Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

E-Communication and Cybersecurity: Words to Know, Study notes of Computer Science

Various terms related to e-communication and cybersecurity, including filtering, hoax, netiquette, pyramid scheme, spam, teleconferencing, trojan horse, and virus. It also includes true/false and multiple choice questions to test understanding.

Typology: Study notes

2012/2013

Uploaded on 11/24/2013

sandra-fields08
sandra-fields08 🇺🇸

1 document

1 / 2

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
Sandra Fields
Lesson 27
Words to Know
Filtering- A process that can used to cut down on or eliminate most junk mail.
Hoax- An attempt to deceive an audience into believing that something false is real.
Netiquette- A combination of the words net and etiquette, refers to good manners and
proper behaviors when communicating through electronic media.
Pyramid scheme- An illicit business model where profits are based on the investor’s
ability to recruit other individuals who are enrolled to make payments to their
recruiters.
Spam- Unsolicited commercial e-mail that is sent to many people at the same time to
promote products or services.
Teleconferencing- Telecommunication’s service in which parties in remote locations can
participate via telephone in a group meeting.
Trojan horse- Computer virus that does something different from what it is expected to
do.
Virus- A computer program that is written to cause corruption of data.
TRUE/FALSE
1. Electronic communication offers many advantages over other types of communication.
2. If you cannot download or view an e-mail attachment, the size of the attachment could
be the problem.
3. Personal and social messages should be formal.
4. A time bomb is a virus that does not cause any damage.
5. A hoax is an attempt to deceive an audience into believing that something false is real.
Multiple Choices
1. It is not always easy to spot an e-mail or chain letter containing a(n)…
2. Phishing is a type of e-mail…
3. Most companies, institution, government agencies, and other businesses and groups
have guidelines for the use of electronic…
4. Viruses and other similar threats can be delivered as e-mail….
5. A(n)….can corrupt data.
Fill In The Blank
pf2

Partial preview of the text

Download E-Communication and Cybersecurity: Words to Know and more Study notes Computer Science in PDF only on Docsity!

Sandra Fields Lesson 27 Words to KnowFiltering- A process that can used to cut down on or eliminate most junk mail.  Hoax- An attempt to deceive an audience into believing that something false is real.  Netiquette- A combination of the words net and etiquette, refers to good manners and proper behaviors when communicating through electronic media.  Pyramid scheme- An illicit business model where profits are based on the investor’s ability to recruit other individuals who are enrolled to make payments to their recruiters.  Spam- Unsolicited commercial e-mail that is sent to many people at the same time to promote products or services.  Teleconferencing- Telecommunication’s service in which parties in remote locations can participate via telephone in a group meeting.  Trojan horse- Computer virus that does something different from what it is expected to do.  Virus- A computer program that is written to cause corruption of data. TRUE/FALSE

  1. Electronic communication offers many advantages over other types of communication.
  2. If you cannot download or view an e-mail attachment, the size of the attachment could be the problem.
  3. Personal and social messages should be formal.
  4. A time bomb is a virus that does not cause any damage.
  5. A hoax is an attempt to deceive an audience into believing that something false is real. Multiple Choices
  6. It is not always easy to spot an e-mail or chain letter containing a(n)…
  7. Phishing is a type of e-mail…
  8. Most companies, institution, government agencies, and other businesses and groups have guidelines for the use of electronic…
  9. Viruses and other similar threats can be delivered as e-mail….
  10. A(n)….can corrupt data. Fill In The Blank
  1. …refers to good manners and proper behaviors when communicating through electronic media.
  2. E-mail delivery…refers to a returned or “bounced” e-mail.
  3. For e-mail messages, the…format provides formatting options such as multiple fonts, text, colored headings, graphics, and links to Web sites.
  4. An e-mail message sent from one person to a group is an example of one-to- …..communication.
  5. ….uses a telecommunications system to serve groups.