CIW LESSON 7 PART A. INTRODUCTION TO BUSINESS ELECTRONIC MAIL The use of e-mail has given rise to the term ______________________, which is a slang term.

Slides:



Advertisements
Similar presentations
Kalpesh Vyas & Seward Khem
Advertisements

The Internet 8th Edition Tutorial 3 Using Web-Based Services for Communication and Collaboration.
Basic Communication on the Internet:
.  The sender and recipient(s) of an message do not have to be online at the same time. When one person sends a message, it is stored on an.
® Microsoft Office 2010 Browser and Basics.
6 C H A P T E R © 2001 The McGraw-Hill Companies, Inc. All Rights Reserved1 Electronic Mail Electronic mail has revolutionized the way people communicate.
Basic Communication on the Internet: Integrated Browser Programs and Web-Based Services Tutorial 3.
Lesson 7: Business, , & Personal Information Management
XP Browser and Basics1. XP Browser and Basics2 Learn about Web browser software and Web pages The Web is a collection of files that reside.
Application Layer Pertemuan 25 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
Information Networking Security and Assurance Lab National Chung Cheng University Guidelines on Electronic Mail Security
Exploring Microsoft Office Outlook Microsoft Outlook 2000 A Desktop Information Manager By Robert T. Grauer Maryann Barber.
Fundamentals of Electronic Mail From Greenlaw/Hepp, In-line/On-line: Fundamentals of the Internet and the World Wide Web 1 Introduction Advantages.
Technion – Israel Institute of Technology Department of Electrical Engineering Software Lab Remote Mailbox based on.NET technology Michael and Eugene Shamis.
Browser and Basics Tutorial 1. Learn about Web browser software and Web pages The Web is a collection of files that reside on computers, called.
Chapter 30 Electronic Mail Representation & Transfer
XP New Perspectives on The Internet, Fifth Edition— Comprehensive, 2005 Update Tutorial 3 1 Evaluating Integrated Browser Programs and a Web-Based.
Boris Tshibangu. What is a proxy server? A proxy server is a server (a computer system or an application) that acts as an intermediary for requests from.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
This is group I have made.  Deleted all the s we didn’t need to clear out our .  Then created folders for the s we would receive.
Guide to Computer Forensics and Investigations Fourth Edition Chapter 12 Investigations.
1 What is Electronic Mail Exchanging information via computer networks Electronic mail addresses SMTP (Simple Mail Transfer Protocol) Client/Server based.
Computer Concepts 2014 Chapter 7 The Web and .
Pasewark & Pasewark 1 Outlook Lesson 1 Outlook Basics and Microsoft Office 2007: Introductory.
Prepared by: Ms Melinda Chung Chapter 3: Basic Communication on the Internet: .
Backup Local Online For secure offsite storage of your , and making it available from any computer or smart phone. Backup accessed with.
Communicating Information: and Attachments.
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 9
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
Electronic Mail Originally –Memo sent from one user to another Now –Memo sent to one or more mailboxes Mailbox –Destination point for messages.
Syllabus outcomes Describes and applies problem-solving processes when creating solutions Designs, produces and evaluates appropriate solutions.
A form of communication in which electronic messages are created and transferred between two or more devices connected to a network.
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
CPT 499 Internet Skills for Educators Electronic Mail Session Five.
CH2 System models.
1 Using Messages sent from machine to machine and stored for later reading. You will use a client to read –Type mail or pine in UNIX to read.
(or ?) Short for Electronic Mail The transmission of messages over networks.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
What is and How Does it Work?  Electronic mail ( ) is the most popular use of the Internet. It is a fast and inexpensive way of sending messages.
Week Rainey Community ICT Classes ICT – The Basics.
ITEC 1001 Tutorial 1 Browser and Basics. Web browser software & Web pages The Web is a collection of files that reside on computers, called Web.
Pasewark & Pasewark Microsoft Office 2003: Introductory 1 INTRODUCTORY MICROSOFT OUTLOOK Lesson 1 – Outlook Basics and .
Basic Features and Options Accessing  Means of communicating electronically via the Internet.  Used by individuals, businesses,
Concepts  messages are passed through the internet by using a protocol called simple mail transfer protocol.  The incoming messages are.
CS 3830 Day 9 Introduction 1-1. Announcements r Quiz #2 this Friday r Demo prog1 and prog2 together starting this Wednesday 2: Application Layer 2.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 1 Evaluating an Program and a Web-Based Service Basic Communication.
1 E- Mail. 2 Electronic Mail ( ) is simply a means of sending messages via computer Business is using more and fax To access you must.
Teach Yourself Windows 98 Module 5: Working with and Using Newsgroups.
XP Browser and Basics COM111 Introduction to Computer Applications.
INTERNET PROTOCOLS. Microsoft’s Internet Information Server Home Page Figure IT2031 UNIT-3.
  is a system of electronic communication that allows the user to exchange messages over the internet  Everyone’s address is unique  Two.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Internet Applications (Cont’d) Basic Internet Applications – World Wide Web (WWW) Browser Architecture Static Documents Dynamic Documents Active Documents.
Amanda Fristy Damara Thea Bayu Gerhana Yuda Evita Fitri Ila Uswatun Hasanah Putri Ayuning Kartika Presented by :
A presentation about communicating electronically.
Do Now: Describe the steps used to access the comments tool in MS Word. ( review your notes for the answer) Ex: Step 1. Select the text or item you want.
The Internet, Fourth Edition-- Illustrated 1 The Internet – Illustrated Introductory, Fourth Edition Unit B Understanding Browser Basics.
1 Kyung Hee University Chapter 22 Simple Mail Transfer Protocol (SMTP)
By Toby Reed.
is short for electronic mail!. What is ? An electronic message sent from one computer to another. saves money and time compared to regular.
© 2010 Computer Science Faculty, Kabul University FTP AND ELECTRONICE MAIL 5 TH LECTURE 4, May, 2010 Baseer Ahmad Baheer.
Networking Applications
Internet Business Associate v2.0
is short for electronic mail!
Some bits on how it works
CIW Lesson 7 Part A Name: _______________________________________
Simple Mail Transfer Protocol
Year 10.
Basic Features and Options
Basic Features and Options
Presentation transcript:

