Lack of ________ being present during an audio conference makes it more difficult to tell if a party is supportive of concepts being presented.
The same communication technologies that enable people to work from home, enable someone to work on a project from another country. This is called ________.
choosing not to participate
type of communication where both parties are not present at the same time
playing video online at a convenient time for the user
distribution of advertising materials; e.g. catalogs and credit card applications
pushes information to keep employees informed
provides a Web site for analysis of your workstation for ergonomic purposes
used by businesses to allow employees to contribute their knowledge
information downloaded automatically to your computer or smartphone
used to connect callers outside the company
phones routed within a company by a central device
distributed by a television service provider when the customer wants it
Unsolicited and unwanted e-mail is commonly referred to as ________
________ is where workers talk to customers synchronously to answer questions or requests for help
An agency in the U.S. Department of Labor, ________, provides a Web site that guides you through an analysis of your computer workstation to help avoid computer-related injury.
Which of the following would NOT be one of the tools mentioned to help manage large amounts of e-mail?
coding all messages with a blue flag
Which of the following is NOT a way for companies to assess the effectiveness of their social media marketing strategy?
stickiness, bounce rate, virtual factor, activity ratio
is when a company's brand or posting is mentioned by friends of your members.
connects the local area network and the PBX to the telephone network
VOICE GATEWAY ROUTER
used to route voice to PSTN
HOP OFF GATEWAY
sends voice over the Internet at a much lower cost
group that manages telecommunications standards
often connected to each other using encrypted connections over the Internet
Many people contact their television service provider for a ________ to be able to record large videos for later playback
A ________ is used to ensure a teleworker has access to needed company data by utilizing encryption techniques to establish a secure connection between the worker's home computer and the company's serve
backup for e-mails
items of information provided by Outlook
one cause for the load of unsolicited e-mail
coordination of mail activities with multiple devices
acts as a recycle bin for e-mail
DELETED ITEMS FOLDER
According to a 2007 survey, what percentage of organizations in the US monitored the time spent, content, or keystrokes of workers?
A central device called a ________ routes calls between phones within an organization that has an internal telephone system.
Which of the following would NOT be a part of an e-mail message?