Lesson 7

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Name the protocol used to send email over the Internet, and name one of two protocols that can be used to receive e-mail over the Internet. SEND:

(SMTP) Simple mail Transfer Protocol is used to send e-mail, RECEIVE: and either (POP3) Post Office Protocol or Internet Message Access Protocol (IMAP) is required to receive e-mail.

Lisa is configuring an e-mail to connect to her e-mail account. Which of the following is required to set up the e-mail account?

A POP3 address

What does a closed envelope icon next to an email message header indicate?

A message that has not yet been read.

What feature provided with many e-mail programs can store information for commonly accessed e-mail contacts?

Address book

Which choice describes the file type(s) that can be attached to an e-mail message?

Almost any type of file can be attached to e-mail messages, such as documents, spreadsheets, presentations or images.

What is the best method for sending the content of a word processor document to another person via email?

Attach the entire doc file to an email message.

Non-repudiation is the security principle of providing proof that a transaction occurred between identified parties. Which of the following can you use to enforce non-repudiation in an electronic data transfer?

Digital signature

Which of the following can be considered an inappropriate use of email communication in the workspace?

Disclosing confidential information

Which e-mail response command would you use to send a message to a recipient who did not receive the original?

Forward

What does the term netiquette mean?

It means e-mail etiquette or guidelines for polite and sensible communication using e-mail.

Tray is project manager for a development team. After a short meeting to introduce a new project, he is preparing an e-mail message for his team that will assign some initial tasks to be completed that day. He has a list of action items for the team members to review and confirm. Which is the preferred approach to communicate important action items in an e-mail message?

List the action items in a numbered list for clarity.

If you have set up Web-based e-mail you can:

Log on and check your e-mail from any computer that has Internet access.

Email address

Made up of a username and a domain name.

Company owned email

Not private, specific rules about use, communication can be saved, cannot use for personal reasons.

Why would an alarm feature be useful in PIM software?

PIM is software that helps a person with organization of time and tacks. An alarm feature can be set to remind you of an upcoming event, such as a meeting or other appointment(s). You can set an alarm to play a sound or display a message at a specified time before the event is scheduled to occur.

What icon is commonly used on e-mail clients to invoke the Attachment option?

Paperclip

This method allows you to save your Web-based e-mail messages to your hard drive:

Retrieve your messages with a separate account that writes your mailbox folders to your hard drive

Forward

Sending an email you received to other people

CAPTCHA

Technology that is used to determine the order or email is coming from an actual person

What is an e-mail signature?

Text that appears automatically at the bottom of an e-mail message.

Which choice best describes the purpose of the Bcc(Blind Carbon Copy) e-mail message component?

The Bcc field contained e-mail address (es) of additional message recipient(s) that do not appear in the message header and are not visible to other recipients

SPAM

Unsolicited email

What are the three elements of an email address?

Username, @symbol and the domain name

You send an email message to a coworker to help plan a surprise going away party for a mutual friend before she embarks on a six-month around-the-world cruise. Which statement reflects your right to e-mail privacy?

Your supervisor has the right to read e-mail you send using company equipment and Internet connections.

Proofreading and checking spelling before sending an e-mail message is considered good...

netiquette


Set pelajaran terkait

Chapter 4: Application Software: Programs That Let You Work and Play

View Set

Launchpad Learning Curve Chap 8 Econ

View Set

intro test 4 ch. 4 point questions

View Set

Chapter 28 Head-to-Toe Assessment

View Set