Tutorial 2: Basic Communication on the Internet: Email
TRUE/FALSE
1. When you send an email message, the message is sent to a mail server.
ANS: T PTS: 1 REF: WEB 80
2. An email message requires three things: header, body, and signature.
ANS: F PTS: 1 REF: WEB 81
3. Bcc email recipients are unaware of other Bcc recipients.
ANS: T PTS: 1 REF: WEB 83
4. “Detaching a file” is the phrase often used for saving an email attachment to your computer.
ANS: T PTS: 1 REF: WEB 84
5. Email is considered private, and therefore safe to use as a medium for discussing sensitive information.
ANS: F PTS: 1 REF: WEB 86
6. An email with a Subject line beginning with “Fw” indicates that the message has been forwarded.
ANS: T PTS: 1 REF: WEB 88
7. Thunderbird is Microsoft’s open source email project.
ANS: F PTS: 1 REF: WEB 91
8. A powerful feature of Thunderbird is its adaptive spam and junk mail filters.
ANS: T PTS: 1 REF: WEB 94
9. The Opera Mail email client is automatically installed with the Opera Web browser.
ANS: T PTS: 1 REF: WEB 97
10. Thanks to improved technology, email attachments no longer contain viruses.
ANS: F PTS: 1 REF: WEB 100
11. “UCE” is another term for spam.
ANS: T PTS: 1 REF: WEB 101
12. The CANNED-SPAM law was the first U.S. federal government effort to legislate controls on spam.
ANS: F PTS: 1 REF: WEB 102
13. The reading pane is a feature of Windows Live Mail.
ANS: T PTS: 1 REF: WEB 105
14. When you delete an email message that contains an attached file, you also delete the file that is attached to the message.
ANS: T PTS: 1 REF: WEB 115
15. When using Windows Live Mail to reply to a message, the email program will copy the original message and place it in the message body.
ANS: T PTS: 1 REF: WEB 115
16. To forward a message using Windows Live Mail, select the message in the message list, then click the Share button on the toolbar.
ANS: F PTS: 1 REF: WEB 116
17. When using Windows Live Mail on a public computer, if you don’t delete your messages from the Inbox and then delete them again from the Deleted items folder, the next person to use the computer could access and read your messages.
ANS: T PTS: 1 REF: WEB 119
18. The term “NetManners” refers to the set of commonly accepted rules that represent proper behavior on a network.
ANS: F PTS: 1 REF: WEB 85
19. POP (or POP3) is an extensively used protocol for handling incoming email messages.
ANS: T PTS: 1 REF: WEB 90
20. The IMAP protocol specifies how to encode nontext data, such as graphics and sound, in an email so that it can travel over the Internet.
ANS: F PTS: 1 REF: WEB 80
MODIFIED TRUE/FALSE
1. Protocols are rules that determine how the Internet handles message packets flowing on it.
ANS: T PTS: 1 REF: WEB 80
2. An email user’s account name is also known as their domain name.
ANS: F, user name
PTS: 1 REF: WEB 80
3. In an email, the message body contains the actual message content.
ANS: T PTS: 1 REF: WEB 81
4. The full email address of the main recipient should be entered into the Cc line of a message header.
ANS: F, To
PTS: 1 REF: WEB 82
5. You cannot attach more than one file to an email message.
ANS: Fcanmay
PTS: 1 REF: WEB 83
6. A emoticon is a group of keyboard characters that when viewed together represent a human expression.
ANS: T PTS: 1 REF: WEB 87
7. Some email programs let you define and use a(n) queue to move incoming mail into a specific folder.
ANS: F, filter
PTS: 1 REF: WEB 88
8. Most email programs offer you two options for replying to a message that you have received: Reply or Reply All.
ANS: T PTS: 1 REF: WEB 89
9. When you install Microsoft Internet Explorer for Windows XP, the Windows Live Mail email program is also installed.
ANS: F, Outlook Express
PTS: 1 REF: WEB 90
10. Mozilla Thunderbird provides a(n) Spell button to check your document for spelling errors.
ANS: T PTS: 1 REF: WEB 93
11. Opera’s email client offers a(n) File Center column you can click to assign a category to a message.
ANS: F, Label
PTS: 1 REF: WEB 100
12. In Windows Live Mail, the reading pane contains summary information for each message that you receive.
ANS: F, message list
PTS: 1 REF: WEB 105
13. In Windows Live Mail, when you receive new mail, messages that you haven’t opened yet are displayed with a(n) closed envelope icon next to them.
