2. The Fair Use rule of copyright
law explains ________.
A. when free use of copyrighted
material is unacceptable.
B. when free use of copyrighted
material is acceptable.
3.
Dependency on technology is one of the ________________ impacts of technology
on the workplace.
A. positive
B. negative
4. Which of the following is a
positive impact of technology on society?
A. Global deterioration
B. Decreased human interaction
C. Staying connected
D. Inactive lifestyles
5. Efficiency is one of the
________________ impacts of technology on the workplace.
A. negative
B. positive
7. The
digital divide is an economic ________________ between groups, broadly
construed, in terms of access to, use of, or knowledge of information and
communication technologies.
A. abnormality
B. inequality
C. equality
D. normalcy
8. Plagiarism is the
_____________ of someone else's words or ideas and presenting them as your own.
A. rewording
B. remixing
C. borrowing
D. stealing
9. Select the item below that
can be protected by a copyright:
A. Facts
B. Music
C. Ideas
10. A digital native is a person
who has been exposed to technology at a(n) ____________________ and is comfortable
using it.
A. school
B. home
C. old age
D. young age
12. Intellectual property is the
works, inventions or creations of an individual, group or business.
A. False
B. True
15. A ____________ conviction in
a cyberbullying case may result in the offender paying restitution to the
victim's family.
A. criminal
B. civil
16. People who have
_____________ fields of experience are more likely to understand one another.
A. Different
B. Identical
C. Special
D. Similar
17. During active listening,
"receiving" is the process of:
A.
Focusing on the information you've received.
B.
Restating the information you have received.
C.
Interpreting the meaning of the communication.
D. Taking
in all of the information about the communication.
18. During active listening,
"recalling" is the process of:
A.
Interpreting the meaning of the communication.
B. Taking
in all of the information about the communication.
C.
Restating the information you have received.
D.
Focusing on the information you've received.
19. What is the fifth and last
step in communication planning?
A. Outline the communication for
delivery
B. Clarify objectives
C.
Determine the best channel of communication
D. Determine the purpose of the
message
E. Identify the audience
21. What is the first step in
communication planning?
A.
Determine the best channel of communication
B. Identify the audience
C. Outline the communication for
delivery
D. Determine the purpose of the
message
E. Clarify objectives
22. Understanding in communication
is achieved when:
A. All of
the involved parties agree on the shared meaning of a message.
B. Some
of the involved parties agree on the shared meaning of a message.
C. Most
of the involved parties agree on the shared meaning of a message.
D. None
of the involved parties agree on the shared meaning of a message.
23. What is the second step in
communication planning?
A. Identify the audience
B. Determine the purpose of the
message
C.
Determine the best channel of communication
D. Clarify objectives
E. Outline the communication for
delivery
25. Which of the following is a
poor communication technique?
A. Not being fully engaged
B. Speaking clearly and
enunciating
C. Preparing for the communication
D. Being fully engaged
26. Verbal communication helps a
person develop and ________________ relationships with others.
A. maintain
B. identify
C. destroy
D. define
28. Verbal communication is the use
of _____________ and ______________ to relay a message.
A. gestures, sounds
B. signs, language
C. sounds, language
D. language, gestures
29. What is the purpose of
verbal communication?
A. To clarify a thought
B. To relay messages to one or
more receivers
C. To relay messages to one or
more senders
D. To understand a thought
30. A __________ part of our
communication is nonverbal.
A. non-existing
B. medium
C. large
D. small
.
32. Which of the following is a
possible barrier to communication?
A. Similar backgrounds
B. Thought process
C. Poor communication techniques
D. Appearance
33. Haptics is communicating
through ___________.
A. eye movements
B. words
C. sounds
D. touch
34. Culture impacts how you
communicate verbally and how you interpret verbal communication.
A. True
B. False
35. Which eye signal can help
you determine a person's intent in a situation?
A. Pupil size
B. Blinking
D. Eye contact
37. Which of the following
describes an Open communication style?
A.
Fast-paced and assertive; can be argumentative
B.
Readily expresses emotions, thoughts, and feelings without holding back in any
way
C. Very
deliberate; provide very accurate, carefully thought-out results
D. Tends
to hold back on giving away too much information that may reveal their inner
nature
38. What helps bring collaborators
together?
A. Friendships
B. Good moral values
C. Good ideas
D. Shared values
40. Which of the following is a
reason collaboration is important?
A. To please company
stakeholders
B. To satisfy customers
C. To help an organization grow
D. To
Make people who don't like working alone happy
41. Which of the following is
usually known for their aggressive, competitive natures?
A. Thinker
B. Socializer
C. Director
D. Relator
42. What is one way to reduce
poor communication?
A. Learn
to flex to other communication styles
B. Know
everything about your communication style
C. Learn
to flex to one other communication style
D. Ignore communication styles
altogether
44. A communication style is
____________________.
A. the
preferred way you share information with others
B. the preferred way you speak
to others
C. the
preferred language someone likes to use
D. the
primary way others share information with you
45. Which of the following
describes an Indirect communication style?
A. Tends
to hold back on giving away too much information that may reveal their inner nature
B. Very
deliberate; provide very accurate, carefully thought-out results
C.
Readily expresses emotions, thoughts, and feelings without holding back in any
way
D. Fast-paced
and assertive; can be argumentative
46. Which of the following tips
applies to maintaining constructive relationships?
A.
Acknowledge problems openly and honestly
B. Look for improvement
opportunities
C. Recognize accomplishments
D. Follow through on your
responsibilities
E. Remain objective
47. In business, which of the
following tones should be part of every written communications?
A. Vague
B. Sarcastic
C. Funny
D. Polite
48. Which of the following is
NOT one of the three basic questions you should answer before writing any
business communication?
A. What tone should be used?
B. Who is the audience?
C. What is the purpose?
D. What font should be used?
49. In business writing, which
item DOES NOT drive tone?
A. Sentence structure
B. Paragraph length
C. Font style
D. Word choice
50. In business writing, which
statement best describes "tone?"
A. The information given to the
audience
B. The visual look and feel of
document
C. The length of the document
D. The attitude shown towards
the audience
51. Where should you put a call
to action in a business letter?
A. In the Closing
B. In the Body's Conclusion
C. In the Body's Introduction
D. In the Salutation
52. What phase of the writing
process should someone review your material?
A. Editing
B. Drafting
C. Revising
D. Prewriting
53. What phase of the writing process would you answer the three basic
questions concerning audience,
purpose and tone?
A. Editing
B. Prewriting
C. Revising
D. Drafting
54. What phase of the writing
process do you create a rough copy of the material?
A. Prewriting
B. Editing
C. Drafting
D. Revising
56. In a business letter, which
of the following is the BEST salutation when you are not sure who will be
reading the letter?
A. To Whom It May Concern:
B. Ladies and Gentlemen:
C. Dear Organization:
58.
Your contact information is an optional part of the signature in a business
letter?
A.
True
B. False
59. Which of the following is
the BEST or MOST important tip for writing a good e-mail body?
A. Focus on a several important
topics
B. Keep the email message short
C.
Restate the main purpose in the closing sentence.
D. Use multiple paragraph
61. What is the least amount of
information that should be included in a signature for a business email?
A. A closing and your name
B. Your name and contact
information
C. A closing, your name and
contact information
62. What is a salutation?
A. An announcement
B. A declaration
C. A greeting
D. A closing
63. In a business email, it is
OK to leave the Subject Line in the header blank.
A. Yes
B. No
C. Maybe
64. Which list shows the correct
order for the steps in the writing process? A. B. C. D.
65.
Cyberbullying is the use of Information Technology to harm or harass other
people in a _______________,
repeated,
and hostile manner.
A.
unconscious
B.
inappropriate
C.
accidental
D.
deliberate
66.
To whom should you report cyberbullying?
A.
Friends
B.
Authority figures
C.
Church members
D.
Classmates
67.
Does a company have the right to monitor all your digital communications if you
are using their
equipment?
A.
No
B.
Yes
68.
If your friends are involved in cyberbullying, you should
A.
ask them to stop.
B.
join in the fun.
C.
hope it goes away.
D.
ignore it.
69.
Asking questions are important to determining the best use of digital
communication because they help
me
think _______________________, which helps me make better decisions.
A.
after taking action
B.
about past actions
C.
while taking action
D.
before taking action
70.
Visiting Internet sites that are prohibited by an employer could result in
consequences up to and
including
termination.
A.
True
B.
False
71.
Cyberbullying is protected by Freedom of Speech.
A.
True
B.
False
72.
Confidential and proprietary information is information that ______________ be
shared outside of the company without prior consent.
A.
should
B.
is allowed to
C.
can
D.
should not
73.
Is making hateful comments about someone through emails, blogs, on-line
profiles, or chat rooms
considered
a method of cyberbullying?
A.
No
B.
Yes
74.
Before I post something on-line that is critical about someone, one of the
questions I should ask myself is, "Am I doing this because of a(n)
_______________________?"
A.
emotional reaction
B.
great idea
C.
peer pressuring me
D.
rumor
75.
What type of identity theft occurs when a thief uses someone's Social Security
Number (SSN) to file
taxes
or reap other benefits?
A.
Financial
B.
Medical
C.
Criminal
D.
Governmental
76.
Julia receivesan email from an unknown source. The
subject of the email looks strange and it has an
attachment.
What should Julia do?
A.
Respond to the email
B.
Delete the email
C.
Forward the email
D.
Open the attachment
77.
A ____________ attaches itself to a file or program, enabling it to spread from
one computer to another.
A.
worm
B.
computer virus
78.
What type of identity theft occurs when a thief spends another person's money
or opens a line of credit
in
their name?
A.
Governmental
B.
Medical
C.
Criminal
D.
Financial
79.
____________ is the act of breaking into a computer to steal information.
A.
Lifting
B.
Identity theft
C.
Hacking
D.
Safe-cracking
80.
Hiring managers and college admissions officers are some of the people who use
social media and
other
Internet resources to research candidates for employment.
A.
False
B.
True
81.
How are digital assets and digital footprints related?
A. Digital assets and digital footprints are not
related
B.
Digital footprints create digital assets
C. Digital assets and digital footprints are the
same
D.
Digital assets create digital footprints
82.
A digital footprint is all of the information on-line about a person posted by
that person or others,
_______________.
A.
recklessly
B.
intentionally
C.
unintentionally or accidentally
D.
intentionally or unintentionally
83.
Malware is software that has _______________.
A.
faster speed
B.
positive intent
C.
malicious intent
D.
poor behavior
84.
Protecting what is added to your digital footprint is important because
potentially embarrassing
information
can remain on-line ___________.
A.
until removed
B.
forever
C.
up to 6 months
D.
until it is forgotten
85.
Free Wi-Fi is typically offered on a(n) __________ network.
A.
open
B.
private
C.
encrypted
D.
unencrypted
86.
Identity theft is when someone wrongfully obtains and uses another person's
personal data, typically
for
economic gain.
A.
True
B.
False
87.
Is "Ih@%eC@ts!" a
strong password?
A.
Yes
B.
No
88.
Antivirus software is a computer program that _____________, prevents, and
takes action to disarm or remove malicious software programs.
A.
deters
B.
avoids
C.
approves
D.
detects
89.
Ryan receives an email from his cousin Mike. The subject of the email looks
strange and it has an
attachment.
What should Ryan do?
A.
Open the attachment
B.
Respond to the email
C.
Delete the email
D.
Ask Mike if he sent the email