Which of the term is not an email program?
Answers
Answer:
There are plenty of email terms you might have come across but draw a blank. If you want to know your APOP from your IMAP, have trouble distinguishing your Cc from your Bcc, and are stumped by the term Backscatter, stick with us. We’ll start with how email came about and how it’s used today. The rest of the page covers the most common email terms, all summarized in plain English.
The Origin of Email
Email came before the entity we call the internet itself. It was crucial to the development of what’s known as interoperability, in which different computers exchange information and resources through local area networks (LANs) or wide area networks (WANs).
Originally conceived at the Massachusetts Institute of Technology (MIT), email was developed as a simple way to allow users of a computer to communicate with users on another computer. The success of email resulted in the development of the beginnings of the internet.
Recommended reading: How email works →
Email Terminology
The list below contains the most up-to-date email related terminology. The list is arranged alphabetically should you want to skip to a certain topic, or start from beginning for a comprehensive overview of email terms.
Attachment
An email attachment is any type of file sent along with an email message. Including an attachment in an email is a simple way to share documents and images. One or more files can be attached and sent to over to an email recipient. Attachments can include anything from photos and documents to zipped files, folders, mp3s, and more.
Most email providers limit the size of the attachment(s) that can be sent, and the number of attachments allowed per email. When attaching a file to an email, keep your email program’s file size limit in mind. To get around file size limitation, you may want to share a link to a file place in Dropbox, or a similar file hosting service within the email body.
Base64
Base64 is a method of encoding and decoding. It’s used to convert binary data transferred over the internet into the American Standard for Information Interchange (ASCII) text format. The need for Base64 arose from the need to attach binary content to emails without encountering any problems during transmission given that the system of transporting email messages is designed for plain text only (ASCII). The trouble with ASCII is it’s difficulty with handling other languages and arbitrary files.
The internet as an information highway, yet, the path for email to pass through is a narrow space. Think of a ten tonne truck trying to travel through a small tunnel that only small carts can pass through. It’s like getting a truck through the tunnel. How does it pass through? To solve this problem, the truck needs to be dismantled to pass through, and rebuilt on the other end of the tunnel.
This is exactly how it works when you send an email with an attachment. Data is encoded in a process called encoding the binary data and transformed into ASCII text (the type that can be transported via email without problems). Once the message reaches the recipient, the data is encoded and the original file is rebuilt. Base64 is one method of encoding arbitrary data as plain ASCII text.
Blacklist
The majority of the email sent worldwide is spam. Fortunately, blacklists exists as a means of sorting through legitimate email versus spam before it reaches your inbox. An email blacklist is a database containing known sources of spam mail that is used to filter and block spam email. Without email blacklists, it would be hard to accomplish much via email. Inboxes would be flooded and the intense traffic between servers would stall a lot of mail from reaching its destination.
Servers query blacklist databases in real time to ascertain the reputation of an IP address or the domain used to send an email. Email servers use the information in a blacklist to decide whether the email is coming from a reputable source to help them determine whether to accept or reject incoming mail. To query a blacklist, the IP address sending the email is checked against the spam database. If it’s included on the list, it is called a "known" source of spam and the email server stops the message from reaching the sender. It’s important to note that not all spam mail is on the blacklist, it may not yet have been reported as a ‘known’ source of spam mail.
Answer:
Software in the user's computer, tablet or smartphone that accesses the mail servers in a local or remote network. Also known as an "email client," "mail client," "mail program," and "mail reader," it provides the ability to send and receive email messages and file attachments. Examples of email programs for personal computers are Outlook, Mail (Mac), Eudora and Thunderbird.
Full Featured
Email programs are local applications that years ago had more features than Web-based email, which uses the Web browser as the interface. As Web mail interfaces improved, there were fewer advantages of the stand-alone email client, except in smartphones where viewing a Web page is cumbersome. Smartphone mail programs are designed for small screens.
In addition, before mail can be retrieved, email programs must be installed in the computer, and mail server addresses and protocols must be configured. Although smartphone mail clients are pre-installed, they still require configuration.
In contrast, users can log into their Web-based email from any computer in the world with username and password. Nevertheless, people get used to software, and it only takes one or two features in an email client program to make it preferable to the Web browser interface. See email interfaces, messaging system, universal client, POP3 and IMAP4.