Technology for Success Computer Concepts Module 11

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

If you do not want to use your Internet service provider (ISP) for your email account, how can you acquire a webmail account? a) Through your employer b) Through an online service c) Through your school d) Through a social network

b) Through an online service You can also set up an account through an online service such as Gmail, and then access your email using a web browser, a system known as webmail.

Posting hostile or insulting comments in response to someone else's blog post is called _____. a) cyberstalking b) flaming c) doxxing d) hashing

b) flaming

How would you design a webinar that would be interactive? a) Include a presenter demonstration b) Design slide shows c) Add a poll d) Upload videos

c) Add a poll Webinars are more interactive and collaborative if they allow polling to survey the audience on a topic or if they let participants ask and answer questions.

A business can use a wiki in the following ways EXCEPT _____. a) accessing schedules and procedures b) exchanging ideas c) sharing policies d) aggregating content

d) aggregating content

If you want to remove an older email from your inbox, but not permanently delete it, you can _____ it. a) archive b) resend c) recycle d) categorize

a) archive

You received an unpleasant email from a coworker and you want to discreetly notify your supervisor. Which of the following features could you use to do this? a) BCC your supervisor in your response b) CC your supervisor in your response c) Reply All and add your supervisor in the To field d) Reply and add your supervisor in the To field

a) BCC your supervisor in your response

Businesses use webinars for the following reasons EXCEPT _____. a) Group discussions b) Education and compliance c) Training and skill development d) Brand promotion

a) Group discussions Webinars are ideal for education and training. Businesses also use webinars to promote their brands and establish their credibility to customers and potential customers.

What is one advantage of a company using an anonymous messaging app? a) It allows for honest feedback without disclosing identities. b) It allows posts to other websites to encourage that site to support your view without giving up your identity. c) It allows for data to be collected on websites you like without sharing your identity. d) It allows you to monitor others without them knowing so you can find out what they like.

a) It allows for honest feedback without disclosing identities.

In business, what has replaced social bookmarking in helping users find the most relevant, high-quality information, collect it, and share it with others? a) Social curation sites b) Social media c) Social networks d) Social conferencing

a) Social curation sites

Daniela's company has decided to allow employees to work from home. What can the company use to let employees continue to meet and collaborate on group projects? a) Web conferences b) Text messaging c) Email messages d) Podcasts

a) Web conferences

Gwen is starting a blog about vegetable gardening. What information should she include on the blog's home page? a) list of posts with the most recent ones at the top b) a photo and description of herself c) an indicator showing the number of pageviews d) list of webpages that link to her blog

a) list of posts with the most recent ones at the top

Netiquette only applies to social media and social networking, not emails and instant messaging. a) True b) False

b) False As you use digital communications of any kind, it is vital that you follow the rules of Internet etiquette, known as netiquette, to protect yourself, your family, and your career.

[email protected] is an appropriate email address to use for communicating with potential employers. a) True b) False

b) False Do not choose a humorous or offensive user name; assume that your email communications will be used to communicate with potential employers.

Twitter is an example of a wiki, which allows for collaborative editing by its users. a) True b) False

b) False Twitter allows messages up to 280 characters categorizing it a microblog, not a wiki.

Wikis are not useful in education because students cannot use them to share notes and give feedback. a) True b) False

b) False Wikis are useful in education for students working together on projects; they can post online portfolios, share research notes, and give feedback to group members.

Everything you do online is recorded in the cloud, but you can choose to erase it, as you have control over your digital footprint. a) True b) False

b) False Your digital footprint, the records of everything you do online, is nearly impossible to erase.

In the email communication process, what is the role of the email server? a) Encrypting data that is sent over an unsecured network b) Routing email messages through the Internet or a private network c) Storing archived email messages d) Creating messages to send

b) Routing email messages through the Internet or a private network The main computer in an email system is an email server, which routes email messages through the Internet or a private network.

Which of the following is a step in the email communication process? a) The recipient opens an email attachment. b) The message travels along Internet routers to the recipient. c) Hardware on the server determines the best route for the data. d) Your Internet service provider contacts software on the outgoing mail server to retrieve the message.

b) The message travels along Internet routers to the recipient. See Figure 11-13 for detailed steps on how email is routed from sender to receiver.

How do you create an email message? a) Use a web service and create an account. b) Use an app or software to compose and send information. c) Use a content management system to publish notes to individuals. d) Use a program that captures incoming hashtags for sharing with others.

b) Use an app or software to compose and send information. If you are not using webmail, you need to install an email app (also called an email client), an application that lets you create, send, receive, forward, store, print, and delete email messages.

Social networking can leave you exposed to criminal activity in the following ways EXCEPT _____. a) Tracking your online activity and then selling that data without your knowledge b) Using your photos and posts to form impressions about your character c) Alerting others that you are not home according to location-tracking features d) Enticing you to friend someone so that they gain access to your account

b) Using your photos and posts to form impressions about your character When you use the check in feature on social networks, you broadcast that you are not home at the same time you identify your whereabouts. This may put you and your home at risk by anyone who wishes to do you harm. Fake social media sites may entice you to "friend" them, so they can hack into your information and publish it elsewhere without your permission. Data harvesters may track your online activity and use the information for advertising or for illegal purposes.

How would you describe the social networking site YouTube? a) YouTube is a microblog. b) YouTube is a media-sharing network. c) YouTube is a discussion forum. d) YouTube is a social curation site.

b) YouTube is a media-sharing network. YouTube is a media-sharing network lets users display and view videos and then post comments.

On what type of network can you rent things such as cars, tools, and rooms? a) blogging network b) sharing economy network c) media-sharing network d) real estate network

b) sharing economy network

You just got back from vacation and are getting ready to post pictures online of all the fun you had. Which of the following photos would be appropriate to post on social media? a) A photo of you dancing on a tabletop wearing a shirt with your company logo on it. b) A photo of you in a pool with two beers in each hand. c) A photo of you horseback riding on the beach with friends. d) A photo of you out to dinner, holding hands with a prospective client.

c) A photo of you horseback riding on the beach with friends.

To observe professional messaging guidelines, you should avoid using the following EXCEPT _____. a) Abbreviations b) Emojis c) Meeting invites d) Personal photographs

c) Meeting invites When sending instant messages at work or participating in company chat rooms, avoid using abbreviations, emoticons and emojis, and sharing any of your personal information.

How might a business use a blog? a) To present a demonstration b) To host a meeting c) To communicate with customers d) To transmit a video

c) To communicate with customers Businesses use blogs to communicate with employees, customers, and vendors. They also use blogs to build their online presence and increase sales.

Which of the following is an example of someone who is NOT practicing good netiquette? a) Tamika used the Reply All button to send an email about a meeting room change. b) Raj tweeted about the guest speaker at the staff meeting unveiling new office technology with the hashtag #cantwaittotry. c) Vance found pictures of Dorie in a bikini on Facebook and texted them to other men in the office. d) Margie posted pictures from her son's baseball game with the caption, "Great job, boys!"

c) Vance found pictures of Dorie in a bikini on Facebook and texted them to other men in the office.

An online game developer has an issue with its most popular game and must take the server offline. The company posts an update on its social media page. How is this a positive use of social networking? a) It shares the company's plans with competitors, making it transparent and honest. b) It allows the users to share their experiences with the game on a different platform while the site is down. c) It confirms who uses the social networking platform to get status updates and follow the game. d) It allows the company to communicate to many users at once about an issue and release status updates.

d) It allows the company to communicate to many users at once about an issue and release status updates. If a business has a public relations issue, such as a product flaw or service outage, it can use social media to send immediate status updates and communicate the company's position.

You are using a social network and want to let others know that you are interested in their posts. Which of the following could you use to alert them to your interest? a) Attach a hashtag (#) to the post. b) "Like" their post. c) Extend your contacts to include more individuals. d) Share the post on your news feed.

d) Share the post on your news feed.

You just posted new photographs to Shutterfly, and the site asks you to review the metadata. Metadata includes the following information EXCEPT _____. a) The date a photo was taken b) The file size c) The GPS location coordinates d) The HTML coding

d) The HTML coding Metadata is data that describes other data. Examples include the GPS location coordinates, the file size, the date a document was created, and the author of the document.

In his small business, Adrian wants to use his laptop to place and receive phone calls. What type of service should he use? a) Voice and video service (VVS) b) Audio Internet service provider (AISP) c) Voice-to-Text (VTT) d) Voice over Internet Protocol (VoIP)

d) Voice over Internet Protocol (VoIP)

Social networking includes the following positive effects EXCEPT _________. a) keeping in contact with others b) promoting small and local businesses c) growing professional networks d) increasing your privacy

d) increasing your privacy

Which of the following is typical content for a podcast? a) phone calls b) online chats c) interactive seminars d) radio shows

d) radio shows


Ensembles d'études connexes

English Composition I - Quiz 7: Punctuation and Mechanics

View Set

NCLEX book CHAPTER 58- Renal and Urinary System

View Set

314 Exam #1: Principles in Community and Public Health Nursing Assessment

View Set

Medical Terminology, CH.3, Body Positions

View Set

Pre-Test: Standards 1.7, 1.8, 1.9

View Set