Deck 8: Technology in the Workplace

Full screen (f)
exit full mode
Question
Which of the following is true concerning workplace surveillance systems?

A) Employers are allowed to track information being accessed from their computers.
B) Work computers are more secure than personal computers.
C) Employees can hide their online activity by clearing their search history.
D) Systems that track web activity are illegal without the consent of the employee.
Use Space or
up arrow
down arrow
to flip the card.
Question
What type of e-mail should you avoid sending while at work or from a work account?

A) forwards
B) jokes
C) e-mails containing emoticons
D) all of the above
Question
Katy's job requires her to constantly be traveling around the country, so she often text messaging to keep in contact with her company. What is a drawback to this strategy?

A) Messages can't take place in real time
B) Text messaging can be expensive and time consuming
C) Text messaging has no place in the professional environment
D) text messaging lacks many of the basic features that e-mail offers
Question
Which social networking site focuses more on business networking than social networks?

A) Twitter
B) MySpace
C) Facebook
D) LinkedIn
Question
Which strategy is a way to avoid e-mail information overload?

A) Ignore and delete what you can.
B) Read and respond to messages that are important.
C) Block out some time to delete inbox clutter.
D) All of the above
Question
Why is it especially important to be careful about the messages you send via electronic communication?

A) Due to the lack of cues, misunderstandings can lead to electronic conflicts
B) Almost anyone can look into your private emails
C) The same rules apply for electronic communication as paper communication
D) All of the above
Question
Which of these statements is true regarding spam e-mail?

A) spam recipients are never random
B) all spam contains viruses designed to hack your computer
C) spammers often steal sensitive passwords
D) spammers buy your information from companies you have given your e-mail address to.
Question
Stacy has a Facebook account and uses it as a sounding board for her frustration with her personal life and company. Which of the following statements is true?

A) Stacy should only delete anything on her Facebook page that is work related
B) Stacy should be mindful about what others can retrieve about her on the internet and should refrain from posting things that may show her in a negative light
C) She can post negative comments about the company as it is her right to exercise her right to free speech and because of this nothing negative will happen
D) As long as she is not "friends" with her boss, she should be fine
Question
Computer-mediated communication occurs in ___________.

A) synchronous time
B) asynchronous time
C) synchronous and asynchronous time
D) neither synchronous nor asynchronous time
Question
What is a disadvantage to using network e-mail?

A) you must use your work computer or be signed on to your network to access software
B) lots of storage space
C) more difficult passwords
D) easier file sharing
Question
Which is the most proper voicemail etiquette?

A) use only the standard factory greeting for callers to hear
B) check messages regularly
C) do not let callers know if you are out of your office
D) refer the caller to someone else in your greeting for immediate help
Question
Electronic bulletin boards can be accessed ___________.

A) by joining a listserv first
B) by subscribers
C) by anyone
D) through company channels
Question
Which of the following is not true about e-mail awareness?

A) e-mail takes up a great deal of storage space
B) e-mail is never secure
C) e-mail can lead to misunderstanding
D) e-mail abuse can lead to employee termination
Question
Which of the following text messages should have been communicated with a phone call or in person?

A) "see you there."
B) "meeting @ 10"
C) "you got the promotion!"
D) none of the above
Question
Which term correctly identifies the study of time as communication?

A) oculesics
B) linguistics
C) proxemics
D) chronemics
Question
Which e-mail address example is the most appropriate to use for professional use such as business connections?

A) akb123@yahoo.com
B) yankees4thawin@sports.com
C) john.smith@company.org
D) jamesbond007@hotmail.com
Question
Why do most companies find it necessary to have a written policy regarding electronic communication?

A) Employers need a paper trail on employees' activities in case they want to fire them
B) Issues such as viruses, misuse of the system, and e-mail etiquette need to be clearly spelled out to employees
C) Finding out if job candidates can understand the policy is critical to the hiring process
D) Employers want a legally binding contract in place to protect against lawsuits
Question
When looking at a prospective employee's Facebook profile, what could be a red flag to potential employers to not hire someone?

A) Seeing where the candidate went to school or grew up
B) Seeing what type of people make up the candidate's friends list
C) Pictures or posts that do not convey a professional and responsible person
D) Information about religion, political beliefs, or personal values
Question
Computer-mediated communication takes place via ____________.

A) computers
B) cell phones
C) pagers
D) all of the above
Question
When you receive an e-mail written in all caps with lots of exclamation points, the tone of the message is changed. The change is tone is a characteristic of what type of communication?

A) verbal
B) nonverbal
C) non-professional
D) computer-mediated
Question
Information overload occurs when information, requests for feedback, taking on new projects, responding to questions, answering the phone, and completing required online classes for work on top of taking care of loved ones, children, pets, and other family matters leaves us feeling as though things are spinning out of control.
Question
What kind of technological distractions lead to information overload?
Question
One way to avoid electronic aggression is to ask yourself if you would say the same thing to someone in person.
Question
Sometimes it is okay to send a joke through company-wide email as long as it is not offensive.
Question
Which of the following is an example of an e-mail flame?

A) Jon sending an e-mail that is blunt, insensitive and rude to another coworker
B) Susan sending an off-color joke to the entire company
C) Alice using Facebook to complain about a customer
D) Daniel using his company e-mail address for personal business
Question
What is a question you should take into consideration when attempting to include motivational language in your e-mails?

A) Would I pass this information on in hard copy?
B) Would I repeat this in person?
C) Am I communicating professionalism to my colleagues?
D) all of the above
Question
For the purposes of organization, all e-mail should be sent to one inbox and then filtered into separate folders within that inbox.
Question
Because of the distance a message has to travel, computer-mediated communication occurs in asynchronous time.
Question
What is the purpose of workplace surveillance?
Question
What is a reason why e-mail dialogues can lead to electronic aggression?

A) People are often times frustrated by the overload of e-mail they receive
B) E-mail dialogues often has glitches which make them difficult to read
C) the lack of face-to-face cues can lead to misinterpretation and can be construed as offensive
D) E-mail dialogues can detract from other important work someone might be doing
Question
Searching social networking sites to view an employee's personal activities is illegal once an employee is hired.
Question
Why is it important to understand the drawbacks of technology in the workplace?

A) To learn to avoid electronic communication whenever possible
B) To understand that misinterpretation, employee surveillance, and information overload can hinder your professional excellence
C) To make sure that no one has access to your personal information
D) To create a workplace culture that is not greatly influenced by electronic communication
True/False
Question
What are the advantages and disadvantages of technology in terms of time management?
Question
Using traditional ring tones is not important to your professional etiquette.
Question
Sending authentic-looking but fraudulent e-mails in order to steal sensitive personal information is known as ___________.

A) spam
B) phishing
C) mimicking
D) miming
Question
Spam is a term used to describe the practice of sending fraudulent e-mails in an attempt to steal sensitive information from the user.
Question
Using a network e-mail address is the only way to ensure its security.
Question
Communication through any type of technology is referred to as computer-mediated communication.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/38
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 8: Technology in the Workplace
1
Which of the following is true concerning workplace surveillance systems?

A) Employers are allowed to track information being accessed from their computers.
B) Work computers are more secure than personal computers.
C) Employees can hide their online activity by clearing their search history.
D) Systems that track web activity are illegal without the consent of the employee.
A
2
What type of e-mail should you avoid sending while at work or from a work account?

A) forwards
B) jokes
C) e-mails containing emoticons
D) all of the above
D
3
Katy's job requires her to constantly be traveling around the country, so she often text messaging to keep in contact with her company. What is a drawback to this strategy?

A) Messages can't take place in real time
B) Text messaging can be expensive and time consuming
C) Text messaging has no place in the professional environment
D) text messaging lacks many of the basic features that e-mail offers
D
4
Which social networking site focuses more on business networking than social networks?

A) Twitter
B) MySpace
C) Facebook
D) LinkedIn
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
5
Which strategy is a way to avoid e-mail information overload?

A) Ignore and delete what you can.
B) Read and respond to messages that are important.
C) Block out some time to delete inbox clutter.
D) All of the above
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
6
Why is it especially important to be careful about the messages you send via electronic communication?

A) Due to the lack of cues, misunderstandings can lead to electronic conflicts
B) Almost anyone can look into your private emails
C) The same rules apply for electronic communication as paper communication
D) All of the above
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
7
Which of these statements is true regarding spam e-mail?

A) spam recipients are never random
B) all spam contains viruses designed to hack your computer
C) spammers often steal sensitive passwords
D) spammers buy your information from companies you have given your e-mail address to.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
8
Stacy has a Facebook account and uses it as a sounding board for her frustration with her personal life and company. Which of the following statements is true?

A) Stacy should only delete anything on her Facebook page that is work related
B) Stacy should be mindful about what others can retrieve about her on the internet and should refrain from posting things that may show her in a negative light
C) She can post negative comments about the company as it is her right to exercise her right to free speech and because of this nothing negative will happen
D) As long as she is not "friends" with her boss, she should be fine
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
9
Computer-mediated communication occurs in ___________.

A) synchronous time
B) asynchronous time
C) synchronous and asynchronous time
D) neither synchronous nor asynchronous time
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
10
What is a disadvantage to using network e-mail?

A) you must use your work computer or be signed on to your network to access software
B) lots of storage space
C) more difficult passwords
D) easier file sharing
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
11
Which is the most proper voicemail etiquette?

A) use only the standard factory greeting for callers to hear
B) check messages regularly
C) do not let callers know if you are out of your office
D) refer the caller to someone else in your greeting for immediate help
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
12
Electronic bulletin boards can be accessed ___________.

A) by joining a listserv first
B) by subscribers
C) by anyone
D) through company channels
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following is not true about e-mail awareness?

A) e-mail takes up a great deal of storage space
B) e-mail is never secure
C) e-mail can lead to misunderstanding
D) e-mail abuse can lead to employee termination
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following text messages should have been communicated with a phone call or in person?

A) "see you there."
B) "meeting @ 10"
C) "you got the promotion!"
D) none of the above
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
15
Which term correctly identifies the study of time as communication?

A) oculesics
B) linguistics
C) proxemics
D) chronemics
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
16
Which e-mail address example is the most appropriate to use for professional use such as business connections?

A) akb123@yahoo.com
B) yankees4thawin@sports.com
C) john.smith@company.org
D) jamesbond007@hotmail.com
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
17
Why do most companies find it necessary to have a written policy regarding electronic communication?

A) Employers need a paper trail on employees' activities in case they want to fire them
B) Issues such as viruses, misuse of the system, and e-mail etiquette need to be clearly spelled out to employees
C) Finding out if job candidates can understand the policy is critical to the hiring process
D) Employers want a legally binding contract in place to protect against lawsuits
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
18
When looking at a prospective employee's Facebook profile, what could be a red flag to potential employers to not hire someone?

A) Seeing where the candidate went to school or grew up
B) Seeing what type of people make up the candidate's friends list
C) Pictures or posts that do not convey a professional and responsible person
D) Information about religion, political beliefs, or personal values
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
19
Computer-mediated communication takes place via ____________.

A) computers
B) cell phones
C) pagers
D) all of the above
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
20
When you receive an e-mail written in all caps with lots of exclamation points, the tone of the message is changed. The change is tone is a characteristic of what type of communication?

A) verbal
B) nonverbal
C) non-professional
D) computer-mediated
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
21
Information overload occurs when information, requests for feedback, taking on new projects, responding to questions, answering the phone, and completing required online classes for work on top of taking care of loved ones, children, pets, and other family matters leaves us feeling as though things are spinning out of control.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
22
What kind of technological distractions lead to information overload?
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
23
One way to avoid electronic aggression is to ask yourself if you would say the same thing to someone in person.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
24
Sometimes it is okay to send a joke through company-wide email as long as it is not offensive.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following is an example of an e-mail flame?

A) Jon sending an e-mail that is blunt, insensitive and rude to another coworker
B) Susan sending an off-color joke to the entire company
C) Alice using Facebook to complain about a customer
D) Daniel using his company e-mail address for personal business
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
26
What is a question you should take into consideration when attempting to include motivational language in your e-mails?

A) Would I pass this information on in hard copy?
B) Would I repeat this in person?
C) Am I communicating professionalism to my colleagues?
D) all of the above
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
27
For the purposes of organization, all e-mail should be sent to one inbox and then filtered into separate folders within that inbox.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
28
Because of the distance a message has to travel, computer-mediated communication occurs in asynchronous time.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
29
What is the purpose of workplace surveillance?
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
30
What is a reason why e-mail dialogues can lead to electronic aggression?

A) People are often times frustrated by the overload of e-mail they receive
B) E-mail dialogues often has glitches which make them difficult to read
C) the lack of face-to-face cues can lead to misinterpretation and can be construed as offensive
D) E-mail dialogues can detract from other important work someone might be doing
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
31
Searching social networking sites to view an employee's personal activities is illegal once an employee is hired.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
32
Why is it important to understand the drawbacks of technology in the workplace?

A) To learn to avoid electronic communication whenever possible
B) To understand that misinterpretation, employee surveillance, and information overload can hinder your professional excellence
C) To make sure that no one has access to your personal information
D) To create a workplace culture that is not greatly influenced by electronic communication
True/False
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
33
What are the advantages and disadvantages of technology in terms of time management?
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
34
Using traditional ring tones is not important to your professional etiquette.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
35
Sending authentic-looking but fraudulent e-mails in order to steal sensitive personal information is known as ___________.

A) spam
B) phishing
C) mimicking
D) miming
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
36
Spam is a term used to describe the practice of sending fraudulent e-mails in an attempt to steal sensitive information from the user.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
37
Using a network e-mail address is the only way to ensure its security.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
38
Communication through any type of technology is referred to as computer-mediated communication.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 38 flashcards in this deck.