IBA Chapter 7 (2 of 2)

IBA Chapter 7 (2 of 2)

8th Grade

17 Qs

quiz-placeholder

Similar activities

End of year quiz: Spreadsheet Modelling

End of year quiz: Spreadsheet Modelling

8th Grade

20 Qs

Name The Disney Animation Films

Name The Disney Animation Films

KG - University

20 Qs

Empowerment Technologies

Empowerment Technologies

KG - 12th Grade

15 Qs

Q7/Q8 Email Vocabulary (Basics in 21t4s)

Q7/Q8 Email Vocabulary (Basics in 21t4s)

5th - 9th Grade

17 Qs

Pre-test: On Online searching by Innovative Teaching Ideas)

Pre-test: On Online searching by Innovative Teaching Ideas)

6th - 12th Grade

14 Qs

Informatika_Kelas 8

Informatika_Kelas 8

8th Grade

20 Qs

Cyber Security KS4

Cyber Security KS4

8th - 12th Grade

15 Qs

Linux-2 Quiz 2 -- LAMP

Linux-2 Quiz 2 -- LAMP

1st - 12th Grade

15 Qs

IBA Chapter 7 (2 of 2)

IBA Chapter 7 (2 of 2)

Assessment

Quiz

Computers

8th Grade

Hard

Created by

George Jenness

Used 10+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

17 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You want to send an e-mail message you received to another user who did not receive the original message. Which is the best way to do this?

Copy the message text into a new message and send it to the omitted user.

Forward the message.

Reply to the message.

Ask the sender to re-send the original message and include the omitted user.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

To what does the term "netiquette" refer?

A set of typographical conventions that govern user practices in e-mail messages

A set of U.S. laws that specify content forbidden from transmission in e-mail messages

A set of guidelines that encourage common sense, politeness and general rules for e-mail messages

An international convention banning the use of profanity and controversial opinions from e-mail messages

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In order to help with your job tasks, your supervisor has given you a PIM application to install and use. PIM is an acronym for a type of program with which you can:

filter spam at the client.

translate dotted-quad IP addresses into easily recognizable text-based names, and vice versa.

schedule appointments and meetings, store contact information, and manage tasks.

filter spam at the server.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of software is common to all smartphones?

Spam-detection software.

Encryption/decryption software.

Personal Information Management (PIM) software.

Virus-protection software

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following can be considered an inappropriate use of e-mail communication in the workplace?

Documenting the progress of a project

Archiving e-mail threads for later retrieval

Disclosing confidential information

Sharing files with a co-worker

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You send an e-mail message to a co-worker to help plan a surprise going-away party for a mutual friend before she embarks on a six-month around-the-world cruise. Which statement reflects your right to e-mail privacy?

You can send e-mail to anyone using company equipment and Internet connections without fear of reprisal as long as you include your immediate supervisor as a recipient.

Your supervisor has the right to read e-mail you send using company equipment and Internet connections.

You can send e-mail to anyone using company equipment and Internet connections without fear of reprisal as long as you include someone from the company as a recipient.

Your supervisor has no right to read e-mail you send, even if you send it using company equipment and Internet connections.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which action can you perform to filter spam at your client computer?

Configure your system to filter IP addresses contained in the latest blackhole list.

Use CAPTCHA to distinguish human senders from automated senders.

Use a client-side filter to identify and filter spam messages.

Use SMTP authentication, which requires a valid name and password for each message.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers