T2 - PP Inglés
T2 - PP Inglés
UNIT 2:
INTERNET SERVICES AND
PROTOCOLS
Protocols
Email is based on the use of several protocols:
- IMAP
- POP3
- SMTP
• Protocol SMTP
(Simple mail transfer protocol)
Used to send messages.
• Protocol IMAP
(Internet message access protocol)
It is used to receive messages.
Messages and the folders in which they are organized are
stored on the server.
Email can be read on several devices, they are not deleted
from the server when downloaded, the user has to delete them.
• Protocol POP3
(Post office protocol)
It is used to receive messages.
Downloads messages and deletes them from the server, mail
can only be accessed from one device.
Save space on the server.
Terminology associated with emails
1. Mail address
Unique email account identifier
Compound: nombre@dominio (gmail.com)
For exemple: l.martinezboyer@edu.gva.es
2. Server
Machine and software from which the mail service is provided.
Responsible for: storing, sending and receiving account emails
Computer (server): it has the power and capacity sized according to
the volume of email accounts it manages.
3. Customer
Email customer = the program that users use to access their accounts
4. Issuer
Issuer = the email account from which the email is sent
5. Receiver or addressee
Receiver = is the account to which an email is intended
6. Subject
Subject = is a descriptive text of the content of an email.
It has a dedicated text field to enter this information
7. Attached
Attachment = is to add one or more files to the email along with the
text of the message.
Servers can place restrictions on size (space) or type of files
(security)
8. CC
Carbon copy = allows you to send the email in copy to other users
(all recipients will be able to see the accounts)
9. CCO o BCC
Hidden carbon copy = consists of sending an email to several
users, but without the recipients' addresses being visible
10. Mailing list
Mailing list = distribution list = contact list. It is formed
from a set of email addresses
11. Signature
Signature = is a plain text or HTML format that is
automatically attached to the end of email messages
Usually includes: name of the issuer, contact information,
company position and legal aspects
Example:
Laura Mnez Boyer
Profesora de Procesos Comerciales
IES Clara Campoamor, Alacuás
ACTIVITY
2.2 Write the signature for emails sent from a Gmail
account.
1st Step: Access the Gmail account, then access the
account settings
ACTIVITY
2.3 Look for a tool that allows you to transfer data
over the Internet. Indicate its characteristics and
the price if any.
2.3 COMMUNICATION OVER THE
INTERNET: MESSAGING, VOICE AND
VIDEO SERVICES
Instant messaging service
They are synchronous and asynchronous
communication systems in which the participants of
the conversation send text messages to each other that
are received immediately if the recipient is connected.
- Allow content to be exchanged
- They provide video conferencing services
ACTIVITIES
2.4 Name all the instant messaging service applications
you know
2.5 Research the services offered by WhatsApp Business
and prepare a brief report
Voice Service
They are traditional telephone services, which are the
telecommunications companies. In addition, the Internet
provides more alternatives: instant messaging and VoIP
(similar to the traditional telephone system, but uses a
specific voice transport network.
ACTIVITY
2.6 Install Discord on your computer and find out how it
works.
Invite some of your colleagues or friends.
Create work areas and discover together how to use this
tool.
Communication service based on virtual reality
(Virtual Reality) is the technology that allows users to
access a three-dimensional (3D) environment in an
immersive way and interact with it. You can receive
visual, auditory and even physical stimuli similar to
the real world.
Social networks
They have become a fundamental communication tool
for both personnel and companies.
Large number of users.
Each social network has characteristics and each
social group has preferences in this regard.
2.4 ACCESS TO INTERNET
RESOURCES
The Internet is an excellent platform to publish and access an
unlimited amount of resources of all kinds.
Web resources
Web = it is the most used system to access the resources available
on the Internet, for specific resources a disadvantage
Search engines = Google, Bing, Baidu, etc.
Web directory = websites are organized by categories in a
hierarchical structure (it is deprecated by search engines)
P2P networks
(peer to peer) are networks with a distributed structure that
operate over the Internet. They allow the exchange of files of any
nature between users.
Example: BitTorrente, GNUnet, Napster, etc.
The distribution of this type of files is subject to dubious legality,
since the content should be permitted by copyright.
2.5 OTHER SERVICES AND
PROTOCOLS
Gopher: information access protocol
IRC (Internet relay chat): real-time communication protocol.
Currently there are messaging and social networks.
Telnet (teletype network): protocol that allows remote access to a
computer, low level of security, aimed at programmers or system
administrators.
SSH (secure shell): alternative protocol to Telnet. Provides secure
access to remote computers in terminal mode.
Internet Forum: Forums group users around topics of interest and
allow them to maintain and publish conversations related to this.
They are still valid.
News group (usenet newsgroup): This system allows you to exchange
opinions and facilitate discussion of any type of topic.
2.6 FRAUD DETECTION AND
PREVENTION
Preventing identity theft
Phishing = consists of deceiving the victim by posing as a trusted
third party to obtain important data.
Access a website:
• Write the URL in the browser's address bar (secure)
• Password leak.
Copyright
Copyright = are the rights that authors have over their works,
literary, artistic, scientific, musical, software, etc.
They imply economic rights, recognition of authorship and the
integrity of the work, and may prevent its alteration.
Copyleft
It is the granting by the author of a work of authorization for its free
use, allowing modification and improvement.
Public domain
It is one that can be used freely because the term of protection of its
author's rights has expired.
2.11 How are the recipients of an email different when they are
indicated in CC or BCC?
ACTIVITY - Evaluable
2.20 Research virtual reality. Prepare a small cost
study of a work system based on virtual reality for
a company with 10 employees.