- Emails may carry viruses. These are malicious programs that harm your computer system. They can read out your email address book and send themselves to a number of people around the world.
- Many people send unwanted emails to others. These are called spam mails. It takes a lot of time to filter out the unwanted emails from those that are really important.
- Emails cannot really be used for official business documents. They may be lost and you cannot sign them.
Kavungya answered the question on May 17, 2019 at 10:44
-
Describe POP3 email system.
(Solved)
Describe POP3 email system.
Date posted:
May 17, 2019
.
Answers (1)
-
Describe IMAP.
(Solved)
Describe IMAP.
Date posted:
May 17, 2019
.
Answers (1)
-
Describe Microsoft Exchange.
(Solved)
Describe Microsoft Exchange.
Date posted:
May 17, 2019
.
Answers (1)
-
Outline the step by step procedure of Reading Email messages.
(Solved)
Outline the step by step procedure of Reading Email messages.
Date posted:
May 17, 2019
.
Answers (1)
-
Write the procedure used in Sending an e-mail message.
(Solved)
Write the procedure used in Sending an e-mail message.
Date posted:
May 17, 2019
.
Answers (1)
-
Write a procedure on how to Add a Contact to the Address Book.
(Solved)
Write a procedure on how to Add a Contact to the Address Book.
Date posted:
May 17, 2019
.
Answers (1)
-
Write the procedure of editing a Contact in the Address Book.
(Solved)
Write the procedure of editing a Contact in the Address Book.
Date posted:
May 17, 2019
.
Answers (1)
-
Write the procedure used in creating a distribution list.
(Solved)
Write the procedure used in creating a distribution list.
Date posted:
May 17, 2019
.
Answers (1)
-
Write the procedure of Sending a Message using the Address Book or Distribution List
(Solved)
Write the procedure of Sending a Message using the Address Book or Distribution List
Date posted:
May 17, 2019
.
Answers (1)
-
Give the procedure on how Search Engines find Web Pages.
(Solved)
Give the procedure on how Search Engines find Web Pages.
Date posted:
May 17, 2019
.
Answers (1)
-
Give the procedure of locating information within a website.
(Solved)
Give the procedure of locating information within a website.
Date posted:
May 17, 2019
.
Answers (1)
-
Outline the steps of Attaching files to email messages.
(Solved)
Outline the steps of Attaching files to email messages.
Date posted:
May 17, 2019
.
Answers (1)
-
Describe Logs and Audit trails.
(Solved)
Describe Logs and Audit trails.
Date posted:
May 17, 2019
.
Answers (1)
-
Describe Mirror Back-ups.
(Solved)
Describe Mirror Back-ups.
Date posted:
May 17, 2019
.
Answers (1)
-
Describe Online Backup.
(Solved)
Describe Online Backup.
Date posted:
May 17, 2019
.
Answers (1)
-
Define Remote Backup.
(Solved)
Define Remote Backup.
Date posted:
May 17, 2019
.
Answers (1)
-
Define Offsite Backup.
(Solved)
Define Offsite Backup.
Date posted:
May 17, 2019
.
Answers (1)
-
Define Full Backup.
(Solved)
Define Full Backup.
Date posted:
May 17, 2019
.
Answers (1)
-
Define Incremental Backup.
(Solved)
Define Incremental Backup.
Date posted:
May 17, 2019
.
Answers (1)
-
What is Differential Backup?
(Solved)
What is Differential Backup?
Date posted:
May 17, 2019
.
Answers (1)