Deck 1: Using Technology to Change the World

ملء الشاشة (f)
exit full mode
سؤال
The term computer ________ is used to describe someone who is familiar enough with computers to understand their capabilities and limitations.

A) master
B) webmaster
C) literate
D) hawker
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which of the following software can best be used to help create digital art?

A) Microsoft PowerPoint
B) Microsoft Word
C) Adobe Acrobat
D) Corel Painter
سؤال
________ solicits online input from consumers.

A) A quick response code
B) Computer forensics
C) Crowdsourcing
D) Crowdfunding
سؤال
Which of the following is an example of the results of data mining?

A) An Excel spreadsheet listing all employees and their annual salaries in a random order
B) Netflix providing you with a list of videos you might enjoy
C) Raw data from questionnaires given at the mall
D) A printout of all sales taken from the register at the end of the day
سؤال
________ results when leisure time and tools allow us to engage in creative acts.

A) Crowdsourcing
B) Social networking
C) Cognitive surplus
D) Affective computing
سؤال
________ refers to the commands that instruct a computer what to do.

A) Software
B) Hardware
C) Spam
D) Data mining
سؤال
A popular Voice over Internet Protocol (VoIP) service is ________.

A) Tablet
B) Skype
C) Social Network
D) Mobile bridge
سؤال
________ tools enable groups of people to connect and exchange ideas.

A) Affective computing
B) Social networking
C) Debugging
D) Computer forensics
سؤال
All of the following are examples of being computer literate, EXCEPT ________.

A) knowing how to avoid hackers and viruses
B) knowing how to diagnose and fix hardware and software problems
C) knowing how to use the web efficiently
D) knowing only how to use your computer for e-mails
سؤال
________ tools gather information from sources such as e-mails, text messages, and tweets and make the information instantly and publicly available for use in emergencies.

A) Social networking
B) Crowdsourcing
C) Crisis-mapping
D) Affective computing
سؤال
The process of searching huge amounts of data seeking a pattern is called data ________.

A) data mining
B) searching
C) warehousing
D) diving
سؤال
QR stands for ________.

A) quick retention
B) quick response
C) quality response
D) quality retention
سؤال
Mastery is defined as ________.

A) combining leisure time with the tools to be creative
B) feeling confident and excited about learning new skills
C) working without continual direction and control
D) working for something larger
سؤال
All of the following factors lead to greater motivation EXCEPT ________.

A) consumption
B) purpose
C) autonomy
D) mastery
سؤال
The gap between those who have easy access to the Internet and technology those who do not is known as the ________ divide.

A) web
B) Internet
C) digital
D) technology
سؤال
Unwanted or junk e-mail is called ________.

A) spam
B) spyware
C) adware
D) malware
سؤال
________ is a field of study focused on handling and automatic retrieval of information.

A) Computer forensics
B) Crisis mapping
C) RFID
D) Information technology
سؤال
Sharing products rather than owning them individually is known as ________.

A) collaborative consumption
B) crowdfunding
C) crowdsourcing
D) social networking
سؤال
Autonomy is defined as ________.

A) working for something larger
B) feeling confident and excited about learning new skills
C) working without continual direction and control
D) repressing motivated behavior
سؤال
Using the Internet to get small donations from many people to start a business is called ________.

A) kickstarting
B) crowdfunding
C) crowdsourcing
D) collaborating
سؤال
The world's population combined has an estimated ________ hours a year of free time.
سؤال
New York City's program that fosters the sharing of bicycles is an example of ________.
سؤال
The goal of ________ research is to provide technological solutions to physical and health-related problems.

A) crisis-mapping
B) computer forensics
C) biomedical
D) RFID
سؤال
One potential application of ________ is to provide sight to the blind.

A) RFID tags
B) patient simulators
C) biomedical chip implants
D) Bluetooth technology
سؤال
________ is a popular service that allows free phone calls over the Internet.
سؤال
The gap in Internet and technical tools access around the world is known as the ________.
سؤال
Ushahidi is a ________ tool that makes information instantly available to anyone in the world.
سؤال
The ________ Initiative is rallying the support of the world to identify mathematical genius.
سؤال
The term ________ literate means being familiar enough with computers to understand their capabilities and limitations and knowing how to use them.
سؤال
________ asks for small donations from a large number of people.
سؤال
________ programs contain the instructions that tell a computer what to do.
سؤال
Affective computing ________.

A) performs calculations faster than humans
B) recognizes human fingerprints
C) speaks human language
D) recognizes and simulates human emotion
سؤال
Faculty at universities often use course management software such as ________ so that students can communicate outside of class and have easy access to class materials.

A) Blackboard
B) iCloud
C) LinkedIn
D) Whiteboard
سؤال
The ________ hopes to stop human rights abuses throughout the world.
سؤال
The ________ is an organization of musicians performing together from different locations all over the globe.
سؤال
Analyzing computer systems to gather potential legal evidence is computer ________.

A) detectives
B) forensics
C) analysis
D) enforcement
سؤال
A group of researchers at the MIT Media Lab have developed a system to help improve social skills for people who have ________.

A) paralysis
B) depression
C) autism
D) brain damage
سؤال
________ is our normal sense of the world around us enhanced with digital information.

A) Cognitive surplus
B) Web 2.0
C) Augmented reality
D) Affective computing
سؤال
________ is the use of apps to obtain opinions on products from other people.
سؤال
Scanning a product's ________ code with a smartphone can take you to a website, a video, or a Facebook page for more information about the product.
سؤال
Crowdfunding is asking for large donations from a few people.
سؤال
________ is a wearable tool consisting of a camera, a projector, and a glass prism that communicates with the Internet wirelessly through your smartphone.
سؤال
Using software such as Adobe Illustrator, Adobe Photoshop, and Corel Painter allows artists to create ________ art.
سؤال
Hardware refers to the programs that give instructions to the computer.
سؤال
Electronic junk mail is known as ________.
سؤال
Purpose is the simple understanding that you are working for something larger than yourself.
سؤال
________ applies computer systems and techniques to gather legal evidence.
سؤال
An investment analyst started a nonprofit technological tool for education called the ________.
سؤال
Using register terminals to determine consumer buying patterns is an example of ________.
سؤال
Autonomy is the feeling of confidence and excitement from seeing your own skills progress.
سؤال
A virus is electronic junk mail.
سؤال
The ________ is a collaboration of several museums that allows online visitors to explore over a thousand pieces of art.
سؤال
The AT&T mobile app that lets customers report locations where there are gaps in service is an example of crowdsourcing.
سؤال
You cannot be computer literate unless you have knowledge of higher-level computer skills, such as computer programming.
سؤال
Cognitive surplus is the combination of leisure time and creativity tools.
سؤال
________ can determine which products are selling on a given day and in a specific location.
سؤال
On a(n) ________ website, you can play a game called Moonbase Alpha that simulates life on a space settlement.
سؤال
Zipcar is an example of ownership.
سؤال
________ computing relates to recognizing and simulating human emotions.
سؤال
________ is a personal identification chip that is about the size of a grain of rice and implanted under the skin.
سؤال
Examples of information technology careers are telecommunication and software deployment.
سؤال
Information technology is the study of managing, processing, and the automatic retrieval of information.
سؤال
Affective computing is a field of study focused on the managing, processing, and automatic retrieval of information.
سؤال
Mastery of software programs, such as Adobe Illustrator and Corel Painter, is essential to creating digital art.
سؤال
VeriMed can be used to keep Alzheimer's patients safe.
سؤال
The National Center for the Analysis of Violent Crime database enables detectives to analyze information about similarities between crimes.
سؤال
Data warehousing is the process of searching large datasets to find patterns.
سؤال
Hospitals use nonimplant versions of identity chips on the wristbands of all patients.
سؤال
Computer forensics analyzes computer systems in gathering potential legal evidence.
سؤال
Match between columns
crisis-mapping tools
used by marketers to solicit online consumer input
crisis-mapping tools
solicits small donations from a large number of people
crisis-mapping tools
gap between those with access to technology and those without
crisis-mapping tools
facilitates exchange of ideas
crisis-mapping tools
collects electronic information and instantly makes the information publicly available
crowdsourcing
used by marketers to solicit online consumer input
crowdsourcing
solicits small donations from a large number of people
crowdsourcing
gap between those with access to technology and those without
crowdsourcing
facilitates exchange of ideas
crowdsourcing
collects electronic information and instantly makes the information publicly available
crowdfunding
used by marketers to solicit online consumer input
crowdfunding
solicits small donations from a large number of people
crowdfunding
gap between those with access to technology and those without
crowdfunding
facilitates exchange of ideas
crowdfunding
collects electronic information and instantly makes the information publicly available
social networking
used by marketers to solicit online consumer input
social networking
solicits small donations from a large number of people
social networking
gap between those with access to technology and those without
social networking
facilitates exchange of ideas
social networking
collects electronic information and instantly makes the information publicly available
digital divide
used by marketers to solicit online consumer input
digital divide
solicits small donations from a large number of people
digital divide
gap between those with access to technology and those without
digital divide
facilitates exchange of ideas
digital divide
collects electronic information and instantly makes the information publicly available
سؤال
Match between columns
collaborative consumption
using computer systems to gather legal evidence
collaborative consumption
understanding the capabilities and limitations of computers
collaborative consumption
hosts a link to online information and video content
collaborative consumption
computing that simulates emotion
collaborative consumption
sharing the services or a product rather than owning it outright
computer literacy
using computer systems to gather legal evidence
computer literacy
understanding the capabilities and limitations of computers
computer literacy
hosts a link to online information and video content
computer literacy
computing that simulates emotion
computer literacy
sharing the services or a product rather than owning it outright
affective computing
using computer systems to gather legal evidence
affective computing
understanding the capabilities and limitations of computers
affective computing
hosts a link to online information and video content
affective computing
computing that simulates emotion
affective computing
sharing the services or a product rather than owning it outright
computer forensics
using computer systems to gather legal evidence
computer forensics
understanding the capabilities and limitations of computers
computer forensics
hosts a link to online information and video content
computer forensics
computing that simulates emotion
computer forensics
sharing the services or a product rather than owning it outright
QR code
using computer systems to gather legal evidence
QR code
understanding the capabilities and limitations of computers
QR code
hosts a link to online information and video content
QR code
computing that simulates emotion
QR code
sharing the services or a product rather than owning it outright
سؤال
Match between columns
information technology
combination of our normal sense of the world and digital information
information technology
searching for patterns within large amounts of data
information technology
field of study focusing on the management, processing, and retrieval of information
information technology
electronic junk mail
information technology
combination of leisure time and the tools to be creative
augmented reality
combination of our normal sense of the world and digital information
augmented reality
searching for patterns within large amounts of data
augmented reality
field of study focusing on the management, processing, and retrieval of information
augmented reality
electronic junk mail
augmented reality
combination of leisure time and the tools to be creative
spam
combination of our normal sense of the world and digital information
spam
searching for patterns within large amounts of data
spam
field of study focusing on the management, processing, and retrieval of information
spam
electronic junk mail
spam
combination of leisure time and the tools to be creative
data mining
combination of our normal sense of the world and digital information
data mining
searching for patterns within large amounts of data
data mining
field of study focusing on the management, processing, and retrieval of information
data mining
electronic junk mail
data mining
combination of leisure time and the tools to be creative
cognitive surplus
combination of our normal sense of the world and digital information
cognitive surplus
searching for patterns within large amounts of data
cognitive surplus
field of study focusing on the management, processing, and retrieval of information
cognitive surplus
electronic junk mail
cognitive surplus
combination of leisure time and the tools to be creative
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/72
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 1: Using Technology to Change the World
1
The term computer ________ is used to describe someone who is familiar enough with computers to understand their capabilities and limitations.

A) master
B) webmaster
C) literate
D) hawker
C
2
Which of the following software can best be used to help create digital art?

A) Microsoft PowerPoint
B) Microsoft Word
C) Adobe Acrobat
D) Corel Painter
D
3
________ solicits online input from consumers.

A) A quick response code
B) Computer forensics
C) Crowdsourcing
D) Crowdfunding
C
4
Which of the following is an example of the results of data mining?

A) An Excel spreadsheet listing all employees and their annual salaries in a random order
B) Netflix providing you with a list of videos you might enjoy
C) Raw data from questionnaires given at the mall
D) A printout of all sales taken from the register at the end of the day
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
5
________ results when leisure time and tools allow us to engage in creative acts.

A) Crowdsourcing
B) Social networking
C) Cognitive surplus
D) Affective computing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
6
________ refers to the commands that instruct a computer what to do.

A) Software
B) Hardware
C) Spam
D) Data mining
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
7
A popular Voice over Internet Protocol (VoIP) service is ________.

A) Tablet
B) Skype
C) Social Network
D) Mobile bridge
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
8
________ tools enable groups of people to connect and exchange ideas.

A) Affective computing
B) Social networking
C) Debugging
D) Computer forensics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
9
All of the following are examples of being computer literate, EXCEPT ________.

A) knowing how to avoid hackers and viruses
B) knowing how to diagnose and fix hardware and software problems
C) knowing how to use the web efficiently
D) knowing only how to use your computer for e-mails
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
10
________ tools gather information from sources such as e-mails, text messages, and tweets and make the information instantly and publicly available for use in emergencies.

A) Social networking
B) Crowdsourcing
C) Crisis-mapping
D) Affective computing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
11
The process of searching huge amounts of data seeking a pattern is called data ________.

A) data mining
B) searching
C) warehousing
D) diving
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
12
QR stands for ________.

A) quick retention
B) quick response
C) quality response
D) quality retention
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
13
Mastery is defined as ________.

A) combining leisure time with the tools to be creative
B) feeling confident and excited about learning new skills
C) working without continual direction and control
D) working for something larger
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
14
All of the following factors lead to greater motivation EXCEPT ________.

A) consumption
B) purpose
C) autonomy
D) mastery
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
15
The gap between those who have easy access to the Internet and technology those who do not is known as the ________ divide.

A) web
B) Internet
C) digital
D) technology
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
16
Unwanted or junk e-mail is called ________.

A) spam
B) spyware
C) adware
D) malware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
17
________ is a field of study focused on handling and automatic retrieval of information.

A) Computer forensics
B) Crisis mapping
C) RFID
D) Information technology
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
18
Sharing products rather than owning them individually is known as ________.

A) collaborative consumption
B) crowdfunding
C) crowdsourcing
D) social networking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
19
Autonomy is defined as ________.

A) working for something larger
B) feeling confident and excited about learning new skills
C) working without continual direction and control
D) repressing motivated behavior
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
20
Using the Internet to get small donations from many people to start a business is called ________.

A) kickstarting
B) crowdfunding
C) crowdsourcing
D) collaborating
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
21
The world's population combined has an estimated ________ hours a year of free time.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
22
New York City's program that fosters the sharing of bicycles is an example of ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
23
The goal of ________ research is to provide technological solutions to physical and health-related problems.

A) crisis-mapping
B) computer forensics
C) biomedical
D) RFID
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
24
One potential application of ________ is to provide sight to the blind.

A) RFID tags
B) patient simulators
C) biomedical chip implants
D) Bluetooth technology
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
25
________ is a popular service that allows free phone calls over the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
26
The gap in Internet and technical tools access around the world is known as the ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
27
Ushahidi is a ________ tool that makes information instantly available to anyone in the world.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
28
The ________ Initiative is rallying the support of the world to identify mathematical genius.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
29
The term ________ literate means being familiar enough with computers to understand their capabilities and limitations and knowing how to use them.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
30
________ asks for small donations from a large number of people.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
31
________ programs contain the instructions that tell a computer what to do.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
32
Affective computing ________.

A) performs calculations faster than humans
B) recognizes human fingerprints
C) speaks human language
D) recognizes and simulates human emotion
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
33
Faculty at universities often use course management software such as ________ so that students can communicate outside of class and have easy access to class materials.

A) Blackboard
B) iCloud
C) LinkedIn
D) Whiteboard
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
34
The ________ hopes to stop human rights abuses throughout the world.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
35
The ________ is an organization of musicians performing together from different locations all over the globe.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
36
Analyzing computer systems to gather potential legal evidence is computer ________.

A) detectives
B) forensics
C) analysis
D) enforcement
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
37
A group of researchers at the MIT Media Lab have developed a system to help improve social skills for people who have ________.

A) paralysis
B) depression
C) autism
D) brain damage
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
38
________ is our normal sense of the world around us enhanced with digital information.

