Deck 8: Technology in the Workplace

Full screen (f)
exit full mode
Question
Which of these statements is true regarding spam e-mail?

A) Spam recipients are never random.
B) All spam contains viruses designed to hack your computer.
C) Spammers often steal sensitive passwords.
D) Spammers buy your information from companies you have given your e-mail address to.
Use Space or
up arrow
down arrow
to flip the card.
Question
Which of the following is true concerning workplace surveillance systems?

A) Employers are allowed to track information being accessed from their computers.
B) Work computers are more secure than personal computers.
C) Employees can hide their online activity by clearing their search history.
D) Systems that track web activity are illegal without the consent of the employee.
Question
Computer-mediated communication takes place via

A) computers.
B) cell phones.
C) pagers.
D) all of the above
Question
When you receive an e-mail written in all caps with lots of exclamation points, the tone of the message is changed. The change in tone is a characteristic of what type of communication?

A) verbal
B) nonverbal
C) non-professional
D) computer-mediated
Question
Which strategy is a way to avoid e-mail information overload?

A) Ignore and delete what you can.
B) Read and respond to messages that are important.
C) Block out some time to delete inbox clutter.
D) all of the above
Question
The goal of workplace surveillance is to alleviate productivity concerns and discourage employees from looking up personal banking information or viewing pornography at work?

A) alleviate productivity concerns
B) discourage employees from looking up personal banking information
C) discourage employees from viewing pornography at work
D) all of the above
Question
Why do most companies find it necessary to have a written policy regarding electronic communication?

A) Employers need a paper trail on employees' activities in case they want to fire them.
B) Issues such as viruses, misuse of the system, and e-mail etiquette need to be clearly spelled out to employees.
C) Finding out if job candidates can understand the policy is critical to the hiring process.
D) Employers want a legally binding contract in place to protect against lawsuits.
Question
What type of e-mail should you avoid sending while at work or from a work account?

A) forwards
B) jokes
C) e-mails containing emoticons
D) all of the above
Question
Which of the following text messages should have been communicated with a phone call or in person?

A) "see you there."
B) "meeting @ 10"
C) "you got the promotion!"
D) none of the above
Question
When you communicate by using any form of technology, you are taking part in

A) computer-mediated communication.
B) current communication practices.
C) secondary communication.
D) inferior communication.
Question
According to the authors of this text, if you want to excel and get promoted to a higher position in leadership, you need to

A) improve your communication with technology.
B) avoid text messaging altogether.
C) stay away from social media.
D) all of the above
Question
Why is it especially important to be careful about the messages you send via electronic communication?

A) Due to the lack of cues, misunderstandings can lead to electronic conflicts.
B) Almost anyone can look into your private e-mails.
C) The same rules apply for electronic communication as paper communication.
D) all of the above
Question
Which term correctly identifies the study of time as communication?

A) oculesics
B) linguistics
C) proxemics
D) chronemics
Question
Which e-mail address example is the most appropriate to use for professional use such as business connections?

A) akb123@yahoo.com
B) yankees4thawin@sports.com
C) john.smith@company.org
D) jamesbond007@hotmail.com
Question
Electronic bulletin boards can be accessed

A) by joining a listserv first.
B) by subscribers.
C) by anyone.
D) through company channels.
Question
Private communication online can be made public.
Question
Stacy has a Facebook account and uses it as a sounding board for her frustration with her personal life and company. Which of the following statements is true?

A) Stacy should only delete anything on her Facebook page that is work related.
B) Stacy should be mindful about what others can retrieve about her on the Internet and should refrain from posting things that may show her in a negative light.
C) She can post negative comments about the company as it is her right to exercise her right to free speech and because of this nothing negative will happen.
D) As long as she is not "friends" with her boss, she should be fine.
Question
Computer-mediated communication occurs in

A) synchronous time.
B) asynchronous time.
C) synchronous and asynchronous time.
D) neither synchronous nor asynchronous time.
Question
What kinds of work teams are designed to help companies connect their employees in different locations and save on time and travel?

A) teleconferences
B) Skype
C) virtual work teams
D) none of the above
Question
What is a question you should take into consideration when attempting to include motivational language in your e-mails?

A) Would I pass this information on in hard copy?
B) Would I repeat this in person?
C) Am I communicating professionalism to my colleagues?
D) all of the above
Question
Sometimes it is okay to send a joke through company-wide e-mail as long as it is not offensive.
Question
The way you communicate when using technology influences the impressions other people have of you.
Question
It's important that you become a more reflective communicator if you want to achieve professional excellence.
Question
What is the purpose of workplace surveillance?
Question
Using a network e-mail address is the only way to ensure its security.
Question
Communication through any type of technology is referred to as computer-mediated communication.
Question
Why is it important to understand the drawbacks of technology in the workplace?

A) to learn to avoid electronic communication whenever possible
B) to understand that misinterpretation, employee surveillance, and information overload can hinder your professional excellence
C) to make sure that no one has access to your personal information
D) to create a workplace culture that is not greatly influenced by electronic communication
Question
____________ is even more difficult to analyze because of the lack of cues in computer mediated communication.

A) Verbal communication
B) Professionalism
C) Competence
D) Nonverbal communication
Question
One way to avoid electronic aggression is to ask yourself if you would say the same thing to someone in person.
Question
For the purposes of organization, all e-mail should be sent to one inbox and then filtered into separate folders within that inbox.
Question
What is a reason why e-mail dialogues can lead to electronic aggression?

A) People are often times frustrated by the overload of e-mail they receive.
B) E-mail dialogues often have glitches which make them difficult to read.
C) The lack of face-to-face cues can lead to misinterpretation and can be construed as offensive.
D) E-mail dialogues can detract from other important work someone might be doing.
Question
Searching social networking sites to view an employee's personal activities is illegal once an employee is hired.
Question
What are the advantages and disadvantages of technology in terms of time management?
Question
Spam is a term used to describe the practice of sending fraudulent e-mails in an attempt to steal sensitive information from the user.
Question
Because of the distance a message has to travel, computer-mediated communication occurs in asynchronous time.
Question
Which of the following is an example of an e-mail flame?

A) Jon sending an e-mail that is blunt, insensitive, and rude to another coworker
B) Susan sending an off-color joke to the entire company
C) Alice using Facebook to complain about a customer
D) Daniel using his company e-mail address for personal business
Question
Communication and technology help you establish contact and maintain professional networks and relationships with coworkers, leaders, and clients.
Question
Information overload occurs when information, requests for feedback, taking on new projects, responding to questions, answering the phone, and completing required online classes for work on top of taking care of loved ones, children, pets, and other family matters leaves us feeling as though things are spinning out of control.
Question
What kind of technological distractions lead to information overload?
Question
Sending authentic-looking but fraudulent e-mails in order to steal sensitive personal information is known as

A) spam.
B) phishing.
C) mimicking.
D) miming.
Question
Blogs are being used by executives to share information and

A) launch new initiatives.
B) establish company policy.
C) justify internal decisions.
D) none of the above
Question
Companies are now asking employees to waive their privacy rights when it comes to using work-related e-mail.
Question
Employees have the right to expect privacy in the workplace.
Question
The _______ process will help you bridge professional excellence with communication and technology and help you excel in the workplace.

A) interview
B) KEYS
C) evaluation
D) none of the above
Question
People generally put the same level of professionalism into their electronic communication as they do their face-to-face communication.
Question
Communication and technology lead to a number of obstacles that can hinder professional excellence.
Question
Sara doesn't enjoy interacting with people. Because her organization requires her to work in team situations, she is the first to sign up for virtual teams so she can at least minimize her face-to-face interactions with her colleagues. What does Sara's approach reflect?

A) someone who isn't able to excel in the workplace
B) an example of why computer- mediated communication is so important to the workplace
C) an example of a technology creating a barrier to effective communication
D) none of the above
Question
The following contribute to information overload:

A) e-mail forwards.
B) spam.
C) phishing.
D) all of the above
Question
E-mail systems and other forms of communication technology make employees more efficient while simultaneously

A) increasing their workload.
B) slowing them down.
C) complicating their work.
D) none of the above
Question
_________ are exchanges of messages about a particular topic using e-mail, professional blog space, and other electronic tools to encourage participation that will ideally lead to new ideas, strategic planning, and sound decision making.

A) Blogs
B) E-mail dialogues
C) Listservs
D) none of the above
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 8: Technology in the Workplace
1
Which of these statements is true regarding spam e-mail?

A) Spam recipients are never random.
B) All spam contains viruses designed to hack your computer.
C) Spammers often steal sensitive passwords.
D) Spammers buy your information from companies you have given your e-mail address to.
D
2
Which of the following is true concerning workplace surveillance systems?

A) Employers are allowed to track information being accessed from their computers.
B) Work computers are more secure than personal computers.
C) Employees can hide their online activity by clearing their search history.
D) Systems that track web activity are illegal without the consent of the employee.
A
3
Computer-mediated communication takes place via

A) computers.
B) cell phones.
C) pagers.
D) all of the above
D
4
When you receive an e-mail written in all caps with lots of exclamation points, the tone of the message is changed. The change in tone is a characteristic of what type of communication?

A) verbal
B) nonverbal
C) non-professional
D) computer-mediated
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
Which strategy is a way to avoid e-mail information overload?

A) Ignore and delete what you can.
B) Read and respond to messages that are important.
C) Block out some time to delete inbox clutter.
D) all of the above
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
The goal of workplace surveillance is to alleviate productivity concerns and discourage employees from looking up personal banking information or viewing pornography at work?

A) alleviate productivity concerns
B) discourage employees from looking up personal banking information
C) discourage employees from viewing pornography at work
D) all of the above
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
Why do most companies find it necessary to have a written policy regarding electronic communication?

A) Employers need a paper trail on employees' activities in case they want to fire them.
B) Issues such as viruses, misuse of the system, and e-mail etiquette need to be clearly spelled out to employees.
C) Finding out if job candidates can understand the policy is critical to the hiring process.
D) Employers want a legally binding contract in place to protect against lawsuits.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
What type of e-mail should you avoid sending while at work or from a work account?

A) forwards
B) jokes
C) e-mails containing emoticons
D) all of the above
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following text messages should have been communicated with a phone call or in person?

A) "see you there."
B) "meeting @ 10"
C) "you got the promotion!"
D) none of the above
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
When you communicate by using any form of technology, you are taking part in

A) computer-mediated communication.
B) current communication practices.
C) secondary communication.
D) inferior communication.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
According to the authors of this text, if you want to excel and get promoted to a higher position in leadership, you need to

A) improve your communication with technology.
B) avoid text messaging altogether.
C) stay away from social media.
D) all of the above
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
Why is it especially important to be careful about the messages you send via electronic communication?

A) Due to the lack of cues, misunderstandings can lead to electronic conflicts.
B) Almost anyone can look into your private e-mails.
C) The same rules apply for electronic communication as paper communication.
D) all of the above
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
Which term correctly identifies the study of time as communication?

A) oculesics
B) linguistics
C) proxemics
D) chronemics
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
Which e-mail address example is the most appropriate to use for professional use such as business connections?

A) akb123@yahoo.com
B) yankees4thawin@sports.com
C) john.smith@company.org
D) jamesbond007@hotmail.com
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
Electronic bulletin boards can be accessed

A) by joining a listserv first.
B) by subscribers.
C) by anyone.
D) through company channels.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
Private communication online can be made public.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
Stacy has a Facebook account and uses it as a sounding board for her frustration with her personal life and company. Which of the following statements is true?

A) Stacy should only delete anything on her Facebook page that is work related.
B) Stacy should be mindful about what others can retrieve about her on the Internet and should refrain from posting things that may show her in a negative light.
C) She can post negative comments about the company as it is her right to exercise her right to free speech and because of this nothing negative will happen.
D) As long as she is not "friends" with her boss, she should be fine.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Computer-mediated communication occurs in

A) synchronous time.
B) asynchronous time.
C) synchronous and asynchronous time.
D) neither synchronous nor asynchronous time.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
What kinds of work teams are designed to help companies connect their employees in different locations and save on time and travel?

A) teleconferences
B) Skype
C) virtual work teams
D) none of the above
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
What is a question you should take into consideration when attempting to include motivational language in your e-mails?

A) Would I pass this information on in hard copy?
B) Would I repeat this in person?
C) Am I communicating professionalism to my colleagues?
D) all of the above
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
Sometimes it is okay to send a joke through company-wide e-mail as long as it is not offensive.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
The way you communicate when using technology influences the impressions other people have of you.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
It's important that you become a more reflective communicator if you want to achieve professional excellence.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
What is the purpose of workplace surveillance?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
Using a network e-mail address is the only way to ensure its security.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Communication through any type of technology is referred to as computer-mediated communication.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
Why is it important to understand the drawbacks of technology in the workplace?

A) to learn to avoid electronic communication whenever possible
B) to understand that misinterpretation, employee surveillance, and information overload can hinder your professional excellence
C) to make sure that no one has access to your personal information
D) to create a workplace culture that is not greatly influenced by electronic communication
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
____________ is even more difficult to analyze because of the lack of cues in computer mediated communication.

A) Verbal communication
B) Professionalism
C) Competence
D) Nonverbal communication
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
One way to avoid electronic aggression is to ask yourself if you would say the same thing to someone in person.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
For the purposes of organization, all e-mail should be sent to one inbox and then filtered into separate folders within that inbox.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
What is a reason why e-mail dialogues can lead to electronic aggression?

A) People are often times frustrated by the overload of e-mail they receive.
B) E-mail dialogues often have glitches which make them difficult to read.
C) The lack of face-to-face cues can lead to misinterpretation and can be construed as offensive.
D) E-mail dialogues can detract from other important work someone might be doing.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
Searching social networking sites to view an employee's personal activities is illegal once an employee is hired.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
What are the advantages and disadvantages of technology in terms of time management?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
Spam is a term used to describe the practice of sending fraudulent e-mails in an attempt to steal sensitive information from the user.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Because of the distance a message has to travel, computer-mediated communication occurs in asynchronous time.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following is an example of an e-mail flame?

A) Jon sending an e-mail that is blunt, insensitive, and rude to another coworker
B) Susan sending an off-color joke to the entire company
C) Alice using Facebook to complain about a customer
D) Daniel using his company e-mail address for personal business
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
Communication and technology help you establish contact and maintain professional networks and relationships with coworkers, leaders, and clients.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Information overload occurs when information, requests for feedback, taking on new projects, responding to questions, answering the phone, and completing required online classes for work on top of taking care of loved ones, children, pets, and other family matters leaves us feeling as though things are spinning out of control.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
What kind of technological distractions lead to information overload?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
Sending authentic-looking but fraudulent e-mails in order to steal sensitive personal information is known as

A) spam.
B) phishing.
C) mimicking.
D) miming.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Blogs are being used by executives to share information and

A) launch new initiatives.
B) establish company policy.
C) justify internal decisions.
D) none of the above
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
Companies are now asking employees to waive their privacy rights when it comes to using work-related e-mail.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Employees have the right to expect privacy in the workplace.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
The _______ process will help you bridge professional excellence with communication and technology and help you excel in the workplace.

A) interview
B) KEYS
C) evaluation
D) none of the above
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
People generally put the same level of professionalism into their electronic communication as they do their face-to-face communication.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
Communication and technology lead to a number of obstacles that can hinder professional excellence.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Sara doesn't enjoy interacting with people. Because her organization requires her to work in team situations, she is the first to sign up for virtual teams so she can at least minimize her face-to-face interactions with her colleagues. What does Sara's approach reflect?

A) someone who isn't able to excel in the workplace
B) an example of why computer- mediated communication is so important to the workplace
C) an example of a technology creating a barrier to effective communication
D) none of the above
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
The following contribute to information overload:

A) e-mail forwards.
B) spam.
C) phishing.
D) all of the above
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
E-mail systems and other forms of communication technology make employees more efficient while simultaneously

A) increasing their workload.
B) slowing them down.
C) complicating their work.
D) none of the above
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
_________ are exchanges of messages about a particular topic using e-mail, professional blog space, and other electronic tools to encourage participation that will ideally lead to new ideas, strategic planning, and sound decision making.

A) Blogs
B) E-mail dialogues
C) Listservs
D) none of the above
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.