Description
CHAPTER ONE
INTRODUCTION
1.1 BACKGROUND TO THE STUDY
The greatest renovation that has taken place in the twenty centuries is in the core of information technology.
This is currently made possible by the introduction of the e-mail (ten e-mail platform) which has been observed in the field of communication to be increasingly inseparable from communication.
This linkage is often referred to as convergence is risen which is driven by technology and amplified by business trends, the business technology foster growth in network system that uses e-mail links to connect sub-soldiery system (nodes) which may send, receive, direct and redirect information to and fro, sender and receiver.
Talking of the internet e-mail couple of years ago would have sound-link a fair table but today the internet is pervasive in almost every field of human and earn our changing the fundamentals of how they are conducted nation-wide as well as international business.
Few years of existence, the internet ten e-mail platform has shown that it can silver the long sought after goal of electronic commerce.
This technology facilitate link ten e-mail with rainbow.net LTD web and services delivery as well as in reducing barriers to entry into information world.
Internet e-mail allows clients of ten user transaction relationship, which would have taken long distance travel or movement of information with the attendant, with the on-line e-mail information at your convenience at home and at any time, e-mail user can transact business and contact other people.
This new system will provide e-mail address to ten users.
1.2 STATEMENT OF THE PROBLEM
E-mail as a business communication mechanism has many inherent flaws;
? It?s totally insecure
Confidential business document sent over e-mail are not confidential. This document can be read both inside and outside of your organization.
? It?s too open
Mailboxes are filled with junk mail, and the situation is getting worse every month. Due to the inherent general delivery design of e-mail, this problem cannot be prevented, even with the best designed e-mail filters.
? E-mail can be dangerous
Computer virus are most commonly delivered through e-mail because there is no certification mechanism for e-mail senders, in Microsoft outlook, just clicking on an e-mail can initiate a new virus.
? Delivery is not guaranteed
Just like postal mail, e-mail may be delivered, or maybe not The recent example include: Harvard acceptance letter that were deleted by AOL, thinking they were junk mail
? It lacks ubiquitous Access
It is problematic for most users to access their e-mail from all locations, such as at home or while on the road. This is the primary reason why web-based e-mail became popular.
1.3 OBJECTIVES OF THE STUDY
The objectives of the study are stated below:
i. To investigate the lack of the current automates system in term of modern technology appliances that support internet e-mail services and suggest ways of updating them.
ii. To design a friendly web-site services provided by the ten e-mail platform
iii. To improve in the speed effectiveness, efficiency and conferences in information technology (IT).
iv. To carry out a feasibility study on the organization for the purpose of installing an online e-mail.
v. To design and assign computer software to solve the problem.
1.4 SIGNIFICANCE OF THE STUDY
This project work – ten e-mail user will enhance secured validation process which allow user or customer?s to operate on ten different e-mail account on a single application and able to send mail and receive mail from any of the account at a time.
It makes customer to access their bank account in order to make cash withdrawals and check their account balances as well as purchase cell phone, prepaid credit without entering into their banking hall.
1.5 SCOPE AND DELIMINATION OF THE STUDY
The study focuses on design and assignation of ten user e-mail platform, It will be of immense use to the organization, the administration and the user?s in realizing the long sought goal of speed, efficiency, effectiveness and convenience .
The program will take care of those factors that mitigated against the smooth running operation of the organization using the online e-mail.
Better still scholars who intend to carry out subsequent research could have this as base from where improvement could be made.
1.6 DEFINITION OF OPERATIONAL TERMS
ANALYSIS: is the process of breaking a complex topic or substances into smaller parts to gain a better understanding of it.
CD ROM: is a pre-pressed optical compact disc which contains data. ? compact disc read- only- memory.
COMPUTER: it is an electronic devices that accept data and process it into a useful information.
COMPUTER-BASED: is any course of instruction whose primary means of delivery is a computer.
DATABASE: database is a collection of data which can be treated as a unit.
E-BANKING: E-banking is an electronic payment system that enable customer of a financial institution to conduct financial transaction on a website operated by the institution such as retail bank, virtual bank, credit union or building society.
E-MAIL: Electronic mail, most commonly referred to as e-mail is a method of exchanging digital messages from one author to one or more recipient.
E-MAIL ADDRESS: it identifies an e-mail box to which e-mail messages are delivered.
FILE: file is a collection of related records.
INTERNET: the internet is a global system of interconnected computer network that use the standard internet protocol suite (TCP/IP) to link several billon devices worldwide.
LAN: Local area network is a computer network that connects computer within a limited area such as home, school, office building.
MAN: Metropolitan area network is a computer network larger than a local area network covering an area of a few city blocks to the area of an entire city, possibly also including the surrounding area.
NETWORK: A network terminal is a device which ends a telecommunication link and is the point at which a signal enters or leaves a network.
ONLINE: A state of connectivity.
PASSWORD: is a word or string of characters used for user authentication to prove identity or access approval to gain access to a resource.
PIN: personal identification number is a numeric password shared between a user and a system that can be used to authenticate the user to the system.
PROCESS: is an instance of a computer program that is being executed.
PROGRAM: program is a sequence of instruction written to perform a specified task with a computer.
REAL- TIME: real time is a level of computer responsiveness that user senses as sufficient immediately or that enables the computer to keep up with some external process.
SOFTWARE: it is a set of program that governs the operation of a computer system and makes the hardware run.
TELEMETRIC: is the highly automated communication process by which measurement are made and other data are collected at remote or inaccessible point and transmitted to receiving equipment for monitoring .
VIRTUAL WORD: is a computer-based simulated environment.
WAN: wide area network is a network that covers a broad area.
WEB: is a system of interlinked hypertext document that are accessed via the internet