The purpose of this quiz is to provide the student with a large number of supplemental exercises for Chapter 1. This quiz can be used to perform a self-evaluation. This quiz consists of twenty five multiple choice questions. Each multiple choice question has four possible answers.
|
1 | | Which of the following are all synonyms for mailer? |
| | A) | mail application, browser, and pine |
| | B) | mail application, male client, and female client |
| | C) | mail client, email program, and mail application |
| | D) | electronic post office, mail client, and bounced email |
|
|
2 | | Which of the following are all considered advantages of email? |
| | A) | convenience, speed of delivery, generality, and reliability |
| | B) | printable, global, and expensive |
| | C) | global, convenience, and Microsoft owned |
| | D) | slow delivery, reliable, global, and inexpensive |
|
|
3 | | Which of the following are all considered disadvantages of email? |
| | A) | Easy to forge, easy to misdirect, and easy to receive junk email. |
| | B) | Hard to forge, easy to misdirect, and easy to receive junk email. |
| | C) | Easy to be overloaded, easy to intercept, and hard to misdirect. |
| | D) | Guaranteed response, easy to forge, and hard to receive junk email. |
|
|
4 | | Select the word or phrase that does not have the same meaning as userid. |
| | A) | user identification |
| | B) | user name |
| | C) | account name |
| | D) | email address |
|
|
5 | | Which of the following statements is false? |
| | A) | Your password is a secret code that authenticates you to the computer. |
| | B) | A good password should be no more than five characters long. |
| | C) | Case is significant in passwords. |
| | D) | Passwords are not echoed on the screen for security reasons. |
|
|
6 | | Which of the following is not a top-level domain? |
| | A) | met |
| | B) | com |
| | C) | org |
| | D) | mil |
|
|
7 | | Which of the following is not a valid country code? |
| | A) | ca |
| | B) | es |
| | C) | us |
| | D) | tf |
|
|
8 | | GUI stands for which of the following? |
| | A) | Graphic User Interface |
| | B) | Graphical User Interface |
| | C) | Graphical User Interfaces |
| | D) | Graphs Under Interplay |
|
|
9 | | Which of the following is a valid definition for email alias? |
| | A) | A private distribution list. |
| | B) | An easy-to-remember name that you create that the mail application associates with a particular email address. |
| | C) | An alternative name for your inbox. |
| | D) | Electronic mail. |
|
|
10 | | The body of an email message does not contain which of the following parts? |
| | A) | greeting |
| | B) | header |
| | C) | text |
| | D) | signature |
|
|
11 | | Netiquette is defined as which of the following? |
| | A) | informal rules of network etiquette |
| | B) | informal rules for creating a network |
| | C) | formal rules for composing an email message |
| | D) | computer jargon for flaming |
|
|
12 | | ASCII stands for which of the following? |
| | A) | American Short Code for Informal Interchange |
| | B) | American Standard Code for Informal Interchange |
| | C) | American Standard Code for Information Interlude |
| | D) | American Standard Code for Information Interchange |
|
|
13 | | Why does one use bracketed text in an email message? |
| | A) | To flame the sender. |
| | B) | To provide a context for the recipient of the message. |
| | C) | To reduce Internet traffic. |
| | D) | To increase the speed of the email delivery. |
|
|
14 | | Which of the following statements is true? |
| | A) | An attachment is the same thing as an inclusion. |
| | B) | A signature file and a blind carbon copy are required elements
of secret email messages. |
| | C) | Mail programs are sometimes call email messages. |
| | D) | In theory, a 7 by 24 machine runs 168 hours per week. |
|
|
15 | | Which of the following is not a key component for an email system to work? |
| | A) | email client |
| | B) | email server |
| | C) | mailbox |
| | D) | encryption |
|
|
16 | | POP stands for which of the following? |
| | A) | Popular Office Program |
| | B) | Post Office Program |
| | C) | Protocol on Protocol |
| | D) | Post Office Protocol |
|
|
17 | | SMTP stands for which of the following? |
| | A) | Simple Mail Transfer Program |
| | B) | Simple Mail Transfer Protocal |
| | C) | Simple Mail Transfer Protocol |
| | D) | Sophisticated Mail Transfer Protocol |
|
|
18 | | A kilobyte is not which of the following quantities? |
| | A) | 1,000 bytes |
| | B) | 1/1,000th of a megabyte |
| | C) | 1K |
| | D) | 200 characters |
|
|
19 | | Which of the following is not a major reason for an email bounce? |
| | A) | bad user account name |
| | B) | bad domain name |
| | C) | stale file handle |
| | D) | domain server is down |
|
|
20 | | MIME stands for which of the following? |
| | A) | Multipurpose Internet Email Extension |
| | B) | Multipurpose Internet Email Extensions |
| | C) | Multipurpose Internet Mail Extensions |
| | D) | Multimedia Internet Mail Extensions |
|
|
21 | | Which of the following is not true of the DNS? |
| | A) | DNS is an acronym for Distributed Naming Scheme. |
| | B) | It is very successful because no one person is responsible for
maintaining the information. |
| | C) | It follows the boundaries of countries and organizations, rather than networks. |
| | D) | The DNS can be visualized as an inverted tree with the root
at the top. |
|
|
22 | | Which of the following is not true? |
| | A) | Spam is an acronym for Superfluous Provoking and Annoying e-Mail. |
| | B) | Spam is unsolicited, junk e-mail. |
| | C) | One way to deal with Spam is by using e-mail filters. |
| | D) | Spam is a meat product originally fed to soldiers in World War II. |
|
|
23 | | Which of the following is a situation where you can not specify sam in the To: field of the e-mail template? |
| | A) | There exists a global alias and a private alias for sam. |
| | B) | You created an alias of sam for sam@somecomputer.edu and no global alias exists. |
| | C) | You are on the same system as sam. |
| | D) | None of the above. |
|
|
24 | | The best way to locate a person's e-mail address is: |
| | A) | Look it up on-line by using a search engine or by looking at a white pages directory. |
| | B) | Ask them directly. |
| | C) | Make an educated guess using the basic principles behind
e-mail addresses. |
| | D) | Call directory assistance. |
|
|
25 | | If you create a private alias of help for paulb@somecomputer.edu and there already exists a global alias of help for sarahg@somecomputer.edu, which of the following is true: |
| | A) | Mail sent to help will go to both e-mail addresses. |
| | B) | Mail sent to help will go to paulb@somecomputer.edu. |
| | C) | Mail sent to help will go to sarahg@somecomputer.edu. |
| | D) | Mail sent to help will result in a warning from your mail client. |
|