Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Using Information Technology Study Set 1
Quiz 9: The Challenges of the Digital Age: Society and Information Technology Today
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 41
True/False
In morphing,a film or video image is displayed on a computer screen and altered pixel by pixel.
Question 42
Short Answer
A software bug is a(n)________ in a program that causes it to malfunction.
Question 43
True/False
The Internet is increasingly coming under commercial control.
Question 44
True/False
Currently,technology does not produce widely shared economic gains but instead widens the gap between those who have the right skills and those who don't.
Question 45
Short Answer
Intentionally crashing an entire computer system is a crime of _________.
Question 46
True/False
Algorithms have been devised to detect changes in uncompressed photo files.
Question 47
True/False
Medical school researchers have showed that areas of the brain responsible for generating feelings of addiction and reward are activated during video game play.
Question 48
Short Answer
In the ________ scam,victims are given a chance to receive nonexistent government money as long as they pay a fee to help transfer the money to an overseas account.
Question 49
Short Answer
Errors and accidents in computer systems may be classified as human errors,procedural errors,software errors,"dirty data" problems,________ problems,and natural hazards.
Question 50
Short Answer
Nondelivery of merchandise ordered online,Internet auction misrepresentations,and unauthorized credit / debit card use for online purchases all represent ________.
Question 51
True/False
The contribution of technological advances to social progress is steady and positive.
Question 52
Short Answer
A computer _______ can be an illegal act perpetrated against computers or telecommunications systems or the use of computers or telecommunications systems to commit illegal acts.
Question 53
Short Answer
"Dirty data" problems are usually caused by ________ workers.
Question 54
Short Answer
Hurricane Katrina is an example of a ________ that can be harmful to computers and communications systems.
Question 55
Short Answer
When malicious software is implanted in your computer that redirects your computer to an impostor web page,it is called ________.
Question 56
Short Answer
An error in a software program that causes it to not work properly is known as a ________.
Question 57
True/False
Misuse of technology,fussing with computers,and information overload are three workplace impediments to productivity.
Question 58
True/False
Improvements in technology are beneficial to all in the short run.
Question 59
Short Answer
A system of safeguards for protecting informational technology against disasters,systems failure,and unauthorized access that can result in damage or loss is known as ________.