If you were writing a program application that was harvesting people's emails

and telephone numbers, explain and demonstrate how you would validate the
individual emails and telephone numbers! That is to make sure all the emails and
telephones you got were valid.