Year 3: ________________________
Computing Notes
2ND TERM
2014/2025
COMPUTING NOTES
Topic: Exploring Email
Lesson outcomes
By the end of the lesson, the learner should be able to:
explain what email is.
identify email providers.
list some advantages of email
list some disadvantages of email
identify the parts of an email address
Online internet
KEYWORDS email electronic
web browser navigate
message compose
recipient address
phishing spam virus
attached subject
Introduction
Year 3: ________________________
Computing Notes
Email is one of the ways to send electronic messages over the internet. Email is electronic mail.
Email is a software that allows the exchange of messages between two or more people using
email addresses through the internet.
To send and receive emails you need an email account. You can get an email address from a
variety of email providers.
Some examples of email providers
1. Gmail.
2. Zoho mail
3. Yahoo mail
4. GMX
5. Fast mail
6. Proton Mail
7. AOL Mail
8. iCloud mail
9. Yandex mail
10.Hotmail
When you get an email account, you get an email address. No-one else in the world will have the
same email address, it is unique.
Example of an email address
Year 3: ________________________
Computing Notes
There are four main parts of an email address, including the user name, the "@" symbol, the mail
server and the domain extension. Each email address identifies a unique individual on a mail
server so messages can be delivered properly.
A mail server is a computer system that handles and delivers e-mail over a network, usually
over the Internet.
A mail server is similar to the post office, where mail is stored and sorted before being sent to its
final destination.
jacksmith@gmail.com
The user name is a The @, or "at" symbol, The last part of the
The mail server usually
nickname or a part separates the user name email is the domain
identifies the company
of a person's real from the second part of extension. Several
that owns the email
name. the email address, which domains extensions
server. For instance,
begins with the mail include ".com" used
"Gmail" owns the mail
server. for commercial
server at "gmail.com."
businesses, ".org" used
for non-profit
organizations, ".edu"
for educational
institutions and ".gov"
for government
agencies.
Some Advantages of Email are as follows:
Year 3: ________________________
Computing Notes
1. Email is used to send messages or files for free.
2. Email is the fastest way of written communication. Message is delivered within seconds.
3. Email is easy to use.
4. Email is an effective way to promote business.
5. Easy to send message or information to two or more of people within seconds by email.
6. Bills, Bank details or other useful information is easy to deliver by email.
7. You can send birthday cards, greetings or newsletter by email.
8. No Geographical barrier.
9. Messages can be sent quickly.
10.Email saves time.
11.Emailing saves paper and printing costs.
12.It is more personal and direct medium for communication.
13.It allows to save and keep a record of your communication.
14.You may attach files, documents, images and other media to an email.
15.You can access your email from anywhere around the globe with internet connection.
There are so many advantages of emails, but this does not deny the fact that the electronic mail
also has its own disadvantages.
Below are some disadvantages of email.
1. Virus Infection: This is one of the major disadvantages of emails. Viruses and over
malicious files can be sent through emails and when such emails are opened, the viruses will
spread and cause damage to the computer.
2. Spamming: Spams are unwanted emails that are sent randomly to the email server. Such
emails can be quite disturbing. Most spammy emails usually carry viruses and can easily
damage the computer system.
3. Misunderstanding: People usually misunderstand some email messages. This might be
caused by an error in spelling by the sender or confused expression.
4. Phishing - Sending an email to a user falsely claiming to be a genuine company to fraud the
user into providing information, such as personal information and bank account numbers on a
false website. The details will then be used for identity theft.
5. The recipient needs access to the internet to receive email.
6. No guarantee the mail will be read until the user logs on and checks their email.