CIW LESSON 7 PART A

INTRODUCTION TO BUSINESS ELECTRONIC MAIL The use of has given rise to the term ______________________, which is a slang term for standard postal service. is the _________________________ standard communication for business

ADDRESSES & SERVICES/PROGRAMS Example: An client is also referred to as a __________________________ This is a program not associated with a web browser, that you can use to send s ________________________ s allow you to check your from any computer If you are on different systems you can use a _______________________

TYPES OF PROTOCOLS There are 2 servers for sending s ___________________ & __________________ Outgoing mail protocol _____________________________________________. *Can be a disadvantage because there is a greater chance to get hacked _______________ is an server program that receives sent messages and delivers them to their proper destination A “store and forward” service is _________________________

MIME Extension of SMTP Can be used by applications to _________________ process files _____________________ from the internet Identifies attached files by ________________, and knows to open the attached file because of the _____________________ inside the HTTP header If you organization scans attachments for malicious content, this takes place _________________________________

ALTERNATIVES TO MIME ________________________ & ___________________ encrypt the message and its attachments S/MIME & PGP support ________________ & _______________ of messages _______________________ is an open source implementation of PGP and doesn’t use patented algorithms

COMPONENTS message headers consist of: ______, _____, ________, __________ & _____________________ The file sent with an is an _______________________ Most current clients display attachments as a __________________ __________ An recipient must posses the necessary ___________________ to view or edit an attachment

COMPONENTS CONTINUED The __________________ ______________ stores names and information for frequently accessed contacts clients save a copy of every message you send in the ____________ folder The _________ _______________ is text that appears at the bottom of each message that you send and contains __________________ information