Thursday, March 15, 2007

Module 2 Email Task

1. What information about a user's email, the origin of a message, and the path it took, can you glean from an email message?

The user’s email will show their user name and the domain that their email account belongs to.

The origin of a message can sometimes be determined by looking at the end of a user’s email address which can reflect the country of origin eg ‘au’. If the origin of the message is not apparent you can view the ‘message source’ information, normally by selecting message properties.

The ‘message source’ information can also reveal path details including the originating server, the encoding used, the format of any applicable attachments, the time it was sent and the time it was received.


2. In what cases would you find it useful to use the 'cc', 'bcc' and 'reply all functions of email?

The ‘cc’ function is used when you want to include other recipients on an email that you are sending to someone. The reason normally being that the email may also be of some interest or benefit to those included. For example, if I receive an email from a friend regarding cheap holidays to Tahiti, I may send a reply thanking them for the information and in that reply I may ‘cc’ in some other friends who I think might also have an interest in the subject.

Normally, ‘bcc’ is used when you want to include someone in an email that is being sent, so that they may view the information, without the knowledge of the main recipient. I think this function would most often be used in a workplace.

The ‘reply all’ function would most likely be utilized if the information I am sending is of relevance to a large group and I want them to all be aware of it.


3. In what ways can you ensure that an attachment you send will be easily opened by the receiver?

Include the name of the attachment you are sending along with the format type and the operating system that it was created on. If possible, check with the recipient if they have the required software to open the attachment and are using the same operating system. If you are unsure as to whether the person will be able to open the attachment, you can also include the text from the attachment in the main body of your email as ASCII. From memory, I think attachments can also be virus scanned before they are sent so that the recipient can receive information stating that the attachment has passed a security check and is virus free.


4. What sorts of filters or rules do you have set up, and for what purpose?

The only filter I have set up is for anti-spam to prevent unwanted junk mail.


5. How have you organised the folder structure of your email and why?

I have pretty much categorized my folders by creating them based on relevance. I have a personal folder which includes sub-folders for family, friends, items of general interest. Have a studies folder for OUA and Curtin with sub-folders for the different units. Then there are folders for more business related emails and so on. I find this to be the most expedient way of managing my emails, having the ability to easily locate any required information that I may need is a great time saver.


I am familiar with most of what has been covered in the above email tasks. However, I rarely use the source information, probably on occasion have used it more out of curiosity than for any other reason. There could possibly be an instance where I may utilize an emails path information to ascertain its point of origin if it carried a virus infected attachment and was from an unknown sender. Possibly if emails are delayed for any particular reason, it could also be a useful tool to analyze where along it's path it is getting delayed.

No comments: