Deck 9: Communication

Full screen (f)
exit full mode
Question
Profiles specify the method and speed that devices use to transmit data.
Use Space or
up arrow
down arrow
to flip the card.
Question
To join a newsgroup discussion, you post a message, called an article, and other users read and reply to it.
Question
If you want to change something posted on a wiki, you typically select an Edit button or link and then make the change so other users can see it.
Question
The person who creates a chat room acts as the moderator and monitors the conversation.
Question
Once content is posted on a social network, you retain complete control of it.
Question
Email addresses cannot contain spaces.
Question
An email address reveals no information about the owner.
Question
Digital communications require a communications channel and standards.
Question
Smartphones use Wi-Fi in addition to 4G and 5G cellular networks.
Question
Cybercriminals often send spam containing spelling and grammatical mistakes.
Question
Text messaging is a synchronous service.
Question
All servers on the Internet follow TCP/IP rules.
Question
Spam filters are often built into email software.
Question
The newest Wi-Fi standard is 802.11ac, which can reach the speed of 1 gigbit per second.
Question
Email software displays messages in a three-part form.
Question
Instant Messaging is a bad way to exchange short messages.
Question
Wikis were one of the first technologies for communicating and collaborating online.
Question
Blog posts are dated and then listed in chronological order on the site.
Question
SMS messages are limited to 160 characters.
Question
When you send an email message, the recipient's address is included as the return address.
Question
An online ____ is a Web site where members share information.

A) social network
B) wiki
C) feed
D) podcast
Question
An email address has four parts. _________________________
Question
To communicate with a friend while you're on the go or send messages to family members, you can use ____.

A) clips
B) email
C) spam
D) a wiki
Question
____ is a network protocol that defines how to route data across a network.

A) RSS
B) SMTP
C) TCP/IP
D) SMS
Question
Besides communications software built into a(n) operating system , some application software lets users communicate with each other. _________________________
Question
A communications ____ sends electronic data from a source to a destination.

A) wall
B) system
C) thread
D) profile
Question
A(n) forum is a Web page listing journal entries with commentary and information. _________________________
Question
The last router in the series sends an email message to your recipient's email server. 
Question
____ are audio files distributed on the Web.

A) Tags
B) Protocols
C) Podcasts
D) Vlogs
Question
Avoid revealing personal information in chat rooms , which are locations on Internet servers where people exchange typed messages. _________________________
Question
Computers and devices that communicate using radio waves across a medium distance of 100 to 900 feet use ____.

A) IMAP
B) RSS
C) Bluetooth
D) Wi-Fi
Question
A(n) modem converts a message to electronic signals. _________________________
Question
Local email is ideal for people on the go with mobile devices because they can access their accounts from any computer. _________________________
Question
A(n) ____ is an online educational Web conference.

A) Webinar
B) online chat
C) podcast
D) protocol
Question
The main computer in an email system is a(n) email client . _________________________
Question
Consider email as public communication, because people might forward your message to others without your knowledge. _________________________
Question
A ____ is an informal Web site of time-stamped articles written in a journal format.

A) wiki
B) timeline
C) newsgroup
D) blog
Question
____ communications involves transmitting information from one computer or mobile device to another.

A) Threaded
B) Digital
C) Content
D) Multimedia
Question
To communicate across distances up to a 30-mile radius, devices can use ____.

A) WiMAX
B) Wi-Fi
C) IMAP
D) Bluetooth
Question
To communicate across longer distances, devices can use Wi-Fi , also known as the 802.16 standard. _________________________
Question
Webmail uses the ____ protocol to receive email messages.

A) Internet Message Access Protocol (IMAP)
B) Simple Mail Transfer Protocol (SMTP)
C) Post Office Protocol (POP)
D) Short Message Service (SMS)
Question
____ is the protocol for sending all types of email messages.

A) Internet Message Access Protocol (IMAP
B) Post Office Protocol (POP)
C) Simple Mail Transfer Protocol (SMTP)
D) Short Message Service (SMS)
Question
____ communications involve one person posting a message that someone reads later.

A) Synchronous
B) Asynchronous
C) Routed
D) Presence
Question
In an email address the ____ symbol divides the user ID from the name of the email provider.

A) .
B) #
C) &
D) @
Question
You can set up an account through an online service such as Gmail, and then access your email using a Web browser, a system known as ____.

A) Internet Message Access
B) Simple Mail Transfer
C) Short Message Service
D) Webmail
Question
You use an email ____ to compose and send email messages.

A) client
B) attachment
C) server
D) provider
Question
The main computer in an email system is an email ____.

A) attachment
B) provider
C) client
D) server
Question
An email address contains the name of the email provider, also called the ____.

A) domain name
B) server name
C) email system
D) client name
Question
____ is a protocol that downloads messages from an email server for permanent storage on your computer.

A) Internet Message Access Protocol (IMAP)
B) Post Office Protocol (POP)
C) Simple Mail Transfer Protocol (SMTP)
D) Short Message Service (SMS)
Question
An email message displays in two parts, the message header and the message ____.

A) wall
B) body
C) attachment
D) feed
Question
An email ____ consists of the computers and software that provide email services.

A) attachment
B) server
C) system
D) client
Question
____ is electronic junk mail.

A) A worm
B) Wiki
C) Phish
D) Spam
Question
Real-time messaging among group members is called ____.

A) wiki
B) clip
C) feed
D) chat
Question
To sign up for an email account, you contact an email ____.

A) address
B) server
C) provider
D) client
Question
A file you send with an email message is called an email ____.

A) tag
B) feed
C) attachment
D) clip
Question
A system that lets people exchange short messages while they're online is called a ____ messaging system.

A) clip
B) feed
C) real-time
D) wiki
Question
The email server determines the best route for the message, which often involves sending the message to a series of network devices called ____.

A) servers
B) routers
C) hubs
D) clients
Question
A ____ email is a fraudulent message designed to trick you into providing confidential information such as your bank account number.

A) phishing
B) pharming
C) spam
D) wiki
Question
Real-time messaging systems such as IM are primarily ____ communications, which means that everyone who is communicating must be online at the same time.

A) synchronous
B) asynchronous
C) routed
D) presence
Question
One-on-one real-time messaging is called ____ messaging for short.

A) clip
B) instant
C) digital
D) post
Question
A ____ is a location on a server that lets users chat with each other.

A) chat room
B) wall
C) profile
D) feed
Question
A ____ is a collaborative Web site that members of a group can access and edit using a Web browser.

A) feed
B) timeline
C) microblog
D) wiki
Question
Do not use social networks to monitor or keep track of a member's activities or whereabouts, which could be considered ____.

A) flaming
B) cyberstalking
C) cyberbullying
D) spamming
Question
An early Internet technology is a ____, an online area where users have written discussions on a particular topic.

A) blog
B) wiki
C) newsgroup
D) feed
Question
A ____ is basically a service that you subscribe to so you can receive frequently updated Web content.

A) microblog
B) chat room
C) forum
D) feed
Question
A ____ allows users to publish short messages, usually between 100 and 200 characters, for others to read.

A) podcast
B) contact list
C) microblog
D) timeline
Question
____ is posting hostile or insulting comments about another online participant.

A) Flaming
B) Cyberstalking
C) Feeding
D) Spamming
Question
Instant messaging uses ____ technology, which lets one computing device identify the status of another.

A) asynchronous
B) threaded
C) routed
D) presence1
Question
A message ____ is an online discussion site where people participate in a conversation by posting messages.

A) wall
B) board
C) feed
D) room
Question
The technology for feeds is called ____, a data format for distributing online content.

A) Short Message Service (SMS)
B) Really Simple Syndication (RSS)
C) Internet Message Access Protocol (IMAP)
D) Multimedia Messaging Service (MMS)
Question
Using a social networking site, you can form a ____, which is a collection of people who share a particular background or interest.

A) timeline
B) wall
C) group
D) wiki
Question
With ____ audio, you start listening to the content right away without having to wait for the entire file to download to your computer.

A) streaming
B) blogging
C) threaded
D) synchronous
Question
To join a social network, you provide a name and password and complete an online form to create a virtual identity, or ____.

A) domain name
B) profile
C) label
D) protocol
Question
A(n) ____ is a symbol for an emotional gesture, such as a smile or frown, that you create using keyboard characters.

A) label
B) chaticon
C) tag
D) emoticon
Question
A(n) ____ is a key term associated with a blog post.

