Chapter 4, Communicating Online

Ace your homework & exams now with Quizwiz!

courtesy copy (147)

a copy of the message you send as a courtesy to someone other than the primary recipients in the To line

chat (189)

a facility that allows two or more people to exchange text or multimedia messages in real time, using either a special client, or a mobile or web app

list owner (200)

a person who handles administrative tasks of a mailing list

moderator (200)

a person who handles administrative tasks of a mailing list

instant messaging (IM) (190)

a private means of exchanging real-time messages with one or several people using the Internet

social networking (182)

a process where individuals maintain connections with other people to share information or participate in activities of common interest

worm (179)

a self-replicating computer and email virus-standalone malware computer program that replicates itself in order to spread to other computers

VoIP (voice over Internet telephony) (198)

a technology used to make phone calls over the internet

Outbox folder (155)

a temporary storage folder for outgoing messages

user ID (143)

a unique identifier of the recipient; also called username

news server (199)

acts as a host to a number of newsgroups

content-sharing (192)

allow users to post a webpage link or image bookmark to a public website, and then tag the bookmark with keywords or hashtags

social bookmarking (192)

allow users to post a webpage link or image bookmark to a public website, and then tag the bookmark with keywords or hashtags

social tagging (192)

allow users to post a webpage link or image bookmark to a public website, and then tag the bookmark with keywords or hashtags

Short Message Service (SMS) (188)

allow users to send short messages containing text only or text, audio, and video

Multimedia Messaging Service (MMS) (188)

allows users to send short messages containing text only or text, audio, and video. Typically, users send and receive text messages using smartphones.

contact category (178)

also known as a contact group, mailing list, or distribution list, is a list of contacts to which you can refer collectively by a single name and to whom you can easily address a single email

text speak (189)

amount of text sometimes is limited, and to save time, users often use short abbreviations, known as text speak. an example of text speak is: "CU L8R K?" for 'See you later, ok?"

list address (200)

an email address used to send messages for distribution to list subscribers

POP (Post Office Protocol) (145)

an email protocol that stores and downloads messages to a client

web-based discussion group (199)

are online discussions forums often hosted by a portal.

phishing (180)

attempts to collect personally identifiable information, credit card numbers, bank account numbers and so forth.

spambot (150)

automated programs that create fake email accounts or hack into an unsuspecting user's email account to send spam, not only collect email addresses but can also generate email addresses to which to send spam

wiki (191)

consists of webpages in which authorized users can make edits to content, such as commenting or deleting

social opinion websites (195)

consumers visit social opinion websites to check out user reviews for products, movies, books, travel accommodations, local restaurants, appliances, and local services providers.

Subject line (147)

contains a description of the message content

Trash folder (155)

contains deleted messages

HTML-formatted message (148)

contains formatting, such as different fonts, font sizes, and font styles, as well as bulleted lists, indented paragraphs, and so forth.

Inbox folder (155)

contains incoming messages.

Junk email folder (156)

contains messages marks as unsolicited commercial email or spam based on the junk email options you set.

To line (147)

contains one or more email addresses of the message's recipient or recipients

Bcc line (147)

contains the email addresses of recipients who will receive a blind courtesy copy of the message

Attach line (147)

contains the file names of any attachments

message body (147)

contains the text of the message

Trojan horse (179)

creates a way for a hacker to breach network security

Message list (156)

displays individual messages

asynchronous communication (191)

does not require users to be online at the same time and includes email, mailing lists, and newsgroups. Chat is an example of synchronous communication (see definition)

channel (189)

or chat room, is a specific chat discussion that might be on a given topic or with a certain set of participants. Users also can set up private channels in which access is by invitation only, thus restricting who can participate.

chat room (189)

or chat room, is a specific chat discussion that might be on a given topic or with a certain set of participants. Users also can set up private channels in which access is by invitation only, thus restricting who can participate.

flag (172)

or unflag a message, tap or click in the flag column to the right of the message in the message list. A flag usually means that the message requires your attention.

synchronous communication (191)

real-time communication; when two or more users are online at the same time

stock-manipulation schemes (180)

scams encouraging unwary investors to buy a specific stock, thereby artificially inflating the stock's value

posting (200)

sending messages to a list

spam-filtering services (180)

services that filter out and either block or move to the Spam folder messages that do not meet certain criteria

newsreader (199)

software or an app that allows a user to read newsgroup messages

message header (148)

the To:, From:, Cc:, Bcc:, Subject:, and Attach: lines in an email message

unmoderated list (200)

the message goes out immediately to all subscribers

contact (155)

those users whose email or other information you have access to

troll (186)

those who intentionally post inflammatory comments on a blog or article, in order to provoke a response

user name (143)

unique identifier for the reciepient. To reach the correct destination, an email message must have a unique livery address consisting of a USER ID and host name, as well as a top-level domain. identifies the server where the recipient;s email account or mailbox resides.

open lists (200)

when subscribing to an open list, the subscription begins automatically upon receipt of the subscription email message.

Sent Mail folder (155)

where a copy of sent messages are stored by default

Sent items folder (155)

A mail folder that stores copies of outgoing messages.

