computer midterm 3A
which part of the following email address is the mailbox for the account
@
you want to send an email to members of the basketball team about action they need to take on a fundraiser. you also want to keep the coach informed. in which field would you put the email address of the coach
CC
which of the following is not a peripheral
CPU devices
standardized computer language that is used to create a website is called
HTML: hyper text markup language
the physical components of a computer are called what
Hardware
which of the following are you likely to find an Office Building
LAN
what is the least amount of information that should be included in a signature for a business email
a closing and your name
what is the definition of email attachments
a file being sent with an email message
what is a salutation
a greeting
which of the following is an example of a negative consequence on social media
a student neglects their homework while chatting online
a company that offers services for accessing and using internet is
an internet service provider (ISP)
which boolean operation is indicated when it is shaded in the middle of two circles
and
what is one difference between archiving and deleting an email
archived emails are searchable, while deleted emails are not
how can someone give a negative impression while online
are you going into the other person is in agreement
a file that is so long with an email message is called an
attachment
The "A" in the D.E.A.L. acronym stands for
authenticate
how can people avoid pitfalls related to being distracted by electronic devices
be aware of surroundings when in public
asking questions are important to determining the best use of digital communication because they help me think ___________, which helps me make better decisions
before taking action
what are overlapping geographical areas with cellular networks called
cells
which of the following would be most likely to use a 4G Network
cellular phone
what can you do to make an event visually stand out as important on an electronic calendar
change the event's colors
a _______conviction in a cyberbullying case may result in the offender paying restitution to the victim's family
civil
what is a contacts list
collection of entries associating a person/organization with information, like a cell phone number
what is a safe practice when it comes to passwords for social media
combining lowercase, uppercase and special characters for you password
Julia received an email from an unknown source. The subject of the email looks strange and has a attachment. what should Julia do
delete the email
cyberbulling is the use of information Technology to harm or harass other people in a ________, repeated, and hostile manner
deliberate
what phase of the writing process do you create a rough copy of the material
drafting
before i post something online that is critical about someone, one of the questions I should ask myself is, "Am I doing this because of an
emotional reaction
Cyberbullying is protected by freedom of speech
false
a close social media Network can be accessed by any one of the appropriate age, regardless of the company affiliation
false
public domain represents work whose intellectual property rights have extended or works that have been released by the creator
false
what type of identity theft occurs when a thief spends another person's money or opens a line of credit in their name
financial
which of the following does not describe Communications between two or more parties messaging at the same time
forum
what does the G stand for in 3G
generation
in this example, which part is the registered domain name example: https://www.google.com
correct order for sections in a business letter
header, inside address, salutation, body, closing, and signature
where should you put a call to action in a business letter
in the body's conclusion
what effects does SEO have on your search
it allows web page creators make sure a web pages is included in a particular search
what is a recurring or repeating event in an electronic calendar
it is an event that occurs periodically
what does a server do
it provides a particular service and manages resources
how does a search engine find results
it searches its database of information
what is a concern you should have when sending an attachment
keep attachment file size small
which specific feature designed to prevent random people from accessing a phone
lock screen
What is the file path for the URL: https://www.mydomain.com/main/index.html?
main/index.html
in a business email, it is ok to leave the subject line in the header blank
no
an inbox, read messages are generally shown as __________text and unread messages are__________text
normal / bold
what controls a computer's basic operations
operating system
in business writing, which item item doesn't drive tone
paragraph length
what is a consequence for exceeding minutes on a phone
paying additional charge
in business, which of the following tones should be part of every written communications
polite
netiquette is
polite behavior on the internet
what phase of the writing process would you answer the three basic questions concerning audience, purpose, and tone
prewriting
correct order of the writing process
prewriting, drafting, revising, editing, and publishing
which of the following would you choose to control who sees your post
privacy and tools
what is a type of local network that people can use to access the internet
private home network
which of the following is a recommended use of wikipedia for you search results
provide an overview of your research topic
how can you best protect you own intellectual property
put a copyright notice on it
when looking on the internet for a solution to a problem, you should look for what kinds of sources
reliable
mary found a recipe on a website, and she would like to save it for later. what is the best way to make sure she can revisit the page later
save it in the bookmarks
what is software that is provided to others with restrictions or for a certain limited trial basis
shareware
what sections of an email comes after the body
signature
which of the following is a positive impact of technology on society
stay connected
what does a phishing email try to do
steal your personal information such as passwords, blank account numbers and usernames
which statement best defines what technology is
technology has any invention, including tools, machines, techniques, and sources of power
what is one of the benefits of using an electronic calendar over a paper calendar
the ability to share the calendar with others
in business writing, which statement best describes tone
the attitude shown towards the audience
a vast global network that is made up of many smaller interconnected networks is known as
the internet
what is the inside address in a business letter
the receiver's address
where would you click to view the original message
the three dots ...
the system of interlinked documents is called the:
the world wide web
here is an email written by michelle to pattie. what is the main netiquette violation in sentence d: Hey patt A: I have a very busy day tommorrow. B:There is a conference at RHFD to discuss the LTRE projects. C:So, I WILL NOT BE ABLE TO ATTEND the parent's meeting. D:Can you pick up the snacks for the meeting? E:It should not be too difficult, even for you. Thanks, Michelle
there is no violation in line d
what font and size should be used in a business letter
times new roman and 12 point
what is a coverage map used for
to determine where a cellular network is available
when would be a good time to use BCC rather than CC
to hide other recipients emails addresses, such as when sending a newsletter
why use email folders or labels
to store emails in an organized manner
why is information broken down into packets
to travel more quickly across the network
in a business letter, which of the following is the best salutation when you are not sure who will be reading the letter
to whom it may concern
which of the following identifies the goods or services of a specific business, person, or organization
trademark
credit checks are typically not necessary for prepaid phone carriers
true
it is best practice to always update your router's firmware when possible
true
it is important to moderate your time on your personal communication device
true
jailbreaking or unlocking a mobile device is considered an unsafe practice
true
social media use can affects a person's health and well-being
true
social media website can help show a person's character based on the information age used to share
true
visiting internet sites that are prohibited by an employer could result in consequences up to and including termination
true
free wifi is typically offered on a _______ network
unencrypted
what does URL stand for
uniform resource locator
which of the following is a way to keep your email private
use a secondary email account when signing up for information from a website
which of the following is not a way to improve your search results
use one or two simple words
what is the fastest way to find an archived email
use the search feature to look for it
which of the following is not a true statement about using a cloud storage option
using the cloud keeps your computer safe from viruses
a ____________ delivers all the files that form web pages
web server
which of the following is not one of these three basic questions you should answer before writing any business Communications
what font should I use
the fair use rule of copyright law explains
when free use of copyrighted material is acceptable
you want to find out where william shakespeare is buried. which of the following search would provide the best results
where is shakespeare buried
what does location in a URL identify
where to find a resource on the host
Is making hateful comments about someone through emails, blogs, on-line profiles, or chat rooms considered a method of cyberbullying?
yes
does a company have the right to monitor all your digital communications if you are using their equipment
yes
a digital native is a person who has been exposed to technology at a ___________, and is comfortable using it
young age
what must you do to fully trust you calendar
your calendar must be the only place where you schedule things