True/False Indicate whether the
statement is true or false.
|
|
1.
|
Generally the communications media for teleconferencing is a telephone
line.
|
|
2.
|
In most instances, electronic communications use voice rather than text or
graphics.
|
|
3.
|
The most widely used one-to-one communication on the Internet is e-mail.
|
|
4.
|
Temporary Internet Files (TIF) increase the amount of time it takes for a
browser to load and display a Web site.
|
|
5.
|
You can attach any number of files to an e-mail message, regardless of the
size.
|
|
6.
|
Most e-mail users report that their biggest problem is spam.
|
|
7.
|
A worm is a type of virus that has to attach itself to other files in order to
spread.
|
|
8.
|
The best way to protect data on a computer is to effectively control
access.
|
|
9.
|
Instant messaging should be short and to the point.
|
|
10.
|
It is possible to add a hyperlink to a message rather than attaching a
file.
|
Multiple Choice Identify the
choice that best completes the statement or answers the question.
|
|
11.
|
Which of the following was originally developed to facilitate the syndication of
news articles?
a. | Phishing | c. | RDF Summary | b. | Teleconferencing | d. | Google Docs |
|
|
12.
|
Which type of correspondence is possible with electronic communication?
a. | One to one | c. | Many to many | b. | One to many | d. | Any of the
above |
|
|
13.
|
____ is the process of selecting paths in a network along which to send network
traffic.
a. | Forwarding | c. | Tagging | b. | Routing | d. | Phishing |
|
|
14.
|
Which of the following allows people to use voice, full-motion video, and
interactive desktop sharing?
a. | Community building | c. | History tracking | b. | Collaborative communication | d. | Tagging |
|
|
15.
|
Google Docs is an example of what type of program?
a. | Anti-virus | c. | Online document sharing | b. | History
tracking | d. | Collaborative
communication |
|
|
16.
|
Which of the following is not a sort option for displaying the History
list in Internet Explorer?
a. | By Total Time | c. | By Site | b. | By Date | d. | By Most Visited |
|
|
17.
|
If you are having trouble configuring your e-mail account with Windows Mail, you
might consider using ____.
a. | the Network Repair Tool | c. | rich text format
(RTF) | b. | Windows Live Mail | d. | HTML formatting |
|
|
18.
|
A “bounced” e-mail refers to a message that ____.
a. | has an attachment | c. | gets returned because of delivery failure | b. | has a
virus | d. | is sent in rich text
format and gets garbled |
|
|
19.
|
Mistyping an e-mail address can cause the message to ____.
a. | fail to be delivered | c. | get caught in the spam filter | b. | spread a
virus | d. | get sorted into the
Junk folder |
|
|
20.
|
What is a paper trail?
a. | A written record created in the course of activities | b. | A message that gets
garbled during transmission | c. | An attachment that gets blocked by your e-mail
program | d. | Notification that an e-mail message was not delivered
properly |
|
|
21.
|
If the reply message is not applicable to other recipients, which is the best
response option?
a. | Reply | c. | Cc | b. | Reply All | d. | Bcc |
|
|
22.
|
Radio listeners believing that invaders from Mars were attacking the world is an
example of a(n) ____.
a. | hoax | c. | urban legend | b. | virus | d. | pyramid scheme |
|
|
23.
|
Which is an integrated security system that prevents unauthorized electronic
access to a network computer system while permitting outward communication?
a. | Firewall | c. | Antivirus software | b. | Electronic identification
cards | d. | Biometric security
measures |
|
|
24.
|
Encryption technologies can help keep ____ information secure.
a. | anti-virus | c. | teleconferencing | b. | instant messaging | d. | credit card |
|
|
25.
|
If a customer needs immediate assistance or has a complaint, then the reply
should be within ____.
a. | 5 minutes | c. | 5 to 10 hours | b. | 30 minutes to 3 hours | d. | 24 hours |
|
|
26.
|
What is the estimated yearly cost of spam for U.S. businesses?
a. | $20 thousand | c. | $20 billion | b. | $20 million | d. | $20 trillion |
|
|
27.
|
GlobalSign and VeriSign are commercial digital ID groups that can help you
____.
a. | encrypt an e-mail message | c. | prevent viruses | b. | control unsolicited
e-mail | d. | add hyperlinks to an
e-mail message |
|
|
28.
|
The Vmyths Web site can help people identify ____.
a. | pyramid schemes | c. | Trojan horses | b. | hoaxes | d. | worms |
|
|
|
FIGURE 26-1
|
|
29.
|
Figure 26-1 above shows an example of ____.
a. | encryption technology | c. | biometric security measures | b. | a
firewall | d. | virus
protection |
|
|
|
FIGURE 26-2
|
|
30.
|
The interface shown in Figure 26-2 above would be used for ____.
a. | teleconferencing | c. | sharing the content of blogs | b. | instant
messaging | d. | tagging |
|
|
|
Case 26-1 Gilbert uses Windows Mail as his e-mail program. He has been
getting a lot of junk e-mail in his inbox and wants to take steps to help prevent the number of
unsolicited messages that he receives.
|
|
31.
|
The type of junk e-mail that Gilbert is receiving is called ____.
a. | fraud | c. | worm | b. | hoax | d. | spam |
|
|
32.
|
To display the Junk E-mail Options dialog box, Gilbert would click ____ on the
menu bar and then click Junk E-mail Options.
a. | File | c. | Internet | b. | Tools | d. | Filter |
|
|
|
Case 26-2 Wanda has just been hired to work for a Web design company.
As part of her new employee training, her supervisor reviews the company’s list of guidelines
for the use of electronic communications.
|
|
33.
|
Wanda’s supervisor explains that she is expected to follow the rules of
____ when communicating through electronic media.
a. | netiquette | c. | tagging | b. | phishing | d. | filtering |
|
|
34.
|
Wanda learns that when the correspondence requires a paper trail, the best
communication method is ____.
a. | instant messaging | c. | cell phone | b. | teleconferencing | d. | e-mail |
|
Matching
|
|
|
Identify the letter of the choice that best
matches the phrase or definition.
a. | Phishing | b. | Pyramid
scheme | c. | Hoax | d. | Urban legend | e. | Trojan
horse |
|
|
35.
|
E-mail messages which are personal information scams.
|
|
36.
|
Stories which at one time could have been partially true.
|
|
37.
|
A virus that does something different from what it is expected to do.
|
|
38.
|
An attempt to deceive an audience into believing that something false is
real.
|
|
39.
|
An illicit business model where profits are based on the investor’s
ability to recruit other individuals.
|