Deck 12: Electronic Mail
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/30
Play
Full screen (f)
Deck 12: Electronic Mail
1
The ____________________ encoding method is used to encode 8-bit text codes such as those used in a foreign language character set into 7-bit U.S.ASCII characters.
quote printable
2
The ____ is used to deliver e-mail content securely.
A)Safe Multipurpose Internet Mail Extensions
B)Secure Multipurpose Interface Mail Enabler
C)Secure Multipurpose Internet Mail Extensions
D)Secure Multipurpose Internet Mail Environment
A)Safe Multipurpose Internet Mail Extensions
B)Secure Multipurpose Interface Mail Enabler
C)Secure Multipurpose Internet Mail Extensions
D)Secure Multipurpose Internet Mail Environment
C
3
The mailbox portion of the address is often made from a user's ____.
A)home address
B)first name
C)server name
D)account name
A)home address
B)first name
C)server name
D)account name
D
4
In order to use any e-mail client program,it must be ____________________ properly.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
5
Managing e-mail with ____ allows for complete access to messages stored on the server from as many client computers as necessary.
A)IMAP
B)POP3
C)SMTP
D)IMAM
A)IMAP
B)POP3
C)SMTP
D)IMAM
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
6
Two of the most common e-mail errors stem from the user incorrectly specifying either ____.
A)the mailbox name or the computer name
B)the username or the mailbox name
C)the computer name or the server name
D)the username or the user's address
A)the mailbox name or the computer name
B)the username or the mailbox name
C)the computer name or the server name
D)the username or the user's address
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
7
A(n)____________________ program exchanges information with a designated e-mail server to send and receive messages.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
8
E-Mail is a common source of distributing worms and viruses.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
9
The Internet Network Authority is responsible for maintenance of the Top Level Domains.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
10
The second part of an email message is called the ____________________ and contains the actual text of the message.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
11
A(n)____ consists of a keyword followed by a colon and additional information.
A)body
B)header
C)message
D)address
A)body
B)header
C)message
D)address
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
12
Using a protocol analyzer,it is possible to capture all of the activity associated with sending an electronic mail message.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
13
IMAP does not provide direct access to the messages that are stored on the server.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
14
____ provide a way for binary programs,graphical images,or other types of files to be attached to an e-mail message.
A)Multipurpose Internet Mail Environments
B)Multipurpose Interface Mail Extensions
C)Multipurpose Internet Management Extensions
D)Multipurpose Internet Mail Extensions
A)Multipurpose Internet Mail Environments
B)Multipurpose Interface Mail Extensions
C)Multipurpose Internet Management Extensions
D)Multipurpose Internet Mail Extensions
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
15
The current version of IMAP is ____.
A)IMAP3rev1
B)IMAP3rev4
C)IMAP4rev1
D)IMAP4rev4
A)IMAP3rev1
B)IMAP3rev4
C)IMAP4rev1
D)IMAP4rev4
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
16
Electronic mail uses the ____ model to allow mail messages to be exchanged.
A)client-server
B)client-client
C)servlet-servlet
D)server-server
A)client-server
B)client-client
C)servlet-servlet
D)server-server
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
17
____ is designed to eliminate the typical problems that are caused by downloading the electronic messages to a client computer using the Post Office Protocol.
A)SMTP
B)IMAP
C)HTTP
D)RPC
A)SMTP
B)IMAP
C)HTTP
D)RPC
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
18
A blank line is used as the separator between the parts of an email message.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
19
____________________ is used to exchange messages between servers or between a client and a server.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
20
A Telnet session to a POP3 server is accomplished by entering a command similar to ____.
A)telnet athena.sunybroome.edu 25
B)telnet athena.sunybroome.edu 1101
C)telnet athena.sunybroome.edu 110
D)telnet 110 athena.sunybroome.edu
A)telnet athena.sunybroome.edu 25
B)telnet athena.sunybroome.edu 1101
C)telnet athena.sunybroome.edu 110
D)telnet 110 athena.sunybroome.edu
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
21
MATCHING
Match each term with the correct statement below.
a.Header
d.Base64 encoding method
b.IMAP
e.SMTP
c.IMAP4
A protocol designed to provide access to electronic messages that are stored on a mail server
Match each term with the correct statement below.
a.Header
d.Base64 encoding method
b.IMAP
e.SMTP
c.IMAP4
A protocol designed to provide access to electronic messages that are stored on a mail server
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
22
Discuss the issue with sending messages in clear text.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
23
What is IMAP and what does it do?
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
24
MATCHING
Match each term with the correct statement below.
a.Header
d.Base64 encoding method
b.IMAP
e.SMTP
c.IMAP4
Specifies how electronic messages are exchanged between computers using the Transmission Control Protocol
Match each term with the correct statement below.
a.Header
d.Base64 encoding method
b.IMAP
e.SMTP
c.IMAP4
Specifies how electronic messages are exchanged between computers using the Transmission Control Protocol
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
25
Describe the features of IMAP4rev1.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
26
MATCHING
Match each term with the correct statement below.
a.Header
d.Base64 encoding method
b.IMAP
e.SMTP
c.IMAP4
Used primarily to transfer binary attachments
Match each term with the correct statement below.
a.Header
d.Base64 encoding method
b.IMAP
e.SMTP
c.IMAP4
Used primarily to transfer binary attachments
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
27
MATCHING
Match each term with the correct statement below.
a.Header
d.Base64 encoding method
b.IMAP
e.SMTP
c.IMAP4
First part of an email message
Match each term with the correct statement below.
a.Header
d.Base64 encoding method
b.IMAP
e.SMTP
c.IMAP4
First part of an email message
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
28
Why should public e-mail client computer systems never be configured to save an e-mail password?
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
29
List three features that the MIME standard provides.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
30
MATCHING
Match each term with the correct statement below.
a.Header
d.Base64 encoding method
b.IMAP
e.SMTP
c.IMAP4
Includes features such as concurrent access to shared mailboxes,online and offline access to messages,and management from any computer
Match each term with the correct statement below.
a.Header
d.Base64 encoding method
b.IMAP
e.SMTP
c.IMAP4
Includes features such as concurrent access to shared mailboxes,online and offline access to messages,and management from any computer
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck