Register Now

Login

Lost Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Login

Register Now

Welcome to All Test Answers

Tutorial 2-Basic Communication on the Internet: Email-new perspectives on the internet-9th edition-Schneider and Evans


 

Download  file with the answers

Not a member!
Create a FREE account here to get access and download this file with answers


Tutorial 2: Basic Communication on the Internet: Email

TRUE/FALSE

1. When you send an email message, the message is sent to a mail server.

2. The IMAP protocol specifies how to encode nontext data, such as graphics and sound, in an email so that it can travel over the Internet.

3. A signature is not optional when sending an email.

4. Bcc email recipients are unaware of other Bcc recipients.

5. “Detaching a file” is the phrase often used for saving an email attachment to your computer.

6. The term “NetManners” refers to the set of commonly accepted rules that represent proper behavior on a network.

7. POP (or POP3) is an extensively used protocol for handling incoming email messages.

8. Email is considered private, and therefore safe to use as a medium for discussing sensitive information.

ANS: F PTS: 1 REF: WEB 83

9. Thunderbird is Microsoft’s open source email project.

10. A message can be queued, or temporarily held with other messages.

11. An email with a Subject line beginning with “Fw” indicates that the message has been forwarded.

12. In an email message, it is common to see a special mark preceding each line of a quoted message.

13. Thanks to improved technology, email attachments no longer contain viruses.

14. “UCE” is another term for spam.

15. The CRAM-SPAM law was the first U.S. federal government effort to legislate controls on spam.

16. In Hotmail, if you want to forward the message to several people, type their addresses, separated by periods.

17. When you delete an email message that contains an attached file, you also delete the file that is attached to the message.

18. In Hotmail, when you delete a message or folder, you are simply moving it to the Deleted folder.

19. When you don’t need a message any longer, you can delete it by opening the message and then clicking the Recycle link on the Hotmail menu bar.

20. After uploading a file to SkyDrive, you can add comments to it, but you cannot rename the file.

MODIFIED TRUE/FALSE

1. Protocols are rules that determine how the Internet handles message packets flowing on it. _________________________

ANS: T PTS: 1 REF: WEB 74

2. An email user’s account name is also known as their domain name. _________________________

3. In an email, the message body contains the actual message content. _________________________

4. The full email address of the main recipient should be entered into the Cc line of a message header. _________________________

5. You cannot attach more than one file to an email message. _________________________

6. A(n) emoticon is a group of keyboard characters that when viewed together represent a human expression. _________________________

7. Thunderbird is the companion email program for Mozilla Firefox. _________________________

8. Some email programs let you define and use a(n) queue to move incoming mail into a specific folder. _________________________

9. Most email programs offer you two options for replying to a message that you have received: Reply or Reply All. _________________________

ANS: T PTS: 1 REF: WEB 86

10. When sending business correspondence, use a(n) comma to indicate a brief pause in a sentence, or to join or separate sentence parts. _________________________

ANS: T PTS: 1 REF: WEB 104

11. When sending business correspondence, use a(n) semicolon to introduce a list of items or an explanation. _________________________

12. In Windows Live Mail, when you receive new mail, messages that you haven’t opened yet are displayed with a(n) closed envelope icon next to them. _________________________

13. To save an attached file in Hotmail using Firefox, click the attached file’s Upload link in the message header, click the Save File option button in the dialog box that opens, and then click the OK button. _________________________

ANS: F, Download

PTS: 1 REF: WEB 108

14. To reply to a message, click the Reply link on the Hotmail menu bar to reply only to the sender. _________________________

ANS: T PTS: 1 REF: WEB 109

15. When you jump a message, you are sending a copy of the message, including any attachments, to one or more recipients who were not included in the original message. _________________________

MULTIPLE CHOICE

1. ____ are rules that determine how the Internet handles message packets flowing on it.
a. Mores c. Servers
b. Protocols d. Codes

2. The sender uses an email program ____ to enter the recipient’s email address, compose the email message, attach optional files, and send the message.
a. on a computer c. either a. or b.
b. on a Web browser d. neither a. nor b.

