EDUC MOD 1, CH. 7

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following is NOT a social media website?

PowerPoint

Which of the following is NOT among the recommendations for writing effective e-mails?

Write a long, multi-topic message.

The definition of a podcast is

a prerecorded audio or video program available to students to view on a computer or mobile device.

For some courses the entire textbook is made available online in a(n) ________ that offers a highly structured and effective means of studying the material.

adaptive learning format

E-mail messages are most effective when they

are short and direct.

The term refers to the gap between tech savvy students and those students starting in college with limited computer experience because of socioeconomic disparities.

digital divide

The term _______ __________ refers to the gap between tech savvy students and those students starting in college with limited computer experience because of socioeconomic disparities.

digital divide

The use of emoticons in a formal e-mail are

discouraged because the symbols may not be known by the recipient.

Technology plays a large role in myriad aspects of life,

even though there are different levels of competence among users.

Which of the following are among the advantages of lecture capture?

more engagement with the class and less with taking notes ability to review material when studying

Which of the following cannot (yet!) be transmitted to your computer via the web?

pizza

E-mails are often a quick and efficient form of communication which, unlike a phone call or face-to-face meeting,

requires a more careful consideration of the tone your words convey.

If allowed by the instructor, a cell phone can be set to "vibrate" during class; otherwise you

should turn it off.

When you send a message in all capital letters, it sends a message to the reader that you are

shouting.

When writing an e-mail to someone you know only casually or perhaps not at all, it is most appropriate to provide a bit of information about yourself in

the beginning of message.

In order for an e-mail recipient and sender to easily know that there has been a response to an e-mail request, it is recommended that

the e-mail have an appropriate subject line and include only one major topic.

One recommendation for keeping spam from interfering with your college and career communications is to

use one e-mail address for personal messages and one for college and professional messages.

Which of the following is an appropriate time to use a smartphone in class?

when using individual response technology

A common reason you can wind up sending an e-mail to intended as well as unintended recipients is that

you accidentally hit "reply all" when you simply meant to hit "reply."

The tone of a formal e-mail should be

respectful and courteous.

Identify the activity that has NO relation or connection to a computer or technology.

rowing a boat.

Technology can

save time. help you achieve academic success. eat up time.

Measures taken to protect computers and computer systems against unauthorized access or attack are known as .

Blank 1: cybersecurity, cyber-security, or cyber security

The term Blank 1Blank 1 digital , Correct Unavailable Blank 2Blank 2 divide, Correct Unavailable refers to the gap between tech savvy students and those students starting in college with limited computer experience because of socioeconomic disparities.

digital divide

The most common form of communication between students and faculty on most college campuses is

e-mail.

Electronic messages should consist of language and information you would be willing to share

face-to-face.

Most textbooks have a website that is tied to the book. The website likely includes

flash cards. chapter summaries. interactive reviews.

Even experienced e-mail users can improve the effectiveness of their messages by

following the guidelines for formal e-mail messages.

Sexual predators use the web to identify victims. To protect yourself and others, take additional measures to guard which of the following information?

future class schedule or travel plans name, phone number, address, etc.

Criminals known as ________ may illegally attempt to gain access to and tamper with information on your computer.

hackers

E-mail recipients often delete emails from unknown sources. To avoid this, you should

identify yourself early in the message.

If you post information about yourself on Facebook you should keep in mind that

in addition to your friends, your instructors and parents might see the information.

If you are going to make a request in an e-mail, where should you put the request?

in the beginning

Most textbooks have a website that is tied to the book. The website likely includes

interactive reviews. chapter summaries. flash cards.

Spam is best thought of as

junk mail.

Technology in which instructors upload in-class lectures, slides, and videos to a website that students can access is known as technology.

lecture capture

Technology in which instructors upload in-class lectures, slides, and videos to a website that students can access is known as technology.

lecture capture

Sexual predators use the web to identify victims. To protect yourself and others, take additional measures to guard which of the following information?

name, phone number, address, etc. future class schedule or travel plans

To avoid misunderstandings in an e-mail, it is recommended that you follow the rules of

netiquette.

Which of the following are true of social media websites?

Facebook has more than 2 billion active users. Most college students use social media websites.

True or false: A picture on your social network site cannot be copied and posted on a friend's site.

False

Why should you never use your cell phone to text answers to problems in class?

It is cheating.

Identify the statement that best describes what the web does.

It provides a graphical means for locating and accessing information on the Internet.

________ is a popular classroom presentation program.

PowerPoint

For which reasons should you use your college e-mail address when communicating with instructors?

The domain name will be familiar to the instructor. You should already be checking your college e-mail regularly in case of important college messages

For which reasons should you use your college e-mail address when communicating with instructors?

The domain name will be familiar to the instructor. You should already be checking your college e-mail regularly in case of important college messages.

Which of the following is true of blogs?

They are public documents that virtually anyone can view.

True or false: One advantage of viewing or listening to a podcast lecture is that a student may review the lecture outside of the classroom at a more convenient time.

True

Which of the following is among the guidelines for the appropriate use of technology while in the classroom?

Turn off your cell phone.

A blog is a website that

acts as a kind of public diary with ideas and commentary.

If you are texting, you are indicating to the instructor that you

are not paying attention to what's going on in class.

The course website for a course taught entirely online is like to allow students to

submit papers. take tests. complete exercises.

Texting involves very short messages that

are commonly used in student-to-student communication.

True or false: If your instructor has not said otherwise, you should assume that you can answer an important call if your phone rings during class.

False

Which of the following is NOT one of the three basic elements of an e-mail address?

HTTP:

Which of the following are true of video messaging?

It allows users to communicate with video, voice, and instant messaging. It is generally free.

Which of the following e-mail messages intended to convey excitement would most easily be misunderstood as conveying anger?

JOSH: COME TO MY OFFICE ASAP!

Which of the following meets the recommendations for an informative subject line for an e-mail?

Job Posting: Math Tutor

Which of the following is NOT among the recommendations for dealing with spam and maintaining cybersecurity?

Make your password long and complex and use it on every program you access.

Which guidelines apply to meeting someone you've known only from the web, such as from a dating site?

Meet where many people will be present. Tell a friend or family member. Meet in a visible, public location.

What guideline should you follow on social media to protect yourself and those close to you from sexual predators?

Never post personal information that would allow someone to track you down.

You are writing a formal e-mail to a colleague. Which of following best illustrates how to make an effective request in your e-mail?

Please respond to the following question no later than Friday at noon.

a prerecorded audio or video program available to students to view on a computer or mobile device.

PowerPoint

Which guidelines apply to meeting someone you've known only from the web, such as from a dating site?

Tell a friend or family member. Meet where many people will be present. Meet in a visible, public location.

Which of the following are commonly used video message services?

Skype Facetime

Blank 1 Spam, Correct Unavailable is typically "junk" commercial e-mail that is intended to increase the sales of products.

Spam

What is one reason you should be especially polite and professional when e-mailing instructors?

They receive many e-mails each week from students and are sensitive to messages that are inappropriate.

For which reasons should you use your college e-mail address when communicating with instructors?

You should already be checking your college e-mail regularly in case of important college messages. The domain name will be familiar to the instructor.

Which of the following are among the advantages of lecture capture?

ability to review material when studying more engagement with the class and less with taking notes

Gmail and Yahoo! Mail are examples of e-mail providers that

allow you to retrieve your emails anywhere you have access to the web.

One reason you are cautioned to not write anything in an e-mail that you would not want to see in the newspaper is that

an e-mail can easily be forwarded to one or more people without your knowledge.

To ensure that e-mail attachments will be opened by your intended recipient, you should

be sure that the recipient knows who you are.

A digital divide separates students who have considerable and easy access to ________ and those who do not.

computers the Internet

Sarita is at work and needs to complete a course assignment before attending class, but she cannot recall all of the details of the assignment. Which of the following academic technology resources will she most likely use?

course website

Measures taken to protect computers and computer systems against unauthorized access or attack are known as .

cyber security

When you receive an e-mail that angers or annoys you, it is recommended that you

take a deep breath and let the anger pass before responding.

The purpose of a laptop in the classroom is to ________ and nothing else.

take notes

Most employers today expect the individuals they hire to have a strong working knowledge of a variety of

technologies.

A digital divide separates students who have considerable and easy access to ________ and those who do not.

the Internet computers

One factor to consider when communicating through e-mail is that

the reader can not see the facial expression or gestures that give additional meaning to your words.

Appropriately utilizing technology as a tool in college can be a

time saver.


Ensembles d'études connexes

Voting, Political Parties, and Interest Groups

View Set

Journeys 5th Grade Lesson 3 COMPREHENSION

View Set

International Business Chapter 13 Multiple Choice

View Set

Quiz 1 - Chapter 1: Exploring Economics

View Set

Controlled Substance Prescriptions

View Set

Managerial Accounting Smartbook 6

View Set

Chapter 1 - Introduction to Managerial Accounting

View Set