MCQs > Finance & Management > Business Communication MCQs > Technology in communication MCQs

Technology in communication MCQ

Technology in communication MCQ

1. 3g wireless offers data transfer rates of up to ____ mbps.

Answer

Correct Answer: 2

Note: This Question is unanswered, help us to find answer for this one

2. Technology has had a significant impact on small businesses because ________.

Answer

Correct Answer: It creates new business opportunities and new ways to conduct business

Note: This Question is unanswered, help us to find answer for this one

3. A group of coworkers who use CMC to accomplish tasks and professional projects traditionally completed face-to-face is called a(n) ______.

Answer

Correct Answer: Virtual work team

Note: This Question is unanswered, help us to find answer for this one

4. Spell-checking, eliminating jokes and discriminatory language ensure ______.

Answer

Correct Answer: Professional excellence

Note: This Question is unanswered, help us to find answer for this one

5. Experts suggest spending some time being ______, or avoiding checking e-mail, sending text messages, watching television, or answering the phone.

Answer

Correct Answer: Unplugged

Note: This Question is unanswered, help us to find answer for this one

6. Chronemics refers to ______.

Answer

Correct Answer: The study of time as communication

Note: This Question is unanswered, help us to find answer for this one

7. A hostile message that is blunt, rude, insensitive, or obscene is called an e-mail ______.

Answer

Correct Answer: Flame

Note: This Question is unanswered, help us to find answer for this one

8. Which is the most appropriate use of a text message?

Answer

Correct Answer: Confirming plans with a friend

Note: This Question is unanswered, help us to find answer for this one

9. What is the main difference between listservs and electronic bulletin boards?

Answer

Correct Answer: Electronic bulletin boards are accessible to anyone.

Note: This Question is unanswered, help us to find answer for this one

10. Phishing refers to ______.

Answer

Correct Answer: Gaining sensitive information through fraudulent e-mails

Note: This Question is unanswered, help us to find answer for this one

11. Which is a positive aspect of network e-mail?

Answer

Correct Answer: More message storage

Note: This Question is unanswered, help us to find answer for this one

12. Which of the following describes the most professional e-mail address to use?

Answer

Correct Answer: Simple, such as your name

Note: This Question is unanswered, help us to find answer for this one

13. Employees should respond to every e-mail within 48 hr.

Answer

Correct Answer: False

Note: This Question is unanswered, help us to find answer for this one

14. CMC occurs in both synchronous and asynchronous time.

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

15. Employee surveillance is designed to track the information an employee accesses while at work.

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

16. It is illegal for businesses to use information from social networking sites as a hiring decision.

Answer

Correct Answer: False

Note: This Question is unanswered, help us to find answer for this one

17. Computer-mediated communication (CMC) helps save on time and travel by implementing virtual teams.

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

18. Efforts to monitor and track employee behavior in terms of the information they access or communicate while at work refers to_____

Answer

Correct Answer: Workplace surveillance system

Note: This Question is unanswered, help us to find answer for this one

19. Virtual work team is a group of coworkers who use_____communication to accomplish tasks and professional projects.

Answer

Correct Answer: Computer mediated

Note: This Question is unanswered, help us to find answer for this one

20. The avoidance of checking email, sending text messages, watching television, or answering the phone is called_____

Answer

Correct Answer: Unplugged

Note: This Question is unanswered, help us to find answer for this one

21. The use of a user’s email address for a purpose to which the user didn’t agree is called_____

Answer

Correct Answer: Spam

Note: This Question is unanswered, help us to find answer for this one

22. Phishing refers to sending authentic-looking _____emails.

Answer

Correct Answer: Fraudulent

Note: This Question is unanswered, help us to find answer for this one

23. A computer service that facilitates discussions by connecting people who share different interests is called listserv.

Answer

Correct Answer: False

Note: This Question is unanswered, help us to find answer for this one

24. When information, requests for feedback, new projects, responses to questions, phone calls, and required online classes for work, on top of attending to loved ones, children, pets, and other family matters, leave you stressed and feeling as though things are spinning out of control, it is called stress overload.

Answer

Correct Answer: False

Note: This Question is unanswered, help us to find answer for this one

25. Email forwards include_____, petitions or calls for help, jokes, pictures, and the like.

Answer

Correct Answer: All of these

Note: This Question is unanswered, help us to find answer for this one

26. Email flame is a hostile message that is_____,or obscene.

Answer

Correct Answer: All

Note: This Question is unanswered, help us to find answer for this one

27. Email dialogues refer to exchanges of messages about a particular topic using email, professional blog space, and other electronic tools to encourage participation that will ideally lead to_____

Answer

Correct Answer: All of these

Note: This Question is unanswered, help us to find answer for this one

28. Electronic bulletin board is an online service to which_____can obtain access to read postings.

Answer

Correct Answer: Both

Note: This Question is unanswered, help us to find answer for this one

29. A form of aggressive communication in which people interacting on professional topics are filled with emotionality refers to electronic aggression.

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

30. Corporate blog is a web log used _____

Answer

Correct Answer: All of these

Note: This Question is unanswered, help us to find answer for this one

31. Computer mediated communication is a_____communication that occurs through some form of technology.

Answer

Correct Answer: Human

Note: This Question is unanswered, help us to find answer for this one

32. Chronemics is the study of_____ as communication.

Answer

Correct Answer: Time

Note: This Question is unanswered, help us to find answer for this one

search