Lesson 7: Question Preview (ID: 21621)


Below is a preview of the questions contained within the game titled LESSON 7: Part 2 Quiz Review .To play games using this data set, follow the directions below. Good luck and have fun. Enjoy! [print these questions]


Play games to reveal the correct answers. Click here to play a game and get the answers.

You are updating company guidelines regarding professional communication via e-mail. To dispel the impression of shouting or anger, users should:
a) avoid typing messages in all lowercase letters. b) make appropriate use of abbreviations to convey a businesslike tone. c) avoid typing messages in all capital letters. d) make appropriate use of emoticons to convey a businesslike tone.
What does a closed-envelope icon next to an e-mail message header indicate?
a) A message that has already been read b) A message marked for deletion c) A message marked for follow-up d) A message that has not yet been read
What is the purpose of an e-mail autoresponder?
a) To automatically attach your signature information to the end of every e-mail message you forward b) To automatically attach your signature information to the end of every e-mail message you send c) To send an automated response to e-mail messages that your system is configured to discard as spam d) To send an automated response to e-mail messages received while you are out of the office for a planned absence
Why can it be advantageous to write e-mail folders to files on your computer's local disk?
a) Your e-mail will be more easily transportable from one computer to another. b) You will be able to more easily ensure that your e-mail messages are virus-free. c) Your e-mail will be more easily integratable with a personal information management (PIM) program. d) You will be able to more easily filter out spam.
What does it mean to configure an e-mail client?
a) You must identify your operating system and the protocol used, and provide the names of the mail servers used by your ISP. b) You must identify yourself and provide the name of your ISP. c) You must provide the name of your ISP and the mail servers used by your ISP. d) You must provide the user name given by the ISP, and provide the names of the mail servers used by your ISP.
What type of software is common to all smartphones?
a) Encryption/decryption software. b) Personal Information Management (PIM) software. c) Spam-detection software. d) Virus-protection software.
Why should you create and use an e-mail signature for work-related e-mail messages?
a) An e-mail signature is an indication to your recipients that your e-mail messages are virus-free. b) Including an e-mail signature with your messages ensures the privacy of your e-mail messages. c) Including an e-mail signature with your messages makes it easier to recall e-mail messages that have been sent in error. d) An e-mail signature is a reminder to your recipients of your identity and the identity of your company.
Microsoft Outlook, IBM Lotus Organizer, Sage ACT! and CorelCENTRAL are all examples
a) Relational Database Management System (RDBMS) programs. b) Web-based e-mail client applications. c) Personal Information Management (PIM) programs. d) browser-based e-mail client applications.
You want to send an e-mail message you received to another user who did not receive the original message. Which is the best way to do this?
a) Forward the message. b) Copy the message text into a new message and send it to the omitted user. c) Reply to the message. d) Ask the sender to re-send the original message and include the omitted user.
Because file attachments may contain malicious code that can be used to damage or infiltrate systems, your company routinely scans all file attachments in incoming e-mail. Where does attachment scanning take place?
a) At the server, usually just after the message has been received via SMTP b) At the client, usually just after the message has been received via POP3 c) At the client, usually just after the message has been received via SMTP d) At the server, usually just after the message has been received via POP3
Kjell received an e-mail message on which several other individuals were copied. He wants to respond to this message in a way that will include everyone who was copied on the original message. Which steps should he take with this e-mail?
a) Click the Reply button, enter his response, and click Send. b) Open a New message, enter the e-mail addresses of all the recipients, enter his response, and click Send. c) Click the Reply All button, enter his response, and click Send. d) Click the Forward button, enter his response, and click Send.
Play Games with the Questions above at ReviewGameZone.com
To play games using the questions from the data set above, visit ReviewGameZone.com and enter game ID number: 21621 in the upper right hand corner at ReviewGameZone.com or simply click on the link above this text.

TEACHERS / EDUCATORS
Log In
| Sign Up / Register