SlideShare a Scribd company logo
1 of 16
Download to read offline
Email

Electronic mail, or
e-mail, is the most
frequently
used
service
on
the
Internet

Seema Sirpal
Delhi University Computer Centre
Why use Email

You can send a message any time, any
where.
You can send the same message to several
people at the same time.
You can forward information to co-workers
without retyping it.
Why use Email

You can save time. E-mail is fast, usually
taking no more than a few minutes to be
received.
You can e-mail electronic documents and the
recipients can then edit and return revised
versions.
You can send messages around the world
as easily as to co-workers in the next office.
How Email works on the Internet
Like a postal address, an e-mail
address specifies the destination of
an electronic message.
An Internet e-mail address looks like
this: user name@domain name
The user name is a unique name
that identifies the recipient.
The domain name is the address.
Many people can share the same
domain name.
How Email works on the Internet

E-mail is sent and received through electronic "post
offices" known as mail servers.
To read your e-mail, you must retrieve it from the
mail server.
Once you enter the address of the recipient,
compose your message, and click Send, your e-mail
software handles the delivery.
How Reliable is Email
If the message doesn't reach
its destination the first time, the
mail server sends it again.
If the message is not
delivered, you usually receive a
message
explaining
the
problem, along with the full
text of the original message.
You can correct the problemusually an incorrect e-mail
address--and resend it.
Anatomy of an Email message
To contains the e-mail addresses of
the recipients. This is a mandatory
entry.
CC, short for Carbon Copy. This is
optional.
BCC:, short for Blind Carbon
Copy, contains the e-mail addresses
of other recipients who receive
copies, but their names and
addresses are hidden from the other
recipients. This is optional.
Anatomy of an Email message
Subject contains the main topic
of the message. Keep this brief.
Recipients see this in their summary
of incoming e-mails.
Attachment contains the names
of files that you may be sending, for
example,
a
word-processing
document or a spreadsheet.
Body contains the message itself,
Signatures
E-mail can include a signature at the
end of the message. An e-mail signature
is not your hand-written signature.
Like a business card, an e-mail signature
can include your name, title, telephone and
fax numbers, street address, and e-mail
address.
It saves time, you don’t have to retype
the information each time you send a
message. Clicking the feature automatically
adds it to the message.
Reading Email messages
Messages are organized in folders
or boxes. Received mail is kept in an
Inbox; outgoing mail is stored in an
Outbox; sent mail is filed in a Sent
box.
To read an e-mail, double-click on
the envelope icon or the Subject
line of the message. This opens a new
window containing the header and
body of the message.
Replying to Email messages
The window with the e-mail you are
reading has a Reply or Re button. Click on
this button to open a new window. The To
and Subject lines are automatically filled
in with the e-mail address of the sender
and the subject of the message.
the text of the original e-mail appears in
the body of the reply, usually marked in a
different font or color, or with a special
character, such as the greater than sign
(>) at the beginning of each line.
Sending files as attachment
e-mail programs allow you to attach
word-processing
documents,
spreadsheets, graphics, audio, video,
and other electronic files to your
message.
To attach a file:
Click on the Attachment or
Include File icon, often represented
by a paper clip. Select the file you
want from the file attachment
window.
Opening attachment

Open or save an attached file by
double-clicking on the icon
for the file.

Caution: Your computer can contract a virus when you open an
attached file. If you do not know or trust the person who sent the
e-mail, delete the attachment to avoid infection
Managing your Messages
You may create folders so you can
file your messages.
You can drag a message from the
Inbox or Sent Mail box to another
folder.
When you delete a message, it is
moved to your Trash or Deleted
Mail folder. The message still exists,
however. You may want to delete all
the files from the Trash periodically.
Managing your Addresses
E-mail programs have an address
book feature where you can record
the e-mail addresses and other
information of people you contact
frequently.
By using the address book, you
won't have to retype an e-mail
address each time you want to send a
message. This saves time and
avoids returned mail due to typing
mistakes.
Managing your Addresses
• With most software, you can create
a set of e-mail addresses called a
group. When you address a message
with a group, the message is
automatically addressed to all the
people in the group. This is
sometimes referred to as a mailing
list.
•As your list grows, use the Search
or Find function in the address book
to locate an e-mail address based on
a person's first or last name.

