Wednesday, April 12, 2023

INTERNET AND EMAIL NOTES

 

MSIMBAZI CENTRE TRAINING INSTITUTE

 INTERNET

It is a large network of networks that covers the whole world and enables millions of computers from different organizations and people to communicate globally.

Importance of Internet

The importance of internet can be seen through its contribution to:-

a)      Research activities

b)      News and information dissemination.

c)      Leisure

d)      Communication.

e)      Business Transactions, etc.

Requirements for Internet Connectivity

(a)   Telecommunication facilities

Internet relies on telecommunication facilities like telephone lines, telephone exchange station and satellite transmission in order to cover the whole world.

(b)   Modem (Modulator-Demodulator)

It is a special digital to analog interface card that changes data from digital to analog so as to be transmitted on telephone lines and on receiving end the data is changed from analog to digital for the computer to understand.

(c)    Internet Service Providers (ISP’s)

These are companies that offer internet services to end users. They provide the Internet services to end users at a fee.

Examples of ISP in Kenya include:

1.      Liquid Telecom

2.      Access Kenya

3.      Zuku

4.      Faiba

5.      Orange Kenya

6.      Safaricom

 

(d)   Internet Software

Internet software help facilitate your access to the Internet. To achieve communication between computers special software called Protocol is needed.

 

INTERNET SERVICES

1.      E-mail

This is the exchange of electronic letters, data and graphics on the     internet.

2.      Electronic Learning (E-learning)

This is learning through interaction with special programs on the computer.

3.      Electronic Commerce (e-commerce)

It refers to buying and selling of goods and services over the internet.

4.      World Wide Web (WWW)

In order to connect a network to the internet, the local area network needs an internet server. This server is given the name world wide web (www) and has all the information which others on the internet access.

 

ACCESSING THE INTERNET

Software applications that enable the user to access information on the internet are called Web Browsers. Examples of web browsers include:  

·         Mozilla Firefox

  • Netscape Navigator  
  • Google Chrome
  • Opera
  • Internet Explorer
  • Netscape Navigator
  • Safari

I    Login/ Sign In

To access a website, type the full address of the website on the address bar, then press the enter key.

Surf/ Browse

Surfing/ Browsing is the process of accessing Internet resources like web pages and websites.

Hyperlinks

A hyperlink is a text or picture on an electronic document that causes other web pages to open when the link is clicked.

Search Engine

This is a program that searches documents for specified keywords and returns a list of the documents where the keywords were found. Examples of search engines include: Google, Yahoo, Bing, Ask, WebCrawler, etc.

 

Downloading

This refers to the process of transferring information from the internet to a local storage e.g. a computer, flash disk, etc.

Uploading

Refers to the process of transferring a file /files from your computer to the Internet.

 

ELECTRONIC MAIL (E-MAIL)

Electronic mail refers to the sending and receiving of electronic letters and documents on the internet.

E-MAIL SOFTWARE

E-mail software falls under communication software that are designed to help the user to read and send individual text documents on the internet so long as the sender and receiver have an e-mail address. Examples of e-mail software include: Gmail, yahoo, hotmail, outlook express, thunderbird, etc.

 

E-MAIL FACILITIES

1.      MAILS

a)      Checking Mail

In order to check mail the user has to open the e-mail account by providing the correct username and password. In e-mail account, click the Inbox command to view a link list of all received mails.

b)     Compose a Mail

Composing implies writing. To compose a message, click the Compose command.

c)      Send Mail

To send mail, type the correct e-mail address of the recipient, and then click Send command.

d)     Forward Mail

A received mail can be forwarded to another recipient. After reading, click the Forward command and then provide the address of the recipient.

2.      FILE ATTACHMENT

E-mail software enables a person to attach other files like pictures, music, movie clips, etc to an e-mail for sharing with others before sending. The source of attached files can be from the hard disk or other storage devices.

3.      ON- LINE MEETING

It is possible to hold an on-line meeting with people by sending mails to them e.g. on-line interviews may involve a person sending electronic mail composed of interview questions to a recipient who can read and answer back.

4.      TELEPHONE MESSAGES

Wireless Access Protocol (WAP) makes it possible to send e-mail to a mobile handset and a mobile message to e-mail account.

5.      CONTACT MANAGEMENT

Most mail programs allow the user to develop an address book which holds contact information like e-mail address of different people.

 

E-MAIL ADDRESS FORMAT

A typical e-mail address would look like this: chemwex@yahoo.com

Chemwex is the username and is usually created by the user during e-mail account registration.

@ is the symbol for “at” which separates the user name from the rest of the address.

Yahoo.com is the name of the host computer in the network i.e. the computer on which the e-mail account is hosted.

Com identifies the type of organization offering a particular service(s) and is called the domain, meaning it is a commercial institution.

 

OTHER COMMONLY USED DOMAINS INCLUDE:

DOMAIN

TYPE

.edu

Educational Institution

.gov

Government Institution

.org

Non- profit making organization

.mil

Military organization

.co

Commercial Institution

.net

An institution or organization providing networking services

.ac

An academic institution

 

E-MAIL COMPOSE WINDOW

A typical e-mail compose window has three basic elements:

1.      HEADER: The e-mail header is made up of the following parts:

(a)   Addresses of the Recipients: The e-mail recipients can be more than one.

(b)   Subject: Presents the topic of the message.

(c)    Attachment: Files attached from other programs such as word processors and spreadsheets.

2.      MESSAGE: This is the content of the email. It is typically short and to the      point. It may include text and graphics.

3.      SIGNATURE: The signature provides additional information about the sender such as full name, address and telephone number. 


Email Attachment

An email attachment is a computer file sent along with an email message. One or more files can be attached to any email message, and be sent along with it to the recipient. This is typically used as a simple method to share documents and images.

History, and technical detail

Originally, ARPANET, UUCP, and Internet SMTP email allowed 7-bit ASCII text only. Text files were emailed by including them in the message body. In the mid 1980s text files could be grouped with UNIX tools such as bundle and shar (shell archive) and included in email message bodies, allowing them to be unpacked on remote UNIX systems with a single shell command.

The COMSYS/MSGDMS system at MIT offered "Enclosures" beginning by 1976. Users inside COMSYS could receive the enclosure file directly. Messages sent to users out of the COMSYS world sent the enclosure as part of the message body, which was useful only for text files.

Attaching non-text files was first accomplished in 1980 by manually encoding 8-bit files using Mary Ann Horton's uuencode, and later using BinHex or xxencode and pasting the resulting text into the body of the message. When the "Attachment" user interface first appeared on PCs in cc: Mail around 1985, it used the uuencode format for SMTP transmission, as did Microsoft Mail later.

Modern email systems use the MIME standard, making email attachments more utilitarian and seamless. This was developed by Nathaniel Borenstein and collaborator Ned Freed - with the standard being officially released as RFC2045 in 1996.

With MIME, a message and all its attachments are encapsulated in a single multipart message, with base64 encoding used to convert binary into 7-bit ASCII text - or on some modern mail servers, optionally full 8-bit support via the 8BITMIME extension.

Size limits

Email standards such as MIME do not specify any file size limits, but in practice email users will find that they cannot successfully send very large files across the Internet.

This is because of a number of potential limits:

  • Mail systems often arbitrarily limit the size their users are allowed to submit.
  • A message will often pass through several mail transfer agents to reach the recipient. Each of these has to store the message before forwarding it on, and may therefore also impose size limits.
  • The recipient mail system may reject incoming emails with attachments over a certain size.

The result is that while large attachments may succeed internally within a company or organization, they may not when sending across the Internet.

As an example, when Google's Gmail service increased its arbitrary limit to 25MB it warned that: "you may not be able to send larger attachments to contacts who use other email services with smaller attachment limits".

Also note that all these size limits are based, not on the original file size, but the MIME-encoded copy. The common Base64 encoding adds about 37% to the original file size, meaning that an original 20MB file could exceed a 25MB file attachment limit. A 10MB email size limit would require that the size of the attachment files is actually limited to about 7MB.

Malware

See also: Spamming

A lot of malware is distributed via email attachments with some even considering such to be the main vector for cyberattacks on businesses. Users are advised to be extremely cautious with attachments and to not open any attachments that are not from a trusted source and expected − even if the sender is in their address book as their account might have been taken over or misused. While many email servers scan attachments for malware and block dangerous filetypes, this should not be relied upon − especially as such cannot detect zero-day exploits.

Dangerous file types

Email users are typically warned that unexpected email with attachments should always be considered suspicious and dangerous, particularly if not known to be sent by a trusted source. However, in practice this advice is not enough – "known trusted sources" were the senders of executable programs creating mischief and mayhem as early as 1987 with the mainframe-based Christmas Tree EXEC.

Since the ILOVEYOU and Anna Kournikova worms of 2000 and 2001, email systems have increasingly added layers of protection to prevent potential malware. Now, many block certain types of attachments.



 ATTACHING FILES INTO AN E-MAIL

1.      Click the Attachment button on the toolbar.

2.      In the Dialog box that appears, select the file/ files to attach.

 

3.      Click Attach button to attach the files.

 

Share:

0 comments:

Post a Comment