ANS: T PTS: 1 REF: WEB 111
14. In Windows Live Mail, the address book is called Windows Live Contacts.
ANS: T PTS: 1 REF: WEB 120
15. You can use Windows Live Contacts to create a group of email addresses, called a(n) cluster.
ANS: F, category
PTS: 1 REF: WEB 122
MULTIPLE CHOICE
1. “Email” is short for ____.a. electrical mail c. electronic mailb. ethernet mail d. none of the above
ANS: C PTS: 1 REF: WEB 80
2. Email travels across the Internet ____.a. in small packets, like other forms of
Internet communicationc. only at off-hours, which is why it’s
inexpensiveb. all at once in one cohesive packet for
securityd. faster than any other type of Internet
communication
ANS: A PTS: 1 REF: WEB 80
3. ____ handles outgoing email messages, determining the paths an email message takes on the Internet.a. POP c. IMAPb. SMTP d. MIME
ANS: B PTS: 1 REF: WEB 80
4. The ____ protocol specifies how to encode nontext data, such as graphics or sound, so it can travel over the Internet.a. POP c. SMTPb. MIME d. IMAP
ANS: B PTS: 1 REF: WEB 80
5. To route an email message to someone, you must identify that person by his or her user name, and by their ____.a. passphrase c. IP addressb. domain name d. time zone
ANS: B PTS: 1 REF: WEB 80
6. The email address [email protected] is the same as the email address ____.a. [email protected] c. [email protected]
b. someone@maildotcom d. [email protected]
ANS: D PTS: 1 REF: WEB 81
7. All of the following are typical parts of an email message EXCEPT ____.a. salutation c. message bodyb. message header d. signature
ANS: A PTS: 1 REF: WEB 81
8. In the figure above, the message topic is represented by ____.a. F c. Cb. B d. D
ANS: D PTS: 1 REF: WEB 82
9. In the figure above, the primary recipient’s email address would be entered into ____.a. G c. Bb. C d. E
ANS: B PTS: 1 REF: WEB 82
10. In the figure above, H represents the ____.a. contact list c. subjectb. message body d. message header
ANS: D PTS: 1 REF: WEB 82
11. In the figure above, upon arrival of this email, the person indicated in C will see all of the following EXCEPT ____.a. A c. D
b. B d. F
ANS: A PTS: 1 REF: WEB 82
12. When you send along a complex document or graphic as part of your email, you send it along as a(n) ____.a. tag c. protocolb. attachment d. wrapper
ANS: B PTS: 1 REF: WEB 83
13. A file that has been attached to an email message will be received by those recipients in the ____ line(s) of the message header.a. To only c. To, Cc, and Bccb. To and Cc only d. Bcc only
ANS: C PTS: 1 REF: WEB 83|WEB 84
14. If you are using email for a business communication, your ____ usually contains your name, title, and your company’s name.a. closing c. mail serverb. e-envelope d. signature file
ANS: D PTS: 1 REF: WEB 84
15. The term ____ refers to a set of commonly accepted rules for proper behavior on a network.a. netiquette c. e-mannersb. mores d. E-mily Post
ANS: A PTS: 1 REF: WEB 85
16. All of the following are email acronyms noted in the text EXCEPT ____.a. btw c. wthb. imho d. atm
ANS: C PTS: 1 REF: WEB 87
17. A group of keyboard characters that, viewed together, represent a human expression is known as a(n) ____.a. e-doodle c. emoticonb. Web face d. Nettitude
ANS: C PTS: 1 REF: WEB 87
18. If you are in the midst of composing an email message, but want to save it and finish it later, you can store your email in your program’s ____ folder.a. Buffer c. Draftsb. Inbox d. Queue
ANS: C PTS: 1 REF: WEB 87
19. The email acronym “iow” stands for “____.”a. inbox/outbox/work c. in or winb. in other words d. in one word
ANS: B PTS: 1 REF: WEB 87
20. Some email programs let you use a(n) ____ to move incoming mail to a specific folder or to delete it automatically based on the content of the message.a. router c. filterb. baffle d. protocol
ANS: C PTS: 1 REF: WEB 88
21. Another term for junk mail is ____.a. slop c. ramenb. clutter d. spam
ANS: D PTS: 1 REF: WEB 88
22. When you ____ a message, a copy of the original message is sent to the new recipient(s) without the original sender’s knowledge.a. forward c. draftb. reply to d. filter
ANS: A PTS: 1 REF: WEB 88
23. A ____ message is a copy of the sender’s original message with your inserted comments.a. drafted c. quotedb. volley d. plagiarized
ANS: C PTS: 1 REF: WEB 88
24. When using the “Reply All” option, your message will automatically be sent to ____ recipients of the original message.a. To only c. To, Cc, and Bccb. To and Cc only d. CC only
ANS: B PTS: 1 REF: WEB 89
25. In your address book, you can assign each entry a unique ____ so it is easier to address your email messages.a. tag c. nicknameb. moniker d. domain name
ANS: C PTS: 1 REF: WEB 90
26. Mozilla’s popular email program is called ____.a. Thunderbird c. Apacheb. Opera d. Outlook Express
ANS: A PTS: 1 REF: WEB 91
27. When you start Thunderbird for the first time, you will see the ____ Wizard.a. Thunder c. Configurationb. Mail d. Account
ANS: D PTS: 1 REF: WEB 91
28. Thunderbird uses ____ panes to organize your email messages.a. 1 c. 4b. 3 d. 6
ANS: B PTS: 1 REF: WEB 92
29. In Thunderbird, you write your email messages in the ____ window.a. Preview c. Composeb. Outbox d. none of the above
ANS: C PTS: 1 REF: WEB 92
30. In Thunderbird, when you receive a message, it appears in the ____ pane; when you click it, it opens in the ____ pane.a. Message, Preview c. Message, Inboxb. Preview, Message d. Preview, Folders
ANS: A PTS: 1 REF: WEB 93
31. If Thunderbird treats a message as spam but should not, click the ____ button.a. Safe c. Thumbs Upb. Allow d. Not Junk
ANS: D PTS: 1 REF: WEB 94
32. In Thunderbird, clicking the ____ searches every folder and message for matches using criteria that you specify.a. Deep Search button c. Search All buttonb. Saved Search folder d. Deep Search folder
ANS: B PTS: 1 REF: WEB 95
33. The Opera Mail email client is installed ____.a. with Internet Explorer versions 7 and
higherc. as a stand-alone download
b. with the Opera Web browser d. none of the above
ANS: B PTS: 1 REF: WEB 97
34. In Opera, pressing the F4 key lets you close the ____.a. Mail panel c. Panels barb. Address Book d. both a and c
ANS: D PTS: 1 REF: WEB 98
35. In Opera, you can show and hide parts of the message header by clicking the ____ button on the ____ toolbar.a. Compose Message, View c. View, Compose Messageb. View, Panels d. Panels, Header
ANS: C PTS: 1 REF: WEB 99
36. By default, Opera sends forwarded messages as ____.a. inline text c. a separate text blockb. an image file d. none of the above; Opera cannot forward
messages
ANS: A PTS: 1 REF: WEB 99
37. Opera’s messages are stored in ____.a. folders in a mailbox c. a single database
b. a distributed database d. small folders located randomly throughout your hard drive for added security
ANS: C PTS: 1 REF: WEB 100
38. Email attachments can contain malicious programs called ____.a. bugs c. hackersb. wyrms d. viruses
ANS: D PTS: 1 REF: WEB 100
39. Software that only detects and eliminates malicious code is called a(n) ____ program.a. sniffer c. crackerb. antivirus d. watchdog
ANS: B PTS: 1 REF: WEB 100
40. A virus ____ is a sequence of characters that is always present in a particular virus.a. signature c. definitionb. pattern d. all of the above
ANS: D PTS: 1 REF: WEB 100
41. The colloquial term for UCE is ____.a. a syntax error c. spamb. a virus d. the blue screen of death
ANS: C PTS: 1 REF: WEB 101
42. According the MAAWG, approximately ____% of all email messages sent every day are abusive.a. 40 c. 20b. 80 d. 50
ANS: B PTS: 1 REF: WEB 101
43. In January 2004, the U.S. ____ law went into effect.a. CAN-SPAM c. SPAM-CANb. END-SPAM d. SCRAM
ANS: A PTS: 1 REF: WEB 102
44. The U.S. federal anti-spam law was passed in January 2004. By April 2004, the measured spam message rate was ____ it was in January 2004.a. higher than c. lower thanb. the same as d. no test of this kind was performed
ANS: A PTS: 1 REF: WEB 102
45. For anti-spam legislation to become cost-effective, prosecutors must ____.a. be able to identify spammers easily c. see a greater social benefit to winning
