_______ tools gather information from sources such as e-mails, text messages, and tweets and make the information instantly and publicly available for use in emergencies.

a) Affective Computing
b) Crowdsourcing
c) Social Networking
d) Crisis-mapping

Crisis-mapping

_______ tools enable groups of people to connect and exchange ideas.

a) Affective Computing
b) Debugging
c) Social Networking
d) Computer Forensics

Social networking

The gap between those who have easy access to the internet and the technology and those who do not is known as the _______ divide.

a) digital
b) web
c) internet
d) technology

digital

All of the following factors lead to greater motivation EXCEPT _______.

a) purpose
b) autonomy
c) mastery
d) condumption

consumption

_______ results when leisure time + tools allow us to engage in creative acts.

a) Cognitive Surplus
b) Crowdsourcing
c) Affective computing
d) Social networking

Cognitive Surplus

Mastery is defined as _______.

a) feeling confident and excited about learning new skills.
b) combining leisure time with the tools to be creative.
c) working for something larger.
d) working without continual direction and control.

Feeling confident and excited about learning new skills

Autonomy is defined as _______.

a) feeling confident and excited about learning new skills
b) repressing motivated behaviour
c) working without continual direction and control
d) working for something larger

working without continual direction and control

Using the internet to get small donations from many people to start a business is called _______.

a) collaborating
b) crowdsourcing
c) kickstarting
d) crowdfunding

crowdfunding

QR stands for _______.

a) quick response
b) quick retention
c) quality retention
d) quality response

quick response

_______ solicits online input from consumers.

a) A quick response code
b) Crowdfunding
c) Computer forensics
d) Crowdsourcing

Crowdsourcing

Sharing products rather than owning them individually is known as _______.

a) crowdsourcing
b) collaborative consumption
c) crowdfunding
d) social networking

collaborative consumption

A popular Voice over Internet Protocol (VoIP) service is _______.

a) Mobile bridge
b) Tablet
c) Skype
d) Social Network

Skype

The term computer _______ is used to describe someone who is familiar enough with the computers to understand their capabilities and limitations.

a) literate
b) webmaster
c) hawker
d) master

literate

_______ refers to the commands that instruct a computer what to do.

a) Hardware
b) Spam
c) Software
d) Data mining

Software

Unwanted or junk e-mail is called _______.

a) spam
b) adware
c) spyware
d) malware

spam

All of the following are examples of being computer literate, EXCEPT _______.

a) knowing how to use the web efficiently
b) knowing how to diagnose and fix hardware and software problems
c) knowing only how to use your computer for e-mails
d) knowing how to avoid hackers and viruses.

knowing only how to use your computer for e-mails

_______ is a field of study focused on handling and automatic retrieval of information.

a) RFID
b) Crisis mapping
c) Information technology
d) Computer forensics

Information technology

The process of searching huge amounts of data seeking a pattern is called data _______.

a) mining
b) searching
c) warehousing
d) diving

mining

Which of the following is an example of the results of data mining?

a) An Excel spreadsheet listing all employees and their annual salaries in a random order
b) A printout of all sales taken from the register at the end of the day
c) Raw data from questionnaires given at the mall
d) Netflix providing you with a list of movies you might enjoy

Netflix providing you with a list of movies you might enjoy

Which of the following software can best be used to help create digital art?

a) Microsoft PowerPoint
b) Adobe Acrobat
c) Microsoft Word
d) Corel Painter

Corel Painter

Faculty at universities often use course management software such as _______ so that students can communicate outside of class and have easy access to class materials.

a) LinkedIn
b) Blackboard
c) iCloud
d) Whiteboard

Blackboard

The goal of _______ research is to provide technological solutions to physical and health-related problems.

a) biomedical
b) RFID
c) crisis-mapping
d) computer forensics

biomedical

One potential application of _______ is to provide sight to the blind.

a) biomedical chip implants
b) Bluetooth technology
c) patient simulators
d) RFID tags

biomedical chip implants

A group of researchers at the MIT Media Lab have developed a system to help improve social skills for people who have _______.

a) depression
b) paralysis
c) brain damage
d) autism

autism

Analyzing computer systems to gather potential legal evidence is computer _______.

a) detectives
b) forensics
c) analysis
d) enforcement

forensics

_______ is our normal sense of the world around us with digital information.

a) Affective computing
b) Web 2.0
c) Cognitive surplus
d) Augmented reality

Augmented reality

Affective computing _______.

a) performs calculations faster than humans
b) speaks human language
c) recognizes human fingerprints
d) recognizes and simulates human emotion

recognizes and simulates human emotion.

Autonomy is the feeling of confidence and excitement from seeing your own skills progress

True or False?

False

Purpose is the simple understanding that you are working for something larger than yourself

True or False?

True

Cognitive surplus is the combination of leisure time and creativity tools.

True or False?

True

Zipcar is an example of ownership

True or False?

Flase

Crowdfunding is asking for large donations from a few people

True or False?

False

The AT&T mobile app that lets customers report locations where there are gaps in service is an example of crowdsourcing

True or False?

True

A virus is electronic junk mail

True or False?

False

You cannot be computer literate unless you have knowledge of higher-level computer skills, such as computer programming.

True or False?

False

Hardware refers to the program that give instructions to the computer.

True or False?

False

Computer forensics analyzes computer systems in gathering potential legal evidence.

True or False?

True

Hospitals use nonimplant versions of identity chips on the wristbands of all patients.

True or False?

False

Affective computing is a field of study focused on the managing, processing, and automatic retrieval of information

True or False?

False

Mastery of software programs, such as Adobe Illustrator and Corel Painter, is essential to creating digital art.

True or False?

True

Information technology is the study of managing, processing, and the automatic retrieval of information.

True or False?

True

Examples of information technology careers are telecommunication and software deployment.

True or False?

True

VeriMed can be used to keep Alzheimer's patients safe.

True or False?

True

The National Center for the Analysis of Violent Crime database enables detectives to analyze information about similarities between crimes.

True or False?

True

Data warehousing is the process of searching large datasets to find patterns.

True or False?

False

WE WILL WRITE A CUSTOM ESSAY SAMPLE ON
TECHNOLOGY IN ACTION – CHAPTER 1 SPECIFICALLY FOR YOU
FOR ONLY $13.90/PAGE