.
person who who uses programming skills to gain illegal access to a computer network or file.
A person writing an email.
A person who sends a copy to someone else.
A person who the email is sent to.
Where you find all the messages you didn't want.
A place for files that have been deleted.
Where all the incoming messages are shown.
Where you can keep messages of a particular type.
Keeping the message personal
Using lots of capital letters to emphasize certain words
Responding to messages as soon as possible
Casual – like the tone you use with friends.
"Yo, dude! Whassup?"
Conversational.
Formal.
Spell check, use full sentence structure and use proper grammar
Have a nice greeting: Hi, Hello, Dear Ms Hopkins etc.
Have a proper sign off: Best regards, Sincerely Yours etc.
Do all of these
Include all the points in the first paragraph.
Include all the points in the last paragraph.
Use lists with bullets or numbers.
Put it on a banner and rent an airplane to fly over the office pulling the banner.
Only your name.
Only your name and company.
All your relevant contact information.
A picture of your pet python and twin lizards.
Just attach it and send it.
Send it first thing in the morning and call to make sure it was received.
Send it bit by bit during week days.
Compress the file, then ask first when would be the best time to e-mail it.
Everyone in the company – just in case.
Your boss and your boss' wife – so they know that you’re working hard.
Only those people who absolutely need to know.
The whole world. Why not? Everyone else does.
Network person
Computer guru
System admin
Recipient to confirm
Drafts folder
Inbox
Outbox
Tasks list
Draft
Spam
Trash
Archived
Forward me
Forward to me
Forward it to me
Reply
Replication
Replay
Restart
Delete
Destroyed
Destructed
Deleted
True
False
True
False
True
False
True
False
Attack
Copy
Attachment
Appendix
Connection
Reference
Referee
Regression
Regret
Apologise
Grieve
Sorry
Take
Have
Except
Accept
Stop
Fail
Fall
Hesitate
Sorry
Unhappy
Happy
Afraid