Exam 26: Communications and Collaboration
Exam 1: Computers and Computer Systems46 Questions
Exam 2: Input, Output, and Processing46 Questions
Exam 3: Computer Protection46 Questions
Exam 4: Computer Maintenance46 Questions
Exam 5: Computer-Related Issues46 Questions
Exam 6: Software and Hardware Interaction46 Questions
Exam 7: Software Fundamentals46 Questions
Exam 8: Operating Systems46 Questions
Exam 9: Windows Management46 Questions
Exam 10: Operating System Customization46 Questions
Exam 11: Exploring Microsoft Office 200746 Questions
Exam 12: Getting Started With Word Essentials46 Questions
Exam 13: Editing and Formatting Documents46 Questions
Exam 14: Sharing Documents46 Questions
Exam 15: Working With Tables46 Questions
Exam 16: Enhancing Documents46 Questions
Exam 17: Getting Started With Excel Essentials46 Questions
Exam 18: Organizing and Enhancing Worksheets46 Questions
Exam 19: Creating Formulas and Charting Data46 Questions
Exam 20: Getting Started With Powerpoint Essentials46 Questions
Exam 21: Enhancing Presentations With Multimedia Effects46 Questions
Exam 22: Getting Started With Access Essentials46 Questions
Exam 23: Managing and Reporting Database Information46 Questions
Exam 24: Network Fundamentals46 Questions
Exam 25: Communication Services46 Questions
Exam 26: Communications and Collaboration46 Questions
Exam 27: Using the Internet and the World Wide Web46 Questions
Exam 28: Web Content46 Questions
Exam 29: Technology and Society46 Questions
Exam 30: Computer Safety and Ethics46 Questions
Select questions type
Software routing is one process that can be used to cut down or eliminate most junk mail.
Free
(True/False)
4.8/5
(27)
Correct Answer:
False
A(n) ____________________ is a virus that does not cause its damage until a certain date or until the system has been booted a certain number of times.
Free
(Short Answer)
4.8/5
(30)
Correct Answer:
time bomb
Users may need a(n) password in order to log on to a computer system or to specific parts of it.
Free
(True/False)
4.8/5
(29)
Correct Answer:
True
In most instances, electronic communications use voice rather than text or graphics.
(True/False)
4.9/5
(39)
E-mail ____________________ is a computer crime that involves the manipulation of a computer or computer data in order to dishonestly obtain money, property, information, or other things of value, or to cause loss.
(Short Answer)
4.7/5
(39)
It is possible to add a hyperlink to a message rather than attaching a file.
(True/False)
4.7/5
(33)
Which of the following allows people to use voice, full-motion video, and interactive desktop sharing?
(Multiple Choice)
4.9/5
(32)
Case 26-1 Gilbert uses Windows Mail as his e-mail program. He has been getting a lot of junk e-mail in his inbox and wants to take steps to help prevent the number of unsolicited messages that he receives. The type of junk e-mail that Gilbert is receiving is called ____.
(Multiple Choice)
4.8/5
(41)
Case 26-2 Wanda has just been hired to work for a Web design company. As part of her new employee training, her supervisor reviews the company's list of guidelines for the use of electronic communications. Wanda's supervisor explains that she is expected to follow the rules of ____ when communicating through electronic media.
(Multiple Choice)
4.9/5
(43)
The best way to protect data on a computer is to effectively control access.
(True/False)
4.9/5
(33)
Which type of correspondence is possible with electronic communication?
(Multiple Choice)
4.8/5
(30)
A worm is a type of virus that has to attach itself to other files in order to spread.
(True/False)
4.7/5
(33)
____ is the process of selecting paths in a network along which to send network traffic.
(Multiple Choice)
4.9/5
(37)
What is the estimated yearly cost of spam for U.S. businesses?
(Multiple Choice)
4.9/5
(42)
GlobalSign and VeriSign are commercial digital ID groups that can help you ____.
(Multiple Choice)
5.0/5
(37)
Which of the following was originally developed to facilitate the syndication of news articles?
(Multiple Choice)
4.8/5
(31)
Which of the following is not a sort option for displaying the History list in Internet Explorer?
(Multiple Choice)
4.7/5
(35)
Encryption technologies can help keep ____ information secure.
(Multiple Choice)
4.8/5
(37)
What is a virus? How can a virus spread? What are some things you can do to help prevent a virus from infecting your computer?
(Essay)
4.9/5
(36)
Showing 1 - 20 of 46
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)