0% found this document useful (0 votes)
30 views

Ch-7 Email

Uploaded by

Millo Novin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views

Ch-7 Email

Uploaded by

Millo Novin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 20

Chapter 7

Communication and
Collaboration
Communication
Communication is a process of
sending and receiving
information from one place to
another. For effective
communication Internet is the
only interface which can connect
a number of people on a common
network. It includes Chat rooms,
E-mail, instant messaging, social
networking.
Basic of E-MAIL
E-mail is a method of sending message,
data, video, voice, and graphics over
digital communication link, such as
Internet any where in the world.
What is E-Mail?

Electronic mail can be defined as a


system for sending and receiving
message electronically over computer
network.
Today’s E-mail system are based to store
and forward model. E-mail servers accept,
forward, delivered and store messages.
How Email works
To send an e-mail one needs a
connection to the internet and access
to a mail server, which forwards the
mail. The standard protocol used for
sending Internet e-mail is called
SMTP(Simple Mail Transfer Protocol).
It works in conjunction with POP
3(Post Office Protocol) and
IMAP(Internet Mail Access protocol)
server.
When an email is sent to a person who
has an email address like
xyz@gmail.com, it is broken down into
two packets: xyz(the recipients account
name) and gmail.com (the receipts
domain name). The SMTP server
contacts a DNS server and ask for the
location of gmail.com. The DNS server
sends the address back to the SMTP
server. The SMTP server then sends the
email message to the SMTP server
where gmail.com is located.
Advantages of E-mail:

The delivery of message is very fast.


The cost of E-mail is almost free.
Multiple copies of the same message
can be sent to a group of people.
Picture, documents and other can
also be sent.
Disadvantages:

Virus attached with an E-mail


could seriously affect your
computer
E-mail cannot really be used for
official business documents.
E-mail may be intercept by
hacker.
E-mail Addressing
An E-mail is composed of two
separate parts:
Your personal identity or user
name.
The domain name of the mail
server. Domain name
Userna
e.g.-
me rakesh@gmail.com
at,
symbol
Opening a E-mail Account
There are various websites which allow to create free E-mail
account.
E.g.-
1) www.gmail.com
2) www.yahoo.com
3) www.hotmail.com
4) www.rediffmail.com
Steps for Opening an E-mail account:
Step1: Type www.gmail.com in the web address bar
Step 2: Click on Create an account link. Then the registration
form will appear.
Step 3: Fill those details.
Step 4: After completing the registration form, click on Next
step button.
Step 5:Aftre the creation of an E-mail account, the
confirmation information will be given
After the creation of E-mail account
the user can sign in and view an E-
mail
Mailbox: A mail box is the storage
location of electronic mail message
that is found on a remote server
Inbox- A place where E-mail message are
received
Outbox: A tem used to describe the location
or folder where E-mail is stored before delivery.
Drafts: The draft folder contains items that
have not yet sent.
Sent Item: This folder contains all items that
have been sent.
Structure of E-mail
Message
Creating and sending a new E-mail:
 After login, if user wants create an e-mail message,
click on COMPOSE button and then New message
window will display on the screen.
There are Four sections of e-mail message.
1. Header: The header is the upper most
section.
 To: E-mail address of primary recipients
 Cc (Carbon Copy) : E-mail address of secondary
recipients
 Bcc(Blind Carbon Copy) : E-mail Address of
secondary recipients to whom copy needs to be
sent but the primary receipts should not know
2. Body: The Body of E-mail message is the
primary focus because it contain the
actual message.
3. Subject :It denotes the subject of the
message as specified by the sender
4. Signature: The signature for an e-mail
message is the personal information which
automatically appears at the bottom of
the outgoing message.
5. Attachment: It allows users to attach file
to any e-mail message. Any file format-
such as Doc., spreadsheet, image, video.
Protocol use in Email
SMTP(The Simple Mail Transfer
Protocol ): The primary purpose
of SMTP is to emails between
mail servers and also between
clients and server.(PORT No. 25)
SMTP
POP3(Post Office Protocol
3)
:It is a protocol used for fetching
Emails. It allows an email client to
download an email from email
server. The POP3 is simple and
does not offer many features
except downloading.
It does not allow search facility. It
it designed to be used in offline
mode. Because it was designed
for offline working the emails
were deleted from the email
server once they have been
downloaded to your local
computer. This can be changed.
The sent Item is saved on the
sent item folder never on the
email server. (PORT NO. 110)
IMAP(Internet Message Access
Protocol)
Ithas similar features as POP3
but without downloading the
email. The email hold and
maintain by the remote server. It
also enable user to search
emails. It is designed to access
email from a mailbox on an email
server in an online mode. So the
email remains on the remote
server. (PORT No.143)
MIME(Multipurpose Internet Mail
Extension):Standard for attaching
non-text files to an internet mail
message, such as animation,
hypertext file, sound files,
Spreadsheet etc.
Mail Merge
Mail Merge is a mass-facility that
takes names, address and
pertinent facts about receipts and
merge the information into the
form of letter

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy