Deck 27: Communications and Collaboration

Full screen (f)
exit full mode
Question
The RSS format is widely used to share the contents of blogs.
Use Space or
up arrow
down arrow
to flip the card.
Question
<strong>  Which of the following is NOT true about the figure above?</strong> A) The e-mail message is garbled. B) The sender may not receive a message that the e-mail was not delivered properly. C) Its file type does not enable formatting such as fonts and colors. D) All of the above are true. <div style=padding-top: 35px> Which of the following is NOT true about the figure above?

A) The e-mail message is garbled.
B) The sender may not receive a message that the e-mail was not delivered properly.
C) Its file type does not enable formatting such as fonts and colors.
D) All of the above are true.
Question
Which of the following is NOT an example of many-to-many communication?

A) Blogs
B) Telnet
C) Wikis
D) Tagging
Question
<strong>  The e-mail in the figure above was likely sent using ____ format.</strong> A) PDF B) Plain Text C) RTF D) HTML <div style=padding-top: 35px> The e-mail in the figure above was likely sent using ____ format.

A) PDF
B) Plain Text
C) RTF
D) HTML
Question
Google Docs is an example of online document sharing.
Question
An attachment is a file sent along with an e-mail message.
Question
Spam advertising is very inexpensive.
Question
Teleconferencing is generally free.
Question
Netiquette refers to good manners and proper behaviors when communicating through electronic media.
Question
Posting files on an FTP site is an example of one-to-one communication.
Question
The ____ format was originally developed to syndicate news articles electronically.

A) Really Simple Syndication
B) Rich Site Summary
C) RDF Summary
D) all of the above
Question
You attach multiple files to the same message, but the files must be of the same type.
Question
A e-mail warning message about a virus is likely safe.
Question
All e-mail programs return delivery failure notices for e-mail that cannot be delivered.
Question
One way to protect yourself from viruses is to save an e-mail attachment to your computer before opening it.
Question
Electronic fraud is a computer crime that involves the manipulation of a computer or computer data.
Question
Which of the following is NOT a good use of e-mail?

A) When communication needs to be accessed in real time.
B) When the correspondence might require a paper trail.
C) When the correspondence covers multiple points.
D) When the correspondence needs to be accessed frequently.
Question
Most e-mail users rate spam over too much e-mail as their biggest e-mail problem.
Question
If an e-mail is sent in HTML format and the recipient's e-mail program does not support HTML, the message is displayed in RTF format.
Question
A(n) hoax is a story that at one time could have been partially true but has grown into a mythical yarn.
Question
A(n) ____ is an attempt to deceive an audience into believing that something false is real.

A) pyramid scheme
B) phishing message
C) hoax
D) virus
Question
A(n) ____ is an illicit business model where profits are based on the investor's ability to recruit other people.

A) pyramid scheme
B) phishing
C) hoax
D) virus
Question
____________________ is used in blogs and other informational sites to simplify the search process.
Question
Jin is preparing a report on electronic communication for his Intro to Computer class. Jin writes in his report that all of the following can cause e-mail delivery failure, EXCEPT: ____.

A) The e-mail address is mistyped
B) The e-mail attachment contains malware
C) The recipient's mailbox is full
D) A garbled message
Question
E-mail ____________________ allows you to define rules to manage incoming e-mail.
Question
____________________ is also called junk e-mail, and may include unsolicited advertisements.
Question
Which of the following is NOT true about filtering e-mail?

A) You can use filtering to sort messages into folders.
B) You can use filtering to tag messages.
C) Spam costs U.S. businesses more than $71 billion annually.
D) E-mail clients are the computers that send and receive e-mail.
Question
Which of the following is NOT true about sending e-mail?

A) When you receive a message that was also sent to other recipients, always use Reply All to ensure everyone receives all responses.
B) Only send responses that apply to the original message.
C) Use the Cc option if someone needs to know the information in the e-mail but does not need to respond.
D) Use the Bcc option when someone's e-mail address should not appear in the delivered e-mail message.
Question
____ messages appear to come from a legitimate source, and ask you to update or verify your personal information.

A) Pyramid scheme
B) Phishing
C) Hoax
D) Virus
Question
Jin is preparing a report on electronic communication for his Intro to Computer class. Jin writes in his report that ____ is the process of selecting paths in a network along which to send network traffic.

A) directing
B) routing
C) networking
D) tagging
Question
Which of the following is NOT true about computer security?

A) The best way to protect data is to control access to it.
B) A firewall is software that protects your system from viruses.
C) Change passwords frequently.
D) Regularly back up data and store it offsite.
Question
Which of the following is NOT true about professional and effective communications?

A) A customer who needs immediate assistance should receive a reply within 24 hours.
B) Instant messaging should be short and to the point.
C) Ideally, the recipient should not have to scroll past one page to read an e-mail message.
D) Include one subject per e-mail message.
Question
____________________ e-mails are personal information scams.
Question
____________________ uses a telecommunication system to serve groups, permitting the live exchange and sharing of information between two or more people.
Question
Meredith is researching how to manage her e-mail messages to keep herself organized and protect her computer data. Meredith wants to send all messages from her soccer coach to a specific folder. She sets up a(n) ____.

A) filter
B) protocol
C) route
D) firewall
Question
Which of the following is NOT a sign that an e-mail or chain letter contains a virus?

A) The e-mail message contains all capital letters or dozens of exclamation points.
B) The message comes with an attachment, and you don't know who it is from.
C) The message encourages you to keep the information confidential.
D) All of the above are true.
Question
Which of the following is NOT true about e-mail options?

A) Most e-mail services have a limit on the size of a message.
B) Most e-mail services enable .exe files to go through filtering.
C) When creating an e-mail, you can create a link to a file instead of including it as an attachment.
D) Some e-mail readers cannot display graphics or animations.
Question
Which of the following is NOT true about viruses?

A) Viruses are written by hackers.
B) Viruses can be attached to a program file or an e-mail message.
C) Viruses spread from one file to another when the program is executed.
D) Viruses always cause major damage to a computer's data.
Question
Which of the following is NOT true about spam?

A) Do not publish your e-mail address online.
B) Verify that a Web site does not permit sharing your e-mail address before providing it.
C) You should reply to a junk e-mail message so you can request that they not send you any additional messages.
D) Microsoft Outlook includes a junk e-mail filter.
Question
Meredith is researching how to manage her e-mail messages to keep herself organized and protect her computer data. Meredith does all of the following to prevent threats to her computer, EXCEPT: ____.

A) Avoid posting her e-mail address in a public place
B) Make sure her e-mail program does not include a feature that encrypts messages so the messages cannot be scanned
C) Scan all incoming e-mail messages and attachments
D) Backs up and archives correspondence regularly
Question
List four guidelines you can use for safe electronic communication.
Question
Match between columns
Does not activate until the system has been launched a certain number of times.
Trojan horse
Does not activate until the system has been launched a certain number of times.
Worm
Does not activate until the system has been launched a certain number of times.
Logic bomb
Does not activate until the system has been launched a certain number of times.
Virus
Does not activate until the system has been launched a certain number of times.
Time bomb
Question
Match between columns
A program that has been written to corrupt data on a computer.
Trojan horse
A program that has been written to corrupt data on a computer.
Worm
A program that has been written to corrupt data on a computer.
Logic bomb
A program that has been written to corrupt data on a computer.
Virus
A program that has been written to corrupt data on a computer.
Time bomb
Question
Match between columns
Triggered by the appearance or disappearance of specified data.
Trojan horse
Triggered by the appearance or disappearance of specified data.
Worm
Triggered by the appearance or disappearance of specified data.
Logic bomb
Triggered by the appearance or disappearance of specified data.
Virus
Triggered by the appearance or disappearance of specified data.
Time bomb
Question
Match between columns
Makes many copies of itself.
Trojan horse
Makes many copies of itself.
Worm
Makes many copies of itself.
Logic bomb
Makes many copies of itself.
Virus
Makes many copies of itself.
Time bomb
Question
Match between columns
Does something different from what it is expected to do.
Trojan horse
Does something different from what it is expected to do.
Worm
Does something different from what it is expected to do.
Logic bomb
Does something different from what it is expected to do.
Virus
Does something different from what it is expected to do.
Time bomb
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/46
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 27: Communications and Collaboration
1
The RSS format is widely used to share the contents of blogs.
True
2
<strong>  Which of the following is NOT true about the figure above?</strong> A) The e-mail message is garbled. B) The sender may not receive a message that the e-mail was not delivered properly. C) Its file type does not enable formatting such as fonts and colors. D) All of the above are true. Which of the following is NOT true about the figure above?

A) The e-mail message is garbled.
B) The sender may not receive a message that the e-mail was not delivered properly.
C) Its file type does not enable formatting such as fonts and colors.
D) All of the above are true.
D
3
Which of the following is NOT an example of many-to-many communication?

A) Blogs
B) Telnet
C) Wikis
D) Tagging
B
4
<strong>  The e-mail in the figure above was likely sent using ____ format.</strong> A) PDF B) Plain Text C) RTF D) HTML The e-mail in the figure above was likely sent using ____ format.

A) PDF
B) Plain Text
C) RTF
D) HTML
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
5
Google Docs is an example of online document sharing.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
6
An attachment is a file sent along with an e-mail message.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
7
Spam advertising is very inexpensive.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
8
Teleconferencing is generally free.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
9
Netiquette refers to good manners and proper behaviors when communicating through electronic media.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
10
Posting files on an FTP site is an example of one-to-one communication.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
11
The ____ format was originally developed to syndicate news articles electronically.

A) Really Simple Syndication
B) Rich Site Summary
C) RDF Summary
D) all of the above
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
12
You attach multiple files to the same message, but the files must be of the same type.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
13
A e-mail warning message about a virus is likely safe.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
14
All e-mail programs return delivery failure notices for e-mail that cannot be delivered.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
15
One way to protect yourself from viruses is to save an e-mail attachment to your computer before opening it.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
16
Electronic fraud is a computer crime that involves the manipulation of a computer or computer data.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is NOT a good use of e-mail?

A) When communication needs to be accessed in real time.
B) When the correspondence might require a paper trail.
C) When the correspondence covers multiple points.
D) When the correspondence needs to be accessed frequently.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
18
Most e-mail users rate spam over too much e-mail as their biggest e-mail problem.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
19
If an e-mail is sent in HTML format and the recipient's e-mail program does not support HTML, the message is displayed in RTF format.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
20
A(n) hoax is a story that at one time could have been partially true but has grown into a mythical yarn.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
21
A(n) ____ is an attempt to deceive an audience into believing that something false is real.

A) pyramid scheme
B) phishing message
C) hoax
D) virus
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
22
A(n) ____ is an illicit business model where profits are based on the investor's ability to recruit other people.

A) pyramid scheme
B) phishing
C) hoax
D) virus
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
23
____________________ is used in blogs and other informational sites to simplify the search process.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
24
Jin is preparing a report on electronic communication for his Intro to Computer class. Jin writes in his report that all of the following can cause e-mail delivery failure, EXCEPT: ____.

A) The e-mail address is mistyped
B) The e-mail attachment contains malware
C) The recipient's mailbox is full
D) A garbled message
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
25
E-mail ____________________ allows you to define rules to manage incoming e-mail.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
26
____________________ is also called junk e-mail, and may include unsolicited advertisements.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
27
Which of the following is NOT true about filtering e-mail?

A) You can use filtering to sort messages into folders.
B) You can use filtering to tag messages.
C) Spam costs U.S. businesses more than $71 billion annually.
D) E-mail clients are the computers that send and receive e-mail.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
28
Which of the following is NOT true about sending e-mail?

A) When you receive a message that was also sent to other recipients, always use Reply All to ensure everyone receives all responses.
B) Only send responses that apply to the original message.
C) Use the Cc option if someone needs to know the information in the e-mail but does not need to respond.
D) Use the Bcc option when someone's e-mail address should not appear in the delivered e-mail message.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
29
____ messages appear to come from a legitimate source, and ask you to update or verify your personal information.

A) Pyramid scheme
B) Phishing
C) Hoax
D) Virus
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
30
Jin is preparing a report on electronic communication for his Intro to Computer class. Jin writes in his report that ____ is the process of selecting paths in a network along which to send network traffic.

A) directing
B) routing
C) networking
D) tagging
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
31
Which of the following is NOT true about computer security?

A) The best way to protect data is to control access to it.
B) A firewall is software that protects your system from viruses.
C) Change passwords frequently.
D) Regularly back up data and store it offsite.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
32
Which of the following is NOT true about professional and effective communications?

A) A customer who needs immediate assistance should receive a reply within 24 hours.
B) Instant messaging should be short and to the point.
C) Ideally, the recipient should not have to scroll past one page to read an e-mail message.
D) Include one subject per e-mail message.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
33
____________________ e-mails are personal information scams.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
34
____________________ uses a telecommunication system to serve groups, permitting the live exchange and sharing of information between two or more people.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
35
Meredith is researching how to manage her e-mail messages to keep herself organized and protect her computer data. Meredith wants to send all messages from her soccer coach to a specific folder. She sets up a(n) ____.

A) filter
B) protocol
C) route
D) firewall
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following is NOT a sign that an e-mail or chain letter contains a virus?

A) The e-mail message contains all capital letters or dozens of exclamation points.
B) The message comes with an attachment, and you don't know who it is from.
C) The message encourages you to keep the information confidential.
D) All of the above are true.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
37
Which of the following is NOT true about e-mail options?

A) Most e-mail services have a limit on the size of a message.
B) Most e-mail services enable .exe files to go through filtering.
C) When creating an e-mail, you can create a link to a file instead of including it as an attachment.
D) Some e-mail readers cannot display graphics or animations.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
38
Which of the following is NOT true about viruses?

A) Viruses are written by hackers.
B) Viruses can be attached to a program file or an e-mail message.
C) Viruses spread from one file to another when the program is executed.
D) Viruses always cause major damage to a computer's data.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
39
Which of the following is NOT true about spam?

A) Do not publish your e-mail address online.
B) Verify that a Web site does not permit sharing your e-mail address before providing it.
C) You should reply to a junk e-mail message so you can request that they not send you any additional messages.
D) Microsoft Outlook includes a junk e-mail filter.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
40
Meredith is researching how to manage her e-mail messages to keep herself organized and protect her computer data. Meredith does all of the following to prevent threats to her computer, EXCEPT: ____.

A) Avoid posting her e-mail address in a public place
B) Make sure her e-mail program does not include a feature that encrypts messages so the messages cannot be scanned
C) Scan all incoming e-mail messages and attachments
D) Backs up and archives correspondence regularly
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
41
List four guidelines you can use for safe electronic communication.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
Does not activate until the system has been launched a certain number of times.
Trojan horse
Does not activate until the system has been launched a certain number of times.
Worm
Does not activate until the system has been launched a certain number of times.
Logic bomb
Does not activate until the system has been launched a certain number of times.
Virus
Does not activate until the system has been launched a certain number of times.
Time bomb
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
43
Match between columns
A program that has been written to corrupt data on a computer.
Trojan horse
A program that has been written to corrupt data on a computer.
Worm
A program that has been written to corrupt data on a computer.
Logic bomb
A program that has been written to corrupt data on a computer.
Virus
A program that has been written to corrupt data on a computer.
Time bomb
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
44
Match between columns
Triggered by the appearance or disappearance of specified data.
Trojan horse
Triggered by the appearance or disappearance of specified data.
Worm
Triggered by the appearance or disappearance of specified data.
Logic bomb
Triggered by the appearance or disappearance of specified data.
Virus
Triggered by the appearance or disappearance of specified data.
Time bomb
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
45
Match between columns
Makes many copies of itself.
Trojan horse
Makes many copies of itself.
Worm
Makes many copies of itself.
Logic bomb
Makes many copies of itself.
Virus
Makes many copies of itself.
Time bomb
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
46
Match between columns
Does something different from what it is expected to do.
Trojan horse
Does something different from what it is expected to do.
Worm
Does something different from what it is expected to do.
Logic bomb
Does something different from what it is expected to do.
Virus
Does something different from what it is expected to do.
Time bomb
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 46 flashcards in this deck.