Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Business Communication
Q:
Discuss how memos called process directives can be used.
Q:
Discuss why it is that memos should only be used infrequently.
Q:
Message presentation refers to that visual component. Explain the impact of carelessly written communication.
Q:
Explain the difference between using general language and specific language and provide an example of each.
Q:
Bram is writing press release that he wants to catch the attention of media people and stand out among the other press releases they receive. Identify the six strategies for achieving Brams goal.
Q:
Why is written communication important?
Q:
What should be included in employee reviews?
Q:
Describe a situation in which a company would be advised to release proactive media writing.
Q:
Descriptions of new policies/procedures and changes to those already in place are types of memos known as ______.
Q:
______ should be reserved for communicating information thats critically important.
Q:
Jonathon likes to send ______, a form of thank-you letter used to remind employers of your interview and to emphasize that youre the right person for the job.
Q:
Thank-you letters can be sent via ______ (which is great for delivery speed), but we should also think about how impressive it is to actually receive a handwritten note.
Q:
A letter of recommendation is needed when a college/university or ______ requests one.
Q:
A ______ is a form of written communication used to provide a documented reference for students and professionals.
Q:
When Jacob uses employee reviews, he needs to keep in mind that they should be used carefully to document ______ performance and areas for the employee to improve.
Q:
______ serve as a form of written communication used in business and professional settings to provide feedback to employees about how they are performing on the job
Q:
General language is usually characterized as vague statements that can easily be misunderstood, whereas ______ language makes precise references.
Q:
There are only advantages and there are no disadvantages when it comes to the use of technology in managing our professional relationships.
Q:
With each change in technology, there are changes to our communication as professionals.
Q:
Americas workers have been able to restrain themselves from visiting online social-networking sites and posting tidbits that their employers might not consider job appropriate.
Q:
Much of our communication occurs through technology, so it is important to make sure to present oneself as a professional both online and in person.
Q:
Social networking can be a wonderful tool for sharing information and maintaining professional connections.
Q:
If you use technology to avoid face-to-face communication with people in your office, technology can become a path directly to effective communication.
Q:
A virtual work team is a group of coworkers who accomplish tasks and professional projects in face-to-face contexts.
Q:
Being unplugged refers to the avoidance of checking email, sending text messages, watching television, or answering the phone.
Q:
Email systems and other forms of communication technology make employees more efficient while simultaneously increasing their workloads.
Q:
Private communication online can be made public.
Q:
Sometimes it is okay to send a joke through companywide email as long as it is not offensive.
Q:
Its important that you become a more reflective communicator if you want to achieve professional excellence.
Q:
Spam is a term used to describe the practice of sending fraudulent emails in an attempt to steal sensitive information from the user.
Q:
For the purposes of organization, all email should be sent to one inbox and then filtered into separate folders within that inbox.
Q:
Because of the distance a message has to travel, computer-mediated communication occurs in asynchronous time.
Q:
Information overload occurs when information, requests for feedback, taking on new projects, responding to questions, answering the phone, and completing required online classes for work on top of taking care of loved ones, children, pets, and other family matters leaves us feeling as though things are spinning out of control.
Q:
Using a network email address is the only way to ensure its security.
Q:
Searching social networking sites to view an employees personal activities is illegal once an employee is hired.
Q:
Communication through any type of technology is referred to as computer-mediated communication.
Q:
One way to avoid electronic aggression is to ask yourself if you would say the same thing to someone in person.
Q:
Companies are now asking employees to waive their privacy rights when it comes to using which of these? a. blogs b. surveillance c. phishing d. work-related email
Q:
When Chaz is communicating by using any form of technology, he is engaging in which of the following?
a. computer-mediated communication
b. email flaming
c. spamming
d. phishing
Q:
An online service that anyone, not just a subscriber, can access to read postings is known by which of these terms?
a. corporate blog
b. listserv
c. spam
d. electronic bulletin board
Q:
Luscious is a member of a group of coworkers who use CMC to accomplish tasks and professional projects traditionally completed face-to-face in order to save on time and travel. What is the term for this type of group?
