Exam 9: Technology and Information Competency

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

You should avoid using detailed subject lines in e-mails to instructors. Informative subject lines help recipients sort out your message from the dozens of others that may be clogging their in-boxes.

Free
(True/False)
4.9/5
(32)
Correct Answer:
Verified

False

A program that provides a way of navigation around the information on the web is referred to as a

Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
Verified

B

Courses that combine traditional face-to-face and online methods are referred to as

Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
Verified

A

Measures taken to protect computers and computer systems against unauthorized access or attack is referred to as

(Multiple Choice)
4.8/5
(42)

Teaching courses via video technology or the web is referred to as

(Multiple Choice)
4.9/5
(37)

The criminal practice of attempting to trick e-mail users into disclosing personal information such as bank account or credit card numbers is know as

(Multiple Choice)
4.9/5
(43)

A podcast is a

(Multiple Choice)
4.8/5
(32)

The fact that anyone can put information on the web is both the biggest asset and greatest disadvantage of using the web as an information source. Because minimal computer skill is the only expertise a person needs to set up a web page, there may be as much misinformation on the web as there is accurate information.

(True/False)
4.8/5
(32)

A wiki is a

(Multiple Choice)
4.7/5
(37)

Information competency is the ability to determine what information is necessary, and then to locate, evaluate, and effectively use that information. With the sheer amount of information available today, information competency is a critical skill.

(True/False)
4.9/5
(31)

If you have an important point to make in an e-mail, it is a good idea to use all capital letters. Using all capital letters is seen as poor e-mail netiquette because it makes it look like you are shouting.

(True/False)
4.9/5
(33)

What are some different ways to deal with virtual junk mail known as spam?

(Essay)
4.8/5
(39)

Lecture capture technology is a

(Multiple Choice)
4.8/5
(33)

What are four criteria you should use to evaluate the accuracy of information located on the web?

(Essay)
4.8/5
(30)

Which of these options is an example of individual response technology?

(Multiple Choice)
4.9/5
(34)

You are using the college library to do research for a paper. However, the two books you need most are missing from the stacks. What can you do to find out where they are so that you can use them?

(Essay)
4.9/5
(34)

Individual response technology is

(Multiple Choice)
5.0/5
(40)

The Internet is

(Multiple Choice)
4.8/5
(45)

What are some netiquette rules you should keep in mind when writing an e-mail to an instructor?

(Essay)
4.8/5
(33)

A blog is a

(Multiple Choice)
5.0/5
(39)
Showing 1 - 20 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)