[go: up one dir, main page]

0% found this document useful (0 votes)
67 views17 pages

Afiusdiufhsi

Uploaded by

Faraz Shah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
67 views17 pages

Afiusdiufhsi

Uploaded by

Faraz Shah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

Email

Email is a service which allows us to send the message in electronic mode over the
internet. It offers an efficient, inexpensive and real time mean of distributing
information among people.

E-MAIL ADDRESS

Each user of email is assigned a unique name for his email account. This name is
known as E-mail address. Different users can send and receive messages according
to the e- mail address.
E-mail is generally of the form username@domainname.

For example, webmaster@gmail.com is an e-mail address where webmaster is


username and gmail.com is domain name.

• The username and the domain name are separated by @ (at) symbol.
• E-mail addresses are not case sensitive.
• Spaces are not allowed in e-mail address.
E-MAIL HEADER
The first five lines of an E-mail message is called E-mail header. The header part
comprises of following fields:
From
Date
To
Subject
CC
BCC

From
The From field indicates the sender’s address i.e. who sent the e-mail.

Date
The Date field indicates the date when the e-mail was sent.

To
The To field indicates the recipient’s address i.e. to whom the e-mail is sent.

Subject
The Subject field indicates the purpose of e-mail. It should be precise and to the point.

CC
CC stands for Carbon copy. It includes those recipient addresses whom we want to
keep informed but not exactly the intended recipient.

BCC
BCC stands for Blind Carbon Copy. It is used when we do not want one or more of the
recipients to know that someone else was copied on the message.

Greeting
Greeting is the opening of the actual message. Eg. Hi Sir or Hi Guys etc

Text
It represents the actual content of the message.

Signature
This is the final part of an e-mail message. It includes Name of Sender, Address, and
Contact Number.

Advantages
E-mail has prooved to be powerful and reliable medium of commmunication.

Benefits of E-mail

Reliable
Many of the mail systems notify the sender if e-mail message was undeliverable.

Convenience
There is no requirement of stationary and stamps. One does not have to go to
post office. But all these things are not required for sending or receiving an
mail.

Speed
E-mail is very fast. However, the speed also depends upon the underlying network.

Inexpensive

The cost of sending e-mail is very low.


Printable

It is easy to obtain a hardcopy of an e-mail. Also an electronic copy of an e-mail


can also be saved for records.

Global
E-mail can be sent and received by a person sitting across the globe.

Generality
It is also possible to send graphics, programs and sounds with an e-mail
Email working

❖ Email working follows the client server approach.


❖ In this client is the mailer i.e. the mail application or mail program and server is
a device that manages emails.

Following example will take you through the basic steps involved in sending and
receiving emails and will give you a better understanding of working of email
system:

• Suppose person A wants to send an email message to person B.


• Person A composes the messages using a mailer program i.e. mail client and then
select Send option.
• The message is routed to Simple Mail Transfer Protocol to person B’s mail server.
• The mail server stores the email message on disk in an area designated for person
B.
• The disk space area on mail server is called mail spool.
• Now, suppose person B is running a POP client and knows how to communicate
with B’smail server.
• It will periodically poll the POP server to check if any new email has arrived for
B.As in this case, person B has sent an email for person B, so email is forwarded
over the network to B’s PC. This is message is now stored on person B’s PC.
CREATING EMAIL ACCOUNT

There are various email service provider available such as Gmail, hotmail, ymail, rediff mail etc. Here
we will learn how to create an account using Gmail

• Open gmail.com and click create an account.


• Now a form will appear. Fill your details here and click Next Step.

• This step allows you to add your picture. If you don’t want to upload now, you can do it later.
Click Next Step.
• Now a welcome window appears. Click Continue to Gmail.
Gmail manages the mail into three categories namely Primary, Social and Promotions.
Compose option is given at the right to compose an email message.
Inbox, Starred, Sent mail, Drafts options are available on the left pane which allows you to
keep track of your emails

Composing and Sending Email


Before sending an email, we need to compose a message. When we are composing an
email message, we specify the following things:
Sender’s address in To field
Cc (if required)
Bcc (if required)
Subject of email message
Text
Signature
You should specify the correct email address; otherwise it will send an error back to the
sender.
Once you have specified all the above parameters, It’s time to send the email. The mailer
program provides a Send button to send email, when you click Send, it is sent to the mail
server and a message mail sent successfully is shown at the above.

E-MAIL PROVIDERS
Such programs synchronize the email content through the protocols IMAP (Internet Message
Access Protocol) or POP (Post Office Protocol).

Gmail or Google Mail


IceWarp Mail Server
IceWarp, Inc. is a software company located in Prague, Czech Republic. It develops
IceWarp Mail Server, an email, messaging and collaboration service for small, medium
and enterprise level businesses.

Invent of E-Mail
Ray Tomlinson's 'story' about inventing email is the biggest propaganda lie of modern
tech history: Shiva Ayyadurai
Ray Tomlinson from USA is universally credited as the creator of email as part of a
program for ARPANET in 1971
Meanwhile in 1978, a 14-year-old boy, Shiva Ayyadurai began his work on an email
system for the University of Medicine and Dentistry of New Jersey. His task was to
emulate the paper-based interoffice mail system electronically and in 1982, he
copyrighted his software, called "EMAIL".
The present day use of the @ symbol was also pioneered by American electrical
engineer Ray Tomlinson

E-MAIL SECURITY

E-MAIL HACKING

Email hacking can be done in any of the following ways:

Spam
Virus
Phishing

➢ SPAM
E-mail spamming is an act of sending Unsolicited Bulk Emails (UBI) which one
has not asked for. Email spams are the junk mails sent by commercial
companies as an advertisement of their products and services.