a. workplace surveillance system
b. listserv
c. a virtual work team
d. email forwarders
Q:
Which of these obtain email addresses by buying company customer lists or using programs to produce email addresses randomly?
a. spammers
b. bloggers
c. retailers
d. phishers
Q:
Which of the following is the correct term for sending authentic-looking but fraudulent emails designed to steal sensitive personal information?
a. spamming
b. unplugging
c. blogging
d. phishing
Q:
Pearl has decided to stop checking email, sending text messages, watching television, or answering the phone. Pearl is engaging in which of the following?
a. spamming
b. unplugging
c. blogging
d. email flaming
Q:
Which of these is the study of time as communication and/or as a communication function?
a. chromatics
b. chronemics
c. chronograph
d. chronicle
Q:
Bernard has sent a hostile email message that is blunt, rude, insensitive, and includes some obscenities. Bernard has sent which of these?
a. electronic bulletin board
b. blog
c. email flame
d. listserv
Q:
Which of the following are exchanges of messages about a particular topic using email, professional blog space, and other electronic tools to encourage participation that will ideally lead to new ideas, strategic planning, and sound decision making.
a. blogs
b. email dialogues
c. listservs
d. flames
Q:
Which of the following contribute to information overload?
a. email forwards
b. memos
c. meeting reminders
d. thank-you emails
Q:
Email systems and other forms of communication technology make employees more efficient while simultaneously doing which of these?
a. increasing their workload
b. slowing them down
c. complicating their work
d. reducing their online presence
Q:
Blogs are being used by executives to share information and to do which of the following?
a. launch new initiatives
b. establish company policy
c. justify internal decisions
d. report incidents that occur with particular employees
Q:
Sara doesnt enjoy interacting with people. Because her organization requires her to work in team situations, she is the first to sign up for virtual teams so she can at least minimize her face-to-face interactions with her colleagues. What does Saras approach reflect?
a. someone who isnt able to excel in the workplace
b. an example of why computer-mediated communication is so important to the workplace
c. an example of a technology creating a barrier to effective communication
d. Saras reluctance to get up early and interact with teammates
Q:
This process will help you bridge professional excellence with communication and technology and help you excel in the workplace.
a. interview
b. KEYS
c. evaluation
d. COPS
Q:
Which of these is even more difficult to analyze because of the lack of cues in computer-mediated communication?
a. verbal communication
b. professionalism
c. competence
d. nonverbal communication
Q:
Why is it important to understand the drawbacks of technology in the workplace?
a. to learn to avoid electronic communication whenever possible
b. to understand that time management employee surveillance, and information overload can hinder your professional excellence
c. to make sure that no one has access to your personal information
d. to create a workplace culture that is not greatly influenced by electronic communication
Q:
Which of the following is an example of an email flame?
a. Jon sending an email that is blunt, insensitive, and rude to another coworker
b. Susan sending an off-color joke to the entire company
c. Alice using Facebook to complain about a customer
d. Daniel using his company email address for personal business
Q:
What is a reason why email dialogues can lead to electronic aggression?
a. People are oftentimes frustrated by the overload of email they receive.
b. Email dialogues often have glitches that make them difficult to read.
c. Topics that begin with a professional spirit can get unprofessional when people dont agree with the direction of the discussion
d. Email dialogues can detract from other important work someone might be doing.
Q:
Sending authentic-looking but fraudulent emails in order to steal sensitive personal information is known as which of the following?
a. spam
b. phishing
c. mimicking
d. miming
Q:
What is the question you should take into consideration when attempting to include motivational language in your emails?
a. Would I pass this information on to my friends who dont work for the company?
b. Would I repeat this in person?
c. Am I communicating unbridled friendship to my colleagues?
d. Will this help someone get promoted before I am?
Q:
The goal of workplace surveillance is to do which of the following?
a. reduce productivity
b. encourage employees to look up personal banking information
c. discourage employees from viewing pornography at work
d. help employee remember passwords and sensitive company information
Q:
What kinds of work teams are designed to help companies connect their employees in different locations and save on time and travel?
a. teleconferences
b. Skype
c. virtual work teams
d. face-to-face teams
Q:
According to the authors of this text, if you want to excel and get promoted to a higher position in leadership, you need to do which of these?
a. Improve your communication with technology.
b. Rely on text messaging altogether.
c. Post and forward posts from social media.
d. Tweet the activities of your boss to show how much you like him or her.
Q:
Why do most companies find it necessary to have a written policy regarding electronic communication?
a. Employers need a paper trail on employees activities in case they want to fire them.
b. Issues such as viruses, misuse of the system, and email etiquette need to be clearly spelled out to employees.
c. Finding out if job candidates can understand the policy is critical to the hiring process.
d. Employers want a legally binding contract in place to protect against lawsuits.
Q:
Why is it especially important to be careful about the messages you send via electronic communication?
a. Due to the lack of cues, misunderstandings can lead to electronic conflicts.
b. Almost anyone can look into your private emails.
c. The same rules apply for electronic communication as paper communication.
d. Those messages disappear in a short time.
Q:
Which of the following text messages should have been communicated with a phone call or in person?
a. See you there.
b. Meeting @ 10
c. You got the promotion!
d. Thanks for the heads-up!
Q:
How can electronic bulletin boards be accessed?
a. by joining a listserv first
b. by subscribers
c. by anyone
d. through company channels
Q:
Which of these statements is true regarding spam email?
a. Spam recipients are never random.
b. All spam contains viruses designed to hack your computer.
c. Spammers often steal sensitive passwords.
d. Spammers buy your information from companies you have given your email address to.
Q:
Which strategy is a way to avoid email information overload?
a. Ignore and save every email that you can.
b. Read and respond to messages that are important.
c. Be sure not to delete inbox messages until you leave the company.
d. Create a removable drive for all work-related emails.
Q:
Computer-mediated communication occurs in which of these?
a. synchronous time
b. asynchronous time
c. synchronous and asynchronous time
d. androgynous time
Q:
Which term correctly identifies the study of time as communication?
a. oculesics
b. linguistics
c. proxemics
d. chronemics
Q:
Stacy has a Facebook account and uses it as a sounding board for her frustration with her personal life and company. Which of the following statements is true?
a. Stacy should only delete anything on her Facebook page that is work related.
b. Stacy should be mindful about what others can retrieve about her on the internet and should refrain from posting things that may show her in a negative light.
c. Stacy can post negative comments about the company as it is her right to exercise her right to free speech and because of this nothing negative will happen.
d. As long as Stacy is not friends with her boss, she should be fine.
Q:
Which of the following is true concerning workplace surveillance systems?
a. Employers are allowed to track information being accessed from their computers.
b. Work computers are more secure than personal computers.
c. Employees can hide their online activity by clearing their search history.
d. Systems that track web activity are illegal without the consent of the employee.
Q:
When you receive an email written in all caps with lots of exclamation points, the tone of the message is changed. The change in tone is a characteristic of what type of communication?
a. verbal
b. nonverbal
c. nonprofessional
d. computer-mediated
Q:
What type of email should you avoid sending while at work or from a work account?
a. memos
b. jokes
c. organizational news
d. meeting schedules
Q:
Which email address example is the most appropriate to use for professional use such as business connections?
a. [email protected]
b. [email protected]
c. [email protected]
d. [email protected]
Q:
Companies and organizations are using which of the following in an effort to monitor and track employee behavior in terms of the information they access or communicate while at work?
a. workplace surveillance systems
b. Big Brother brand software
c. internal spies who report directly to security
d. airport-style screening devices
Q:
Computer-mediated communication takes place via which of the following?
a. computers
b. radios
c. cable television
d. local news feeds
Q:
When you communicate by using any form of technology, you are taking part in which of the following?
a. computer-mediated communication
b. current communication practices
c. secondary communication
d. inferior communication
Q:
Multiple Choice
Q:
Discuss the uses of workplace surveillance systems.
Q:
Discuss the idea of being unplugged.