Question

In: Computer Science

a)examine five basic features of an e mail

a)examine five basic features of an e mail

Solutions

Expert Solution

Some of the basic features of an Email are as follows:

1) Attachment: One can attach Word Documents, Powerpoint presentation, Images or Audio/Video files alongwith the message that is to be sent. This is one of the most useful feature of email.

2) Address Book: The address book stores information about the people with whom you communicate regularly by sending emails. Using address book enables us not to memorize the email addresses of other people.

3) Automatic replies: You can set an automatic reply to a mail received from a particular set of people. With the help of this feature you won't have to type the mail repeatedly and the mail will be automatically sent as a reply to the sender.

4) Auto-Forward of messages: You can auto-forward/redirect a message received from a particular sender to the designated receipent as required.

5) Using signatures: A signature can be added at the end of an email which will include the details of the sender so that the receiver would know about the sender. A signature basically includes Name, Phone number, Designation, etc.

6) Notification if a mail cannot be delivered: Sometimes when you send a mail and if the mentioned email address is incorrect or if it doesn't exist, you will receive a notification that the message cannot be delivered alongwith the reason.  


Related Solutions

The controller of a small business received the following e-mail with an authentic-looking e-mail address and...
The controller of a small business received the following e-mail with an authentic-looking e-mail address and logo: From: Big Bank [[email protected]] To: Justin Lewis, Controller, Small Business USA Subject: Official Notice for all users of Big Bank! Due to the increased incidence of fraud and identity theft, we are asking all bank customers to verify their account information on the following web page: www.antifraudbigbank.com Please confirm your account information as soon as possible. Failure to confirm your account information will...
List and briefly describe some common functions(features) found in UNIX e-mail systems. i.e. capability of using...
List and briefly describe some common functions(features) found in UNIX e-mail systems. i.e. capability of using Bcc, etc..
The following poorly written e-mail tells customers that their e-mail addresses have been hacked. However, the...
The following poorly written e-mail tells customers that their e-mail addresses have been hacked. However, the message is clumsy and fails to include essential information in revealing security breaches to customers. Your Task. List at least seven weaknesses Revise this message using the suggestions you learned in this chapter about security breach messages. To: Kara Khalial [[email protected]] From: Justin Small [[email protected]] Subject: Customer Security Incident at Princeton Payment Systems Cc: Bcc: Companies and individuals across the country are experiencing more...
Examine and analyse the industrial competitiveness of Shopee Malaysia in the e-marketplace applying the Porter Five...
Examine and analyse the industrial competitiveness of Shopee Malaysia in the e-marketplace applying the Porter Five Forces model. (explain in detail)
6.2        Radical Rewrite: Instruction E-Mail—Tips for Avoiding Hackers Your Task. Analyze the following e-mail to be sent...
6.2        Radical Rewrite: Instruction E-Mail—Tips for Avoiding Hackers Your Task. Analyze the following e-mail to be sent by the CEO to all employees. Step 1: Identify five or more weaknesses describing why each is a weakness. Step 2: Revise this e-mail so that it reflects writing techniques you learned in this and previous chapters. To:           Staff Members From:          G. B. Goldman <[email protected]> Subject: Hackers!                 Staff Members: This is to inform you that, like other banks, we are afraid of hackers....
Creating an e-mail Message Class e-mail. How we often communicate today…from Christmas lists, to pick up...
Creating an e-mail Message Class e-mail. How we often communicate today…from Christmas lists, to pick up from the store lists, to-do lists, to one-liner messages…all examples of communication using an e-mail message. Lab Assignment Objectives Understand what is meant by a class object's type and how the type determines the operators and methods that can be applied to the object. Know what a constructor does. Understand how a class corresponds to a namespace such that object method invocations translate to...
Don’ts of Electronic Mail Don’t • Use e-mail to discuss something with a colleague who sits...
Don’ts of Electronic Mail Don’t • Use e-mail to discuss something with a colleague who sits across the aisle or down the hall from you. Take the old-fashioned approach of speaking to each other. • Say anything negative about a boss, friend, or colleague via e-mail. And don’t forward the negative comments of others. • Use e-mail to start or perpetuate a feud. If you get an e-mail that tempts you to respond in a scathing manner, stop yourself. You...
A small company involved in​ e-commerce is interested in statistics concerning the use of​ e-mail. A...
A small company involved in​ e-commerce is interested in statistics concerning the use of​ e-mail. A poll found that 37% of a random sample of 1122 adults, who use a computer at their​ home, work, or​ school, said they do not send or receive​ e-mail. Complete parts a through e. ​a) Find the margin of error for this poll if we want 90​% confidence in our estimate of the percent of American adults who do not use​ e-mail. b.) Explain...
Critically examine the main features of the Australian legal system;
Critically examine the main features of the Australian legal system;
13. Which e-mail protocol transfers information from the mail server to the user's desktop? 14. List...
13. Which e-mail protocol transfers information from the mail server to the user's desktop? 14. List six Internet top level domain suffixes. 15. Which are the three SNMP management modes? 16. Will typing in you browser's Address line the command "http://telnet.westnetinc.com allow FTP access?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT