Deck 10: Global Communication - Technology and Etiquette

Full screen (f)
exit full mode
Question
_____ is a malicious, self-replicating program that does not need human interaction to spread.

A) A worm
B) A virus
C) A Trojan horse
D) Adware
Use Space or
up arrow
down arrow
to flip the card.
Question
An iPad2 is an example of a

A) tablet computer.
B) laptop computer.
C) smartphone.
D) mobile app.
Question
_____ is a program that attaches itself to files or software so it can spread to other files or programs.

A) A computer virus
B) Spyware
C) A worm
D) A Trojan horse
Question
Communication skills are not as important for the virtual office professional because of the lack of face-to-face contact.
Question
Yearly credit checks are not necessary since you will know if someone steals your personal information.
Question
Which is the best choice for a business to provide just-in-time training for employees?

A) VoiceThread
B) peer-to-peer file sharing
C) instant messaging
D) a social networking site
Question
_____ is the act of stealing someone's personal information.

A) Identity theft
B) Adware
C) A worm
D) A computer virus
Question
_____ is software that can be installed on your computer without your knowledge and that tracks the websites you view.

A) Spyware
B) A worm
C) A virus
D) A Trojan horse
Question
To protect your computer from spyware, make sure you have

A) a firewall.
B) adware.
C) a flash drive.
D) a Trojan horse.
Question
For the administrative professional, one of the primary uses of cloud computing is

A) file storage.
B) software applications.
C) web conferencing.
D) e-mail systems.
Question
Correct capitalization and spelling are not necessary for instant messaging (IM) in the workplace since IM is casual in nature.
Question
Some social networks also have professional uses.
Question
You should put your cell phone on silent or vibrate before going into a meeting.
Question
When creating a password, you should use words from the dictionary if possible.
Question
Mobile devices offer portability and productivity options for the administrative professional.
Question
A 48-hour turnaround on answering e-mail is acceptable.
Question
Text messaging is for personal use, not professional or business use.
Question
_____ is malicious software designed to look like something interesting or useful.

A) A Trojan horse
B) A worm
C) A virus
D) Spyware
Question
_____ typically scans incoming e-mail for hidden threats and alerts users when an attempt to infect the computer is detected.

A) Antivirus software
B) Peer-to-peer file sharing software
C) Spyware
D) Adware
Question
Richard received a work-related call while he was standing in line at the post office. The information was important and related to a sensitive topic, so he handled the call while in line. Richard made the right choice.
Question
Match between columns
The transmitting of voice over the Internet
smartphone
The transmitting of voice over the Internet
VoIP
The transmitting of voice over the Internet
cloud computing
The transmitting of voice over the Internet
intelligent mobile hotspot
The transmitting of voice over the Internet
telecommunications
The transmitting of voice over the Internet
Web 2.0
The transmitting of voice over the Internet
p2p file sharing
The transmitting of voice over the Internet
phishing
The transmitting of voice over the Internet
web conferencing
The transmitting of voice over the Internet
mobile app
Using an online message that seems to be from a legitimate source to steal personal information
smartphone
Using an online message that seems to be from a legitimate source to steal personal information
VoIP
Using an online message that seems to be from a legitimate source to steal personal information
cloud computing
Using an online message that seems to be from a legitimate source to steal personal information
intelligent mobile hotspot
Using an online message that seems to be from a legitimate source to steal personal information
telecommunications
Using an online message that seems to be from a legitimate source to steal personal information
Web 2.0
Using an online message that seems to be from a legitimate source to steal personal information
p2p file sharing
Using an online message that seems to be from a legitimate source to steal personal information
phishing
Using an online message that seems to be from a legitimate source to steal personal information
web conferencing
Using an online message that seems to be from a legitimate source to steal personal information
mobile app
A system of sharing files on an informal network with others who have the same software
smartphone
A system of sharing files on an informal network with others who have the same software
VoIP
A system of sharing files on an informal network with others who have the same software
cloud computing
A system of sharing files on an informal network with others who have the same software
intelligent mobile hotspot
A system of sharing files on an informal network with others who have the same software
telecommunications
A system of sharing files on an informal network with others who have the same software
Web 2.0
A system of sharing files on an informal network with others who have the same software
p2p file sharing
A system of sharing files on an informal network with others who have the same software
phishing
A system of sharing files on an informal network with others who have the same software
web conferencing
A system of sharing files on an informal network with others who have the same software
mobile app
Using the Internet to have a meeting
smartphone
Using the Internet to have a meeting
VoIP
Using the Internet to have a meeting
cloud computing
Using the Internet to have a meeting
intelligent mobile hotspot
Using the Internet to have a meeting
telecommunications
Using the Internet to have a meeting
Web 2.0
Using the Internet to have a meeting
p2p file sharing
Using the Internet to have a meeting
phishing
Using the Internet to have a meeting
web conferencing
Using the Internet to have a meeting
mobile app
A cellular phone with many of the functions of a handheld computer
smartphone
A cellular phone with many of the functions of a handheld computer
VoIP
A cellular phone with many of the functions of a handheld computer
cloud computing
A cellular phone with many of the functions of a handheld computer
intelligent mobile hotspot
A cellular phone with many of the functions of a handheld computer
telecommunications
A cellular phone with many of the functions of a handheld computer
Web 2.0
A cellular phone with many of the functions of a handheld computer
p2p file sharing
A cellular phone with many of the functions of a handheld computer
phishing
A cellular phone with many of the functions of a handheld computer
web conferencing
A cellular phone with many of the functions of a handheld computer
mobile app
A traveling Internet connection
smartphone
A traveling Internet connection
VoIP
A traveling Internet connection
cloud computing
A traveling Internet connection
intelligent mobile hotspot
A traveling Internet connection
telecommunications
A traveling Internet connection
Web 2.0
A traveling Internet connection
p2p file sharing
A traveling Internet connection
phishing
A traveling Internet connection
web conferencing
A traveling Internet connection
mobile app
Web resources that are interactive
smartphone
Web resources that are interactive
VoIP
Web resources that are interactive
cloud computing
Web resources that are interactive
intelligent mobile hotspot
Web resources that are interactive
telecommunications
Web resources that are interactive
Web 2.0
Web resources that are interactive
p2p file sharing
Web resources that are interactive
phishing
Web resources that are interactive
web conferencing
Web resources that are interactive
mobile app
The use of computer services from virtual servers available on demand over the Internet
smartphone
The use of computer services from virtual servers available on demand over the Internet
VoIP
The use of computer services from virtual servers available on demand over the Internet
cloud computing
The use of computer services from virtual servers available on demand over the Internet
intelligent mobile hotspot
The use of computer services from virtual servers available on demand over the Internet
telecommunications
The use of computer services from virtual servers available on demand over the Internet
Web 2.0
The use of computer services from virtual servers available on demand over the Internet
p2p file sharing
The use of computer services from virtual servers available on demand over the Internet
phishing
The use of computer services from virtual servers available on demand over the Internet
web conferencing
The use of computer services from virtual servers available on demand over the Internet
mobile app
Software that runs on a handheld device or computer
smartphone
Software that runs on a handheld device or computer
VoIP
Software that runs on a handheld device or computer
cloud computing
Software that runs on a handheld device or computer
intelligent mobile hotspot
Software that runs on a handheld device or computer
telecommunications
Software that runs on a handheld device or computer
Web 2.0
Software that runs on a handheld device or computer
p2p file sharing
Software that runs on a handheld device or computer
phishing
Software that runs on a handheld device or computer
web conferencing
Software that runs on a handheld device or computer
mobile app
The transmission of text, data, voice, video, and images electronically from one location to another
smartphone
The transmission of text, data, voice, video, and images electronically from one location to another
VoIP
The transmission of text, data, voice, video, and images electronically from one location to another
cloud computing
The transmission of text, data, voice, video, and images electronically from one location to another
intelligent mobile hotspot
The transmission of text, data, voice, video, and images electronically from one location to another
telecommunications
The transmission of text, data, voice, video, and images electronically from one location to another
Web 2.0
The transmission of text, data, voice, video, and images electronically from one location to another
p2p file sharing
The transmission of text, data, voice, video, and images electronically from one location to another
phishing
The transmission of text, data, voice, video, and images electronically from one location to another
web conferencing
The transmission of text, data, voice, video, and images electronically from one location to another
mobile app
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/21
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 10: Global Communication - Technology and Etiquette
1
_____ is a malicious, self-replicating program that does not need human interaction to spread.

A) A worm
B) A virus
C) A Trojan horse
D) Adware
A
2
An iPad2 is an example of a

A) tablet computer.
B) laptop computer.
C) smartphone.
D) mobile app.
A
3
_____ is a program that attaches itself to files or software so it can spread to other files or programs.

A) A computer virus
B) Spyware
C) A worm
D) A Trojan horse
A
4
Communication skills are not as important for the virtual office professional because of the lack of face-to-face contact.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
5
Yearly credit checks are not necessary since you will know if someone steals your personal information.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
6
Which is the best choice for a business to provide just-in-time training for employees?

A) VoiceThread
B) peer-to-peer file sharing
C) instant messaging
D) a social networking site
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
7
_____ is the act of stealing someone's personal information.

A) Identity theft
B) Adware
C) A worm
D) A computer virus
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
8
_____ is software that can be installed on your computer without your knowledge and that tracks the websites you view.

A) Spyware
B) A worm
C) A virus
D) A Trojan horse
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
9
To protect your computer from spyware, make sure you have

A) a firewall.
B) adware.
C) a flash drive.
D) a Trojan horse.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
10
For the administrative professional, one of the primary uses of cloud computing is

A) file storage.
B) software applications.
C) web conferencing.
D) e-mail systems.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
11
Correct capitalization and spelling are not necessary for instant messaging (IM) in the workplace since IM is casual in nature.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
12
Some social networks also have professional uses.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
13
You should put your cell phone on silent or vibrate before going into a meeting.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
14
When creating a password, you should use words from the dictionary if possible.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
15
Mobile devices offer portability and productivity options for the administrative professional.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
16
A 48-hour turnaround on answering e-mail is acceptable.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
17
Text messaging is for personal use, not professional or business use.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
18
_____ is malicious software designed to look like something interesting or useful.

A) A Trojan horse
B) A worm
C) A virus
D) Spyware
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
19
_____ typically scans incoming e-mail for hidden threats and alerts users when an attempt to infect the computer is detected.

A) Antivirus software
B) Peer-to-peer file sharing software
C) Spyware
D) Adware
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
20
Richard received a work-related call while he was standing in line at the post office. The information was important and related to a sensitive topic, so he handled the call while in line. Richard made the right choice.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
21
Match between columns
The transmitting of voice over the Internet
smartphone
The transmitting of voice over the Internet
VoIP
The transmitting of voice over the Internet
cloud computing
The transmitting of voice over the Internet
intelligent mobile hotspot
The transmitting of voice over the Internet
telecommunications
The transmitting of voice over the Internet
Web 2.0
The transmitting of voice over the Internet
p2p file sharing
The transmitting of voice over the Internet
phishing
The transmitting of voice over the Internet
web conferencing
The transmitting of voice over the Internet
mobile app
Using an online message that seems to be from a legitimate source to steal personal information
smartphone
Using an online message that seems to be from a legitimate source to steal personal information
VoIP
Using an online message that seems to be from a legitimate source to steal personal information
cloud computing
Using an online message that seems to be from a legitimate source to steal personal information
intelligent mobile hotspot
Using an online message that seems to be from a legitimate source to steal personal information
telecommunications
Using an online message that seems to be from a legitimate source to steal personal information
Web 2.0
Using an online message that seems to be from a legitimate source to steal personal information
p2p file sharing
Using an online message that seems to be from a legitimate source to steal personal information
phishing
Using an online message that seems to be from a legitimate source to steal personal information
web conferencing
Using an online message that seems to be from a legitimate source to steal personal information
mobile app
A system of sharing files on an informal network with others who have the same software
smartphone
A system of sharing files on an informal network with others who have the same software
VoIP
A system of sharing files on an informal network with others who have the same software
cloud computing
A system of sharing files on an informal network with others who have the same software
intelligent mobile hotspot
A system of sharing files on an informal network with others who have the same software
telecommunications
A system of sharing files on an informal network with others who have the same software
Web 2.0
A system of sharing files on an informal network with others who have the same software
p2p file sharing
A system of sharing files on an informal network with others who have the same software
phishing
A system of sharing files on an informal network with others who have the same software
web conferencing
A system of sharing files on an informal network with others who have the same software
mobile app
Using the Internet to have a meeting
smartphone
Using the Internet to have a meeting
VoIP
Using the Internet to have a meeting
cloud computing
Using the Internet to have a meeting
intelligent mobile hotspot
Using the Internet to have a meeting
telecommunications
Using the Internet to have a meeting
Web 2.0
Using the Internet to have a meeting
p2p file sharing
Using the Internet to have a meeting
phishing
Using the Internet to have a meeting
web conferencing
Using the Internet to have a meeting
mobile app
A cellular phone with many of the functions of a handheld computer
smartphone
A cellular phone with many of the functions of a handheld computer
VoIP
A cellular phone with many of the functions of a handheld computer
cloud computing
A cellular phone with many of the functions of a handheld computer
intelligent mobile hotspot
A cellular phone with many of the functions of a handheld computer
telecommunications
A cellular phone with many of the functions of a handheld computer
Web 2.0
A cellular phone with many of the functions of a handheld computer
p2p file sharing
A cellular phone with many of the functions of a handheld computer
phishing
A cellular phone with many of the functions of a handheld computer
web conferencing
A cellular phone with many of the functions of a handheld computer
mobile app
A traveling Internet connection
smartphone
A traveling Internet connection
VoIP
A traveling Internet connection
cloud computing
A traveling Internet connection
intelligent mobile hotspot
A traveling Internet connection
telecommunications
A traveling Internet connection
Web 2.0
A traveling Internet connection
p2p file sharing
A traveling Internet connection
phishing
A traveling Internet connection
web conferencing
A traveling Internet connection
mobile app
Web resources that are interactive
smartphone
Web resources that are interactive
VoIP
Web resources that are interactive
cloud computing
Web resources that are interactive
intelligent mobile hotspot
Web resources that are interactive
telecommunications
Web resources that are interactive
Web 2.0
Web resources that are interactive
p2p file sharing
Web resources that are interactive
phishing
Web resources that are interactive
web conferencing
Web resources that are interactive
mobile app
The use of computer services from virtual servers available on demand over the Internet
smartphone
The use of computer services from virtual servers available on demand over the Internet
VoIP
The use of computer services from virtual servers available on demand over the Internet
cloud computing
The use of computer services from virtual servers available on demand over the Internet
intelligent mobile hotspot
The use of computer services from virtual servers available on demand over the Internet
telecommunications
The use of computer services from virtual servers available on demand over the Internet
Web 2.0
The use of computer services from virtual servers available on demand over the Internet
p2p file sharing
The use of computer services from virtual servers available on demand over the Internet
phishing
The use of computer services from virtual servers available on demand over the Internet
web conferencing
The use of computer services from virtual servers available on demand over the Internet
mobile app
Software that runs on a handheld device or computer
smartphone
Software that runs on a handheld device or computer
VoIP
Software that runs on a handheld device or computer
cloud computing
Software that runs on a handheld device or computer
intelligent mobile hotspot
Software that runs on a handheld device or computer
telecommunications
Software that runs on a handheld device or computer
Web 2.0
Software that runs on a handheld device or computer
p2p file sharing
Software that runs on a handheld device or computer
phishing
Software that runs on a handheld device or computer
web conferencing
Software that runs on a handheld device or computer
mobile app
The transmission of text, data, voice, video, and images electronically from one location to another
smartphone
The transmission of text, data, voice, video, and images electronically from one location to another
VoIP
The transmission of text, data, voice, video, and images electronically from one location to another
cloud computing
The transmission of text, data, voice, video, and images electronically from one location to another
intelligent mobile hotspot
The transmission of text, data, voice, video, and images electronically from one location to another
telecommunications
The transmission of text, data, voice, video, and images electronically from one location to another
Web 2.0
The transmission of text, data, voice, video, and images electronically from one location to another
p2p file sharing
The transmission of text, data, voice, video, and images electronically from one location to another
phishing
The transmission of text, data, voice, video, and images electronically from one location to another
web conferencing
The transmission of text, data, voice, video, and images electronically from one location to another
mobile app
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 21 flashcards in this deck.