indexed pages that contain any of the search words - the number of web pages returned can be massive
  • All words - lists all indexed pages that contain all of the words, in any order. Thus, searching for WESTERN TEXAS COLLEGE would yield the same results as searching for COLLEGE TEXAS WESTERN.
  • Exact phrase - lists all indexed pages that contain the exact phrase entered. Sites on the same topic that use different phrases will not be listed.
Other tricks include: