Deck 10: Global Communication - Technology and Etiquette

ملء الشاشة (f)
exit full mode
سؤال
_____ is a malicious, self-replicating program that does not need human interaction to spread.

A) A worm
B) A virus
C) A Trojan horse
D) Adware
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
An iPad2 is an example of a

A) tablet computer.
B) laptop computer.
C) smartphone.
D) mobile app.
سؤال
_____ is a program that attaches itself to files or software so it can spread to other files or programs.

A) A computer virus
B) Spyware
C) A worm
D) A Trojan horse
سؤال
Communication skills are not as important for the virtual office professional because of the lack of face-to-face contact.
سؤال
Yearly credit checks are not necessary since you will know if someone steals your personal information.
سؤال
Which is the best choice for a business to provide just-in-time training for employees?

A) VoiceThread
B) peer-to-peer file sharing
C) instant messaging
D) a social networking site
سؤال
_____ is the act of stealing someone's personal information.

A) Identity theft
B) Adware
C) A worm
D) A computer virus
سؤال
_____ is software that can be installed on your computer without your knowledge and that tracks the websites you view.

A) Spyware
B) A worm
C) A virus
D) A Trojan horse
سؤال
To protect your computer from spyware, make sure you have

A) a firewall.
B) adware.
C) a flash drive.
D) a Trojan horse.
سؤال
For the administrative professional, one of the primary uses of cloud computing is

A) file storage.
B) software applications.
C) web conferencing.
D) e-mail systems.
سؤال
Correct capitalization and spelling are not necessary for instant messaging (IM) in the workplace since IM is casual in nature.
سؤال
Some social networks also have professional uses.
سؤال
You should put your cell phone on silent or vibrate before going into a meeting.
سؤال
When creating a password, you should use words from the dictionary if possible.
سؤال
Mobile devices offer portability and productivity options for the administrative professional.
سؤال
A 48-hour turnaround on answering e-mail is acceptable.
سؤال
Text messaging is for personal use, not professional or business use.
سؤال
_____ is malicious software designed to look like something interesting or useful.

A) A Trojan horse
B) A worm
C) A virus
D) Spyware
سؤال
_____ typically scans incoming e-mail for hidden threats and alerts users when an attempt to infect the computer is detected.

A) Antivirus software
B) Peer-to-peer file sharing software
C) Spyware
D) Adware
سؤال
Richard received a work-related call while he was standing in line at the post office. The information was important and related to a sensitive topic, so he handled the call while in line. Richard made the right choice.
سؤال
Match between columns
The transmitting of voice over the Internet
smartphone
The transmitting of voice over the Internet
VoIP
The transmitting of voice over the Internet
cloud computing
The transmitting of voice over the Internet
intelligent mobile hotspot
The transmitting of voice over the Internet
telecommunications
The transmitting of voice over the Internet
Web 2.0
The transmitting of voice over the Internet
p2p file sharing
The transmitting of voice over the Internet
phishing
The transmitting of voice over the Internet
web conferencing
The transmitting of voice over the Internet
mobile app
Using an online message that seems to be from a legitimate source to steal personal information
smartphone
Using an online message that seems to be from a legitimate source to steal personal information
VoIP
Using an online message that seems to be from a legitimate source to steal personal information
cloud computing
Using an online message that seems to be from a legitimate source to steal personal information
intelligent mobile hotspot
Using an online message that seems to be from a legitimate source to steal personal information
telecommunications
Using an online message that seems to be from a legitimate source to steal personal information
Web 2.0
Using an online message that seems to be from a legitimate source to steal personal information
p2p file sharing
Using an online message that seems to be from a legitimate source to steal personal information
phishing
Using an online message that seems to be from a legitimate source to steal personal information
web conferencing
Using an online message that seems to be from a legitimate source to steal personal information
mobile app
A system of sharing files on an informal network with others who have the same software
smartphone
A system of sharing files on an informal network with others who have the same software
VoIP
A system of sharing files on an informal network with others who have the same software
cloud computing
A system of sharing files on an informal network with others who have the same software
intelligent mobile hotspot
A system of sharing files on an informal network with others who have the same software
telecommunications
A system of sharing files on an informal network with others who have the same software
Web 2.0
A system of sharing files on an informal network with others who have the same software
p2p file sharing
A system of sharing files on an informal network with others who have the same software
phishing
A system of sharing files on an informal network with others who have the same software
web conferencing
A system of sharing files on an informal network with others who have the same software
mobile app
Using the Internet to have a meeting
smartphone
Using the Internet to have a meeting
VoIP
Using the Internet to have a meeting
cloud computing
Using the Internet to have a meeting
intelligent mobile hotspot
Using the Internet to have a meeting
telecommunications
Using the Internet to have a meeting
Web 2.0
Using the Internet to have a meeting
p2p file sharing
Using the Internet to have a meeting
phishing
Using the Internet to have a meeting
web conferencing
Using the Internet to have a meeting
mobile app
A cellular phone with many of the functions of a handheld computer
smartphone
A cellular phone with many of the functions of a handheld computer
VoIP
A cellular phone with many of the functions of a handheld computer
cloud computing
A cellular phone with many of the functions of a handheld computer
intelligent mobile hotspot
A cellular phone with many of the functions of a handheld computer
telecommunications
A cellular phone with many of the functions of a handheld computer
Web 2.0
A cellular phone with many of the functions of a handheld computer
p2p file sharing
A cellular phone with many of the functions of a handheld computer
phishing
A cellular phone with many of the functions of a handheld computer
web conferencing
A cellular phone with many of the functions of a handheld computer
mobile app
A traveling Internet connection
smartphone
A traveling Internet connection
VoIP
A traveling Internet connection
cloud computing
A traveling Internet connection
intelligent mobile hotspot
A traveling Internet connection
telecommunications
A traveling Internet connection
Web 2.0
A traveling Internet connection
p2p file sharing
A traveling Internet connection
phishing
A traveling Internet connection
web conferencing
A traveling Internet connection
mobile app
Web resources that are interactive
smartphone
Web resources that are interactive
VoIP
Web resources that are interactive
cloud computing
Web resources that are interactive
intelligent mobile hotspot
Web resources that are interactive
telecommunications
Web resources that are interactive
Web 2.0
Web resources that are interactive
p2p file sharing
Web resources that are interactive
phishing
Web resources that are interactive
web conferencing
Web resources that are interactive
mobile app
The use of computer services from virtual servers available on demand over the Internet
smartphone
The use of computer services from virtual servers available on demand over the Internet
VoIP
The use of computer services from virtual servers available on demand over the Internet
cloud computing
The use of computer services from virtual servers available on demand over the Internet
intelligent mobile hotspot
The use of computer services from virtual servers available on demand over the Internet
telecommunications
The use of computer services from virtual servers available on demand over the Internet
Web 2.0
The use of computer services from virtual servers available on demand over the Internet
p2p file sharing
The use of computer services from virtual servers available on demand over the Internet
phishing
The use of computer services from virtual servers available on demand over the Internet
web conferencing
The use of computer services from virtual servers available on demand over the Internet
mobile app
Software that runs on a handheld device or computer
smartphone
Software that runs on a handheld device or computer
VoIP
Software that runs on a handheld device or computer
cloud computing
Software that runs on a handheld device or computer
intelligent mobile hotspot
Software that runs on a handheld device or computer
telecommunications
Software that runs on a handheld device or computer
Web 2.0
Software that runs on a handheld device or computer
p2p file sharing
Software that runs on a handheld device or computer
phishing
Software that runs on a handheld device or computer
web conferencing
Software that runs on a handheld device or computer
mobile app
The transmission of text, data, voice, video, and images electronically from one location to another
smartphone
The transmission of text, data, voice, video, and images electronically from one location to another
VoIP
The transmission of text, data, voice, video, and images electronically from one location to another
cloud computing
The transmission of text, data, voice, video, and images electronically from one location to another
intelligent mobile hotspot
The transmission of text, data, voice, video, and images electronically from one location to another
telecommunications
The transmission of text, data, voice, video, and images electronically from one location to another
Web 2.0
The transmission of text, data, voice, video, and images electronically from one location to another
p2p file sharing
The transmission of text, data, voice, video, and images electronically from one location to another
phishing
The transmission of text, data, voice, video, and images electronically from one location to another
web conferencing
The transmission of text, data, voice, video, and images electronically from one location to another
mobile app
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/21
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 10: Global Communication - Technology and Etiquette
1
_____ is a malicious, self-replicating program that does not need human interaction to spread.

A) A worm
B) A virus
C) A Trojan horse
D) Adware
A
2
An iPad2 is an example of a

A) tablet computer.
B) laptop computer.
C) smartphone.
D) mobile app.
A
3
_____ is a program that attaches itself to files or software so it can spread to other files or programs.

A) A computer virus
B) Spyware
C) A worm
D) A Trojan horse
A
4
Communication skills are not as important for the virtual office professional because of the lack of face-to-face contact.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 21 في هذه المجموعة.
فتح الحزمة
k this deck
5
Yearly credit checks are not necessary since you will know if someone steals your personal information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 21 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which is the best choice for a business to provide just-in-time training for employees?

A) VoiceThread
B) peer-to-peer file sharing
C) instant messaging
D) a social networking site
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 21 في هذه المجموعة.
فتح الحزمة
k this deck
7
_____ is the act of stealing someone's personal information.

A) Identity theft
B) Adware
C) A worm
D) A computer virus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 21 في هذه المجموعة.
فتح الحزمة
k this deck
8
_____ is software that can be installed on your computer without your knowledge and that tracks the websites you view.

A) Spyware
B) A worm
C) A virus
D) A Trojan horse
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 21 في هذه المجموعة.
فتح الحزمة
k this deck
9
To protect your computer from spyware, make sure you have

A) a firewall.
B) adware.
C) a flash drive.
D) a Trojan horse.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 21 في هذه المجموعة.
فتح الحزمة
k this deck
10
For the administrative professional, one of the primary uses of cloud computing is

A) file storage.
B) software applications.
C) web conferencing.
D) e-mail systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 21 في هذه المجموعة.
فتح الحزمة
k this deck
11
Correct capitalization and spelling are not necessary for instant messaging (IM) in the workplace since IM is casual in nature.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 21 في هذه المجموعة.
فتح الحزمة
k this deck
12
Some social networks also have professional uses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 21 في هذه المجموعة.
فتح الحزمة
k this deck
13
You should put your cell phone on silent or vibrate before going into a meeting.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 21 في هذه المجموعة.
فتح الحزمة
k this deck
14
When creating a password, you should use words from the dictionary if possible.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 21 في هذه المجموعة.
فتح الحزمة
k this deck
15
Mobile devices offer portability and productivity options for the administrative professional.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 21 في هذه المجموعة.
فتح الحزمة
k this deck
16
A 48-hour turnaround on answering e-mail is acceptable.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 21 في هذه المجموعة.
فتح الحزمة
k this deck
17
Text messaging is for personal use, not professional or business use.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 21 في هذه المجموعة.
فتح الحزمة
k this deck
18
_____ is malicious software designed to look like something interesting or useful.

A) A Trojan horse
B) A worm
C) A virus
D) Spyware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 21 في هذه المجموعة.
فتح الحزمة
k this deck
19
_____ typically scans incoming e-mail for hidden threats and alerts users when an attempt to infect the computer is detected.

A) Antivirus software
B) Peer-to-peer file sharing software
C) Spyware
D) Adware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 21 في هذه المجموعة.
فتح الحزمة
k this deck
20
Richard received a work-related call while he was standing in line at the post office. The information was important and related to a sensitive topic, so he handled the call while in line. Richard made the right choice.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 21 في هذه المجموعة.
فتح الحزمة
k this deck
21
Match between columns
The transmitting of voice over the Internet
smartphone
The transmitting of voice over the Internet
VoIP
The transmitting of voice over the Internet
cloud computing
The transmitting of voice over the Internet
intelligent mobile hotspot
The transmitting of voice over the Internet
telecommunications
The transmitting of voice over the Internet
Web 2.0
The transmitting of voice over the Internet
p2p file sharing
The transmitting of voice over the Internet
phishing
The transmitting of voice over the Internet
web conferencing
The transmitting of voice over the Internet
mobile app
Using an online message that seems to be from a legitimate source to steal personal information
smartphone
Using an online message that seems to be from a legitimate source to steal personal information
VoIP
Using an online message that seems to be from a legitimate source to steal personal information
cloud computing
Using an online message that seems to be from a legitimate source to steal personal information
intelligent mobile hotspot
Using an online message that seems to be from a legitimate source to steal personal information
telecommunications
Using an online message that seems to be from a legitimate source to steal personal information
Web 2.0
Using an online message that seems to be from a legitimate source to steal personal information
p2p file sharing
Using an online message that seems to be from a legitimate source to steal personal information
phishing
Using an online message that seems to be from a legitimate source to steal personal information
web conferencing
Using an online message that seems to be from a legitimate source to steal personal information
mobile app
A system of sharing files on an informal network with others who have the same software
smartphone
A system of sharing files on an informal network with others who have the same software
VoIP
A system of sharing files on an informal network with others who have the same software
cloud computing
A system of sharing files on an informal network with others who have the same software
intelligent mobile hotspot
A system of sharing files on an informal network with others who have the same software
telecommunications
A system of sharing files on an informal network with others who have the same software
Web 2.0
A system of sharing files on an informal network with others who have the same software
p2p file sharing
A system of sharing files on an informal network with others who have the same software
phishing
A system of sharing files on an informal network with others who have the same software
web conferencing
A system of sharing files on an informal network with others who have the same software
mobile app
Using the Internet to have a meeting
smartphone
Using the Internet to have a meeting
VoIP
Using the Internet to have a meeting
cloud computing
Using the Internet to have a meeting
intelligent mobile hotspot
Using the Internet to have a meeting
telecommunications
Using the Internet to have a meeting
Web 2.0
Using the Internet to have a meeting
p2p file sharing
Using the Internet to have a meeting
phishing
Using the Internet to have a meeting
web conferencing
Using the Internet to have a meeting
mobile app
A cellular phone with many of the functions of a handheld computer
smartphone
A cellular phone with many of the functions of a handheld computer
VoIP
A cellular phone with many of the functions of a handheld computer
cloud computing
A cellular phone with many of the functions of a handheld computer
intelligent mobile hotspot
A cellular phone with many of the functions of a handheld computer
telecommunications
A cellular phone with many of the functions of a handheld computer
Web 2.0
A cellular phone with many of the functions of a handheld computer
p2p file sharing
A cellular phone with many of the functions of a handheld computer
phishing
A cellular phone with many of the functions of a handheld computer
web conferencing
A cellular phone with many of the functions of a handheld computer
mobile app
A traveling Internet connection
smartphone
A traveling Internet connection
VoIP
A traveling Internet connection
cloud computing
A traveling Internet connection
intelligent mobile hotspot
A traveling Internet connection
telecommunications
A traveling Internet connection
Web 2.0
A traveling Internet connection
p2p file sharing
A traveling Internet connection
phishing
A traveling Internet connection
web conferencing
A traveling Internet connection
mobile app
Web resources that are interactive
smartphone
Web resources that are interactive
VoIP
Web resources that are interactive
cloud computing
Web resources that are interactive
intelligent mobile hotspot
Web resources that are interactive
telecommunications
Web resources that are interactive
Web 2.0
Web resources that are interactive
p2p file sharing
Web resources that are interactive
phishing
Web resources that are interactive
web conferencing
Web resources that are interactive
mobile app
The use of computer services from virtual servers available on demand over the Internet
smartphone
The use of computer services from virtual servers available on demand over the Internet
VoIP
The use of computer services from virtual servers available on demand over the Internet
cloud computing
The use of computer services from virtual servers available on demand over the Internet
intelligent mobile hotspot
The use of computer services from virtual servers available on demand over the Internet
telecommunications
The use of computer services from virtual servers available on demand over the Internet
Web 2.0
The use of computer services from virtual servers available on demand over the Internet
p2p file sharing
The use of computer services from virtual servers available on demand over the Internet
phishing
The use of computer services from virtual servers available on demand over the Internet
web conferencing
The use of computer services from virtual servers available on demand over the Internet
mobile app
Software that runs on a handheld device or computer
smartphone
Software that runs on a handheld device or computer
VoIP
Software that runs on a handheld device or computer
cloud computing
Software that runs on a handheld device or computer
intelligent mobile hotspot
Software that runs on a handheld device or computer
telecommunications
Software that runs on a handheld device or computer
Web 2.0
Software that runs on a handheld device or computer
p2p file sharing
Software that runs on a handheld device or computer
phishing
Software that runs on a handheld device or computer
web conferencing
Software that runs on a handheld device or computer
mobile app
The transmission of text, data, voice, video, and images electronically from one location to another
smartphone
The transmission of text, data, voice, video, and images electronically from one location to another
VoIP
The transmission of text, data, voice, video, and images electronically from one location to another
cloud computing
The transmission of text, data, voice, video, and images electronically from one location to another
intelligent mobile hotspot
The transmission of text, data, voice, video, and images electronically from one location to another
telecommunications
The transmission of text, data, voice, video, and images electronically from one location to another
Web 2.0
The transmission of text, data, voice, video, and images electronically from one location to another
p2p file sharing
The transmission of text, data, voice, video, and images electronically from one location to another
phishing
The transmission of text, data, voice, video, and images electronically from one location to another
web conferencing
The transmission of text, data, voice, video, and images electronically from one location to another
mobile app
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 21 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 21 في هذه المجموعة.