Deck 8: Communicating With Technology
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/31
Play
Full screen (f)
Deck 8: Communicating With Technology
1
A fax machine copies or scans a document containing text or pictures and sends the image to a destination fax machine, printer, or computer.
True
2
Two or more telephones, computers, or other devices connected for purposes of communicating and sharing resources is a(n) :
A) firewall.
B) network.
C) analog network.
D) All the above
A) firewall.
B) network.
C) analog network.
D) All the above
B
3
To observe proper cell phone etiquette, you should turn off your cell phone or use the silent alert setting in one-on-one interactions and during meetings, classes, and other public events.
True
4
The transmission of electronic information (text, data, voice, video, and images) from one location to another is:
A) telecommunications.
B) phishing.
C) spamming.
D) telephony.
A) telecommunications.
B) phishing.
C) spamming.
D) telephony.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
5
The next generation of the web involves smarter browsers.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
6
An unaware employee can be an organization's greatest weakness when it comes to data security.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
7
As an administrative professional, you may be expected to screen incoming calls for your supervisor.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
8
When leaving a voice message, include a number where you can be reached but do not give your name for security reasons.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
9
Screencasts are used in business to show clients how to use a product or service.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
10
Email messages can be used to transfer files via a network as email attachments.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
11
An intelligent mobile hotspot is:
A) a portable Internet connection.
B) can keep devices connected all the time.
C) can be a smartphone feature.
D) All the above
A) a portable Internet connection.
B) can keep devices connected all the time.
C) can be a smartphone feature.
D) All the above
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
12
A network that covers a small geographical area is known as a:
A) LAN.
B) MAN.
C) WAN.
D) All the above
A) LAN.
B) MAN.
C) WAN.
D) All the above
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
13
Instant messaging is quick and easy to use, and just as with email messages, the content of the message is private and secure.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
14
When planning a business call, you should be aware of the time zone differences for the caller and the recipient.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
15
You should not use passwords that are based on personal information that can be easily accessed or guessed.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
16
Businesses do not use public blogs to create forums for exchanging product information.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
17
The content of a wiki entry can be edited by the person who posted the entry or by the wiki administrator but not by others who read the entry.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
18
A WAN is a network that links computers, printers, and other devices:
A) within a single office building.
B) within several nearby buildings.
C) across a city or region.
D) across a large geographical area.
A) within a single office building.
B) within several nearby buildings.
C) across a city or region.
D) across a large geographical area.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
19
Cyber criminals rarely target organizations.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
20
In a video conference, two or more people located in separate geographical areas communicate by exchanging text messages.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
21
The most popular workplace collaboration tool is:
A) screencasting.
B) social media.
C) video conferencing.
D) email.
A) screencasting.
B) social media.
C) video conferencing.
D) email.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
22
Web 2.0:
A) does not exist.
B) is a more interactive version of the web.
C) capitalizes on data mining.
D) All the above
A) does not exist.
B) is a more interactive version of the web.
C) capitalizes on data mining.
D) All the above
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following offers a way to collaborate?
A) It blogs
B) Wiki
C) Social media
D) All the above
A) It blogs
B) Wiki
C) Social media
D) All the above
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
24
If you receive an email that at first appears to be from your bank but later you determine that it was scam, this is an example of:
A) spear phishing.
B) VPN.
C) phishing.
D) passphrase hacking.
A) spear phishing.
B) VPN.
C) phishing.
D) passphrase hacking.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
25
Match between columns
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
26
When taking a telephone message for someone, include:
A) the caller's name and telephone number.
B) the date and time of the call.
C) the exact message.
D) All the above
A) the caller's name and telephone number.
B) the date and time of the call.
C) the exact message.
D) All the above
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
27
Businesses often use ________ to provide product information, advertise, and gather data from specific groups.
A) VPN
B) social networks
C) two-factor authentication
D) spear phishing
A) VPN
B) social networks
C) two-factor authentication
D) spear phishing
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
28
Cloud computing involves:
A) storing files remotely.
B) allowing access to files from any device with Internet access.
C) running software applications remotely.
D) All the above
A) storing files remotely.
B) allowing access to files from any device with Internet access.
C) running software applications remotely.
D) All the above
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
29
When your business telephone rings:
A) do not answer before the third ring.
B) answer by identifying your company or department and giving your name.
C) do not offer to transfer the caller to someone else who can help the caller.
D) answer in a brisk, impatient tone to let the caller know you are busy.
A) do not answer before the third ring.
B) answer by identifying your company or department and giving your name.
C) do not offer to transfer the caller to someone else who can help the caller.
D) answer in a brisk, impatient tone to let the caller know you are busy.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
30
Web 3.0:
A) analyzes information from different viewpoints.
B) condenses information into something more usable.
C) involves the World Wide Web as one large database.
D) All the above
A) analyzes information from different viewpoints.
B) condenses information into something more usable.
C) involves the World Wide Web as one large database.
D) All the above
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
31
For the security of your computer data:
A) it is not important to make backup copies of the data.
B) you should keep your password written in a place that is easy to find.
C) you should update and run antivirus software regularly.
D) you should not install a firewall.
A) it is not important to make backup copies of the data.
B) you should keep your password written in a place that is easy to find.
C) you should update and run antivirus software regularly.
D) you should not install a firewall.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck