Chapter 26 Technology Flashcards
Which of the following items is NOT considered to be a computer peripheral?
(1) Scanner
(2) Database software
(3) Digital camera
(4) Fax machine
2
Scrambling credit card information into an unreadable format is best known as:
(1) cryptomizing.
(2) digitizing.
(3) encrypting.
(4) instilling.
3
In order to advertise to a wider audience, you have decided to create your own website. Based on the information in the Real Estate Council of BC’s Guidelines for Advertising and the internet, which of the following are general guidelines that you should follow?
A. The name of the brokerage can be excluded in online advertising.
B. Listing information should be kept current and accurate and licensees must ensure that when listings have expired, they are immediately removed from the website.
C. If linking to an outside database of available properties, it should be clear to consumers which listings are the licensees and which are not.
D. Licensees can advertise other licensee’s listings directly on their own website without permission from the listing brokerage in order to increase business.
(1) Only A and B
(2) Only C and D
(3) Only A and D
(4) Only B and C
4
Which of the following is a peripheral device for a computer?
(1) Internet and world wide web
(2) Digital cameras
(3) Digital versatile discs (DVD) and compact disc recordable (CD-R)
(4) All of the above
2
Which one of the following statements regarding digital signatures is TRUE?
(1) Digital signatures are used to authenticate the individual sending the message so as to ensure the integrity of the data.
(2) Digital signatures are codes recorded on to a CD to ensure copy protection and discourage multiple users.
(3) Digital signatures are codes built into modems which notify receivers of where a message is coming from.
(4) Digital signatures are tags in HTML that tell search engines information about your webpage.
1
Which of the following displays numbers in rows and columns and is especially useful for budgeting and statistical data analysis?
(1) Email management software
(2) Word processing software
(3) Spreadsheet software
(4) All of the above
3
Which of the following statements is TRUE?
(1) Using a technology called encrypting, protecting information on the internet is accomplished by scrambling it into an unreadable format called decrypting.
(2) Using a technology called coding, protecting information on the internet is accomplished by scrambling it into an unreadable format known as PDF.
(3) Using a technology called photography, protecting information on the internet is accomplished by scrambling it into an unreadable format called deciphering.
(4) Using a technology called cryptography, protecting information on the internet is accomplished by scrambling it into an unreadable format called encrypting.
4
Your office manager has just asked you to give a sample sales presentation at the next office meeting. You have decided to use presentation software to create a slide presentation. Which of the following are general guidelines for slide presentations?
A. Use “8 × 8” format as a guide; no more than 8 words per bullet point and no more than 8 bullet points per slide.
B. Each slide should start with a salutation.
C. There is no need to speak during the presentation since all of the information should be on the slides.
D. Put as much information on each slide as possible.
(1) Only A and C
(2) Only C and D
(3) Only A, B and C
(4) None of the above.
4
Which of the following is NOT a function that can be performed by most database software programs?
(1) Automate phone dialing
(2) Record client information such as birthdays and anniversaries
(3) Create a mail merge, alongside word processing software
(4) Farm new clients from the internet
4
The Personal Information Protection Act (PIPA) regulates the information that is collected and used by all licensees. Which of the following are PIPA privacy principles?
A. Provide recourse
B. Obtain consent
C. Identify the proposal
D. Limit use, disclosure and retention
(1) A and C only
(2) B, C, and D only
(3) A, B, and D only
(4) All of the above
3
Professional email etiquette consists of all of the following EXCEPT:
(1) keeping messages short and getting to the point quickly.
(2) using humour sparingly and avoiding sarcasm.
(3) using only lowercase and emoticons.
(4) refraining from using clichés or cheeky tag-lines in an email signature
3
Which of the following security measures would best prevent unauthorized internet users from accessing your computer when connected to the internet?
(1) Firewalls
(2) Passwords
(3) Spam
(4) Protecting Hardware
1
Jason is creating a real estate blog to incorporate into his website. Which of the following guidelines should he follow in developing his blog?
A. Jason should update his blog regularly.
B. Jason’s business blog should be separate from any personal blogs he might run.
C. The content of Jason’s blog should generally focus on real estate-related information, such as market news, home maintenance tips, and information on frequently used forms and contracts.
D. Jason’s blog should be used as a method of communicating interesting information to existing and potential clients.
(1) Only A and D
(2) Only B, C, and D
(3) Only A and C
(4) All of the above
4
Scrambling credit card information into an unreadable format is best known as:
(1) copyrighting.
(2) meta tagging.
(3) portable document filing.
(4) encrypting.
4
Email newsletters can be an effective tool for promoting your business and maintaining contact with your database. Which of the following statements regarding a successful newsletter campaign is TRUE?
(1) Newsletters should ideally be sent once per day.
(2) Newsletters should be used exclusively to advertise your new listings and recent sales.
(3) Newsletters should include several large, high quality photos.
(4) Newsletters should include an option for subscribers to opt out of receiving future communications.
4