casesb. have a greater likelihood of winning the
cases that they filed. All of the above
ANS: D PTS: 1 REF: WEB 103
46. The Windows Live Mail Inbox window contains three panes: folder, ____, and reading.
a. inbox c. composeb. outbox d. message
ANS: D PTS: 1 REF: WEB 105
47. Windows Live Mail comes with ____ default folders.a. 1 c. 5b. 3 d. 7
ANS: C PTS: 1 REF: WEB 105
48. In Windows Live Mail, the ____ folder stores copies of messages you have sent.a. Outbox c. Sentb. Sent items d. Delivered
ANS: B PTS: 1 REF: WEB 105
49. In Windows Live Mail, the ____ folder stores messages that have not been sent.a. Outbox c. Sendingb. Pending d. Queue
ANS: A PTS: 1 REF: WEB 105
50. In Windows Live Mail, the ____ contains summary information for each message that you receive.a. message list c. reading paneb. folder pane d. pending list
ANS: A PTS: 1 REF: WEB 105
51. You use the ____ button in Windows Live Mail to open the New Message window.a. Compose c. Newb. Email d. New Message
ANS: C PTS: 1 REF: WEB 109
52. The Windows Live Mail New Message window has a toolbar along the top, with menu items named Send, Save, ____, and Check names, among others.a. File c. Formatb. Attach d. Edit
ANS: B PTS: 1 REF: WEB 110
53. When sending an email to multiple recipients, separate the addresses with a ____.a. comma c. either a or bb. semicolon d. neither a nor b
ANS: C PTS: 1 REF: WEB 109
54. When you receive a new email in Windows Live Mail, messages are displayed with an icon of a(n) ____.a. pair of wings c. envelopeb. ream of paper d. antenna
ANS: C PTS: 1 REF: WEB 111
55. To check for incoming email in Windows Live Mail, first click the ____ button on the toolbar.a. Receive c. Check
b. Delivery d. Sync
ANS: D PTS: 1 REF: WEB 112
56. Windows Live Mail uses a(n) ____ icon to indicate that a message has an attachment.a. paperclip c. sheaf of paperb. envelope d. pushpin
ANS: A PTS: 1 REF: WEB 113
57. To save an attached file in Windows Live Mail, the first step is to ____.a. click Save as c. navigate to the drive and folder in which
to save the attached fileb. right-click the file to open the shortcut
menud. click the Save button
ANS: B PTS: 1 REF: WEB 113
58. When replying to an email message using Windows Live Mail, the email program automatically places the text “____” in the subject line in front of the original subject.a. Regarding c. Re:b. Replying d. Fw:
ANS: C PTS: 1 REF: WEB 115
59. The following are all true of forwarding an email message using Windows Live Mail EXCEPT ____.a. attachments from the original email will
still be attached in the forwarded emailc. the text “Fw:” is placed in front of the
original subjectb. you can forward a message via the To, Cc,
and Bcc text boxesd. the original sender is automatically added
as a recipient
ANS: D PTS: 1 REF: WEB 116
60. You can use the Windows Live Mail folders to file your email messages by ____.a. topic c. both a and bb. category d. neither a nor b
ANS: C PTS: 1 REF: WEB 117
61. When you delete a message or folder in Windows Live Mail, you are really ____.a. storing it in your Recycle Bin c. permanently deleting itb. moving it to the Deleted items folder d. none of the above
ANS: B PTS: 1 REF: WEB 119
62. To remove an item permanently from Windows Live Mail, you must delete it from the ____.a. Deleted items folder c. Recycle Binb. Inbox d. hard drive manually
ANS: A PTS: 1 REF: WEB 119
63. Contacts is the Windows Live term for the ____.a. calendar c. instant messagerb. mail server d. address book
ANS: D PTS: 1 REF: WEB 120
64. To add a sender’s email address to your Windows Live Contacts, the first step is to ____.a. right-click the “From” name to open the
shortcut menuc. double-click the message to open it
b. click “Add to contacts” d. click the “Permit” button to gain permission from the sender to add their address
ANS: C PTS: 1 REF: WEB 122
65. ____ are rules that determine how the Internet handles message packets flowing on it.a. Mores c. Serversb. Protocols d. Codes
ANS: B PTS: 1 REF: WEB 80
66. Some mail servers will reject messages with too many recipients (usually ____ or more).a. 25 c. 10b. 50 d. 100
ANS: B PTS: 1 REF: WEB 82
67. A(n) ____ file is a file you can view but cannot change.a. read-only c. sharedb. locked d. attach-only
ANS: A PTS: 1 REF: WEB 84
68. The following are generally accepted rules for email messages EXCEPT ____.a. avoid writing messages in all capital
lettersc. always forward new information about
viruses and hoaxesb. don’t overuse formatting and graphics d. use caution when attempting sarcasm or
humor in your messages
ANS: C PTS: 1 REF: WEB 86
69. If you receive an email message from a sender that you don’t recognize and the message contains an attached file, you should ____.a. contact the local police so they can run a
trace on the emailc. immediately delete the email and reboot
the computerb. only open the file in the evenings, when
malicious code is less virulentd. avoid opening the file until you are sure
that it doesn’t contain a virus
ANS: D PTS: 1 REF: WEB 100
70. Spam ____.a. consumes bandwidth c. may include content that is offensive or
misleadingb. distracts employees and wastes their time d. All of the above
ANS: D PTS: 1 REF: WEB 101
Case-Based Critical Thinking Questions
Case 2-1
Patty has just gotten her first email address, and has decided to use Windows Live Mail as her email program. She has created & configured her mail account, and is ready to start emailing. But she has a lot of questions, and knows you can help her out.
71. Patty sits at her computer and starts Windows Live Mail. The Inbox window appears on the screen. Patty clicks in the pane in the lower part of her screen and tries to start typing an email, but nothing happens. What has she done wrong?a. She should click the top part of the screen,
in the message list.c. She hasn’t done anything wrong; her text
will show up when she clicks “Sync” or “Send.”
b. She needs to click “Drafts” first. d. She needs to click the “New” button on the toolbar before she can type a new message.
ANS: D PTS: 1 REF: WEB 109 TOP: Critical Thinking
72. Patty has now typed her message and typed the recipient’s address in the “To:” text box. Just before she clicks “Send,” she decides that a second person would like to receive the same message, also as a main recipient. She should type that person’s email address in the ____ text box.a. To: c. Bcc:b. Cc: d. none of the above
ANS: A PTS: 1 REF: WEB 109 TOP: Critical Thinking
73. Patty just checked to see if she has received any emails, and a new one has appeared in her Inbox. It is from someone named “Rich,” has a picture of a paperclip next to the “From” name, and has the subject line, “You’ve gotta see this.” Patty thinks she knows someone named Rich, but is surprised that he already found her email address. What should Patty do?a. Patty should click “Reply” and ask if the
sender is the person she knows.c. Patty should not open the email, and
especially not the attachment, until she can confirm who it is from.
b. Patty should immediately delete the message and reboot her computer.
d. Patty should run Windows Live Deep Scan to test the attachment for viruses.
ANS: C PTS: 1 REF: WEB 101, 113TOP: Critical Thinking
74. Patty has been using her email for a few days now, and now has several friends in her Contacts list. A friend has emailed her a joke. The email lists Patty and more than 20 other recipients in its “To:” section. Patty thinks the joke is in poor taste. She wants to show him exactly the part of his email that she found offensive. But she doesn’t want to embarrass him in front of the other people on the list. What would be the best way for her to handle this?a. Click “Forward,” and enter his email
address in the Bcc text box.c. Click “Reply All.”
b. Click “Reply.” d. Click “Junk Mail” to show him what she thought of his joke.
ANS: B PTS: 1 REF: WEB 115 TOP: Critical Thinking
75. Patty has been holding a fundraiser for a local charity. Many of her friends have emailed her with pledges of donations. Some didn’t, for various reasons. She has written a general “thank you” email that she wants each pledger to get. But she doesn’t want her friends to know who gave (and thus who didn’t give) money to the cause, because she’s afraid feelings might get hurt. What would be the most efficient way to handle this?a. Patty should send one email, entering all c. Patty should send one email, entering all
the recipients in the Cc text box. the recipients in the Bcc text box.b. Patty should send the letter to each friend,
one at a time.d. Patty should send one email, entering all
the recipients in the To text box, and using a Subject line of “DO NOT READ THE OTHER PEOPLE’S NAMES IN THE TO LIST!!!”
ANS: C PTS: 1 REF: WEB 86 TOP: Critical Thinking
Case-Based Critical Thinking Questions
Case 2-2Barry needs a quick pop quiz on some of the features of Windows Live Mail. You offer to help.
76. Barry thinks he knows the five default folders that appear in the folder pane. You try to stump him. You call out folder names. He should say “False!” when you say ____.a. Junk e-mail c. Pendingb. Drafts d. Outbox
ANS: C PTS: 1 REF: WEB 105 TOP: Critical Thinking
77. You ask Barry which of the following is NOT a column in the message list by default. Barry answers, correctly, ____.a. From c. Subjectb. To d. Date
ANS: B PTS: 1 REF: WEB 105 TOP: Critical Thinking
78. You ask Barry how he can tell, by looking at the message list, which new pieces of mail he has already opened. He tells you that he looks for the ____ icon.a. paperclip c. closed envelopeb. pushpin d. open envelope
ANS: D PTS: 1 REF: WEB 111 TOP: Critical Thinking
79. You ask Barry how he can be sure that an email has been deleted. He replies that the best way is to ____.a. close Windows Live Mail and reboot the
computerc. go to the Deleted items folder and click
Delete from thereb. reformat the hard drive d. drag the Windows Live Mail icon from his
desktop to the Recycle Bin
ANS: C PTS: 1 REF: WEB 118|WEB 119TOP: Critical Thinking
80. Finally, you ask Barry what a “category” is in term of Windows Live Mail. He replies, correctly, that it is ____.a. a group of email addresses saved together
in Contactsc. the same as a folder
b. another name for the columns in the message list
d. another name for the version of the software that is being used, such as “Category XP” or “Category 7”
ANS: A PTS: 1 REF: WEB 122 TOP: Critical Thinking
COMPLETION
1. POP is an acronym for ____.
ANS: Post Office Protocol
PTS: 1 REF: WEB 80
2. The two parts of an email address are the ____ and the ____, separated by the @ sign.
ANS: user name, domain name
PTS: 1 REF: WEB 80
3. The term Bcc is short for ____.
ANS: blind courtesy copy
PTS: 1 REF: WEB 83
4. Though it can be left blank, the ____ line of an email message is very important and should always completed.
ANS:subjectSubject
PTS: 1 REF: WEB 83
5. A ____ may contain your name, title, and your company’s name -- or can be more informal, containing nicknames and graphics or quotations.
ANS: signature file
PTS: 1 REF: WEB 84
6. Writing an email message in all capital letters looks like you are ____.
ANS: shouting
PTS: 1 REF: WEB 86
7. The commonly used email acronym “imho” is short for ____.
ANS: in my humble opinion
PTS: 1 REF: WEB 87
8. ____ is unsolicited mail usually advertising or selling an item or service.
ANS:Junk mailSpam
PTS: 1 REF: WEB 88
9. When you ____ a message that you have received, the email program automatically addresses the new message to the original sender.
ANS: reply to
PTS: 1 REF: WEB 89|WEB 90
10. You use a(n) ____ to save email addresses and other optional contact information about the people and organizations with which you correspond.
