Computer Concepts- M5-M6 Email Part 1 & 2

Ace your homework & exams now with Quizwiz!

If you want to send and receive email messages containing images and formatted text, you need to ensue that your email program is configured to read ________________email messages.

HTML

Password protection- Make as long as possible. At least 6 characters, 2 being numeric. Mix up characters and punctuations. No personal info, not same as account #.

Message header- includes information about an email such as senders name, date sent, and subject.

Creating an email signature

click options gear top right click view all outlook settings click compose and reply click edit signature line, type in first and last name emal address and 3rd line of choice. choose your name twice and Save.

Sexual harrasment/ discrimination

includes one inappropriate joke sent through email.

Securities Law Violations

internet bulletin boards are hotbd of false info about companies with goal of moving stock price up or down. Stock manipulation. Can be held accountable for violation.

Spam

junk email or unsolicited mass electronic mail outs. Use spam protection such as Mailwasher, spam alarm.

Instagram

networking site that allows users to exchange pictures

Twitter

networking site that allows users to exchange short quick messages.

TikTok

networking site that allows users to exchange videos

application clients

progams where email accounts must be configured on a local machine before accessing. ex. microsoft outlook

a reply is a response to the person who sent you the email

reply all button top right corner

Create new folder

right click folders create new folder

True or False. Any email that you send is private and it cannot be read by anyone other than the person to whom it is addressed.

False

True or False. E-mails are completely private.

False

True or False. One disadvantage to using a webmail interface is that you can only access your email from your home computer.

False

When you are sending one email to all of your friends in your address book you should use the _____________ field to keep their addresses private.

Bcc:

BCC

Blind Carbon Copy. Private Carbon Copy. Copy sent to that person where only that person can see that it was sent to them.

social networking sites- allow people to interact w family and friends ex. fb

Blogs- online personal journals

When you set up a new email account, you may have to enter a distorted series of letters and numbers, called a_________________________ to ensure that you are a human and not a computer.

Captcha

An email claiming that you have won a lottery might be an example of ________.

Computer Fraud

Email that has NOT been opened is shown in BOLD.

Computer fraud ex. an email claiming you won the lottery.

Copyright Infringement

Copying and distributing someone else's work without their consent.

Toggling to Contacts/ Groups- Click All apps/ Click people

Creating new contact- Click new contact/ Fill out/ Save

To create new group- click drop down next to new contact/Click new group and give a name/ add members.

Editing/Deleting a group- Open/ Edit group on ribbon/ make changes/ save or delete

Which of the following is NOT true about email?

It cannot be accessed by hackers. (This is false)

An email containing a virus hoax is dangerous because ________.

It causes people to search for and delete important files.

FAQ (frequently asked questions) FWIW- for what its worth TTFN- tata for now

Legal considerations- misuse of companys email systems can have serious consequences.

Chat rooms- Electronic meeting places

List servs- electronic mailing lists of people with common interests

Formatting a text

changing things such as color, font, or size of a text.

ASAP- as soon as possible CU- see you NRN- not right now

PLS- please THX- thanks LOL-laugh out loud

An email supposedly from your IT department asking for your password so that it can troubleshoot your account is a form of _______________.

Phishing

When you receive an email and you want to reply back to the sender and all of the addresses that were included in the original message, you should use ____________.

Reply All

Unwanted or junk email is called_______________.

Spam

A conversation that takes place on a discussion board is called a _____________.

Thread

True or False. It is a good idea to obtain an email account that is not tied to your ISP, so that when you change service providers you wont lose your email account.

True

True or False. Once a computer is infected, a virus can use the email program to send out copies of itself.

True

True or False. One way to access email is to read it online through a webmail interface.

True

True or False. With a client-based email account, such as Microsoft Outlook, you are able to view your email only from the computer on which the client program is installed.

True

When you send an email to your professor, a server holds onto that email until the professor requests it. True or False.

True

Inbox is your primary folder. Email CAN be accessed by hackers.

Twitter is service to stay connect w fam/friends easy to do on cell.

Emails are not private and do not provide as secure environment to communicate.

Typing UPPERCASE is considered shouting and not acceptable to email ettique. Always use complete sentences.

All of the following are tips for professional e-mail etiquette, EXCEPT ____________________________.

Use abbreviations such as "u", "r", and "BRB".

Defamation/ Cyber Libel

Using companies name. ex employee participating in chat room.

The type of e-mal that is managed by your browser and enables you to access your email from anywhere you have Internet access is __________ email.

Web-based

Attachments can contain viruses.

You can open an attachment online if you have the associated software installed.

Virus

a computer code sent via email. Opening can activate code containing virus.

a contact stores personal information about a person.

a group is a collection of contacts. (Distribution list)

web based email clients

able to access email from any computer with internet access. ex. yahoo, gmail, ect..

phising

an email scam that lures internet users into revealing personal information. results in identity theft and fraud. Verify email b4 clicking on it.

CC

carbon copy. Email sent to that person to keep for their reference.

virus hoax is dangerous. it causes people to look for important info and delete it.

discussion board convo- thread once computer is infected, a virus can use email program to send out copies of itself to other people.

Move emails to new folder (3 ways)

drag email to desired folder right click email, choose move, to different folder left click email, choose move to on ribbon, to different folder

To read HTML email messages, must configure ur email program to send and recieve emails w images/ formatted texts.

email is not private. it can always be forwarded to someone else.


Related study sets

Ch 16 State and local tax ISSUES

View Set