➢ VIRUS
Some emails may incorporate files containing malicious script which when run on
your computer may lead to destroying your important data.

➢ PHISHING
Email phishing is an activity of sending emails to a user claiming to be a
legitimate enterprise. Its main purpose is to steal sensitive information such as
usernames, passwords, and credit card details.

Such emails contain links to websites that are infected with malware and
direct the user to enter details at a fake website whose look and feels are the
same to legitimate one.

E-MAIL SPAMMING AND JUNK MAILS

Email spamming is an act of sending Unsolicited Bulk E-mails (UBI) which one has
not asked for. Email spams are the junk mails sent by commercial companies as
an advertisement of their products and services.
SPAMS MAY CAUSE THE FOLLOWING PROBLEMS:

It floods your e-mail account with unwanted e-mails, which may result in loss
of important e-mails if the inbox is full.

Time and energy is wasted in reviewing and deleting junk emails or spams.

It consumes the bandwidth that slows the speed with which mails are
delivered.

Some unsolicited email may contain viruses that can cause harm to your
computer

E-mail Protocols
● E-mail Protocols are a set of rules that help the client to properly transmit the
information to or from the mail server. Here in this tutorial, we will discuss various
protocols such as SMTP, POP, and IMAP.

SMPTP
● SMTP stands for Simple Mail Transfer Protocol. It was first proposed in 1982. It is a
standard protocol used for sending e-mail efficiently and reliably over the internet.

KEY POINTS:

● SMTP is an application level protocol.


● SMTP is a connection oriented protocol.
● SMTP is text based protocol.
● It handles exchange of messages between e-mail servers over TCP/IP networks.
● Apart from transferring e-mail, SMPT also provides notification regarding incoming
mail.
● When you send e-mail, your e-mail client sends it to your e-mail server which further
contacts the recipient mail server using SMTP client.
● These SMTP commands specify the sender’s and receiver’s e-mail address, along
with the message to be sent.
● The exchange of commands between servers is carried out without intervention of
any user.
● In case messages cannot be delivered, an error report is sent to the sender
which makes SMTP a reliable protocol.

IMAP
● IMAP stands for Internet Message Access Protocol. It was first proposed in 1986.
There exist five versions of IMAP as follows:
● Original IMAP
● IMAP2
● IMAP3
● IMAP2bis

POP
POP stands for Post Office Protocol. It is generally used to support a single client. There
are several versions of POP but the POP 3 is the current standard
Social Networking

● Social Networking refers to grouping of individuals and organizations together via


some medium, in order to share thoughts, interests, and activities.
● There are several web based social network services available such as facebook,
twitter, linkedin, Google+ etc. which offer easy to use and interactive interfaces to
connect with people within the country and overseas as well. There are also several
mobile based social networking services in front of apps such as Whatsapp, hike, Line
etc.

AVAILABLE SOCIAL NETWORKING SERVICES


Questions
1. E-mail stands for
a) Electronic Man
b) Electromagnetic mail
c) Electronic mail
d) Engine mail

2. _______ is the incoming email server


a) POP
b) SMTP
c) SMIP
d) PPP

3. SMTP stands for


a) Short mail transmission protocol
b) Small mail transmission protocol
c) Server Mail Transfer Protocol
d) Simple Main Transfer Protocol

4. In MS Office, ______ is the software for managing emails.


a) MS Access
b) MS Publisher
c) MS Outlook
d) MS Onenote
5. Transmission and delivery of information containing text, image, video, documents
etc. to targeted recepient(s) over the Internet is called _______ .
a) email
b) world wide web
c) e-commerce
d) social media

6.E-mail address is made up of ______


a) Single part
b) Two parts
c) Three parts
d) Four parts

7. The user name and email server parts of an email address are separated by _______
symbol.
a) @
b) #
c) $
d) &

8. Gmail.com, yahoo.com, yahoo.co.in, ymail.com, rediff.com, rediffmail.com, fastmail.fm,


etc. are popular _______ .
a) FTP servers
b) social media sites
c) email servers
d) none of them
9. An email may contain non-text information which may be _______.
a) uploaded
b) downloaded
c) transmitted
d) erased

10. Electronic communication between 2 persons having unique identifiers over the
Internet is called _______ .
a) India post
b) Speed post
c) Registered post
d) email

11. Each user of a email communication should possess _______ .


a) a unique identifier, called email ID
b) pen drive
c) external hard disk
d) DVD writer

12. In email communication, CC stands for _____.


a) carbon copy
b) cold coffee
c) blind carbon copy
d) casual copy

13. In email communication, BCC stands for _______.


a) carbon copy
b) blind cold coffee
c) blind carbon copy
d) casual copy

14. The email ID of the secondary recipient of email is entered in ______ field.
a) To
b) CC
c) BCC
d) Subject

15. The email ID of the anonymous recipient of email is entered in ______ field.
a) To
b) CC
c) BCC
d) Subject

16. An email sent from unknown persons for improving the sale, image, appeal or other
characteristics of a product is called_____.
a) Junk
b) Important
c) Virus
d) Trojan

17. ______ mail refers to e-mail messages sent by an unknown sender, usually for
commercial purposes.
a) Junk
b) Important
c) Virus
d) Trojan
18. Unsolicited emails may be filtered and separated into _______ .
a) spam bin
b) inbox
c) sent mails
d) draft

19. All emails sent by the user may be saved in _______ .


a) spam bin
b) inbox
c) sent mails
d) draft

20. Images and videos attached to a junk email may ______.


a) contain anti-virus
b) repair troubles in the operating system
c) help fast working of computers
d) contain trojens and viruses to attack a computer

You might also like