A) tag
B) profile
C) attachment
D) clip
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/75
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 9: Communication
1
Profiles specify the method and speed that devices use to transmit data.
False
2
To join a newsgroup discussion, you post a message, called an article, and other users read and reply to it.
True
3
If you want to change something posted on a wiki, you typically select an Edit button or link and then make the change so other users can see it.
False
4
The person who creates a chat room acts as the moderator and monitors the conversation.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
5
Once content is posted on a social network, you retain complete control of it.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
6
Email addresses cannot contain spaces.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
7
An email address reveals no information about the owner.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
8
Digital communications require a communications channel and standards.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
9
Smartphones use Wi-Fi in addition to 4G and 5G cellular networks.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
10
Cybercriminals often send spam containing spelling and grammatical mistakes.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
11
Text messaging is a synchronous service.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
12
All servers on the Internet follow TCP/IP rules.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
13
Spam filters are often built into email software.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
14
The newest Wi-Fi standard is 802.11ac, which can reach the speed of 1 gigbit per second.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
15
Email software displays messages in a three-part form.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
16
Instant Messaging is a bad way to exchange short messages.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
17
Wikis were one of the first technologies for communicating and collaborating online.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
18
Blog posts are dated and then listed in chronological order on the site.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
19
SMS messages are limited to 160 characters.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
20
When you send an email message, the recipient's address is included as the return address.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
21
An online ____ is a Web site where members share information.

A) social network
B) wiki
C) feed
D) podcast
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
22
An email address has four parts. _________________________
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
23
To communicate with a friend while you're on the go or send messages to family members, you can use ____.

A) clips
B) email
C) spam
D) a wiki
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
24
____ is a network protocol that defines how to route data across a network.

A) RSS
B) SMTP
C) TCP/IP
D) SMS
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
25
Besides communications software built into a(n) operating system , some application software lets users communicate with each other. _________________________
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
26
A communications ____ sends electronic data from a source to a destination.

A) wall
B) system
C) thread
D) profile
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
27
A(n) forum is a Web page listing journal entries with commentary and information. _________________________
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
28
The last router in the series sends an email message to your recipient's email server. 
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
29
____ are audio files distributed on the Web.

A) Tags
B) Protocols
C) Podcasts
D) Vlogs
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
30
Avoid revealing personal information in chat rooms , which are locations on Internet servers where people exchange typed messages. _________________________
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
31
Computers and devices that communicate using radio waves across a medium distance of 100 to 900 feet use ____.

A) IMAP
B) RSS
C) Bluetooth
D) Wi-Fi
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
32
A(n) modem converts a message to electronic signals. _________________________
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
33
Local email is ideal for people on the go with mobile devices because they can access their accounts from any computer. _________________________
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
34
A(n) ____ is an online educational Web conference.

A) Webinar
B) online chat
C) podcast
D) protocol
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
35
The main computer in an email system is a(n) email client . _________________________
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
36
Consider email as public communication, because people might forward your message to others without your knowledge. _________________________
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
37
A ____ is an informal Web site of time-stamped articles written in a journal format.

A) wiki
B) timeline
C) newsgroup
D) blog
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
38
____ communications involves transmitting information from one computer or mobile device to another.

A) Threaded
B) Digital
C) Content
D) Multimedia
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
39
To communicate across distances up to a 30-mile radius, devices can use ____.

A) WiMAX
B) Wi-Fi
C) IMAP
D) Bluetooth
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
40
To communicate across longer distances, devices can use Wi-Fi , also known as the 802.16 standard. _________________________
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
41
Webmail uses the ____ protocol to receive email messages.

A) Internet Message Access Protocol (IMAP)
B) Simple Mail Transfer Protocol (SMTP)
C) Post Office Protocol (POP)
D) Short Message Service (SMS)
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
42
____ is the protocol for sending all types of email messages.

A) Internet Message Access Protocol (IMAP
B) Post Office Protocol (POP)
C) Simple Mail Transfer Protocol (SMTP)
D) Short Message Service (SMS)
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
43
____ communications involve one person posting a message that someone reads later.

A) Synchronous
B) Asynchronous
C) Routed
D) Presence
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
44
In an email address the ____ symbol divides the user ID from the name of the email provider.

A) .
B) #
C) &
D) @
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
45
You can set up an account through an online service such as Gmail, and then access your email using a Web browser, a system known as ____.

