Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Succeeding with Technology
Quiz 1: Why Study Computers and Digital Technologies
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Question 81
Multiple Choice
Today, according to popular media usage, a(n) ____ is an individual who subverts computer security without authorization.
Question 82
Multiple Choice
____ computing implies that computing and information technologies are diffused throughout every part of the environment.
Question 83
Multiple Choice
Ubiquitous computing suggests that technology is becoming so much a part of the environment that people ____.
Question 84
Multiple Choice
The ____ divide is a title used for the social and economic gap between those who have access to computers and information technologies and those who do not.
Question 85
Multiple Choice
Much of the information about you is collected and stored without your knowledge. This ____ information gathering makes some people nervous and concerned about their rights to privacy.
Question 86
Multiple Choice
Viruses can turn your computer into a "____" computer that spreads viruses, spyware, and spam to others over the Internet without you suspecting a thing.
Question 87
Multiple Choice
PIM software provides users with the ability to keep a(n) ____ handy on their PDA.
Question 88
Multiple Choice
____ instruction can deliver course content and measure student performance.
Question 89
Multiple Choice
____ learning is used to deliver courses and instruction to and from remote locations; instructors and students can be located around the world.
Question 90
Multiple Choice
Instead of a polygraph, computers can be used to "read" a voice, to detect the stress produced by lying, and to produce a ____.
Question 91
Multiple Choice
Computers can be used to capture facial ____ (systems of blood vessels) , which, like fingerprints, are unique in each individual, and can be read using an infrared camera, a computer, and a database.