Review Game Zone
Flash Cards
(current)
Games
Teachers
Search
Lesson 7
Test Description: Quiz Review
Instructions: Answer all questions to get your test result.
1) Which of the following is true regarding smartphones and PIM applications?
A
Smartphones use infrared-based keyboards for inputting information into PIM applications.
B
Smartphones save changes you make in PIM applications in random-access memory (RAM), the contents of which are erased when yo
C
Smartphones rarely have enough memory to support full-featured PIM applications.
D
Smartphone PIM applications are designed to work in tandem with traditional desktop or laptop computers.
2) Employers can monitor their employees' e-mail messages sent to and from the company network because:
A
regular monitoring reduces the extent of infection by malware.
B
it prevents employees from using network resources too frequently.
C
all information carried by the company's communication system is company property.
D
this activity minimizes the amount of spam employees receive.
3) Which of the following is a drawback of requiring SMTP authentication?
A
The SMTP server will not send e-mail messages that are not digitally signed.
B
Chances are increased that a hacker can use a packet sniffer to obtain a valid user name and password.
C
The SMTP server may be used illicitly to send unsolicited junk mail.
D
Chances are increased that a hacker can use a packet sniffer to obtain a valid digital certificate from the session.
4) Mark's coworker sent him a joke via e-mail. Mark forwarded it to several other co-workers that he knows will be amused as well. Later that day, the HR calls Mark to the office to discuss a problem reported to them about the e-mail.What is the problem
A
He reduced the effectiveness of the company's spam filters with frivolous e-mail messages.
B
He offended someone because he did not include everyone in the office who would enjoy the joke.
C
He committed copyright infringement by not citing credit to the originator of the joke.
D
He offended a recipient who received the joke as a result of further forwarding.
5) Which is the best method for sending a word-processor document to another person via e- mail?
A
Copy the contents of the document to the body of the e-mail message.
B
Send an e-mail message to the person telling her where she can access the document.
C
Attach the document to the e-mail message as a file attachment.
D
Send the document to your ISP, which will, in turn, send it the other person.
6) Cheryl wants to send an e-mail message with an attachment, but she does not see a button labeled Attachment on the client interface. What icon is commonly used on e-mail clients to invoke the Attachment option?
A
Flag
B
Paperclip
C
Envelope
D
Lock
7) Which choice describes the file type(s) that can be attached to an e-mail message?
A
Any type of file can be attached to an e-mail message, but only if the file is first compressed using a file compression util
B
Only image files can be attached to e-mail messages; any text must be placed in the body of the message.
C
E-mail messages do not support attachments of any type unless you use a browser to transmit them.
D
Almost any type of file can be attached to e-mail messages, such as documents, spreadsheets, presentations or images.
8) In a business environment, in which situation would e-mail be more appropriate for communicating than texting?
A
Sending a message to a friend about meeting at the ballgame later that evening
B
Sending a message to a co-worker about a special delivery at the front desk
C
Sending a message to your supervisor informing her that you are running late for a meeting
D
Sending a contract to your supervisor for her review and advice
9) In e-mail applications, where are incoming messages automatically routed by default?
A
To the Sent Items folder
B
To the Deleted Items folder
C
To the Outbox folder
D
To the Inbox folder
10) What is contained in your e-mail application's Outbox folder?
A
Messages that have been marked for deletion
B
Messages that you have sent to others
C
Messages that are queued for sending
D
Messages that have been sent to you by others
11) Which choice best describes the purpose of the Bcc e-mail message component?
A
The Bcc field contains the e-mail address(es) of additional recipient(s) to whom you want to send a copy of the message.
B
The Bcc field contains a brief description of the message content
C
The Bcc field contains e-mail address(es) of additional message recipient(s) that do not appear in the message header and are
D
The Bcc field contains the e-mail address(es) of primary message recipient(s).
12) What is the most appropriate way e-mail can be used in the workplace?
A
At least one character of body text
B
At least one character in the Subject field
C
At least one address in the To field, one character in the Subject field and one character of body text
D
At least one address in the To field
13) What must an e-mail message include in order for you to send it?
A
To access cloud-based applications, thereby minimizing software expenditures
B
To maximize the use of the company's ISP services
C
To share files and to document and track the progress of projects
D
To send quick messages and alerts
14) If you have set up Web-based e-mail, you can:
A
log on and check your e-mail from any computer that has Internet access.
B
send e-mail messages only if you attach digital certificates to them.
C
log on and check your e-mail only if you have purchased Internet service from an ISP.
D
download file attachments, even in the absence of MIME.
15) What happens to the e-mail messages you receive while the autoresponder feature is enabled?
A
The messages are stored in your Inbox as usual.
B
The messages are automatically sent to your Deleted Items folder.
C
Messages are stored in your Outbox until you disable the autoresponder feature and manually retrieve the messages to ur inbox
D
The messages are returned to the senders with the automatic reply message you specified.
16) Which protocol do e-mail programs use to identify the file types of attached files?
A
MIME
B
IMAP
C
SMTP
D
POP3
17) Lisa is configuring an e-mail client to connect to her e-mail account. Which of the following is required to set up the e-mail account?
A
An HTTP address
B
A DNS server address
C
An FTP server address
D
A POP3 address
18) In order to help with your job tasks, your supervisor has given you a PIM application to install and use. PIM is an acronym for a type of program with which you can:
A
schedule appointments and meetings, store contact information, and manage tasks.
B
filter spam at the server.
C
translate dotted-quad IP addresses into easily recognizable text-based names, and vice versa.
D
filter spam at the client.
19) Why should you make judicious use of file attachments in e-mail messages?
A
File attachments cause e-mail threads to become longer than they already are.
B
Attaching files to e-mail messages is not considered professional and should be avoided in the workplace.
C
Users will not be able to delete e-mail messages as long as files are attached to them.
D
Large file attachments can take a long time to download.
20) Which action can you perform to filter spam at your client computer?
A
Use SMTP authentication, which requires a valid name and password for each message.
B
Configure your system to filter IP addresses contained in the latest blackhole list.
C
Use CAPTCHA to distinguish human senders from automated senders.
D
Use a client-side filter to identify and filter spam messages.
*select an answer for all questions
Check Results & Get Answers
Play Games with the Questions Above
Teachers: Create FREE classroom games with your questions
Click for more info!
©2007-2024
ReviewGameZone.com
|
About
|
Privacy
|
Contact
|
Terms
|
Site Map
WAIT! Find what you needed?
×
Still Looking for the Answers?
Have Another Question?
Play a Review Game with These Questions?
Want to Make Your Own Test Like This One?