A) Internet Message Access
B) Simple Mail Transfer
C) Short Message Service
D) Webmail
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
46
You use an email ____ to compose and send email messages.

A) client
B) attachment
C) server
D) provider
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
47
The main computer in an email system is an email ____.

A) attachment
B) provider
C) client
D) server
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
48
An email address contains the name of the email provider, also called the ____.

A) domain name
B) server name
C) email system
D) client name
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
49
____ is a protocol that downloads messages from an email server for permanent storage on your computer.

A) Internet Message Access Protocol (IMAP)
B) Post Office Protocol (POP)
C) Simple Mail Transfer Protocol (SMTP)
D) Short Message Service (SMS)
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
50
An email message displays in two parts, the message header and the message ____.

A) wall
B) body
C) attachment
D) feed
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
51
An email ____ consists of the computers and software that provide email services.

A) attachment
B) server
C) system
D) client
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
52
____ is electronic junk mail.

A) A worm
B) Wiki
C) Phish
D) Spam
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
53
Real-time messaging among group members is called ____.

A) wiki
B) clip
C) feed
D) chat
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
54
To sign up for an email account, you contact an email ____.

A) address
B) server
C) provider
D) client
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
55
A file you send with an email message is called an email ____.

A) tag
B) feed
C) attachment
D) clip
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
56
A system that lets people exchange short messages while they're online is called a ____ messaging system.

A) clip
B) feed
C) real-time
D) wiki
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
57
The email server determines the best route for the message, which often involves sending the message to a series of network devices called ____.

A) servers
B) routers
C) hubs
D) clients
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
58
A ____ email is a fraudulent message designed to trick you into providing confidential information such as your bank account number.

A) phishing
B) pharming
C) spam
D) wiki
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
59
Real-time messaging systems such as IM are primarily ____ communications, which means that everyone who is communicating must be online at the same time.

A) synchronous
B) asynchronous
C) routed
D) presence
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
60
One-on-one real-time messaging is called ____ messaging for short.

A) clip
B) instant
C) digital
D) post
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
61
A ____ is a location on a server that lets users chat with each other.

A) chat room
B) wall
C) profile
D) feed
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
62
A ____ is a collaborative Web site that members of a group can access and edit using a Web browser.

A) feed
B) timeline
C) microblog
D) wiki
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
63
Do not use social networks to monitor or keep track of a member's activities or whereabouts, which could be considered ____.

A) flaming
B) cyberstalking
C) cyberbullying
D) spamming
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
64
An early Internet technology is a ____, an online area where users have written discussions on a particular topic.

A) blog
B) wiki
C) newsgroup
D) feed
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
65
A ____ is basically a service that you subscribe to so you can receive frequently updated Web content.

A) microblog
B) chat room
C) forum
D) feed
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
66
A ____ allows users to publish short messages, usually between 100 and 200 characters, for others to read.

A) podcast
B) contact list
C) microblog
D) timeline
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
67
____ is posting hostile or insulting comments about another online participant.

A) Flaming
B) Cyberstalking
C) Feeding
D) Spamming
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
68
Instant messaging uses ____ technology, which lets one computing device identify the status of another.

A) asynchronous
B) threaded
C) routed
D) presence1
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
69
A message ____ is an online discussion site where people participate in a conversation by posting messages.

A) wall
B) board
C) feed
D) room
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
70
The technology for feeds is called ____, a data format for distributing online content.

A) Short Message Service (SMS)
B) Really Simple Syndication (RSS)
C) Internet Message Access Protocol (IMAP)
D) Multimedia Messaging Service (MMS)
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
71
Using a social networking site, you can form a ____, which is a collection of people who share a particular background or interest.

A) timeline
B) wall
C) group
D) wiki
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
72
With ____ audio, you start listening to the content right away without having to wait for the entire file to download to your computer.

A) streaming
B) blogging
C) threaded
D) synchronous
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
73
To join a social network, you provide a name and password and complete an online form to create a virtual identity, or ____.

A) domain name
B) profile
C) label
D) protocol
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
74
A(n) ____ is a symbol for an emotional gesture, such as a smile or frown, that you create using keyboard characters.

A) label
B) chaticon
C) tag
D) emoticon
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
75
A(n) ____ is a key term associated with a blog post.

A) tag
B) profile
C) attachment
D) clip
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 75 flashcards in this deck.