SlideShare a Scribd company logo
-6000757334885-409575-1418590<br />E-mail attachment is a computer file sent along with an e-mail message. One or more files can be attached to any email message, and be sent along with it to the recipient. This is typically used as a simple method to share documents and images. <br />Use of Attachments<br />E-mail attachments is use to send images and other small files to other people. It is useful for emailing because you can send important files privately to the person you want to send it to. An e-mail attachment is for sending files and not messages.<br />Here is a table about security risks, privacy compromises, and hidden costs inherent in email attachments:<br />Email Attachment File Types: Pros and ConsFormatEditable?Cross Platform?Secure?CompactProprietaryAdvanced Formatting?PermanentCostPlain Text ASCII (TXT)YesYesYesYesNoNoYesFreeHyperText Mark-up Language (HTML,HTM)YesYesVariably YesNoYesNoFreePortable Document Format (PDF)NoYesMostlyYesYesYesLargelyFreeRich Text Format (RTF)YesPartlyYesYesYesSomeYes>$5Word Document (DOC)YesNoNoNoYesYesNo>$20<br />Source: http://josephhall.org<br />

More Related Content

Viewers also liked

Financial Results Icons for PowerPoint
Financial Results Icons for PowerPointFinancial Results Icons for PowerPoint
Financial Results Icons for PowerPoint
PoweredTemplate.com
 
Unique Infographic
Unique InfographicUnique Infographic
Unique Infographic
Menno_Knol1
 
Open nebula froscon
Open nebula frosconOpen nebula froscon
Open nebula froscon
OpenNebula Project
 
Tom Ollerton on SMSPrague 2011
Tom Ollerton on SMSPrague 2011Tom Ollerton on SMSPrague 2011
Tom Ollerton on SMSPrague 2011Tyinternety.cz
 
Backward Chaining
Backward ChainingBackward Chaining
Backward Chaininglolafrancis
 
Malcolm Eade Networking Presentation
Malcolm Eade Networking PresentationMalcolm Eade Networking Presentation
Malcolm Eade Networking Presentation
eadzie
 
Principes et Fonctionnalités Velocity 6.1
Principes et Fonctionnalités Velocity 6.1Principes et Fonctionnalités Velocity 6.1
Principes et Fonctionnalités Velocity 6.1Social Computing
 
Sametime Introduction
Sametime IntroductionSametime Introduction
Sametime Introduction
Lisa Duke
 
Tackling the inappropriate use of psycho-active medication in Scotland
Tackling the inappropriate use of psycho-active medication in ScotlandTackling the inappropriate use of psycho-active medication in Scotland
Tackling the inappropriate use of psycho-active medication in Scotland
Alzheimer Scotland
 
A5175 Mar2008
A5175 Mar2008A5175 Mar2008
A5175 Mar2008rbarnett
 
Backgrounder and position papers
Backgrounder and position papersBackgrounder and position papers
Backgrounder and position papersJ'ette Novakovich
 
2200 capítulo 09 clase 01
2200 capítulo 09 clase 012200 capítulo 09 clase 01
2200 capítulo 09 clase 01uanzigba
 
Romania_croatian_presentation
Romania_croatian_presentationRomania_croatian_presentation
Romania_croatian_presentationPetraSala
 

Viewers also liked (16)

Financial Results Icons for PowerPoint
Financial Results Icons for PowerPointFinancial Results Icons for PowerPoint
Financial Results Icons for PowerPoint
 
Unique Infographic
Unique InfographicUnique Infographic
Unique Infographic
 
Open nebula froscon
Open nebula frosconOpen nebula froscon
Open nebula froscon
 
Tom Ollerton on SMSPrague 2011
Tom Ollerton on SMSPrague 2011Tom Ollerton on SMSPrague 2011
Tom Ollerton on SMSPrague 2011
 
Backward Chaining
Backward ChainingBackward Chaining
Backward Chaining
 
Malcolm Eade Networking Presentation
Malcolm Eade Networking PresentationMalcolm Eade Networking Presentation
Malcolm Eade Networking Presentation
 
04409a
04409a04409a
04409a
 
New Microsoft Power Point Presentation
New Microsoft Power Point PresentationNew Microsoft Power Point Presentation
New Microsoft Power Point Presentation
 
Principes et Fonctionnalités Velocity 6.1
Principes et Fonctionnalités Velocity 6.1Principes et Fonctionnalités Velocity 6.1
Principes et Fonctionnalités Velocity 6.1
 
Sametime Introduction
Sametime IntroductionSametime Introduction
Sametime Introduction
 
Tackling the inappropriate use of psycho-active medication in Scotland
Tackling the inappropriate use of psycho-active medication in ScotlandTackling the inappropriate use of psycho-active medication in Scotland
Tackling the inappropriate use of psycho-active medication in Scotland
 
A5175 Mar2008
A5175 Mar2008A5175 Mar2008
A5175 Mar2008
 
Backgrounder and position papers
Backgrounder and position papersBackgrounder and position papers
Backgrounder and position papers
 
Cd salescycle
Cd salescycleCd salescycle
Cd salescycle
 
2200 capítulo 09 clase 01
2200 capítulo 09 clase 012200 capítulo 09 clase 01
2200 capítulo 09 clase 01
 
Romania_croatian_presentation
Romania_croatian_presentationRomania_croatian_presentation
Romania_croatian_presentation
 

Similar to Attachments

E mail - karthik krishna
E mail - karthik krishnaE mail - karthik krishna
E mail - karthik krishna
Karthik Krishna K S
 
Internet Tutorial 02
Internet  Tutorial 02Internet  Tutorial 02
Internet Tutorial 02
dpd
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
Prafull Johri
 
Encrypting E-mail Messages
Encrypting E-mail MessagesEncrypting E-mail Messages
Encrypting E-mail Messages
D's Surti
 
Misd chap 9 enterprise applications
Misd chap 9 enterprise applicationsMisd chap 9 enterprise applications
Misd chap 9 enterprise applicationsEdiey Smile
 
XML and Societal Impacts Of IT
XML and Societal Impacts Of ITXML and Societal Impacts Of IT
XML and Societal Impacts Of ITSagar Kalra
 
EMP_3rd_Quarter_Week_4_Module_on_Developing_ICT_using_MS_Word.pdf
EMP_3rd_Quarter_Week_4_Module_on_Developing_ICT_using_MS_Word.pdfEMP_3rd_Quarter_Week_4_Module_on_Developing_ICT_using_MS_Word.pdf
EMP_3rd_Quarter_Week_4_Module_on_Developing_ICT_using_MS_Word.pdf
OfeliaPedelino
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
Ahmad Zahid
 

Similar to Attachments (8)

E mail - karthik krishna
E mail - karthik krishnaE mail - karthik krishna
E mail - karthik krishna
 
Internet Tutorial 02
Internet  Tutorial 02Internet  Tutorial 02
Internet Tutorial 02
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
 
Encrypting E-mail Messages
Encrypting E-mail MessagesEncrypting E-mail Messages
Encrypting E-mail Messages
 
Misd chap 9 enterprise applications
Misd chap 9 enterprise applicationsMisd chap 9 enterprise applications
Misd chap 9 enterprise applications
 
XML and Societal Impacts Of IT
XML and Societal Impacts Of ITXML and Societal Impacts Of IT
XML and Societal Impacts Of IT
 
EMP_3rd_Quarter_Week_4_Module_on_Developing_ICT_using_MS_Word.pdf
EMP_3rd_Quarter_Week_4_Module_on_Developing_ICT_using_MS_Word.pdfEMP_3rd_Quarter_Week_4_Module_on_Developing_ICT_using_MS_Word.pdf
EMP_3rd_Quarter_Week_4_Module_on_Developing_ICT_using_MS_Word.pdf
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 

More from Abraham Bautista

Dos and donts in emailing research
Dos and donts in emailing researchDos and donts in emailing research
Dos and donts in emailing researchAbraham Bautista
 
Dos and don'ts in emailing complete
Dos and don'ts in emailing completeDos and don'ts in emailing complete
Dos and don'ts in emailing completeAbraham Bautista
 
Task 3 effective communication in business
Task 3   effective communication in businessTask 3   effective communication in business
Task 3 effective communication in businessAbraham Bautista
 

More from Abraham Bautista (12)

Document security
Document securityDocument security
Document security
 
Task 6 files security
Task 6 files securityTask 6 files security
Task 6 files security
 
Document security
Document securityDocument security
Document security
 
Dos and donts in emailing research
Dos and donts in emailing researchDos and donts in emailing research
Dos and donts in emailing research
 
Dos and don'ts in emailing complete
Dos and don'ts in emailing completeDos and don'ts in emailing complete
Dos and don'ts in emailing complete
 
Task 4
Task 4Task 4
Task 4
 
Task 3 effective communication in business
Task 3   effective communication in businessTask 3   effective communication in business
Task 3 effective communication in business
 
Business report exercise
Business report exerciseBusiness report exercise
Business report exercise
 
Business report exercise
Business report exerciseBusiness report exercise
Business report exercise
 
Business report research
Business report researchBusiness report research
Business report research
 
Task 2 business report
Task 2 business reportTask 2 business report
Task 2 business report
 
Business report
Business reportBusiness report
Business report
 

Attachments

  • 1. -6000757334885-409575-1418590<br />E-mail attachment is a computer file sent along with an e-mail message. One or more files can be attached to any email message, and be sent along with it to the recipient. This is typically used as a simple method to share documents and images. <br />Use of Attachments<br />E-mail attachments is use to send images and other small files to other people. It is useful for emailing because you can send important files privately to the person you want to send it to. An e-mail attachment is for sending files and not messages.<br />Here is a table about security risks, privacy compromises, and hidden costs inherent in email attachments:<br />Email Attachment File Types: Pros and ConsFormatEditable?Cross Platform?Secure?CompactProprietaryAdvanced Formatting?PermanentCostPlain Text ASCII (TXT)YesYesYesYesNoNoYesFreeHyperText Mark-up Language (HTML,HTM)YesYesVariably YesNoYesNoFreePortable Document Format (PDF)NoYesMostlyYesYesYesLargelyFreeRich Text Format (RTF)YesPartlyYesYesYesSomeYes>$5Word Document (DOC)YesNoNoNoYesYesNo>$20<br />Source: http://josephhall.org<br />