Skip to content
  • Linkedin
  • Youtube
  • Pinterest
  • Home
  • Privacy Policy
  • About
  • Contact
Programmingoneonone

Programmingoneonone

Programmingoneonone is a website that publishes daily tutorials, methods, guides, and articles on IT, Education, and technology.

  • Home
  • Human Values
  • DSA
  • IoT Tutorials
  • Interview Questions and Answers
  • Toggle search form
structure of email

Structure of EMail

Posted on 16 April 20213 May 2023 By YASH PAL No Comments on Structure of EMail

An email message comprises binary data, usually in the ASCII text format. ASCII is a standard that enables any computer, regardless of its system or hardware, to read the text. ASCII code describes the characters you see on your computer screen.

you can attach pictures, executable programs, sound, video, and other binary files to your email.

Mr. Akshya Singh
18, Gandhi Nagar,
Ramesh chock
New Delhi = 111000

Pro 101, 180, Main
Street, Connaught Place
New Delhi 124039

June 5, 2021

Subject: Interview for programmers

Dear Mr. Yash
           you will be pleased to know that the company has selected you for the post of senior programmer. Please send your confirmation of the acceptance of our offer.

Yours Truly
(Ramesh)
M.D.


To: ayshdeora98@gmail.com

From: ‘Jaish@hotmail.com”

Subject: Interview for programmers

Date: Sun, 02 Jun 2021 11.33: 10+0530

Dear Mr. Yash
           you will be pleased to know that the company has selected you for the post of senior programmer. Please send your confirmation of the acceptance of our offer.

Yours Truly
(Ramesh)
M.D.

consider the above sample email message with the postal mail message. In the To line, you type in the email address of the person to whom you are sending a message. The address must be typed according to a set of very strict rules. if you type a single letter or the syntax is wrong your message will not get to the intended recipient. your email address will appear on the Form line. using this address, the recipient of your message will be able to respond to you.

On the subject line, you may type in the subject of your message or a very brief summary. at the bottom of the message is a signature area that can contain personalized information about you. some mail programs will automatically append this signature to the bottom of every message you send. Signature areas are not required and are used at the discretion of the person who creates the email message. the signature portion should not exceed five lines. There are five sections of an email message:

  1. E-mail address
  2. header
  3. body
  4. signature (optional)
  5. attachment (optional)

Email addressing system

It is important to understand and follow the email addressing scheme for the internet to ensure the proper delivery of all outgoing messages.

Address Syntax

An email address is composed of two separate parts.

  1. the domain name of the mail server computer on which you have an email account.
  2. your personal identity or account name (user name) on that mail server.

For example, 100 people have email accounts with the same ISP or organizations. All 100 users will share the same domain name (say hotmail.com), but each person will possess a unique user name, such as ‘Rahul’ or ‘Yash’. the user and domain names are separated by an @ (‘at’) symbol. Together, they form a complete email address.

Structure of E-Mail Message - Digital communication

The above image shows the components of an email address. users with multiple email accounts perhaps with different ISPs or organizations will have a different email address for each account.

Header

The header of the email message is the uppermost section. it displays information regarding the status of the messages. a header records message information and provides it to the recipient(s) of the message. headers are present in both outgoing (sent) and incoming (received) messages.

The principal header fields related to messages transported are listed below. these are mandatory to be used by all the people using email facilities on the internet. these areas power RFC 822.

  1. To – Email address/addresses of the primary recipient(s).
  2. Cc – Email address/addresses of the secondary recipient (s) to who copy needs to be sent.
  3. Bcc – Email address/addresses of the secondary recipient (s) to whom copy needs to be sent but the primary recipient should not know about the despatch of mail to these addresses.
  4. From – The originator of the creators of the email.
  5. Sender – Email address of the actual sender.
  6. Received – Line added by each transfer agent along the route containing the agent’s identity, and the date and time the message was received.
  7. Return Path – This May be used to identify the path back of the sender.

Note that there is no space in the email address, software and server computers will not accept spaces in an address. messages will not reach their destination if spaces are included.

There are additional headers given in RFC 822, which are not mandatory but may be used if required.

  1. Date – Date and time the message was sent.
  2. Reply-to – Email address to which replies should be sent.
  3. In-Reply-to – Message identification number of the message to which this is a reply.
  4. Message-ID – A unique number identifying the message and may be used to refer to the message.
  5. References – Other relevant message identification numbers.
  6. Keywords – Keywords selected by the user.
  7. Subject – A summary of the message for the one-line display.

The header shows information such as:

  1. time and date of a message,
  2. the subject of a message (as typed by the sender),
  3. whether carbon copies were sent,
  4. whether files are attached to the message, and
  5. the email address of the sender.

Body

The body of the email message is the primary focus because it contains the actual message. although there is no limit to the size (number of characters) of an email message, many Internet Service Providers do limit the size of an email message.

Attachments

An email has become all the more attractive to businesses because now it allows users to attach a file to any email message. Any file format such as word processing documents, spreadsheets, images, or video files can be attached to an email message. email allows complex data as attachments but not in the body.

Email messages cannot viruses, but they can still be sent through attachments. Therefore, you should scan all email attachments with a virus detection and eradication software program such as McAfee VirusScan or Norton AntiVirus before opening, or forwarding them.

Most email applications alert you if an incoming message contains an attachment. Such email applications show an icon within the body of the messages to represent an attached file. the icon indicates the type of file that is attached and allows the recipient to double-click the icon to automatically launch the attachment on their computer.

Signature

The signature for an email message is the personal information that automatically appears at the bottom of the outgoing message. The use of a signature is optional. you can provide any signature information you wish.

The purpose of a signature (also called a signature block, or signature file) is to provide a message recipient with personal contact information.

Information in a signature block may include the following:

  1. full name
  2. job title/position
  3. organization name and division
  4. phone and fax numbers
  5. physical and fax numbers
  6. physical (snail mail) address
  7. email address
  8. Website address (URL)

By utilizing the signature features of the email software, you can avoid typing information for each outgoing message.

Carbon Copy (CC)

This feature lets you send a copy. carbon copy of the mail to another recipient. In this case, the main recipient is informed about the other people who receive the same message.

A signature allows information in this part to be included with each outgoing message in an automated and time-saving manner for the message sender.

Blind Carbon Copy (BCC)

In this option, the recipient does not know the name of the other recipients.

Computer Science Tutorials, Digital Communication, Internet Tutorials Tags:computer science, digital communication, internet

Post navigation

Previous Post: Email Protocols and Their Types
Next Post: Basics of C++ Programming Language

Related Tutorials

Reading input in c programming Reading Input in a C program C Programming Tutorials
The First C Program C Programming Tutorials
Compiling C Programs C Programming Tutorials
History of c programming language HISTORY OF C Programming Language C Programming Tutorials
c character sets C Character Sets C Programming Tutorials
c programming interview questions and answers C Programming Interview Questions and Answers C Programming Tutorials

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Pick your Subject

  • Internet of Things
  • Data Structures/Algorithms
  • Interview Preparation
  • Human Values
  • Java Interview Questions and Answers (2023)
    Thinking of becoming a Java developer? I must say it’s a good choice! Java is continuously named the most popular programming language. And the...

    Learn More “Java Interview Questions and Answers (2023)” »

  • Iot(Internet of things) in healthcare
    IoT in Healthcare
    IoMT (Internet of Medical Things) stands for devices that can collect and exchange data – either with users or other devices via the internet,...

    Learn More “IoT in Healthcare” »

  • four stages of iot solution for industry
    IoT for Industry
    In this post, we are going to learn about use cases of IoT for Industry and four stages for providing IoT solutions. Machine Diagnosis...

    Learn More “IoT for Industry” »

  • Iot for agricultural
    IoT in Agriculture
    IoT technology has realized smart wearables, connected devices, automated machines, and driverless cars. However, in agriculture, the IoT has brought the greatest impact. Amongst the challenges...

    Learn More “IoT in Agriculture” »

  • Iot for logistics
    IoT in Logistics and Supply Chain
    IoT applications for smart logistics and supply chain systems:  Logistics Fleet Tracking  To track the locations of the vehicles in real time, the vehicle...

    Learn More “IoT in Logistics and Supply Chain” »

  • Algorithms Tutorials
  • Basic Programming
  • C Programming Tutorials
  • C++ Tutorials
  • Compiler Design Tutorials
  • Computer Networks Tutorials
  • Computer Organization Tutorials
  • Computer Science Tutorials
  • Data Structures Tutorials
  • DBMS Tutorials
  • Developer Guide
  • Digital Communication
  • Digital Logic Tutorials
  • Internet of Things Tutorials
  • Internet Tutorials
  • Interview questions answers
  • Java Tutorials
  • Javascript Tutorials
  • Machine Learning Tutorials
  • Operating Systems Tutorials
  • Programming Tutorials
  • Projects
  • Tips&Tricks
  • Tools
  • VBScript Tutorials
  • Java Interview Questions and Answers (2023)
    Thinking of becoming a Java developer? I must say it’s a good choice! Java is continuously named the most popular programming language. And the...

    Learn More “Java Interview Questions and Answers (2023)” »

  • Iot(Internet of things) in healthcare
    IoT in Healthcare
    IoMT (Internet of Medical Things) stands for devices that can collect and exchange data – either with users or other devices via the internet,...

    Learn More “IoT in Healthcare” »

  • four stages of iot solution for industry
    IoT for Industry
    In this post, we are going to learn about use cases of IoT for Industry and four stages for providing IoT solutions. Machine Diagnosis...

    Learn More “IoT for Industry” »

  • Iot for agricultural
    IoT in Agriculture
    IoT technology has realized smart wearables, connected devices, automated machines, and driverless cars. However, in agriculture, the IoT has brought the greatest impact. Amongst the challenges...

    Learn More “IoT in Agriculture” »

  • Iot for logistics
    IoT in Logistics and Supply Chain
    IoT applications for smart logistics and supply chain systems:  Logistics Fleet Tracking  To track the locations of the vehicles in real time, the vehicle...

    Learn More “IoT in Logistics and Supply Chain” »

Copyright © 2023 Programmingoneonone.

Powered by PressBook Blog WordPress theme