EDUC MOD 1, CH. 7
Which of the following is NOT a social media website?
PowerPoint
Which of the following is NOT among the recommendations for writing effective e-mails?
Write a long, multi-topic message.
The definition of a podcast is
a prerecorded audio or video program available to students to view on a computer or mobile device.
For some courses the entire textbook is made available online in a(n) ________ that offers a highly structured and effective means of studying the material.
adaptive learning format
E-mail messages are most effective when they
are short and direct.
The term refers to the gap between tech savvy students and those students starting in college with limited computer experience because of socioeconomic disparities.
digital divide
The term _______ __________ refers to the gap between tech savvy students and those students starting in college with limited computer experience because of socioeconomic disparities.
digital divide
The use of emoticons in a formal e-mail are
discouraged because the symbols may not be known by the recipient.
Technology plays a large role in myriad aspects of life,
even though there are different levels of competence among users.
Which of the following are among the advantages of lecture capture?
more engagement with the class and less with taking notes ability to review material when studying
Which of the following cannot (yet!) be transmitted to your computer via the web?
pizza
E-mails are often a quick and efficient form of communication which, unlike a phone call or face-to-face meeting,
requires a more careful consideration of the tone your words convey.
If allowed by the instructor, a cell phone can be set to "vibrate" during class; otherwise you
should turn it off.
When you send a message in all capital letters, it sends a message to the reader that you are
shouting.
When writing an e-mail to someone you know only casually or perhaps not at all, it is most appropriate to provide a bit of information about yourself in
the beginning of message.
In order for an e-mail recipient and sender to easily know that there has been a response to an e-mail request, it is recommended that
the e-mail have an appropriate subject line and include only one major topic.
One recommendation for keeping spam from interfering with your college and career communications is to
use one e-mail address for personal messages and one for college and professional messages.
Which of the following is an appropriate time to use a smartphone in class?
when using individual response technology
A common reason you can wind up sending an e-mail to intended as well as unintended recipients is that
you accidentally hit "reply all" when you simply meant to hit "reply."
The tone of a formal e-mail should be
respectful and courteous.
Identify the activity that has NO relation or connection to a computer or technology.
rowing a boat.
Technology can
save time. help you achieve academic success. eat up time.
Electronic messages should consist of language and information you would be willing to share
face-to-face.
Most textbooks have a website that is tied to the book. The website likely includes
flash cards. chapter summaries. interactive reviews.
E-mail recipients often delete emails from unknown sources. To avoid this, you should
identify yourself early in the message.
If you post information about yourself on Facebook you should keep in mind that
in addition to your friends, your instructors and parents might see the information.
Most textbooks have a website that is tied to the book. The website likely includes
interactive reviews. chapter summaries. flash cards.
Spam is best thought of as
junk mail.
Technology in which instructors upload in-class lectures, slides, and videos to a website that students can access is known as technology.
lecture capture
Technology in which instructors upload in-class lectures, slides, and videos to a website that students can access is known as technology.
lecture capture
Which of the following are true of social media websites?
Facebook has more than 2 billion active users. Most college students use social media websites.
True or false: A picture on your social network site cannot be copied and posted on a friend's site.
False
Why should you never use your cell phone to text answers to problems in class?
It is cheating.
Identify the statement that best describes what the web does.
It provides a graphical means for locating and accessing information on the Internet.
________ is a popular classroom presentation program.
PowerPoint
For which reasons should you use your college e-mail address when communicating with instructors?
The domain name will be familiar to the instructor. You should already be checking your college e-mail regularly in case of important college messages
For which reasons should you use your college e-mail address when communicating with instructors?
The domain name will be familiar to the instructor. You should already be checking your college e-mail regularly in case of important college messages.
Which of the following is true of blogs?
They are public documents that virtually anyone can view.
True or false: One advantage of viewing or listening to a podcast lecture is that a student may review the lecture outside of the classroom at a more convenient time.
True
Which of the following is among the guidelines for the appropriate use of technology while in the classroom?
Turn off your cell phone.
A blog is a website that
acts as a kind of public diary with ideas and commentary.
If you are texting, you are indicating to the instructor that you
are not paying attention to what's going on in class.
The course website for a course taught entirely online is like to allow students to
submit papers. take tests. complete exercises.
Texting involves very short messages that
are commonly used in student-to-student communication.
True or false: If your instructor has not said otherwise, you should assume that you can answer an important call if your phone rings during class.
False
Which of the following is NOT one of the three basic elements of an e-mail address?
HTTP:
Which of the following are true of video messaging?
It allows users to communicate with video, voice, and instant messaging. It is generally free.
Which of the following e-mail messages intended to convey excitement would most easily be misunderstood as conveying anger?
JOSH: COME TO MY OFFICE ASAP!
Which of the following meets the recommendations for an informative subject line for an e-mail?
Job Posting: Math Tutor
Which of the following is NOT among the recommendations for dealing with spam and maintaining cybersecurity?
Make your password long and complex and use it on every program you access.
Which guidelines apply to meeting someone you've known only from the web, such as from a dating site?
Meet where many people will be present. Tell a friend or family member. Meet in a visible, public location.
What guideline should you follow on social media to protect yourself and those close to you from sexual predators?
Never post personal information that would allow someone to track you down.
You are writing a formal e-mail to a colleague. Which of following best illustrates how to make an effective request in your e-mail?
Please respond to the following question no later than Friday at noon.
a prerecorded audio or video program available to students to view on a computer or mobile device.
PowerPoint
Which guidelines apply to meeting someone you've known only from the web, such as from a dating site?
Tell a friend or family member. Meet where many people will be present. Meet in a visible, public location.
Which of the following are commonly used video message services?
Skype Facetime
Blank 1 Spam, Correct Unavailable is typically "junk" commercial e-mail that is intended to increase the sales of products.
Spam
What is one reason you should be especially polite and professional when e-mailing instructors?
They receive many e-mails each week from students and are sensitive to messages that are inappropriate.
For which reasons should you use your college e-mail address when communicating with instructors?
You should already be checking your college e-mail regularly in case of important college messages. The domain name will be familiar to the instructor.
Which of the following are among the advantages of lecture capture?
ability to review material when studying more engagement with the class and less with taking notes
Gmail and Yahoo! Mail are examples of e-mail providers that
allow you to retrieve your emails anywhere you have access to the web.
One reason you are cautioned to not write anything in an e-mail that you would not want to see in the newspaper is that
an e-mail can easily be forwarded to one or more people without your knowledge.
To ensure that e-mail attachments will be opened by your intended recipient, you should
be sure that the recipient knows who you are.
A digital divide separates students who have considerable and easy access to ________ and those who do not.
computers the Internet
Sarita is at work and needs to complete a course assignment before attending class, but she cannot recall all of the details of the assignment. Which of the following academic technology resources will she most likely use?
course website
Measures taken to protect computers and computer systems against unauthorized access or attack are known as .
cyber security
When you receive an e-mail that angers or annoys you, it is recommended that you
take a deep breath and let the anger pass before responding.
The purpose of a laptop in the classroom is to ________ and nothing else.
take notes
The term Blank 1Blank 1 digital , Correct Unavailable Blank 2Blank 2 divide, Correct Unavailable refers to the gap between tech savvy students and those students starting in college with limited computer experience because of socioeconomic disparities.
digital divide
The most common form of communication between students and faculty on most college campuses is
e-mail.
Even experienced e-mail users can improve the effectiveness of their messages by
following the guidelines for formal e-mail messages.
Sexual predators use the web to identify victims. To protect yourself and others, take additional measures to guard which of the following information?
future class schedule or travel plans name, phone number, address, etc.
Criminals known as ________ may illegally attempt to gain access to and tamper with information on your computer.
hackers
If you are going to make a request in an e-mail, where should you put the request?
in the beginning
Sexual predators use the web to identify victims. To protect yourself and others, take additional measures to guard which of the following information?
name, phone number, address, etc. future class schedule or travel plans
To avoid misunderstandings in an e-mail, it is recommended that you follow the rules of
netiquette.
Most employers today expect the individuals they hire to have a strong working knowledge of a variety of
technologies.
A digital divide separates students who have considerable and easy access to ________ and those who do not.
the Internet computers
One factor to consider when communicating through e-mail is that
the reader can not see the facial expression or gestures that give additional meaning to your words.
Appropriately utilizing technology as a tool in college can be a
time saver.
Measures taken to protect computers and computer systems against unauthorized access or attack are known as .
Blank 1: cybersecurity, cyber-security, or cyber security