Chapter 14 Understanding Personal Communications

33 Questions

Settings
Please wait...
Chapter 14  Understanding Personal Communications

Quiz Chapter 14


Questions and Answers
  • 1. 
    Why is communication easier today than say twenty years ago?
    • A. 

      Better cars

    • B. 

      Better television sets

    • C. 

      Better technology

    • D. 

      Better homes

  • 2. 
    Who causes millions of dollars worth of damage to computer systems and computer information each year?
    • A. 

      Virus programmers

    • B. 

      Hardware designers

    • C. 

      Games programmers

    • D. 

      Computer electrical engineers

  • 3. 
    What kind of network lets a person send and receive e-mail?
    • A. 

      Client-server network

    • B. 

      Person to person network

    • C. 

      Business to business network

    • D. 

      School to school network

  • 4. 
    What term is used to represent the computer that is sending the e-mail?
    • A. 

      Client

    • B. 

      Server

    • C. 

      Sender

    • D. 

      Receiver

  • 5. 
    What term is used for the computer that receives an e-mail message?
    • A. 

      Client

    • B. 

      Server

    • C. 

      School

    • D. 

      Home

  • 6. 
    What does ISP stand for?
    • A. 

      In special protocol

    • B. 

      Internet Spacing Protocol

    • C. 

      Internet Service Provider

    • D. 

      Internet Spoof Protocol

  • 7. 
    What does protocol mean?
    • A. 

      Promises

    • B. 

      Pointers

    • C. 

      Proceedures

    • D. 

      PROM

  • 8. 
    Where in the server is your e-mail stored until you open it?
    • A. 

      Home

    • B. 

      Memory

    • C. 

      CD ROM

    • D. 

      Inbox

  • 9. 
    What bit of information will not be found in an e-mail's message header?
    • A. 

      TO:

    • B. 

      FROM:

    • C. 

      DATE

    • D. 

      SUBJECT

    • E. 

      E-MAIL

  • 10. 
    The messages in your inbox can be sorted by date, or sender's name.
    • A. 

      True

    • B. 

      False

  • 11. 
    What two items are needed to get authentication to an e-mail clien-server network?
    • A. 

      Password

    • B. 

      Username

    • C. 

      Date

    • D. 

      Virus protection

  • 12. 
    Change your password often and never share it with others, even your best friends.
    • A. 

      True

    • B. 

      False

  • 13. 
    Where would your store your frequent contacts in a clien-server network?
    • A. 

      Inbox

    • B. 

      Outbox

    • C. 

      Address book

    • D. 

      Facebook

  • 14. 
    Which choice represents the process of sending the same e-mail to select members of your address book?
    • A. 

      E-mail address

    • B. 

      E-mail group

    • C. 

      E-mail client

    • D. 

      E-mail server

  • 15. 
    True or False:  An e-mail group saves time because you do not have to type each individual e-mail address to sent the same message to multiple recepients.
    • A. 

      True

    • B. 

      False

  • 16. 
    What should you do to the e-mail messages you no longer need or feel are unimportant?
    • A. 

      Save them

    • B. 

      Forward them

    • C. 

      Delete them

    • D. 

      E-mail group them

  • 17. 
    What term identifies the method used to save and organize your e-mail.
    • A. 

      E-mail folders

    • B. 

      E-mail inboxes

    • C. 

      Outgoing mail

    • D. 

      Received mail

  • 18. 
    How can we send a picture with our e-mail message?
    • A. 

      Send it as an attachment

    • B. 

      Delete it

    • C. 

      Paste it to the address

    • D. 

      Save it until you can buy a stamp

  • 19. 
    Why must we be careful when opening attachments received with e-mails?
    • A. 

      They could be to large

    • B. 

      They could be to small

    • C. 

      They could contain a virus

    • D. 

      They might be the wrong format

  • 20. 
    What is ment by: "A virus can replicate itself!"
    • A. 

      It will erase itself.

    • B. 

      It will protect your computer.

    • C. 

      It will multiply by itself.

    • D. 

      It will turn into an image.

  • 21. 
    Which is not true of a computer virus.
    • A. 

      It can slow your computer down.

    • B. 

      It can erase a computer's data.

    • C. 

      It can spread through attachments and flash drives.

    • D. 

      It is expensive and hard to buy or acquire.

  • 22. 
    A computer virus is an executable file, that means that it can load and run all by itself.  Which extension below tells the user the file is an executable file.
    • A. 

      .jpg

    • B. 

      .com

    • C. 

      .ppt

    • D. 

      .exe

  • 23. 
    What type of program will help you protect your computer against virus programmers and their work?
    • A. 

      Word processor like MS Word

    • B. 

      Presentation software like PowerPoint

    • C. 

      Computer browser like Netscape

    • D. 

      Anti-virus software like McAffee

  • 24. 
    For anti-virus software to be effective you should set it to manual updates instead of automatic updates.
    • A. 

      True

    • B. 

      False

  • 25. 
    What method lets two or more people communicate at the same time by phone?
    • A. 

      Chatroom

    • B. 

      Videoconference

    • C. 

      Teleconference

    • D. 

      Internet conference

  • 26. 
    What option lets people communicate on the internet using their keyboards?
    • A. 

      Teleconference room

    • B. 

      Chatroom

    • C. 

      Videoconference room

    • D. 

      Internet room

  • 27. 
    Which communication method lets people communicate by voice and cameras at the same time via the internet?
    • A. 

      Teleconferencing

    • B. 

      Videoconferencing

    • C. 

      Chatroom conferencing

    • D. 

      Facebooking conferencing

  • 28. 
    What is a another term for Web-based learning?
    • A. 

      Teleconference learning

    • B. 

      Distance learning

    • C. 

      Site learning

    • D. 

      S-mail learning

  • 29. 
    If a pilot trains to fly using a flight simulator that is similar to a video game, he is training using which of the following methods?
    • A. 

      Distance learning

    • B. 

      Virtual learning

    • C. 

      Web based learning

    • D. 

      Videoconference learning

  • 30. 
    What is one characteristic of virtual learning?
    • A. 

      Computer chatting

    • B. 

      Computer blogging

    • C. 

      Computer facebooking

    • D. 

      Computer simulation

  • 31. 
    What type of learning environment lets the learner interact face to face with his peers and teachers, plus it incorporates distance learning in the educational experience?
    • A. 

      Simulation learning

    • B. 

      Blended learning

    • C. 

      Home schooling

    • D. 

      Internet learning

  • 32. 
    What is one danger of chatrooms?
    • A. 

      Every member of the chatroom knows each other

    • B. 

      Chatrooms are illegal

    • C. 

      Chatroom participants are more than likely to be stangers

    • D. 

      Parents can monitor all chatroom discussions

  • 33. 
    What is one advantage a videoconference has over a telconference?
    • A. 

      People can hear each other's voices in a videoconference

    • B. 

      The participants can see each other in a videoconference

    • C. 

      A teleconference is much slower than a videoconference

    • D. 

      A vidoconference requires less equpment than a teleconference