More Related Content

What's hot

Email - electronic mail
Email - electronic mailEmail - electronic mail
Email - electronic mailkundana
 
Email explained in 2 minutes
Email explained in 2 minutesEmail explained in 2 minutes
Email explained in 2 minutesPauly Ting
 
Email Ppt
Email PptEmail Ppt
Email PptDyern
 
Email use in business ppt
Email use in business pptEmail use in business ppt
Email use in business pptJason Roy
 
Introduction to Email
Introduction to EmailIntroduction to Email
Introduction to EmailMade Aditya
 
Email Communication
Email CommunicationEmail Communication
Email Communicationjjs1981
 
E Mail & Spam Presentation
E Mail & Spam PresentationE Mail & Spam Presentation
E Mail & Spam Presentationnewsan2001
 
Types of business communication (Email)
Types of business communication (Email)Types of business communication (Email)
Types of business communication (Email)Pushkar Joshi
 
Email Etiquette_ OutworX
Email Etiquette_ OutworXEmail Etiquette_ OutworX
Email Etiquette_ OutworXpanjiarpraveen
 
Email etiquette and effective email use guidance for staff and associates
Email etiquette and effective email use guidance for staff and associatesEmail etiquette and effective email use guidance for staff and associates
Email etiquette and effective email use guidance for staff and associatesThe Pathway Group
 

What's hot (20)

Email - electronic mail
Email - electronic mailEmail - electronic mail
Email - electronic mail
 
Email explained in 2 minutes
Email explained in 2 minutesEmail explained in 2 minutes
Email explained in 2 minutes
 
Email Ppt
Email PptEmail Ppt
Email Ppt
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
Email basics
Email basicsEmail basics
Email basics
 
Email
EmailEmail
Email
 
Email use in business ppt
Email use in business pptEmail use in business ppt
Email use in business ppt
 
Introduction to Email
Introduction to EmailIntroduction to Email
Introduction to Email
 
Email etiquette
Email etiquetteEmail etiquette
Email etiquette
 
Email Communication
Email CommunicationEmail Communication
Email Communication
 
E Mail Basic
E Mail BasicE Mail Basic
E Mail Basic
 
E Mail & Spam Presentation
E Mail & Spam PresentationE Mail & Spam Presentation
E Mail & Spam Presentation
 
Types of business communication (Email)
Types of business communication (Email)Types of business communication (Email)
Types of business communication (Email)
 
Email Basics
Email BasicsEmail Basics
Email Basics
 
Email Etiquette_ OutworX
Email Etiquette_ OutworXEmail Etiquette_ OutworX
Email Etiquette_ OutworX
 
Email etiquette and effective email use guidance for staff and associates
Email etiquette and effective email use guidance for staff and associatesEmail etiquette and effective email use guidance for staff and associates
Email etiquette and effective email use guidance for staff and associates
 
How Email Works
How Email WorksHow Email Works
How Email Works
 
Introduction to Gmail
Introduction to GmailIntroduction to Gmail
Introduction to Gmail
 
E mail features
E mail featuresE mail features
E mail features
 
Email: Introduction
Email: IntroductionEmail: Introduction
Email: Introduction
 

Viewers also liked

Send email attachment using smtp in mule esb
Send email attachment using smtp  in mule esbSend email attachment using smtp  in mule esb
Send email attachment using smtp in mule esbAnand kalla
 
Send email attachment using smtp in mule esb
Send email attachment using smtp in mule esbSend email attachment using smtp in mule esb
Send email attachment using smtp in mule esbSreekanth Kondapalli
 
Creating a basic database access 2007 ecdl
Creating a basic database access 2007 ecdlCreating a basic database access 2007 ecdl
Creating a basic database access 2007 ecdlRichard Butler
 
Ecdl v5 module 6 print
Ecdl v5 module 6 printEcdl v5 module 6 print
Ecdl v5 module 6 printMichael Lew
 
ECDL Level 2 - Introduction for students
ECDL Level 2 - Introduction for studentsECDL Level 2 - Introduction for students
ECDL Level 2 - Introduction for studentsDavid Drake
 
Microsoft Access Notes 2007 Ecdl
Microsoft Access Notes 2007 EcdlMicrosoft Access Notes 2007 Ecdl
Microsoft Access Notes 2007 EcdlRichard Butler
 
Ecdl v5 module 7 print
Ecdl v5 module 7 printEcdl v5 module 7 print
Ecdl v5 module 7 printMichael Lew
 
Ecdl v5 module 3 print
Ecdl v5 module 3 printEcdl v5 module 3 print
Ecdl v5 module 3 printMichael Lew
 
Ecdl v5 module 4 print
Ecdl v5 module 4 printEcdl v5 module 4 print
Ecdl v5 module 4 printMichael Lew
 
ECDL Module 7: Web Browsing and Communication
ECDL Module 7: Web Browsing and Communication ECDL Module 7: Web Browsing and Communication
ECDL Module 7: Web Browsing and Communication Hassan Ayad
 
Ecdl v5 module 2 print
Ecdl v5 module 2 printEcdl v5 module 2 print
Ecdl v5 module 2 printMichael Lew
 
Ecdl v5 module 1 print
Ecdl v5 module 1 printEcdl v5 module 1 print
Ecdl v5 module 1 printMichael Lew
 
Computers in Medical field
Computers in Medical fieldComputers in Medical field
Computers in Medical fieldAvinash
 
Uses of computer in various fields of life
Uses of computer in various fields of lifeUses of computer in various fields of life
Uses of computer in various fields of lifeAftab Badshah
 
Email - Electronic Mail
Email - Electronic MailEmail - Electronic Mail
Email - Electronic MailPeter R. Egli
 

Viewers also liked (19)

Send email attachment using smtp in mule esb
Send email attachment using smtp  in mule esbSend email attachment using smtp  in mule esb
Send email attachment using smtp in mule esb
 
Send email attachment using smtp in mule esb
Send email attachment using smtp in mule esbSend email attachment using smtp in mule esb
Send email attachment using smtp in mule esb
 
The Art Of TeleWorking
The Art Of TeleWorkingThe Art Of TeleWorking
The Art Of TeleWorking
 
Creating a basic database access 2007 ecdl
Creating a basic database access 2007 ecdlCreating a basic database access 2007 ecdl
Creating a basic database access 2007 ecdl
 
Advance internet tools ppt
Advance internet tools pptAdvance internet tools ppt
Advance internet tools ppt
 
Ecdl v5 module 6 print
Ecdl v5 module 6 printEcdl v5 module 6 print
Ecdl v5 module 6 print
 
ECDL Level 2 - Introduction for students
ECDL Level 2 - Introduction for studentsECDL Level 2 - Introduction for students
ECDL Level 2 - Introduction for students
 
Microsoft Access Notes 2007 Ecdl
Microsoft Access Notes 2007 EcdlMicrosoft Access Notes 2007 Ecdl
Microsoft Access Notes 2007 Ecdl
 
Ecdl v5 module 7 print
Ecdl v5 module 7 printEcdl v5 module 7 print
Ecdl v5 module 7 print
 
Ecdl v5 module 3 print
Ecdl v5 module 3 printEcdl v5 module 3 print
Ecdl v5 module 3 print
 
Ecdl v5 module 4 print
Ecdl v5 module 4 printEcdl v5 module 4 print
Ecdl v5 module 4 print
 
ECDL Module 7: Web Browsing and Communication
ECDL Module 7: Web Browsing and Communication ECDL Module 7: Web Browsing and Communication
ECDL Module 7: Web Browsing and Communication
 
Ecdl v5 module 2 print
Ecdl v5 module 2 printEcdl v5 module 2 print
Ecdl v5 module 2 print
 
Ecdl v5 module 1 print
Ecdl v5 module 1 printEcdl v5 module 1 print
Ecdl v5 module 1 print
 
994187 mod 1
994187 mod 1994187 mod 1
994187 mod 1
 
Computers in Medical field
Computers in Medical fieldComputers in Medical field
Computers in Medical field
 
Uses of computer in various fields of life
Uses of computer in various fields of lifeUses of computer in various fields of life
Uses of computer in various fields of life
 
Email - Electronic Mail
Email - Electronic MailEmail - Electronic Mail
Email - Electronic Mail
 
Ppt on internet
Ppt on internetPpt on internet
Ppt on internet
 

Similar to Another one on Email...

Presentasi Bahasa Inggris " Email "
Presentasi Bahasa Inggris " Email "Presentasi Bahasa Inggris " Email "
Presentasi Bahasa Inggris " Email "Ari Febrianto
 
Internet Tutorial 02
Internet  Tutorial 02Internet  Tutorial 02
Internet Tutorial 02dpd
 
E-mails and Attachments
E-mails and AttachmentsE-mails and Attachments
E-mails and AttachmentsMAILYNVIODOR1
 
EMAIL INTRODUCTION (ALL FEATURES INCLUDED).pptx
EMAIL INTRODUCTION (ALL FEATURES INCLUDED).pptxEMAIL INTRODUCTION (ALL FEATURES INCLUDED).pptx
EMAIL INTRODUCTION (ALL FEATURES INCLUDED).pptxpkm16499
 
Benefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer CentreBenefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer Centrejatin batra
 
History of Email PowerPoint presentation
History of Email PowerPoint presentationHistory of Email PowerPoint presentation
History of Email PowerPoint presentationSaad Zeeshan
 
E -MAIL AND INTERNET
E -MAIL AND INTERNETE -MAIL AND INTERNET
E -MAIL AND INTERNETProf Ansari
 
Tutorial 2 - Basic Communication on the Internet: Email
Tutorial 2 - Basic Communication on the Internet: EmailTutorial 2 - Basic Communication on the Internet: Email
Tutorial 2 - Basic Communication on the Internet: Emaildpd
 
Electronic mail : Introduction, drafting effective email, email etiquettes
Electronic mail : Introduction, drafting effective email, email etiquettesElectronic mail : Introduction, drafting effective email, email etiquettes
Electronic mail : Introduction, drafting effective email, email etiquettesDinesh Sharma
 
KNOWLEDGE MANAGEMENT
KNOWLEDGE MANAGEMENTKNOWLEDGE MANAGEMENT
KNOWLEDGE MANAGEMENTkaranjae
 
USING AN E-MAIL PROGRAM-2.pptx
USING AN E-MAIL PROGRAM-2.pptxUSING AN E-MAIL PROGRAM-2.pptx
USING AN E-MAIL PROGRAM-2.pptxRazaMukhtar1
 
Pranavi verma-it 402 class ix-unit 11_presentation
Pranavi verma-it 402 class ix-unit 11_presentationPranavi verma-it 402 class ix-unit 11_presentation
Pranavi verma-it 402 class ix-unit 11_presentationPranaviVerma
 
Pranavi verma-class-9-email-messaging
Pranavi verma-class-9-email-messagingPranavi verma-class-9-email-messaging
Pranavi verma-class-9-email-messagingPranaviVerma
 

Similar to Another one on Email... (20)

Presentasi Bahasa Inggris " Email "
Presentasi Bahasa Inggris " Email "Presentasi Bahasa Inggris " Email "
Presentasi Bahasa Inggris " Email "
 
Internet Tutorial 02
Internet  Tutorial 02Internet  Tutorial 02
Internet Tutorial 02
 
E-mails and Attachments
E-mails and AttachmentsE-mails and Attachments
E-mails and Attachments
 
EMAIL INTRODUCTION (ALL FEATURES INCLUDED).pptx
EMAIL INTRODUCTION (ALL FEATURES INCLUDED).pptxEMAIL INTRODUCTION (ALL FEATURES INCLUDED).pptx
EMAIL INTRODUCTION (ALL FEATURES INCLUDED).pptx
 
Email
EmailEmail
Email
 
Benefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer CentreBenefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer Centre
 
History of Email PowerPoint presentation
History of Email PowerPoint presentationHistory of Email PowerPoint presentation
History of Email PowerPoint presentation
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
Documenting Email as Part of the Client File
Documenting Email as Part of the Client FileDocumenting Email as Part of the Client File
Documenting Email as Part of the Client File
 
E‑mail
E‑mailE‑mail
E‑mail
 
E -MAIL AND INTERNET
E -MAIL AND INTERNETE -MAIL AND INTERNET
E -MAIL AND INTERNET
 
Tutorial 2 - Basic Communication on the Internet: Email
Tutorial 2 - Basic Communication on the Internet: EmailTutorial 2 - Basic Communication on the Internet: Email
Tutorial 2 - Basic Communication on the Internet: Email
 
Electronic mail : Introduction, drafting effective email, email etiquettes
Electronic mail : Introduction, drafting effective email, email etiquettesElectronic mail : Introduction, drafting effective email, email etiquettes
Electronic mail : Introduction, drafting effective email, email etiquettes
 
KNOWLEDGE MANAGEMENT
KNOWLEDGE MANAGEMENTKNOWLEDGE MANAGEMENT
KNOWLEDGE MANAGEMENT
 
Using E-mail In The Office
Using E-mail In The OfficeUsing E-mail In The Office
Using E-mail In The Office
 
Filing Client Email
Filing Client EmailFiling Client Email
Filing Client Email
 
USING AN E-MAIL PROGRAM-2.pptx
USING AN E-MAIL PROGRAM-2.pptxUSING AN E-MAIL PROGRAM-2.pptx
USING AN E-MAIL PROGRAM-2.pptx
 
Pranavi verma-it 402 class ix-unit 11_presentation
Pranavi verma-it 402 class ix-unit 11_presentationPranavi verma-it 402 class ix-unit 11_presentation
Pranavi verma-it 402 class ix-unit 11_presentation
 
Pranavi verma-class-9-email-messaging
Pranavi verma-class-9-email-messagingPranavi verma-class-9-email-messaging
Pranavi verma-class-9-email-messaging
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email Etiquette
 

Recently uploaded

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

Another one on Email...

  • 1. Email Electronic mail, or e-mail, is the most frequently used service on the Internet Seema Sirpal Delhi University Computer Centre
  • 2. Why use Email You can send a message any time, any where. You can send the same message to several people at the same time. You can forward information to co-workers without retyping it.
  • 3. Why use Email You can save time. E-mail is fast, usually taking no more than a few minutes to be received. You can e-mail electronic documents and the recipients can then edit and return revised versions. You can send messages around the world as easily as to co-workers in the next office.
  • 4. How Email works on the Internet Like a postal address, an e-mail address specifies the destination of an electronic message. An Internet e-mail address looks like this: user name@domain name The user name is a unique name that identifies the recipient. The domain name is the address. Many people can share the same domain name.
  • 5. How Email works on the Internet E-mail is sent and received through electronic "post offices" known as mail servers. To read your e-mail, you must retrieve it from the mail server. Once you enter the address of the recipient, compose your message, and click Send, your e-mail software handles the delivery.
  • 6. How Reliable is Email If the message doesn't reach its destination the first time, the mail server sends it again. If the message is not delivered, you usually receive a message explaining the problem, along with the full text of the original message. You can correct the problemusually an incorrect e-mail address--and resend it.
  • 7. Anatomy of an Email message To contains the e-mail addresses of the recipients. This is a mandatory entry. CC, short for Carbon Copy. This is optional. BCC:, short for Blind Carbon Copy, contains the e-mail addresses of other recipients who receive copies, but their names and addresses are hidden from the other recipients. This is optional.
  • 8. Anatomy of an Email message Subject contains the main topic of the message. Keep this brief. Recipients see this in their summary of incoming e-mails. Attachment contains the names of files that you may be sending, for example, a word-processing document or a spreadsheet. Body contains the message itself,
  • 9. Signatures E-mail can include a signature at the end of the message. An e-mail signature is not your hand-written signature. Like a business card, an e-mail signature can include your name, title, telephone and fax numbers, street address, and e-mail address. It saves time, you don’t have to retype the information each time you send a message. Clicking the feature automatically adds it to the message.
  • 10. Reading Email messages Messages are organized in folders or boxes. Received mail is kept in an Inbox; outgoing mail is stored in an Outbox; sent mail is filed in a Sent box. To read an e-mail, double-click on the envelope icon or the Subject line of the message. This opens a new window containing the header and body of the message.
  • 11. Replying to Email messages The window with the e-mail you are reading has a Reply or Re button. Click on this button to open a new window. The To and Subject lines are automatically filled in with the e-mail address of the sender and the subject of the message. the text of the original e-mail appears in the body of the reply, usually marked in a different font or color, or with a special character, such as the greater than sign (>) at the beginning of each line.
  • 12. Sending files as attachment e-mail programs allow you to attach word-processing documents, spreadsheets, graphics, audio, video, and other electronic files to your message. To attach a file: Click on the Attachment or Include File icon, often represented by a paper clip. Select the file you want from the file attachment window.
  • 13. Opening attachment Open or save an attached file by double-clicking on the icon for the file. Caution: Your computer can contract a virus when you open an attached file. If you do not know or trust the person who sent the e-mail, delete the attachment to avoid infection
  • 14. Managing your Messages You may create folders so you can file your messages. You can drag a message from the Inbox or Sent Mail box to another folder. When you delete a message, it is moved to your Trash or Deleted Mail folder. The message still exists, however. You may want to delete all the files from the Trash periodically.
  • 15. Managing your Addresses E-mail programs have an address book feature where you can record the e-mail addresses and other information of people you contact frequently. By using the address book, you won't have to retype an e-mail address each time you want to send a message. This saves time and avoids returned mail due to typing mistakes.
  • 16. Managing your Addresses • With most software, you can create a set of e-mail addresses called a group. When you address a message with a group, the message is automatically addressed to all the people in the group. This is sometimes referred to as a mailing list. •As your list grows, use the Search or Find function in the address book to locate an e-mail address based on a person's first or last name.