Written Exercise Unit 2 Assignment 5
Completion Exercises
Find the word or phrase that completes each of the following statements. All these questions refer to Internet, e-mail, and networking. 1. E-mail is short for ________________________ | 1. electronic mail | 2. How long does it take for an e-mail message to arrive in the recipients inbox? | 2. within seconds or minutes | 3. In order to use e-mail you must have an Internet connection, an e-mail program, and ________________________ | 3. e‑mail address | 4. Name two free e-mail services. | 4. yahoo and gmail | 5. The e-mail messages you have just received are in your __________ | 5. inbox | 6. Sequences of keyboard characters that symbolize facial expressions are called __________________________ | 6. emoticons | 7. Another name for junk e-mail is __________________ | 7. spam | 8. Using caution in giving out your e-mail address, checking a site’s privacy statement before giving your address and never replying to junk e-mail messages will _______________________ | 8. help prevent junk e‑mail | 9. Computer criminals who attack other people’s computers are called ________________________ | 9. hackers | 10. A small program that can help prevent hackers and malicious software from gaining access to your computer is called a(n) _________________ | 10. Firewall | 11. A small program that can help protect your computer viruses, worms, and other security threats is called ______________ | 11. Virus protection | 12. _____________________ can help protect your computer from spyware and other potentially unwanted software. | 12. Spyware |
13. ______________________ is a program that can routinely check for new features of Windows and install them. | 13. Windows Update | 14. Trojan Horse is the name of a computer _________________ | 14. program | 15. AntiVirus program updates are essential because _______________ | 15. it adds new viruses to its list of viruses to check for. | 16. ___________________ is the built-in antispyware program that comes with Windows 7 | 16. Windows Defender | 17. Windows updates are installed __________________ | 17. automatically | 18. To prevent trouble online use the latest version of your browser and ____________________________ | 18. keeping your browser up to date | 19. A _____________________ can help protect from online phishing attacks. | 19. SmartScreen Filter | 20. A(n) __________________ is a small program that is used in conjunction with your browser. | 20. Add-ons | 21. ______________________ is a small program which can help prevent attacks from phishing and fraudulent websites that might try to get personal and financial information. | 21. Cross site scripting | 22. When you transfer a file from the Internet to your computer, it is called __________________ | 22. download |
Short Answer questions:
1. Name four ways you can use e-mail.
- Send and receive messages
- Send and receive files
- Send messages to groups of people
- Forward messages
2. Name the five rules of e-mail etiquette.
- Be careful with humor and emotion
- Think before you send
- Use a clear and concise subject line
- Keep messages short
- Avoid using ALL CAPITAL LETTERS
3. Name four tips for safely using e-mail.
- Use caution in giving out your e‑mail address. Avoid publishing your real e‑mail address in newsgroups, on websites, or in other public areas of the Internet.
- Before you give your e‑mail address to a website, check the site's privacy statement to be sure it doesn't permit the disclosure of your e‑mail address to other companies.
- Never reply to a junk e‑mail message. The sender will know that your e‑mail address is valid and might sell it to other companies. You're then likely to receive even more junk e‑mail.
- Use a firewall and Install anti-virus software and use it regularly.