Deck 1: Using Technology to Change the World

Full screen (f)
exit full mode
Question
The term computer ________ is used to describe someone who is familiar enough with computers to understand their capabilities and limitations.

A) master
B) webmaster
C) literate
D) hawker
Use Space or
up arrow
down arrow
to flip the card.
Question
Which of the following software can best be used to help create digital art?

A) Microsoft PowerPoint
B) Microsoft Word
C) Adobe Acrobat
D) Corel Painter
Question
________ solicits online input from consumers.

A) A quick response code
B) Computer forensics
C) Crowdsourcing
D) Crowdfunding
Question
Which of the following is an example of the results of data mining?

A) An Excel spreadsheet listing all employees and their annual salaries in a random order
B) Netflix providing you with a list of videos you might enjoy
C) Raw data from questionnaires given at the mall
D) A printout of all sales taken from the register at the end of the day
Question
________ results when leisure time and tools allow us to engage in creative acts.

A) Crowdsourcing
B) Social networking
C) Cognitive surplus
D) Affective computing
Question
________ refers to the commands that instruct a computer what to do.

A) Software
B) Hardware
C) Spam
D) Data mining
Question
A popular Voice over Internet Protocol (VoIP) service is ________.

A) Tablet
B) Skype
C) Social Network
D) Mobile bridge
Question
________ tools enable groups of people to connect and exchange ideas.

A) Affective computing
B) Social networking
C) Debugging
D) Computer forensics
Question
All of the following are examples of being computer literate, EXCEPT ________.

A) knowing how to avoid hackers and viruses
B) knowing how to diagnose and fix hardware and software problems
C) knowing how to use the web efficiently
D) knowing only how to use your computer for e-mails
Question
________ tools gather information from sources such as e-mails, text messages, and tweets and make the information instantly and publicly available for use in emergencies.

A) Social networking
B) Crowdsourcing
C) Crisis-mapping
D) Affective computing
Question
The process of searching huge amounts of data seeking a pattern is called data ________.

A) data mining
B) searching
C) warehousing
D) diving
Question
QR stands for ________.

A) quick retention
B) quick response
C) quality response
D) quality retention
Question
Mastery is defined as ________.

A) combining leisure time with the tools to be creative
B) feeling confident and excited about learning new skills
C) working without continual direction and control
D) working for something larger
Question
All of the following factors lead to greater motivation EXCEPT ________.

A) consumption
B) purpose
C) autonomy
D) mastery
Question
The gap between those who have easy access to the Internet and technology those who do not is known as the ________ divide.

A) web
B) Internet
C) digital
D) technology
Question
Unwanted or junk e-mail is called ________.

A) spam
B) spyware
C) adware
D) malware
Question
________ is a field of study focused on handling and automatic retrieval of information.

A) Computer forensics
B) Crisis mapping
C) RFID
D) Information technology
Question
Sharing products rather than owning them individually is known as ________.

A) collaborative consumption
B) crowdfunding
C) crowdsourcing
D) social networking
Question
Autonomy is defined as ________.

A) working for something larger
B) feeling confident and excited about learning new skills
C) working without continual direction and control
D) repressing motivated behavior
Question
Using the Internet to get small donations from many people to start a business is called ________.

A) kickstarting
B) crowdfunding
C) crowdsourcing
D) collaborating
Question
The world's population combined has an estimated ________ hours a year of free time.
Question
New York City's program that fosters the sharing of bicycles is an example of ________.
Question
The goal of ________ research is to provide technological solutions to physical and health-related problems.

A) crisis-mapping
B) computer forensics
C) biomedical
D) RFID
Question
One potential application of ________ is to provide sight to the blind.

A) RFID tags
B) patient simulators
C) biomedical chip implants
D) Bluetooth technology
Question
________ is a popular service that allows free phone calls over the Internet.
Question
The gap in Internet and technical tools access around the world is known as the ________.
Question
Ushahidi is a ________ tool that makes information instantly available to anyone in the world.
Question
The ________ Initiative is rallying the support of the world to identify mathematical genius.
Question
The term ________ literate means being familiar enough with computers to understand their capabilities and limitations and knowing how to use them.
Question
________ asks for small donations from a large number of people.
Question
________ programs contain the instructions that tell a computer what to do.
Question
Affective computing ________.

A) performs calculations faster than humans
B) recognizes human fingerprints
C) speaks human language
D) recognizes and simulates human emotion
Question
Faculty at universities often use course management software such as ________ so that students can communicate outside of class and have easy access to class materials.

A) Blackboard
B) iCloud
C) LinkedIn
D) Whiteboard
Question
The ________ hopes to stop human rights abuses throughout the world.
Question
The ________ is an organization of musicians performing together from different locations all over the globe.
Question
Analyzing computer systems to gather potential legal evidence is computer ________.

A) detectives
B) forensics
C) analysis
D) enforcement
Question
A group of researchers at the MIT Media Lab have developed a system to help improve social skills for people who have ________.

A) paralysis
B) depression
C) autism
D) brain damage
Question
________ is our normal sense of the world around us enhanced with digital information.

A) Cognitive surplus
B) Web 2.0
C) Augmented reality
D) Affective computing
Question
________ is the use of apps to obtain opinions on products from other people.
Question
Scanning a product's ________ code with a smartphone can take you to a website, a video, or a Facebook page for more information about the product.
Question
Crowdfunding is asking for large donations from a few people.
Question
________ is a wearable tool consisting of a camera, a projector, and a glass prism that communicates with the Internet wirelessly through your smartphone.
Question
Using software such as Adobe Illustrator, Adobe Photoshop, and Corel Painter allows artists to create ________ art.
Question
Hardware refers to the programs that give instructions to the computer.
Question
Electronic junk mail is known as ________.
Question
Purpose is the simple understanding that you are working for something larger than yourself.
Question
________ applies computer systems and techniques to gather legal evidence.
Question
An investment analyst started a nonprofit technological tool for education called the ________.
Question
Using register terminals to determine consumer buying patterns is an example of ________.
Question
Autonomy is the feeling of confidence and excitement from seeing your own skills progress.
Question
A virus is electronic junk mail.
Question
The ________ is a collaboration of several museums that allows online visitors to explore over a thousand pieces of art.
Question
The AT&T mobile app that lets customers report locations where there are gaps in service is an example of crowdsourcing.
Question
You cannot be computer literate unless you have knowledge of higher-level computer skills, such as computer programming.
Question
Cognitive surplus is the combination of leisure time and creativity tools.
Question
________ can determine which products are selling on a given day and in a specific location.
Question
On a(n) ________ website, you can play a game called Moonbase Alpha that simulates life on a space settlement.
Question
Zipcar is an example of ownership.
Question
________ computing relates to recognizing and simulating human emotions.
Question
________ is a personal identification chip that is about the size of a grain of rice and implanted under the skin.
Question
Examples of information technology careers are telecommunication and software deployment.
Question
Information technology is the study of managing, processing, and the automatic retrieval of information.
Question
Affective computing is a field of study focused on the managing, processing, and automatic retrieval of information.
Question
Mastery of software programs, such as Adobe Illustrator and Corel Painter, is essential to creating digital art.
Question
VeriMed can be used to keep Alzheimer's patients safe.
Question
The National Center for the Analysis of Violent Crime database enables detectives to analyze information about similarities between crimes.
Question
Data warehousing is the process of searching large datasets to find patterns.
Question
Hospitals use nonimplant versions of identity chips on the wristbands of all patients.
Question
Computer forensics analyzes computer systems in gathering potential legal evidence.
Question
Match between columns
crisis-mapping tools
used by marketers to solicit online consumer input
crisis-mapping tools
solicits small donations from a large number of people
crisis-mapping tools
gap between those with access to technology and those without
crisis-mapping tools
facilitates exchange of ideas
crisis-mapping tools
collects electronic information and instantly makes the information publicly available
crowdsourcing
used by marketers to solicit online consumer input
crowdsourcing
solicits small donations from a large number of people
crowdsourcing
gap between those with access to technology and those without
crowdsourcing
facilitates exchange of ideas
crowdsourcing
collects electronic information and instantly makes the information publicly available
crowdfunding
used by marketers to solicit online consumer input
crowdfunding
solicits small donations from a large number of people
crowdfunding
gap between those with access to technology and those without
crowdfunding
facilitates exchange of ideas
crowdfunding
collects electronic information and instantly makes the information publicly available
social networking
used by marketers to solicit online consumer input
social networking
solicits small donations from a large number of people
social networking
gap between those with access to technology and those without
social networking
facilitates exchange of ideas
social networking
collects electronic information and instantly makes the information publicly available
digital divide
used by marketers to solicit online consumer input
digital divide
solicits small donations from a large number of people
digital divide
gap between those with access to technology and those without
digital divide
facilitates exchange of ideas
digital divide
collects electronic information and instantly makes the information publicly available
Question
Match between columns
collaborative consumption
using computer systems to gather legal evidence
collaborative consumption
understanding the capabilities and limitations of computers
collaborative consumption
hosts a link to online information and video content
collaborative consumption
computing that simulates emotion
collaborative consumption
sharing the services or a product rather than owning it outright
computer literacy
using computer systems to gather legal evidence
computer literacy
understanding the capabilities and limitations of computers
computer literacy
hosts a link to online information and video content
computer literacy
computing that simulates emotion
computer literacy
sharing the services or a product rather than owning it outright
affective computing
using computer systems to gather legal evidence
affective computing
understanding the capabilities and limitations of computers
affective computing
hosts a link to online information and video content
affective computing
computing that simulates emotion
affective computing
sharing the services or a product rather than owning it outright
computer forensics
using computer systems to gather legal evidence
computer forensics
understanding the capabilities and limitations of computers
computer forensics
hosts a link to online information and video content
computer forensics
computing that simulates emotion
computer forensics
sharing the services or a product rather than owning it outright
QR code
using computer systems to gather legal evidence
QR code
understanding the capabilities and limitations of computers
QR code
hosts a link to online information and video content
QR code
computing that simulates emotion
QR code
sharing the services or a product rather than owning it outright
Question
Match between columns
information technology
combination of our normal sense of the world and digital information
information technology
searching for patterns within large amounts of data
information technology
field of study focusing on the management, processing, and retrieval of information
information technology
electronic junk mail
information technology
combination of leisure time and the tools to be creative
augmented reality
combination of our normal sense of the world and digital information
augmented reality
searching for patterns within large amounts of data
augmented reality
field of study focusing on the management, processing, and retrieval of information
augmented reality
electronic junk mail
augmented reality
combination of leisure time and the tools to be creative
spam
combination of our normal sense of the world and digital information
spam
searching for patterns within large amounts of data
spam
field of study focusing on the management, processing, and retrieval of information
spam
electronic junk mail
spam
combination of leisure time and the tools to be creative
data mining
combination of our normal sense of the world and digital information
data mining
searching for patterns within large amounts of data
data mining
field of study focusing on the management, processing, and retrieval of information
data mining
electronic junk mail
data mining
combination of leisure time and the tools to be creative
cognitive surplus
combination of our normal sense of the world and digital information
cognitive surplus
searching for patterns within large amounts of data
cognitive surplus
field of study focusing on the management, processing, and retrieval of information
cognitive surplus
electronic junk mail
cognitive surplus
combination of leisure time and the tools to be creative
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/72
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 1: Using Technology to Change the World
1
The term computer ________ is used to describe someone who is familiar enough with computers to understand their capabilities and limitations.

