Technology in Action – Chapter 1

_______ tools gather information from sources such as e-mails, text messages, and tweets and make the information instantly and publicly available for use in emergencies.

a) Affective Computing
b) Crowdsourcing
c) Social Networking
d) Crisis-mapping

We Will Write A Custom Essay Sample On
ANY TOPIC SPECIFICALLY
FOR YOU

For Only $13.90/page


order now
Crisis-mapping
_______ tools enable groups of people to connect and exchange ideas.

a) Affective Computing
b) Debugging
c) Social Networking
d) Computer Forensics

Social networking
The gap between those who have easy access to the internet and the technology and those who do not is known as the _______ divide.

a) digital
b) web
c) internet
d) technology

digital
All of the following factors lead to greater motivation EXCEPT _______.

a) purpose
b) autonomy
c) mastery
d) condumption

consumption
_______ results when leisure time + tools allow us to engage in creative acts.

a) Cognitive Surplus
b) Crowdsourcing
c) Affective computing
d) Social networking

Cognitive Surplus
Mastery is defined as _______.

a) feeling confident and excited about learning new skills.
b) combining leisure time with the tools to be creative.
c) working for something larger.
d) working without continual direction and control.

Feeling confident and excited about learning new skills
Autonomy is defined as _______.

a) feeling confident and excited about learning new skills
b) repressing motivated behaviour
c) working without continual direction and control
d) working for something larger

working without continual direction and control
Using the internet to get small donations from many people to start a business is called _______.

a) collaborating
b) crowdsourcing
c) kickstarting
d) crowdfunding

crowdfunding
QR stands for _______.

a) quick response
b) quick retention
c) quality retention
d) quality response

quick response
_______ solicits online input from consumers.

a) A quick response code
b) Crowdfunding
c) Computer forensics
d) Crowdsourcing

Crowdsourcing
Sharing products rather than owning them individually is known as _______.

a) crowdsourcing
b) collaborative consumption
c) crowdfunding
d) social networking

collaborative consumption
A popular Voice over Internet Protocol (VoIP) service is _______.

a) Mobile bridge
b) Tablet
c) Skype
d) Social Network

Skype
The term computer _______ is used to describe someone who is familiar enough with the computers to understand their capabilities and limitations.

a) literate
b) webmaster
c) hawker
d) master

literate
_______ refers to the commands that instruct a computer what to do.

a) Hardware
b) Spam
c) Software
d) Data mining

Software
Unwanted or junk e-mail is called _______.

a) spam
b) adware
c) spyware
d) malware

spam
All of the following are examples of being computer literate, EXCEPT _______.

a) knowing how to use the web efficiently
b) knowing how to diagnose and fix hardware and software problems
c) knowing only how to use your computer for e-mails
d) knowing how to avoid hackers and viruses.

knowing only how to use your computer for e-mails
_______ is a field of study focused on handling and automatic retrieval of information.

a) RFID
b) Crisis mapping
c) Information technology
d) Computer forensics

Information technology
The process of searching huge amounts of data seeking a pattern is called data _______.

a) mining
b) searching
c) warehousing
d) diving

mining
Which of the following is an example of the results of data mining?

a) An Excel spreadsheet listing all employees and their annual salaries in a random order
b) A printout of all sales taken from the register at the end of the day
c) Raw data from questionnaires given at the mall
d) Netflix providing you with a list of movies you might enjoy

Netflix providing you with a list of movies you might enjoy
Which of the following software can best be used to help create digital art?

a) Microsoft PowerPoint
b) Adobe Acrobat
c) Microsoft Word
d) Corel Painter

Corel Painter
Faculty at universities often use course management software such as _______ so that students can communicate outside of class and have easy access to class materials.

a) LinkedIn
b) Blackboard
c) iCloud
d) Whiteboard

Blackboard
The goal of _______ research is to provide technological solutions to physical and health-related problems.

a) biomedical
b) RFID
c) crisis-mapping
d) computer forensics

biomedical
One potential application of _______ is to provide sight to the blind.

a) biomedical chip implants
b) Bluetooth technology
c) patient simulators
d) RFID tags

biomedical chip implants
A group of researchers at the MIT Media Lab have developed a system to help improve social skills for people who have _______.

a) depression
b) paralysis
c) brain damage
d) autism

autism
Analyzing computer systems to gather potential legal evidence is computer _______.

a) detectives
b) forensics
c) analysis
d) enforcement

forensics
_______ is our normal sense of the world around us with digital information.

a) Affective computing
b) Web 2.0
c) Cognitive surplus
d) Augmented reality

Augmented reality
Affective computing _______.

a) performs calculations faster than humans
b) speaks human language
c) recognizes human fingerprints
d) recognizes and simulates human emotion

recognizes and simulates human emotion.
Autonomy is the feeling of confidence and excitement from seeing your own skills progress

True or False?

False
Purpose is the simple understanding that you are working for something larger than yourself

True or False?

True
Cognitive surplus is the combination of leisure time and creativity tools.

True or False?

True
Zipcar is an example of ownership

True or False?

Flase
Crowdfunding is asking for large donations from a few people

True or False?

False
The AT&T mobile app that lets customers report locations where there are gaps in service is an example of crowdsourcing

True or False?

True
A virus is electronic junk mail

True or False?

False
You cannot be computer literate unless you have knowledge of higher-level computer skills, such as computer programming.

True or False?

False
Hardware refers to the program that give instructions to the computer.

True or False?

False
Computer forensics analyzes computer systems in gathering potential legal evidence.

True or False?

True
Hospitals use nonimplant versions of identity chips on the wristbands of all patients.

True or False?

False
Affective computing is a field of study focused on the managing, processing, and automatic retrieval of information

True or False?

False
Mastery of software programs, such as Adobe Illustrator and Corel Painter, is essential to creating digital art.

True or False?

True
Information technology is the study of managing, processing, and the automatic retrieval of information.

True or False?

True
Examples of information technology careers are telecommunication and software deployment.

True or False?

True
VeriMed can be used to keep Alzheimer’s patients safe.

True or False?

True
The National Center for the Analysis of Violent Crime database enables detectives to analyze information about similarities between crimes.

True or False?

True
Data warehousing is the process of searching large datasets to find patterns.

True or False?

False