1. Launch the e-mail program Microsoft Outlook from the Start menu or a shortcut on the desktop.
2. Enter the password if prompted and click OK.
Alternatively, you may need to select your profile from the Choose
Profile dialog box that appears.
3. In this case, select your profile by clicking the down arrow key of the Profile Name dialog box and click OK.
NB: A User Profile is a group of settings that define how Outlook is set up for a particular user. It also defines through the information services how a user can send, store, and receive messages.
4. The Inbox is where all incoming messages are stored when you connect to Outlook. Displayed are the e-mail messages that you have received.
Unopened mail
Opened mail
A list of e-mail messages
5. To open and read e-mail messages in the Inbox, choose the message that you want to read. Then, double click on it to open it.
Message
The lower grid of your screen will have the full message. As you read the items in your Inbox, you can reply to, forward, or file them in other folders that you create.
When you have finished reading a message, you can close the window by selecting the File menu, then choosing Close. This will take you back to the Outlook window.
When you do not need to use any other e-mail services, you can exit the Outlook program by selecting the File menu, then choosing Close.
If there are any e-mail messages in the Outbox that have not been sent, a message will appear prompting you to send the e-mail(s) at that particular time or you can choose to send it later.
Kavungya answered the question on May 17, 2019 at 10:35
- Write the procedure used in Sending an e-mail message. (Solved)
Write the procedure used in Sending an e-mail message.
Date posted: May 17, 2019. Answers (1)
- Write a procedure on how to Add a Contact to the Address Book.(Solved)
Write a procedure on how to Add a Contact to the Address Book.
Date posted: May 17, 2019. Answers (1)
- Write the procedure of editing a Contact in the Address Book.(Solved)
Write the procedure of editing a Contact in the Address Book.
Date posted: May 17, 2019. Answers (1)
- Write the procedure used in creating a distribution list.(Solved)
Write the procedure used in creating a distribution list.
Date posted: May 17, 2019. Answers (1)
- Write the procedure of Sending a Message using the Address Book or Distribution List(Solved)
Write the procedure of Sending a Message using the Address Book or Distribution List
Date posted: May 17, 2019. Answers (1)
- Give the procedure on how Search Engines find Web Pages.(Solved)
Give the procedure on how Search Engines find Web Pages.
Date posted: May 17, 2019. Answers (1)
- Give the procedure of locating information within a website.(Solved)
Give the procedure of locating information within a website.
Date posted: May 17, 2019. Answers (1)
- Outline the steps of Attaching files to email messages.(Solved)
Outline the steps of Attaching files to email messages.
Date posted: May 17, 2019. Answers (1)
- Describe Logs and Audit trails.(Solved)
Describe Logs and Audit trails.
Date posted: May 17, 2019. Answers (1)
- Describe Mirror Back-ups.(Solved)
Describe Mirror Back-ups.
Date posted: May 17, 2019. Answers (1)
- Describe Online Backup.(Solved)
Describe Online Backup.
Date posted: May 17, 2019. Answers (1)
- Define Remote Backup.(Solved)
Define Remote Backup.
Date posted: May 17, 2019. Answers (1)
- Define Offsite Backup.(Solved)
Define Offsite Backup.
Date posted: May 17, 2019. Answers (1)
- Define Full Backup.(Solved)
Define Full Backup.
Date posted: May 17, 2019. Answers (1)
- Define Incremental Backup.(Solved)
Define Incremental Backup.
Date posted: May 17, 2019. Answers (1)
- What is Differential Backup?(Solved)
What is Differential Backup?
Date posted: May 17, 2019. Answers (1)
- Define Local backup.(Solved)
Define Local backup.
Date posted: May 17, 2019. Answers (1)
- Describe the Protection of computers from Power Interruptions.(Solved)
Describe the Protection of computers from Power Interruptions.
Date posted: May 17, 2019. Answers (1)
- What is Biometric authentication?(Solved)
What is Biometric authentication?
Date posted: May 17, 2019. Answers (1)
- Define Token authentication?(Solved)
Define Token authentication?
Date posted: May 17, 2019. Answers (1)