Chapter 2

Chapter 2 starts off talking about E-mail. As I am very familiar with email, I never knew that email itself has its own protocols such as POP, SMPT, IMAP, and MIME. During my last semester of school, I had to use email multiple times to get in touch with my professors. My understanding of email is mostly self-taught, but my emails were never all over the place. They were properly organized, contained information in the easiest format for the recipient to understand and housed proper netiquette as it is stated in the book. Though I was never formally educated on email, I have used most of the features talked about in the book such as printing an email, filtering certain emails to the junk folder, forwarding a message, replying to messages and deleting a message. As a person that uses an email account, me along with most likely every single email user has received scam messages in the past. We all have seen them, “Congrats, you have won a new iPhone 15, all you have to do is click the link to claim!”. I grow accustomed to receiving them and can easily tell what a scam is and what is not but think of an elderly woman who thinks she won a free vacation, now she has malware on her computer and her information is the wrong hands. 

 

 

< Prev | A | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 9 | 10 | Next >