Deck 14: Communicating Through Social and Other Interactive Media

Full screen (f)
exit full mode
Question
In the realm of social media, the idea that we don't know exactly who is reading our posts is labeled _____.

A) enculturation
B) mutual enrichment
C) social presence theory
D) collapsing contexts
Use Space or
up arrow
down arrow
to flip the card.
Question
________ theory suggests that interactive media communication has a lesser information-carrying capacity when compared to face-to-face communication because it removes most nonverbal cues.

A) Media richness
B) Uncertainty reduction
C) Social presence theory
D) Multiphrenic
Question
When one creates an intentionally deceptive social media profile, it is known as ________.

A) catfishing
B) lurking
C) hoaxing
D) spamming
Question
According to social presence theory, which of the following media would make Jonathan and Judy's long-distance relationship closer?

A) talking on the phone
B) emailing
C) texting
D) video chatting
Question
People who read, observe, but do not actively participate in online communities are called ________.

A) spammers
B) lurkers
C) hoaxers
D) phishers
Question
Karen's office stores data online on multiple servers which are accessible from multiple locations. Her office uses _____.

A) Q-filing
B) cloud storage
C) databases
D) interactive filing
Question
Which of the following seems to be the most important impact of interactive media?

A) connecting with others
B) searching for and exchanging information
C) entertainment
D) financial transactions
Question
Donna is short on ________ because she does not have access to technological skills and resources.

A) technocapital
B) socio-capital
C) ethno-capital
D) cultural capital
Question
Social presence theory suggests that face-to-face communication is generally low in social presence.
Question
Which of the following is NOT a level of technocapital according to the theory of Jan van Dijk?

A) mental access
B) material access
C) skill access
D) personal access
Question
According to media richness theory, face-to-face communication is the richest medium for communication.
Question
Those with the most power in a society decide what constitutes ________ capital, which are the certain bodies of cultural knowledge and competencies.

A) economic
B) cultural
C) critical
D) social
Question
The repeated and deliberate misuse of communication technology by an individual or group to threaten or harm others is called _____.

A) cyberbullying
B) spamming
C) phishing
D) hoaxing
Question
Based on the theory by Jan van Dijk, the level of technocapital known as material access to _____is where most public policy currently focuses.

A) financial competencies
B) software
C) digital hardware
D) technology education
Question
Though only about 15 percent of Americans are not online, in many countries, only a tiny fraction of the population even has access to computers and the Internet. This gap is referred to as the ________.

A) digital divide
B) technology gap
C) techno-capital
D) spatial digitalization
Question
The feelings of psychological closeness that people experience when they interact with each other are known as _____.

A) media richness
B) uncertainty reduction
C) social presence
D) multiphrenic
Question
Which of the following is typically the "richest" medium?

A) e-mail
B) video chat
C) face-to-face
D) text messaging
Question
Interactive media communication, like Skype, and telephone communication are considered synchronous.
Question
The ease with which content can be spread on social media is called lurking.
Question
Asynchronicity occurs when interactive media messages are sent and received at different times.
Question
E-mail communication is considered ________ because messages are not sent and received at the same time.
Question
Religious views and political views when presented online are considered potential forms of stigmatizing information.
Question
Describe the communication that occurs face-to-face versus communication that occurs via interactive media communication. What are the advantages and disadvantages of each approach?
Question
The fastest growing group of Internet users is older people 70+).
Question
Detail ways to improve mediated communication skills for e-mail and mobile phone usage.
Question
What can college students do to bridge the digital divide? Provide two ideas and explain how they are or are not ethical response.
Question
Projecting a false identity, also called ________, is possible with interactive media communication.
Question
Recent reports show that some males who play online video games purposely harass female players in order to get them to stop playing the games. This is an example of _____.
Question
Having access to technological skills and resources is referred to as ________.
Question
E-mails from foreign princes asking for wired funds are attempts at accessing consumer banking, an act called ________.
Question
The idea of diffusion of innovations suggests that people must see technology as useful and compatible with their everyday lives.
Question
Phishing refers to posting Internet messages that are meant to intentionally anger or frustrate in order to provoke reactions from others.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/32
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 14: Communicating Through Social and Other Interactive Media
1
In the realm of social media, the idea that we don't know exactly who is reading our posts is labeled _____.

