MCQs > Finance & Management > Business Communication MCQs > Technology in communication MCQs

Technology in communication MCQ

3g wireless offers data transfer rates of up to ____ mbps.

Answer

Correct Answer: 2

Note: This Question is unanswered, help us to find answer for this one

Technology has had a significant impact on small businesses because ________.

Answer

Correct Answer: It creates new business opportunities and new ways to conduct business

Note: This Question is unanswered, help us to find answer for this one

A group of coworkers who use CMC to accomplish tasks and professional projects traditionally completed face-to-face is called a(n) ______.

Answer

Correct Answer: Virtual work team

Note: This Question is unanswered, help us to find answer for this one

Spell-checking, eliminating jokes and discriminatory language ensure ______.

Answer

Correct Answer: Professional excellence

Note: This Question is unanswered, help us to find answer for this one

Experts suggest spending some time being ______, or avoiding checking e-mail, sending text messages, watching television, or answering the phone.

Answer

Correct Answer: Unplugged

Note: This Question is unanswered, help us to find answer for this one

Chronemics refers to ______.

Answer

Correct Answer: The study of time as communication

Note: This Question is unanswered, help us to find answer for this one

A hostile message that is blunt, rude, insensitive, or obscene is called an e-mail ______.

Answer

Correct Answer: Flame

Note: This Question is unanswered, help us to find answer for this one

Which is the most appropriate use of a text message?

Answer

Correct Answer: Confirming plans with a friend

Note: This Question is unanswered, help us to find answer for this one

What is the main difference between listservs and electronic bulletin boards?

Answer

Correct Answer: Electronic bulletin boards are accessible to anyone.

Note: This Question is unanswered, help us to find answer for this one

Phishing refers to ______.

Answer

Correct Answer: Gaining sensitive information through fraudulent e-mails

Note: This Question is unanswered, help us to find answer for this one

Which is a positive aspect of network e-mail?

Answer

Correct Answer: More message storage

Note: This Question is unanswered, help us to find answer for this one

Which of the following describes the most professional e-mail address to use?

Answer

Correct Answer: Simple, such as your name

Note: This Question is unanswered, help us to find answer for this one

Employees should respond to every e-mail within 48 hr.

Answer

Correct Answer: False

Note: This Question is unanswered, help us to find answer for this one

CMC occurs in both synchronous and asynchronous time.

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

Employee surveillance is designed to track the information an employee accesses while at work.

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

It is illegal for businesses to use information from social networking sites as a hiring decision.

Answer

Correct Answer: False

Note: This Question is unanswered, help us to find answer for this one

Computer-mediated communication (CMC) helps save on time and travel by implementing virtual teams.

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

Efforts to monitor and track employee behavior in terms of the information they access or communicate while at work refers to_____

Answer

Correct Answer: Workplace surveillance system

Note: This Question is unanswered, help us to find answer for this one

Virtual work team is a group of coworkers who use_____communication to accomplish tasks and professional projects.

Answer

Correct Answer: Computer mediated

Note: This Question is unanswered, help us to find answer for this one

The avoidance of checking email, sending text messages, watching television, or answering the phone is called_____

Answer

Correct Answer: Unplugged

Note: This Question is unanswered, help us to find answer for this one

The use of a user’s email address for a purpose to which the user didn’t agree is called_____

Answer

Correct Answer: Spam

Note: This Question is unanswered, help us to find answer for this one

Phishing refers to sending authentic-looking _____emails.

Answer

Correct Answer: Fraudulent

Note: This Question is unanswered, help us to find answer for this one

A computer service that facilitates discussions by connecting people who share different interests is called listserv.

Answer

Correct Answer: False

Note: This Question is unanswered, help us to find answer for this one

When information, requests for feedback, new projects, responses to questions, phone calls, and required online classes for work, on top of attending to loved ones, children, pets, and other family matters, leave you stressed and feeling as though things are spinning out of control, it is called stress overload.

Answer

Correct Answer: False

Note: This Question is unanswered, help us to find answer for this one

Email forwards include_____, petitions or calls for help, jokes, pictures, and the like.

Answer

Correct Answer: All of these

Note: This Question is unanswered, help us to find answer for this one

Email flame is a hostile message that is_____,or obscene.

Answer

Correct Answer: All

Note: This Question is unanswered, help us to find answer for this one

Email dialogues refer to exchanges of messages about a particular topic using email, professional blog space, and other electronic tools to encourage participation that will ideally lead to_____

Answer

Correct Answer: All of these

Note: This Question is unanswered, help us to find answer for this one

Electronic bulletin board is an online service to which_____can obtain access to read postings.

Answer

Correct Answer: Both

Note: This Question is unanswered, help us to find answer for this one

A form of aggressive communication in which people interacting on professional topics are filled with emotionality refers to electronic aggression.

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

Corporate blog is a web log used _____

Answer

Correct Answer: All of these

Note: This Question is unanswered, help us to find answer for this one

Computer mediated communication is a_____communication that occurs through some form of technology.

Answer

Correct Answer: Human

Note: This Question is unanswered, help us to find answer for this one

Chronemics is the study of_____ as communication.

Answer

Correct Answer: Time

Note: This Question is unanswered, help us to find answer for this one