EMAIL

Find the meaning of the following terms.
 * 1) POP & POP Servers – Post Office Protocol is a set of procedures that allows computers to receive e-mail from a central server. The server holds a client's mail until it is requested by a user, who logs in to the POP3 server with a user name and password. POP3 is the most common form of e-mail distribution service on the Internet. http://www.help2go.com/Tutorials/Internet_Basics/Internet_Glossary.html
 * 2) SMTP & SMTP Servers – SMTP stands for the Simple Mail Transfer. The Simple Mail Transfer Protocol is the set of procedures needed for users to send mail from their networked computer to remote users. The SMTP server accepts a users message and routes it to the chosen destination. SMTP is most-often used in conjunction with POP3 to manage the transfer of e-mail. http://www.help2go.com/Tutorials/Internet_Basics/Internet_Glossary.html
 * 3) CC – CC is a carbon copy of a note sent to an addressee other than the main addressee.http://searchwinit.techtarget.com/sDefinition/0,,sid1_gci211745,00.html
 * 4)  BCC – BCC is the abbreviation for a blind carbon copy that is sent to an addressee that is not visible to the main and carbon copy addressees. []

Subject in e-mail is the title of the e-mail which would appear on the web and when clicked, the whole message can be read by the viewers. If e-mail subjects are not good, the viewers might avoid e-mails which can lead them to miss important notices. http://webword.com/moving/subjectlines.html Attachments are files that are sent together with certain texts, mostly with e-mails. When they are sent, the viewers can open the attachment or files, but sometimes, such attachments include viruses or malware. If the attachment is a binary file or formatted text file, it has to be encoded first and decoded once it’s received. [] **7. Packet Switches** Packet Switches are a method of data transmission that transmits small blocks of data over a channel. It switches data organized into packets and it was initially designed for interactive networking of host computers, supporting computer-to-computer data transfer. http://www.windowsecurity.com/img/upl/Circuit-2.gif http://www.yourdictionary.com/telecom/packet-switch http://www.answers.com/topic/packet-switching IMAP stands for Internet Message Access Protocol is an application layer Internet protocol that allows a local client to access e-mail on a remote server. It provides many benefits such as keeping the information synched across all devices so the information can be viewed everywhere else. For instance, e-mail in IMAP server can manipulate in desktop computer at home, workstation, and laptops without having to transfer messages or files back and forth. []
 * 5. Subject **
 * 6. Attachment**
 * 8. IMAPs **

9. Illustrate how emails are sent and receive media type="youtube" key="YBzLPmx3xTU" height="344" width="425" 10. **Routers** - A router is a device in computer networking that forwards data packets to their destinations, based on their addresses. The work a router does it called routing, which is somewhat like switching, but a router is different from a switch. The latter is simply a device to connect machines to form a LAN. [] 11. **Hubs and Switches** – These simple, affordable but effective small boxes provide a central connection point for the networking of multiple computers. []

12. **Modem** - Modem, short for modulator-demodulator is an electronic device that converts a computer’s digital signals into specific frequencies to travel over telephone or cable television lines. At the destination, the receiving modem demodulates the frequencies back into digital data. Computers use modems to communicate with one another over a network. []

http://inventors.about.com/od/estartinventions/a/email.htm
 * 13. Ray Tomlinson - ** Ray Tomlinson was the first computer engineer to invent an Internet-based e-mail in late 1971.He had initially been experimenting with SNDMSG, a program that the ARPANET programmers used on networked computers to leave messages for one another. Building off of this program, Tomlinson used a file transfer protocol called CYPNET to adapt the SNDMSG program so that e-mails could be sent to any computer on the ARPANET network. Ray Tomlinson chose the @ symbol to indicate which user was at which computer.

[]
 * 14. ADSL ** – The Asymmetric digital subscriber line is a form of DSL broadband communications technology used to connect to the Internet. This form of communication enables more data to be sent over existing copper telephone lines compared to the normal modem lines. ADSL requires a special ADSL modem and the subscribers must be in close geographical locations to the provider’s central office to receive ADSL service.

[|http://searchtelecom.techtarget.com/sDefinition/0,,sid103_gci211706,00.html#]
 * 15. Broadband Connection – ** Broadband usually refers to telecommunication in which a wide band of frequencies is available to transmit information. Due to the wide band of frequencies, information can be sent to numerous channels while concurrently allowing more information to be passed on in a given amount of time.

http://www.webopedia.com/TERM/W/Wi_Fi.html
 * 16. WiFi ** – A networking technology that depends on radio waves to provide wireless high-speed Internet and network connections. This form of connection works with no physical wired links between the sender and the receiver. Therefore, in order to connect to an to one another, computers and devices must be equipped with a wireless network adapter.

http://webopedia.com/TERM/D/dial_up_access.html
 * 17. Dialup ** – Dialup is the connecting of a device to a network through a modem and a public telephone network. This form of connection is quite similar to a phone connection, except for the fact that the parties at the two ends are using computers devices rather than people. Since the Dialup access depends on normal telephone lines, the quality of the connection is not best and the data rates are limited.

[] 19. UTM - Unified threat management (UTM) refers to a comprehensive security product that includes protection against multiple threats. A UTM product typically includes a firewall, antivirus software, content filtering and a spam filter []
 * 18. VPN ** – The Virtual private network, a network that is constructed by using wires to connect nodes, uses encryption and other security measures to ensure that only authorized users can access the network and that data is not intercepted.

20. Parts of an Email Message and What I need to send an Email Message

Blue - DoYup Red - John Green- Chen ​Black - Gina