CIW Lesson 7 Part A Name: _______________________________________

Slides:



Advertisements
Similar presentations
Kalpesh Vyas & Seward Khem
Advertisements

Basic Communication on the Internet:
AO- 2 (part 2 of 2) Pass + Send. Receive. Reply. Forward. With more than 1 attachment.
INTRANET MAIL SERVER (DESIGN OF SMTP and POP3)
Shouting from the Rooftops: Improving Security Dr. Maury Pinsk FRCPC University of Alberta Division of Pediatric Nephrology.
Basic Communication on the Internet: Integrated Browser Programs and Web-Based Services Tutorial 3.
Lesson 7: Business, , & Personal Information Management
XP Browser and Basics1. XP Browser and Basics2 Learn about Web browser software and Web pages The Web is a collection of files that reside.
Information Networking Security and Assurance Lab National Chung Cheng University Guidelines on Electronic Mail Security
Chapter 2: Application layer  2.1 Web and HTTP  2.2 FTP 2-1 Lecture 5 Application Layer.
CS 497C – Introduction to UNIX Lecture 38: - Electronic Mail Chin-Chih Chang
Exploring Microsoft Office Outlook Microsoft Outlook 2000 A Desktop Information Manager By Robert T. Grauer Maryann Barber.
Technion – Israel Institute of Technology Department of Electrical Engineering Software Lab Remote Mailbox based on.NET technology Michael and Eugene Shamis.
Browser and Basics Tutorial 1. Learn about Web browser software and Web pages The Web is a collection of files that reside on computers, called.
Chapter 30 Electronic Mail Representation & Transfer
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
This is group I have made.  Deleted all the s we didn’t need to clear out our .  Then created folders for the s we would receive.
 ENGR 1110 Introduction to Engineering – Cyber Security Allison Holt, Adam Brown Auburn University.
Technology ICT Option: . Electronic mail is the transmission of mainly text based messages across networks This can be within a particular.
Computer Concepts 2014 Chapter 7 The Web and .
SMTP, POP3, IMAP.
1 Application Layer Lecture 5 Imran Ahmed University of Management & Technology.
Outlook 2000 Summertime Technology 2002 Vicki Blackwell Tangipahoa Parish Schools.
Prepared by: Ms Melinda Chung Chapter 3: Basic Communication on the Internet: .
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 9
1 Computer Communication & Networks Lecture 27 Application Layer: Electronic mail and FTP Waleed.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
Electronic Mail Originally –Memo sent from one user to another Now –Memo sent to one or more mailboxes Mailbox –Destination point for messages.
Syllabus outcomes Describes and applies problem-solving processes when creating solutions Designs, produces and evaluates appropriate solutions.
A form of communication in which electronic messages are created and transferred between two or more devices connected to a network.
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
Webmail. Agenda Why use webmail? Why use webmail? What is webmail What is webmail – basic » system MDA MDA MTA MTA MUA MUA »Protocol SMTP SMTP.
CPT 499 Internet Skills for Educators Electronic Mail Session Five.
1 Using Messages sent from machine to machine and stored for later reading. You will use a client to read –Type mail or pine in UNIX to read.
(or ?) Short for Electronic Mail The transmission of messages over networks.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Electronic Mail. Client Software and Mail Hosts –Client PC has client software that communicates with user’s mail host –Mail hosts deliver.
What is and How Does it Work?  Electronic mail ( ) is the most popular use of the Internet. It is a fast and inexpensive way of sending messages.
Evidence Including tools and etiquette.
Concepts  messages are passed through the internet by using a protocol called simple mail transfer protocol.  The incoming messages are.
Application Security: (April 10, 2013) © Abdou Illia – Spring 2013.
CS 3830 Day 9 Introduction 1-1. Announcements r Quiz #2 this Friday r Demo prog1 and prog2 together starting this Wednesday 2: Application Layer 2.
CSCE 201 Security Fall CSCE Farkas2 Electronic Mail Most heavily used network-based application – Over 210 billion per day Used across.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 1 Evaluating an Program and a Web-Based Service Basic Communication.
1 E- Mail. 2 Electronic Mail ( ) is simply a means of sending messages via computer Business is using more and fax To access you must.
INTERNET PROTOCOLS. Microsoft’s Internet Information Server Home Page Figure IT2031 UNIT-3.
  is a system of electronic communication that allows the user to exchange messages over the internet  Everyone’s address is unique  Two.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
A Quick Look At How Works Understanding the basics of how works can make life a lot easier for any user. Especially those who are interested.
(Electronic Mail) a message sent and received electronically via telecommunication links between computers.
Amanda Fristy Damara Thea Bayu Gerhana Yuda Evita Fitri Ila Uswatun Hasanah Putri Ayuning Kartika Presented by :
By Toby Reed.
is short for electronic mail!. What is ? An electronic message sent from one computer to another. saves money and time compared to regular.
Week-2 (Lecture-1) An electronic message sent from one computer to another. contains account i.e. How does.
CIW LESSON 7 PART A. INTRODUCTION TO BUSINESS ELECTRONIC MAIL The use of has given rise to the term ______________________, which is a slang term.
Spring 2006 CPE : Application Layer_ 1 Special Topics in Computer Engineering Application layer: Some of these Slides are Based on Slides.
درس مهندسی اینترنت – مهدی عمادی مهندسی اینترنت برنامه‌نویسی در اینترنت 1 SMTP, FTP.
Chapter 6 Electronic Mail. Copyright © 2005 Pearson Addison-Wesley. All rights reserved. Objectives To describe basic concepts and their specific.
` ` Alice’s Mail Provider Bob’s Mail Provider Architecture Mary
Networking Applications
Internet Business Associate v2.0
is short for electronic mail!
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 9
Some bits on how it works
Technology ICT Option: .
Simple Mail Transfer Protocol
Year 10.
ICT Communications Lesson 5: Communicating Using
.
 Zone in name space  DNS IN THE INTERNET  Generic domains :There are fourteen generic domains, each specifying an organization type.
Presentation transcript:

CIW Lesson 7 Part A Name: _______________________________________ Directions: Follow along with the PowerPoint and fill in the blanks. Everything that will be covered will be in Lesson 7 Master Questions Part A. Name: _______________________________________

Introduction to Business Electronic Mail The use of e-mail has given rise to the term ______________________, which is a slang term for standard postal service. E-mail is the _______________________ standard communication for business Snail Mail De Facto

E-Mail Addresses & Services/Programs _________________@_____________ An e-mail client is also referred to as a __________________________ This is a program not associated with a web browser, that you can use to send emails ________________________ emails allow you to check your email from any computer If you are on different email systems you can use a _______________________ username@domain Mail User Agent (MUA) Web-Based gateway

Types of E-mail Protocols There are 2 servers for sending emails ___________________ & __________________ Outgoing mail protocol _____________________________________________. *Can be a disadvantage because there is a greater chance to get hacked _______________ is an email server program that receives sent messages and delivers them to their proper destination A “store and forward” email service is _________________________ Outgoing & incoming SMTP: Simple Mail Transfer Protocol MDA: Mail Delivery Agent POP3: Post Office Protocol version 3

MIME Extension of SMTP Can be used by applications to _________________ process files _____________________ from the internet Identifies attached files by ________________, and knows to open the attached file because of the _____________________ inside the HTTP header If you organization scans email attachments for malicious content, this takes place _________________________________ Automatically, downloaded Type Plug-in At the email server

Alternatives to MIME ________________________ & ___________________ encrypt the email message and its attachments S/MIME & PGP support ________________ & _______________ of email messages _______________________ is an open source implementation of PGP and doesn’t use patented algorithms PGP: pretty good privacy & GPG: GNU Privacy Guard Encryption & decryption GPG: GNU Privacy Guard

E-mail Components Email message headers consist of: ______, _____, ________, __________ & _____________________ The file sent with an email is an _______________________ Most current email clients display attachments as a __________________ __________ An email recipient must posses the necessary ___________________ to view or edit an attachment To, CC, BCC, subject & attachments Attachment Separate link software

Email Components Continued The __________________ ______________ stores names and information for frequently accessed email contacts Email clients save a copy of every message you send in the ____________ folder The _________ _______________ is text that appears at the bottom of each message that you send and contains __________________ information Address book Sent Email signature, contact