CS103 Module 2
Some mail servers will reject messages with too many recipients (usually _________ or more)
50
According the Radicati Group, approximately _______% of all email messages sent every day are spam.
90
The username and the domain name are separated by a(n) _______ symbol
@
Software that detects and eliminates malicious code is called a(n) ______________ app.
Antivirus
When you send along a complex document or graphic as part of your email, you send it along as a(n) ____________
Attachment
A file that has been attached to an email message will be received by those recipients in the To, Cc, and _______ line(s) of the message header
BCC
In January 2004, the U.S. ____________ law went into effect.
CAN-SPAM
The software that requests mail delivery from the mail server to an Internet device is known as mail ________ software
Client
A virus signature, pattern, or ______________ is a sequence of characters that is always present in a particular virus.
Definition
"Email" is short for
Electronic Mail
MIME stands for Multipurpose Internet Mail ___________
Extensions
Text in a subject line indicating a message is forwarded:
FW:
A signature is not optional when sending an email. T/F
False
Always forward new information about viruses and hoaxes is a generally accepted rule for email messages. T/F
False
An email user's account name is also known as his/her domain name T/F
False
Closing the browser signs you out of your Google account automatically. T/F
False
Email is considered private, and therefore safe to use as a medium for discussing sensitive information. T/F
False
If you want to forward the message to several people, type their addresses, separated by periods. T/F
False
In addition to storing a contact's email address in Google Contacts, you can also store labels. T/F
False
Thanks to improved technology, email attachments no longer contain viruses. T/F
False
The CRAM-SPAM law was the first U.S. federal government effort to legislate controls on spam. T/F
False
The IMAP protocol specifies how to encode nontext data, such as graphics and sound, in an email so that it can travel over the Internet T/F
False
The full email address of the main recipient should be entered into the Cc line of a message header. T/F
False
The term "NetManners" refers to the set of commonly accepted rules that represent proper behavior on a network. T/F
False
When you want to store documents online so they are readily available to share, you use _______________.
Google Drive
A single email address that can represent several email addresses is called a _________.
Group
The email acronym "iow" stands for ____________________
In other words
The ________ protocol specifies how to encode nontext data, such as graphics or sound, so it can travel over the Internet.
MIME
If your email program does not provide filters, you can filter the messages ___________ by reading them and moving them to the appropriate folders
Manually
Contains the actual message content:
Message body
The _____________________ contains the actual message content
Message body
A ____________________ contains information about the message.
Message header
The term _____________ refers to a set of commonly accepted rules for proper behavior on a network.
Netiquette
When you click Contacts on the Gmail menu, Google Contacts opens in a ______________.
New tab
___________ are rules that determine how the Internet handles message packets flowing on it.
Protocols
A ____________ message is a copy of the sender's original message with your inserted comments.
Quoted
You can delete a label in Gmail by pointing to the label on the left side of the window, clicking the arrow that appears, and then clicking the _____________ option from the menu
Remove Label
_________ handles outgoing email messages, determining the paths an email message takes on the Internet.
SMTP
Which of the following--salutation, message header, message body, signature--is not a typical parts of an email message?
Salutation
When sending an email to multiple recipients, separate the addresses with a comma or a ______________
Semicolon
To protect the security of your Google account and to prevent unauthorized use of your account, you should _____________.
Sign out
A ___________ might appear at the bottom of an email message and contain standard information about the sender
Signature
May appear at the bottom of an email message; contains standard information about the sender: ____________.
Signature
__________ (1) consumes large amounts of network capacity, (2) distracts employees and wastes their time, and (3) may include content that is offensive or misleading.
Spam
Of the following choices for virus protection--Symantec, SpamBeGone, McAfee Intel Security, ZoneAlarm--is not a popular choice for virus protection?
SpamBeGone
Mozilla's email program is called _______________.
Thunderbird
"Detaching a file" is the phrase often used for saving an email attachment to your computer. T/F
True
"UCE" is another term for spam. T/F
True
A message can be queued, or temporarily held with other messages. T/F
True
An email with a Subject line beginning with "Fw" indicates that the message has been forwarded. T/F
True
Bcc email recipients are unaware of other Bcc recipients. T/F
True
In an email message, it is common to see a special mark preceding each line of a quoted message. T/F
True
Most email programs offer you two options for replying to a message that you have received: Reply or Reply All. T/F
True
When you delete a message or folder, you are simply moving it to the Trash. T/F
True
When you delete an email message that contains an attached file, you also delete the file that is attached to the message. T/F
True
When you send an email message, the message is sent to a mail server. T/F
True
Email attachments can contain malicious programs called ________.
Viruses
You can delete _____________ by selecting the check box and then clicking the Delete button on the Gmail toolbar.
a message
When forwarding a message, Gmail includes the original message in the message display area and adds a blank line __________ the original message so you can add an optional message to provide context for the recipient.
above
If you receive an email message from a sender that you don't recognize and the message contains an attached file, you should _______________ the file until you are sure that it doesn't contain a virus.
avoid opening
Used to send mail to people who should be aware of the email but are not the main recipients: ________
cc
If you are in the midst of composing an email message but you want to save it and finish it later, you can store your email in your program's __________ folder.
drafts
A group of keyboard characters that, viewed together, represent a human expression is known as a(n) ___________.
emoticon
Some email programs let you use a __________ to move incoming mail to a specific folder or to delete it automatically based on the content of the message.
filter
When you ___________ a message, a copy of the original message is sent to the new recipient(s) without the original sender's knowledge
forward
You can create _________ to organize your emails by category.
labels
Contains information about the message:
message header
A forwarded message does include the email addresses of ____________ recipients and senders.
previous
Copying and pasting contents of a received message into a new message allows you to forward a message while maintaining the ___________ of the original sender.
privacy
An email sender's local network sends the message to the sender's mail ________
server
If you are using email for a business communication, your ___________________ usually contains your name, title, and your company's name.
signature file
Another term for junk mail is ________.
spam
When using the "Reply All" option, your message will automatically be sent only to _____________ recipients of the original message
to and cc
A _________ usually identifies one person's email account on a mail server.
username
Of all of the following email acronyms--btw, imo, wth, atm--which is not noted in the text?
wth