Computer Concepts Test 2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Bcc:

When you are sending one email to all of your friends in your address book, you should use the ______ field to keep their addresses private.

Reply All

When you receive an email, and you want to reply back to the sender and all of the addresses that were included in the original message, you should use ______.

true

When you send an email to your professor, a server holds onto that email until the professor requests it.

use abbreviations such as "u," "r," and "BRB" to keep the e-mail message shorter

All of the following are tips for a professional email etiquette, EXCEPT

causes people to search for and delete important files

An email containing a virus hoax is dangerous because _______.

HTML

If you want to send and receive email messages containing images and formatted text, you need to ensure that your email program is configured to read ______ email messages.

true

It is a good idea to obtain an email account that is not tied to your ISP, so that when you change service providers you won't lose your email account

true

Once a computer is infected, a virus can use the email program to send out copies of itself

false

One disadvantage to using webmail interface is that you can only access your email from your home computer.

true

One way to access email is to read it online through a webmail interface

web-based

Type of e-mail that is managed by your browser and enables you to access your email from anywhere you have interenet access is _________ email

captcha

When you set up a new email account, you may have to enter a distorted series of letters and numbers, called a ________, to ensure that you are a human and not a computer.

It cannot be accessed by hackers

Which of the following is NOT true about email?

true

With a client-based email account, such as Microsoft Outlook, you are able to view your email only from the computer on which the client program is installed.

computer fraud

an email claiming that you have won a lottery might be an example of ________

phishing

an email supposedly from your IT department asking for your password so that it can troubleshoot your account is a form of ___________

false

any email that you send is private, and it cannot be read by anyone other than the person to whom it is addressed

spam

unwanted or junk email

false

E-mails are completely private

thread

A conversation that takes place on a discussion board is called a _________.


Set pelajaran terkait

Business Ethics Chapter 7: Organizational Factors: The Role of Ethical Culture and Relationships

View Set

Chapter 8: Product Strategy and New Product Development

View Set

GRE Quantitative Study Guide 2, * BEST* GRE: Math Combo 2, GRE Math, GRE Math 2, GRE Math 3, GRE Math 4

View Set

StudyGuide Chapter 42 Urinalysis

View Set