1.
Mark works as a Support Analyst for Soft Well Inc. He uses Microsoft Outlook 2010 for messaging and emailing. MS Outlook has been configured to use an IMAP account. Whenever Mark sends an e-mail, the recipients see only a part of the full name, i.e. "Mark". He wants to ensure that th e recipients of e-mails see his full name, i.e., "Mark Smith" in the Information Bar of the e -mail. Which of the following actions will he take to accomplish the task?
2.
You use Microsoft Outlook 2010 for messaging and e-mailing. MS Outlook has been configured to use an Exchange account. You receive various e-mail messages, some of the e-mails messages contain attachments. You want to ensure that Outlook provides a comprehensive view of each email that has an attachment, irrespective of the folder in which it is located. Which of the following actions will you take to accomplish the task?
3.
David works as a Support Analyst for White Well Inc. He uses Microsoft Outlook 2010's business card to save contacts information. MS Outlook has been configured to use an Exchange account. He includes two business cards in an e-mail message to send the contact information about the suppliers to Mr. Thompson and Mr. Jackson. By using the business cards, David will visually communicate the corporate and personal identity of the suppliers. He sends the e -mail message. However, the recipient of the e-mails receives the cards that are only images and are non-clickable. They also receive an attached .vcf file that contains the information about the contact. Which of the following is a cause of the issue?
4.
David works as a Support Analyst for White Well Inc. He uses Microsoft Outlook for messaging and e- mailing. MS Outlook has been configured to use his account. He creates a rule "Redirect" with the action Redirect it to people or distribution list. After creating the rule he realized that he missed the e-mail address of his manager in the rule. He decides to modify the rule by using the rules wizard. However, the Modify button is NOT available to modify the rule. Which of the following actions will he perform to accomplish the task?
5.
You work as a System Analyst for Blue Well Inc. You use Microsoft Outlook for messaging and emailing. MS Outlook has been configured to use an IMAP account. You want to search all the e-mails that belong to the Key Customer category and save them to a separate location for future reference. Which of the following actions will he perform to accomplish the task?
6.
Mark works as a System Analyst for Blue Well Inc. He works in his office and his home and uses Microsoft Outlook for messaging and e-mailing. He uses different computers to read his Outlook items. He wants to ensure that he is able to use different computers so that he can read his official Outlook items wherever he is. Which of the following types of e -mail accounts will he create to accomplish the task?
7.
You are composing an e-mail message. You add a digital signature to the e-mail. Now, you want to ensure that the e-mail message is received unaltered. You also want a notification to tell youVwho opened the e-mail and when it was opened. Which of the following will you use to accomplish the task?
8.
Mark works as a Support Analyst for Blue Well Inc. He uses Microsoft Outlook for messaging and emailing. MS Outlook has been configured to use his e -mail account. He composes an e-mail message to send it to the CEO of the company. After composing the message, he assigns a flag to it. However, Mark discovers that all the messages that have been flagged have disappeared. Which of the following is the most likely cause of the issue?
9.
You are composing an e-mail message. You want to send the e-mail; in order to do so, you have to click the Send button. However, the message window does not contain the Send button. Which of the following is the cause of the issue?
10.
You work as a System Analyst for Blue Well Inc. You are using Microsoft Outlook 2010 for messaging and emailing. MS Outlook has been configured to use an Exchange account. You want to send an e- mail message that contains e-mail attachments about the security policies of the company. Which of the following message formats will you use so that the attachments appear in the body of the message?