Full file at
Tutorial 2: Basic Communication on the Internet: Email
TRUE/FALSE
1.When you send an email message, the message is sent to a mail server.
ANS:TPTS:1REF:WEB 80
2.An email message requires three things: header, body, and signature.
ANS:FPTS:1REF:WEB 81
3.Bcc email recipients are unaware of other Bcc recipients.
ANS:TPTS:1REF:WEB 83
4.“Detaching a file” is the phrase often used for saving an email attachment to your computer.
ANS:TPTS:1REF:WEB 84
5.Email is considered private, and therefore safe to use as a medium for discussing sensitive information.
ANS:FPTS:1REF:WEB 86
6.An email with a Subject line beginning with “Fw” indicates that the message has been forwarded.
ANS:TPTS:1REF:WEB 88
7.Thunderbird is Microsoft’s open source email project.
ANS:FPTS:1REF:WEB 91
8.A powerful feature of Thunderbird is its adaptive spam and junk mail filters.
ANS:TPTS:1REF:WEB 94
9.The Opera Mail email client is automatically installed with the Opera Web browser.
ANS:TPTS:1REF:WEB 97
10.Thanks to improved technology, email attachments no longer contain viruses.
ANS:FPTS:1REF:WEB 100
11.“UCE” is another term for spam.
ANS:TPTS:1REF:WEB 101
12.The CANNED-SPAM law was the first U.S. federal government effort to legislate controls on spam.
ANS:FPTS:1REF:WEB 102
13.The reading pane is a feature of Windows Live Mail.
ANS:TPTS:1REF:WEB 105
14.When you delete an email message that contains an attached file, you also delete the file that is attached to the message.
ANS:TPTS:1REF:WEB 115
15.When using Windows Live Mail to reply to a message, the email program will copy the original message and place it in the message body.
ANS:TPTS:1REF:WEB 115
16.To forward a message using Windows Live Mail, select the message in the message list, then click the Share button on the toolbar.
ANS:FPTS:1REF:WEB 116
17.When using Windows Live Mail on a public computer, if you don’t delete your messages from the Inbox and then delete them again from the Deleted items folder, the next person to use the computer could access and read your messages.
ANS:TPTS:1REF:WEB 119
18.The term “NetManners” refers to the set of commonly accepted rules that represent proper behavior on a network.
ANS:FPTS:1REF:WEB 85
19.POP (or POP3) is an extensively used protocol for handling incoming email messages.
ANS:TPTS:1REF:WEB 90
20.The IMAP protocol specifies how to encode nontext data, such as graphics and sound, in an email so that it can travel over the Internet.
ANS:FPTS:1REF:WEB 80
MODIFIED TRUE/FALSE
1.Protocols are rules that determine how the Internet handles message packets flowing on it.
ANS:TPTS:1REF:WEB 80
2.An email user’s account name is also known as their domain name.
ANS:F, user name
PTS:1REF:WEB 80
3.In an email, the message body contains the actual message content.
ANS:TPTS:1REF:WEB 81
4.The full email address of the main recipient should be entered into the Cc line of a message header.
ANS:F, To
PTS:1REF:WEB 82
5.You cannot attach more than one file to an email message.
ANS:F
can
may
PTS:1REF:WEB 83
6.A emoticon is a group of keyboard characters that when viewed together represent a human expression.
ANS:TPTS:1REF:WEB 87
7.Some email programs let you define and use a(n) queue to move incoming mail into a specific folder.
ANS:F, filter
PTS:1REF:WEB 88
8.Most email programs offer you two options for replying to a message that you have received: Reply or Reply All.
ANS:TPTS:1REF:WEB 89
9.When you install Microsoft Internet Explorer for Windows XP, the Windows Live Mail email program is also installed.
ANS:F, Outlook Express
PTS:1REF:WEB 90
10.Mozilla Thunderbird provides a(n) Spell button to check your document for spelling errors.
ANS:TPTS:1REF:WEB 93
11.Opera’s email client offers a(n) File Center column you can click to assign a category to a message.
ANS:F, Label
PTS:1REF:WEB 100
12.In Windows Live Mail, the reading pane contains summary information for each message that you receive.
ANS:F, message list
PTS:1REF:WEB 105
13.In Windows Live Mail, when you receive new mail, messages that you haven’t opened yet are displayed with a(n) closed envelope icon next to them.
ANS:TPTS:1REF:WEB 111
14.In Windows Live Mail, the address book is called Windows Live Contacts.
ANS:TPTS:1REF:WEB 120
15.You can use Windows Live Contacts to create a group of email addresses, called a(n) cluster.
ANS:F, category
PTS:1REF:WEB 122
MULTIPLE CHOICE
1.“Email” is short for ____.
a. / electrical mail / c. / electronic mailb. / ethernet mail / d. / none of the above
ANS:CPTS:1REF:WEB 80
2.Email travels across the Internet ____.
a. / in small packets, like other forms of Internet communication / c. / only at off-hours, which is why it’s inexpensiveb. / all at once in one cohesive packet for security / d. / faster than any other type of Internet communication
ANS:APTS:1REF:WEB 80
3.____ handles outgoing email messages, determining the paths an email message takes on the Internet.
a. / POP / c. / IMAPb. / SMTP / d. / MIME
ANS:BPTS:1REF:WEB 80
4.The ____ protocol specifies how to encode nontext data, such as graphics or sound, so it can travel over the Internet.
a. / POP / c. / SMTPb. / MIME / d. / IMAP
ANS:BPTS:1REF:WEB 80
5.To route an email message to someone, you must identify that person by his or her user name, and by their ____.
a. / passphrase / c. / IP addressb. / domain name / d. / time zone
ANS:BPTS:1REF:WEB 80
6.The email address is the same as the email address ____.
a. / / c. /b. / someone@maildotcom / d. /
ANS:DPTS:1REF:WEB 81
7.All of the following are typical parts of an email message EXCEPT ____.
a. / salutation / c. / message bodyb. / message header / d. / signature
ANS:APTS:1REF:WEB 81
8.In the figure above, the message topic is represented by ____.
a. / F / c. / Cb. / B / d. / D
ANS:DPTS:1REF:WEB 82
9.In the figure above, the primary recipient’s email address would be entered into ____.
a. / G / c. / Bb. / C / d. / E
ANS:BPTS:1REF:WEB 82
10.In the figure above, H represents the ____.
a. / contact list / c. / subjectb. / message body / d. / message header
ANS:DPTS:1REF:WEB 82
11.In the figure above, upon arrival of this email, the person indicated in C will see all of the following EXCEPT ____.
a. / A / c. / Db. / B / d. / F
ANS:APTS:1REF:WEB 82
12.When you send along a complex document or graphic as part of your email, you send it along as a(n) ____.
a. / tag / c. / protocolb. / attachment / d. / wrapper
ANS:BPTS:1REF:WEB 83
13.A file that has been attached to an email message will be received by those recipients in the ____ line(s) of the message header.
a. / To only / c. / To, Cc, and Bccb. / To and Cc only / d. / Bcc only
ANS:CPTS:1REF:WEB 83|WEB 84
14.If you are using email for a business communication, your ____ usually contains your name, title, and your company’s name.
a. / closing / c. / mail serverb. / e-envelope / d. / signature file
ANS:DPTS:1REF:WEB 84
15.The term ____ refers to a set of commonly accepted rules for proper behavior on a network.
a. / netiquette / c. / e-mannersb. / mores / d. / E-mily Post
ANS:APTS:1REF:WEB 85
16.All of the following are email acronyms noted in the text EXCEPT ____.
a. / btw / c. / wthb. / imho / d. / atm
ANS:CPTS:1REF:WEB 87
17.A group of keyboard characters that, viewed together, represent a human expression is known as a(n) ____.
a. / e-doodle / c. / emoticonb. / Web face / d. / Nettitude
ANS:CPTS:1REF:WEB 87
18.If you are in the midst of composing an email message, but want to save it and finish it later, you can store your email in your program’s ____ folder.
a. / Buffer / c. / Draftsb. / Inbox / d. / Queue
ANS:CPTS:1REF:WEB 87
19.The email acronym “iow” stands for “____.”
a. / inbox/outbox/work / c. / in or winb. / in other words / d. / in one word
ANS:BPTS:1REF:WEB 87
20.Some email programs let you use a(n) ____ to move incoming mail to a specific folder or to delete it automatically based on the content of the message.
a. / router / c. / filterb. / baffle / d. / protocol
ANS:CPTS:1REF:WEB 88
21.Another term for junk mail is ____.
a. / slop / c. / ramenb. / clutter / d. / spam
ANS:DPTS:1REF:WEB 88
22.When you ____ a message, a copy of the original message is sent to the new recipient(s) without the original sender’s knowledge.
a. / forward / c. / draftb. / reply to / d. / filter
ANS:APTS:1REF:WEB 88
23.A ____ message is a copy of the sender’s original message with your inserted comments.
a. / drafted / c. / quotedb. / volley / d. / plagiarized
ANS:CPTS:1REF:WEB 88
24.When using the “Reply All” option, your message will automatically be sent to ____ recipients of the original message.
a. / To only / c. / To, Cc, and Bccb. / To and Cc only / d. / CC only
ANS:BPTS:1REF:WEB 89
25.In your address book, you can assign each entry a unique ____ so it is easier to address your email messages.
a. / tag / c. / nicknameb. / moniker / d. / domain name
ANS:CPTS:1REF:WEB 90
26.Mozilla’s popular email program is called ____.
a. / Thunderbird / c. / Apacheb. / Opera / d. / Outlook Express
ANS:APTS:1REF:WEB 91
27.When you start Thunderbird for the first time, you will see the ____ Wizard.
a. / Thunder / c. / Configurationb. / Mail / d. / Account
ANS:DPTS:1REF:WEB 91
28.Thunderbird uses ____ panes to organize your email messages.
a. / 1 / c. / 4b. / 3 / d. / 6
ANS:BPTS:1REF:WEB 92
29.In Thunderbird, you write your email messages in the ____ window.
a. / Preview / c. / Composeb. / Outbox / d. / none of the above
ANS:CPTS:1REF:WEB 92
30.In Thunderbird, when you receive a message, it appears in the ____ pane; when you click it, it opens in the ____ pane.
a. / Message, Preview / c. / Message, Inboxb. / Preview, Message / d. / Preview, Folders
ANS:APTS:1REF:WEB 93
31.If Thunderbird treats a message as spam but should not, click the ____ button.
a. / Safe / c. / Thumbs Upb. / Allow / d. / Not Junk
ANS:DPTS:1REF:WEB 94
32.In Thunderbird, clicking the ____ searches every folder and message for matches using criteria that you specify.
a. / Deep Search button / c. / Search All buttonb. / Saved Search folder / d. / Deep Search folder
ANS:BPTS:1REF:WEB 95
33.The Opera Mail email client is installed ____.
a. / with Internet Explorer versions 7 and higher / c. / as a stand-alone downloadb. / with the Opera Web browser / d. / none of the above
ANS:BPTS:1REF:WEB 97
34.In Opera, pressing the F4 key lets you close the ____.
a. / Mail panel / c. / Panels barb. / Address Book / d. / both a and c
ANS:DPTS:1REF:WEB 98
35.In Opera, you can show and hide parts of the message header by clicking the ____ button on the ____ toolbar.
a. / Compose Message, View / c. / View, Compose Messageb. / View, Panels / d. / Panels, Header
ANS:CPTS:1REF:WEB 99
36.By default, Opera sends forwarded messages as ____.
a. / inline text / c. / a separate text blockb. / an image file / d. / none of the above; Opera cannot forward messages
ANS:APTS:1REF:WEB 99
37.Opera’s messages are stored in ____.
a. / folders in a mailbox / c. / a single databaseb. / a distributed database / d. / small folders located randomly throughout your hard drive for added security
ANS:CPTS:1REF:WEB 100
38.Email attachments can contain malicious programs called ____.
a. / bugs / c. / hackersb. / wyrms / d. / viruses
ANS:DPTS:1REF:WEB 100
39.Software that only detects and eliminates malicious code is called a(n) ____ program.
a. / sniffer / c. / crackerb. / antivirus / d. / watchdog
ANS:BPTS:1REF:WEB 100
40.A virus ____ is a sequence of characters that is always present in a particular virus.
a. / signature / c. / definitionb. / pattern / d. / all of the above
ANS:DPTS:1REF:WEB 100
41.The colloquial term for UCE is ____.
a. / a syntax error / c. / spamb. / a virus / d. / the blue screen of death
ANS:CPTS:1REF:WEB 101
42.According the MAAWG, approximately ____% of all email messages sent every day are abusive.
a. / 40 / c. / 20b. / 80 / d. / 50
ANS:BPTS:1REF:WEB 101
43.In January 2004, the U.S. ____ law went into effect.
a. / CAN-SPAM / c. / SPAM-CANb. / END-SPAM / d. / SCRAM
ANS:APTS:1REF:WEB 102
44.The U.S. federal anti-spam law was passed in January 2004. By April 2004, the measured spam message rate was ____ it was in January 2004.
a. / higher than / c. / lower thanb. / the same as / d. / no test of this kind was performed
ANS:APTS:1REF:WEB 102
45.For anti-spam legislation to become cost-effective, prosecutors must ____.
a. / be able to identify spammers easily / c. / see a greater social benefit to winning casesb. / have a greater likelihood of winning the cases that they file / d. / All of the above
ANS:DPTS:1REF:WEB 103
46.The Windows Live Mail Inbox window contains three panes: folder, ____, and reading.
a. / inbox / c. / composeb. / outbox / d. / message
ANS:DPTS:1REF:WEB 105
47.Windows Live Mail comes with ____ default folders.
a. / 1 / c. / 5b. / 3 / d. / 7
ANS:CPTS:1REF:WEB 105
48.In Windows Live Mail, the ____ folder stores copies of messages you have sent.
a. / Outbox / c. / Sentb. / Sent items / d. / Delivered
ANS:BPTS:1REF:WEB 105
49.In Windows Live Mail, the ____ folder stores messages that have not been sent.
a. / Outbox / c. / Sendingb. / Pending / d. / Queue
ANS:APTS:1REF:WEB 105
50.In Windows Live Mail, the ____ contains summary information for each message that you receive.
a. / message list / c. / reading paneb. / folder pane / d. / pending list
ANS:APTS:1REF:WEB 105
51.You use the ____ button in Windows Live Mail to open the New Message window.
a. / Compose / c. / Newb. / Email / d. / New Message
ANS:CPTS:1REF:WEB 109
52.The Windows Live Mail New Message window has a toolbar along the top, with menu items named Send, Save, ____, and Check names, among others.
a. / File / c. / Formatb. / Attach / d. / Edit
ANS:BPTS:1REF:WEB 110
53.When sending an email to multiple recipients, separate the addresses with a ____.
a. / comma / c. / either a or bb. / semicolon / d. / neither a nor b
ANS:CPTS:1REF:WEB 109
54.When you receive a new email in Windows Live Mail, messages are displayed with an icon of a(n) ____.
a. / pair of wings / c. / envelopeb. / ream of paper / d. / antenna
ANS:CPTS:1REF:WEB 111
55.To check for incoming email in Windows Live Mail, first click the ____ button on the toolbar.
a. / Receive / c. / Checkb. / Delivery / d. / Sync
ANS:DPTS:1REF:WEB 112
56.Windows Live Mail uses a(n) ____ icon to indicate that a message has an attachment.
a. / paperclip / c. / sheaf of paperb. / envelope / d. / pushpin
ANS:APTS:1REF:WEB 113
57.To save an attached file in Windows Live Mail, the first step is to ____.
a. / click Save as / c. / navigate to the drive and folder in which to save the attached fileb. / right-click the file to open the shortcut menu / d. / click the Save button
ANS:BPTS:1REF:WEB 113
58.When replying to an email message using Windows Live Mail, the email program automatically places the text “____” in the subject line in front of the original subject.
a. / Regarding / c. / Re:b. / Replying / d. / Fw:
ANS:CPTS:1REF:WEB 115
59.The following are all true of forwarding an email message using Windows Live Mail EXCEPT ____.
a. / attachments from the original email will still be attached in the forwarded email / c. / the text “Fw:” is placed in front of the original subjectb. / you can forward a message via the To, Cc, and Bcc text boxes / d. / the original sender is automatically added as a recipient
ANS:DPTS:1REF:WEB 116
60.You can use the Windows Live Mail folders to file your email messages by ____.
a. / topic / c. / both a and bb. / category / d. / neither a nor b
ANS:CPTS:1REF:WEB 117
61.When you delete a message or folder in Windows Live Mail, you are really ____.
a. / storing it in your Recycle Bin / c. / permanently deleting itb. / moving it to the Deleted items folder / d. / none of the above
ANS:BPTS:1REF:WEB 119
62.To remove an item permanently from Windows Live Mail, you must delete it from the ____.
a. / Deleted items folder / c. / Recycle Binb. / Inbox / d. / hard drive manually
ANS:APTS:1REF:WEB 119
63.Contacts is the Windows Live term for the ____.
a. / calendar / c. / instant messagerb. / mail server / d. / address book
ANS:DPTS:1REF:WEB 120
64.To add a sender’s email address to your Windows Live Contacts, the first step is to ____.
a. / right-click the “From” name to open the shortcut menu / c. / double-click the message to open itb. / click “Add to contacts” / d. / click the “Permit” button to gain permission from the sender to add their address
ANS:CPTS:1REF:WEB 122
65.____ are rules that determine how the Internet handles message packets flowing on it.
a. / Mores / c. / Serversb. / Protocols / d. / Codes
ANS:BPTS:1REF:WEB 80
66.Some mail servers will reject messages with too many recipients (usually ____ or more).
a. / 25 / c. / 10b. / 50 / d. / 100
ANS:BPTS:1REF:WEB 82
67.A(n) ____ file is a file you can view but cannot change.
a. / read-only / c. / sharedb. / locked / d. / attach-only
ANS:APTS:1REF:WEB 84
68.The following are generally accepted rules for email messages EXCEPT ____.
a. / avoid writing messages in all capital letters / c. / always forward new information about viruses and hoaxesb. / don’t overuse formatting and graphics / d. / use caution when attempting sarcasm or humor in your messages
ANS:CPTS:1REF:WEB 86
69.If you receive an email message from a sender that you don’t recognize and the message contains an attached file, you should ____.
a. / contact the local police so they can run a trace on the email / c. / immediately delete the email and reboot the computerb. / only open the file in the evenings, when malicious code is less virulent / d. / avoid opening the file until you are sure that it doesn’t contain a virus
ANS:DPTS:1REF:WEB 100
70.Spam ____.
a. / consumes bandwidth / c. / may include content that is offensive or misleadingb. / distracts employees and wastes their time / d. / All of the above
ANS:DPTS:1REF:WEB 101
Case-Based Critical Thinking Questions
Case 2-1
Patty has just gotten her first email address, and has decided to use Windows Live Mail as her email program. She has created & configured her mail account, and is ready to start emailing. But she has a lot of questions, and knows you can help her out.
71.Patty sits at her computer and starts Windows Live Mail. The Inbox window appears on the screen. Patty clicks in the pane in the lower part of her screen and tries to start typing an email, but nothing happens. What has she done wrong?
a. / She should click the top part of the screen, in the message list. / c. / She hasn’t done anything wrong; her text will show up when she clicks “Sync” or “Send.”b. / She needs to click “Drafts” first. / d. / She needs to click the “New” button on the toolbar before she can type a new message.
ANS:DPTS:1REF:WEB 109TOP:Critical Thinking
72.Patty has now typed her message and typed the recipient’s address in the “To:” text box. Just before she clicks “Send,” she decides that a second person would like to receive the same message, also as a main recipient. She should type that person’s email address in the ____ text box.