The purpose of this quiz is to provide the student with a large number of supplemental exercises for Chapter 1. This quiz can be used to perform a self-evaluation. This quiz consists of twenty five multiple choice questions. Each multiple choice question has four possible answers.
 |
1 |  |  Which of the following are all synonyms for mailer? |
|  | A) | mail application, browser, and pine |
|  | B) | mail application, male client, and female client |
|  | C) | mail client, email program, and mail application |
|  | D) | electronic post office, mail client, and bounced email |
 |
 |
2 |  |  Which of the following are all considered advantages of email? |
|  | A) | convenience, speed of delivery, generality, and reliability |
|  | B) | printable, global, and expensive |
|  | C) | global, convenience, and Microsoft owned |
|  | D) | slow delivery, reliable, global, and inexpensive |
 |
 |
3 |  |  Which of the following are all considered disadvantages of email? |
|  | A) | Easy to forge, easy to misdirect, and easy to receive junk email. |
|  | B) | Hard to forge, easy to misdirect, and easy to receive junk email. |
|  | C) | Easy to be overloaded, easy to intercept, and hard to misdirect. |
|  | D) | Guaranteed response, easy to forge, and hard to receive junk email. |
 |
 |
4 |  |  Select the word or phrase that does not have the same meaning as userid. |
|  | A) | user identification |
|  | B) | user name |
|  | C) | account name |
|  | D) | email address |
 |
 |
5 |  |  Which of the following statements is false? |
|  | A) | Your password is a secret code that authenticates you to the computer. |
|  | B) | A good password should be no more than five characters long. |
|  | C) | Case is significant in passwords. |
|  | D) | Passwords are not echoed on the screen for security reasons. |
 |
 |
6 |  |  Which of the following is not a top-level domain? |
|  | A) | met |
|  | B) | com |
|  | C) | org |
|  | D) | mil |
 |
 |
7 |  |  Which of the following is not a valid country code? |
|  | A) | ca |
|  | B) | es |
|  | C) | us |
|  | D) | tf |
 |
 |
8 |  |  GUI stands for which of the following? |
|  | A) | Graphic User Interface |
|  | B) | Graphical User Interface |
|  | C) | Graphical User Interfaces |
|  | D) | Graphs Under Interplay |
 |
 |
9 |  |  Which of the following is a valid definition for email alias? |
|  | A) | A private distribution list. |
|  | B) | An easy-to-remember name that you create that the mail application associates with a particular email address. |
|  | C) | An alternative name for your inbox. |
|  | D) | Electronic mail. |
 |
 |
10 |  |  The body of an email message does not contain which of the following parts? |
|  | A) | greeting |
|  | B) | header |
|  | C) | text |
|  | D) | signature |
 |
 |
11 |  |  Netiquette is defined as which of the following? |
|  | A) | informal rules of network etiquette |
|  | B) | informal rules for creating a network |
|  | C) | formal rules for composing an email message |
|  | D) | computer jargon for flaming |
 |
 |
12 |  |  ASCII stands for which of the following? |
|  | A) | American Short Code for Informal Interchange |
|  | B) | American Standard Code for Informal Interchange |
|  | C) | American Standard Code for Information Interlude |
|  | D) | American Standard Code for Information Interchange |
 |
 |
13 |  |  Why does one use bracketed text in an email message? |
|  | A) | To flame the sender. |
|  | B) | To provide a context for the recipient of the message. |
|  | C) | To reduce Internet traffic. |
|  | D) | To increase the speed of the email delivery. |
 |
 |
14 |  |  Which of the following statements is true? |
|  | A) | An attachment is the same thing as an inclusion. |
|  | B) | A signature file and a blind carbon copy are required elements
of secret email messages. |
|  | C) | Mail programs are sometimes call email messages. |
|  | D) | In theory, a 7 by 24 machine runs 168 hours per week. |
 |
 |
15 |  |  Which of the following is not a key component for an email system to work? |
|  | A) | email client |
|  | B) | email server |
|  | C) | mailbox |
|  | D) | encryption |
 |
 |
16 |  |  POP stands for which of the following? |
|  | A) | Popular Office Program |
|  | B) | Post Office Program |
|  | C) | Protocol on Protocol |
|  | D) | Post Office Protocol |
 |
 |
17 |  |  SMTP stands for which of the following? |
|  | A) | Simple Mail Transfer Program |
|  | B) | Simple Mail Transfer Protocal |
|  | C) | Simple Mail Transfer Protocol |
|  | D) | Sophisticated Mail Transfer Protocol |
 |
 |
18 |  |  A kilobyte is not which of the following quantities? |
|  | A) | 1,000 bytes |
|  | B) | 1/1,000th of a megabyte |
|  | C) | 1K |
|  | D) | 200 characters |
 |
 |
19 |  |  Which of the following is not a major reason for an email bounce? |
|  | A) | bad user account name |
|  | B) | bad domain name |
|  | C) | stale file handle |
|  | D) | domain server is down |
 |
 |
20 |  |  MIME stands for which of the following? |
|  | A) | Multipurpose Internet Email Extension |
|  | B) | Multipurpose Internet Email Extensions |
|  | C) | Multipurpose Internet Mail Extensions |
|  | D) | Multimedia Internet Mail Extensions |
 |
 |
21 |  |  Which of the following is not true of the DNS? |
|  | A) | DNS is an acronym for Distributed Naming Scheme. |
|  | B) | It is very successful because no one person is responsible for
maintaining the information. |
|  | C) | It follows the boundaries of countries and organizations, rather than networks. |
|  | D) | The DNS can be visualized as an inverted tree with the root
at the top. |
 |
 |
22 |  |  Which of the following is not true? |
|  | A) | Spam is an acronym for Superfluous Provoking and Annoying e-Mail. |
|  | B) | Spam is unsolicited, junk e-mail. |
|  | C) | One way to deal with Spam is by using e-mail filters. |
|  | D) | Spam is a meat product originally fed to soldiers in World War II. |
 |
 |
23 |  |  Which of the following is a situation where you can not specify sam in the To: field of the e-mail template? |
|  | A) | There exists a global alias and a private alias for sam. |
|  | B) | You created an alias of sam for sam@somecomputer.edu and no global alias exists. |
|  | C) | You are on the same system as sam. |
|  | D) | None of the above. |
 |
 |
24 |  |  The best way to locate a person's e-mail address is: |
|  | A) | Look it up on-line by using a search engine or by looking at a white pages directory. |
|  | B) | Ask them directly. |
|  | C) | Make an educated guess using the basic principles behind
e-mail addresses. |
|  | D) | Call directory assistance. |
 |
 |
25 |  |  If you create a private alias of help for paulb@somecomputer.edu and there already exists a global alias of help for sarahg@somecomputer.edu, which of the following is true: |
|  | A) | Mail sent to help will go to both e-mail addresses. |
|  | B) | Mail sent to help will go to paulb@somecomputer.edu. |
|  | C) | Mail sent to help will go to sarahg@somecomputer.edu. |
|  | D) | Mail sent to help will result in a warning from your mail client. |
 |