Module7  Information & Communication
INDEX <ul><li>Concepts & Terms  </li></ul><ul><li>Internet Explorer </li></ul><ul><li>E-Mail & Outlook Express </li></ul>
SECTION ONE Concepts & Terms
The World Wide Web is: <ul><li>a huge collection of linked files held on computers all over the world. </li></ul><ul><li>a...
<ul><li>Name of file </li></ul><ul><li>Protocol used </li></ul><ul><li>Domain used </li></ul><ul><li>Commercial domain </l...
<ul><li>The set of rules used for transferring files on the World Wide Web. </li></ul><ul><li>The unique address for a web...
Which one of these statements is false? <ul><li>The content of web pages that you view while using a browser is lost from ...
An internet tool that enables you to quickly find information on the web is called: <ul><li>a uniform Resource Locator </l...
A search engine is a program <ul><li>that helps you to find information located on the internet. </li></ul><ul><li>that ca...
A cache helps web pages you have visited recently to load more quickly, A cache enables a web site to recall details of yo...
Which one of these statements about digital signatures true? A digital signature: <ul><li>Automatically encrypts the conte...
Drag the following statements about  digital certificates  to the appropriate boxes. <ul><li>True </li></ul><ul><li>False ...
Which one of the following statements about online credit card transactions is true? <ul><li>E-mail is the quickest and mo...
The main purpose of a firewall is to: <ul><li>Prevent unauthorized users from gaining access to a network. </li></ul><ul><...
Which two of the following statements about Protected website are true? <ul><li>You are assigned a username. </li></ul><ul...
Which one of the following statements about online credit card transactions is true? <ul><li>This global symbol  means a s...
Which one of these statements is true? <ul><li>It is not possible to encrypt content of e-mail messages. </li></ul><ul><li...
Which two of these statements about encryption are true? <ul><li>An encryption key used to compress documents that you wis...
SECTION TWO Internet Explorer
Use the web address  http://www.macromedia.com  to navigate to the Macromedia website. Press  Enter  when you have finishe...
Make this page  http://www.fruit.com  your browser’s new Home Page. Don’t change any other settings.
 
Open this web page in a new window.
This web page is not displaying properly.  Stop  this web page from downloading.
This web page has not loaded properly. Reload the web page to your browser.
Refresh this web page.
Use  Internet Explorer Help  to access information about  History   lists . Click here then type  History lists History li...
Hide the  Standard Buttons  toolbar of this web browser.
Change the settings of this web browser so that the images will NOT be displayed. Don’t change any other settings.
Use the browser address bar to display previously visited URLs and access the site that you visited before this one.
Clear this browser’s entire History list. Don’t use the History Bar to carry out this task
A web search has been carried out producing the results displayed on screen. Use these results to navigate to  Kennel Club...
You just navigate to this web page using a hyperlink. Return to the  previous page.
Use this site to reserve a  single room  at  Park’s Inn . Follow the instructions that are provided on the web page. Click...
Use this site to reserve a  single ticket  for the  concert in the park . Follow the instructions that are provided on the...
Without changing its name, add this web page to your  favorites .
The MSN web site is one of your listed  favorites .  Use this fact to navigate to  MSN  site.
Create a new folder for sorting some of your favorites.  Call this folder  Cooking . Type Cooking
Add this web page to the  Media  folder in your favorites.
Delete  Club Internet  from your favorites menu.
Navigate to the  www.AltaVista.com  Search engine. http://www.AltaVista.com Click then type http://www.AltaVista.com Click...
“ movies reviews” OR Cinemas “ movies reviews”  ـــ   Cinemas “ movies reviews” ? Cinemas “ movies reviews” @ Cinemas “ mo...
-
Modify the search requirements to include  any  of the words listed in the search criteria  Click  go!  To submit your ans...
Modify the search requirements to include an exact  phrase  match of the   words listed  in the search criteria.  Click  g...
Modify the search requirements to include a  look-it-up categories only  for the   words  listed  in the search criteria. ...
Copy  the selected text from this web page to the clipboard.
Save this web page as a text file onto the A: drive of this computer. Note:  this is a simulation – you don’t need a flopp...
Save a copy of the photograph onto the  Desktop  of this computer. Right click on the  photograph
Download the  Virtual Tour  movie file to the  My Document  folder.
Click the option that would download the selected file with the least risk of virus Infection?
Click the option that would enable you to run a virus check on a file before opening it on your PC.
Preview this web page for printing.
Print  one  copy of this web page using the current settings.
Print  three  copies of this web page using the current settings.
Change settings for this web page so that it will print an  8mm top margin .
SECTION THREE E-Mail & Outlook Express
<ul><li>At </li></ul><ul><li>Company department </li></ul><ul><li>User name </li></ul><ul><li>Country domain </li></ul><ul...
At Domain extension User name Domain name @ James microelecticnet Co.uk.
Which one of these Messages conforms to the basic rules of netiquette?
<ul><li>Clue: </li></ul><ul><li>Unsolicited e-mail is often referred to as: </li></ul><ul><li>(1 word, 4 letters) </li></u...
Which two of these statements about e-mail are true? <ul><li>You must send and receive e-mail on separate telephone lines....
Which one of these statements about e-mail is true ? <ul><li>You must send and receive e-mail on separate telephone line. ...
Which one of those statements about e-mail is true? <ul><li>You can only access one e-mail account at any time. </li></ul>...
Which two of these statements about web-based e-mail are true? <ul><li>Web-based e-mail is only available from Microsoft. ...
Which two of the following statements, about organizing your  e-mail within most popular e-mail applications, are true? <u...
Which two of these statements regarding the risk of transmitting viruses via e-mail are true? <ul><li>Viruses can only be ...
Which two of these statements on the risk of transmitting viruses via e-mail are true? <ul><li>You are less at risk from v...
Open the e-mail message from  Selina Kyle . Double click on Kyle, Selina
Display the message from  Selina Kyle  in the Preview pane Just ! Click on the message
Make the other open e-mail,  Schedule changes , the active e-mail. Click here
Close the e-mail message that is currently open.
Use  Outlook Express Help  to access information on  unread messages . unread messages Click here then type  unread messag...
Remove the  Flag  heading from the Inbox.
Change the column headers so that the  Priority  column is no longer displayed
Remove the  Toolbar  from Outlook Express application window.
Flag the message from  Rob Wilson . Select the message
Remove the flag from  James Corrigan’s  message. Select the message
Mark the message from  Rob Wilson  as Unread. Select the message
Without opening this attachment, save it onto the  Desktop  of this computer Right click on the attachment
Reply to  Rob Wilson’s  e-mail with the message  Yes, it will . This should be sent only to Rob Wilson.  Do not open the m...
Reply to everyone that received Sean White’s e-mail with the message  Can you call me about this?  Do not open the message...
Change the application settings so that when you reply to messages, the original message does not display.
Create a new e-mail message. Do not use any stationery templates for this question. Click here
Open the New Message window to create a new message.  Click here
Make  [email_address]  the mail recipient of this e-mail message. Click the  SUBMIT  button when you have finished. [email...
Send a carbon copy of this message to  [email_address] Send  the message immediately when you have finished. [email_addres...
Enter the phrase  Company meeting  into the appropriate field to indicate what the message is about Send the message when ...
Change the subject of this message to  Meeting . Send  the message immediately when you have finished. Meeting Delete usin...
Attach the file  Accounts.xls  to this message. This file is in the  My Documents  folder. [email_address]
Change the priority for this message to  High .
Forward the e-mail message from Rob Wilson to  [email_address] . Do not open the message. Send  the message immediately wh...
Copy the selected text and paste it below the line  The details are as follows:
Paste  the contents of the clipboard into the  subject  area of the window. Right Click
Delete  the file entitled  Agenda.doc  from this e-mail message. Right Click on the attached file
Delete  the file attachment from this message. Right Click on the attached file
Create a new group called  Research Team  that contains addresses for  Rob Wilson  and  Sean White . Research Team  Resear...
Add  Eric Lambert  to the Sales group in this address BOOK
Use the application’s built-in features to automatically add the  sender  of this message to your  Address Book . Right cl...
There is group in the Address Book for this e-mail account. Make the group the recipient of this message.
Messages under the Subject heading  Planning  are located in various mail folder in Outlook Express. Use the  Find  tool t...
Messages from  Rob stone  are located in various mail folder in Outlook Express. Use the  Find  tool to display a complete...
Create a new folder in your  Inbox  and name this folder  Personal . Personal Click then type Personal
Move the e-mail message from  James Corrigan  to the  Drafts  folder. Right click on the message
Sort the Inbox messages by sender.
Delete  the e-mail message from  Selina Kyle . Select the message
Move the deleted mail from  Claudia Walker  back to the Inbox. Right click on the message
Empty the Deleted Items folder. Do not use the Delete key for this exercise. Right Click on the Deleted Items
Print  two  copies of this entire message.
` Print just  the  selected text  of this e-mail message.
Use the application  spell check  tool to correct the spelling mistake  tomorrw  in this e-mail message.
I can meet with you after lunch.
 
 
I can meet with you after lunch.
Upcoming SlideShare
Loading in …5
×

امتحان النت

1,781 views

Published on

  • Be the first to comment

  • Be the first to like this

امتحان النت

  1. 1. Module7 Information & Communication
  2. 2. INDEX <ul><li>Concepts & Terms </li></ul><ul><li>Internet Explorer </li></ul><ul><li>E-Mail & Outlook Express </li></ul>
  3. 3. SECTION ONE Concepts & Terms
  4. 4. The World Wide Web is: <ul><li>a huge collection of linked files held on computers all over the world. </li></ul><ul><li>a world wide network of telephone cables and related equipment. </li></ul><ul><li>a network of computers and cables that connect e-mail users all around the world. </li></ul><ul><li>a global network of communication satellites. </li></ul>
  5. 5. <ul><li>Name of file </li></ul><ul><li>Protocol used </li></ul><ul><li>Domain used </li></ul><ul><li>Commercial domain </li></ul><ul><li>Indicates World Wide Web </li></ul>http:// WWW. flexitrain .com /Orders.htm
  6. 6. <ul><li>The set of rules used for transferring files on the World Wide Web. </li></ul><ul><li>The unique address for a web page </li></ul><ul><li>A clickable item in a web page that connects to another web page. </li></ul><ul><li>A company that enables individuals to connect their PCs to the internet. </li></ul><ul><li>A set of rules frequently used to transfer web pages to a host server on the Internet. </li></ul>URL ISP Hyperlink FTP HTTP
  7. 7. Which one of these statements is false? <ul><li>The content of web pages that you view while using a browser is lost from memory after the computer is shut down. </li></ul><ul><li>Web browsers are software applications that are used to visit web pages in various. </li></ul><ul><li>Browsers contain hypertext links to different documents and sites on the web. </li></ul><ul><li>A web browser is a site where you can search for information on the web. </li></ul>
  8. 8. An internet tool that enables you to quickly find information on the web is called: <ul><li>a uniform Resource Locator </li></ul><ul><li>a Search Engine </li></ul><ul><li>a Find Wizard </li></ul><ul><li>Online Help </li></ul>
  9. 9. A search engine is a program <ul><li>that helps you to find information located on the internet. </li></ul><ul><li>that can be used to find errors in the HTML code for a web page. </li></ul><ul><li>that is used to find the web sites you have most recently visited. </li></ul><ul><li>on the internet that locates all users logged onto a web site. </li></ul>
  10. 10. A cache helps web pages you have visited recently to load more quickly, A cache enables a web site to recall details of your previous visit. Your browser uses a cookie to store the files you download from the internet. A cookie is a small file sent to your computer when you visit a website. Cookie & Cache If a cookie gets too full, older files are deleted to make space for new once.
  11. 11. Which one of these statements about digital signatures true? A digital signature: <ul><li>Automatically encrypts the contents of an e-mail. </li></ul><ul><li>Is a scanned image of your real signature. </li></ul><ul><li>Is used to verify the identity of the sender of a message. </li></ul><ul><li>Is used to add a personal touch to e-mail messages. </li></ul>
  12. 12. Drag the following statements about digital certificates to the appropriate boxes. <ul><li>True </li></ul><ul><li>False </li></ul>Enable you to register downloaded software. Can be used to provide a digital signature. Enable you to print a guarantee for goods purchased online. Are commonly used to make web sites more secure .
  13. 13. Which one of the following statements about online credit card transactions is true? <ul><li>E-mail is the quickest and most secure way of sending credit card details. </li></ul><ul><li>A web page displaying this symbol is locked: you can’t enter credit card details </li></ul><ul><li>You should only enter credit card details into a form secured by a digital certificate. </li></ul><ul><li>Using your credit card on the internet is safer than a face-to-face transaction. </li></ul>
  14. 14. The main purpose of a firewall is to: <ul><li>Prevent unauthorized users from gaining access to a network. </li></ul><ul><li>Protect network servers from the risk of fire. </li></ul><ul><li>Prevent employees from accessing the internet during work hours. </li></ul><ul><li>Prevent network users from sending and receiving personal e-mail. </li></ul>
  15. 15. Which two of the following statements about Protected website are true? <ul><li>You are assigned a username. </li></ul><ul><li>When you enter your username, asterisks (*) appear in place of the letters. </li></ul><ul><li>Once you have a login and Password you can access all areas of a protected website. </li></ul><ul><li>You can only view pages of a protected website if you are registered user. </li></ul><ul><li>A Protected web site is one that is free from viruses. </li></ul>
  16. 16. Which one of the following statements about online credit card transactions is true? <ul><li>This global symbol means a site is secure for entering credit card details. </li></ul><ul><li>You should enter credit card details onto a form on a secure web site. </li></ul><ul><li>Your credit card statement may not include extra costs such as shipping. </li></ul><ul><li>E-mail is the most secure way to send credit card details to a web site. </li></ul>
  17. 17. Which one of these statements is true? <ul><li>It is not possible to encrypt content of e-mail messages. </li></ul><ul><li>Encryption prevents unauthorised users from reading data. </li></ul><ul><li>You can’t send encrypted data out over the internet. </li></ul><ul><li>Encryption converts data so that it can be understood. </li></ul>
  18. 18. Which two of these statements about encryption are true? <ul><li>An encryption key used to compress documents that you wish to store safely. </li></ul><ul><li>Encryption prevents unauthorized users from reading your data. </li></ul><ul><li>Encryption converts data so that it cannot be understood. </li></ul><ul><li>You can’t encrypt your e-mail messages. </li></ul><ul><li>Encryption can only be used to encrypt text files. </li></ul>
  19. 19. SECTION TWO Internet Explorer
  20. 20. Use the web address http://www.macromedia.com to navigate to the Macromedia website. Press Enter when you have finished. http://www.macromedia.com Click then type http://www.macromedia.com Press Enter
  21. 21. Make this page http://www.fruit.com your browser’s new Home Page. Don’t change any other settings.
  22. 23. Open this web page in a new window.
  23. 24. This web page is not displaying properly. Stop this web page from downloading.
  24. 25. This web page has not loaded properly. Reload the web page to your browser.
  25. 26. Refresh this web page.
  26. 27. Use Internet Explorer Help to access information about History lists . Click here then type History lists History lists
  27. 28. Hide the Standard Buttons toolbar of this web browser.
  28. 29. Change the settings of this web browser so that the images will NOT be displayed. Don’t change any other settings.
  29. 30. Use the browser address bar to display previously visited URLs and access the site that you visited before this one.
  30. 31. Clear this browser’s entire History list. Don’t use the History Bar to carry out this task
  31. 32. A web search has been carried out producing the results displayed on screen. Use these results to navigate to Kennel Clubs web site Click on Kennel Clubs
  32. 33. You just navigate to this web page using a hyperlink. Return to the previous page.
  33. 34. Use this site to reserve a single room at Park’s Inn . Follow the instructions that are provided on the web page. Click on an option to make a reserve Rooms / Accommodation Events and venues Select: a hotel from the dropdown box. and a room from this dropdown box. Now press ‘book now’ button to reserve your room book now! Tomas hotel Park’s Inn Venus Single room Double room
  34. 35. Use this site to reserve a single ticket for the concert in the park . Follow the instructions that are provided on the web page. Click here Click here Click here Click here Click here
  35. 36. Without changing its name, add this web page to your favorites .
  36. 37.
  37. 38. The MSN web site is one of your listed favorites . Use this fact to navigate to MSN site.
  38. 39. Create a new folder for sorting some of your favorites. Call this folder Cooking . Type Cooking
  39. 40. Add this web page to the Media folder in your favorites.
  40. 41. Delete Club Internet from your favorites menu.
  41. 42.
  42. 43. Navigate to the www.AltaVista.com Search engine. http://www.AltaVista.com Click then type http://www.AltaVista.com Click Go
  43. 44. “ movies reviews” OR Cinemas “ movies reviews” ـــ Cinemas “ movies reviews” ? Cinemas “ movies reviews” @ Cinemas “ movies reviews” + Cinemas Using click and drag facility to move the text into the look for box that would return a list of movie reviews that include cinemas
  44. 45. -
  45. 46. Modify the search requirements to include any of the words listed in the search criteria Click go! To submit your answer. Do not change any other setting.
  46. 47. Modify the search requirements to include an exact phrase match of the words listed in the search criteria. Click go! To submit your answer. Do not change any other setting.
  47. 48. Modify the search requirements to include a look-it-up categories only for the words listed in the search criteria. Click go! To submit your answer. Do not change any other setting.
  48. 49. Copy the selected text from this web page to the clipboard.
  49. 50. Save this web page as a text file onto the A: drive of this computer. Note: this is a simulation – you don’t need a floppy disk in the disk drive.
  50. 51. Save a copy of the photograph onto the Desktop of this computer. Right click on the photograph
  51. 52. Download the Virtual Tour movie file to the My Document folder.
  52. 53. Click the option that would download the selected file with the least risk of virus Infection?
  53. 54. Click the option that would enable you to run a virus check on a file before opening it on your PC.
  54. 55. Preview this web page for printing.
  55. 56. Print one copy of this web page using the current settings.
  56. 57. Print three copies of this web page using the current settings.
  57. 58. Change settings for this web page so that it will print an 8mm top margin .
  58. 59. SECTION THREE E-Mail & Outlook Express
  59. 60. <ul><li>At </li></ul><ul><li>Company department </li></ul><ul><li>User name </li></ul><ul><li>Country domain </li></ul><ul><li>Domain name </li></ul>bsmith @ Accounts. Encel. uk
  60. 61. At Domain extension User name Domain name @ James microelecticnet Co.uk.
  61. 62. Which one of these Messages conforms to the basic rules of netiquette?
  62. 63. <ul><li>Clue: </li></ul><ul><li>Unsolicited e-mail is often referred to as: </li></ul><ul><li>(1 word, 4 letters) </li></ul>P A M
  63. 64. Which two of these statements about e-mail are true? <ul><li>You must send and receive e-mail on separate telephone lines. </li></ul><ul><li>E-mail stands for Electronic Mail. </li></ul><ul><li>The cost of sending e-mail depends on where the recipient lives. </li></ul><ul><li>You can only send or receive e-mail offline. </li></ul><ul><li>The distance over which e-mail is sent does not significantly affect the speed of delivery. </li></ul>
  64. 65. Which one of these statements about e-mail is true ? <ul><li>You must send and receive e-mail on separate telephone line. </li></ul><ul><li>The cost of sending e-mail depends on where the recipient lives. </li></ul><ul><li>You can only send or receive e-mail offline. </li></ul><ul><li>Sending message by e-mail is easier than Postal Mail </li></ul>
  65. 66. Which one of those statements about e-mail is true? <ul><li>You can only access one e-mail account at any time. </li></ul><ul><li>Each user can only access their e-mail account from a signal PC. </li></ul><ul><li>You need a user name and password to access your e-mail. </li></ul><ul><li>Email accounts on a single PC share the same folders. </li></ul>
  66. 67. Which two of these statements about web-based e-mail are true? <ul><li>Web-based e-mail is only available from Microsoft. </li></ul><ul><li>Web-based e-mail can only be accessed from the PC you set it up on. </li></ul><ul><li>Computers in internet cafés can be used to access web-based e-mail. </li></ul><ul><li>You can often access web-based e-mail from computers in libraries. </li></ul><ul><li>With web-based e-mail you can only send and receive text messages. </li></ul>
  67. 68. Which two of the following statements, about organizing your e-mail within most popular e-mail applications, are true? <ul><li>You need to create folders before you can send or receive e-mail. </li></ul><ul><li>You must read e-mail before you can organize it into folders. </li></ul><ul><li>You can use cut-and-paste to move mail to different folders. </li></ul><ul><li>You must open an e-mail before you can duplicate it. </li></ul><ul><li>E-mail messages can be sorted alphabetically inside a folder </li></ul>
  68. 69. Which two of these statements regarding the risk of transmitting viruses via e-mail are true? <ul><li>Viruses can only be transmitted via an e-mail attachment. </li></ul><ul><li>A virus can spread via e-mail by mailing itself to everyone in a victim’s address book. </li></ul><ul><li>Viruses are only spread via unsolicited mail. </li></ul><ul><li>You should not open e-mail if it has a suspicious subject line. </li></ul><ul><li>You are more at risk from viruses if you use web based e-mail. </li></ul>
  69. 70. Which two of these statements on the risk of transmitting viruses via e-mail are true? <ul><li>You are less at risk from viruses if you use web based e-mail. </li></ul><ul><li>You can safely open an attachment sent to you by a friend. </li></ul><ul><li>You can set anti-virus software to automatically scan new content arriving on your PC. </li></ul><ul><li>If you open an attachment with a virus, it can mail itself to everyone in your. </li></ul><ul><li>Viruses are only spread via unsolicited mail. </li></ul>
  70. 71. Open the e-mail message from Selina Kyle . Double click on Kyle, Selina
  71. 72. Display the message from Selina Kyle in the Preview pane Just ! Click on the message
  72. 73. Make the other open e-mail, Schedule changes , the active e-mail. Click here
  73. 74. Close the e-mail message that is currently open.
  74. 75. Use Outlook Express Help to access information on unread messages . unread messages Click here then type unread messages Click here Click here
  75. 76. Remove the Flag heading from the Inbox.
  76. 77. Change the column headers so that the Priority column is no longer displayed
  77. 78. Remove the Toolbar from Outlook Express application window.
  78. 79. Flag the message from Rob Wilson . Select the message
  79. 80. Remove the flag from James Corrigan’s message. Select the message
  80. 81. Mark the message from Rob Wilson as Unread. Select the message
  81. 82. Without opening this attachment, save it onto the Desktop of this computer Right click on the attachment
  82. 83. Reply to Rob Wilson’s e-mail with the message Yes, it will . This should be sent only to Rob Wilson. Do not open the message. Send the message immediately when you have finished. Select the message Click here then type Yes, it will Yes, it will
  83. 84. Reply to everyone that received Sean White’s e-mail with the message Can you call me about this? Do not open the message. Send the message immediately when you have finished. Select the message Click here then type Can you call me about this? Can you call me about this?
  84. 85. Change the application settings so that when you reply to messages, the original message does not display.
  85. 86. Create a new e-mail message. Do not use any stationery templates for this question. Click here
  86. 87. Open the New Message window to create a new message. Click here
  87. 88. Make [email_address] the mail recipient of this e-mail message. Click the SUBMIT button when you have finished. [email_address] SUBMIT
  88. 89. Send a carbon copy of this message to [email_address] Send the message immediately when you have finished. [email_address] [email_address]
  89. 90. Enter the phrase Company meeting into the appropriate field to indicate what the message is about Send the message when you have finished. [email_address] Company meeting
  90. 91. Change the subject of this message to Meeting . Send the message immediately when you have finished. Meeting Delete using Backspace Type Meeting
  91. 92. Attach the file Accounts.xls to this message. This file is in the My Documents folder. [email_address]
  92. 93. Change the priority for this message to High .
  93. 94. Forward the e-mail message from Rob Wilson to [email_address] . Do not open the message. Send the message immediately when you have finished. Select the message [email_address]
  94. 95. Copy the selected text and paste it below the line The details are as follows:
  95. 96. Paste the contents of the clipboard into the subject area of the window. Right Click
  96. 97. Delete the file entitled Agenda.doc from this e-mail message. Right Click on the attached file
  97. 98. Delete the file attachment from this message. Right Click on the attached file
  98. 99. Create a new group called Research Team that contains addresses for Rob Wilson and Sean White . Research Team Research Team
  99. 100. Add Eric Lambert to the Sales group in this address BOOK
  100. 101. Use the application’s built-in features to automatically add the sender of this message to your Address Book . Right click here
  101. 102. There is group in the Address Book for this e-mail account. Make the group the recipient of this message.
  102. 103. Messages under the Subject heading Planning are located in various mail folder in Outlook Express. Use the Find tool to display a complete listing of them. Planning
  103. 104. Messages from Rob stone are located in various mail folder in Outlook Express. Use the Find tool to display a complete listing of them. Rob stone
  104. 105. Create a new folder in your Inbox and name this folder Personal . Personal Click then type Personal
  105. 106. Move the e-mail message from James Corrigan to the Drafts folder. Right click on the message
  106. 107. Sort the Inbox messages by sender.
  107. 108. Delete the e-mail message from Selina Kyle . Select the message
  108. 109. Move the deleted mail from Claudia Walker back to the Inbox. Right click on the message
  109. 110. Empty the Deleted Items folder. Do not use the Delete key for this exercise. Right Click on the Deleted Items
  110. 111. Print two copies of this entire message.
  111. 112. ` Print just the selected text of this e-mail message.
  112. 113. Use the application spell check tool to correct the spelling mistake tomorrw in this e-mail message.
  113. 114. I can meet with you after lunch.
  114. 117. I can meet with you after lunch.

×