Browse Definitions :
Reference

Messaging and Email Quizzes

We've gathered a collection of our quizzes about messaging and email-related topics. Test your knowledge of administration, system integration, backup and recovery, and dealing with spam -- among other topics. Want to study up first? See below, our messaging and email-related learning guides and our larger collection of resources.

Need more basic information before you get started? See our definitions for email, instant messaging, malware and spam.

 

Messaging and Email Learning Guides:

  • Email Marketing and the Spam Problem -- Test your grasp of direct email marketing fundamentals and ensure you're targeting your customers --  but not spamming them.

  • Email Security -- Take this quiz to find out how much you know about securing your organization's e-mail.

  • Exchange Geek-o-Meter -- Test your knowledge of Exchange Server essentials.

  • IM Lingo 4 U -- How much do you know about the snappy lingo that makes IMing and Twitter so fast and fun?

  • Spam, Spam and More Spam -- What do you know about spam and its partners-in-crime? Take this quiz to find out.

  • Writing for Business -- This quick quiz tests your knowledge of business writing basics.

  • Writing for Business -- See the Writing for Business blog for hundreds of questions and answers to help ensure your business messages are professional.

 

Want more messaging and email-specific info? See our messaging and email learning guides, our messaging and email-related definitions or the resources on SearchExchange.com

We've got lots more information for you! Check out the full collection of Learning Guides and Tutorials to learn essential information on a wide range of subjects. You'll find guides and tutorials about networking, backup and recovery, and a wide range of other topics, including databases, business intelligence, programming and much more. Also see: Our Favorite Cheat Sheets

Would you like to test your knowledge of other IT topics? See our huge collection of quizzes.

This was last updated in June 2010

SearchCompliance

SearchSecurity

  • cyber attack

    A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to ...

  • backdoor (computing)

    A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.

  • post-quantum cryptography

    Post-quantum cryptography, also called quantum encryption, is the development of cryptographic systems for classical computers ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

Close