• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/49

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

49 Cards in this Set

  • Front
  • Back
What protocol supports the encryption and decryption of e-mail messages?
Secure Multipurpose Internet Mail Extensions (S/MIME) and Pretty Good Privacy (PGP)
What is the term for an e-mail server program that receives sent messages and delivers them to their proper destination?
Mail Delivery Agent (MDA)
When you receive an e-mail transmission with an attachment, how does your browser know which application or plug-in to open to view or play the attachment?
The MIME definition for the application or plug-in that is located inside the HTTP header at the beginning of the transmission
Pretty Good Privacy (PGP) and GNU Privacy Guard (GPG) encrypt:
The e-mail message and its attachments
What is known as a "store-and-forward" e-mail service?
Post Office Protocol version 3 (POP3)
What enables users on different e-mail systems to exchange messages?
Gateways
What is a protocol that can be used by applications to automatically process files downloaded from the Internet?
Multipurpose Internet Mail Extensions (MIME)
What is an open-source implementation of Pretty Good Privacy (PGP) that does not use patented algorithms?
GNU Privacy Guard (GPG)
E-mail message headers consist of:
The To, Cc, Bcc, Subject and Attachment components
The commonplace use of e-mail has given rise to the term "snail mail," which is a slang term for what?
Standard postal service
What is considered the de factostandard communication tool for business?
Electronic mail (e-mail)
What symbol does an e-mail address use to separate the user name from the domain?
At ( @ )
What part of an e-mail address appears before the @ symbol?
User name
What part of an e-mail address appears after the @ symbol?
Domain name
For which of the following tasks can you use a Mail User Agent (MUA)?
To send e-mail messages
Which of the following can be considered a drawback of SMTP authentication?
There is a greater chance that a hacker can use a packet sniffer to obtain a valid user name and password.
Which of the following can be considered an advantage of Web-based e-mail?
You can log on and check your e-mail from any computer that has Internet access.
In order to send an e-mail message, you must include:
An address in the To field
What is the term for a file that is sent with an e-mail message?
Attachment
By default, e-mail clients typically save a copy of every message you send in:
The Sent or Sent Items folder
What is an e-mail signature?
Text that appears at the bottom of each message you send that contains your contact information
In which of the following components should you store names and information for your frequently accessed e-mail contacts?
Address book
How do most current e-mail clients display an attachment in an e-mail message?
As a separate link, such as an icon
What must an e-mail message recipient possess in order to view a file attachment?
The software necessary to open or edit the attached file
If your organization scans e-mail attachments to ensure that they contain no malicious code, where does the scanning take place?
At the e-mail server
What can administrators use to filter out the IP addresses of known spammers?
Blackhole list
What is a disadvantage of using Web-based e-mail?
Your user name and password reside on a third-party server.
What e-mail feature was designed for users with dial-up accounts who want to work offline and accumulate messages, then connect to the Internet and send all their queued messages at once?
Outbox folder
When you use an e-mail client to send and receive mail:
Messages stored in your Outbox are sent, a copy of each sent message is stored in the Sent Items folder, and incoming messages are routed to your Inbox
What would closed-envelope (or similar) icons in an Inbox's Message list represent?
Unread messages
What e-mail response option should you use to respond only to the original sender of an e-mail message?
Reply
What e-mail response option should you use to respond to the original sender of an e-mail message and include everyone who was copied
Reply All
What e-mail response option should you use to send an e-mail message to users who did not receive the original?
Forward
The appearance of right-pointing angle brackets (>) in the text of an e-mail message indicates that the message contains:
Forwarded text
The term "netiquette" refers to:
General rules for Internet politeness
Using all capital letters in an e-mail message connotes:
Shouting or anger
Why would you use emoticons in an e-mail message?
To help convey the intended tone of the message
What is the term for a combination of characters that you read sideways that helps convey emotion in an e-mail message?
Emoticon
What is an e-mail thread?
An e-mail message that includes information from the original e-mail message in a response
Why should you use out-of-office messages when you will be out of the office for an extended period of time?
To explain why you may not respond to e-mail messages within a reasonably short period of time
What is the term for the feature in an e-mail client that automatically sends a specified response to anyone who sends e-mail to your address?
Autoresponder
Which of the following is an appropriate use of e-mail in a business environment?
Discussing the status of a project with co-workers
What is the term for unsolicited and unwanted e-mail messages?
Spam
What is the term for an SMTP server that allows the third-party relay of e-mail messages that spammers use to send spam?
Open relay
What can be used to detect automated systems used by spammers for registering e-mail accounts?
CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart)
What client-side actions can you take to reduce the amount of spam you receive?
Set up a spam filter in your e-mail client to filter out spam messages
Why is having local access to e-mail messages important for those who use IMAP servers?
If a network problem occurs, IMAP server users may not have access to their messages
For what would you use a personal information management (PIM) program?
To schedule appointments and meetings, store contact information, and manage tasks
What device can you use with personal information management (PIM) software to synchronize appointments and contact information that you keep on your desktop or laptop computer?
A smartphone