Technology in communication MCQs

Technology in communication MCQs

Answer these 30+ Technology in communication MCQs and see how sharp is your knowledge of Technology in communication.
Scroll down and let's start!

1: Chronemics is the study of_____ as communication.

A.   Time

B.   Location

C.   Both

D.   None

2: Computer mediated communication is a_____communication that occurs through some form of technology.

A.   Human

B.   Robotic

C.   Both

D.   None

3: Corporate blog is a web log used _____

A.   Improve internal communication at work

B.   For external marketing

C.   For public relations

D.   All of these

4: A form of aggressive communication in which people interacting on professional topics are filled with emotionality refers to electronic aggression.

A.   True

B.   False

5: Electronic bulletin board is an online service to which_____can obtain access to read postings.

A.   Anyone

B.   Subscriber

C.   Both

D.   None

6: Email dialogues refer to exchanges of messages about a particular topic using email, professional blog space, and other electronic tools to encourage participation that will ideally lead to_____

A.   New ideas

B.   Strategic planning

C.   Sound decision making

D.   All of these

7: Email flame is a hostile message that is_____,or obscene.

A.   Blunt

B.   Rude

C.   Insensitive

D.   All

8: Email forwards include_____, petitions or calls for help, jokes, pictures, and the like.

A.   Virus alerts

B.   Chain letters

C.   Stories disguised as warnings

D.   All of these

9: When information, requests for feedback, new projects, responses to questions, phone calls, and required online classes for work, on top of attending to loved ones, children, pets, and other family matters, leave you stressed and feeling as though things are spinning out of control, it is called stress overload.

A.   True

B.   False

10: A computer service that facilitates discussions by connecting people who share different interests is called listserv.

A.   True

B.   False

11: Phishing refers to sending authentic-looking _____emails.

A.   Authentic

B.   Fraudulent

C.   Both

D.   None

12: The use of a user’s email address for a purpose to which the user didn’t agree is called_____

A.   Phishing

B.   Spam

C.   Scam

D.   None

13: The avoidance of checking email, sending text messages, watching television, or answering the phone is called_____

A.   Plugged

B.   Unplugged

C.   Spam

D.   Phishing

14: Virtual work team is a group of coworkers who use_____communication to accomplish tasks and professional projects.

A.   Face to face

B.   Computer mediated

C.   Both

D.   None

15: Efforts to monitor and track employee behavior in terms of the information they access or communicate while at work refers to_____

A.   Communication plan

B.   Workplace surveillance system

C.   Workforce communication assessment

D.   None of these

16: Computer-mediated communication (CMC) helps save on time and travel by implementing virtual teams.

A.   True

B.   False

17: It is illegal for businesses to use information from social networking sites as a hiring decision.

A.   True

B.   False

18: Employee surveillance is designed to track the information an employee accesses while at work.

A.   True

B.   False

19: CMC occurs in both synchronous and asynchronous time.

A.   True

B.   False

20: Employees should respond to every e-mail within 48 hr.

A.   True

B.   False

21: Which of the following describes the most professional e-mail address to use?

A.   Simple, such as your name

B.   Catchy, to help an employer remember it

C.   Descriptive of your hobbies

D.   Long, to avoid phishing

22: Which is a positive aspect of network e-mail?

A.   Freedom of movement

B.   More message storage

C.   Online only access

D.   Instant responses

23: Phishing refers to ______.

A.   Hacking into personal e-mail addresses

B.   Hacking into network e-mail addresses

C.   Gaining sensitive information through fraudulent e-mails

D.   Sending spam to fill an e-mail inbox

24: What is the main difference between listservs and electronic bulletin boards?

A.   Electronic bulletin boards are accessible to anyone.

B.   Listservs subscribers must use the same domain name.

C.   Electronic bulletin boards connect users to facilitate discussions.

D.   Listservs are paid for by the company.

25: Which is the most appropriate use of a text message?

A.   Telling someone they got a job

B.   Asking for an explanation of an assignment

C.   Texting a missing coworker during a meeting

D.   Confirming plans with a friend

26: A hostile message that is blunt, rude, insensitive, or obscene is called an e-mail ______.

A.   Flag

B.   Flame

C.   Attack

D.   Troll

27: Chronemics refers to ______.

A.   Information overload

B.   The study of time as communication

C.   Synchronous communication

D.   Asynchronous communication

28: Experts suggest spending some time being ______, or avoiding checking e-mail, sending text messages, watching television, or answering the phone.

A.   Unplugged

B.   Offline

C.   Out of the virtual office

D.   Disconnected

29: Spell-checking, eliminating jokes and discriminatory language ensure ______.

A.   Meaningful travel plans

B.   Electronic aggression

C.   Professional excellence

D.   Distractions

30: A group of coworkers who use CMC to accomplish tasks and professional projects traditionally completed face-to-face is called a(n) ______.

A.   Virtual work team

B.   Online small group

C.   Virtual coworker group

D.   Online employee pool

31: Technology has had a significant impact on small businesses because ________.

A.   It creates new business opportunities and new ways to conduct business

B.   The failure of so many Web-based businesses in the late 1990s made capital unavailable

C.   The information technology market has become oversaturated and unfriendly

D.   Most small businesses cannot afford the high costs of new technologies to help run their businesses

E.   It has made marketing for new businesses more expensive

32: 3g wireless offers data transfer rates of up to ____ mbps.

A.   1

B.   2

C.   5

D.   20