pam and the proliferation sutless Because d the origin of of messages sent each
ID: 3744051 • Letter: P
Question
pam and the proliferation sutless Because d the origin of of messages sent each day make it incredibly difficult to track down those responsible for it. To learn more about preventing spam, use the following links: httpsll onguardonline.govL https:/www.spamhaus.org/, http://lwww.spamihilator.comlen/, and bttp:/llwww.mailwasher.net/. Now that you understand some basic information about email, you are ready to start using Gmail, which you will do in Session 2.2. Session 2.1 Quick Check 1. The rules that determine how the Internet handles packets flowing on it are called 2. What are the three parts of an email message? 3. Can you send a Word document with an email message? If so, how? 4. What are the two parts of an email address? What information do they providei 5. Why is it important to delete email messages that you no longer need? 6. What are two strategies for controlling spam? uExplanation / Answer
1) Protocols : Protocols help establish synchronization and communication. These lay down rules which facilitates smooth packet transfer .
2) To, Subject and Body are the three parts of an email message. To is used to specify the recepient email address/es of the message, Subject is a concise line on what the message is about and the Body is used to write the message content
3) Yes. We can send a word document in an email using the attachement option. This option enables us to send files via the email. We choose the attachment option ( which generally looks like a paper clip or tag symbol ), navigate to and select the file we want to transfer (word file in this case) and then send the message
4) Username and Domain Name are the two parts of an email address. The username is a unique string/name that is assigned to identify a specific person. The domain name is the internet designation for the e-mail host, which may be a private site, company, organization, or government entity. Each user name is unique with respect to a specific domain name. Ex. john@microsoft.com, here john is the username and microsoft.com is the domain name
5) Deletion of an email which is not required helps in focussing on important information. It prevent clutter and noisy information that hinders productivity. Moreover, deletion of such useless emails leads to an increase in speed of both the human and the email appliccation as there is less data to deal with.
6) Following are two ways to control spam :
(i) Using the block feature on the email service. Its recommended to block and subsequently report email ids which send spams frequently. We can also click a list of blocked senders
(ii) Always read and identify sender of an email carefully before clicking any link on it. Especially, never ever download atatchments from unrecognized sources. Only click on links when you are sure of the identity of the sender.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.