Tech In Action Chapter 1

Mastery is defined as ________
feeling confident and excited about…
Which of the following examples is the result of mining raw data to produce useful information?
Netflix providing you with a list of….
________ tools enable groups of people to connect and exchange ideas.
Social media
Analyzing computer systems to gather potential legal evidence is computer _______
forensics
_______ results when leisure time and available tools allow us to engage in creative acts
cognitive surplus
All of the following are examples of being computer literate, EXCEPT _________
knowing only how to use your computer for e-mails
In medicine, 3D printing allows more stylish and less expensive designs for _________
prosthetic limbs
Unwanted or junk e-mail is called __________
spam
The term computer _____ is used to describe someone who is familiar enough with computers to understand their capabilities and limitations.
literate
Sharing products rather than owning them individually is known as ________
collaborative consumption
______ solicits online input from consumers.
crowdsourcing
Faculty at universities often use course management software such as ________ so that students can communicate outside of class and have easy access to class materials.
Blackboard
Using the Internet to get small donations from many people to start a business is called ______
crowdfunding
A popular Voice over Internet Protocol (VoIP) service is _____
Skype
Autonomy is defined as _______
working without continual direction and control
The goal of ________ technology research is to provide solutions to physical and health-related problems
biomedical
________ is our normal sense of the world around us enhanced with digital information
augmented reality
________ is a field of study focused on the management, processing and automatic retrieval of information.
Information technology
_______ tools gather information from sources such as e-mails, texts, and tweets and make the info instantly and publicly available for use in emergencies.
crisis-maping
________ provides the instructions that tell a computer what to do.
software
computer forensics
using computer systems to gather legal evidence
computer literacy
understanding the capabilities and limitations of computers
QR code
hosts a link to online info and video content
affective computing
computing that simulates emotion
collaborative consumption
sharing the services or product rather than owning it outright
Social media _______
is incorporated as part of a political strategy by many politicians
Being computer literate includes……
all of the above
Web 2.0 has led to a shift from consuming content toward
producing content
Computer forensics
analyzes computer systems to gather potential legal evidence
The sound byte uses the term all-in-one…
desktop
What is NOT an important factor regarding online support when deciding between a brand name and no name computer?
Is it available in your area?
What would be the best choice if you want a computer that can easily be expanded?
desktop
Which of the following is typically true of brand name computer manufacturers?
They usually offer better support.
Which of the following statements is True about refurbished computers?
They usually come with support or a warranty
Having WiFi as well as cellular connectivity is a consideration when purchasing a(n) ________ computer.
tablet