Quiz: 7.
Which device can synchronize with the personal information management (PIM) on your computer?
A smartphone
Which email client feature allows you to store the names and information of people you contact frequently?
Address book
How do most current email clients display an attachment in an email message?
As a separate link, such as an icon
What symbol does an email address use to separate the user name from the domain?
At ( @ )
Which of the following scans incoming email attachments to ensure they do not contain malicious code?
At the email server
What is the term for a file that is sent with an email message?
Attachment
Which of the following can administrators use to filter out the IP addresses of known spammers?
Blackhole list
What can Website developers use to prevent fake email accounts from being registered?
CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart)
Which of the following is an appropriate use of email in a business environment?
Discussing the status of a project with co-workers
What part of an email address appears after the @ symbol?
Domain name
Which of the following email response options should you use to send an email message to users who did not receive the original?
Forward
Which of the following is an open-source implementation of Pretty Good Privacy (PGP) that does not use patented algorithms?
GNU Privacy Guard (GPG)
Which of the following enables users on different email systems to exchange messages?
Gateways
Why is having local access to email messages important for those who use IMAP servers?
If a network problem occurs, IMAP server users may not have access to their messages.
Which of the following is a disadvantage of using Web-based email?
Interruptions in Internet connections may prevent you from accessing your messages.
What is the term for an email server program that receives sent messages and delivers them to their proper destination?
Mail Delivery Agent (MDA)
What kind of SMTP server do spammers use to relay messages through a third party?
Open relay
Which of the following is known as a "store-and-forward" email service?
Post Office Protocol version 3 (POP3)
Which of the following email response options should you use to respond only to the original sender of an email message?
Reply
What can a personal information management (PIM) program be used for?
Schedule appointments and meetings, store contact information, and manage tasks
Which of the following protocols support the encryption and decryption of email messages?
Secure Multipurpose Internet Mail Extensions (S/MIME) and Pretty Good Privacy (PGP)
Where do email clients typically save a copy of every message ever sent?
Sent or Sent Items folder.
Which of the following client-side actions can you take to reduce the amount of spam you receive?
Set up a spam filter in your email client.
The commonplace use of email has given rise to the term "snail mail," which is a slang term for what?
Standard postal service
When you receive an email message with an attachment, how does your browser know which application to open to view or play the attachment?
The MIME definition for the application that is located inside the HTTP header at the beginning of the transmission.
What must an email message recipient possess in order to view a file attachment?
The software necessary to open the attached file
Why should you use out-of-office messages when you will be away for an extended period of time?
To explain why you may not respond to email messages within a reasonable period of time
Which of the following can be considered an advantage of Web-based email?
You can log on and check your email from any computer that has Internet access.
The signature block for your company email account should normally include:
Your name and email address.
When sending an email message, you must have:
an address in the To field.
The term "netiquette" refers to:
general rules for Internet courtesy.
When you use an email client to send and receive mail:
messages stored in your Outbox are sent, a copy of each sent message is stored in the Sent Items folder, and incoming messages are routed to your Inbox.
Using all capital letters in an email message connotes:
shouting or anger.
Email message headers consist of:
the To, Cc, Bcc, Subject and Attachment components.