The e-mails, though beneficial in our day-to-day life, has got its own
drawbacks.
@
Viruses: These are
computer programs having the potential to harm a computer system. These
programs copy themselves and further infect the computer. The recipient needs
to scan the mails, as viruses are
transmitted through them and have the potential to harm computer systems.
@
Spam: E-mails when used to
send unsolicited messages and unwanted advertisements create nuisance and is
termed as Spam. Checking and deleting these unwanted mails can unnecessarily
consume a lot of time, and it has become necessary to block or filter the
unwanted e-mails by means of spam
filters. Spamming includes, sending hoax e-mails. E-mail spoofing is another common practice, used for
spamming. Spoofing involves deceiving the recipient by altering the e-mail
headers or the addresses from which the mail is sent.
@
Hacking: The act of breaking into
computer security is termed as hacking. After the e-mail is sent and before it
is received by the desired recipient, it "bounces" between servers
located in different parts of the world. Hence, the e-mail can be hacked by a
professional hacker.
@
Misinterpretation: One has to be careful
while posting any kind of content through an e-mail. If typed in a hurry, the
matter could be misinterpreted.
@
Lengthy mails: If the mail is too
long and not properly presented the reader may lose interest in reading it.
@
Crowded inbox: Over a period of time,
the e-mail inbox may get crowded with mails. It becomes difficult for the user
to manage such a huge chunk of mails.
@
Need to check the inbox regularly: In order to be
updated, one has to check his e-mail account regularly.
Every new technology
enters the social world with its share of benefits and drawbacks. Different
people interpret and utilize it in different ways. In order to make the most of
the available technology, users should try to understand both, the positive and
negative sides of the tool they use. No technology can be totally perfect!
COMPREHENSION
1. Which one would be the best title
for the text?
a)
The advantages of Email q
b)
The history of Email q
c)
The disadvantages of Email q
d)
The disadvantages and Advantages of Email q
2. Complete the following
diagram with the necessary information from the text.
3. Decide if these statements are true or false; then, justify your
answer.
a. Viruses do not harm the computer.
Truer Falser
………………………………………………...………………………...…......................…………………………………………………………………………………………….……………………………...
b. Checking and deleting these unwanted mails does not consume a lot of
time.
Truer Falser
………………………………………………...………………………...…......................…………………………………………………………………………………………….……………………………...
c. the
reader may not pay attention to the E-mail that is too long and not properly
presented.
Truer Falser
………………………………………………...………………………...…......................…………………………………………………………………………………………….……………………………...
4. Answer the following questions briefly, in your own words as far as
possible.
a. When was 'E-mail'
used?
………………………………………………...………………………...…......................………………………………………………………………………………………….......….…………………………
b. What is an
E-mail?
………………………………………………...………………………...…......................……………………………………………………………………………………………........…………………………
c. What does E-mail
enable us to do?
………………………………………………...………………………...…......................…………………………………………………………………………………………….……........………………………...
d. What do programs such as autoresponders enable us to do?
………………………………………………...………………………...…......................…………………………………………………………………………………………….……………………………...
5. Match the following words with their definitions
Word |
|
Definition |
|
a) A person who receives
something. |
|
|
b) Something or someone
that annoys you or causes trouble for you. |
|
|
c) Not requested. |
|
|
d) A computer program
or part of a computer program which can make copies of itself
and is intended to prevent the computer from working normally. |
|
|
e) To pass
harmful programs from one computer to another, or within files in the same
computer. |
|
|
f) A
central computer from which other computers get information. |
|
|
g) a place
on a computer where email messages which are sent to you are kept |
|
|
h) Full of something, congested. |
|
|
i) To get into someone
else's computer system without permission in order to find out information or
do something illegal. |
|
|
j) unwanted email, usually advertisements |
6. What does the underlined
word in the text refer to?
- These : …………………….……….…………