Usenet network (199)

Usenet consists of a number of servers that use the NNTP to send newsgroup messages over an IP NETWORK. (NEWS SERVER)

Network News Transfer Protocol (NNTP) (199)

Usenet consists of a umber of servers that use the NNTP to send newsgroup messages over an IP NETWORK. (NEWS SERVER)

Spam folder (156)

A mail folder in which spam messages are automatically stored.

signature file (147)

A file that automatically inserts standard content, such as the name, title, and contact information of the sender, to outgoing email messages.

passphrase (152)

A sequence of words separated by spaces that can be combined like a password.

online survey technology (197)

A service that allows you to send a survey using email. SurveyMonkey or limesurvey

Contacts folder (175)

All email clients have an electronic address book in which you can store the email addresses and other information for your contacts, often call a Contacts folder. you can enter names, addresses, email addresses, and other important information about those with whom you correspond. mobile devices enable you to access your phone or device's contacts from within your email app.

IMAP (Internet Message Access Protocol) (145)

An email delivery protocol that provides mail management functions on the server.

SMTP (Simple Mail Transfer Protocol) (145)

An email delivery protocol that provides mail management functions on the server. interact with mail servers when sending and receiving messages.

cyberbullying (163)

Cyberbullying includes any Internet content created or distributed with the intent of hurting or humiliating someone, cyberbullying includes circulating cruel and spiteful email, photos, instant messages, and social networking messages.

web-based email service (149)

Email service available to use through a browser and a website.

emoji (148)

Emoticons and emojis can help the message recipient get the full flavor of a message. Be careful, however, not to over use emojis: a message that contains one or more icons per sentences loses its appeal and impact.

emoticon (148)

Emoticons and emojis can help the message recipient get the full flavor of a message. Be careful, however, not to over use emojis: a message that contains one or more icons per sentences loses its appeal and impact.

social media (181)

Online tools that allow people to communicate, collaborate, and share over the Internet.

lurking (189)

Reading mailing list messages without posting to the list.

web-based chat (189)

Real-time communication using a web browser instead of a special client.

closed list (200)

The subscription begins automatically upon receipt of the subscription email message. subscriptions that require approval by the list moderator

blogosphere (185)

The variety of blogs available is collectively referred to as the blogosphere. To find blogs to which you want to contribute,. you can use the search tools at blog portals or directories, such as Technorati or Bloglines.

opt-in (197)

email services, can help you promote eventd and reach customers using social media. Unlike span, email marketing relies on users to OPT-In to receive emails.

"Nigerian Sting" operations (180)

fraudulent requests for money

email marketing software (196)

helps organization send email and track the success of a marketing campaign by keeping track of the number of users who read the mail.

message rule (170)

instructs your email client to move certain messages to specific folders automatically

blind courtesy copy (147)

is a copy of a message sent without that recipient's name or email address appearing in the message header. Only the sender can see the Bcc line. The Bcc recipient(s) only see his or her own email address or name, and cannot see address for others in the Bcc line.

attachment (147)

is a file that is sent along with the email message

mailbox (145)

is a folder on the server that corresponds to the user name portion of the email address

email client (143)

is any program used to create, send, and receive email messages (fig 4-1). To se some email clients, you download and install the program or app on your computer to mobile device and instruct it to manage you incoming email from a server or web-based email service.

watched conversation (173)

its common for people to exchange multiple messages on the same topic or in the same conversation by replying to and forwarding messages. to more easily identify all the messages in a conversation, you can mark the original message and all of its replies as a part of a watched conversation. Messages in a watvhed conversation appear in color in the message list. you can also add a watch/ignore column to the message list to display a watch symbol or ignore symbol for each message in a watched conversation.

subscribe (200)

joining a list to receive email from a mailing list

host name (143)

like gmail.com, identifies the server where the recipient's email account or mailbox resides; example gmail.com

moderated list (200)

list directed by moderator, reviews the message and then either approves and sends it, makes or requests edits, or discards it.

Cc line (147)

lists the email addresses of recipients who will receive a courtesy copy of the message. A courtesy copy is a copy of the message you send as a courtesy to someone other than the primary recipients in the To line.

forward (162)

means to send a message that was sent to you to someone else.

newsgroup (199)

online bulletin bards that were first made available in the 80''s over the Usenet network.

Deleted items folder (156)

you can restore deleted files sent to the Windows Recycle Bin until you empty it, you can retrieve deleted messages from the deleted items folder until you empty it manually.. you can also set up and option to have the folder emptied each time you close Windows Live Mail.


Related study sets

HISTORY APUSH EXAM ALL TERMS FROM AMSCO BOOK

View Set

Organization: Structure and Culture Quiz

View Set

Module 10C - Inflammatory bowel disease- Pearson

View Set

WIS2040 test 1 reading, Wis 2040 Topics 1-9, Exam 1 answers, Wildlife Issues, Exercise 2 WIS2040, Exam 1, Moulton Wis2040 lecture guide study questions

View Set

History of Sport UNL Exam 1 Spring 2021

View Set