Exam 27: Communications and Collaboration
Exam 1: Computers and Computer Systems46 Questions
Exam 2: Input, Output and Processing46 Questions
Exam 3: Computer Protection46 Questions
Exam 4: Computer Maintenance46 Questions
Exam 5: Computer-Related Issues46 Questions
Exam 6: Software and Hardware Interaction46 Questions
Exam 7: Software Fundamentals46 Questions
Exam 8: Operating Systems46 Questions
Exam 9: Windows Management46 Questions
Exam 10: Operating System Customization46 Questions
Exam 11: Exploring Microsoft Office 201046 Questions
Exam 12: Getting Started With Word Essentials46 Questions
Exam 13: Editing and Formatting Documents46 Questions
Exam 14: Sharing Documents46 Questions
Exam 15: Working With Tables46 Questions
Exam 16: Using Templates, Styles, and Building Blocks46 Questions
Exam 17: Enhancing Documents46 Questions
Exam 18: Getting Started With Excel Essentials46 Questions
Exam 19: Organizing and Enhancing Worksheets46 Questions
Exam 20: Creating Formulas and Charting Data46 Questions
Exam 21: Getting Started With Powerpoint Essentials46 Questions
Exam 22: Enhancing Presentations With Multimedia Effects46 Questions
Exam 23: Getting Started With Access Essentials46 Questions
Exam 24: Managing and Reporting Database Information46 Questions
Exam 25: Networks Fundamentals46 Questions
Exam 26: Communication Services46 Questions
Exam 27: Communications and Collaboration46 Questions
Exam 28: Using the Internet and the World Wide Web46 Questions
Exam 29: Web Content46 Questions
Exam 30: Technology and Society31 Questions
Exam 31: Security, Privacy, and Ethics Online46 Questions
Select questions type
Which of the following is NOT true about viruses?
Free
(Multiple Choice)
4.8/5
(46)
Correct Answer:
D
A e-mail warning message about a virus is likely safe.
Free
(True/False)
4.8/5
(45)
Correct Answer:
False
The e-mail in the figure above was likely sent using ____ format.

Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
C
The ____ format was originally developed to syndicate news articles electronically.
(Multiple Choice)
4.9/5
(38)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
Does not activate until the system has been launched a certain number of times.
Responses:
Virus
Worm
Logic bomb
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(27)
Meredith is researching how to manage her e-mail messages to keep herself organized and protect her computer data. Meredith wants to send all messages from her soccer coach to a specific folder. She sets up a(n) ____.
(Multiple Choice)
4.8/5
(26)
If an e-mail is sent in HTML format and the recipient's e-mail program does not support HTML, the message is displayed in RTF format.
(True/False)
4.9/5
(31)
Posting files on an FTP site is an example of one-to-one communication.
(True/False)
4.8/5
(41)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
Triggered by the appearance or disappearance of specified data.
Responses:
Worm
Trojan horse
Time bomb
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(37)
All e-mail programs return delivery failure notices for e-mail that cannot be delivered.
(True/False)
4.9/5
(39)
Electronic fraud is a computer crime that involves the manipulation of a computer or computer data.
(True/False)
4.8/5
(28)
A(n) ____ is an illicit business model where profits are based on the investor's ability to recruit other people.
(Multiple Choice)
4.9/5
(38)
Most e-mail users rate spam over too much e-mail as their biggest e-mail problem.
(True/False)
4.8/5
(27)
Meredith is researching how to manage her e-mail messages to keep herself organized and protect her computer data. Meredith does all of the following to prevent threats to her computer, EXCEPT: ____.
(Multiple Choice)
4.8/5
(28)
Showing 1 - 20 of 46
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)