G11_EoT_Solved Quizzes and Worksheets
|
|
- Marcus Gaines
- 8 years ago
- Views:
Transcription
1 G11_EoT_Solved Quizzes and Worksheets Part I: Selected Questions What type of hackers is responsible for break into a system to steal credit card details? A. Theft of services B. Theft of information C. Hatred and vengeance D. For thrill of it Which of the following can conceder as a network disadvantage? A. Electronic mail B. Software sharing C. Malicious code D. Natural disaster Which of the following devices is used to connect networks consist of two or more LANs? A. Router B. Cable modem C. Bandwidth D. Broadband Which domain code is used for educational purpose? A..com B..mil C..edu D..ac.ae 1
2 Which of the following is true about Bcc? A. Send the message to people without attachment files B. Send the message to people other than those who send the original message. C. Send the message back to the sender along with your reply. D. The recipient is not visible to the other person who receives the message. What you have to do if you receive message with attachment that you suspect it has a virus? A. Do not open it, and immediately delete the message B. Reply to the sender C. Download the attached file D. Report to service provider In which case is the best type of correspondence? A. When the correspondence might require a paper trail. B. C. D. When the correspondence covers multiple points. When the correspondence needs to be accessed frequently. All of the above. What factors determine which electronic communication method is most appropriate? A. Connection Speed B. Topic of the correspondence C. Types of network devices D. Size of the attachment 2
3 Which of the following can cause delivery failure or bounced ? A. The address was mistyped B. Slow internet connection C. Paper or electronic trail D. Broadband connection problem Which of the following helps you to prevent receiving spam/junk s? A. Do not publish your address online. B. Check the Web site's privacy statement before you provide your address. C. Never reply to a junk message D. All of the above. Which of the following considers as deceive an audience into believing that something false is real. A. fraud B. Hoaxes C. Spam D. from a blocked user Which type of fraudulent related to send a message that appears to come from a legal source, such as your bank? The message asks that you update or verify your personal information. A. Phishing B. from a blocked user C. Pyramid schemes 3
4 D. Hoaxes Which type of viruses does not cause its damage until a certain date or until the system has been booted a certain number of time? A. Trojan horse B. Logic bomb C. Worm D. Time bomb 4
5 Part II: True/False Questions 1. A network is simply a group of two or more computers linked together. 2. The Internet is the biggest network of all. 3. A standalone computer system is vulnerable to the same kinds of risks as a network. 4. Networks are divided into four main types. 5. The communication area of a LAN might be as large as a state, country, or even the world. 6. Client/server networks are easier to set up and manage than peer-to-peer networks. 7. To connect wirelessly requires different equipment than that used for a wired connection. 8. Electronic identification cards are used to gain access to certain areas within a building or department. 9. The best plan for a company that handles secure information is to handle security breaches as they occur. 10. Biometric security measures are usually applied when high-level security is required. 11. You can use an Internet service provider to send to any computer in the world. 12. Each Internet user is required to have a unique identification in the form of an address, sign-in or log on credentials, and password. 13. Currently, a limited range of 32 top-level domains are available. 14. When an message first appears in the Inbox of Outlook, it is displayed in red type. 15. Outlook can synchronize with other devices such as a desktop computer or a cell phone. 16. When you delete messages from the Inbox folder, they are deleted permanently. 17. When you open Outlook, it sends a request to your mail server to check if you have any messages waiting. 18. You can use a distribution list to send the same message to a group. 19. You cannot send an message to yourself. 20. You can insert only one address in the To, Cc, and Bcc boxes of an message. 21. Generally the communications media for teleconferencing is a telephone line. 22. In most instances, electronic communications use voice rather than text or graphics. 5
6 23. The most widely used one-to-one communication on the Internet is Temporary Internet Files (TIF) increase the amount of time it takes for a browser to load and display a Web site. 25. You can attach any number of files to an message, regardless of the size. 26. Most users report that their biggest problem is spam. 27. A worm is a type of virus that has to attach itself to other files in order to spread. 28. The best way to protect data on a computer is to effectively control access. 29. Instant messaging should be short and to the point. 30. It is possible to add a hyperlink to a message rather than attaching a file. 6
7 Part III: Multiple Choice Questions Identify the choice that best completes the statement or answers the question. 31. What types of phones are supported through the Public Switched Telephone Network (PSTN)? a. Digital c. Standard b. Mobile d. All of the above 32. Which of the following network benefit do companies take advantage of when they purchase a site license? a. Enhanced communication c. Software sharing b. Hardware sharing d. Collaborative environment 33. Which of the following is true about ? a. The cost depends on the size of the c. It is private message b. Delivery is almost instantaneous d. It cannot be sabotaged 34. In a client/server network, which of the following would be considered the client? a. Microsoft Windows c. Printer b. Internet Explorer d. Desktop computer 35. Which of the following can contain communication links across metropolitan, regional, or national boundaries? a. LAN c. WAN b. Wireless LAN d. Intranet 36. In a client/server network, the manages network resources. a. client c. node b. server d. router 37. Handbooks, employee manuals, and employment forms would most likely be found on. a. an intranet c. the Internet b. an extranet d. a hub 38. The word modem is an acronym for. a. modern demarcation c. modulate demodulate b. most demand d. modification demonstration 39. Which of the following uses coaxial cable to send and receive data? a. Modem c. Digital subscriber line (DSL) b. Cable modem d. T-1 line 40. The determines the amount of data that can be sent at one time. a. router c. node b. hub d. bandwidth 41. Computer information is stored digitally, but information sent over the telephone lines is transmitted in the form of. a. analog waves c. air waves b. bridges d. fiber optics 42. A(n) is a type of fiber-optic telephone line that can transmit up to megabits per second. 7
8 a. DSL c. VDSL b. HDSL d. T-1 line 43. Sniffer software is used to. a. prevent hackers from accessing your computer b. locate wireless hot spots c. transmit voice data over telephone lines d. set up and manage a peer-to-peer network 44. Antivirus software should. a. be run when you suspect a problem c. be run monthly b. be run weekly d. always be running 45. A(n) acts like a switchboard through a firewall. a. Web server c. proxy server b. FTP server d. database server 46. A cache is a(n). a. place to store something temporarily c. external wireless adapter b. special type of password d. dedicated connection to the Internet 47. Companies handling sensitive information should back up data regularly and store it. a. on the same computer c. on CDs b. on the network server d. off site 48. Biometric security measures examine any of the following, except. a. fingerprints c. voice pattern b. blood type d. retina of the eye FIGURE
9 49. Figure 24-1 above shows an example of. a. a communication channel c. a peer-to-peer network b. a client/server network d. T-1 lines FIGURE Figure 24-2 above shows a computer with a attached. a. dial-up modem c. hub b. wireless router d. T-1 line Case
10 Javier has decided to upgrade his communication hardware and get a faster Internet connection. After considering all the options, he has decided to use a wireless Internet service provider. 51. The speeds Javier will get with his new wireless connection will be more than times faster than his old dial-up connection. a. 2 c. 30 b. 7 d To connect his laptop wirelessly to the Internet, Javier will need a(n). a. hub c. T-1 line b. router d. adapter Case 24-2 Bryah owns a small business and travels frequently. She is concerned about the security of the data on her laptop, which includes valuable information and trade secrets. 53. When Bryah creates a password to restrict access to her computer, she should. a. change it frequently c. write it down b. use all lowercase letters d. use the same one as her Internet account 54. When Bryah is traveling, accidental association would be a concern when she is. a. connecting wirelessly to the Internet c. screening potential employees b. employing biometric security measures d. backing up data 55. Which service uses a cell phone or other mobile device to send and receive written messages? a. c. VoIP b. Instant messaging d. Text messaging 56. ARPANET was established. a. to provide rules governing the transfer of data b. to regulate the use of domain names c. as a testing ground for new networking technologies d. as a way to build online communities of people who share common interests 57. Which of the following is not part of an address? a. User name symbol b. # symbol d. Domain name 58. Which part of an message should fully but briefly describe the purpose of the message? a. Address c. Body b. Subject line d. Attachment 59. Which option would you use to respond to a message if you are sending it to people other than those who sent the original message? a. Reply to Sender c. Forward b. Reply All d. Copy 60. Google s Gmail, Hotmail, and Alta Vista are examples of. a. Web-based services c. social networking sites b. message boards d. text messaging services 61. AutoArchive in Outlook saves the backup file with a(n) extension. 10
11 a..eml c..pst b..arc d..bac 62. Which Outlook feature is used to set up appointments and meetings? a. Contacts c. Tasks b. Calendar d. Mail 63. A closed envelope icon next to a message in the Inbox indicates that it. a. is displayed in the Navigation pane c. has not been read yet b. has been permanently deleted d. is ready to send 64. The Outlook stores names, addresses, phone numbers, and other contact information. a. Address Book c. Mailing List b. Distribution List d. Navigation pane 65. If the primary addressee does not see that others are copied on the message, it is a copy. a. hidden c. screened b. private d. blind 66. The title of the message window contains. a. the sender s address c. the subject line b. the recipient s address d. all of the above 67. When you type a Web site address in an Outlook message, it is. a. bolded c. underlined b. italicized d. none of the above 68. You can save an message as a(n). a. text file c. template b. HTML document d. any of the above 69. Which of the following indicates that it is a reply message? a. The word Reply in the title c. The letter R on the envelope icon b. The letters Re preceding text in the subject d. A different color in the title line 70. An exclamation point on a message icon means that. a. it has not been read c. it contains a virus b. it is considered high-priority d. it has an attached file 71. If you are sending or copying an to more than one person, each address should be separated by a(n). a. colon c. comma b. semicolon d. plus sign 72. The Forwarding command in Outlook automatically redirects your mail to. a. another address c. the folder you designate b. your mobile phone d. the Deleted Items folder FIGURE
12 73. To open the dialog box shown in Figure 25-1 above, click on the menu bar, point to New, and then click Folder. a. Create c. Open b. File d. Personal FIGURE In the address shown in Figure 25-2 above, which is the domain code? a. dolores014 c. verizon d..net Case 25-1 Both at work and in her personal life, April uses many different forms of electronic communication. Every day she uses the Internet to transmit and receive information in a variety of ways. 75. In the morning, April spends a few minutes posting personal journal entries to her. a. VoIP c. chat room b. blog d. message board 12
13 76. Sometimes April uses a(n) service to make phone calls with an Internet connection instead of a regular telephone line. a. VoIP c. text messaging b. IM d. newsgroup Case 25-2 Hunter uses Microsoft Office Outlook at work to manage his . He gets a lot of messages, so he needs to spend time each day organizing them. 77. In the Outlook window, Hunter uses the to create mail folders for various topics, special projects, and individuals. a. Navigation pne c. Inbox b. Reading pane d. Outbox 78. To search for a message, Hunter would click on the menu bar, point to Instant Search and then select Search All Mail Items. a. File c. Tools b. Preferences d. View 79. Which of the following was originally developed to facilitate the syndication of news articles? a. Phishing c. RDF Summary b. Teleconferencing d. Google Docs 80. Which type of correspondence is possible with electronic communication? a. One to one c. Many to many b. One to many d. Any of the above 81. is the process of selecting paths in a network along which to send network traffic. a. Forwarding c. Tagging b. Routing d. Phishing 82. Which of the following allows people to use voice, full-motion video, and interactive desktop sharing? a. Community building c. History tracking b. Collaborative communication d. Tagging 83. Google Docs is an example of what type of program? a. Anti-virus c. Online document sharing b. History tracking d. Collaborative communication 84. Which of the following is not a sort option for displaying the History list in Internet Explorer? a. By Total Time c. By Site b. By Date d. By Most Visited 85. If you are having trouble configuring your account with Windows Mail, you might consider using. a. the Network Repair Tool c. rich text format (RTF) b. Windows Live Mail d. HTML formatting 86. A bounced refers to a message that. a. has an attachment c. gets returned because of delivery failure b. has a virus d. is sent in rich text format and gets garbled 13
14 87. Mistyping an address can cause the message to. a. fail to be delivered c. get caught in the spam filter b. spread a virus d. get sorted into the Junk folder 88. What is a paper trail? a. A written record created in the course of activities b. A message that gets garbled during transmission c. An attachment that gets blocked by your program d. Notification that an message was not delivered properly 89. If the reply message is not applicable to other recipients, which is the best response option? a. Reply c. Cc b. Reply All d. Bcc 90. Radio listeners believing that invaders from Mars were attacking the world is an example of a(n). a. hoax c. urban legend b. virus d. pyramid scheme 91. Which is an integrated security system that prevents unauthorized electronic access to a network computer system while permitting outward communication? a. Firewall c. Antivirus software b. Electronic identification cards d. Biometric security measures 92. Encryption technologies can help keep information secure. a. anti-virus c. teleconferencing b. instant messaging d. credit card 93. If a customer needs immediate assistance or has a complaint, then the reply should be within. a. 5 minutes c. 5 to 10 hours b. 30 minutes to 3 hours d. 24 hours 94. What is the estimated yearly cost of spam for U.S. businesses? a. $20 thousand c. $20 billion b. $20 million d. $20 trillion 95. GlobalSign and VeriSign are commercial digital ID groups that can help you. a. encrypt an message c. prevent viruses b. control unsolicited d. add hyperlinks to an message 96. The Vmyths Web site can help people identify. a. pyramid schemes c. Trojan horses b. hoaxes d. worms FIGURE
15 97. Figure 26-1 above shows an example of. a. encryption technology c. biometric security measures b. a firewall d. virus protection FIGURE
16 98. The interface shown in Figure 26-2 above would be used for. a. teleconferencing c. sharing the content of blogs b. instant messaging d. tagging Case 26-1 Gilbert uses Windows Mail as his program. He has been getting a lot of junk in his inbox and wants to take steps to help prevent the number of unsolicited messages that he receives. 99. The type of junk that Gilbert is receiving is called. a. fraud c. worm b. hoax d. spam 100. To display the Junk Options dialog box, Gilbert would click on the menu bar and then click Junk Options. a. File c. Internet b. Tools d. Filter Case 26-2 Wanda has just been hired to work for a Web design company. As part of her new employee training, her supervisor reviews the company s list of guidelines for the use of electronic communications Wanda s supervisor explains that she is expected to follow the rules of when communicating through electronic media. a. netiquette c. tagging b. phishing d. filtering 102. Wanda learns that when the correspondence requires a paper trail, the best communication method is. a. instant messaging c. cell phone b. teleconferencing d. Matching Identify the letter of the choice that best matches the phrase or definition. a. Communication channel b. Router c. Node d. Hub e. Modem 103. Small, simple, inexpensive device that joins multiple computers together 104. Connects two or more LANs to make a WAN 105. Enables a computer to transmit voice data over telephone lines 106. Can include telephone lines, fiber optics, satellites, microwaves or any combination of these 107. Each device on the network 16
17 Identify the letter of the choice that best matches the phrase or definition. a. Software b. Receiver c. Channel d. Communication e. Protocols 108. Media that transports the message 109. User agents 110. Computer getting the message 111. Rules for transferring data 112. Information that is transferred Identify the letter of the choice that best matches the phrase or definition. a. Phishing b. Pyramid scheme c. Hoax d. Urban legend e. Trojan horse messages which are personal information scams Stories which at one time could have been partially true A virus that does something different from what it is expected to do An attempt to deceive an audience into believing that something false is real An illicit business model where profits are based on the investor s ability to recruit other individuals. 17
18 G11_EoT_Solved Quizzes and Worksheets Answer Section TRUE/FALSE 1. ANS: T PTS: 1 REF: Mod ANS: T PTS: 1 REF: Mod ANS: F PTS: 1 REF: Mod ANS: F PTS: 1 REF: Mod ANS: F PTS: 1 REF: Mod ANS: F PTS: 1 REF: Mod ANS: T PTS: 1 REF: Mod ANS: T PTS: 1 REF: Mod ANS: F PTS: 1 REF: Mod ANS: T PTS: 1 REF: Mod ANS: T PTS: 1 REF: Mod ANS: T PTS: 1 REF: Mod ANS: F PTS: 1 REF: Mod ANS: F PTS: 1 REF: Mod ANS: T PTS: 1 REF: Mod ANS: F PTS: 1 REF: Mod ANS: T PTS: 1 REF: Mod ANS: T PTS: 1 REF: Mod ANS: F PTS: 1 REF: Mod ANS: F PTS: 1 REF: Mod ANS: T PTS: 1 REF: Mod ANS: F PTS: 1 REF: Mod ANS: T PTS: 1 REF: Mod ANS: F PTS: 1 REF: Mod ANS: F PTS: 1 REF: Mod ANS: F PTS: 1 REF: Mod ANS: F PTS: 1 REF: Mod ANS: T PTS: 1 REF: Mod ANS: T PTS: 1 REF: Mod ANS: T PTS: 1 REF: Mod3-67 MULTIPLE CHOICE 31. ANS: D PTS: 1 REF: Mod ANS: C PTS: 1 REF: Mod ANS: B PTS: 1 REF: Mod3-5 Mod ANS: B PTS: 1 REF: Mod ANS: C PTS: 1 REF: Mod ANS: B PTS: 1 REF: Mod
19 37. ANS: A PTS: 1 REF: Mod ANS: C PTS: 1 REF: Mod ANS: B PTS: 1 REF: Mod ANS: D PTS: 1 REF: Mod ANS: A PTS: 1 REF: Mod ANS: D PTS: 1 REF: Mod ANS: B PTS: 1 REF: Mod ANS: D PTS: 1 REF: Mod ANS: C PTS: 1 REF: Mod ANS: A PTS: 1 REF: Mod ANS: D PTS: 1 REF: Mod ANS: B PTS: 1 REF: Mod ANS: C PTS: 1 REF: Mod3-10 Mod ANS: A PTS: 1 REF: Mod ANS: C PTS: 1 REF: Mod3-14 TOP: Critical Thinking 52. ANS: D PTS: 1 REF: Mod3-14 TOP: Critical Thinking 53. ANS: A PTS: 1 REF: Mod3-15 TOP: Critical Thinking 54. ANS: A PTS: 1 REF: Mod3-17 TOP: Critical Thinking 55. ANS: D PTS: 1 REF: Mod ANS: C PTS: 1 REF: Mod ANS: B PTS: 1 REF: Mod ANS: B PTS: 1 REF: Mod ANS: C PTS: 1 REF: Mod ANS: A PTS: 1 REF: Mod ANS: C PTS: 1 REF: Mod ANS: B PTS: 1 REF: Mod ANS: C PTS: 1 REF: Mod ANS: A PTS: 1 REF: Mod ANS: D PTS: 1 REF: Mod ANS: C PTS: 1 REF: Mod ANS: C PTS: 1 REF: Mod ANS: D PTS: 1 REF: Mod ANS: B PTS: 1 REF: Mod ANS: B PTS: 1 REF: Mod ANS: B PTS: 1 REF: Mod ANS: A PTS: 1 REF: Mod ANS: B PTS: 1 REF: Mod ANS: D PTS: 1 REF: Mod ANS: B PTS: 1 REF: Mod3-22 TOP: Critical Thinking 76. ANS: A PTS: 1 REF: Mod3-22 TOP: Critical Thinking 77. ANS: C PTS: 1 REF: Mod3-26 TOP: Critical Thinking 78. ANS: C PTS: 1 REF: Mod3-27 TOP: Critical Thinking 79. ANS: C PTS: 1 REF: Mod ANS: D PTS: 1 REF: Mod ANS: B PTS: 1 REF: Mod
20 82. ANS: B PTS: 1 REF: Mod ANS: C PTS: 1 REF: Mod ANS: A PTS: 1 REF: Mod ANS: B PTS: 1 REF: Mod ANS: C PTS: 1 REF: Mod ANS: A PTS: 1 REF: Mod ANS: A PTS: 1 REF: Mod ANS: A PTS: 1 REF: Mod ANS: A PTS: 1 REF: Mod ANS: A PTS: 1 REF: Mod ANS: D PTS: 1 REF: Mod ANS: B PTS: 1 REF: Mod ANS: C PTS: 1 REF: Mod ANS: A PTS: 1 REF: Mod ANS: B PTS: 1 REF: Mod ANS: C PTS: 1 REF: Mod ANS: B PTS: 1 REF: Mod ANS: D PTS: 1 REF: Mod3-59 TOP: Critical Thinking 100. ANS: B PTS: 1 REF: Mod3-60 TOP: Critical Thinking 101. ANS: A PTS: 1 REF: Mod3-59 TOP: Critical Thinking 102. ANS: D PTS: 1 REF: Mod3-46 TOP: Critical Thinking MATCHING 103. ANS: D PTS: 1 REF: Mod ANS: B PTS: 1 REF: Mod ANS: E PTS: 1 REF: Mod ANS: A PTS: 1 REF: Mod ANS: C PTS: 1 REF: Mod ANS: C PTS: 1 REF: Mod ANS: A PTS: 1 REF: Mod ANS: B PTS: 1 REF: Mod ANS: D PTS: 1 REF: Mod ANS: E PTS: 1 REF: Mod ANS: A PTS: 1 REF: Mod ANS: D PTS: 1 REF: Mod ANS: E PTS: 1 REF: Mod ANS: C PTS: 1 REF: Mod ANS: B PTS: 1 REF: Mod
Lesson 24 Network Fundamentals
Network Fundamentals Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition 1 Objectives Describe a network. Explain the benefits of a network. Identify the risks of network computing. Describe
More informationCHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION
CHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION Multiple Choice: 1. A basic computer network can be described as: A. a minimum of five computers linked together. B. a number of palmtop computers. C. two
More informationMicrosoft Outlook 2010 Part 1: Introduction to Outlook
CALIFORNIA STATE UNIVERSITY, LOS ANGELES INFORMATION TECHNOLOGY SERVICES Microsoft Outlook 2010 Part 1: Introduction to Outlook Spring 2015, Version 1.4 Table of Contents Introduction...3 Starting Outlook...3
More informationMicrosoft Outlook 2010 Part 1: Introduction to Outlook
CALIFORNIA STATE UNIVERSITY, LOS ANGELES INFORMATION TECHNOLOGY SERVICES Microsoft Outlook 2010 Part 1: Introduction to Outlook Spring 2012, Version 1.0 Table of Contents Introduction...3 Starting the
More informationModusMail Software Instructions.
ModusMail Software Instructions. Table of Contents Basic Quarantine Report Information. 2 Starting A WebMail Session. 3 WebMail Interface. 4 WebMail Setting overview (See Settings Interface).. 5 Account
More informationLiving Online. Module C
Living Online Module C Unit 7: Getting Connected Living Online The Living Online examination covers aspects of working in an Internet or networked environment, including basic knowledge of networks and
More informationHow to Search the Internet
Technology In Action 1 Technology In Action Chapter 3 Using the Internet: Making the Most of the Web s Resources 2 Topics Internet basics Internet data Internet service providers Web browsers URLs Hyperlinks
More informationChapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 9 Communications and Networks McGraw-Hill/Irwin Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Competencies (Page 1 of 2) Discuss connectivity, the wireless revolution,
More informationMicrosoft Outlook 2013 Part 1: Introduction to Outlook
CALIFORNIA STATE UNIVERSITY, LOS ANGELES INFORMATION TECHNOLOGY SERVICES Microsoft Outlook 2013 Part 1: Introduction to Outlook Fall 2014, Version 1.0 Table of Contents Introduction...3 Starting Outlook...3
More informationConfiguring, Customizing, and Troubleshooting Outlook Express
3 Configuring, Customizing, and Troubleshooting Outlook Express............................................... Terms you ll need to understand: Outlook Express Newsgroups Address book Email Preview pane
More informationOutlook 2010 Essentials
Outlook 2010 Essentials Training Manual SD35 Langley Page 1 TABLE OF CONTENTS Module One: Opening and Logging in to Outlook...1 Opening Outlook... 1 Understanding the Interface... 2 Using Backstage View...
More informationInternet tools and techniques at this level will be defined as advanced because:
Unit Title: Using the Internet OCR unit number: 41 Level: 3 Credit value: 5 Guided learning hours: 40 Unit reference number: F/502/4298 Unit purpose and aim This is the ability to set up and use appropriate
More informationPC Security and Maintenance
PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-
More informationSecure Email Recipient Guide
Secure Email Recipient Guide Contents How to open your first Encrypted Message.... 3 Step-by-Step Guide to Opening Your First Envelope... 3 Step One:... 3 Step Two:... 4 Step Three:... 4 Step Four:...
More informationDiscovering Computers 2008. Chapter 9 Communications and Networks
Discovering Computers 2008 Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the the components required for for successful communications Identify various sending and receiving devices
More informationThe online email environment
The online email environment These are the options for the selected application. Navigation Pane is comprised of a folders list and oneclick access to your Inbox, Calendar, Contacts, and Tasks folders
More informationCore Essentials. Outlook 2010. Module 1. Diocese of St. Petersburg Office of Training Training@dosp.org
Core Essentials Outlook 2010 Module 1 Diocese of St. Petersburg Office of Training Training@dosp.org TABLE OF CONTENTS Topic One: Getting Started... 1 Workshop Objectives... 2 Topic Two: Opening and Closing
More informationEarly 1990s Steve Case and AOL
Chapter 4 Email Brief History of Email 1960s Messages sent without email addresses Late 1960s Tomlinson and @ symbol 1970s improvements to email 1980 s Compuserve and MCI Mail mail to the public Early
More informationMICROSOFT OUTLOOK 2010 READ, ORGANIZE, SEND AND RESPONSE E-MAILS
MICROSOFT OUTLOOK 2010 READ, ORGANIZE, SEND AND RESPONSE E-MAILS Last Edited: 2012-07-09 1 Read Emails... 4 Find the inbox... 4 Change new incoming e-mail notification options... 5 Read email... 6 Change
More informationAirtel PC Secure Trouble Shooting Guide
Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does
More informationOutlook XP Email Only
Outlook XP Email Only Table of Contents OUTLOOK XP EMAIL 5 HOW EMAIL WORKS: 5 POP AND SMTP: 5 TO SET UP THE POP AND SMTP ADDRESSES: 6 TO SET THE DELIVERY PROPERTY: 8 STARTING OUTLOOK: 10 THE OUTLOOK BAR:
More informationModule One: Getting Started... 6. Opening Outlook... 6. Setting Up Outlook for the First Time... 7. Understanding the Interface...
2 CONTENTS Module One: Getting Started... 6 Opening Outlook... 6 Setting Up Outlook for the First Time... 7 Understanding the Interface...12 Using Backstage View...14 Viewing Your Inbox...15 Closing Outlook...17
More informationSchool Mail System. - Access through Office 365 Exchange Online. User Guide FOR. Education Bureau (EDB)
School Mail System - Access through Office 365 Exchange Online User Guide FOR Education Bureau (EDB) Version: 1.0 May 2015 The Government of the Hong Kong Special Administrative Region The contents of
More informationThe Internet and Network Technologies
The Internet and Network Technologies Don Mason Associate Director Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer
More informationN-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if
More informationTechnical Glossary from Frontier
Technical Glossary from Frontier A Analogue Lines: Single Analogue lines are generally usually used for faxes, single phone lines, modems, alarm lines or PDQ machines and are generally not connected to
More informationWINDOWS LIVE MAIL FEATURES
WINDOWS LIVE MAIL Windows Live Mail brings a free, full-featured email program to Windows XP, Windows Vista and Windows 7 users. It combines in one package the best that both Outlook Express and Windows
More informationNetworks. Connecting Computers. Measures for connection speed. Ethernet. Collision detection. Ethernet protocol
Connecting Computers Networks Computers use networks to communicate like people use telephones or the postal service Requires either some sort of cable point-to-point links connect exactly 2 computers
More informationTraining Manual. Version 6
Training Manual TABLE OF CONTENTS A. E-MAIL... 4 A.1 INBOX... 8 A.1.1 Create New Message... 8 A.1.1.1 Add Attachments to an E-mail Message... 11 A.1.1.2 Insert Picture into an E-mail Message... 12 A.1.1.3
More informationMicrosoft Outlook 2010. Reference Guide for Lotus Notes Users
Microsoft Outlook 2010 Reference Guide for Lotus Notes Users ContentsWelcome to Office Outlook 2010... 2 Mail... 3 Viewing Messages... 4 Working with Messages... 7 Responding to Messages... 11 Organizing
More informationFor assistance with your computer, software or router we have supplied the following information: Tech Support 1-855-546-5000, press 1
For assistance with your computer, software or router we have supplied the following information: Tech Support 1-855-546-5000, press 1 Talk America Services Customer Service 1-855-546-5000, press 3 TALK
More informationOutlook Email. User Guide IS TRAINING CENTER. 833 Chestnut St, Suite 600. Philadelphia, PA 19107 215-503-7500
Outlook Email User Guide IS TRAINING CENTER 833 Chestnut St, Suite 600 Philadelphia, PA 19107 215-503-7500 This page intentionally left blank. TABLE OF CONTENTS Getting Started... 3 Opening Outlook...
More informationA Guide to Email. For Beginners
A Guide to Email For Beginners What is email? Email is a way of sending messages or letters to someone electronically using the internet. Messages usually arrive instantly in the recipient s mailbox. In
More informationAUSTIN COMMUNITY COLLEGE CONTINUING EDUCATION OUTLOOK INTRODUCTION. (9 hours) ITNW 3012 COURSE SYLLABUS
Course Description: An introduction to using the many features of this software package including the contact manager, electronic mail, calendar, tasks, journal, and note. Prerequisites: Fundamentals of
More informationUSER S MANUAL Cloud Email Firewall 4.3.2.4 1. Cloud Email & Web Security
USER S MANUAL Cloud Email Firewall 4.3.2.4 1 Contents 1. INTRODUCTION TO CLOUD EMAIL FIREWALL... 4 1.1. WHAT IS CLOUD EMAIL FIREWALL?... 4 1.1.1. What makes Cloud Email Firewall different?... 4 1.1.2.
More informationOutlook 2007 - Exchange
Information Technology MS Office Outlook 2007 Users Guide Outlook 2007 - Exchange Mail, Calendar, Contacts, Notes & Tasks Folders IT Training & Development 677-1700 training@csun.edu TABLE OF CONTENTS
More informationStep-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.
More informationICANWK406A Install, configure and test network security
ICANWK406A Install, configure and test network security Release: 1 ICANWK406A Install, configure and test network security Modification History Release Release 1 Comments This Unit first released with
More informationEmail Using MSN Hotmail
Email Using MSN Hotmail lab 14 Objectives: Upon successful completion of Lab 14, you will be able to View email messages received in the Inbox Send email messages using the To, Cc, and Bcc fields Reply
More informationHigh Speed Internet - User Guide. Welcome to. your world.
High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a
More informationECDL / ICDL Online Essentials Syllabus Version 1.0
ECDL / ICDL Online Essentials Syllabus Version 1.0 Purpose This document details the syllabus for ECDL / ICDL Online Essentials. The syllabus describes, through learning outcomes, the knowledge and skills
More informationWelcome. Thank you for choosing Cogeco High Speed Internet.
Welcome Welcome Thank you for choosing Cogeco High Speed Internet. Welcome to the endless range of possibilities available to you with your new High Speed Internet service. When it comes to speed, you
More informationComputer Networks and Internet working
Computer Networks and Internet working By completing this module you will be able to understand and learn the following: Computer Networking, Types of Networks and network Services Different Cables used
More informationHomeNet. Gateway User Guide
HomeNet Gateway User Guide Gateway User Guide Table of Contents HomeNet Gateway User Guide Gateway User Guide Table of Contents... 2 Introduction... 3 What is the HomeNet Gateway (Gateway)?... 3 How do
More informationUsing Webmail. Technical Manual: User Guide. Document Updated: 1/07. The Webmail Window. Displaying and Hiding the Full Header.
Using Webmail Technical Manual: User Guide The Webmail Window To save an attachment: 1. Click once on the attachment name. Or, if there are multiple attachments, click the Save icon to save all attachments
More informationChapter 1 Instructor Version
Name Date Objectives: Instructor Version Explain how multiple networks are used in everyday life. Explain the topologies and devices used in a small to medium-sized business network. Explain the basic
More informationjohnireland@eircom.net
Email Electronic mail is the transmission of mainly text based messages across networks. This can be within a particular network - internal mail - or between networks - external mail. The most common network
More informationMicrosoft Outlook Quick Reference Sheet
Microsoft Outlook is an incredibly powerful e-mail and personal information management application. Its features and capabilities are extensive. Refer to this handout whenever you require quick reminders
More informationEmailing from The E2 Shop System EMail address Server Name Server Port, Encryption Protocol, Encryption Type, SMTP User ID SMTP Password
Emailing from The E2 Shop System With recent releases of E2SS (at least 7.2.7.23), we will be allowing two protocols for EMail delivery. A new protocol for EMail delivery Simple Mail Transfer Protocol
More informationBasics of Microsoft Outlook/Email. Microsoft Outlook
Basics of Microsoft Outlook/Email Microsoft Outlook Workshop Outline for Improve Your Outlook Microsoft Outlook Contents Starting the application... 3 The Outlook 2010 window... 3 Expanding and minimizing
More informationOutlook Web Access (OWA) User Guide
Outlook Web Access (OWA) User Guide September 2010 TABLE OF CONTENTS TABLE OF CONTENTS... 2 1.0 INTRODUCTION... 4 1.1 OUTLOOK WEB ACCESS SECURITY CONSIDERATIONS... 4 2.0 GETTING STARTED... 5 2.1 LOGGING
More informationChapter 2 : The Internet and World Wide Web Internet : world wide collection of networks. Connecting to the internet - Dial-Up Access : use modem to
Chapter 2 : The Internet and World Wide Web Internet : world wide collection of networks. Connecting to the internet - Dial-Up Access : use modem to connect - DSL ( Digital Subscriber Line) : higher-speed
More informationCatholic Archdiocese of Atlanta Outlook 2003 Training
Catholic Archdiocese of Atlanta Outlook 2003 Training Information Technology Department of the Archdiocese of Atlanta Table of Contents BARRACUDA SPAM FILTER... 3 WHAT IS THE SPAM FILTER MS OUTLOOK PLUG-IN?...
More informationVerizon Remote Access User Guide
Version 17.12 Last Updated: August 2012 2012 Verizon. All Rights Reserved. The Verizon names and logos and all other names, logos, and slogans identifying Verizon s products and services are trademarks
More informationMicrosoft Office 365 Outlook Web App (OWA)
CALIFORNIA STATE UNIVERSITY, LOS ANGELES INFORMATION TECHNOLOGY SERVICES Microsoft Office 365 Outlook Web App (OWA) Spring 2013, Version 1.0 Table of Contents Introduction...3 Signing In...3 Navigation
More informationIC3 Internet and Computing Core Certification Guide
IC3 Internet and Computing Core Certification Guide Global Standard 4 Living Online Lesson 14: Digital Communication CCI Learning Solutions Inc. 1 Lesson Objectives different types of electronic communication
More information3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET
3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET The Business Value of Telecommunications and Networking Business value impacts of the telecommunications and Networking are: Declining transaction costs
More informationMicrosoft Outlook 2007 Introductory guide for staff
Platform: Windows PC Ref no: USER180 Date: 8 th January 2008 Version: 1 Authors: Julie Adams, Claire Napier Microsoft Outlook 2007 Introductory guide for staff This document provides an introduction to
More informationConnecting to LUA s webmail
Connecting to LUA s webmail Effective immediately, the Company has enhanced employee remote access to email (Outlook). By utilizing almost any browser you will have access to your Company e-mail as well
More informationInternet Basics. Basic Terms and Concepts. Connecting to the Internet
Internet Basics In this Learning Unit, we are going to explore the fascinating and ever-changing world of the Internet. The Internet is the largest computer network in the world, connecting more than a
More informationChapter 9A. Network Definition. The Uses of a Network. Network Basics
Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data
More informationBasic E- mail Skills. Google s Gmail. www.netliteracy.org
Email it s convenient, free and easy. Today, it is the most rapidly growing means of communication. This is a basic introduction to email and we use a conversational non- technical style to explain how
More informationComputer Networking. Definitions. Introduction
Computer Networking Definitions DHCP Dynamic Host Configuration Protocol It assigns IP addresses to client devices, such as desktop computers, laptops, and phones, when they are plugged into Ethernet or
More informationCyber Security Best Practices
Cyber Security Best Practices 1. Set strong passwords; Do not share them with anyone: They should contain at least three of the five following character classes: o Lower case letters o Upper case letters
More informationSecuring Your Wireless Network
Choosing A Wireless Router You might already have a wireless router provided to you by your Internet Service Provider. Otherwise, if you are intending to get one or decide to upgrade your old router, look
More informationWebmail Instruction Guide
Webmail Instruction Guide This document is setup to guide your through the use of the many features of our Webmail system. You may either visit www.safeaccess.com or webmail.safeaccess.com to login with
More information1.1.1. What makes Panda Cloud Email Protection different?... 4. 1.1.2. Is it secure?... 4. 1.2.1. How messages are classified... 5
Contents 1. INTRODUCTION TO PANDA CLOUD EMAIL PROTECTION... 4 1.1. WHAT IS PANDA CLOUD EMAIL PROTECTION?... 4 1.1.1. What makes Panda Cloud Email Protection different?... 4 1.1.2. Is it secure?... 4 1.2.
More informationContents. McAfee Internet Security 3
User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21
More informationOutlook Web Access (OWA) with Exchange Server 2007 (Windows version)
Outlook Web Access (OWA) with Exchange Server 2007 (Windows version) 1. Login into your Baylor email account via a web browser such as Internet Explorer, Fire Fox, or Netscape. The web URL is still http://mail.baylor.edu/
More informationOutlook 2010. Mail, Calendar, Contacts, Notes & Tasks. User Guide
User Guide Outlook 2010 Mail, Calendar, Contacts, Notes & Tasks IT Training (818) 677-1700 training@csun.edu www.csun.edu/it/training CSUN IT Training YouTube Channel http://www.youtube.com/user/csuninfotech
More informationCBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere.
Benefits & Features CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere. What can I do with Internet Banking? You can inquire
More informationIntegra Telecom 4690 Colorado St. SE Prior Lake, Mn 55372 952.226.7097 DSL INSTALLATION GUIDE
Integra Telecom 4690 Colorado St. SE Prior Lake, Mn 55372 952.226.7097 DSL INSTALLATION GUIDE www.getintegra.com Version 10/10 Integra Telecom, Inc. Thank you for choosing Integra Telecom s DSL High Speed
More informationMICROSOFT OUTLOOK 2010
MICROSOFT OUTLOOK 2010 George W. Rumsey Computer Resource Center 1525 East 53rd, Suite 906 Chicago, IL 60615 (773) 955-4455 www.computer-resource.com gwrumsey@att.net What Is Outlook?... 1 Folders... 2
More informationWhat is e-mail? (using Outlook Express)
What is e-mail? (using Outlook Express) 1. When you want to send a letter to a friend you write it, put it in an envelope, stamp it and put it in the post box. From there the postman picks it up, takes
More informationUser Guide for the VersaMail Application
User Guide for the VersaMail Application Copyright and Trademark 2004 palmone, Inc. All rights reserved. palmone, HotSync, the HotSync logo, Palm, Palm OS, the Palm logo, and VersaMail are among the trademarks
More informationOUTLOOK 2010 TIPS TABLE OF CONTENTS 1. SEND A BLIND CARBON COPY MARQUETTE UNIVERSITY IT SERVICES
OUTLOOK 2010 TIPS TABLE OF CONTENTS 1.Send a Blind Carbon Copy... 1 2. Change the view of the Outlook window... 2 3. Use Out of Office Assistant... 2 4. Create Rules... 4 5. Use Autocomplete... 5 6. Request
More informationChanges to Skillnet Group Emails. Outlook and Outlook Express Users
Changes to Skillnet Group Emails Skillnet Group emails are moving from the current provider to our own exchange mail server. This will mean that you will have a much improved web-mail system and almost
More informationIntroduction to the Internet
Athens-Clarke County Library Page 1 What is the Internet? Introduction to the Internet The Internet is basically a global network of computers. Computers are connected via wires, cables and satellite connections
More informationUsing Your New Webmail
Using Your New Webmail Table of Contents Composing a New Message... 2 Adding Attachments to a Message... 4 Inserting a Hyperlink... 6 Searching For Messages... 8 Downloading Email from a POP3 Account...
More informationMicrosoft Office 365 Outlook Web App (OWA)
CALIFORNIA STATE UNIVERSITY, LOS ANGELES INFORMATION TECHNOLOGY SERVICES Microsoft Office 365 Outlook Web App (OWA) Winter 2015, Version 2.0 Table of Contents Introduction...3 Logging In...3 Navigation
More information(606) 785-3450 Knott County (606) 439-3167 Perry County (606) 633-0778 Letcher County. support@tvscable.com
TVS CableNet Technical Support Guide Effective August 15, 2006 All materials 2006 TV Service, Inc. This material may not be reproduced in any form except for personal private use by TV Service Cable Internet
More informationWeb Mail Classic Web Mail
April 14 Web Mail Classic Web Mail Version 2.2 Table of Contents 1 Technical Requirements... 4 2 Accessing your Web Mail... 4 3 Web Mail Features... 5 3.1 Home... 5 3.1.1 Mailbox Summary... 5 3.1.2 Announcements...
More informationAbout the Junk E-mail Filter
1 of 5 16/04/2007 11:28 AM Help and How-to Home > Help and How-to About the Junk E-mail Filter Applies to: Microsoft Office Outlook 2003 Hide All The Junk E-mail Filter in Outlook is turned on by default,
More informationOutlook 2010 basics quick reference sheet
Outlook 2010 basics Microsoft Outlook 2010 is the world s leading personal information management and communications application. Outlook 2010 delivers complete e-mail, contact, calendar, and task functionality.
More informationSecuremail User Guide
Securemail User Guide Created: 2009-02-17 Updated: 2013-07-05 - New links and Address Book instructions Updated: 2014-04-23 - http://dhhs.ne.gov/documents/dhhs-securemail-userguide.pdf 1 INDEX: How Securemail
More informationOutlook Live Basics. for Students
Outlook Live Basics for Students 2 Outlook Live for Support Staff Outlook Live for Support Staff 3 Getting Started... 6 Signing into your Outlook Account... 6 Migrating your Account... 8 Address Book...
More informationInteractive welcome kit. 866.603.3199 Charter-Business.com CB.016.fibCD.0210
CHARTER BUSINESS FIBER INTERNET Interactive welcome kit 866.603.3199 Charter-Business.com CB.016.fibCD.0210 CHARTER BUSINESS FIBER INTERNET 2 Turn your contacts on to affordable, powerful solutions from
More informationLocal Area Networks (LANs) Blueprint (May 2012 Release)
Local Area Networks (LANs) The CCNT Local Area Networks (LANs) Course April 2012 release blueprint lists the following information. Courseware Availability Date identifies the availability date for the
More informationWhat browsers can I use to view my mail?
How to use webmail. This tutorial is our how-to guide for using Webmail. It does not cover every aspect of Webmail; What browsers can I use to view my mail? Webmail supports the following browsers: Microsoft
More informationEmail -- Reading and Printing Email
Email -- Reading and Printing Email Checking for New Email By default, webmail checks for new email automatically. If you want to manually check for new email, click the Check Email button. Or, click the
More informationLife after Microsoft Outlook Google Apps
Welcome Welcome to Gmail! Now that you ve switched from Microsoft Outlook to, here are some tips on beginning to use Gmail. Google Apps What s Different? Here are some of the differences you ll notice
More informationInstructions for setting up Junk E mail filters
Instructions for setting up Junk E mail filters Junk E mail filters must be set up using Microsoft Outlook. Users cannot use My.NWACC.Connection or the Web option to successfully configure their Junk E
More informationOutlook Web App. in Office 365. The Outlook Window. Signing In. (Outlook Exchange Faculty & Staff) Getting Started
Outlook Web App in Office 365 (Outlook Exchange Faculty & Staff) Getting Started The Outlook Window Navigation Bar Settings Navigation Pane View Pane Reading Pane Navigation Bar switch between Outlook,
More informationCOB 302 Management Information System (Lesson 8)
COB 302 Management Information System (Lesson 8) Dr. Stanley Wong Macau University of Science and Technology Chapter 13 Security and Ethical Challenges 安 全 與 倫 理 挑 戰 Remarks: Some of the contents in this
More informationF-Secure Internet Security 2012
F-Secure Internet Security 2012 F-Secure Internet Security 2012 TOC 3 Contents Chapter 1: Getting started...7 How to use automatic updates...8 Check the update status...8 Change the Internet connection
More informationEmail Security. 01-15-09 Fort Mac
Email Security 01-15-09 Fort Mac Most Common Mistakes in Email Security Email Security 1. Using just one email account. 2. Holding onto spammed-out accounts too long. 3. Not closing the browser after logging
More informationMicrosoft Outlook Web Access User Guide to Basic E-mail Features
Microsoft Outlook Web Access User Guide to Basic E-mail Features These notes provide the new user with the information necessary to use the basic E-Mail functions of Outlook s online Web Server. Information
More informationDO MORE FROM YOUR DESKTOP WITH OUTLOOK
DO MORE FROM YOUR DESKTOP WITH OUTLOOK 2003! DO MORE FROM YOUR DESKTOP WITH OUTLOOK 2003! Welcome to the Microsoft Messaging Quick Reference Guide. This guide shows how the new and improved features in
More informationWEB QUARANTINE USER GUIDE VERSION 4.3
WEB QUARANTINE USER GUIDE VERSION 4.3 WEB QUARANTINE USER GUIDE Version 4.3 The content of this manual is for informational use only and is subject to change without notice. Neither Norman nor anyone else
More informationThe LSUHSC N.O. Email Archive
The LSUHSC N.O. Email Archive Introduction The LSUHSC N.O. email archive permanently retains a copy of all email items sent and received by LSUHSC N.O. Academic email users. Email items will be accessible
More information