Name: 
 

Chapter 26 Living Online



True/False
Indicate whether the statement is true or false.
 

 1. 

Generally the communications media for teleconferencing is a telephone line.
 

 2. 

In most instances, electronic communications use voice rather than text or graphics.
 

 3. 

The most widely used one-to-one communication on the Internet is e-mail.
 

 4. 

Temporary Internet Files (TIF) increase the amount of time it takes for a browser to load and display a Web site.
 

 5. 

You can attach any number of files to an e-mail message, regardless of the size.
 

 6. 

Most e-mail users report that their biggest problem is spam.
 

 7. 

A worm is a type of virus that has to attach itself to other files in order to spread.
 

 8. 

The best way to protect data on a computer is to effectively control access.
 

 9. 

Instant messaging should be short and to the point.
 

 10. 

It is possible to add a hyperlink to a message rather than attaching a file.
 

Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 11. 

Which of the following was originally developed to facilitate the syndication of news articles?
a.
Phishing
c.
RDF Summary
b.
Teleconferencing
d.
Google Docs
 

 12. 

Which type of correspondence is possible with electronic communication?
a.
One to one
c.
Many to many
b.
One to many
d.
Any of the above
 

 13. 

____ is the process of selecting paths in a network along which to send network traffic.
a.
Forwarding
c.
Tagging
b.
Routing
d.
Phishing
 

 14. 

Which of the following allows people to use voice, full-motion video, and interactive desktop sharing?
a.
Community building
c.
History tracking
b.
Collaborative communication
d.
Tagging
 

 15. 

Google Docs is an example of what type of program?
a.
Anti-virus
c.
Online document sharing
b.
History tracking
d.
Collaborative communication
 

 16. 

Which of the following is not a sort option for displaying the History list in Internet Explorer?
a.
By Total Time
c.
By Site
b.
By Date
d.
By Most Visited
 

 17. 

If you are having trouble configuring your e-mail account with Windows Mail, you might consider using ____.
a.
the Network Repair Tool
c.
rich text format (RTF)
b.
Windows Live Mail
d.
HTML formatting
 

 18. 

A “bounced” e-mail refers to a message that ____.
a.
has an attachment
c.
gets returned because of delivery failure
b.
has a virus
d.
is sent in rich text format and gets garbled
 

 19. 

Mistyping an e-mail address can cause the message to ____.
a.
fail to be delivered
c.
get caught in the spam filter
b.
spread a virus
d.
get sorted into the Junk folder
 

 20. 

What is a paper trail?
a.
A written record created in the course of activities
b.
A message that gets garbled during transmission
c.
An attachment that gets blocked by your e-mail program
d.
Notification that an e-mail message was not delivered properly
 

 21. 

If the reply message is not applicable to other recipients, which is the best response option?
a.
Reply
c.
Cc
b.
Reply All
d.
Bcc
 

 22. 

Radio listeners believing that invaders from Mars were attacking the world is an example of a(n) ____.
a.
hoax
c.
urban legend
b.
virus
d.
pyramid scheme
 

 23. 

Which is an integrated security system that prevents unauthorized electronic access to a network computer system while permitting outward communication?
a.
Firewall
c.
Antivirus software
b.
Electronic identification cards
d.
Biometric security measures
 

 24. 

Encryption technologies can help keep ____ information secure.
a.
anti-virus
c.
teleconferencing
b.
instant messaging
d.
credit card
 

 25. 

If a customer needs immediate assistance or has a complaint, then the reply should be within ____.
a.
5 minutes
c.
5 to 10 hours
b.
30 minutes to 3 hours
d.
24 hours
 

 26. 

What is the estimated yearly cost of spam for U.S. businesses?
a.
$20 thousand
c.
$20 billion
b.
$20 million
d.
$20 trillion
 

 27. 

GlobalSign and VeriSign are commercial digital ID groups that can help you ____.
a.
encrypt an e-mail message
c.
prevent viruses
b.
control unsolicited e-mail
d.
add hyperlinks to an e-mail message
 

 28. 

The Vmyths Web site can help people identify ____.
a.
pyramid schemes
c.
Trojan horses
b.
hoaxes
d.
worms
 
 
FIGURE 26-1
nar001-1.jpg
 

 29. 

Figure 26-1 above shows an example of ____.
a.
encryption technology
c.
biometric security measures
b.
a firewall
d.
virus protection
 
 
FIGURE 26-2
nar002-1.jpg
 

 30. 

The interface shown in Figure 26-2 above would be used for ____.
a.
teleconferencing
c.
sharing the content of blogs
b.
instant messaging
d.
tagging
 
 
Case 26-1
Gilbert uses Windows Mail as his e-mail program. He has been getting a lot of junk e-mail in his inbox and wants to take steps to help prevent the number of unsolicited messages that he receives.
 

 31. 

The type of junk e-mail that Gilbert is receiving is called ____.
a.
fraud
c.
worm
b.
hoax
d.
spam
 

 32. 

To display the Junk E-mail Options dialog box, Gilbert would click ____ on the menu bar and then click Junk E-mail Options.
a.
File
c.
Internet
b.
Tools
d.
Filter
 
 
Case 26-2
Wanda has just been hired to work for a Web design company. As part of her new employee training, her supervisor reviews the company’s list of guidelines for the use of electronic communications.
 

 33. 

Wanda’s supervisor explains that she is expected to follow the rules of ____ when communicating through electronic media.
a.
netiquette
c.
tagging
b.
phishing
d.
filtering
 

 34. 

Wanda learns that when the correspondence requires a paper trail, the best communication method is ____.
a.
instant messaging
c.
cell phone
b.
teleconferencing
d.
e-mail
 

Matching
 
 
Identify the letter of the choice that best matches the phrase or definition.
a.
Phishing
b.
Pyramid scheme
c.
Hoax
d.
Urban legend
e.
Trojan horse
 

 35. 

E-mail messages which are personal information scams.
 

 36. 

Stories which at one time could have been partially true.
 

 37. 

A virus that does something different from what it is expected to do.
 

 38. 

An attempt to deceive an audience into believing that something false is real.
 

 39. 

An illicit business model where profits are based on the investor’s ability to recruit other individuals.
 



 
Check Your Work     Start Over