Deck 8: Communicating With Technology

Full screen (f)
exit full mode
Question
A fax machine copies or scans a document containing text or pictures and sends the image to a destination fax machine, printer, or computer.
Use Space or
up arrow
down arrow
to flip the card.
Question
Two or more telephones, computers, or other devices connected for purposes of communicating and sharing resources is a(n) :

A) firewall.
B) network.
C) analog network.
D) All the above
Question
To observe proper cell phone etiquette, you should turn off your cell phone or use the silent alert setting in one-on-one interactions and during meetings, classes, and other public events.
Question
The transmission of electronic information (text, data, voice, video, and images) from one location to another is:

A) telecommunications.
B) phishing.
C) spamming.
D) telephony.
Question
The next generation of the web involves smarter browsers.
Question
An unaware employee can be an organization's greatest weakness when it comes to data security.
Question
As an administrative professional, you may be expected to screen incoming calls for your supervisor.
Question
When leaving a voice message, include a number where you can be reached but do not give your name for security reasons.
Question
Screencasts are used in business to show clients how to use a product or service.
Question
Email messages can be used to transfer files via a network as email attachments.
Question
An intelligent mobile hotspot is:

A) a portable Internet connection.
B) can keep devices connected all the time.
C) can be a smartphone feature.
D) All the above
Question
A network that covers a small geographical area is known as a:

A) LAN.
B) MAN.
C) WAN.
D) All the above
Question
Instant messaging is quick and easy to use, and just as with email messages, the content of the message is private and secure.
Question
When planning a business call, you should be aware of the time zone differences for the caller and the recipient.
Question
You should not use passwords that are based on personal information that can be easily accessed or guessed.
Question
Businesses do not use public blogs to create forums for exchanging product information.
Question
The content of a wiki entry can be edited by the person who posted the entry or by the wiki administrator but not by others who read the entry.
Question
A WAN is a network that links computers, printers, and other devices:

A) within a single office building.
B) within several nearby buildings.
C) across a city or region.
D) across a large geographical area.
Question
Cyber criminals rarely target organizations.
Question
In a video conference, two or more people located in separate geographical areas communicate by exchanging text messages.
Question
The most popular workplace collaboration tool is:

A) screencasting.
B) social media.
C) video conferencing.
D) email.
Question
Web 2.0:

A) does not exist.
B) is a more interactive version of the web.
C) capitalizes on data mining.
D) All the above
Question
Which of the following offers a way to collaborate?

A) It blogs
B) Wiki
C) Social media
D) All the above
Question
If you receive an email that at first appears to be from your bank but later you determine that it was scam, this is an example of:

A) spear phishing.
B) VPN.
C) phishing.
D) passphrase hacking.
Question
Match between columns
A system that allows someone to work online more securely by using encryption
tablet computer
A system that allows someone to work online more securely by using encryption
wiki
A system that allows someone to work online more securely by using encryption
web conference
A system that allows someone to work online more securely by using encryption
semantic technologies
A system that allows someone to work online more securely by using encryption
IP telephony
A system that allows someone to work online more securely by using encryption
the cloud
A system that allows someone to work online more securely by using encryption
two-factor authentication
A system that allows someone to work online more securely by using encryption
blog
A system that allows someone to work online more securely by using encryption
virtual private network
A system that allows someone to work online more securely by using encryption
passphrase
A wireless mobile device with a touch-screen panel that operates by touch or stylus and keyboard
tablet computer
A wireless mobile device with a touch-screen panel that operates by touch or stylus and keyboard
wiki
A wireless mobile device with a touch-screen panel that operates by touch or stylus and keyboard
web conference
A wireless mobile device with a touch-screen panel that operates by touch or stylus and keyboard
semantic technologies
A wireless mobile device with a touch-screen panel that operates by touch or stylus and keyboard
IP telephony
A wireless mobile device with a touch-screen panel that operates by touch or stylus and keyboard
the cloud
A wireless mobile device with a touch-screen panel that operates by touch or stylus and keyboard
two-factor authentication
A wireless mobile device with a touch-screen panel that operates by touch or stylus and keyboard
blog
A wireless mobile device with a touch-screen panel that operates by touch or stylus and keyboard
virtual private network
A wireless mobile device with a touch-screen panel that operates by touch or stylus and keyboard
passphrase
Measure computer science concept that has computers understanding meaning and context behind words, instead of just numbers, for a variety of uses to individuals and businesses
tablet computer
Measure computer science concept that has computers understanding meaning and context behind words, instead of just numbers, for a variety of uses to individuals and businesses
wiki
Measure computer science concept that has computers understanding meaning and context behind words, instead of just numbers, for a variety of uses to individuals and businesses
web conference
Measure computer science concept that has computers understanding meaning and context behind words, instead of just numbers, for a variety of uses to individuals and businesses
semantic technologies
Measure computer science concept that has computers understanding meaning and context behind words, instead of just numbers, for a variety of uses to individuals and businesses
IP telephony
Measure computer science concept that has computers understanding meaning and context behind words, instead of just numbers, for a variety of uses to individuals and businesses
the cloud
Measure computer science concept that has computers understanding meaning and context behind words, instead of just numbers, for a variety of uses to individuals and businesses
two-factor authentication
Measure computer science concept that has computers understanding meaning and context behind words, instead of just numbers, for a variety of uses to individuals and businesses
blog
Measure computer science concept that has computers understanding meaning and context behind words, instead of just numbers, for a variety of uses to individuals and businesses
virtual private network
Measure computer science concept that has computers understanding meaning and context behind words, instead of just numbers, for a variety of uses to individuals and businesses
passphrase
The transmission of voice over a private network or a public network such as the Internet
tablet computer
The transmission of voice over a private network or a public network such as the Internet
wiki
The transmission of voice over a private network or a public network such as the Internet
web conference
The transmission of voice over a private network or a public network such as the Internet
semantic technologies
The transmission of voice over a private network or a public network such as the Internet
IP telephony
The transmission of voice over a private network or a public network such as the Internet
the cloud
The transmission of voice over a private network or a public network such as the Internet
two-factor authentication
The transmission of voice over a private network or a public network such as the Internet
blog
The transmission of voice over a private network or a public network such as the Internet
virtual private network
The transmission of voice over a private network or a public network such as the Internet
passphrase
Uses an IP network to bring people in different geographic areas together using a website interface
tablet computer
Uses an IP network to bring people in different geographic areas together using a website interface
wiki
Uses an IP network to bring people in different geographic areas together using a website interface
web conference
Uses an IP network to bring people in different geographic areas together using a website interface
semantic technologies
Uses an IP network to bring people in different geographic areas together using a website interface
IP telephony
Uses an IP network to bring people in different geographic areas together using a website interface
the cloud
Uses an IP network to bring people in different geographic areas together using a website interface
two-factor authentication
Uses an IP network to bring people in different geographic areas together using a website interface
blog
Uses an IP network to bring people in different geographic areas together using a website interface
virtual private network
Uses an IP network to bring people in different geographic areas together using a website interface
passphrase
A website or group of web pages on which anyone can add, edit, or delete content
tablet computer
A website or group of web pages on which anyone can add, edit, or delete content
wiki
A website or group of web pages on which anyone can add, edit, or delete content
web conference
A website or group of web pages on which anyone can add, edit, or delete content
semantic technologies
A website or group of web pages on which anyone can add, edit, or delete content
IP telephony
A website or group of web pages on which anyone can add, edit, or delete content
the cloud
A website or group of web pages on which anyone can add, edit, or delete content
two-factor authentication
A website or group of web pages on which anyone can add, edit, or delete content
blog
A website or group of web pages on which anyone can add, edit, or delete content
virtual private network
A website or group of web pages on which anyone can add, edit, or delete content
passphrase
When you use more than a password to log into an account
tablet computer
When you use more than a password to log into an account
wiki
When you use more than a password to log into an account
web conference
When you use more than a password to log into an account
semantic technologies
When you use more than a password to log into an account
IP telephony
When you use more than a password to log into an account
the cloud
When you use more than a password to log into an account
two-factor authentication
When you use more than a password to log into an account
blog
When you use more than a password to log into an account
virtual private network
When you use more than a password to log into an account
passphrase
Using multiple words in a password
tablet computer
Using multiple words in a password
wiki
Using multiple words in a password
web conference
Using multiple words in a password
semantic technologies
Using multiple words in a password
IP telephony
Using multiple words in a password
the cloud
Using multiple words in a password
two-factor authentication
Using multiple words in a password
blog
Using multiple words in a password
virtual private network
Using multiple words in a password
passphrase
A web-based journal
tablet computer
A web-based journal
wiki
A web-based journal
web conference
A web-based journal
semantic technologies
A web-based journal
IP telephony
A web-based journal
the cloud
A web-based journal
two-factor authentication
A web-based journal
blog
A web-based journal
virtual private network
A web-based journal
passphrase
A remote network of servers that provide a service or run applications
tablet computer
A remote network of servers that provide a service or run applications
wiki
A remote network of servers that provide a service or run applications
web conference
A remote network of servers that provide a service or run applications
semantic technologies
A remote network of servers that provide a service or run applications
IP telephony
A remote network of servers that provide a service or run applications
the cloud
A remote network of servers that provide a service or run applications
two-factor authentication
A remote network of servers that provide a service or run applications
blog
A remote network of servers that provide a service or run applications
virtual private network
A remote network of servers that provide a service or run applications
passphrase
Question
When taking a telephone message for someone, include:

A) the caller's name and telephone number.
B) the date and time of the call.
C) the exact message.
D) All the above
Question
Businesses often use ________ to provide product information, advertise, and gather data from specific groups.

A) VPN
B) social networks
C) two-factor authentication
D) spear phishing
Question
Cloud computing involves:

A) storing files remotely.
B) allowing access to files from any device with Internet access.
C) running software applications remotely.
D) All the above
Question
When your business telephone rings:

A) do not answer before the third ring.
B) answer by identifying your company or department and giving your name.
C) do not offer to transfer the caller to someone else who can help the caller.
D) answer in a brisk, impatient tone to let the caller know you are busy.
Question
Web 3.0:

A) analyzes information from different viewpoints.
B) condenses information into something more usable.
C) involves the World Wide Web as one large database.
D) All the above
Question
For the security of your computer data:

A) it is not important to make backup copies of the data.
B) you should keep your password written in a place that is easy to find.
C) you should update and run antivirus software regularly.
D) you should not install a firewall.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/31
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 8: Communicating With Technology
1
A fax machine copies or scans a document containing text or pictures and sends the image to a destination fax machine, printer, or computer.
True
2
Two or more telephones, computers, or other devices connected for purposes of communicating and sharing resources is a(n) :

A) firewall.
B) network.
C) analog network.
D) All the above
B
3
To observe proper cell phone etiquette, you should turn off your cell phone or use the silent alert setting in one-on-one interactions and during meetings, classes, and other public events.
True
4
The transmission of electronic information (text, data, voice, video, and images) from one location to another is:

A) telecommunications.
B) phishing.
C) spamming.
D) telephony.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
5
The next generation of the web involves smarter browsers.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
6
An unaware employee can be an organization's greatest weakness when it comes to data security.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
7
As an administrative professional, you may be expected to screen incoming calls for your supervisor.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
8
When leaving a voice message, include a number where you can be reached but do not give your name for security reasons.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
9
Screencasts are used in business to show clients how to use a product or service.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
10
Email messages can be used to transfer files via a network as email attachments.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
11
An intelligent mobile hotspot is:

A) a portable Internet connection.
B) can keep devices connected all the time.
C) can be a smartphone feature.
D) All the above
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
12
A network that covers a small geographical area is known as a:

A) LAN.
B) MAN.
C) WAN.
D) All the above
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
13
Instant messaging is quick and easy to use, and just as with email messages, the content of the message is private and secure.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
14
When planning a business call, you should be aware of the time zone differences for the caller and the recipient.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
15
You should not use passwords that are based on personal information that can be easily accessed or guessed.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
16
Businesses do not use public blogs to create forums for exchanging product information.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
17
The content of a wiki entry can be edited by the person who posted the entry or by the wiki administrator but not by others who read the entry.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
18
A WAN is a network that links computers, printers, and other devices:

A) within a single office building.
B) within several nearby buildings.
C) across a city or region.
D) across a large geographical area.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
19
Cyber criminals rarely target organizations.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
20
In a video conference, two or more people located in separate geographical areas communicate by exchanging text messages.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
21
The most popular workplace collaboration tool is:

A) screencasting.
B) social media.
C) video conferencing.
D) email.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
22
Web 2.0:

A) does not exist.
B) is a more interactive version of the web.
C) capitalizes on data mining.
D) All the above
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following offers a way to collaborate?

A) It blogs
B) Wiki
C) Social media
D) All the above
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
24
If you receive an email that at first appears to be from your bank but later you determine that it was scam, this is an example of:

A) spear phishing.
B) VPN.
C) phishing.
D) passphrase hacking.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
25
Match between columns
A system that allows someone to work online more securely by using encryption
tablet computer
A system that allows someone to work online more securely by using encryption
wiki
A system that allows someone to work online more securely by using encryption
web conference
A system that allows someone to work online more securely by using encryption
semantic technologies
A system that allows someone to work online more securely by using encryption
IP telephony
A system that allows someone to work online more securely by using encryption
the cloud
A system that allows someone to work online more securely by using encryption
two-factor authentication
A system that allows someone to work online more securely by using encryption
blog
A system that allows someone to work online more securely by using encryption
virtual private network
A system that allows someone to work online more securely by using encryption
passphrase
A wireless mobile device with a touch-screen panel that operates by touch or stylus and keyboard
tablet computer
A wireless mobile device with a touch-screen panel that operates by touch or stylus and keyboard
wiki
A wireless mobile device with a touch-screen panel that operates by touch or stylus and keyboard
web conference
A wireless mobile device with a touch-screen panel that operates by touch or stylus and keyboard
semantic technologies
A wireless mobile device with a touch-screen panel that operates by touch or stylus and keyboard
IP telephony
A wireless mobile device with a touch-screen panel that operates by touch or stylus and keyboard
the cloud
A wireless mobile device with a touch-screen panel that operates by touch or stylus and keyboard
two-factor authentication
A wireless mobile device with a touch-screen panel that operates by touch or stylus and keyboard
blog
A wireless mobile device with a touch-screen panel that operates by touch or stylus and keyboard
virtual private network
A wireless mobile device with a touch-screen panel that operates by touch or stylus and keyboard
passphrase
Measure computer science concept that has computers understanding meaning and context behind words, instead of just numbers, for a variety of uses to individuals and businesses
tablet computer
Measure computer science concept that has computers understanding meaning and context behind words, instead of just numbers, for a variety of uses to individuals and businesses
wiki
Measure computer science concept that has computers understanding meaning and context behind words, instead of just numbers, for a variety of uses to individuals and businesses
web conference
Measure computer science concept that has computers understanding meaning and context behind words, instead of just numbers, for a variety of uses to individuals and businesses
semantic technologies
Measure computer science concept that has computers understanding meaning and context behind words, instead of just numbers, for a variety of uses to individuals and businesses
IP telephony
Measure computer science concept that has computers understanding meaning and context behind words, instead of just numbers, for a variety of uses to individuals and businesses
the cloud
Measure computer science concept that has computers understanding meaning and context behind words, instead of just numbers, for a variety of uses to individuals and businesses
two-factor authentication
Measure computer science concept that has computers understanding meaning and context behind words, instead of just numbers, for a variety of uses to individuals and businesses
blog
Measure computer science concept that has computers understanding meaning and context behind words, instead of just numbers, for a variety of uses to individuals and businesses
virtual private network
Measure computer science concept that has computers understanding meaning and context behind words, instead of just numbers, for a variety of uses to individuals and businesses
passphrase
The transmission of voice over a private network or a public network such as the Internet
tablet computer
The transmission of voice over a private network or a public network such as the Internet
wiki
The transmission of voice over a private network or a public network such as the Internet
web conference
The transmission of voice over a private network or a public network such as the Internet
semantic technologies
The transmission of voice over a private network or a public network such as the Internet
IP telephony
The transmission of voice over a private network or a public network such as the Internet
the cloud
The transmission of voice over a private network or a public network such as the Internet
two-factor authentication
The transmission of voice over a private network or a public network such as the Internet
blog
The transmission of voice over a private network or a public network such as the Internet
virtual private network
The transmission of voice over a private network or a public network such as the Internet
passphrase
Uses an IP network to bring people in different geographic areas together using a website interface
tablet computer
Uses an IP network to bring people in different geographic areas together using a website interface
wiki
Uses an IP network to bring people in different geographic areas together using a website interface
web conference
Uses an IP network to bring people in different geographic areas together using a website interface
semantic technologies
Uses an IP network to bring people in different geographic areas together using a website interface
IP telephony
Uses an IP network to bring people in different geographic areas together using a website interface
the cloud
Uses an IP network to bring people in different geographic areas together using a website interface
two-factor authentication
Uses an IP network to bring people in different geographic areas together using a website interface
blog
Uses an IP network to bring people in different geographic areas together using a website interface
virtual private network
Uses an IP network to bring people in different geographic areas together using a website interface
passphrase
A website or group of web pages on which anyone can add, edit, or delete content
tablet computer
A website or group of web pages on which anyone can add, edit, or delete content
wiki
A website or group of web pages on which anyone can add, edit, or delete content
web conference
A website or group of web pages on which anyone can add, edit, or delete content
semantic technologies
A website or group of web pages on which anyone can add, edit, or delete content
IP telephony
A website or group of web pages on which anyone can add, edit, or delete content
the cloud
A website or group of web pages on which anyone can add, edit, or delete content
two-factor authentication
A website or group of web pages on which anyone can add, edit, or delete content
blog
A website or group of web pages on which anyone can add, edit, or delete content
virtual private network
A website or group of web pages on which anyone can add, edit, or delete content
passphrase
When you use more than a password to log into an account
tablet computer
When you use more than a password to log into an account
wiki
When you use more than a password to log into an account
web conference
When you use more than a password to log into an account
semantic technologies
When you use more than a password to log into an account
IP telephony
When you use more than a password to log into an account
the cloud
When you use more than a password to log into an account
two-factor authentication
When you use more than a password to log into an account
blog
When you use more than a password to log into an account
virtual private network
When you use more than a password to log into an account
passphrase
Using multiple words in a password
tablet computer
Using multiple words in a password
wiki
Using multiple words in a password
web conference
Using multiple words in a password
semantic technologies
Using multiple words in a password
IP telephony
Using multiple words in a password
the cloud
Using multiple words in a password
two-factor authentication
Using multiple words in a password
blog
Using multiple words in a password
virtual private network
Using multiple words in a password
passphrase
A web-based journal
tablet computer
A web-based journal
wiki
A web-based journal
web conference
A web-based journal
semantic technologies
A web-based journal
IP telephony
A web-based journal
the cloud
A web-based journal
two-factor authentication
A web-based journal
blog
A web-based journal
virtual private network
A web-based journal
passphrase
A remote network of servers that provide a service or run applications
tablet computer
A remote network of servers that provide a service or run applications
wiki
A remote network of servers that provide a service or run applications
web conference
A remote network of servers that provide a service or run applications
semantic technologies
A remote network of servers that provide a service or run applications
IP telephony
A remote network of servers that provide a service or run applications
the cloud
A remote network of servers that provide a service or run applications
two-factor authentication
A remote network of servers that provide a service or run applications
blog
A remote network of servers that provide a service or run applications
virtual private network
A remote network of servers that provide a service or run applications
passphrase
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
26
When taking a telephone message for someone, include:

A) the caller's name and telephone number.
B) the date and time of the call.
C) the exact message.
D) All the above
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
27
Businesses often use ________ to provide product information, advertise, and gather data from specific groups.

A) VPN
B) social networks
C) two-factor authentication
D) spear phishing
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
28
Cloud computing involves:

A) storing files remotely.
B) allowing access to files from any device with Internet access.
C) running software applications remotely.
D) All the above
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
29
When your business telephone rings:

A) do not answer before the third ring.
B) answer by identifying your company or department and giving your name.
C) do not offer to transfer the caller to someone else who can help the caller.
D) answer in a brisk, impatient tone to let the caller know you are busy.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
30
Web 3.0:

A) analyzes information from different viewpoints.
B) condenses information into something more usable.
C) involves the World Wide Web as one large database.
D) All the above
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
31
For the security of your computer data:

A) it is not important to make backup copies of the data.
B) you should keep your password written in a place that is easy to find.
C) you should update and run antivirus software regularly.
D) you should not install a firewall.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 31 flashcards in this deck.