Get premium membership and access questions with answers, video lessons as well as revision papers.
1. To open the Address Book, click on the Address Book button.
Address Book button
There may be several types of address books in the Address Book dialog box including the Personal Address Book and other Address
Books created by the administrator.
2. Select the type of address book that you want to use in the Show names from the:
box.
The Personal Address Book is the address book used to store personal distribution lists you frequently address messages to, such as a list of your friends.
The Global Address List (or other listed address books) is the address book that contains all e-mail addresses for users, groups, and distribution lists in your organization that you can address messages to. It is the network administrator who creates and maintains this address book.
3. Click on the New Entry button.
New Entry button
4. Specify the entry type of the contact i.e. whether it is a Private
Address Book Mail Recipient or an entry for a Distribution List.
5. Type in the names for the contact as well as the full email address.
6. Complete the dialog box with the rest of the contact details using
the other tabs e.g. Work or Home information.
7. Click on OK.
The contact or address is added to the Address Book.
Kavungya answered the question on May 17, 2019 at 10:24
- Write the procedure of editing a Contact in the Address Book.(Solved)
Write the procedure of editing a Contact in the Address Book.
Date posted: May 17, 2019. Answers (1)
- Write the procedure used in creating a distribution list.(Solved)
Write the procedure used in creating a distribution list.
Date posted: May 17, 2019. Answers (1)
- Write the procedure of Sending a Message using the Address Book or Distribution List(Solved)
Write the procedure of Sending a Message using the Address Book or Distribution List
Date posted: May 17, 2019. Answers (1)
- Give the procedure on how Search Engines find Web Pages.(Solved)
Give the procedure on how Search Engines find Web Pages.
Date posted: May 17, 2019. Answers (1)
- Give the procedure of locating information within a website.(Solved)
Give the procedure of locating information within a website.
Date posted: May 17, 2019. Answers (1)
- Outline the steps of Attaching files to email messages.(Solved)
Outline the steps of Attaching files to email messages.
Date posted: May 17, 2019. Answers (1)
- Describe Logs and Audit trails.(Solved)
Describe Logs and Audit trails.
Date posted: May 17, 2019. Answers (1)
- Describe Mirror Back-ups.(Solved)
Describe Mirror Back-ups.
Date posted: May 17, 2019. Answers (1)
- Describe Online Backup.(Solved)
Describe Online Backup.
Date posted: May 17, 2019. Answers (1)
- Define Remote Backup.(Solved)
Define Remote Backup.
Date posted: May 17, 2019. Answers (1)
- Define Offsite Backup.(Solved)
Define Offsite Backup.
Date posted: May 17, 2019. Answers (1)
- Define Full Backup.(Solved)
Define Full Backup.
Date posted: May 17, 2019. Answers (1)
- Define Incremental Backup.(Solved)
Define Incremental Backup.
Date posted: May 17, 2019. Answers (1)
- What is Differential Backup?(Solved)
What is Differential Backup?
Date posted: May 17, 2019. Answers (1)
- Define Local backup.(Solved)
Define Local backup.
Date posted: May 17, 2019. Answers (1)
- Describe the Protection of computers from Power Interruptions.(Solved)
Describe the Protection of computers from Power Interruptions.
Date posted: May 17, 2019. Answers (1)
- What is Biometric authentication?(Solved)
What is Biometric authentication?
Date posted: May 17, 2019. Answers (1)
- Define Token authentication?(Solved)
Define Token authentication?
Date posted: May 17, 2019. Answers (1)
- What is Password authentication?(Solved)
What is Password authentication?
Date posted: May 17, 2019. Answers (1)
- Define Dumpster Diving.(Solved)
Define Dumpster Diving.
Date posted: May 17, 2019. Answers (1)