etb lesson 7

Ace your homework & exams now with Quizwiz!

Lisa is configuring an email client to connect to her email account. Which of the following is required to set up the email account?

A POP3 address

Josh is expecting a very important file from a co-worker in a remote office to be sent to him through email, but he has not received the file. He calls the co-worker, who informs him that she sent the file yesterday and will send it again immediately. Josh still does not receive the email message, so he contacts Technical Support. They find the email from the co-worker in the spam folder of Josh's email client. It has an attachment named salesnumbers.exe. What is the most likely reason that the email message was filtered out?

A file attachment with an .exe extension may contain malicious code.

What does a closed-envelope icon next to an email message header indicate?

A message that has not yet been read

What is "netiquette"?

A set of guidelines that encourage common sense, politeness and general rules for email messages.

Which choice describes the file type(s) that can be attached to an email message?

Almost any type of file can be attached to email messages, such as documents, spreadsheets, presentations or images.

Why should you create and use an email signature for work-related email messages?

An email signature is a reminder to your recipients of your identity and the identity of your company.

How do most current email clients display an attachment in an email message?

As a separate link, such as an icon

What symbol does an email address use to separate the user name from the domain?

At ( @ )

What must an email message include in order for you to send it?

At least one address in the To field

Because file attachments may contain malicious code that can be used to damage or infiltrate systems, your company routinely scans all file attachments in incoming email. Where does attachment scanning take place?

At the server, usually just after the message has been received via SMTP

Which is the best method for sending a word-processor document to another person via email?

Attach the document to the email message as a file attachment.

Cleo's boyfriend sent her an email message at work with details about a highly personal matter. The message was sent to Cleo's company email address. Her boyfriend requested that she respond as soon as possible. Why should Cleo call her boyfriend to discuss the matter over the phone instead of responding in an email message?

Because her employer has the right to read her email

Kjell received an email message on which several other individuals were copied. He wants to respond to this message in a way that will include everyone who was copied on the original message. Which steps should he take with this email?

Click the Reply All button, enter his response, and click Send.

Marja works for a small but growing company. She has been assigned to make several international sales trips to visit prospective customers. The company does not have an enterprise mail server with Web mail access. Her IT department is looking for a solution so that Marja can check her email as she travels. Which of the following should the company choose for the most effective, economical and efficient solution?

Configure a free Web-based email account that Marja can access anywhere, and forward her email to that account while she travels.

Which of the following can be considered an inappropriate use of email communication in the workplace?

Disclosing confidential information

What is considered the de facto standard communication tool for business?

Electronic mail (email)

Todd replaced his mobile phone with an upgraded unit, and now must reconfigure many of the services. The instructions say that he can enter his email address and the unit will configure the email client for him. Todd has tried this several times, but it does not work. He calls the vendor's help desk. The technician says that because Todd is trying to sync his email account with an enterprise mail server, he will need to configure the email client manually. What information does Todd need to configure the email client?

Email address, SMTP, POP3, user name and password

You want to send an email message you received to another user who did not receive the original message. Which is the best way to do this?

Forward the message.

Which of the following is an open-source implementation of Pretty Good Privacy (PGP) that does not use patented algorithms?

GNU Privacy Guard (GPG)

Mark's co-worker sent him a joke via email. Mark thought the joke was quite funny, and he forwarded it to several other co-workers that he knows will be amused as well. Later that day, the Human Resources Manager calls Mark to her office to discuss a problem reported to her regarding the forwarded email. Which problem has Mark most likely encountered by forwarding the email message?

He offended a recipient who received the joke as a result of further forwarding.

For which type of email server is it especially important that you archive messages to your local hard drive?

IMAP server

Why should you make judicious use of file attachments in email messages?

Large file attachments can take a long time to download.

Troy is project manager for a development team. After a short meeting to introduce a new project, he is preparing an email message for his team that will assign some initial tasks to be completed that day. He has a list of action items for the team members to review and confirm. Which is the preferred approach to communicate important action items in an email message?

List the action items in a numbered or bulleted list for clarity.

Which protocol do email programs use to identify the file types of attached files?

MIME

What is the term for an email server program that receives sent messages and delivers them to their proper destination?

Mail Delivery Agent (MDA)

What is contained in your email application's Outbox folder?

Messages that are queued for sending

Which of the following is a protocol that can be used by applications to automatically process files downloaded from the Internet?

Multipurpose Internet Mail Extensions (MIME)

Which protocol was developed as an extension of SMTP that allows users to exchange various types of data files over the Internet?

Multipurpose Internet Mail Extensions (MIME)

Which of the following email features was designed for users with dial-up accounts who want to work offline and accumulate messages, then connect to the Internet and send all their queued messages at once?

Outbox folder

Any tool used to schedule appointments and meetings, store contact information, and manage tasks is known as a:

Personal Information Management (PIM) program.

Microsoft Outlook, pimcore and Salsify are all examples of:

Personal Information Management (PIM) programs.

What type of software is commonly found on all smartphones?

Personal Information Management (PIM) software

Which of the following is known as a "store-and-forward" email service?

Post Office Protocol version 3 (POP3)

What distinguishes S/MIME from MIME?

S/MIME supports encryption and the use of digital certificates, whereas MIME controls the way that messages and attachments are organized and distinguished from one another.

Which of the following protocols support the encryption and decryption of email messages?

Secure Multipurpose Internet Mail Extensions (S/MIME) and Transmission Control Protocol/Internet Protocol (TCP/IP)

You have just finished a very important sales meeting with a potential customer, and you need to update your supervisor at the corporate office, which is located in another country. You are debating whether to text or email your supervisor about the meeting details. Which of the following would be the best practice for communicating with your supervisor?

Send a brief text message update now, and then send the meeting details in an email message later.

In a business environment, in which situation would email be more appropriate for communicating than texting?

Sending a contract to your supervisor for her review and advice

Where do email clients typically save a copy of every message ever sent?

Sent or Sent Items folder.

Sadie receives a verbally abusive voicemail from an angry customer who want to complain about a product, followed by several text messages from the customer asking why no one has returned his call yet. Sadie is due at a mandatory meeting with the company's executive managers. Which of the following is her best course of action?

She should send a brief text message to the customer requesting that he send his complaints via email, so that further inappropriate communication will be well documented.

Which of the following is true regarding smartphones and PIM applications?

Smartphone PIM applications are designed to work in tandem with traditional desktop or laptop computers.

The commonplace use of email has given rise to the term "snail mail," which is a slang term for what?

Standard postal service

What is an email signature?

Text that appears automatically at the bottom of an email message

Which choice best describes the purpose of the Bcc email message component?

The Bcc field contains email address(es) of additional message recipient(s) that do not appear in the message header and are not visible to other recipients.

When you receive an email message with an attachment, how does your browser know which application to open to view or play the attachment?

The MIME definition for the application that is located inside the HTTP header at the beginning of the transmission.

What happens to the email messages you receive while the autoresponder feature is enabled?

The messages are stored in your Inbox as usual.

What must an email message recipient possess in order to view a file attachment?

The software necessary to open the attached file

What is the function of a CAPTCHA?

To differentiate humans from automated senders during online transactions

What is the purpose of the Signature field message component?

To include the sender's contact information.

What is the purpose of an email autoresponder?

To send an automated response to email messages received while you are unavailable

What is the most appropriate way email can be used in the workplace?

To share files and to document and track the progress of projects

In email applications, where are incoming messages automatically routed by default?

To the Inbox folder

Which action can you perform to filter spam at your client computer?

Use a client-side filter to identify and filter spam messages.

You are part of a team that has been collaborating on a marketing document. The document is ready for final approval from the stakeholders. The team leader has sent the document to the stakeholders as an attachment to an email. You notice that an important stakeholder was omitted from the recipient list. What should you do to ensure that the omitted stakeholder receives the document and receives future replies to the email thread?

Use the Forward feature, add the omitted stakeholder's email address and include the other email addresses from the original message to alert the team to the oversight.

When would be the most appropriate time to discontinue an email thread?

When new issues pertaining to a topic arise and a lengthy thread already exists

Which of the following can be considered an advantage of Web-based email?

You can log on and check your email from any computer that has Internet access.

What does it mean to configure an email client?

You must enter your email address and password.

Why is it a good idea to save email messages to your local computer hard disk?

Your email will be more easily transportable from one computer to another.

You send an email message to a co-worker to help plan a surprise going-away party for a mutual friend. Which statement reflects your right to email privacy?

Your supervisor has the right to read email you send using company equipment and Internet connections.

What feature provided with many email programs can store information for commonly accessed email contacts?

address book

Which email client feature allows you to store the names and information of people you contact frequently?

address book

When sending an email message, you must have:

an address in the To field.

Which of the following scans incoming email attachments to ensure they do not contain malicious code?

at the email server

To avoid the appearance of shouting or anger in email messages, you should

avoid typing messages in all capital letters.

What part of an email address appears after the @ symbol?

domain name

You have been contracted to write an article about social networks for a magazine. You have finished writing the article and are ready to send your draft to the magazine editor. Which is the most appropriate way to do this?

email

Pretty Good Privacy (PGP) and Gnu Privacy Guard (GPG) are both used to encrypt:

email messages and their attachments.

You recently returned from a vacation and you want to share some photos with your co-workers. You would like to share these photos via email. What should you consider when attaching several high-resolution photos to an email message?

file size

Which of the following enables users on different email systems to exchange messages?

gateways

If you have set up Web-based email, you can:

log on and check your email from any computer that has Internet access.

When you use an email client to send and receive mail:

messages stored in your Outbox are sent, a copy of each sent message is stored in the Sent Items folder, and incoming messages are routed to your Inbox.

Cheryl just started using a new email client on her laptop computer. She wants to send an email message with an attachment, but she does not see a button labeled "Attachment" on the client interface. What icon is commonly used on email clients to invoke the Attachment option?

paperclip

In order to help with your job tasks, your supervisor has given you a PIM application to install and use. PIM is an acronym for a type of program that can:

schedule appointments and meetings, store contact information, and manage tasks

Which task can a Mail User Agent (MUA) perform?

send email messages

Email message headers consist of:

the To, Cc, Bcc, Subject and Attachment components.

Your Inbox folder has an icon that looks like a closed envelope. What does this represent?

unread messages

What part of an email address appears before the @ symbol?

username

The signature block for your company email account should normally include:

your name and email address


Related study sets

Course 3 Module 5: Investment Risks

View Set

PEDS PrepU G&D of the Newborn and Infant

View Set

Intro - True/False Questions Final 1

View Set

NCCER Electrical Level 2 Module 9 'Grounding and Bonding'

View Set

6 steps of reception of transduction of sound energy

View Set

POE - Lesson 3: AC Theory Homework

View Set