Lesson 7 - Business E-Mail and Personal Information Management
In order to send an e-mail message, you must include:
an address in the To field.
Using all capital letters in an e-mail message connotes:
shouting or anger.
By default, e-mail clients typically save a copy of every message you send in:
the Sent or Sent Items folder.
E-mail message headers consist of:
the To, Cc, Bcc, Subject and Attachment components.
Message Transfer Agent (MTA)
A messaging component that routes, delivers and receives e-mail.
Mail User Agent (MUA)
A messaging component used as a stand-alone application by the user.
Pretty Good Privacy (PGP)
A method of encrypting and decrypting e-mail messages. It can also be used to encrypt a digital signature.
Multipurpose Internet Mail Extensions (MIME)
A protocol that enables operating systems to map file name extensions to corresponding applications. Also used by applications to automatically process files downloaded from the Internet.
The commonplace use of e-mail has given rise to the term "snail mail," which is a slang term for what?
Standard postal service
Which of the following can be considered an advantage of Web-based e-mail?
You can log on and check your e-mail from any computer that has Internet access.
Which of the following is a disadvantage of using Web-based e-mail?
Your user name and password reside on a third-party server.
header
A block of information attached to a piece of data. The first part of a network packet. Can contain network addressing information or additional information that helps computers and applications process data.
emoticon
A combination of characters that, when read sideways, helps convey emotion in an e-mail message.
attachment
A file that is sent with an e-mail message.
Post Office Protocol (POP)
A protocol that resides on an incoming mail server. The current version is POP3.
blackhole list
A published list of IP addresses known to be sources of spam.
Personal Digital Assistant (PDA)
A small, handheld computer used for personal information management. The predecessor to the smartphone.
Which of the following devices can you use with personal information management (PIM) software to synchronize appointments and contact information that you keep on your desktop or laptop computer?
A smartphone
CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart)
A test that uses a word-verification graphic designed to differentiate humans from automated senders during online transactions.
personal information management (PIM) program
A tool used to schedule appointments and meetings, store contact information, and manage tasks.
user name
A unique name or number that identifies you when logging on to a computer system or online service. In an e-mail address, the part before the @ symbol.
IP address
A unique numerical address assigned to a computer or device on a network.
In which of the following components should you store names and information for your frequently accessed e-mail contacts?
Address book
spam filter
An e-mail client program that identifies and filters out spam messages before they reach the e-mail Inbox.
e-mail client
An e-mail program that is independent of any specific Web browser, and that you can use to send e-mail messages.
Mail Delivery Agent (MDA)
An e-mail server program that receives sent messages and delivers them to their proper destination mailbox.
GNU Privacy Guard (GPG)
An open-source version of PGP, used for encrypting and decrypting e-mail messages, that does not use patented algorithms.
How do most current e-mail clients display an attachment in an e-mail message?
As a separate link, such as an icon
What symbol does an e-mail address use to separate the user name from the domain?
At ( @ )
If your organization scans e-mail attachments to ensure that they contain no malicious code, where does the scanning take place?
At the e-mail server
What is the term for a file that is sent with an e-mail message?
Attachment
Which of the following can administrators use to filter out the IP addresses of known spammers?
Blackhole list
Which of the following can be used to detect automated systems used by spammers for registering e-mail accounts?
CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart)
spam
Unsolicited and unwanted e-mail messages; the equivalent of junk mail.
Which of the following is an appropriate use of e-mail in a business environment?
Discussing the status of a project with co-workers
What part of an e-mail address appears after the @ symbol?
Domain name
browser e-mail
E-mail programs such as Outlook Express and Opera Mail that come bundled with a Web browser and with which they may be integrated.
Which of the following e-mail response options should you use to send an e-mail message to users who did not receive the original?
Forward
Web-based e-mail
Free e-mail service from a provider such as Google Gmail or Yahoo! Mail in which you request a user name. You can access your e-mail from any computer that has access to the Internet.
Which of the following is an open-source implementation of Pretty Good Privacy (PGP) that does not use patented algorithms?
GNU Privacy Guard (GPG)
Which of the following enables users on different e-mail systems to exchange messages?
Gateways
Why is having local access to e-mail messages important for those who use IMAP servers?
If a network problem occurs, IMAP server users may not have access to their messages.
What is the term for an e-mail server program that receives sent messages and delivers them to their proper destination?
Mail Delivery Agent (MDA)
What is the term for an SMTP server that allows the third-party relay of e-mail messages that spammers use to send spam?
Open relay
Which of the following is known as a "store-and-forward" e-mail service?
Post Office Protocol version 3 (POP3)
Which of the following e-mail response options should you use to respond only to the original sender of an e-mail message?
Reply
Which of the following protocols support the encryption and decryption of e-mail messages?
Secure Multipurpose Internet Mail Extensions (S/MIME) and Pretty Good Privacy (PGP)
Secure MIME (S/MIME)
Secure version of MIME that adds encryption to MIME data.
Which of the following client-side actions can you take to reduce the amount of spam you receive?
Set up a spam filter in your e-mail client to filter out spam messages.
snail mail
Slang term for the standard postal service.
When you receive an e-mail transmission with an attachment, how does your browser know which application or plug-in to open to view or play the attachment?
The MIME definition for the application or plug-in that is located inside the HTTP header at the beginning of the transmission.
What must an e-mail message recipient possess in order to view a file attachment?
The software necessary to open or edit the attached file
Which of the following can be considered a drawback of SMTP authentication?
There is a greater chance that a hacker can use a packet sniffer to obtain a valid user name and password.
Why should you use out-of-office messages when you will be out of the office for an extended period of time?
To explain why you may not respond to e-mail messages within a reasonably short period of time
For what would you use a personal information management (PIM) program?
To schedule appointments and meetings, store contact information, and manage tasks
The term "netiquette" refers to:
general rules for Internet politeness.
When you use an e-mail client to send and receive mail:
messages stored in your Outbox are sent, a copy of each sent message is stored in the Sent Items folder, and incoming messages are routed to your Inbox.