Know and understand characteristics, uses and constraints of email communication including acceptable language, guidelines set by an employer, the need for security, netiquette, email groups, carbon copy (cc), blind carbon copy (bcc), forward, attach
Communication – Email (Cambridge IGCSE/A‑Level ICT 0417)
1. Characteristics of Email
Asynchronous – sender and receiver do not need to be online at the same time.
Text‑based, with optional multimedia – plain text, hyperlinks, embedded images and file attachments.
Address format – user@domain (e.g., j.smith@company.co.uk).
Storage & retrieval – messages can be saved, searched and archived electronically.
Group distribution – mailing lists or multiple recipients in a single message.
Underlying protocols (syllabus requirement)
SMTP – Simple Mail Transfer Protocol – sends mail from client to server.
POP3 – Post Office Protocol 3 – downloads mail from server to a local device.
IMAP – Internet Message Access Protocol – accesses mail on the server, keeping it synchronised across devices.
MIME – Multipurpose Internet Mail Extensions – enables attachment of non‑text files.
2. Uses of Email in the Workplace
Internal communication – between staff, departments and management.
External communication – with clients, suppliers, partners and regulators.
For very large files, use a secure cloud link (OneDrive, Google Drive) and set appropriate access permissions.
Be aware of prohibited file types (e.g., .exe, .bat, .js) that many organisations block for security.
11. Reporting a Suspicious Email (Step‑by‑Step Checklist)
Step
Action
1
Do not click any links or open attachments.
2
Hover over any URLs to view the actual address; note any mismatches.
3
Mark the message as “Junk” or “Phishing” using the email client’s built‑in button (if available).
4
Forward the original message (without altering it) to the organisation’s IT or security team – usually a dedicated address such as it‑support@company.co.uk or security@company.co.uk.
5
Delete the suspicious email from your inbox and the “Deleted Items” folder after confirmation from IT.
6
Follow any additional instructions from IT (e.g., password change, device scan).
Suggested diagram: Flow of an email from sender to recipient showing the roles of To, CC, BCC, and attachments, with points where TLS encryption, virus scanning, and digital‑signature verification occur.
Support e-Consult Kenya
Your generous donation helps us continue providing free Cambridge IGCSE & A-Level resources,
past papers, syllabus notes, revision questions, and high-quality online tutoring to students across Kenya.