Introduction to E-mail Justin R. Scott CIS 1020-079 Introduction to E-mail
E-Mail - Electronic Mail Delivers messages anywhere in the world Requires a server and software Accesses account via a username and password Allows you to Send, Compose, Reply, and Forward e-mail Point 1: E-mail is conceptually the same as writing a letter except that e-mail messages are delivered almost instantly anywhere in the world Point 2: E-mail requires an account on a mail server and supporting software on your PC Point 3: A username and password will allow you to access your account Point 4: All e-mail programs allow you to Send, Compose, Reply, and Forward mail
The Mail Folders Inbox Sent items Deleted items Custom folders Inbox – new messages as well as messages that have been read Outbox – messages not yet sent Sent items – messages that have been sent (moved here from outbox) Deleted items – messages deleted from any folder Custom folders – additional folders created by the user
An E-mail Address Consists of user name and host computer justinrscott.weebly.com Requires the @ sign Can omit host computer when logged onto the same network Point 1: Every e-mail address is unique and consists of two parts, a user name and a host computer; e.g., yourname@anyschool.edu Point 2: The @ sign is required Point 3: The host computer can be omitted if you are logged onto the same network or host computer
Obtaining an E-mail Account You need an e-mail server You can obtain an account in school You can pay for an account through an ISP You can get free accounts: www.hotmail.com www.yahoo.com Point 1: An e-mail server works as a post office and enables you to send and receive e-mail. Point 2: Schools provide e-mail accounts to students to facilitate contact. Point 3: Service providers like AOL and CompuServe provide e-mail services along with internet access. Point 4.
Privacy and Terms of Agreement E-mail is less private than US mail If you need privacy, send a letter Every mail server has terms that you must agree to: No copyright infringements No harassing or stalking No junk mail or spamming No intentional sending of viruses
Additional E-mail Capabilities Address Book Contains e-mail addresses of your frequent contacts Enables you to enter an alias; e.g., “Sunshine” Distribution List A set of e-mail addresses stored under a single name Ideal for your professor to e-mail the class
E-mail Protocols POP Client – Post Office Protocol Client Lets you work without being connected to mail server Upload to send mail - Download to read mail Allows almost any e-mail program to access e-mail from server IMAP – Internet Message Access Protocol Permits a "client" e-mail program to access remote message stores as if they were local Enables user to access messages from more than one computer
Be Aware of Computer Viruses A computer virus is an actively infectious program Viruses are transmitted from: An infected disk An attachment in an e-mail message A file that was downloaded from the Internet. Point 1: A computer virus is an actively infectious program that attaches itself to various files and has the ability to alter the way your computer works. Point 2: Viruses are transmitted from an infected floppy disk, from an attachment in an e-mail message, or via a file that was downloaded from the Internet.
Protect Yourself An antivirus program can automatically detect a virus should it threaten your system Norton Antivirus at www.symantec.com McAfee Antivirus at www.mcafee.com The effect of either program depends on continual updating as new viruses are discovered daily E-mails are a very good way to communicate. They are less expensive than phone calls, and they are instantaneous. But you must be careful to not get in the trap of viruses, spam, etc. Prepare yourself accordingly to avoid those things.