21 Things - Basics

Q6. Email Vocabulary

1. Basics

Key Vocabulary

The list is quite long so we have added them to a Document File that you can use to study before testing your knowledge.

Compose Pane: From the compose pane, you can write an email to a recipient.
Drafts: Drafts are messages that you have composed but not sent.
Folders: Webmail providers provide you with folders or labels so you can organize your messages the way you want to.
Forward: Whenever you want to share an email that you've received, you can use the Forward command to send the message to another person.
Inbox: The inbox is where you'll view and manage emails you receive.
Message Pane: When you select an email in the inbox, it will open in the message pane. From here, you can read the message and choose how to respond with a variety of commands.
Phishing: Phishing is a type of email pretending to be from a bank or trusted source in order to steal your personal information.
Recipients: Recipients are the people you are sending the email to.
Reply: Whenever you receive an email, you can use the Reply command to respond to the message.
Reply All: Use the Reply All command if you want to send a message to everyone included in the original email.
Signature: Signatures will appear at the bottom of every email you send and often include your name and contact information, such as a phone number, website, or professional title.
Spam:  Spam emails often carry viruses or scams, so you won't want to read these messages.
Subject: The subject is a brief description of what the email is about.

Play the interactive Quizlet Game: Direct link 

MITECS  Michigan Integrated Technology Competencies for Students, and

ISTE Standards for Students

1. Empowered Learner
d. Understand the fundamental concepts of technology operations, demonstrate the ability to choose, use and troubleshoot current technologies, are able to transfer their knowledge to explore emerging technologies

2.Digital Citizen 
d. Students manage their personal data to maintain digital privacy and security and are aware of data-collection technology used to track their navigation online.