170 likes | 595 Views
E-Mail. By: Crystal Rodriguez & Tabitha Cox. How E-Mail Works. Sending an e-mail is now an days today’s way to write a quick letter or notice to someone. Before you send & receive e-mail you mush first have: mail software, an e-mail account, and access to a mail server.
E N D
E-Mail By: Crystal Rodriguez & Tabitha Cox
How E-Mail Works • Sending an e-mail is now an days today’s way to write a quick letter or notice to someone. • Before you send & receive e-mail you mush first have: mail software, an e-mail account, and access to a mail server. • To send a message to your friend (Mike) you would open up your e-mail address, type in your message in the text box below, and click send.
Accessing E-Mail • Accessing e-mail this requires having a valid account on a mail server, access to the internet, and either a dedicated e-mail application, a web browser, or a some alternative device, like a cell phone. • There're various ways you can get a valid account in many ways, most common are by contacting with an ISP through your work or school.
Anatomy of an E-mail Address • E-mail addresses have to key components, a user name and a domain, separated by the @ symbol, this is much like the original e-mail address format….. Examples: • scott@totalsem.com • jeffery@hotmail.com • vivian@jerigan.com • A user name can be anything from your name to a nickname, these are called domain names they provide a great subtitle for IP addresses.
Dedicated e-mail software • Every computer operating system comes bundled with one or more dedicated email applications. You can download free or inexpensive programs from the internet.
Sending E-mail • Sending an e-mail takes a few simple steps: • Start a new message • Fill in the fields • Enhance the content by attaching a file or adding links to Web sites • Finally click the new mail link
Components of an E-Mail Message Virtual E-Mail Programs • Virtually all e-mail programs use a similar window for composing an e-mail message.
Web based e-mail • Many companies offer web based email accounts that you access using, not a dedicated application, but with the web browsers, such as internet explorer. • Most web based email accounts cost you nothing, give you a certain accounts of stored space on the internet, and enable you to access your mail from many places. • Many web based mail services store your messages, so you can access them again and again, from many different locations.
Accessing your mail You don’t necessarily have to check your e-mail throughout your computer. Cell phones and personal digital assistants (PDAs) commonly have e-mail as one of their many features. Most common cell phones get a unique e-mail address assigned by the cell phone provider to send and receive e-mail messages. PDAs usually sync up with a regular computer and send/receive e-mail via a dedicated e-mail program. It’s a lot better to have in your hand mail you can check at your given time instead of having to be tied down to a computer all day waiting for a message to come in.
Managing Addresses • Every e-mail program has an address book that enables you to collect and keep track of people you want to message, just like an old fashioned paper address book for telephone numbers. • Its very organized and officiate instead of trying to go back and add the person’s e-mail address each time your writing a Message.
Contacts • It might seem like a lot of extra work at first to fill in all the little details on a contact, but the payoff can be great, especially in a business setting. Aside from the usual email, phone address and business and names contact information can include details like nick names birth dates kids names and more.
Editing and Deleting Contacts • In order to edit a contact entry you must first find it in your address book, then you want to double click it, and the new message window will again open so you can make your changes. To delete a contact, select it in the address book and press (DELETE) on your keyboard or click the delete button in the address book. A lick caption will pop up and ask if your sure, click on the yes button and the contact is now gone.
Exploring the Address book • I you have a copy handy open up Outlook express and click on the address book fill out a contact entry for you that includes details that people should know but nothing private. You wouldn’t want people to look in to your personal information. People out there can be looking to take advantage of your information you sent out in public against you.
Embed Multimedia • You can embed, rather than attach pictures sounds or lower level animation into the body of signature an e-mail in some e-mail programs to embed, don’t drag and drop. Go to another insert and select image or another option. • When your done composing an e-mail, click the send button to send it along to your mail server and eventually to your recipient's mail servers.
Handling Incoming E-mail • When you get an e-mail message in your inbox, you can do quit a few things with it. You can view the contents of the message, open or save any attach files, or respond in some fashion. If you have a lot of e0mail in your inbox, you can sort by sender or by subject, or when a full search of key words.
International Network Mail On an international network, both the sender and the recipient log into the same server. If you use a computer at school to send an e-mail to a friend in your school, the message goes from your computer to your email server. Then your friend logs on to the same server and downloads her mail, remember the message will never leave the network. The mail server will always make sure that nobody else will grab the wrong e-mail. How? -Because it knows everybody on the network and the server has a list of all the user names and passwords.
E-Mail over the Internet • Sending an e-mail message over the Internet requires a more complicated process than internal mail, because no single server in the world could handle all the e-mail address and traffic out there. • The internet is a network of networks that earlier that include many thousands of servers and each network has its own unique identity.