lesson 7 review
when do you use the reply button
When responding to email messages that you have received, if you want to address only the original sender of the message
GNU Privacy Guard (GPG)
also known as GnuPG, is an open-source implementation of PGP that does not use patented algorithms.
A Mail Delivery Agent (MDA)
an email server program that receives sent messages and delivers them to their proper destination (or mailbox), where a user can pick them up
what is a gateway
computer that connects two networks that have different protocols.
An out-of-office message will explain why you
may not respond to email messages within a reasonably short period of time.
what must an email include at the very least
one address in the to field. (someone to send it to)
Post Office Protocol version 3 (POP3)
referred to as a "store-and-forward" email service because POP3 servers receive and hold incoming email messages in the appropriate mailbox on the server until users log on (authenticate themselves with a user name and password) and download their mail.
The Secure Multipurpose Internet Mail Extensions (S/MIME) and Pretty Good Privacy (PGP) protocols both support what
the encryption and decryption of email messages.
what is a blackhole list
is a published list of IP addresses known to be sources of spam.
A CAPTCHA
is a test designed to detect the automated systems used by spammers for registering email accounts.
An open relay
is an SMTP server that allows third-party relay of email messages.
what does netiquette mean
coined to establish general rules for Internet etiquette, and to encourage common sense and politeness.
when do you use the forward button
If you want to send the message to users who did not receive the original
snail mail
Slang term for the standard postal service.
Email programs include
address books that allow you to store names and information for your frequently accessed email contacts.
what comes after the @ symbol
domain
Attachment scanning always takes place at the
email server to ensure the attachments contain no malicious code that can be used to damage or infiltrate systems.
One disadvantage to web-based email is that
interruptions in Internet connection may prevent you from accessing your messages.
what do email clients do
save a copy of every message you send in the Sent or Sent Items folder.
why do you use a PIM
schedule appointments and meetings, store contact information, and manage tasks
what are attachments
separate files that you send with email messages.
to battle against spam on the client side you can
you can set up a spam filter in your email client to filter out spam messages
An email signature contains
your name and email address