Exam 27: Communications and Collaboration

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The RSS format is widely used to share the contents of blogs.

(True/False)
4.8/5
(39)

A(n) hoax is a story that at one time could have been partially true but has grown into a mythical yarn.

(True/False)
4.7/5
(41)

Which of the following is NOT true about filtering e-mail?

(Multiple Choice)
4.8/5
(41)

Jin is preparing a report on electronic communication for his Intro to Computer class. Jin writes in his report that ____ is the process of selecting paths in a network along which to send network traffic.

(Multiple Choice)
4.8/5
(27)

Spam advertising is very inexpensive.

(True/False)
4.9/5
(42)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
A program that has been written to corrupt data on a computer.
Responses:
Trojan horse
Logic bomb
Time bomb
Correct Answer:
Verified
Premises:
Responses:
A program that has been written to corrupt data on a computer.
Trojan horse
(Matching)
4.7/5
(30)

A(n) ____ is an attempt to deceive an audience into believing that something false is real.

(Multiple Choice)
4.8/5
(32)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
Does something different from what it is expected to do.
Responses:
Logic bomb
Worm
Time bomb
Correct Answer:
Verified
Premises:
Responses:
Does something different from what it is expected to do.
Logic bomb
(Matching)
4.9/5
(31)

Which of the following is NOT true about spam?

(Multiple Choice)
4.7/5
(40)

Jin is preparing a report on electronic communication for his Intro to Computer class. Jin writes in his report that all of the following can cause e-mail delivery failure, EXCEPT: ____.

(Multiple Choice)
4.8/5
(40)

Which of the following is NOT an example of many-to-many communication?

(Multiple Choice)
4.9/5
(39)

____________________ is also called junk e-mail, and may include unsolicited advertisements.

(Short Answer)
4.9/5
(39)

Which of the following is NOT a sign that an e-mail or chain letter contains a virus?

(Multiple Choice)
4.8/5
(46)

____ messages appear to come from a legitimate source, and ask you to update or verify your personal information.

(Multiple Choice)
4.9/5
(25)

You attach multiple files to the same message, but the files must be of the same type.

(True/False)
4.9/5
(39)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
Makes many copies of itself.
Responses:
Time bomb
Worm
Trojan horse
Correct Answer:
Verified
Premises:
Responses:
Makes many copies of itself.
Time bomb
(Matching)
4.9/5
(38)

____________________ is used in blogs and other informational sites to simplify the search process.

(Short Answer)
4.7/5
(33)

E-mail ____________________ allows you to define rules to manage incoming e-mail.

(Short Answer)
4.8/5
(34)

Which of the following is NOT a good use of e-mail?

(Multiple Choice)
4.9/5
(47)

____________________ uses a telecommunication system to serve groups, permitting the live exchange and sharing of information between two or more people.

(Short Answer)
4.9/5
(39)
Showing 21 - 40 of 46
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)