Deck 1: Using Technology to Change the World
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Question
Match between columns
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/72
Play
Full screen (f)
Deck 1: Using Technology to Change the World
1
The term computer ________ is used to describe someone who is familiar enough with computers to understand their capabilities and limitations.
A) master
B) webmaster
C) literate
D) hawker
A) master
B) webmaster
C) literate
D) hawker
C
2
Which of the following software can best be used to help create digital art?
A) Microsoft PowerPoint
B) Microsoft Word
C) Adobe Acrobat
D) Corel Painter
A) Microsoft PowerPoint
B) Microsoft Word
C) Adobe Acrobat
D) Corel Painter
D
3
________ solicits online input from consumers.
A) A quick response code
B) Computer forensics
C) Crowdsourcing
D) Crowdfunding
A) A quick response code
B) Computer forensics
C) Crowdsourcing
D) Crowdfunding
C
4
Which of the following is an example of the results of data mining?
A) An Excel spreadsheet listing all employees and their annual salaries in a random order
B) Netflix providing you with a list of videos you might enjoy
C) Raw data from questionnaires given at the mall
D) A printout of all sales taken from the register at the end of the day
A) An Excel spreadsheet listing all employees and their annual salaries in a random order
B) Netflix providing you with a list of videos you might enjoy
C) Raw data from questionnaires given at the mall
D) A printout of all sales taken from the register at the end of the day
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
5
________ results when leisure time and tools allow us to engage in creative acts.
A) Crowdsourcing
B) Social networking
C) Cognitive surplus
D) Affective computing
A) Crowdsourcing
B) Social networking
C) Cognitive surplus
D) Affective computing
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
6
________ refers to the commands that instruct a computer what to do.
A) Software
B) Hardware
C) Spam
D) Data mining
A) Software
B) Hardware
C) Spam
D) Data mining
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
7
A popular Voice over Internet Protocol (VoIP) service is ________.
A) Tablet
B) Skype
C) Social Network
D) Mobile bridge
A) Tablet
B) Skype
C) Social Network
D) Mobile bridge
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
8
________ tools enable groups of people to connect and exchange ideas.
A) Affective computing
B) Social networking
C) Debugging
D) Computer forensics
A) Affective computing
B) Social networking
C) Debugging
D) Computer forensics
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
9
All of the following are examples of being computer literate, EXCEPT ________.
A) knowing how to avoid hackers and viruses
B) knowing how to diagnose and fix hardware and software problems
C) knowing how to use the web efficiently
D) knowing only how to use your computer for e-mails
A) knowing how to avoid hackers and viruses
B) knowing how to diagnose and fix hardware and software problems
C) knowing how to use the web efficiently
D) knowing only how to use your computer for e-mails
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
10
________ tools gather information from sources such as e-mails, text messages, and tweets and make the information instantly and publicly available for use in emergencies.
A) Social networking
B) Crowdsourcing
C) Crisis-mapping
D) Affective computing
A) Social networking
B) Crowdsourcing
C) Crisis-mapping
D) Affective computing
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
11
The process of searching huge amounts of data seeking a pattern is called data ________.
A) data mining
B) searching
C) warehousing
D) diving
A) data mining
B) searching
C) warehousing
D) diving
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
12
QR stands for ________.
A) quick retention
B) quick response
C) quality response
D) quality retention
A) quick retention
B) quick response
C) quality response
D) quality retention
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
13
Mastery is defined as ________.
A) combining leisure time with the tools to be creative
B) feeling confident and excited about learning new skills
C) working without continual direction and control
D) working for something larger
A) combining leisure time with the tools to be creative
B) feeling confident and excited about learning new skills
C) working without continual direction and control
D) working for something larger
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
14
All of the following factors lead to greater motivation EXCEPT ________.
A) consumption
B) purpose
C) autonomy
D) mastery
A) consumption
B) purpose
C) autonomy
D) mastery
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
15
The gap between those who have easy access to the Internet and technology those who do not is known as the ________ divide.
A) web
B) Internet
C) digital
D) technology
A) web
B) Internet
C) digital
D) technology
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
16
Unwanted or junk e-mail is called ________.
A) spam
B) spyware
C) adware
D) malware
A) spam
B) spyware
C) adware
D) malware
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
17
________ is a field of study focused on handling and automatic retrieval of information.
A) Computer forensics
B) Crisis mapping
C) RFID
D) Information technology
A) Computer forensics
B) Crisis mapping
C) RFID
D) Information technology
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
18
Sharing products rather than owning them individually is known as ________.
