2: Basic Communication Review Flashcards

1
Q

____ handles outgoing email messages, determining the paths an email message takes on the Internet.

A

SMTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When you send an email message, the message is sent to a mail server.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Spam ____.

A

(1) consumes bandwidth, (2) distracts employees and wastes their time, and (3) may include content that is offensive or misleading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

____ are rules that determine how the Internet handles message packets flowing on it.

A

Protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In January 2004, the U.S. ____ law went into effect.

A

CAN-SPAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The following are generally accepted rules for email messages EXCEPT ____.

A

always forward new information about viruses and hoaxes

Rules for email: (1) use caution when attempting sarcasm or humor in your messages, (2) avoid writing messages in all capital letters, and (3) don’t overuse formatting and graphics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

If you are using email for a business communication, your ____ usually contains your name, title, and your company’s name.

A

signature file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The email acronym “iow” stands for “____.”

A

in other words

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Bcc email recipients are unaware of other Bcc recipients.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

For anti-spam legislation to become cost-effective, prosecutors must ____.

A

(1) be able to identify spammers easily, (2) have a greater likelihood of winning the cases that they file, and (3) see a greater social benefit to winning cases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

“Detaching a file” is the phrase often used for saving an email attachment to your computer.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

According the MAAWG, approximately ____% of all email messages sent every day are abusive.

A

80%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In the figure below, H represents the ____.

To:
Cc:
Subject:
Attachment:

A

message header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

All of the following are email acronyms noted in the text EXCEPT ____.

A

wth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

If you are in the midst of composing an email message, but want to save it and finish it later, you can store your email in your program’s ____ folder.

A

Drafts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

To route an email message to someone, you must identify that person by his or her user name, and by their ____.

A

domain name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

In your address book, you can assign each entry a unique ____ so it is easier to address your email messages.

A

nickname

18
Q

In the figure below, the message topic is represented by ____.

A

“Subject:”

19
Q

When you send along a complex document or graphic as part of your email, you send it along as a(n) ____.

A

attachment

20
Q

In the figure below, upon arrival of this email, the person indicated in C will see all of the following EXCEPT ____.

A

“Bcc:”

21
Q

The ____ protocol specifies how to encode nontext data, such as graphics or sound, so it can travel over the Internet.

A

MIME

22
Q

When using the “Reply All” option, your message will automatically be sent to ____ recipients of the original message.

A

To and Cc only

23
Q

The U.S. federal anti-spam law was passed in January 2004. By April 2004, the measured spam message rate was ____ it was in January 2004.

A

higher than

24
Q

A(n) ____ file is a file you can view but cannot change.

A

read-only

25
Q

An email message requires three things: header, body, and signature.

A

False

26
Q

In the figure below, the primary recipient’s email address would be entered into ____.

A

“To:”

27
Q

A ____ message is a copy of the sender’s original message with your inserted comments.

A

quoted

28
Q

Some mail servers will reject messages with too many recipients (usually ____ or more).

A

50

29
Q

Some email programs let you use a(n) ____ to move incoming mail to a specific folder or to delete it automatically based on the content of the message.

A

filter

30
Q

The email address someone@mail.com is the same as the email address ____.

A

Someone@mail.com

31
Q

Software that only detects and eliminates malicious code is called a(n) ____ program.

A

antivirus

32
Q

When sending an email to multiple recipients, separate the addresses with a ____.

A

either a semicolon or comma

33
Q

Email attachments can contain malicious programs called ____.

A

viruses

34
Q

A file that has been attached to an email message will be received by those recipients in the ____ line(s) of the message header.

A

To, Cc, and Bcc

35
Q

Another term for junk mail is ____.

A

spam

36
Q

When you ____ a message, a copy of the original message is sent to the new recipient(s) without the original sender’s knowledge.

A

forward

37
Q

The term ____ refers to a set of commonly accepted rules for proper behavior on a network.

A

netiquette

38
Q

If you receive an email message from a sender that you don’t recognize and the message contains an attached file, you should ____.

A

avoid opening the file until you are sure that it doesn’t contain a virus

39
Q

A group of keyboard characters that, viewed together, represent a human expression is known as a(n) ____.

A

emoticon

40
Q

The colloquial term for UCE is ____.

A

spam

not a virus
not a syntax error
not blue screen of death