How do e-mail, instant messaging, and Voice over Internet Protocol work, and how is information using these technologies kept secure?
IMPORTANT READ*****CHEGG GUIDELINES - This explanation is not your answer. Anything you submit must be of your own work. We are here to provide explanation and directions ONLY. Hope you understand! If you like my explanation, give this answer thumbs up by showing your support. Thank you*****
Emails: Email messages are composed using an email program (an email client). The email program assembles the email by combining the message content (the body) with the recipient, subject plus the date and time (the header). Email relies on a set of protocols to arrive at the correct destination. The email program (the email client) comes in two forms, a web based version like google mail where users must login through their browser to access their emails, or a client based version such as Outlook where users install software to access emails from their local computer. If you use a computer regularly, it’s pretty likely you send and receive countless emails each day. Emails from clients, subscriptions to newsletters, messages from friends and family and not tomention spammers. Most internet users don’t know these emails are sent or arrive in their inbox, and that’s okay. From the typical email user's standpoint, it seems simple. We think of email as something that pops up when messages come through to our mail client
Instant Messaging: Instant messaging (IM) technology is a type of online chat that offers real-time text transmission over the Internet. A LAN messenger operates in a similar way over a local area network. Short messages are typically transmitted between two parties, when each user chooses to complete a thought and select "send". Some IM applications can use push technology to provide real-time text, which transmits messages character by character, as they are composed. More advanced instant messaging can add file transfer, clickablehyperlinks, Voice over IP, or video chat.
VoIP : VoIP (Voice Over Internet Protocol) which, simply stated, means using the Internet to make and receive telephone calls.There are really three separate problems to solve before you can do it: alerting someone that you want to call them, turning your voice into digital sound and sending it over the Net (and receiving replies in the opposite direction), and "interfacing with" (linking in to) the ordinary telephone network, if your call is going to a traditional landline telephone or cellphone (mobile phone). Let's look at each of these in turn. When you make a traditional telephone call to a friend, you lift the receiver and listen for the dial tone before punching in someone's number. What's happening here is that you're opening up an electric circuit between your home phone and the telephone exchange. When you dial the number, the exchange opens up a second circuit to the receiver's phone, causing their handset to ring. As soon as your friend lifts the receiver, there's a complete circuit open between your two phones and you can start to talk ("send and receive voice data", if you prefer).With VoIP, things are different. Internet telephony is much more like cellphone telephony, with people having unique telephone numbers that aren't permanently linked to one physical location: the person you're calling could be anywhere on the planet (and might not be in the same place two days running). So the first part of making a VoIP call involves your computer locating the receiver on the Internet, signalling their computer to receive a call, and, once that's done, the two computers agreeing the technical nitty-gritty of how they will actually exchange the data (just as fax machines and modems "handshake" at the start of a call). For VoIP to work effectively, every computer that uses it has to do these things exactly the same way—and that's why VoIP systems use carefully agreed international standards (known as protocols). The two protocols that cover signalling are technically known as H.323 and SIP (Session Initiation Protocol, sometimes also known as RFC 4168). Simply speaking, these protocols set up a communication route between two IP addresses (the sender's and the receiver's) across which the actual telephone call data can be sent and received.
****Please please please LIKE THIS ANSWER, so that I can get a small benefit, Please****
How do e-mail, instant messaging, and Voice over Internet Protocol work, and how is information using...
60% of work interruptions involve tools like e-mail, social media, text messaging and instant messaging, as well as switching windows among standalone tools and applications (http://smallbusiness.foxbusiness.com/technology-web/2011/05/20/distracted-employees-survey/). What is the probability that examining 12 different instances of work interruptions that (a) 5 of them would involve the above listed tools? (b) What is the probability that more than 7 would involve the listed tools?
"Should employers curb social media, e-mail, and other internet use?" Conduct additional research into the problem of workplace abuse of social media, e-mail, instant messaging, online shopping, another Internet browsing. If you were the administrative assistant in the scenario, how would you respond to your boss? Decide whether you support or oppose the crackdown. For your discussion post, explain your position to your classmates. Include your opinion on the following questions. Support your opinion by citing at least two sources...
True/False Your internet server provider supplies the domain name for an e-mail address. The more compressed the graphics file, the smaller the image and the lower the quality Links on a Web page allow users to obtain information in a non-linear way With Internet telephony, the Internet telephone software and the computer's sound card convert the user's spoken voice to analog signals and then transmit it over the Internet. Explain each answer.
how the technologies are used to ensure a secure Internet connection between two networks or a remote machine and a network over the public insecure Internet
Which one of the following is the best reason for using voice mail? A) For delivering personal and confidential information. B) For delivering complex, technical data. C) For delivering bad-news messages. D) When leaving long, detailed messages--they are recorded for playback. E) When leaving short, unambiguous messages.
8. Marginal, joint, and conditional probabilities based on a crosstabulation Aa Aa E Surveys conducted for the Pew Internet & American Life Project suggest that communication pattems vary across three groups of teenagers: social networkers, content creators, and multichannel teens (teens who use the Internet instant messaging, text-messaging cell phones, and social networks). In one survey, Internet-using teenagers were asked how often they send e-mail to friends. Their responses are summarized in the following (incomplete) crosstabulation. Separate tabulations are provided...
Management Information Technology: "Internet Revolution”, Review of how over time the Internet has changed the way that you work, live, and even play!
A protocol is a set of rules that define some operation. For
example, the Internet Protocol (IP)
specifies how messages are routed throughout the internet. In
this problem, you are asked to
implement your 1st messaging protocol (MP1). MP1 is a binary
protocol that is used to efficiently
encode a set of arithmetic operations using a 4-byte data type
(e.g., int). The specification of the
protocol is as follow. Using a 4-byte (32-bit stream), MP1
messages encode the ‘+’, ‘-‘,...
Consider the following information about passengers on a cruise ship on vacation: 40% check work e-mail, 30% use a cell phone to stay connected to work, 27% bring a laptop with them on vacation, 22% both check work e-mail and use a cell phone to stay connected, and 50% neither check work e-mail nor use a cell phone to stay connected nor bring a laptop. In addition 88% of those who bring a laptop also check work e-mail and 69%...
Consider the following information about passengers on a cruise ship on vacation: 41% check work e-mail, 29% use bring a laptop with them on vacation, 22% both check work e-mail and use a cell phone to stay connected, and 50% neither check work e-mail nor use a cell phone to stay connected nor bring a laptop. In addition 88% of those who bring a laptop also check work e-mail and 71% of those who use a cell phone to stay...