Exam 27: Communications and Collaboration

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is NOT true about viruses?

Free
(Multiple Choice)
4.8/5
(46)
Correct Answer:
Verified

D

A e-mail warning message about a virus is likely safe.

Free
(True/False)
4.8/5
(45)
Correct Answer:
Verified

False

  The e-mail in the figure above was likely sent using ____ format. The e-mail in the figure above was likely sent using ____ format.

Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
Verified

C

The ____ format was originally developed to syndicate news articles electronically.

(Multiple Choice)
4.9/5
(38)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
Does not activate until the system has been launched a certain number of times.
Responses:
Virus
Worm
Logic bomb
Correct Answer:
Verified
Premises:
Responses:
Does not activate until the system has been launched a certain number of times.
Virus
(Matching)
4.8/5
(27)

Meredith is researching how to manage her e-mail messages to keep herself organized and protect her computer data. Meredith wants to send all messages from her soccer coach to a specific folder. She sets up a(n) ____.

(Multiple Choice)
4.8/5
(26)

Google Docs is an example of online document sharing.

(True/False)
4.9/5
(38)

Which of the following is NOT true about e-mail options?

(Multiple Choice)
4.9/5
(33)

An attachment is a file sent along with an e-mail message.

(True/False)
4.7/5
(31)

If an e-mail is sent in HTML format and the recipient's e-mail program does not support HTML, the message is displayed in RTF format.

(True/False)
4.9/5
(31)

List four guidelines you can use for safe electronic communication.

(Essay)
4.8/5
(35)

Posting files on an FTP site is an example of one-to-one communication.

(True/False)
4.8/5
(41)

____________________ e-mails are personal information scams.

(Short Answer)
4.8/5
(38)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
Triggered by the appearance or disappearance of specified data.
Responses:
Worm
Trojan horse
Time bomb
Correct Answer:
Verified
Premises:
Responses:
Triggered by the appearance or disappearance of specified data.
Worm
(Matching)
4.8/5
(37)

All e-mail programs return delivery failure notices for e-mail that cannot be delivered.

(True/False)
4.9/5
(39)

Electronic fraud is a computer crime that involves the manipulation of a computer or computer data.

(True/False)
4.8/5
(28)

A(n) ____ is an illicit business model where profits are based on the investor's ability to recruit other people.

(Multiple Choice)
4.9/5
(38)

Most e-mail users rate spam over too much e-mail as their biggest e-mail problem.

(True/False)
4.8/5
(27)

Meredith is researching how to manage her e-mail messages to keep herself organized and protect her computer data. Meredith does all of the following to prevent threats to her computer, EXCEPT: ____.

(Multiple Choice)
4.8/5
(28)

Teleconferencing is generally free.

(True/False)
4.7/5
(33)
Showing 1 - 20 of 46
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)