A) Cognitive surplus
B) Web 2.0
C) Augmented reality
D) Affective computing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
39
________ is the use of apps to obtain opinions on products from other people.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
40
Scanning a product's ________ code with a smartphone can take you to a website, a video, or a Facebook page for more information about the product.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
41
Crowdfunding is asking for large donations from a few people.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
42
________ is a wearable tool consisting of a camera, a projector, and a glass prism that communicates with the Internet wirelessly through your smartphone.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
43
Using software such as Adobe Illustrator, Adobe Photoshop, and Corel Painter allows artists to create ________ art.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
44
Hardware refers to the programs that give instructions to the computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
45
Electronic junk mail is known as ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
46
Purpose is the simple understanding that you are working for something larger than yourself.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
47
________ applies computer systems and techniques to gather legal evidence.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
48
An investment analyst started a nonprofit technological tool for education called the ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
49
Using register terminals to determine consumer buying patterns is an example of ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
50
Autonomy is the feeling of confidence and excitement from seeing your own skills progress.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
51
A virus is electronic junk mail.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
52
The ________ is a collaboration of several museums that allows online visitors to explore over a thousand pieces of art.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
53
The AT&T mobile app that lets customers report locations where there are gaps in service is an example of crowdsourcing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
54
You cannot be computer literate unless you have knowledge of higher-level computer skills, such as computer programming.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
55
Cognitive surplus is the combination of leisure time and creativity tools.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
56
________ can determine which products are selling on a given day and in a specific location.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
57
On a(n) ________ website, you can play a game called Moonbase Alpha that simulates life on a space settlement.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
58
Zipcar is an example of ownership.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
59
________ computing relates to recognizing and simulating human emotions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
60
________ is a personal identification chip that is about the size of a grain of rice and implanted under the skin.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
61
Examples of information technology careers are telecommunication and software deployment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
62
Information technology is the study of managing, processing, and the automatic retrieval of information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
63
Affective computing is a field of study focused on the managing, processing, and automatic retrieval of information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
64
Mastery of software programs, such as Adobe Illustrator and Corel Painter, is essential to creating digital art.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
65
VeriMed can be used to keep Alzheimer's patients safe.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
66
The National Center for the Analysis of Violent Crime database enables detectives to analyze information about similarities between crimes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
67
Data warehousing is the process of searching large datasets to find patterns.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
68
Hospitals use nonimplant versions of identity chips on the wristbands of all patients.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
69
Computer forensics analyzes computer systems in gathering potential legal evidence.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
70
Match between columns
crisis-mapping tools
used by marketers to solicit online consumer input
crisis-mapping tools
solicits small donations from a large number of people
crisis-mapping tools
gap between those with access to technology and those without
crisis-mapping tools
facilitates exchange of ideas
crisis-mapping tools
collects electronic information and instantly makes the information publicly available
crowdsourcing
used by marketers to solicit online consumer input
crowdsourcing
solicits small donations from a large number of people
crowdsourcing
gap between those with access to technology and those without
crowdsourcing
facilitates exchange of ideas
crowdsourcing
collects electronic information and instantly makes the information publicly available
crowdfunding
used by marketers to solicit online consumer input
crowdfunding
solicits small donations from a large number of people
crowdfunding
gap between those with access to technology and those without
crowdfunding
facilitates exchange of ideas
crowdfunding
collects electronic information and instantly makes the information publicly available
social networking
used by marketers to solicit online consumer input
social networking
solicits small donations from a large number of people
social networking
gap between those with access to technology and those without
social networking
facilitates exchange of ideas
social networking
collects electronic information and instantly makes the information publicly available
digital divide
used by marketers to solicit online consumer input
digital divide
solicits small donations from a large number of people
digital divide
gap between those with access to technology and those without
digital divide
facilitates exchange of ideas
digital divide
collects electronic information and instantly makes the information publicly available
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
71
Match between columns
collaborative consumption
using computer systems to gather legal evidence
collaborative consumption
understanding the capabilities and limitations of computers
collaborative consumption
hosts a link to online information and video content
collaborative consumption
computing that simulates emotion
collaborative consumption
sharing the services or a product rather than owning it outright
computer literacy
using computer systems to gather legal evidence
computer literacy
understanding the capabilities and limitations of computers
computer literacy
hosts a link to online information and video content
computer literacy
computing that simulates emotion
computer literacy
sharing the services or a product rather than owning it outright
affective computing
using computer systems to gather legal evidence
affective computing
understanding the capabilities and limitations of computers
affective computing
hosts a link to online information and video content
affective computing
computing that simulates emotion
affective computing
sharing the services or a product rather than owning it outright
computer forensics
using computer systems to gather legal evidence
computer forensics
understanding the capabilities and limitations of computers
computer forensics
hosts a link to online information and video content
computer forensics
computing that simulates emotion
computer forensics
sharing the services or a product rather than owning it outright
QR code
using computer systems to gather legal evidence
QR code
understanding the capabilities and limitations of computers
QR code
hosts a link to online information and video content
QR code
computing that simulates emotion
QR code
sharing the services or a product rather than owning it outright
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
72
Match between columns
information technology
combination of our normal sense of the world and digital information
information technology
searching for patterns within large amounts of data
information technology
field of study focusing on the management, processing, and retrieval of information
information technology
electronic junk mail
information technology
combination of leisure time and the tools to be creative
augmented reality
combination of our normal sense of the world and digital information
augmented reality
searching for patterns within large amounts of data
augmented reality
field of study focusing on the management, processing, and retrieval of information
augmented reality
electronic junk mail
augmented reality
combination of leisure time and the tools to be creative
spam
combination of our normal sense of the world and digital information
spam
searching for patterns within large amounts of data
spam
field of study focusing on the management, processing, and retrieval of information
spam
electronic junk mail
spam
combination of leisure time and the tools to be creative
data mining
combination of our normal sense of the world and digital information
data mining
searching for patterns within large amounts of data
data mining
field of study focusing on the management, processing, and retrieval of information
data mining
electronic junk mail
data mining
combination of leisure time and the tools to be creative
cognitive surplus
combination of our normal sense of the world and digital information
cognitive surplus
searching for patterns within large amounts of data
cognitive surplus
field of study focusing on the management, processing, and retrieval of information
cognitive surplus
electronic junk mail
cognitive surplus
combination of leisure time and the tools to be creative
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.