Deck 14: Communicating Through Social and Other Interactive Media

ملء الشاشة (f)
exit full mode
سؤال
In the realm of social media, the idea that we don't know exactly who is reading our posts is labeled _____.

A) enculturation
B) mutual enrichment
C) social presence theory
D) collapsing contexts
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
________ theory suggests that interactive media communication has a lesser information-carrying capacity when compared to face-to-face communication because it removes most nonverbal cues.

A) Media richness
B) Uncertainty reduction
C) Social presence theory
D) Multiphrenic
سؤال
When one creates an intentionally deceptive social media profile, it is known as ________.

A) catfishing
B) lurking
C) hoaxing
D) spamming
سؤال
According to social presence theory, which of the following media would make Jonathan and Judy's long-distance relationship closer?

A) talking on the phone
B) emailing
C) texting
D) video chatting
سؤال
People who read, observe, but do not actively participate in online communities are called ________.

A) spammers
B) lurkers
C) hoaxers
D) phishers
سؤال
Karen's office stores data online on multiple servers which are accessible from multiple locations. Her office uses _____.

A) Q-filing
B) cloud storage
C) databases
D) interactive filing
سؤال
Which of the following seems to be the most important impact of interactive media?

A) connecting with others
B) searching for and exchanging information
C) entertainment
D) financial transactions
سؤال
Donna is short on ________ because she does not have access to technological skills and resources.

A) technocapital
B) socio-capital
C) ethno-capital
D) cultural capital
سؤال
Social presence theory suggests that face-to-face communication is generally low in social presence.
سؤال
Which of the following is NOT a level of technocapital according to the theory of Jan van Dijk?

A) mental access
B) material access
C) skill access
D) personal access
سؤال
According to media richness theory, face-to-face communication is the richest medium for communication.
سؤال
Those with the most power in a society decide what constitutes ________ capital, which are the certain bodies of cultural knowledge and competencies.

A) economic
B) cultural
C) critical
D) social
سؤال
The repeated and deliberate misuse of communication technology by an individual or group to threaten or harm others is called _____.

A) cyberbullying
B) spamming
C) phishing
D) hoaxing
سؤال
Based on the theory by Jan van Dijk, the level of technocapital known as material access to _____is where most public policy currently focuses.

A) financial competencies
B) software
C) digital hardware
D) technology education
سؤال
Though only about 15 percent of Americans are not online, in many countries, only a tiny fraction of the population even has access to computers and the Internet. This gap is referred to as the ________.

A) digital divide
B) technology gap
C) techno-capital
D) spatial digitalization
سؤال
The feelings of psychological closeness that people experience when they interact with each other are known as _____.

A) media richness
B) uncertainty reduction
C) social presence
D) multiphrenic
سؤال
Which of the following is typically the "richest" medium?

A) e-mail
B) video chat
C) face-to-face
D) text messaging
سؤال
Interactive media communication, like Skype, and telephone communication are considered synchronous.
سؤال
The ease with which content can be spread on social media is called lurking.
سؤال
Asynchronicity occurs when interactive media messages are sent and received at different times.
سؤال
E-mail communication is considered ________ because messages are not sent and received at the same time.
سؤال
Religious views and political views when presented online are considered potential forms of stigmatizing information.
سؤال
Describe the communication that occurs face-to-face versus communication that occurs via interactive media communication. What are the advantages and disadvantages of each approach?
سؤال
The fastest growing group of Internet users is older people 70+).
سؤال
Detail ways to improve mediated communication skills for e-mail and mobile phone usage.
سؤال
What can college students do to bridge the digital divide? Provide two ideas and explain how they are or are not ethical response.
سؤال
Projecting a false identity, also called ________, is possible with interactive media communication.
سؤال
Recent reports show that some males who play online video games purposely harass female players in order to get them to stop playing the games. This is an example of _____.
سؤال
Having access to technological skills and resources is referred to as ________.
سؤال
E-mails from foreign princes asking for wired funds are attempts at accessing consumer banking, an act called ________.
سؤال
The idea of diffusion of innovations suggests that people must see technology as useful and compatible with their everyday lives.
سؤال
Phishing refers to posting Internet messages that are meant to intentionally anger or frustrate in order to provoke reactions from others.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/32
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 14: Communicating Through Social and Other Interactive Media
1
In the realm of social media, the idea that we don't know exactly who is reading our posts is labeled _____.

A) enculturation
B) mutual enrichment
C) social presence theory
D) collapsing contexts
D
2
________ theory suggests that interactive media communication has a lesser information-carrying capacity when compared to face-to-face communication because it removes most nonverbal cues.

A) Media richness
B) Uncertainty reduction
C) Social presence theory
D) Multiphrenic
A
3
When one creates an intentionally deceptive social media profile, it is known as ________.

A) catfishing
B) lurking
C) hoaxing
D) spamming
A
4
According to social presence theory, which of the following media would make Jonathan and Judy's long-distance relationship closer?

A) talking on the phone
B) emailing
C) texting
D) video chatting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
5
People who read, observe, but do not actively participate in online communities are called ________.

A) spammers
B) lurkers
C) hoaxers
D) phishers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
6
Karen's office stores data online on multiple servers which are accessible from multiple locations. Her office uses _____.

A) Q-filing
B) cloud storage
C) databases
D) interactive filing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which of the following seems to be the most important impact of interactive media?

A) connecting with others
B) searching for and exchanging information
C) entertainment
D) financial transactions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
8
Donna is short on ________ because she does not have access to technological skills and resources.

A) technocapital
B) socio-capital
C) ethno-capital
D) cultural capital
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
9
Social presence theory suggests that face-to-face communication is generally low in social presence.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which of the following is NOT a level of technocapital according to the theory of Jan van Dijk?

A) mental access
B) material access
C) skill access
D) personal access
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
11
According to media richness theory, face-to-face communication is the richest medium for communication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
12
Those with the most power in a society decide what constitutes ________ capital, which are the certain bodies of cultural knowledge and competencies.

A) economic
B) cultural
C) critical
D) social
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
13
The repeated and deliberate misuse of communication technology by an individual or group to threaten or harm others is called _____.

A) cyberbullying
B) spamming
C) phishing
D) hoaxing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
14
Based on the theory by Jan van Dijk, the level of technocapital known as material access to _____is where most public policy currently focuses.

A) financial competencies
B) software
C) digital hardware
D) technology education
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
15
Though only about 15 percent of Americans are not online, in many countries, only a tiny fraction of the population even has access to computers and the Internet. This gap is referred to as the ________.

A) digital divide
B) technology gap
C) techno-capital
D) spatial digitalization
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
16
The feelings of psychological closeness that people experience when they interact with each other are known as _____.

A) media richness
B) uncertainty reduction
C) social presence
D) multiphrenic
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which of the following is typically the "richest" medium?

A) e-mail
B) video chat
C) face-to-face
D) text messaging
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
18
Interactive media communication, like Skype, and telephone communication are considered synchronous.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
19
The ease with which content can be spread on social media is called lurking.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
20
Asynchronicity occurs when interactive media messages are sent and received at different times.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
21
E-mail communication is considered ________ because messages are not sent and received at the same time.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
22
Religious views and political views when presented online are considered potential forms of stigmatizing information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
23
Describe the communication that occurs face-to-face versus communication that occurs via interactive media communication. What are the advantages and disadvantages of each approach?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
24
The fastest growing group of Internet users is older people 70+).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
25
Detail ways to improve mediated communication skills for e-mail and mobile phone usage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
26
What can college students do to bridge the digital divide? Provide two ideas and explain how they are or are not ethical response.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
27
Projecting a false identity, also called ________, is possible with interactive media communication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
28
Recent reports show that some males who play online video games purposely harass female players in order to get them to stop playing the games. This is an example of _____.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
29
Having access to technological skills and resources is referred to as ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
30
E-mails from foreign princes asking for wired funds are attempts at accessing consumer banking, an act called ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
31
The idea of diffusion of innovations suggests that people must see technology as useful and compatible with their everyday lives.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
32
Phishing refers to posting Internet messages that are meant to intentionally anger or frustrate in order to provoke reactions from others.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.