Spam
Unwanted or junk email

Prosthetic limbs
In medicine 3D printing allows more stylish and less expensive designs for _________

Affective Computing
Developing systems that can recognize and simulate human emotions

Skype
A popular Voice Over Internet Protocol (VoIP) service

Quick Response
QR Codes let any piece of print host a link to online information

Augmented Reality
Our normal sense of the world around us, enhanced with digital information

Cognitive Surplus
Results when leisure time & tools allows to engage in creative acts

Digital Divide
The gap between those who have easy access to the Internet & technology and those who don't is known as_______________.

Purpose, Mastery & Autonomy
Factors that lead to greater motivation

Crisis Mapping
_______________Tools gather information from sources such as emails text message and tweets & make the information instantly and publicly available for use in emergencies

Crowd Sourcing
Solicits online input from consumers

Social networking
Tools that enable groups of people to connect and exchange ideas

Computer Literate
Term used to describe someone who is familiar enough with computers to understand their capabilities and limitations

Software/Applications
Refers to instructions that tell the computer what to do

The Witness Project
Hopes to stop human rights abuse throughout the world

Next Einstein Initiative
Is rallying the support of the world to identify mathematical genius

Mastery
Defined as feeling excited and confident about learning new skills

One Trillion
The world's population combined has an estimated ____________hours a year of free time.

Collaborative Consumption
Sharing products rather than owning them individually is known as ____

Crowd Funding
Using the Internet to get small donations from many people to start a business

Information Technology
Field of study focused on the management, processing and automatic retrieval of information

Data Mining
The process of searching huge amounts of data seeking a pattern

Computer Forensics
Analyzing computer systems to gather potential legal evidence is _________

Examples of computer Literate
Use Web effectively; Avoid prey to hackers and viruses; Diagnose and fix hardware and software problems; protect identify theft; Avoid Spam

Autonomy
Working without continued direction and control

WE WILL WRITE A CUSTOM ESSAY SAMPLE ON
TECHNOLOGY IN ACTION CH. 1 SPECIFICALLY FOR YOU
FOR ONLY $13.90/PAGE