Question

In: Computer Science

12. When you send someone an e-mail address, it travels across the Internet to the ____________________...

12. When you send someone an e-mail address, it travels across the Internet to the ____________________ e-mail server at your ISP, then to the incoming e-mail server at your recipient's ISP.

Solutions

Expert Solution

When you send someone an e-mail address, it travels across the Internet to the SMTP e-mail server at your ISP, then to the incoming e-mail server at your recipient's ISP.

Explanation: Outgoing mail servers are called SMTP ( Simple Mail Transfer Protocol) Servers.

  • When the sender hits the SEND email button, the email client (GMAL/Outlook) connects us to sender's domain's SMTP server.
  • The email client then communicates with the SMTP server providing all the details like sender's and recipient's email address, attachments, body of the message etc.
  • The SMTP server processes the receiver's email address, if it is the same domain, the mail is routed over same POP3 or IMAP and no routing servers are needed.
  • But if the sender's domain name is different, then SMTP connects to Domain Name Server ( DNS) and translates receiver's domain name to an IP address.
  • Now, the email is routed along a series of SMTP servers till the receiver's SMTP server is reached.
  • This incoming email is scanned by the receiver's SMTP server and forwarded to the receiver's domain POP3 / IMAP and then placed in the receiver's email client.

Related Solutions

The controller of a small business received the following e-mail with an authentic-looking e-mail address and...
The controller of a small business received the following e-mail with an authentic-looking e-mail address and logo: From: Big Bank [[email protected]] To: Justin Lewis, Controller, Small Business USA Subject: Official Notice for all users of Big Bank! Due to the increased incidence of fraud and identity theft, we are asking all bank customers to verify their account information on the following web page: www.antifraudbigbank.com Please confirm your account information as soon as possible. Failure to confirm your account information will...
Project Title: Creating Company E-mail and WIFI / Internet Use Policies Attached you will find a...
Project Title: Creating Company E-mail and WIFI / Internet Use Policies Attached you will find a description of your final project assignment
Spam is of concern to anyone with an e-mail address. Several companies offer protection by eliminating...
Spam is of concern to anyone with an e-mail address. Several companies offer protection by eliminating spam e-mails as soon as they hit an inbox. To examine one such product, a manager randomly sampled his daily emails for 50 days after installing spam software. A total of 374 e-mails were received, of which 15 were spam. Is there evidence that the proportion of spam getting through is greater than 2%? α = 0.10 a. State your hypotheses. b. Which hypothesis...
In David Crystal's book "Language and the Internet" in chapter 4 (The language of e-mail) what...
In David Crystal's book "Language and the Internet" in chapter 4 (The language of e-mail) what is the main idea in this chapter?
1- When you send a message out to somebody on the same LAN, the target Mac address is needed
True or False:1- When you send a message out to somebody on the same LAN, the target Mac address is needed •2- When you send a message out to somebody on the same LAN, the target IP address is needed •3-When you send a message out to somebody on the same LAN, the target Mac address and IP address are needed •4- When you send a message out to somebody on the Internet, the target Mac address is needed •5-...
Describe the process that occurs when the sound wave energy travels across the room.
Describe the process that occurs when the sound wave energy travels across the room.
You have been asked to audit your company security plan as it applies to acceptable employee use of the Internet and e-mail.
You have been asked to audit your company security plan as it applies to acceptable employee use of the Internet and e-mail. Write a preliminary audit plan, including scope, objectives, and audit steps.
Identify how technology applications such as e-mail, the Internet, telecommunications, and social networking can both facilitate...
Identify how technology applications such as e-mail, the Internet, telecommunications, and social networking can both facilitate and hinder personal time management.
Identify how technology applications such as e-mail, the Internet, telecommunications, and social networking can both facilitate...
Identify how technology applications such as e-mail, the Internet, telecommunications, and social networking can both facilitate and hinder personal time management
The Pew Internet and American Life Project reports that young people ages 12-17 send a mean...
The Pew Internet and American Life Project reports that young people ages 12-17 send a mean of 60 text messages per day. A random sample of 40 young people showed a sample mean of 69 texts per day. Assume σ = 28 for the population. Using a significance level of α = 0.05, test whether the population mean number of text messages per day is greater than 60. i. What is the null hypothesis? ii. What is the alternative hypothesis?...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT