Chapter 14 Understanding Personal Communications

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By R.aguilar
R
R.aguilar
Community Contributor
Quizzes Created: 3 | Total Attempts: 513
Questions: 33 | Attempts: 56

SettingsSettingsSettings
Chapter 14  Understanding Personal Communications - Quiz


Quiz Chapter 14


Questions and Answers
  • 1. 

    Why is communication easier today than say twenty years ago?

    • A.

      Better cars

    • B.

      Better television sets

    • C.

      Better technology

    • D.

      Better homes

    Correct Answer
    C. Better technology
    Explanation
    Communication is easier today than it was twenty years ago because of advancements in technology. With the development of smartphones, internet, and social media platforms, people can easily connect with each other regardless of their location. These technological advancements have also made communication faster and more efficient, with the ability to send instant messages, make video calls, and share information instantly. Additionally, the availability of various communication apps and platforms has made it easier for people to stay connected and communicate in real-time.

    Rate this question:

  • 2. 

    Who causes millions of dollars worth of damage to computer systems and computer information each year?

    • A.

      Virus programmers

    • B.

      Hardware designers

    • C.

      Games programmers

    • D.

      Computer electrical engineers

    Correct Answer
    A. Virus programmers
    Explanation
    Virus programmers are responsible for causing millions of dollars worth of damage to computer systems and computer information each year. These individuals create malicious software, known as viruses, with the intention of infecting computers and compromising their security. Once a virus is unleashed, it can spread rapidly and cause various forms of damage, such as data loss, system crashes, and unauthorized access to sensitive information. The actions of virus programmers result in significant financial losses for individuals, businesses, and governments worldwide.

    Rate this question:

  • 3. 

    What kind of network lets a person send and receive e-mail?

    • A.

      Client-server network

    • B.

      Person to person network

    • C.

      Business to business network

    • D.

      School to school network

    Correct Answer
    A. Client-server network
    Explanation
    A client-server network allows a person to send and receive e-mail. In this type of network, the person acts as a client who connects to a server, such as an email server, to access their email account. The client sends requests to the server to send or receive emails, and the server processes these requests and delivers the emails accordingly. This network architecture enables efficient and reliable email communication by centralizing the email storage and management on the server side.

    Rate this question:

  • 4. 

    What term is used to represent the computer that is sending the e-mail?

    • A.

      Client

    • B.

      Server

    • C.

      Sender

    • D.

      Receiver

    Correct Answer
    A. Client
    Explanation
    The term used to represent the computer that is sending the e-mail is the client. In the context of email communication, the client refers to the software or application being used by the user to send and receive emails. The client interacts with the email server to send the email from the user's computer to the recipient's computer.

    Rate this question:

  • 5. 

    What term is used for the computer that receives an e-mail message?

    • A.

      Client

    • B.

      Server

    • C.

      School

    • D.

      Home

    Correct Answer
    B. Server
    Explanation
    The term used for the computer that receives an e-mail message is a server. A server is a computer or system that is responsible for managing and storing data, as well as providing services to other computers or clients on a network. In the context of e-mail, a server receives incoming messages and stores them until they are retrieved by the intended recipient's client device. The client device, such as a computer or smartphone, then connects to the server to download the received messages.

    Rate this question:

  • 6. 

    What does ISP stand for?

    • A.

      In special protocol

    • B.

      Internet Spacing Protocol

    • C.

      Internet Service Provider

    • D.

      Internet Spoof Protocol

    Correct Answer
    C. Internet Service Provider
    Explanation
    ISP stands for Internet Service Provider. An ISP is a company or organization that provides access to the internet for individuals and other businesses. They offer various services such as internet connectivity, email services, web hosting, and domain registration. ISPs connect their customers to the internet through technologies like dial-up, DSL, cable, or fiber optics. They play a crucial role in enabling individuals and businesses to access and utilize the internet for communication, information sharing, and online activities.

    Rate this question:

  • 7. 

    What does protocol mean?

    • A.

      Promises

    • B.

      Pointers

    • C.

      Proceedures

    • D.

      PROM

    Correct Answer
    C. Proceedures
    Explanation
    The term "protocol" refers to a set of rules or procedures that govern the communication between different devices or systems. It outlines the specific steps and guidelines to be followed for the successful exchange of information. Therefore, "procedures" is the correct answer as it accurately represents the meaning of the term "protocol".

    Rate this question:

  • 8. 

    Where in the server is your e-mail stored until you open it?

    • A.

      Home

    • B.

      Memory

    • C.

      CD ROM

    • D.

      Inbox

    Correct Answer
    D. Inbox
    Explanation
    The correct answer is "Inbox" because the inbox is the default storage location for incoming emails on a server. Emails are received and stored in the inbox until the user opens and reads them. Once the email is opened, it is typically moved to a different folder or deleted depending on the user's actions.

    Rate this question:

  • 9. 

    What bit of information will not be found in an e-mail's message header?

    • A.

      TO:

    • B.

      FROM:

    • C.

      DATE

    • D.

      SUBJECT

    • E.

      E-MAIL

    Correct Answer
    E. E-MAIL
    Explanation
    The information that will not be found in an email's message header is the actual content of the email itself. The header includes the recipient (TO), sender (FROM), date, and subject of the email, but it does not include the email's body or text. The body of the email is typically found in the main section of the email, below the header.

    Rate this question:

  • 10. 

    The messages in your inbox can be sorted by date, or sender's name.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The given statement is true because most email platforms provide options to sort messages in the inbox based on the date they were received or the sender's name. This allows users to easily organize and locate their emails based on their preferred sorting criteria.

    Rate this question:

  • 11. 

    What two items are needed to get authentication to an e-mail clien-server network?

    • A.

      Password

    • B.

      Username

    • C.

      Date

    • D.

      Virus protection

    Correct Answer(s)
    A. Password
    B. Username
    Explanation
    To get authentication to an email client-server network, two items are required: a password and a username. The password ensures that only authorized individuals can access the network, while the username identifies the specific user. These two items work together to verify the user's identity and grant them access to the email client-server network. The date and virus protection mentioned are not directly related to the authentication process and are not necessary for obtaining access to the network.

    Rate this question:

  • 12. 

    Change your password often and never share it with others, even your best friends.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Changing your password often and not sharing it with others, even your best friends, is a good practice for maintaining the security of your accounts. By changing your password regularly, you reduce the risk of someone gaining unauthorized access to your account. Sharing your password, even with trusted individuals, increases the chances of it falling into the wrong hands and compromising the security of your account. Therefore, it is important to change your password frequently and keep it private.

    Rate this question:

  • 13. 

    Where would your store your frequent contacts in a clien-server network?

    • A.

      Inbox

    • B.

      Outbox

    • C.

      Address book

    • D.

      Facebook

    Correct Answer
    C. Address book
    Explanation
    In a client-server network, the address book is the most suitable place to store frequent contacts. An address book is a digital repository where users can store and organize contact information such as names, phone numbers, and email addresses. It provides easy access to frequently used contacts, allowing users to quickly retrieve and communicate with them. Unlike an inbox or outbox, which are typically used for managing emails or messages, the address book is specifically designed for storing and managing contact information. Facebook, on the other hand, is a social media platform and not typically used for storing contact information in a client-server network.

    Rate this question:

  • 14. 

    Which choice represents the process of sending the same e-mail to select members of your address book?

    • A.

      E-mail address

    • B.

      E-mail group

    • C.

      E-mail client

    • D.

      E-mail server

    Correct Answer
    B. E-mail group
    Explanation
    An e-mail group refers to the process of sending the same e-mail to select members of your address book. By creating a group, you can easily send a single e-mail to multiple recipients without having to manually enter each recipient's address. This saves time and ensures that the message reaches all the intended recipients efficiently.

    Rate this question:

  • 15. 

    True or False:  An e-mail group saves time because you do not have to type each individual e-mail address to sent the same message to multiple recepients.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    An e-mail group saves time because it allows the sender to send the same message to multiple recipients without having to manually type each individual e-mail address. By creating a group, the sender can simply select the group name and the message will be sent to all the members of that group, saving time and effort.

    Rate this question:

  • 16. 

    What should you do to the e-mail messages you no longer need or feel are unimportant?

    • A.

      Save them

    • B.

      Forward them

    • C.

      Delete them

    • D.

      E-mail group them

    Correct Answer
    C. Delete them
    Explanation
    To manage e-mail messages that are no longer needed or considered unimportant, the best course of action is to delete them. Deleting these messages helps to declutter your inbox, freeing up storage space and making it easier to find and prioritize important messages. Saving them or forwarding them would only contribute to the accumulation of unnecessary information, while e-mail grouping is not relevant to the task of removing unwanted messages.

    Rate this question:

  • 17. 

    What term identifies the method used to save and organize your e-mail.

    • A.

      E-mail folders

    • B.

      E-mail inboxes

    • C.

      Outgoing mail

    • D.

      Received mail

    Correct Answer
    A. E-mail folders
    Explanation
    The term that identifies the method used to save and organize your e-mail is "e-mail folders." This refers to the feature in e-mail clients that allows users to create folders and categorize their e-mails based on different criteria such as sender, subject, or importance. By using e-mail folders, users can easily manage and locate their e-mails, making it a convenient way to organize their inbox.

    Rate this question:

  • 18. 

    How can we send a picture with our e-mail message?

    • A.

      Send it as an attachment

    • B.

      Delete it

    • C.

      Paste it to the address

    • D.

      Save it until you can buy a stamp

    Correct Answer
    A. Send it as an attachment
    Explanation
    To send a picture with an email message, you can choose to send it as an attachment. This means that you can include the picture file along with your email, allowing the recipient to download and view the picture. Attaching the picture ensures that it is sent along with the email and can be easily accessed by the recipient.

    Rate this question:

  • 19. 

    Why must we be careful when opening attachments received with e-mails?

    • A.

      They could be to large

    • B.

      They could be to small

    • C.

      They could contain a virus

    • D.

      They might be the wrong format

    Correct Answer
    C. They could contain a virus
    Explanation
    When opening attachments received with emails, it is important to be cautious because they could potentially contain a virus. Opening such attachments without proper scrutiny can lead to malware or other harmful software being installed on the device. Therefore, it is crucial to exercise caution and use reliable antivirus software to scan attachments before opening them to ensure the safety and security of the device and personal data.

    Rate this question:

  • 20. 

    What is ment by: "A virus can replicate itself!"

    • A.

      It will erase itself.

    • B.

      It will protect your computer.

    • C.

      It will multiply by itself.

    • D.

      It will turn into an image.

    Correct Answer
    C. It will multiply by itself.
    Explanation
    The correct answer is "It will multiply by itself." This means that a virus has the ability to make copies of itself and spread to other files or systems. Unlike other options, such as erasing itself or turning into an image, the replication of a virus allows it to infect more devices and potentially cause harm.

    Rate this question:

  • 21. 

    Which is not true of a computer virus.

    • A.

      It can slow your computer down.

    • B.

      It can erase a computer's data.

    • C.

      It can spread through attachments and flash drives.

    • D.

      It is expensive and hard to buy or acquire.

    Correct Answer
    D. It is expensive and hard to buy or acquire.
    Explanation
    The statement "It is expensive and hard to buy or acquire" is not true of a computer virus. Computer viruses can be easily acquired through various means such as downloading infected files from the internet or opening malicious email attachments. In fact, some viruses are even designed to spread themselves automatically without any user intervention. Additionally, computer viruses are not expensive to obtain as they can be created by individuals with programming knowledge or found for free on the dark web.

    Rate this question:

  • 22. 

    A computer virus is an executable file, that means that it can load and run all by itself.  Which extension below tells the user the file is an executable file.

    • A.

      .jpg

    • B.

      .com

    • C.

      .ppt

    • D.

      .exe

    Correct Answer
    D. .exe
    Explanation
    The .exe extension is commonly used to indicate that a file is an executable file. This extension is associated with executable programs on Windows operating systems. When a user sees a file with the .exe extension, they can infer that the file is designed to be run and executed on their computer.

    Rate this question:

  • 23. 

    What type of program will help you protect your computer against virus programmers and their work?

    • A.

      Word processor like MS Word

    • B.

      Presentation software like PowerPoint

    • C.

      Computer browser like Netscape

    • D.

      Anti-virus software like McAffee

    Correct Answer
    D. Anti-virus software like McAffee
    Explanation
    Anti-virus software like McAfee is designed specifically to protect computers against virus programmers and their work. It is specifically developed to detect, prevent, and remove malicious software, including viruses, worms, Trojans, and other types of malware. Unlike word processors, presentation software, or computer browsers, which are not designed for computer security, anti-virus software actively scans files and programs for any potential threats, provides real-time protection, and offers features like quarantine and regular updates to keep up with the latest threats. Therefore, using anti-virus software is essential to safeguard a computer against virus programmers and their malicious work.

    Rate this question:

  • 24. 

    For anti-virus software to be effective you should set it to manual updates instead of automatic updates.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Setting anti-virus software to manual updates instead of automatic updates is not effective. Automatic updates ensure that the software is constantly updated with the latest virus definitions and security patches, providing better protection against new threats. Manual updates require the user to regularly check for updates and manually install them, which can be time-consuming and increase the risk of missing important updates. Therefore, the statement is false.

    Rate this question:

  • 25. 

    What method lets two or more people communicate at the same time by phone?

    • A.

      Chatroom

    • B.

      Videoconference

    • C.

      Teleconference

    • D.

      Internet conference

    Correct Answer
    C. Teleconference
    Explanation
    A teleconference is a method that allows two or more people to communicate at the same time by phone. It enables individuals from different locations to participate in a conversation or meeting through the use of telecommunication technology. This method is commonly used in business settings, where participants can discuss and collaborate on projects without the need for physical presence. Teleconferences are efficient and cost-effective ways to facilitate communication and decision-making among multiple parties.

    Rate this question:

  • 26. 

    What option lets people communicate on the internet using their keyboards?

    • A.

      Teleconference room

    • B.

      Chatroom

    • C.

      Videoconference room

    • D.

      Internet room

    Correct Answer
    B. Chatroom
    Explanation
    A chatroom is an online platform that allows people to communicate with each other using their keyboards. It provides a space where individuals can exchange text-based messages in real-time, facilitating communication and interaction over the internet. Unlike teleconference rooms or videoconference rooms, which involve audio or visual communication, a chatroom specifically focuses on keyboard-based communication. An Internet room is a vague option that does not specifically address the method of communication, making it an incorrect choice.

    Rate this question:

  • 27. 

    Which communication method lets people communicate by voice and cameras at the same time via the internet?

    • A.

      Teleconferencing

    • B.

      Videoconferencing

    • C.

      Chatroom conferencing

    • D.

      Facebooking conferencing

    Correct Answer
    B. Videoconferencing
    Explanation
    Videoconferencing is the correct answer because it allows people to communicate by voice and cameras simultaneously via the internet. This method enables individuals to have real-time conversations and see each other through video feeds, making it a popular choice for remote meetings, interviews, and collaborations.

    Rate this question:

  • 28. 

    What is a another term for Web-based learning?

    • A.

      Teleconference learning

    • B.

      Distance learning

    • C.

      Site learning

    • D.

      S-mail learning

    Correct Answer
    B. Distance learning
    Explanation
    Distance learning is another term for web-based learning. It refers to a method of education where students can learn remotely, without being physically present in a traditional classroom setting. This type of learning utilizes technology, particularly the internet, to deliver educational content and facilitate communication between students and instructors. It allows individuals to access educational resources and participate in classes from any location, making it a flexible and convenient option for those who cannot attend traditional in-person classes.

    Rate this question:

  • 29. 

    If a pilot trains to fly using a flight simulator that is similar to a video game, he is training using which of the following methods?

    • A.

      Distance learning

    • B.

      Virtual learning

    • C.

      Web based learning

    • D.

      Videoconference learning

    Correct Answer
    B. Virtual learning
    Explanation
    The pilot is training using virtual learning because a flight simulator is a computer-based system that replicates the experience of flying an aircraft. This method allows pilots to practice and gain experience in a simulated environment, which closely resembles real-life flying conditions. Virtual learning refers to the use of technology and simulated environments to facilitate learning and training experiences.

    Rate this question:

  • 30. 

    What is one characteristic of virtual learning?

    • A.

      Computer chatting

    • B.

      Computer blogging

    • C.

      Computer facebooking

    • D.

      Computer simulation

    Correct Answer
    D. Computer simulation
    Explanation
    One characteristic of virtual learning is computer simulation. This refers to the use of computer technology to create a simulated learning environment, where students can interact with virtual objects and scenarios. It allows for hands-on experience, experimentation, and problem-solving in a safe and controlled environment. Computer simulation enhances the learning process by providing realistic and immersive experiences that can be tailored to individual needs and objectives.

    Rate this question:

  • 31. 

    What type of learning environment lets the learner interact face to face with his peers and teachers, plus it incorporates distance learning in the educational experience?

    • A.

      Simulation learning

    • B.

      Blended learning

    • C.

      Home schooling

    • D.

      Internet learning

    Correct Answer
    B. Blended learning
    Explanation
    Blended learning is the correct answer because it combines both face-to-face interaction with peers and teachers, as well as distance learning through online platforms or virtual classrooms. This type of learning environment allows for a more flexible and personalized educational experience, as learners can engage with their peers and teachers in person while also accessing resources and participating in online activities.

    Rate this question:

  • 32. 

    What is one danger of chatrooms?

    • A.

      Every member of the chatroom knows each other

    • B.

      Chatrooms are illegal

    • C.

      Chatroom participants are more than likely to be stangers

    • D.

      Parents can monitor all chatroom discussions

    Correct Answer
    C. Chatroom participants are more than likely to be stangers
    Explanation
    One danger of chatrooms is that the participants are more than likely to be strangers. This means that you are interacting with individuals whom you do not know personally, which can pose a risk to your safety. Strangers may have malicious intentions, such as attempting to deceive or harm others. It is important to exercise caution and be mindful of sharing personal information or engaging in risky conversations with unknown individuals in chatrooms.

    Rate this question:

  • 33. 

    What is one advantage a videoconference has over a telconference?

    • A.

      People can hear each other's voices in a videoconference

    • B.

      The participants can see each other in a videoconference

    • C.

      A teleconference is much slower than a videoconference

    • D.

      A vidoconference requires less equpment than a teleconference

    Correct Answer
    B. The participants can see each other in a videoconference
    Explanation
    In a videoconference, participants have the advantage of being able to see each other. This visual aspect adds an extra layer of communication as it allows for non-verbal cues, facial expressions, and body language to be observed. This visual element enhances the overall interaction and understanding between participants, creating a more immersive and engaging experience compared to a teleconference where only voices can be heard.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • May 29, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • May 09, 2012
    Quiz Created by
    R.aguilar
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.