3. ____ handles outgoing email messages, determining the paths an email message takes on the Internet.
a. POP c. IMAP
b. SMTP d. MIME

4. An email sender’s local network sends the message to the sender’s mail ____.
a. portal c. modem
b. server d. satellite

5. “Email” is short for ____.
a. encoded mail c. electronic mail
b. ethernet mail d. none of the above

6. The ____ protocol specifies how to encode nontext data, such as graphics or sound, so it can travel over the Internet.
a. POP c. SMTP
b. MIME d. IMAP

7. A(n) ____ name usually identifies one person’s email account on a mail server.
a. domain c. IP
b. Web d. user

ANS: D PTS: 1 REF: WEB 76

8. MIME stands for Multipurpose Internet Mail ____.
a. Entities c. Envelopes
b. Extensions d. Encryption

9. The software that requests mail delivery from the mail server to an Internet device is known as mail ____ software.
a. server c. client
b. user d. box

10. To route an email message to someone, you must identify that person by his or her user name, and by their ____.
a. passphrase c. IP address
b. domain name d. time zone

11. Most organizations have ____.
a. a single mail server to manage the email they send and receive
b. one mail server for email received and one mail server for email sent
c. multiple mail servers for email coming in, and only one mail server for outgoing mail
d. none of the above

12. All of the following are typical parts of an email message EXCEPT ____.
a. salutation c. message body
b. message header d. signature

13. A ____ contains information about the message.
a. salutation c. message body
b. message header d. signature

14. The ____ contains the actual message content.
a. salutation c. message body
b. message header d. signature

15. A ____ might appear at the bottom of an email message and contain standard information about the sender.
a. salutation c. message body
b. message header d. signature

16. When sending an email to multiple recipients, separate the addresses with a ____.
a. comma c. either a. or b.
b. semicolon d. neither a. nor b.

17. A single email address that can represent several email addresses is called a ____.
a. category c. either a. or b.
b. group d. neither a. nor b.

18. Some mail servers will reject messages with too many recipients (usually ____ or more).
a. 25 c. 10
b. 50 d. 100

19. In the figure above, the area labeled “1” indicates the ____.
a. message’s primary recipients
b. attachment filename and size
c. message topic
d. recipients receiving a blind courtesy copy

20. In the figure above, the area labeled “2” indicates the ____.
a. message’s primary recipients
b. attachment filename and size
c. message topic
d. recipients receiving a blind courtesy copy

21. In the figure above, the area labeled “3” indicates the ____.
a. message’s primary recipients
b. attachment filename and size
c. message topic
d. recipients receiving a blind courtesy copy

22. In the figure above, the area labeled “4” indicates the ____.
a. message’s primary recipients
b. attachment filename and size
c. message topic
d. recipients receiving a blind courtesy copy

23. When you send along a complex document or graphic as part of your email, you send it along as a(n) ____.
a. tag c. protocol
b. attachment d. wrapper

24. A file that has been attached to an email message will be received by those recipients in the ____ line(s) of the message header.
a. To only c. To, Cc, and Bcc
b. To and Cc only d. Bcc only

25. A(n) ____ file is a file you can view but cannot change.
a. read-only c. shared
b. locked d. attach-only

26. If you are using email for a business communication, your ____ usually contains your name, title, and your company’s name.
a. closing c. mail server
b. e-envelope d. signature file

27. The email address someone@mail.com is the same as the email address ____.
a. somebody@mail.com c. Someone@mail.org
b. someone@maildotcom d. Someone@mail.com

ANS: D PTS: 1 REF: WEB 77

28. The term ____ refers to a set of commonly accepted rules for proper behavior on a network.
a. netiquette c. e-manners
b. mores d. E-mily Post

29. All of the following are email acronyms noted in the text EXCEPT ____.
a. btw c. wth
b. imho d. atm

ANS: C PTS: 1 REF: WEB 82

30. A group of keyboard characters that, viewed together, represent a human expression is known as a(n) ____.
a. e-doodle c. emoticon
b. Web face d. Nettitude

31. The email acronym “iow” stands for “____.”
a. inbox/outbox/work c. in or win
b. in other words d. in one word

32. Mozilla’s email program is called ____.
a. Thunderbird c. Apache
b. Opera d. Outlook Express

33. The following are generally accepted rules for email messages EXCEPT ____.
a. avoid writing messages in all capital letters
b. don’t overuse formatting and graphics
c. always forward new information about viruses and hoaxes
d. use caution when attempting sarcasm or humor in your messages

ANS: C PTS: 1 REF: WEB 83

34. If you are in the midst of composing an email message, but want to save it and finish it later, you can store your email in your program’s ____ folder.
a. Buffer c. Drafts
b. Inbox d. Queue

35. Some email programs let you use a(n) ____ to move incoming mail to a specific folder or to delete it automatically based on the content of the message.
a. router c. filter
b. baffle d. protocol

36. Another term for junk mail is ____.
a. slop c. ramen
b. clutter d. spam

37. If your email program does not provide filters, you can filter the messages ____ by reading them and moving them to the appropriate folders.
a. automatically c. randomly
b. manually d. Web-style

38. When you ____ a message, a copy of the original message is sent to the new recipient(s) without the original sender’s knowledge.
a. forward c. draft
b. reply to d. filter

ANS: A PTS: 1 REF: WEB 85

39. A ____ message is a copy of the sender’s original message with your inserted comments.
a. drafted c. quoted
b. volley d. plagiarized

40. When using the “Reply All” option, your message will automatically be sent to ____ recipients of the original message.
a. To only c. To, Cc, and Bcc
b. To and Cc only d. CC only

41. In your address book, you can assign each entry a unique ____ so it is easier to address your email messages.
a. tag c. nickname
b. moniker d. domain name

42. Email attachments can contain malicious programs called ____.
a. bugs c. hackers
b. wyrms d. viruses

43. Software that only detects and eliminates malicious code is called a(n) ____ program.
a. sniffer c. cracker
b. antivirus d. watchdog

44. A virus ____ is a sequence of characters that is always present in a particular virus.
a. signature c. definition
b. pattern d. all of the above

45. If you receive an email message from a sender that you don’t recognize and the message contains an attached file, you should ____.
a. contact the local police so they can run a trace on the email
b. only open the file in the evenings, when malicious code is less virulent
c. immediately delete the email and reboot the computer
d. avoid opening the file until you are sure that it doesn’t contain a virus

ANS: D PTS: 1 REF: WEB 88

46. Spam ____.
a. consumes bandwidth
b. distracts employees and wastes their time
c. may include content that is offensive or misleading
d. All of the above

47. According the MAAWG, approximately ____% of all email messages sent every day are spam.
a. 48-51 c. 28-31
b. 88-91 d. 58-61

48. In January 2004, the U.S. ____ law went into effect.
a. CAN-SPAM c. CRAM-SPAM
b. END-SPAM d. SCRAM

ANS: A PTS: 1 REF: WEB 90

49. Use a(n) ____ to join independent, closely related thoughts.
a. colon c. comma
b. semicolon d. exclamation point

50. Use a(n) ____ to show possession.
a. colon c. comma
b. semicolon d. apostrophe

51. To reply to a message in Hotmail, open the message you want to reply to. Then click the ____ link on the Hotmail menu bar to reply to the sender and other To and Cc recipients of the original message
a. Reply c. Send
b. Reply all d. Send all

52. When forwarding a message, Windows Live Hotmail includes the original message in the message display area and adds a blank line ____ so you can add an optional message to provide context for the recipient.
a. above it c. to the right of it
b. below it d. to the left of it

ANS: A PTS: 1 REF: WEB 110

53. To forward a message in Hotmail, open the message that you want to forward, and click the ____ link on the Hotmail menu bar
a. Forward c. Move
b. Send d. Attach

54. Copying and pasting contents of a received message into a new message allows you to ____.
a. remove viruses embedded in the text c. forward a message while maintaining the privacy of the original sender
b. see who received a Bcc of the original message d. none of the above

55. A forwarded message ____.
a. does NOT include the email addresses of previous recipients and senders
b. does include the email addresses of previous recipients and senders
c. includes only the email addresses of previous recipients
d. includes only the email addresses of previous senders

56. When you ____ a message, you move it from the Inbox to a folder.
a. file c. encrypt
b. scan d. compress

57. After you create a folder, you can transfer messages to it ____.
a. from the Inbox c. either a. or b.
b. from folders you created d. neither a. nor b.

58. You can print a message ____.
a. when you receive it c. after you file it
b. before you send it d. all of the above

ANS: D PTS: 1 REF: WEB 113

59. A ____ version of a message excludes ads and other content on the page, such as links.
a. “user-friendly” c. “Web-friendly”
b. “printer-friendly” d. “save-friendly”

ANS: B PTS: 1 REF: WEB 113

60. You can delete a folder by selecting it and then clicking the Delete link on the Hotmail ____ bar.
a. menu c. scroll
b. status d. options

61. To delete items permanently, click the Deleted link in the Folders list on the left side of the page, click the ____ link on the Hotmail menu bar, and then, if necessary, click the OK button.
a. Delete c. Remove
b. Empty d. either a. or b.

62. To delete a message in Hotmail, open the folder that contains the message you want to delete. Next, click the ____ to the left of the message you want to delete, and then click the Delete link on the Hotmail menu bar.
a. exclamation point c. red “x”
b. check box d. minus sign

ANS: B PTS: 1 REF: WEB 114

63. Windows Live Hotmail will let you delete ____.
a. default system folders c. either a. or b.
b. folders that you created d. neither a. nor b.

64. As you use Hotmail email to communicate with business associates and friends, you might want to save their contact information in your ____ list to make it easier to enter addresses into the header of your email messages.
a. buddy c. contact
b. associate d. friend

65. In Hotmail, click the Contacts link to open the All contacts page. Then, click the ____ link on the Hotmail menu bar to open the New contact page.
a. Contacts c. New
b. Friends d. Open

ANS: C PTS: 1 REF: WEB 115

66. In Hotmail, you can create a group of contacts, called a category or ____ list, and use the category to address messages to a group of recipients.
a. feed c. social
b. blog d. distribution

67. In Hotmail, to remove a contact from the category, click the ____ button on the contact name.
a. Delete c. Options
b. Close d. Archive

68. In Hotmail, clicking the ____ to the left of a category in the To box displays the individual email addresses in the category so you can delete a recipient or confirm the recipients by name.
a. minus sign c. exclamation point
b. plus sign d. people icon

69. You can use a Windows Live service, called ____, to post your files to a server and then use your Windows Live Hotmail account to share access to these files with users that you specify.
a. SkyMail c. SkyShare
b. SkyFile d. SkyDrive

70. As with most file-sharing sites, part of the user and terms of service agreements that you must accept when creating a Windows Live account prohibit you from uploading ____ to the Windows Live site without authorization.
a. large files c. copyrighted material
b. pictures of family members d. videos

Case 2-1
Patty has decided to use Windows Live Hotmail as her email program. She has a lot of questions, and knows you can help her out.

71. Patty sits at her computer and starts Windows Live Hotmail. The Inbox window appears on the screen. Patty clicks in the pane in the lower part of her screen and tries to start typing an email, but nothing happens. What has she done wrong?
a. She should click the top part of the screen, in the message list.
b. She needs to click “Drafts” first.
c. She hasn’t done anything wrong; her text will show up when she clicks “Sync” or “Send.”
d. She needs to click the “New” button on the toolbar before she can type a new message.

72. Patty has been holding a fundraiser for a local charity. Many of her friends have emailed her with pledges of donations. Some didn’t, for various reasons. She has written a general “thank you” email that she wants each pledger to get. But she doesn’t want her friends to know who gave (and thus who didn’t give) money to the cause, because she’s afraid feelings might get hurt. What would be the most efficient way to handle this?
a. Patty should send one email, entering all the recipients in the Cc text box.
b. Patty should send the letter to each friend, one at a time.
c. Patty should send one email, entering all the recipients in the Bcc text box.
d. Patty should send one email, entering all the recipients in the To text box, and using a Subject line of “DO NOT READ THE OTHER PEOPLE’S NAMES IN THE TO LIST!!!”

73. Patty has now typed her message and typed the recipient’s address in the “To:” text box. Just before she clicks “Send,” she decides that a second person would like to receive the same message, also as a main recipient. She should type that person’s email address in the ____ text box.
a. To: c. Bcc:
b. Cc: d. none of the above

74. Patty just checked to see if she has received any emails, and a new one has appeared in her Inbox. It is from someone named “Rich,” has a picture of a paperclip next to the “From” name, and has the subject line, “You’ve gotta see this.” Patty thinks she knows someone named Rich, but is surprised that he already found her email address. What should Patty do?
a. Patty should click “Reply” and ask if the sender is the person she knows.
b. Patty should immediately delete the message and reboot her computer.
c. Patty should not open the email, and especially not the attachment, until she can confirm who it is from.
d. Patty should run Windows Live Deep Scan to test the attachment for viruses.

75. Patty has been using her email for a few days now, and now has several friends in her Contacts list. A friend has emailed her a joke. The email lists Patty and more than 20 other recipients in its “To:” section. Patty thinks the joke is in poor taste. She wants to show him exactly the part of his email that she found offensive. But she doesn’t want to embarrass him in front of the other people on the list. What would be the best way for her to handle this?
a. Click “Forward,” and enter his email address in the Bcc text box.
b. Click “Reply.”
c. Click “Reply All.”
d. Click “Junk Mail” to show him what she thought of his joke.

Case 2-2
Barry has asked that you give him a pop quiz on the features of Windows Live Hotmail. You are ready and ask him the questions below.

