Computer Applications
Parul has been given a table which contains a list of e-mail addresses. She has been asked to find all the valid e-mail addresses in the list and put a tick mark in front of them. Help her in finishing the given assignment.
aditi_gupta@rediffmail.com
tanmay(45)@webmail.ac.in
www.jay-singh.com
rini@86india@yahoo.com
harsh.kumar@yahoo.co.in
Internet
11 Likes
Answer
The common rules for a valid email address are as follows:
- Format: An email address must have a specific format:
username@domain.com. The "@" symbol separates the username (before the "@" symbol) and the domain (after the "@" symbol). - Username Rules:
- Must contain only letters (a-z), numbers (0-9), dots (.), hyphens (-), and underscores (_).
- Cannot start or end with a dot.
- Cannot have consecutive dots, hyphens, or underscores (e.g., "..", "--", "__").
- Usernames are not case-sensitive.
- Domain Rules:
- Must contain at least one period (.), typically separating the domain name from the domain extension.
- The domain name can contain letters, numbers, hyphens, and dots. It cannot start or end with a hyphen or dot.
Hence, the valid email addresses are:
| Validity | |
|---|---|
| aditi_gupta@rediffmail.com | ✓ (Valid) |
| tanmay(45)@webmail.ac.in | Invalid as parenthesis not allowed in username. |
| www.jay-singh.com | Invalid as not in username@domain.com format. |
| rini@86india@yahoo.com | Invalid as not in username@domain.com format due to two @ symbols. |
| harsh.kumar@yahoo.co.in | ✓ (Valid) |
Answered By
7 Likes
Related Questions
How does an SSH protocol protect data?
What do you mean by the term PC banking?
Diya is a very social person and wants to connect with all her friends on the Internet. She wants to join an online community where she can have her own profile, invite her friends to join, share photos, videos, etc.
- Which Internet service is Diya interested in?
- Suggest an example of such a service so that she could join it.
- Also discuss its merits and demerits.
Akhil works in a big organisation. He has to frequently access remote computers that are located at other branches in different cities. Which protocol would he be using for this purpose?