Question

In: Computer Science

12. When you send someone an e-mail address, it travels across the Internet to the ____________________...

12. When you send someone an e-mail address, it travels across the Internet to the ____________________ e-mail server at your ISP, then to the incoming e-mail server at your recipient's ISP.

Solutions

Expert Solution

When you send someone an e-mail address, it travels across the Internet to the SMTP e-mail server at your ISP, then to the incoming e-mail server at your recipient's ISP.

Explanation: Outgoing mail servers are called SMTP ( Simple Mail Transfer Protocol) Servers.

  • When the sender hits the SEND email button, the email client (GMAL/Outlook) connects us to sender's domain's SMTP server.
  • The email client then communicates with the SMTP server providing all the details like sender's and recipient's email address, attachments, body of the message etc.
  • The SMTP server processes the receiver's email address, if it is the same domain, the mail is routed over same POP3 or IMAP and no routing servers are needed.
  • But if the sender's domain name is different, then SMTP connects to Domain Name Server ( DNS) and translates receiver's domain name to an IP address.
  • Now, the email is routed along a series of SMTP servers till the receiver's SMTP server is reached.
  • This incoming email is scanned by the receiver's SMTP server and forwarded to the receiver's domain POP3 / IMAP and then placed in the receiver's email client.

Related Solutions

The controller of a small business received the following e-mail with an authentic-looking e-mail address and...
The controller of a small business received the following e-mail with an authentic-looking e-mail address and logo: From: Big Bank [[email protected]] To: Justin Lewis, Controller, Small Business USA Subject: Official Notice for all users of Big Bank! Due to the increased incidence of fraud and identity theft, we are asking all bank customers to verify their account information on the following web page: www.antifraudbigbank.com Please confirm your account information as soon as possible. Failure to confirm your account information will...
Project Title: Creating Company E-mail and WIFI / Internet Use Policies Attached you will find a...
Project Title: Creating Company E-mail and WIFI / Internet Use Policies Attached you will find a description of your final project assignment
Spam is of concern to anyone with an e-mail address. Several companies offer protection by eliminating...
Spam is of concern to anyone with an e-mail address. Several companies offer protection by eliminating spam e-mails as soon as they hit an inbox. To examine one such product, a manager randomly sampled his daily emails for 50 days after installing spam software. A total of 374 e-mails were received, of which 15 were spam. Is there evidence that the proportion of spam getting through is greater than 2%? α = 0.10 a. State your hypotheses. b. Which hypothesis...
In David Crystal's book "Language and the Internet" in chapter 4 (The language of e-mail) what...
In David Crystal's book "Language and the Internet" in chapter 4 (The language of e-mail) what is the main idea in this chapter?
1- When you send a message out to somebody on the same LAN, the target Mac address is needed
True or False:1- When you send a message out to somebody on the same LAN, the target Mac address is needed •2- When you send a message out to somebody on the same LAN, the target IP address is needed •3-When you send a message out to somebody on the same LAN, the target Mac address and IP address are needed •4- When you send a message out to somebody on the Internet, the target Mac address is needed •5-...
Must be in C#: 7. E-MAIL ADDRESS BOOK Create a Windows Forms Application with a class...
Must be in C#: 7. E-MAIL ADDRESS BOOK Create a Windows Forms Application with a class named PersonEntry. The PersonEntry class should have properties for a person’s name, e-mail address, and phone number. Also, create a text file that contains the names, e-mail addresses, and phone numbers for at least five people. When the application starts, it should read the data from the file and create a PersonEntry object for each person’s data. The PersonEntry objects should be added to...
Describe the process that occurs when the sound wave energy travels across the room.
Describe the process that occurs when the sound wave energy travels across the room.
You have been asked to audit your company security plan as it applies to acceptable employee use of the Internet and e-mail.
You have been asked to audit your company security plan as it applies to acceptable employee use of the Internet and e-mail. Write a preliminary audit plan, including scope, objectives, and audit steps.
Identify how technology applications such as e-mail, the Internet, telecommunications, and social networking can both facilitate...
Identify how technology applications such as e-mail, the Internet, telecommunications, and social networking can both facilitate and hinder personal time management.
Identify how technology applications such as e-mail, the Internet, telecommunications, and social networking can both facilitate...
Identify how technology applications such as e-mail, the Internet, telecommunications, and social networking can both facilitate and hinder personal time management
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT