- Emails may carry viruses. These are malicious programs that harm your computer system. They can read out your email address book and send themselves to a number of people around the world.
- Many people send unwanted emails to others. These are called spam mails. It takes a lot of time to filter out the unwanted emails from those that are really important.
- Emails cannot really be used for official business documents. They may be lost and you cannot sign them.
Kavungya answered the question on May 17, 2019 at 10:44
- Describe POP3 email system.(Solved)
Describe POP3 email system.
Date posted: May 17, 2019. Answers (1)
- Describe IMAP.(Solved)
Describe IMAP.
Date posted: May 17, 2019. Answers (1)
- Describe Microsoft Exchange.(Solved)
Describe Microsoft Exchange.
Date posted: May 17, 2019. Answers (1)
- Outline the step by step procedure of Reading Email messages.(Solved)
Outline the step by step procedure of Reading Email messages.
Date posted: May 17, 2019. Answers (1)
- Write the procedure used in Sending an e-mail message. (Solved)
Write the procedure used in Sending an e-mail message.
Date posted: May 17, 2019. Answers (1)
- Write a procedure on how to Add a Contact to the Address Book.(Solved)
Write a procedure on how to Add a Contact to the Address Book.
Date posted: May 17, 2019. Answers (1)
- Write the procedure of editing a Contact in the Address Book.(Solved)
Write the procedure of editing a Contact in the Address Book.
Date posted: May 17, 2019. Answers (1)
- Write the procedure used in creating a distribution list.(Solved)
Write the procedure used in creating a distribution list.
Date posted: May 17, 2019. Answers (1)
- Write the procedure of Sending a Message using the Address Book or Distribution List(Solved)
Write the procedure of Sending a Message using the Address Book or Distribution List
Date posted: May 17, 2019. Answers (1)
- Give the procedure on how Search Engines find Web Pages.(Solved)
Give the procedure on how Search Engines find Web Pages.
Date posted: May 17, 2019. Answers (1)
- Give the procedure of locating information within a website.(Solved)
Give the procedure of locating information within a website.
Date posted: May 17, 2019. Answers (1)
- Outline the steps of Attaching files to email messages.(Solved)
Outline the steps of Attaching files to email messages.
Date posted: May 17, 2019. Answers (1)
- Describe Logs and Audit trails.(Solved)
Describe Logs and Audit trails.
Date posted: May 17, 2019. Answers (1)
- Describe Mirror Back-ups.(Solved)
Describe Mirror Back-ups.
Date posted: May 17, 2019. Answers (1)
- Describe Online Backup.(Solved)
Describe Online Backup.
Date posted: May 17, 2019. Answers (1)
- Define Remote Backup.(Solved)
Define Remote Backup.
Date posted: May 17, 2019. Answers (1)
- Define Offsite Backup.(Solved)
Define Offsite Backup.
Date posted: May 17, 2019. Answers (1)
- Define Full Backup.(Solved)
Define Full Backup.
Date posted: May 17, 2019. Answers (1)
- Define Incremental Backup.(Solved)
Define Incremental Backup.
Date posted: May 17, 2019. Answers (1)
- What is Differential Backup?(Solved)
What is Differential Backup?
Date posted: May 17, 2019. Answers (1)