76. Barry thinks he knows the five default folders that appear in the folder pane. You try to stump him. You call out folder names. He should say “False!” when you say ____.
a. Junk c. Sent
b. Drafts d. Outbox

77. You ask Barry how to identify an email that he has not read. He correctly answers that the unread message will appear in ____.
a. bold font c. a separate window
b. normal font d. underlined text

78. You ask Barry how he can tell, by looking at the message list, which new pieces of mail he has already opened. He tells you that he looks for the ____ icon.
a. paperclip c. closed envelope
b. pushpin d. open envelope

ANS: D PTS: 1 REF: WEB 106 TOP: Critical Thinking

79. You ask Barry how he can be sure that an email has been deleted. He replies that the best way is to ____.
a. close Windows Live Mail and reboot the computer
b. reformat the hard drive
c. go to the Deleted folder and click Delete from there
d. drag the Windows Live Mail icon from his desktop to the Recycle Bin

80. Finally, you ask Barry what a “category” is in term of Windows Live Mail. He replies, correctly, that it is ____.
a. a group of email addresses saved together in Contacts
b. another name for the columns in the message list
c. the same as a folder
d. another name for the version of the software that is being used, such as “Category XP” or “Category 7”

COMPLETION

1. The two parts of an email address are the user name and the ____________________, separated by the @ sign.

2. The term Bcc is short for ____________________.

3. Though it can be left blank, the ____________________ line of an email message is very important and should always completed.

4. A(n) ____________________ may contain your name, title, and your company’s name — or can be more informal, containing nicknames and graphics or quotations.

5. Referring to the figure above, the area labeled “1” shows an example of a(n) ____________________ signature.

ANS: informal

PTS: 1 REF: WEB 81

6. Referring to the figure above, the area labeled “2” shows an example of a(n) ____________________ signature.

7. The commonly used email acronym “imho” is short for ____________________.

ANS: in my humble opinion

PTS: 1 REF: WEB 82

8. POP is an acronym for ____________________.

ANS: Post Office Protocol

PTS: 1 REF: WEB 75

9. Writing an email message in all capital letters looks like you are ____________________.

10. ____________________ is unsolicited mail usually advertising or selling an item or service.

ANS:
Junk mail
Spam

PTS: 1 REF: WEB 84-85

11. When you ____________________ to a message that you received, the email program creates a new message and automatically addresses it to the original sender.

ANS: reply

PTS: 1 REF: WEB 86

12. You use a(n) ____________________ to save email addresses and other optional contact information about the people and organizations with which you correspond.

13. Two categories of software that detect and eliminate viruses are antivirus programs and ____________________ software.

14. To find email addresses, spammers use software robots to search the Internet for character strings that include the ____________________ character.

ANS:
@
at

PTS: 1 REF: WEB 89

15. Click the ____________________ link to return to the Windows Live Hotmail home page for your account.

16. Use the ____________________ button to change Hotmail settings or open a help page.

17. In Windows Live Hotmail, if a message includes an attachment, the attachment information appears in the message ____________________.

18. When you receive an email with an attachment or attachments, you can either open the attachment or ____________________ it.

19. In Windows Live Hotmail, you can delete a message by opening the message or selecting the message in the Inbox, and then clicking the ____________________ link on the Hotmail menu bar.

20. Windows Live Hotmail won’t let you delete the default ____________________ folders, but you can delete folders that you created.

MATCHING

a. detaching g. Cc
b. message body h. closed envelope
c. user name i. mail server
d. mail server j. Fw:
e. message header k. emoticon
f. signature l. virus

1. text in a subject line indicating a message is forwarded

2. a malicious program that can harm your computer

3. used to send mail to people who should be aware of the email but are not the main recipients

4. a group of keyboard characters that represent a human expression

5. hardware and software system that determines from one of several electronic routes on which to send an email message

6. the process of saving an email attachment

7. used to route an email message to an individual

8. contains information about the message

9. hardware and software that determines route to send an email message

10. contains the actual message content

11. icon signifying that you have new, unopened messages

12. may appear at the bottom of an email message; contains standard information about the sender

ESSAY

1. Name and describe the three parts of an email message.

ANS:

2. Briefly describe the following Hotmail folders: Inbox, Junk, Drafts, Deleted, and Sent Folders.

ANS:

3. What is a Webmail provider? How do you access Webmail? How do Webmail providers earn money?

ANS:

An email account that you have with a Webmail provider is also called Webmail because you access the email account through the Webmail provider’s Web site.

Webmail providers earn money through advertising.

PTS: 1 REF: WEB 94 TOP: Critical Thinking

About

Leave a reply

Captcha Click on image to update the captcha .

error: Content is protected !!