Should we upgrade mcts certificate Online Computer Training here
Tell her that she needs to right-click the Sidebar and select Bring Gadgets to Front. D. Tell her that she can only have a total of seven gadgets on the Sidebar.
You are configuring Windows Mail to be used with several e-mail accounts. When setting up the mcitp exams accounts, you find that only certain protocols are allowed for inbound mail. Which pro- tocols can be used to receive inbound mail using Windows Mail? A. HTTP B. IMAP C. POP3 D. SMTP.
You are the administrator for a healthcare company. Patient confidentiality is a huge concern, so you have been asked to implement the highest level of encryption available. All of the users in your company use Windows Vista with Windows Mail. What encryption algorithm should you use? A. AES B. DES C. RC2
Your home computer network is protected by a firewall. You have configured your Windows Vista home computer to use Windows Mail. After you configure your e-mail accounts, you dis- cover that incoming mail is not being allowed. Your e-mail provider uses POP3 and SMTP. What port should you open on the firewall?
One of your users has created multiple message rules. He tells you that messages from barry@BrainBeacon.com should be delivered to his Barry subfolder, but they are going to the BrainBeacon folder instead. What should he do to fix his problem? A. He should increase the rule’s priority by moving it up the list. B. He should delete the rule and re-create it. C. He should fix the rule so that it delivers Barry’s messages to the Barry folder instead of the BrainBeacon folder. D. He should add another rule to move Barry’s messages from the BrainBeacon folder back to the Barry folder.
You have a Windows Vista computer, and you use Windows Mail for e-mail. Your computer has become mcitp course outdated, and you have to export your e-mail messages and contacts. When you attempt to export your messages, what formats can you use? A. Microsoft Exchange B. Microsoft Outlook Express 6 C. Microsoft Windows Mail D. Comma Separated Values
Your company uses Windows Mail for its messaging solution. You have been getting multiple e-mail advertisements from a company, so you add their domain to the Blocked Senders list. However, you still want to receive messages from an employee named Karen who works at that company, so you add her e-mail address to the Safe Senders list. What will happen when Karen sends you an e-mail?
A. Her message will be delivered to the Junk E-mail folder. B. Her message will be delivered to the Deleted Items folder. C. Her message will be delivered to your Inbox. D. Her message will be permanently deleted.