ANS: address book
PTS: 1 REF: WEB 90
11. Thunderbird is part of the Mozilla ____ project.
ANS: open source
PTS: 1 REF: WEB 91
12. By default, messages in Thunderbird are forwarded as ____, though this can be changed by clicking Options within the Tools menu.
ANS: attachments
PTS: 1 REF: WEB 94
13. With Opera Mail, you use buttons on the ____ panel to check (receive) and send email.
ANS: Mail
PTS: 1 REF: WEB 98
14. Two categories of software that detect and eliminate viruses are antivirus software and ____ software.
ANS: Internet security
PTS: 1 REF: WEB 100
15. Spammers use software robots to search the Internet for character strings that include the ____ character.
ANS:@at
PTS: 1 REF: WEB 102
16. Usually an incoming mail server name is POP, or POP3, or IMAP, while an outgoing mail server is usually named ____ or MAIL.
ANS: SMTP
PTS: 1 REF: WEB 107
17. When you receive an email with an attachment or attachments, you can either open the attachment or ____ it.
ANS: save
PTS: 1 REF: WEB 113
18. The dialog box in the figure above is found in the ____ email program.
ANS: Windows Live Mail
PTS: 1 REF: WEB 117
19. To remove email items permanently from your Windows Live Mail program, you must delete them from the ____ folder.
ANS: Deleted items
PTS: 1 REF: WEB 119
20. In Windows Live Mail, the address book is known as ____.
ANS:ContactsWindows Live Contacts
PTS: 1 REF: WEB 120
MATCHING
a. detachment g. Ccb. Write button h. closed envelope
c. folder pane i. Panels buttond. mail server j. Fw:e. Contacts k. emoticonf. address book l. virus
1. text in a subject line indicating a message is forwarded2. a malicious program that can harm your computer3. used to send mail to people who should be aware of the email but are not the main recipients4. a group of keyboard characters that represent a human expression5. a button found on the Opera email program6. the process of saving an email attachment7. a pane located in the Inbox window of Windows Live Mail8. the Windows Live Mail name for the address book9. hardware and software that determines routes on which to send the message
10. a button found on the Thunderbird email program11. an icon in Windows Live Mail signifying that you have new, unopened messages12. saves email addresses and option contact information
1. ANS: J PTS: 1 REF: WEB 1162. ANS: L PTS: 1 REF: WEB 1003. ANS: G PTS: 1 REF: WEB 834. ANS: K PTS: 1 REF: WEB 875. ANS: I PTS: 1 REF: WEB 976. ANS: A PTS: 1 REF: WEB 847. ANS: C PTS: 1 REF: WEB 1058. ANS: E PTS: 1 REF: WEB 1209. ANS: D PTS: 1 REF: WEB 80
10. ANS: B PTS: 1 REF: WEB 9211. ANS: H PTS: 1 REF: WEB 11112. ANS: F PTS: 1 REF: WEB 90
ESSAY
1. Name and describe the three panes used in Windows Live Mail.
ANS:The folder pane displays a list of folders for receiving, saving, and deleting mail messages.
The message list contains summary information for each message that you receive.
The reading pane appears below the message list and displays the content of the selected message in the message list.
PTS: 1 REF: WEB 105 TOP: Critical Thinking
2. Name the steps for viewing and saving an attached file in Windows Live Mail.
ANS:1. If necessary, click the message that contains the attached file in the message list to display its contents in the reading pane.
2. To view an attached file, double-click it, and then click the Open button in the Mail Attachment dialog box. Close the program window that opens after viewing the file.
3. To save an attached file, right-click the file to open the shortcut menu, click Save as, navigate to the drive and folder in which to save the attached file, and then click the Save button.
PTS: 1 REF: WEB 115 TOP: Critical Thinking
3. Name and describe the three parts of an email message.
ANS:An email message consists of three parts: the message header, the message body, and the signature. The message header contains information about the message, and the message body contains the actual message content. An optional signature might appear at the bottom of an email message and contain standard information about the sender, which the recipient can use to contact the sender in a variety of ways.
PTS: 1 REF: WEB 81 TOP: Critical Thinking
Top Related