A) enculturation
B) mutual enrichment
C) social presence theory
D) collapsing contexts
D
2
________ theory suggests that interactive media communication has a lesser information-carrying capacity when compared to face-to-face communication because it removes most nonverbal cues.

A) Media richness
B) Uncertainty reduction
C) Social presence theory
D) Multiphrenic
A
3
When one creates an intentionally deceptive social media profile, it is known as ________.

A) catfishing
B) lurking
C) hoaxing
D) spamming
A
4
According to social presence theory, which of the following media would make Jonathan and Judy's long-distance relationship closer?

A) talking on the phone
B) emailing
C) texting
D) video chatting
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
5
People who read, observe, but do not actively participate in online communities are called ________.

A) spammers
B) lurkers
C) hoaxers
D) phishers
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
6
Karen's office stores data online on multiple servers which are accessible from multiple locations. Her office uses _____.

A) Q-filing
B) cloud storage
C) databases
D) interactive filing
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following seems to be the most important impact of interactive media?

A) connecting with others
B) searching for and exchanging information
C) entertainment
D) financial transactions
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
8
Donna is short on ________ because she does not have access to technological skills and resources.

A) technocapital
B) socio-capital
C) ethno-capital
D) cultural capital
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
9
Social presence theory suggests that face-to-face communication is generally low in social presence.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following is NOT a level of technocapital according to the theory of Jan van Dijk?

A) mental access
B) material access
C) skill access
D) personal access
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
11
According to media richness theory, face-to-face communication is the richest medium for communication.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
12
Those with the most power in a society decide what constitutes ________ capital, which are the certain bodies of cultural knowledge and competencies.

A) economic
B) cultural
C) critical
D) social
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
13
The repeated and deliberate misuse of communication technology by an individual or group to threaten or harm others is called _____.

A) cyberbullying
B) spamming
C) phishing
D) hoaxing
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
14
Based on the theory by Jan van Dijk, the level of technocapital known as material access to _____is where most public policy currently focuses.

A) financial competencies
B) software
C) digital hardware
D) technology education
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
15
Though only about 15 percent of Americans are not online, in many countries, only a tiny fraction of the population even has access to computers and the Internet. This gap is referred to as the ________.

A) digital divide
B) technology gap
C) techno-capital
D) spatial digitalization
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
16
The feelings of psychological closeness that people experience when they interact with each other are known as _____.

A) media richness
B) uncertainty reduction
C) social presence
D) multiphrenic
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is typically the "richest" medium?

A) e-mail
B) video chat
C) face-to-face
D) text messaging
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
18
Interactive media communication, like Skype, and telephone communication are considered synchronous.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
19
The ease with which content can be spread on social media is called lurking.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
20
Asynchronicity occurs when interactive media messages are sent and received at different times.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
21
E-mail communication is considered ________ because messages are not sent and received at the same time.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
22
Religious views and political views when presented online are considered potential forms of stigmatizing information.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
23
Describe the communication that occurs face-to-face versus communication that occurs via interactive media communication. What are the advantages and disadvantages of each approach?
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
24
The fastest growing group of Internet users is older people 70+).
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
25
Detail ways to improve mediated communication skills for e-mail and mobile phone usage.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
26
What can college students do to bridge the digital divide? Provide two ideas and explain how they are or are not ethical response.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
27
Projecting a false identity, also called ________, is possible with interactive media communication.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
28
Recent reports show that some males who play online video games purposely harass female players in order to get them to stop playing the games. This is an example of _____.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
29
Having access to technological skills and resources is referred to as ________.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
30
E-mails from foreign princes asking for wired funds are attempts at accessing consumer banking, an act called ________.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
31
The idea of diffusion of innovations suggests that people must see technology as useful and compatible with their everyday lives.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
32
Phishing refers to posting Internet messages that are meant to intentionally anger or frustrate in order to provoke reactions from others.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 32 flashcards in this deck.