Exam 10: Global Communication - Technology and Etiquette

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

_____ is a program that attaches itself to files or software so it can spread to other files or programs.

Free
(Multiple Choice)
4.8/5
(41)
Correct Answer:
Verified

A

Which is the best choice for a business to provide just-in-time training for employees?

Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
Verified

A

A cellular phone with many of the functions of a handheld computer
The transmitting of voice over the Internet
VoIP
Using an online message that seems to be from a legitimate source to steal personal information
p2p file sharing
A system of sharing files on an informal network with others who have the same software
Web 2.0
Correct Answer:
Verified
Premises:
Responses:
The transmitting of voice over the Internet
VoIP
Using an online message that seems to be from a legitimate source to steal personal information
p2p file sharing
A system of sharing files on an informal network with others who have the same software
Web 2.0
Using the Internet to have a meeting
cloud computing
A cellular phone with many of the functions of a handheld computer
intelligent mobile hotspot
A traveling Internet connection
phishing
Web resources that are interactive
smartphone
The use of computer services from virtual servers available on demand over the Internet
web conferencing
Software that runs on a handheld device or computer
mobile app
The transmission of text, data, voice, video, and images electronically from one location to another
telecommunications
Free
(Matching)
4.9/5
(31)
Correct Answer:
Verified

Richard received a work-related call while he was standing in line at the post office. The information was important and related to a sensitive topic, so he handled the call while in line. Richard made the right choice.

(True/False)
4.8/5
(37)

A 48-hour turnaround on answering e-mail is acceptable.

(True/False)
4.8/5
(31)

_____ is a malicious, self-replicating program that does not need human interaction to spread.

(Multiple Choice)
4.9/5
(33)

_____ typically scans incoming e-mail for hidden threats and alerts users when an attempt to infect the computer is detected.

(Multiple Choice)
4.8/5
(34)

Yearly credit checks are not necessary since you will know if someone steals your personal information.

(True/False)
4.9/5
(42)

Correct capitalization and spelling are not necessary for instant messaging (IM) in the workplace since IM is casual in nature.

(True/False)
4.9/5
(30)

Some social networks also have professional uses.

(True/False)
4.8/5
(28)

You should put your cell phone on silent or vibrate before going into a meeting.

(True/False)
4.8/5
(37)

_____ is software that can be installed on your computer without your knowledge and that tracks the websites you view.

(Multiple Choice)
4.7/5
(39)

When creating a password, you should use words from the dictionary if possible.

(True/False)
5.0/5
(28)

Communication skills are not as important for the virtual office professional because of the lack of face-to-face contact.

(True/False)
4.7/5
(39)

Text messaging is for personal use, not professional or business use.

(True/False)
4.8/5
(37)

Mobile devices offer portability and productivity options for the administrative professional.

(True/False)
4.9/5
(36)

For the administrative professional, one of the primary uses of cloud computing is

(Multiple Choice)
4.8/5
(29)

_____ is malicious software designed to look like something interesting or useful.

(Multiple Choice)
4.8/5
(36)

An iPad2 is an example of a

(Multiple Choice)
4.7/5
(40)

To protect your computer from spyware, make sure you have

(Multiple Choice)
4.8/5
(36)
Showing 1 - 20 of 21
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)