A) master
B) webmaster
C) literate
D) hawker
C
2
Which of the following software can best be used to help create digital art?

A) Microsoft PowerPoint
B) Microsoft Word
C) Adobe Acrobat
D) Corel Painter
D
3
________ solicits online input from consumers.

A) A quick response code
B) Computer forensics
C) Crowdsourcing
D) Crowdfunding
C
4
Which of the following is an example of the results of data mining?

A) An Excel spreadsheet listing all employees and their annual salaries in a random order
B) Netflix providing you with a list of videos you might enjoy
C) Raw data from questionnaires given at the mall
D) A printout of all sales taken from the register at the end of the day
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
5
________ results when leisure time and tools allow us to engage in creative acts.

A) Crowdsourcing
B) Social networking
C) Cognitive surplus
D) Affective computing
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
6
________ refers to the commands that instruct a computer what to do.

A) Software
B) Hardware
C) Spam
D) Data mining
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
7
A popular Voice over Internet Protocol (VoIP) service is ________.

A) Tablet
B) Skype
C) Social Network
D) Mobile bridge
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
8
________ tools enable groups of people to connect and exchange ideas.

A) Affective computing
B) Social networking
C) Debugging
D) Computer forensics
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
9
All of the following are examples of being computer literate, EXCEPT ________.

A) knowing how to avoid hackers and viruses
B) knowing how to diagnose and fix hardware and software problems
C) knowing how to use the web efficiently
D) knowing only how to use your computer for e-mails
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
10
________ tools gather information from sources such as e-mails, text messages, and tweets and make the information instantly and publicly available for use in emergencies.

A) Social networking
B) Crowdsourcing
C) Crisis-mapping
D) Affective computing
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
11
The process of searching huge amounts of data seeking a pattern is called data ________.

A) data mining
B) searching
C) warehousing
D) diving
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
12
QR stands for ________.

A) quick retention
B) quick response
C) quality response
D) quality retention
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
13
Mastery is defined as ________.

A) combining leisure time with the tools to be creative
B) feeling confident and excited about learning new skills
C) working without continual direction and control
D) working for something larger
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
14
All of the following factors lead to greater motivation EXCEPT ________.

A) consumption
B) purpose
C) autonomy
D) mastery
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
15
The gap between those who have easy access to the Internet and technology those who do not is known as the ________ divide.

A) web
B) Internet
C) digital
D) technology
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
16
Unwanted or junk e-mail is called ________.

A) spam
B) spyware
C) adware
D) malware
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
17
________ is a field of study focused on handling and automatic retrieval of information.

A) Computer forensics
B) Crisis mapping
C) RFID
D) Information technology
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
18
Sharing products rather than owning them individually is known as ________.

A) collaborative consumption
B) crowdfunding
C) crowdsourcing
D) social networking
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
19
Autonomy is defined as ________.

A) working for something larger
B) feeling confident and excited about learning new skills
C) working without continual direction and control
D) repressing motivated behavior
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
20
Using the Internet to get small donations from many people to start a business is called ________.

A) kickstarting
B) crowdfunding
C) crowdsourcing
D) collaborating
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
21
The world's population combined has an estimated ________ hours a year of free time.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
22
New York City's program that fosters the sharing of bicycles is an example of ________.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
23
The goal of ________ research is to provide technological solutions to physical and health-related problems.

A) crisis-mapping
B) computer forensics
C) biomedical
D) RFID
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
24
One potential application of ________ is to provide sight to the blind.

A) RFID tags
B) patient simulators
C) biomedical chip implants
D) Bluetooth technology
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
25
________ is a popular service that allows free phone calls over the Internet.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
26
The gap in Internet and technical tools access around the world is known as the ________.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
27
Ushahidi is a ________ tool that makes information instantly available to anyone in the world.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
28
The ________ Initiative is rallying the support of the world to identify mathematical genius.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
29
The term ________ literate means being familiar enough with computers to understand their capabilities and limitations and knowing how to use them.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
30
________ asks for small donations from a large number of people.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
31
________ programs contain the instructions that tell a computer what to do.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
32
Affective computing ________.

A) performs calculations faster than humans
B) recognizes human fingerprints
C) speaks human language
D) recognizes and simulates human emotion
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
33
Faculty at universities often use course management software such as ________ so that students can communicate outside of class and have easy access to class materials.

A) Blackboard
B) iCloud
C) LinkedIn
D) Whiteboard
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
34
The ________ hopes to stop human rights abuses throughout the world.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
35
The ________ is an organization of musicians performing together from different locations all over the globe.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
36
Analyzing computer systems to gather potential legal evidence is computer ________.

A) detectives
B) forensics
C) analysis
D) enforcement
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
37
A group of researchers at the MIT Media Lab have developed a system to help improve social skills for people who have ________.

A) paralysis
B) depression
C) autism
D) brain damage
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
38
________ is our normal sense of the world around us enhanced with digital information.

A) Cognitive surplus
B) Web 2.0
C) Augmented reality
D) Affective computing
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
39
________ is the use of apps to obtain opinions on products from other people.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
40
Scanning a product's ________ code with a smartphone can take you to a website, a video, or a Facebook page for more information about the product.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
41
Crowdfunding is asking for large donations from a few people.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
42
________ is a wearable tool consisting of a camera, a projector, and a glass prism that communicates with the Internet wirelessly through your smartphone.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
43
Using software such as Adobe Illustrator, Adobe Photoshop, and Corel Painter allows artists to create ________ art.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
44
Hardware refers to the programs that give instructions to the computer.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
45
Electronic junk mail is known as ________.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
46
Purpose is the simple understanding that you are working for something larger than yourself.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
47
________ applies computer systems and techniques to gather legal evidence.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
48
An investment analyst started a nonprofit technological tool for education called the ________.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
49
Using register terminals to determine consumer buying patterns is an example of ________.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
50
Autonomy is the feeling of confidence and excitement from seeing your own skills progress.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
51
A virus is electronic junk mail.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
52
The ________ is a collaboration of several museums that allows online visitors to explore over a thousand pieces of art.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
53
The AT&T mobile app that lets customers report locations where there are gaps in service is an example of crowdsourcing.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
54
You cannot be computer literate unless you have knowledge of higher-level computer skills, such as computer programming.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
55
Cognitive surplus is the combination of leisure time and creativity tools.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
56
________ can determine which products are selling on a given day and in a specific location.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
57
On a(n) ________ website, you can play a game called Moonbase Alpha that simulates life on a space settlement.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
58
Zipcar is an example of ownership.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
59
________ computing relates to recognizing and simulating human emotions.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
60
________ is a personal identification chip that is about the size of a grain of rice and implanted under the skin.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
61
Examples of information technology careers are telecommunication and software deployment.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
62
Information technology is the study of managing, processing, and the automatic retrieval of information.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
63
Affective computing is a field of study focused on the managing, processing, and automatic retrieval of information.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
64
Mastery of software programs, such as Adobe Illustrator and Corel Painter, is essential to creating digital art.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
65
VeriMed can be used to keep Alzheimer's patients safe.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
66
The National Center for the Analysis of Violent Crime database enables detectives to analyze information about similarities between crimes.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
67
Data warehousing is the process of searching large datasets to find patterns.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
68
Hospitals use nonimplant versions of identity chips on the wristbands of all patients.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
69
Computer forensics analyzes computer systems in gathering potential legal evidence.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
70
Match between columns
crisis-mapping tools
used by marketers to solicit online consumer input
crisis-mapping tools
solicits small donations from a large number of people
crisis-mapping tools
gap between those with access to technology and those without
crisis-mapping tools
facilitates exchange of ideas
crisis-mapping tools
collects electronic information and instantly makes the information publicly available
crowdsourcing
used by marketers to solicit online consumer input
crowdsourcing
solicits small donations from a large number of people
crowdsourcing
gap between those with access to technology and those without
crowdsourcing
facilitates exchange of ideas
crowdsourcing
collects electronic information and instantly makes the information publicly available
crowdfunding
used by marketers to solicit online consumer input
crowdfunding
solicits small donations from a large number of people
crowdfunding
gap between those with access to technology and those without
crowdfunding
facilitates exchange of ideas
crowdfunding
collects electronic information and instantly makes the information publicly available
social networking
used by marketers to solicit online consumer input
social networking
solicits small donations from a large number of people
social networking
gap between those with access to technology and those without
social networking
facilitates exchange of ideas
social networking
collects electronic information and instantly makes the information publicly available
digital divide
used by marketers to solicit online consumer input
digital divide
solicits small donations from a large number of people
digital divide
gap between those with access to technology and those without
digital divide
facilitates exchange of ideas
digital divide
collects electronic information and instantly makes the information publicly available
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
71
Match between columns
collaborative consumption
using computer systems to gather legal evidence
collaborative consumption
understanding the capabilities and limitations of computers
collaborative consumption
hosts a link to online information and video content
collaborative consumption
computing that simulates emotion
collaborative consumption
sharing the services or a product rather than owning it outright
computer literacy
using computer systems to gather legal evidence
computer literacy
understanding the capabilities and limitations of computers
computer literacy
hosts a link to online information and video content
computer literacy
computing that simulates emotion
computer literacy
sharing the services or a product rather than owning it outright
affective computing
using computer systems to gather legal evidence
affective computing
understanding the capabilities and limitations of computers
affective computing
hosts a link to online information and video content
affective computing
computing that simulates emotion
affective computing
sharing the services or a product rather than owning it outright
computer forensics
using computer systems to gather legal evidence
computer forensics
understanding the capabilities and limitations of computers
computer forensics
hosts a link to online information and video content
computer forensics
computing that simulates emotion
computer forensics
sharing the services or a product rather than owning it outright
QR code
using computer systems to gather legal evidence
QR code
understanding the capabilities and limitations of computers
QR code
hosts a link to online information and video content
QR code
computing that simulates emotion
QR code
sharing the services or a product rather than owning it outright
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
72
Match between columns
information technology
combination of our normal sense of the world and digital information
information technology
searching for patterns within large amounts of data
information technology
field of study focusing on the management, processing, and retrieval of information
information technology
electronic junk mail
information technology
combination of leisure time and the tools to be creative
augmented reality
combination of our normal sense of the world and digital information
augmented reality
searching for patterns within large amounts of data
augmented reality
field of study focusing on the management, processing, and retrieval of information
augmented reality
electronic junk mail
augmented reality
combination of leisure time and the tools to be creative
spam
combination of our normal sense of the world and digital information
spam
searching for patterns within large amounts of data
spam
field of study focusing on the management, processing, and retrieval of information
spam
electronic junk mail
spam
combination of leisure time and the tools to be creative
data mining
combination of our normal sense of the world and digital information
data mining
searching for patterns within large amounts of data
data mining
field of study focusing on the management, processing, and retrieval of information
data mining
electronic junk mail
data mining
combination of leisure time and the tools to be creative
cognitive surplus
combination of our normal sense of the world and digital information
cognitive surplus
searching for patterns within large amounts of data
cognitive surplus
field of study focusing on the management, processing, and retrieval of information
cognitive surplus
electronic junk mail
cognitive surplus
combination of leisure time and the tools to be creative
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 72 flashcards in this deck.