Filters
Question type

Study Flashcards

________ is terminology that is specific to a particular profession or group. For example, statisticians talk about t-tests, chi-square tests, confidence intervals, and normal distributions.


A) The grapevine
B) Technology
C) Gossip
D) Jargon
E) Rhetoric

F) None of the above
G) A) and B)

Correct Answer

verifed

verified

Compared to women, men tend to


A) use emoticons to express sarcasm and banter.
B) easily indicate their uncertainties.
C) use more "we" statements.
D) provide more information than needed.
E) make more apologies.

F) A) and B)
G) A) and C)

Correct Answer

verifed

verified

A(n) ________ form of media allows receivers to observe multiple cues, such as body language and tone of voice, and allows senders to get feedback. Face-to-face communication is an example of this form of media.


A) encoded
B) dense
C) rich
D) informal
E) formal

F) C) and E)
G) B) and D)

Correct Answer

verifed

verified

While networking, you are more likely to be remembered if you ask


A) "What was the highlight of your day?"
B) "Where do you work?"
C) "Do you live nearby?"
D) "Where did you go to college/school?"
E) "Where are you from/did you grow up?"

F) A) and E)
G) A) and C)

Correct Answer

verifed

verified

Which of the following is NOT appropriate to include in the conclusion of a speech?


A) a signal phrase to cue listeners about the wind-up
B) "thank you"
C) a call to action
D) details you forgot from earlier
E) a little upbeat story or a quotation

F) C) and D)
G) B) and E)

Correct Answer

verifed

verified

Portia was preparing for a networking event and kept reminding herself that she needed to keep eye contact with whomever she was speaking, even though that was not typical for her culture. What skill was Portia working on?


A) Portia was attempting to build personal connections.
B) Portia was practicing being mindful.
C) Portia was working on how to follow up.
D) Portia was networking with a purpose.
E) Portia was creating a positive mind-set.

F) B) and C)
G) A) and E)

Correct Answer

verifed

verified

Which of the following should you NOT do when attempting to improve communication?


A) Occasionally nod in agreement.
B) Close your eyes.
C) Speak in a quiet, reassuring tone.
D) Smile and show animation.
E) Lean toward the speaker.

F) B) and C)
G) None of the above

Correct Answer

verifed

verified

This question contains two parts; be sure to answer both. First, define the concept of security in the digital age. Second, imagine that you manage the customer-service department at the local utility (provider of electricity and natural gas). Name at least three specific measures that your department could take to prevent security breaches on the Internet.

Correct Answer

verifed

verified

Security is a system of safeguards for p...

View Answer

At the end of the fiscal year, Thompson Investments releases an earnings report to clients. By sending the earnings reports to its clients, Thompson Investments is communicating


A) vertically.
B) externally.
C) horizontally.
D) downward.
E) upward.

F) C) and D)
G) A) and B)

Correct Answer

verifed

verified

Which of the following is a danger of using a lean medium for nonroutine matters?


A) It results in information overloading.
B) It doesn't provide enough of the information the sender needs and wants.
C) The delivery has more information than necessary.
D) It results in information oversimplification.
E) It is too personal.

F) B) and E)
G) All of the above

Correct Answer

verifed

verified

You are a(n) ________ communicator when your intended message is sent accurately in the least amount of time.


A) economical
B) collaborative
C) formal
D) efficient
E) effective

F) D) and E)
G) C) and E)

Correct Answer

verifed

verified

________ is the process of translating a message into understandable symbols or language.


A) Mediation
B) Transformation
C) Encoding
D) Decoding
E) Enriching

F) A) and D)
G) B) and E)

Correct Answer

verifed

verified

Which term refers to the use of the Internet at work for personal use?


A) cyberloafing
B) jargon
C) crowdsourcing
D) cyberthreat
E) media policy

F) A) and C)
G) C) and D)

Correct Answer

verifed

verified

Knowing that men and women communicate differently, which of the following statements would be more likely true for men?


A) They boast about achievements.
B) They mention "we" or "you" in a conversation with a coworker.
C) They use positive overlaps such as "I agree."
D) They decipher nonverbal cues accurately.
E) They provide more information than needed.

F) C) and D)
G) A) and C)

Correct Answer

verifed

verified

Jyllian, a supervisor, told her employees, "The store will close Monday for inventory and all employees are expected to participate." Without knowing how Jyllian communicated her message, we know it was done


A) by wandering around.
B) horizontally.
C) upward.
D) through the grapevine.
E) downward.

F) C) and E)
G) A) and E)

Correct Answer

verifed

verified

Contrary to stereotypes, ________ has no impact on media richness preference.


A) gender
B) culture
C) language
D) education
E) age

F) B) and D)
G) A) and B)

Correct Answer

verifed

verified

Generally people retain about 75 percent of what they hear.

A) True
B) False

Correct Answer

verifed

verified

An order taker who has a thick accent, and someone who speaks too fast at a fast-food drive-through, are examples of communication barriers.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is NOT an element of an effective social media policy?


A) Encourage employees to post honest, bold, and even unpopular decisions.
B) Align social policy with the organization's culture.
C) Explain what is considered illegal.
D) Clarify what is confidential.
E) Create safe channels for employees to air their concerns before going online.

F) A) and D)
G) A) and E)

Correct Answer

verifed

verified

The key to protecting digital communication systems against fraud, hackers, identity theft, and other threats is


A) using file-sharing services.
B) hiring ethical employees.
C) using prevention techniques like strong passwords.
D) creating a well-funded IT department.
E) minimizing turnover.

F) A) and D)
G) None of the above

Correct Answer

verifed

verified

Showing 41 - 60 of 100

Related Exams

Show Answer