Chapter 12

Self Test

1. A(n) ____ architecture comprises one central server and several connected client computers.

2. The ____ of an e-mail message contains unique identifying numbers, such as the IP address of the server that sent the message.

3. E-mail crimes and violations depend on the city, state, and sometimes country in which the e-mail originated. (True/False)

4. Network administrators maintain logs of the inbound and outbound traffic that routers handle. (True/False)

5. ____ logging saves valuable server space.

6. Novell NetWare’s e-mail service, ____, stores user messages in up to 25 proprietary databases.

7. Some e-mail systems store messages using flat plaintext files, known as a(n) ____ format.

8. Vendor-unique e-mail file systems, such as Microsoft .pst or .ost, typically use ____ formatting.