Exam 26: Communications and Collaboration

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Software routing is one process that can be used to cut down or eliminate most junk mail.

Free
(True/False)
4.8/5
(27)
Correct Answer:
Verified

False

A(n) ____________________ is a virus that does not cause its damage until a certain date or until the system has been booted a certain number of times.

Free
(Short Answer)
4.8/5
(30)
Correct Answer:
Verified

time bomb

Users may need a(n) password in order to log on to a computer system or to specific parts of it.

Free
(True/False)
4.8/5
(29)
Correct Answer:
Verified

True

In most instances, electronic communications use voice rather than text or graphics.

(True/False)
4.9/5
(39)

E-mail ____________________ is a computer crime that involves the manipulation of a computer or computer data in order to dishonestly obtain money, property, information, or other things of value, or to cause loss.

(Short Answer)
4.7/5
(39)

It is possible to add a hyperlink to a message rather than attaching a file.

(True/False)
4.7/5
(33)

Which of the following allows people to use voice, full-motion video, and interactive desktop sharing?

(Multiple Choice)
4.9/5
(32)

Case 26-1 Gilbert uses Windows Mail as his e-mail program. He has been getting a lot of junk e-mail in his inbox and wants to take steps to help prevent the number of unsolicited messages that he receives. The type of junk e-mail that Gilbert is receiving is called ____.

(Multiple Choice)
4.8/5
(41)

Case 26-2 Wanda has just been hired to work for a Web design company. As part of her new employee training, her supervisor reviews the company's list of guidelines for the use of electronic communications. Wanda's supervisor explains that she is expected to follow the rules of ____ when communicating through electronic media.

(Multiple Choice)
4.9/5
(43)

The best way to protect data on a computer is to effectively control access.

(True/False)
4.9/5
(33)

Which type of correspondence is possible with electronic communication?

(Multiple Choice)
4.8/5
(30)

A worm is a type of virus that has to attach itself to other files in order to spread.

(True/False)
4.7/5
(33)

____ is the process of selecting paths in a network along which to send network traffic.

(Multiple Choice)
4.9/5
(37)

FIGURE 26-1 FIGURE 26-1   Figure 26-1 above shows an example of ____. Figure 26-1 above shows an example of ____.

(Multiple Choice)
4.8/5
(29)

What is the estimated yearly cost of spam for U.S. businesses?

(Multiple Choice)
4.9/5
(42)

GlobalSign and VeriSign are commercial digital ID groups that can help you ____.

(Multiple Choice)
5.0/5
(37)

Which of the following was originally developed to facilitate the syndication of news articles?

(Multiple Choice)
4.8/5
(31)

Which of the following is not a sort option for displaying the History list in Internet Explorer?

(Multiple Choice)
4.7/5
(35)

Encryption technologies can help keep ____ information secure.

(Multiple Choice)
4.8/5
(37)

What is a virus? How can a virus spread? What are some things you can do to help prevent a virus from infecting your computer?

(Essay)
4.9/5
(36)
Showing 1 - 20 of 46
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)