当前位置:网站首页>The presentation logic of mail sending and receiving inbox outbox and reply to the problem of broken chain
The presentation logic of mail sending and receiving inbox outbox and reply to the problem of broken chain
2022-07-25 16:16:00 【Stonewang stone】
The presentation logic of email sending and receiving is inbox, outbox and reply to the problem of broken chain
One 、 background
Idle to be bored , Study some details of email sending and receiving .
Two 、 The logic of sending and receiving emails
E-mail delivery , The form of display is quite strange , Sometimes we reply to each other by email , It looks like there are back and forth in the same email, like a conversation . But if not handled properly , Will let this “ dialogue ” There are faults . such as
【 Example 1】
I'll send you an email , The content is A, You received A, And then you reply , Then I will receive a B -> A The mail (B Is the content of your reply ), Then at this time, if you think the last reply to me is not good enough , Want to reply again , There are two options
- if : You reply again in your inbox , I'll get it C -> A( Your inbox is A mail , Where is the delivery box B->A mail . If you reply based on the email in the Outbox , Then I received C->A, That is, I have received B->A and C->A, It looks a little fragmented )
- if : You found your reply just now in the Outbox B -> A Reply to your email and you can string it up , I can receive C -> B -> A( I received... In all B->A and C->B->A two , be C->B-> This time, the conversation can be connected )
【 Example 2】
This example is based on the example of three people , It's better to note that we should pay attention to how to reply so that the contents of all respondents can be strung together in the email .
I sent you an email and CC Zhang San , The content is A.
First, you reply to all , All right B->A,
Zhang San replied after receiving , All right C->B->A,
At this time, you should find what you received C->B->A Reply , formation D->C->B->A, But if you are looking for A Reply by email , As a result, everyone received D->A( such C->B->A Just like D->A Cut and split )
( This may really be a mistake that many people will make !!! May be A This email is profound , So when I found this letter, I replied directly without noticing that someone had been based on A Replied , Eventually, it is impossible to travel a chain based on the original mail )
3、 ... and 、 E-mail delivery
There is a relatively fragmented ,“ inbox ” and “ Send box ”
- I send you an email A, It will work
| who | inbox | The Outbox |
|---|---|---|
| I | No mail for now | A |
| you | A | No mail for now |
- At this time, you reply A After email , The content is B, Then the line becomes
| who | inbox | The Outbox |
|---|---|---|
| I | B->A( You reply to my ) | A( I sent it to you for the first time ) |
| you | A | B->A( You replied to me and sent ) |
- At this time, I am based on B->A Reply to the content C
| who | inbox | The Outbox |
|---|---|---|
| I | B->A( You reply to my ) | A( I sent it to you for the first time ),C->B->A |
| you | A,C->B->A | B->A( You replied to me and sent ) |
So back and forth , In fact, it is easier to repeat the content , Like this A, It has been repeated many times in your email and mine .
边栏推荐
- Release of v6.5.1/2/3 series of versions of Xingyun housekeeper: the ability of database OpenAPI continues to be strengthened
- Product upgrade observation station in June
- MySQL乐观锁
- 推荐系统-协同过滤在Spark中的实现
- 哪个led显示屏厂家更好
- MySQL isolation level transactions
- MySQL intent lock
- MySQL-自增锁
- leetcode:6127. 优质数对的数目【位运算找规律 + 两数之和大于等于k + 二分】
- MySQL 悲观锁
猜你喜欢

电阻电路的等效变化(Ⅱ)

Analysis and solution of data and clock mismatch delay in SPI transmission

【图像隐藏】基于混合 DWT-HD-SVD 的数字图像水印方法技术附matlab代码

MQTT X CLI 正式发布:强大易用的 MQTT 5.0 命令行工具

ML - Speech - traditional speech model

How does win11's own drawing software display the ruler?

使用 Terraform 在 AWS 上快速部署 MQTT 集群

Win11桌面切换快捷键是什么?Win11快速切换桌面的方法

leetcode:6127. 优质数对的数目【位运算找规律 + 两数之和大于等于k + 二分】

阿唐的小帮手
随机推荐
mysql 表读锁
MySQL tutorial 71-where conditional query data
R语言偏相关性计算(Partial Correlation)、使用ggm包的pcor函数计算偏相关性(Partial Correlations)
Ml image depth learning and convolution neural network
Cookie、cookie与session区别
MySQL global lock
Verifiable random function VRF
墨天轮高分技术文档分享——数据库安全篇(共48个)
0x80131500打不开微软商店的解决办法
Talk about how to use redis to realize distributed locks?
Save the image with gaussdb (for redis), and the recommended business can easily reduce the cost by 60%
【莎士比亚:保持做人的乐趣】
[wechat applet] detailed explanation of applet host environment
02. Limit the parameter props to a list of types
[zeloengine] summary of pit filling of reflection system
电阻电路的等效变化(Ⅱ)
MySQL乐观锁
论文笔记:Highly accurate protein structure prediction with AlphaFold (AlphaFold 2 & appendix)
01. A simpler way to deliver a large number of props
MySQL tutorial 67- filter duplicate data using distinct