2: Basic Communication Review Flashcards

(40 cards)

1
Q

____ handles outgoing email messages, determining the paths an email message takes on the Internet.

A

SMTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When you send an email message, the message is sent to a mail server.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Spam ____.

A

(1) consumes bandwidth, (2) distracts employees and wastes their time, and (3) may include content that is offensive or misleading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

____ are rules that determine how the Internet handles message packets flowing on it.

A

Protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In January 2004, the U.S. ____ law went into effect.

A

CAN-SPAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The following are generally accepted rules for email messages EXCEPT ____.

A

always forward new information about viruses and hoaxes

Rules for email: (1) use caution when attempting sarcasm or humor in your messages, (2) avoid writing messages in all capital letters, and (3) don’t overuse formatting and graphics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

If you are using email for a business communication, your ____ usually contains your name, title, and your company’s name.

A

signature file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The email acronym “iow” stands for “____.”

A

in other words

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Bcc email recipients are unaware of other Bcc recipients.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

For anti-spam legislation to become cost-effective, prosecutors must ____.

A

(1) be able to identify spammers easily, (2) have a greater likelihood of winning the cases that they file, and (3) see a greater social benefit to winning cases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

“Detaching a file” is the phrase often used for saving an email attachment to your computer.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

According the MAAWG, approximately ____% of all email messages sent every day are abusive.

A

80%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In the figure below, H represents the ____.

To:
Cc:
Subject:
Attachment:

A

message header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

All of the following are email acronyms noted in the text EXCEPT ____.

A

wth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

If you are in the midst of composing an email message, but want to save it and finish it later, you can store your email in your program’s ____ folder.

A

Drafts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

To route an email message to someone, you must identify that person by his or her user name, and by their ____.

A

domain name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

In your address book, you can assign each entry a unique ____ so it is easier to address your email messages.

18
Q

In the figure below, the message topic is represented by ____.

A

“Subject:”

19
Q

When you send along a complex document or graphic as part of your email, you send it along as a(n) ____.

20
Q

In the figure below, upon arrival of this email, the person indicated in C will see all of the following EXCEPT ____.

21
Q

The ____ protocol specifies how to encode nontext data, such as graphics or sound, so it can travel over the Internet.

22
Q

When using the “Reply All” option, your message will automatically be sent to ____ recipients of the original message.

A

To and Cc only

23
Q

The U.S. federal anti-spam law was passed in January 2004. By April 2004, the measured spam message rate was ____ it was in January 2004.

24
Q

A(n) ____ file is a file you can view but cannot change.

25
An email message requires three things: header, body, and signature.
False
26
In the figure below, the primary recipient’s email address would be entered into ____.
"To:"
27
A ____ message is a copy of the sender’s original message with your inserted comments.
quoted
28
Some mail servers will reject messages with too many recipients (usually ____ or more).
50
29
Some email programs let you use a(n) ____ to move incoming mail to a specific folder or to delete it automatically based on the content of the message.
filter
30
The email address someone@mail.com is the same as the email address ____.
Someone@mail.com
31
Software that only detects and eliminates malicious code is called a(n) ____ program.
antivirus
32
When sending an email to multiple recipients, separate the addresses with a ____.
either a semicolon or comma
33
Email attachments can contain malicious programs called ____.
viruses
34
A file that has been attached to an email message will be received by those recipients in the ____ line(s) of the message header.
To, Cc, and Bcc
35
Another term for junk mail is ____.
spam
36
When you ____ a message, a copy of the original message is sent to the new recipient(s) without the original sender’s knowledge.
forward
37
The term ____ refers to a set of commonly accepted rules for proper behavior on a network.
netiquette
38
If you receive an email message from a sender that you don’t recognize and the message contains an attached file, you should ____.
avoid opening the file until you are sure that it doesn’t contain a virus
39
A group of keyboard characters that, viewed together, represent a human expression is known as a(n) ____.
emoticon
40
The colloquial term for UCE is ____.
spam not a virus not a syntax error not blue screen of death