Living Online
 
| ClearyWeb | Home

Email Assignments 1 | Email Assignments 2 | Calendar | Tasks

E-mail is a method of composing, sending, storing, and receiving messages over electronic communication systems. All accounts should be password protected. A password is a group of letters and/or numbers to allow the user access.

E-Mail Address Components

An e-mail address is an address used to send and receive electronic mail and is composed of three elements:

  • Your user name or account name on your mail server
  • The "at" (@) symbol
  • The domain name of the mail server on which you have an e-mail account.

Web based e-mail is an e-mail service accessed via a Web page. Popular webmail providers are Gmail. YahoolMail, Hotmail, and AOL. Client based e-mail such as Microsoft Outlook and GroupWise is software added to a particular computer.

Tips for composing professional e-mail messages

It is important to use the Internet responsibly. This is why the essential practice of Netiquette has developed over time.

Netiquette is a set of behaviors that should be adhered to when you use the Internet. The job of policing the Net is up to those who use it. Because email messages do not show facial expressions or vocal inflections, it is imperative that you write with clarity and courtesy.

Some E-mail Etiquette Hints, Tips, and Cautions

  • Using all capital letters gives a word very strong emphasis. It is like SHOUTING!
  • Follow accepted rules of written communication (grammar, spelling, and so on).
  • Signature "smileys" or emoticons can help to indicate a mood or tone of voice. They are a combination of special characters such as:
    • :-) I'm happy
    • ;-) Just joking
    • :-( I'm unhappy
  • Common Net acronyms include:
    • FAQ - Frequently asked questions
    • FYI - For your information
    • BTW - By the way
    • LOL - Laughing out loud
  • E-mail is not protected and not private. Your message can be forwarded or copied to anyone, anywhere. Be careful what you write.
  • Never send chain letters
  • Attachments, files that are sent as part of an e-mail message, should not be over 1M. (Remember a byte is 8 bits which is used to measure storage or file size on a computer.)
  • Avoid flaming which is hostile and insulting messages through either e-mail or other social networking avenues. These messages are called "flames." Calm down before you write.
  • Use the subject line or Re: line
  • cc: carbon copy refers to the practice of sending copy of a message to another person.
  • bc: blind carbon copy refers to the practice of sending a message to multiple recipients in such a way that what they receive does not contain the complete list of recipients.
  • Keep messages concise
  • If you don't know the sender and it has a "fw:" delete the message

Spam is electronic junk mail. Usually it is from someone who wants to advertise a product or service. Webopedia says that "while the most widely recognized form of spam is e-mail spam, the term is applied to similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, wiki spam, mobile phone messaging spam, Internet forum spam and junk fax transmissions.

  • When you don't know the sender, delete the message.
  • Do not allow your e-mail address to be included on any online membership directory.
  • Set up multiple e-mail addresses and use one for registering at Web sites.
  • Try a filtering program.

In 2007 the average mail box will receive approximately 4,351 and increase to 4,403 by 2010.   In addition to Spam though there are increasing number in the "choose" to receive from shopping on line.  In 2007 these offers will average 2,715 and will grow to 3,335 by 2010.  So your mail box could receive without the use of our filter on average 7,066 "junk/spam" emails in 2007.  And by 2010 this could increase to 7,738.*

A worm is a program or script that replicates itself and moves through a network, typically traveling by sending new copies of itself via email. Most of today's worms use Microsoft Outlook scripting to email themselves as attachments either to all address book entries or as replies to incoming messages.

Many worms have no negative effect except resource consumption, but some will perform malicious actions.

*Source:http://www.wired.com/techbiz/it/news/2007