Lesson 7 Business Email and Personal Information Management

Lesson 7 Business Email and Personal Information Management

8th Grade

•

34 Qs

quiz-placeholder

Similar activities

IBA Chapter 7B

IBA Chapter 7B

CIW IBA Lesson 7 Vocabulary

CIW IBA Lesson 7 Vocabulary

Real world Skils: Computers and Software

Real world Skils: Computers and Software

2 - Cybersecurity 101

2 - Cybersecurity 101

Computer Apps I Vocabulary 9

Computer Apps I Vocabulary 9

PIT 2021 Fall Exam

PIT 2021 Fall Exam

Lesson 5: Protecting the Server and Client

Lesson 5: Protecting the Server and Client

Cybersecurity Quiz

Cybersecurity Quiz

Lesson 7 Business Email and Personal Information Management

Lesson 7 Business Email and Personal Information Management

Assessment

Quiz

•

Computers

•

8th Grade

•

Practice Problem

•

Medium

Created by

Jamie D’Zamko

Used 16+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

34 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following scans incoming email attachments to ensure they do not contain malicious code?

At the email client on the user's computer

At the LAN firewall

At the Web server

At the Email server

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following email response options should you use to send an email message to users who did not receive the orignial?

Reply All

Forward

Forward All

Reply

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which email client feature allows you to store the names and information of people you contact frequently?

Email Signature

Address Book

File Attachment

Email Thread

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which device can synchroniz with the personal information management (PIM) on your computer?

A USB connector

A Router

A Smartphone

Message Transfer Agent (MTA)

A Gateway

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

When sending an email message, you must have:

An address in the To field & text in the message field

A address in the To field & the sender's contact information in the signature field

An address in the To field

An address in the To field & a subject in the subject field

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following can administrators use to filter out the IP addresses of known spammers?

Blackhole List

CAPTCHA

Open Relay

Spam Filters

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What can website developers use to prevent fake email accounts from being registered?

Blackhole List

CAPTCHA

Open Relay

Spam Filters

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers