Strayer

GEN/102 GEN102 GEN 102 WEEK 3 QUIZ

GEN 102 WEEK 3 QUIZ

1.	Question :	Johnetta is looking at a new website that her friend recommended for footwear. Since she has never been to the site before, tracking cookies will gather data about her. Which of the following is an example of the information that will be included in the tracking cookie for this website?




Question 2.	Question :	In the e-mail address [email protected], the section after the @ symbol is called the __________.




Question 3.	Question :	Nina, a student who serves in the military, is planning to go to San Diego for her upcoming graduation from Ashford University. She doesn’t currently have an extensive wardrobe for a civilian trip such as this, so she decides to shop online for clothes to wear during her trip. Knowing that some websites are less financially secure than others, she looks at the URL to make sure that it begins with __________ before she enters her credit card information.




Question 4.	Question :	There are three terms that can be used to identify the same website on the World Wide Web. The three terms are domain name, host, and __________.




Question 5.	Question :	Antonio Rodriguez has just enrolled in Ashford University, and his advisor has indicated that he needs to create an e-mail address that is appropriate for school e-mails. Which of the following is the BEST e-mail address for Antonio to use?




Question 6.	Question :	Which of the following statements about written communication is TRUE?




Question 7.	Question :	Angela was really busy yesterday, but she checked her work e-mail on her mobile phone in between appointments. One of the e-mails appeared to ask for some sensitive information in a short period of time, so Angela replied with the information and then continued her day. The next time she checked her e-mail, she had an e-mail from her supervisor reminding her that the response should not have been sent to everyone included on the e-mail. What could Angela most easily have done to prevent this problem from occurring?




Question 8.	Question :	Which of the following is acceptable information to include in work or school e-mails?




Question 9.	Question :	Tasha works full time and is also taking online classes. She uses a laptop computer at work and wants to access her courses and school e-mails during her breaks. Tasha- company does not allow her to install an e-mail program on the company computer, so she needs to use a mail program that is accessible from any computer. According to the text, which of the following is a good option for Tasha?




Question 10.	Question :	After studying for an hour, Hannah decides to take a 15-minute break and check her e-mail. To her dismay, several e-mails in her inbox are considered to be unsolicited e-mails. This is fairly typical. In 2014 alone, almost 67% of all e-mails were reported as __________.




Question 11.	Question :	Johann finds an online classified ad with a photo of a beautiful rental home in a nice area of the city at a very reasonable rate. Johann e-mails the owner because he wants to see the property in person before renting it. The owner replies, stating that there is another potential renter who wants the property and that if Johann is interested, instead of wasting time coming out to see the property, he must immediately send the first and last months’ rent as a deposit or lose the property to the other party. Johann should probably be cautious about this offer because __________.




Question 12.	Question :	Helena purchased a security software package to protect her new laptop against threats such as spyware and computer viruses. She has the option to automatically install updates and perform full computer system scans. How frequently should she set up the computer to run the full scans?




Question 13.	Question :	Ezra is taking accounting courses at Ashford, and initial posts on the discussion boards are due on Thursday at midnight. If Ezra posts his response on Wednesday, rather than Thursday, then __________.




Question 14.	Question :	Naveen is studying when his laptop shows signs of technical problems. He discovers some software running on his computer that he did not authorize. When he checks his settings, he also notices changes that he did not remember making. Naveen determines that someone must have installed a secret program, running in the background, which is referred to as __________.




Question 15.	Question :	Zed just clicked on a link in an e-mail from his friend Stu to download a new online game. The download is taking a long time, so he decides to go to bed and let the download finish overnight. When Zed returns to his computer the next day, he discovers that all of the files on his hard drive are gone. Frantic, he calls Stu, who tells him that his e-mail was hacked and he didn’t send Zed the e-mail. The e-mail Zed received most likely contained a __________, which wiped out his hard drive.



Answered
Other / Other
03 Feb 2017

Answers (1)

  1. Strayer

    GEN/102 GEN102 GEN 102 WEEK 3 QUIZ

    GEN/102 GEN102 GEN 102 WEEK 3 QUIZ GEN/102 GEN102 ****** ******
    To see full answer buy this answer.
    Answer Attachments

    1 attachments —

    • img
      Quiz496426.docx

Report As Dispute

Share Your Feedback

Give Review : A+ A B C D F