Technology in Action Ch. 1

Spam
Unwanted or junk email
Prosthetic limbs
In medicine 3D printing allows more stylish and less expensive designs for _________
Affective Computing
Developing systems that can recognize and simulate human emotions
Skype
A popular Voice Over Internet Protocol (VoIP) service
Quick Response
QR Codes let any piece of print host a link to online information
Augmented Reality
Our normal sense of the world around us, enhanced with digital information
Cognitive Surplus
Results when leisure time & tools allows to engage in creative acts
Digital Divide
The gap between those who have easy access to the Internet & technology and those who don’t is known as_______________.
Purpose, Mastery & Autonomy
Factors that lead to greater motivation
Crisis Mapping
_______________Tools gather information from sources such as emails text message and tweets & make the information instantly and publicly available for use in emergencies
Crowd Sourcing
Solicits online input from consumers
Social networking
Tools that enable groups of people to connect and exchange ideas
Computer Literate
Term used to describe someone who is familiar enough with computers to understand their capabilities and limitations
Software/Applications
Refers to instructions that tell the computer what to do
The Witness Project
Hopes to stop human rights abuse throughout the world
Next Einstein Initiative
Is rallying the support of the world to identify mathematical genius
Mastery
Defined as feeling excited and confident about learning new skills
One Trillion
The world’s population combined has an estimated ____________hours a year of free time.
Collaborative Consumption
Sharing products rather than owning them individually is known as ____
Crowd Funding
Using the Internet to get small donations from many people to start a business
Information Technology
Field of study focused on the management, processing and automatic retrieval of information
Data Mining
The process of searching huge amounts of data seeking a pattern
Computer Forensics
Analyzing computer systems to gather potential legal evidence is _________
Examples of computer Literate
Use Web effectively; Avoid prey to hackers and viruses; Diagnose and fix hardware and software problems; protect identify theft; Avoid Spam
Autonomy
Working without continued direction and control