Advantage of a numeric mailbox identifier, Computer Engineering

Assignment Help:

Does a numeric mailbox identifier have any advantage over a mnemonic identifier? Explain.

Several software systems permit the system administrator to select mailbox names, whereas other systems need a user s mailbox identifier through concatenating a user's first name, middle initial and last name, with underscore to separate the three items. For example, the email address for employee john Quiggley Public at expertsmind Corporation may be:

xxx_Q_Public@ expertsmind.com

On systems that need a user's login identifier to be utilized as a mailbox identifier, the resulting e-mail address is not nearly like readable. For illustration, if login accounts on a computer at nonexistent Corporation contain two six-digit numbers separated through a period, a single's e-mail address on which computer might be:

912743.253843@xxx .com

Evidently mnemonic from makes the mailbox portions of an e-mail address easier to keep in mind and enter correctly.


Related Discussions:- Advantage of a numeric mailbox identifier

Design a 32:1 multiplexer, Design a 32:1 multiplexer using two 16:1 multipl...

Design a 32:1 multiplexer using two 16:1 multiplexers and a 2:1 multiplexer Ans. Design a 32 X 1 MUX by using two 16 X 1 MUX and one 2 X 1. Now here total 32 input lines

What is monitoring-and-surveillance agents, Q. What is monitoring-and-surve...

Q. What is monitoring-and-surveillance agents? ANSWER: Monitoring-and-surveillance agents or predictive agents are intelligent agents that examine and report on equipment.

We cannot use append structures why, If a table that is to be extended cont...

If a table that is to be extended contains a long field, we cannot use append structures why? Long fields in a table must always be located in the last, as the last field of th

What is the significance of nonactionattribute, In general, all public proc...

In general, all public processes of a controller class are treated as action processes. If you require prevent this default behaviour, just decorate the public process with NonActi

Need of the assembly language, Q. Need of the assembly language ? Machi...

Q. Need of the assembly language ? Machine language code comprises the 0-1 combinations which computer decodes directly.  Though the machine language has the following problems

Sorting algorithms, Two way merge sort for 84,83,78,90,23,123,98,159,8,200

Two way merge sort for 84,83,78,90,23,123,98,159,8,200

How will these instructions perform?, Q. How will these instructions perfor...

Q. How will these instructions perform? Let's assume that above machine instructions are stored in three consecutive memory locations 1, 2 and 3 and PC contains a value (1) tha

Define the three prime processes of UML, Define the three prime processes o...

Define the three prime processes of uml The three prime processes were OMT (Rumbaugh), OOSE (Jacobson) and Booch. OMT was strong in analysis, while Booch was strong in design a

My project has not working, my project is in .net of lan chatting its have ...

my project is in .net of lan chatting its have tcp\ip connection problem

Illustrate diffrent types of modems, Q. Illustrate Diffrent types of modems...

Q. Illustrate Diffrent types of modems? There are four different types of modems: half-duplex, full-duplex, synchronous, and asynchronous.With half-duplex modems data can be tr

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd