Chapter 2

Summary

            Module 2 of “The Internet” focused on basic communications that are used over the internet such as e-mail and how it really works behind the scenes. The author introduces the topic by explaining how email messages use protocols such as IMAP and POP that are used to send and receive messages and attachments over networks. I first learned about these protocols in my Networking class here at LCCC with Mr. Dushok. For anyone unfamiliar with using email or wanting to check out some unknown features, this chapter is a great tutorial to read through.

            Module 2 described the basics of navigating email apps such as Thunderbird, Outlook, Yahoo, and Gmail. I personally use two different Gmail accounts for personal emailing and Outlook for school and communicating with instructors. The chapter also describes forwarding, CC, and Bcc in e-mail. I previously was unaware of what the purpose of Bcc was and I found that to be useful information. The author also highlights spam mail and unsolicited messages. They go on to describe tips on how to reduce spam, such as controlling what websites you give your email address to and closing one email account to open another if the number of messages you are receiving becomes too much on storage. The importance of having an antivirus software downloaded onto your computer is also highlighted - scams such as phishing are most commonly attempted through email. I personally use Malware Bytes on my computer.

            The end of the chapter gives a tutorial on the basics of Gmail. The author explains how to create a Gmail account and how to navigate the application, how to forward and reply to messages, and adding contacts to Google Contacts. I have never used Google Contacts but in a business setting, I can see how this can be useful. The chapter also describes how to use Google Drive. I have used Google Drive on multiple occasions while working on group projects in school. I find this software to be very convenient with the way it allows each person to log in and make edits to a project.

            I was unaware of a few of the features that Module 2 described such as the purpose of CC and Bcc in email usage. This was explained in class as well, and I had no idea you were able to send copies of emails while keeping email addresses hidden from other recipients. I was also unaware of the “labeling” an email message feature. This may come in handy in my future career efforts.

 

Previous | Appendix A | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 9 | 10 | Next