Quiz 7b Question Preview (ID: 48434)
...
TEACHERS: click here for quick copy question ID numbers.
Which device can synchronize with the personal information management (PIM) on your computer?
a) A Message Transfer Agent (MTA)
b) A smartphone
c) A router
d) A USB connector
Using all capital letters in an email message connotes:
a) professionalism
b) immaturity
c) shouting or anger
d) humor or sarcasm
What part of an email address appears after the @ symbol?
a) user name
b) protocol
c) domain name
d) top-level server
Which of the following enables users on different email systems to exchange messages?
a) Transmission Control Protocol/Internet Protocol (TCP/IP)
b) Internet Service Providers (ISPs)
c) Gateways
d) Mail User Agents (MUAs)
Which of the following can be considered an advantage of Web-based email?
a) You can access email from LANs that use proprietary protocols.
b) You can log on and check your email from any computer that has Internet access.
c) You can specify an IMAP or POP3 server as the incoming mail server.
d) You can eliminate the need for gateways to exchange messages with users on different email systems.
Which of the following client-side actions can you take to reduce the amount of spam you receive?
a) Use a blackhole list to filter out the IP addresses of known spammers.
b) Use the Completely Automated Public Turing Test to Tell Computers and Humans Apart (CAPTCHA) test.
c) Set up a spam filter in your email client.
d) Block email messages from everyone who is not on your contact list.
The signature block for your company email account should normally include:
a) Your catch phrase.
b) Your bosses' name.
c) Your name and email address.
d) Your home address.
When you use an email client to send and receive mail:
a) messages stored in your Sent Items folder are sent, a copy of each sent message is stored in the Outbox, and incoming message
b) messages stored in your Sent Items folder are deleted, a copy of each sent message is stored in the Outbox, and incoming mes
c) messages stored in your Outbox are deleted, a copy of each sent message is stored in the Sent Items folder, and incoming mess
d) messages stored in your Outbox are sent, a copy of each sent message is stored in the Sent Items folder, and incoming message
Which of the following protocols support the encryption and decryption of email messages?
a) Multipurpose Internet Mail Extensions (MIME) and Pretty Good Privacy (PGP)
b) Secure Multipurpose Internet Mail Extensions (S/MIME) and Pretty Good Privacy (PGP)
c) Secure Multipurpose Internet Mail Extensions (S/MIME) and Transmission Control Protocol/Internet Protocol (TCP/IP)
d) Multipurpose Internet Mail Extensions (MIME) and Transmission Control Protocol/Internet Protocol (TCP/IP)
Email message headers consist of:
a) the To, Cc, Bcc, Subject and Attachment components.
b) the Cc, Bcc, Subject and Message components.
c) the To, Subject, Attachment and Message components.
d) the To, Subject, Message and Signature components.
Which of the following is a disadvantage of using Web-based email?
a) If a network problem occurs, your email messages will be deleted from the server.
b) Web-based email clients do not communicate with online service email programs.
c) Web-based email clients use open-relay servers that are more vulnerable to spammers.
d) Interruptions in Internet connections may prevent you from accessing your messages.
What is the term for an email server program that receives sent messages and delivers them to their proper destination?
a) Simple Mail Transfer Protocol (SMTP)
b) Post Office Protocol version 3 (POP3)
c) Mail Delivery Agent (MDA)
d) Message Transfer Agent (MTA)
Why should you use out-of-office messages when you will be away for an extended period of time?
a) To explain why you may not respond to email messages within a reasonable period of time
b) To maintain the privacy of your personal email messages while you are away
c) To keep your Inbox from filling up with unwanted messages while you are away
d) To apply the principles of Internet etiquette to your email messages
Why is having local access to email messages important for those who use IMAP servers?
a) IMAP servers store your user name and password on third-party servers that are vulnerable to hackers.
b) If a network problem occurs, IMAP server users may not have access to their messages.
c) If a network problem occurs, IMAP servers move your email messages to your Deleted Items folder.
d) IMAP servers are more vulnerable to spammers because they are open-relay servers.
The commonplace use of email has given rise to the term snail mail, which is a slang term for what?
a) Courier service
b) Facsimile messages
c) Standard postal service
d) Overnight delivery service
What symbol does an email address use to separate the user name from the domain?
a) At ( @ )
b) Ampersand ( )
c) Period ( . )
d) Number sign ( # )
Which of the following is an open-source implementation of Pretty Good Privacy (PGP) that does not use patented algorithms?
a) Multipurpose Internet Mail Extensions (MIME)
b) GNU Privacy Guard (GPG)
c) Mail Delivery Agent (MDA)
d) Mail User Agent (MUA)
Which of the following is known as a store-and-forward email service?
a) Post Office Protocol version 3 (POP3)
b) Mail Delivery Agent (MDA)
c) Simple Mail Transfer Protocol (SMTP)
d) Internet Message Access Protocol (IMAP)
Which email client feature allows you to store the names and information of people you contact frequently?
a) Email signature
b) Email thread
c) File attachment
d) Address book
Where do email clients typically save a copy of every message ever sent?
a) Sent or Sent Items folder.
b) Draft folder.
c) Inbox folder.
d) Outbox folder.
Play Games with the Questions above at ReviewGameZone.com
To play games using the questions from above, visit ReviewGameZone.com and enter game ID number: 48434 in the upper right hand corner or click here.
To play games using the questions from above, visit ReviewGameZone.com and enter game ID number: 48434 in the upper right hand corner or click here.
TEACHERS / EDUCATORS
Log In | Sign Up / Register
Log In | Sign Up / Register