Deck 10: Global Communication - Technology and Etiquette
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/21
Play
Full screen (f)
Deck 10: Global Communication - Technology and Etiquette
1
_____ is a malicious, self-replicating program that does not need human interaction to spread.
A) A worm
B) A virus
C) A Trojan horse
D) Adware
A) A worm
B) A virus
C) A Trojan horse
D) Adware
A
2
An iPad2 is an example of a
A) tablet computer.
B) laptop computer.
C) smartphone.
D) mobile app.
A) tablet computer.
B) laptop computer.
C) smartphone.
D) mobile app.
A
3
_____ is a program that attaches itself to files or software so it can spread to other files or programs.
A) A computer virus
B) Spyware
C) A worm
D) A Trojan horse
A) A computer virus
B) Spyware
C) A worm
D) A Trojan horse
A
4
Communication skills are not as important for the virtual office professional because of the lack of face-to-face contact.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
5
Yearly credit checks are not necessary since you will know if someone steals your personal information.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
6
Which is the best choice for a business to provide just-in-time training for employees?
A) VoiceThread
B) peer-to-peer file sharing
C) instant messaging
D) a social networking site
A) VoiceThread
B) peer-to-peer file sharing
C) instant messaging
D) a social networking site
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
7
_____ is the act of stealing someone's personal information.
A) Identity theft
B) Adware
C) A worm
D) A computer virus
A) Identity theft
B) Adware
C) A worm
D) A computer virus
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
8
_____ is software that can be installed on your computer without your knowledge and that tracks the websites you view.
A) Spyware
B) A worm
C) A virus
D) A Trojan horse
A) Spyware
B) A worm
C) A virus
D) A Trojan horse
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
9
To protect your computer from spyware, make sure you have
A) a firewall.
B) adware.
C) a flash drive.
D) a Trojan horse.
A) a firewall.
B) adware.
C) a flash drive.
D) a Trojan horse.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
10
For the administrative professional, one of the primary uses of cloud computing is
A) file storage.
B) software applications.
C) web conferencing.
D) e-mail systems.
A) file storage.
B) software applications.
C) web conferencing.
D) e-mail systems.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
11
Correct capitalization and spelling are not necessary for instant messaging (IM) in the workplace since IM is casual in nature.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
12
Some social networks also have professional uses.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
13
You should put your cell phone on silent or vibrate before going into a meeting.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
14
When creating a password, you should use words from the dictionary if possible.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
15
Mobile devices offer portability and productivity options for the administrative professional.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
16
A 48-hour turnaround on answering e-mail is acceptable.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
17
Text messaging is for personal use, not professional or business use.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
18
_____ is malicious software designed to look like something interesting or useful.
A) A Trojan horse
B) A worm
C) A virus
D) Spyware
A) A Trojan horse
B) A worm
C) A virus
D) Spyware
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
19
_____ typically scans incoming e-mail for hidden threats and alerts users when an attempt to infect the computer is detected.
A) Antivirus software
B) Peer-to-peer file sharing software
C) Spyware
D) Adware
A) Antivirus software
B) Peer-to-peer file sharing software
C) Spyware
D) Adware
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
20
Richard received a work-related call while he was standing in line at the post office. The information was important and related to a sensitive topic, so he handled the call while in line. Richard made the right choice.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
21
Match between columns
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck