Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

Lesson 7: Business E-Mail and Personal Information Management

Exam Review

Pre-Assessment Questions
1. What feature provided with many e-mail programs can store information for commonly accessed e-mail contacts? a. Import tool b. Address book c. Autoresponder d. Attachment

Pre-Assessment Questions
2. What is an e-mail signature? a. A digital display of one's handwritten signature b. Proof of one's identity for security purposes c. A closing remark that is manually attached to an email message d. Text that appears automatically at the bottom of an e-mail message

Pre-Assessment Questions
3. Name the protocol used to send e-mail over the Internet, and name one of two protocols that can be used to receive e-mail over the Internet. Simple Mail Transfer Protocol (SMTP) is used to send e-mail, and either Post Office Protocol 3 (POP3) or Internet Message Access Protocol (IMAP) is required to receive e-mail.

Lesson Review Questions

1. Name the three elements of an e-mail address. The user name, the "at" symbol (@) and the domain name.

Lesson Review Questions

2. You can receive e-mail, but you cannot send it. What type of e-mail server may be causing the problem? The Simple Mail Transfer Protocol (SMTP) server.

Lesson Review Questions

3. What is the best method for sending the content of a word processor document to another person via e-mail? Attach the entire doc file to an e-mail message.

Lesson Review Questions

4. Define the term netiquette. Netiquette is e-mail etiquette, or guidelines for polite and sensible communication using e-mail.

Lesson Review Questions


5. Why would an alarm feature be useful in PIM software? An alarm feature can be set to remind you of an upcoming event, such as a meeting or other appointment. You can set an alarm to play a sound or display a message at a specified time before the event is scheduled to occur.

You might also like