Computer Concepts Test 2
Bcc:
When you are sending one email to all of your friends in your address book, you should use the ______ field to keep their addresses private.
Reply All
When you receive an email, and you want to reply back to the sender and all of the addresses that were included in the original message, you should use ______.
true
When you send an email to your professor, a server holds onto that email until the professor requests it.
use abbreviations such as "u," "r," and "BRB" to keep the e-mail message shorter
All of the following are tips for a professional email etiquette, EXCEPT
causes people to search for and delete important files
An email containing a virus hoax is dangerous because _______.
HTML
If you want to send and receive email messages containing images and formatted text, you need to ensure that your email program is configured to read ______ email messages.
true
It is a good idea to obtain an email account that is not tied to your ISP, so that when you change service providers you won't lose your email account
true
Once a computer is infected, a virus can use the email program to send out copies of itself
false
One disadvantage to using webmail interface is that you can only access your email from your home computer.
true
One way to access email is to read it online through a webmail interface
web-based
Type of e-mail that is managed by your browser and enables you to access your email from anywhere you have interenet access is _________ email
captcha
When you set up a new email account, you may have to enter a distorted series of letters and numbers, called a ________, to ensure that you are a human and not a computer.
It cannot be accessed by hackers
Which of the following is NOT true about email?
true
With a client-based email account, such as Microsoft Outlook, you are able to view your email only from the computer on which the client program is installed.
computer fraud
an email claiming that you have won a lottery might be an example of ________
phishing
an email supposedly from your IT department asking for your password so that it can troubleshoot your account is a form of ___________
false
any email that you send is private, and it cannot be read by anyone other than the person to whom it is addressed
spam
unwanted or junk email
false
E-mails are completely private
thread
A conversation that takes place on a discussion board is called a _________.