Lesson 7 CIW
Name the protocol used to send e-mail over the Internet, and name one of two protocols that can be used to receive e-mail over the Internet.
(smtp) Simple mail transfer protocol is used to send e-mail, RECEIVE: and either (POP3) Post office protocol or Internet message access protocol (IMAP) is required to receive e-mail.
Lisa is configuring an email to connect to her email account which of the following is required to set up the email account
A POP3 address
What feature provided with many e-mail programs can store info for commonly accessed e-mail contacts?
Address Book
What file type(S) can be attached to an email message?
Almost any type of file can be attached to e-mail messages, such as documents, spreadsheets, presentations or image.
Why would an alarm feature be used in PIM software
An alarm feature can be sent to remind me of an upcoming event such as a meeting what other appointment you can set an alarm to play a sound or display a message to specify time before the event scheduled in the occur
Non-repudiation is the security principle of providing proof that a transcript occurred between identified parties which of the following can you use to enforce non-repudiation in an electronic data transfer
Digital signature
The following can be considered an inappropriate use of email communication in the workplace
Disclosing confidential information
Which email response command would you use to send a message to recipient did not receive the original
Forward
Proofreading and checking spelling before sending an email messages considered
Good Netiquitte
What is the best method for sending the content of a wordprocessor document another person be email
It means email etiquette or guidelines polite and sensible communication using email
Which is the preferred approach to communicate important action items in an e-mail message?
List the action items in a numbered list for clarity.
If you have set up web based email you can?
Log on and check your email from any computer that has Internet access
company owned email
Not private, specific rules about use, communication can be saved, cannot use for personal reasons.
PIM
Organization of time and tasks through the use of software
What Icon Is commonly used an email clients to invoke the attachment option
Paperclip Icon
This method allows you to see if your web based email message to your hard drive
Retrieve your messages from somebody kill them right to mailbox folder to ur hard drive
this method allows you to save you web-based email messages to your hard drive
Retrieve your messages with a separate account that writes your mailbox folders to your hard drive.
Email benefits
Speed, ability to send file attachments, record of communication that was sent or received
CAPTCHA
Technology that is used to determine the order or email is coming from an actual person
What is an e-mail signature?
Text that appears automatically at the bottom of an e-mail message
The purpose of the BCC email message component is?
The BCC field contains email addresses of additional message recipients that do not appear in the message header and are not visible to other recipients
What are the three elements of an email address
The user name the @symbol and the domain name
Can you send an email address to a coworker to help plan a surprise going away party for mutual friend before she embarks on a six month around the works cruise which statement reflects your right to email proves
Your supervisor has the right to re-email you sent using company equipment at the net connection
reply
answering an email
What does a closed envelope icon next to email message header indicate
iMessage that has not been yet read
email address
made up of a username and a domain name
SPAM
unsolicited email