A) collaborative consumption
B) crowdfunding
C) crowdsourcing
D) social networking
A) collaborative consumption
B) crowdfunding
C) crowdsourcing
D) social networking
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
19
Autonomy is defined as ________.
A) working for something larger
B) feeling confident and excited about learning new skills
C) working without continual direction and control
D) repressing motivated behavior
A) working for something larger
B) feeling confident and excited about learning new skills
C) working without continual direction and control
D) repressing motivated behavior
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
20
Using the Internet to get small donations from many people to start a business is called ________.
A) kickstarting
B) crowdfunding
C) crowdsourcing
D) collaborating
A) kickstarting
B) crowdfunding
C) crowdsourcing
D) collaborating
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
21
The world's population combined has an estimated ________ hours a year of free time.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
22
New York City's program that fosters the sharing of bicycles is an example of ________.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
23
The goal of ________ research is to provide technological solutions to physical and health-related problems.
A) crisis-mapping
B) computer forensics
C) biomedical
D) RFID
A) crisis-mapping
B) computer forensics
C) biomedical
D) RFID
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
24
One potential application of ________ is to provide sight to the blind.
A) RFID tags
B) patient simulators
C) biomedical chip implants
D) Bluetooth technology
A) RFID tags
B) patient simulators
C) biomedical chip implants
D) Bluetooth technology
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
25
________ is a popular service that allows free phone calls over the Internet.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
26
The gap in Internet and technical tools access around the world is known as the ________.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
27
Ushahidi is a ________ tool that makes information instantly available to anyone in the world.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
28
The ________ Initiative is rallying the support of the world to identify mathematical genius.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
29
The term ________ literate means being familiar enough with computers to understand their capabilities and limitations and knowing how to use them.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
30
________ asks for small donations from a large number of people.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
31
________ programs contain the instructions that tell a computer what to do.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
32
Affective computing ________.
A) performs calculations faster than humans
B) recognizes human fingerprints
C) speaks human language
D) recognizes and simulates human emotion
A) performs calculations faster than humans
B) recognizes human fingerprints
C) speaks human language
D) recognizes and simulates human emotion
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
33
Faculty at universities often use course management software such as ________ so that students can communicate outside of class and have easy access to class materials.
A) Blackboard
B) iCloud
C) LinkedIn
D) Whiteboard
A) Blackboard
B) iCloud
C) LinkedIn
D) Whiteboard
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
34
The ________ hopes to stop human rights abuses throughout the world.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
35
The ________ is an organization of musicians performing together from different locations all over the globe.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
36
Analyzing computer systems to gather potential legal evidence is computer ________.
A) detectives
B) forensics
C) analysis
D) enforcement
A) detectives
B) forensics
C) analysis
D) enforcement
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
37
A group of researchers at the MIT Media Lab have developed a system to help improve social skills for people who have ________.
A) paralysis
B) depression
C) autism
D) brain damage
A) paralysis
B) depression
C) autism
D) brain damage
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
38
________ is our normal sense of the world around us enhanced with digital information.
A) Cognitive surplus
B) Web 2.0
C) Augmented reality
D) Affective computing
A) Cognitive surplus
B) Web 2.0
C) Augmented reality
D) Affective computing
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
39
________ is the use of apps to obtain opinions on products from other people.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
40
Scanning a product's ________ code with a smartphone can take you to a website, a video, or a Facebook page for more information about the product.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
41
Crowdfunding is asking for large donations from a few people.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
42
________ is a wearable tool consisting of a camera, a projector, and a glass prism that communicates with the Internet wirelessly through your smartphone.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
43
Using software such as Adobe Illustrator, Adobe Photoshop, and Corel Painter allows artists to create ________ art.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
44
Hardware refers to the programs that give instructions to the computer.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
45
Electronic junk mail is known as ________.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
46
Purpose is the simple understanding that you are working for something larger than yourself.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
47
________ applies computer systems and techniques to gather legal evidence.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
48
An investment analyst started a nonprofit technological tool for education called the ________.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
49
Using register terminals to determine consumer buying patterns is an example of ________.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
50
Autonomy is the feeling of confidence and excitement from seeing your own skills progress.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
51
A virus is electronic junk mail.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
52
The ________ is a collaboration of several museums that allows online visitors to explore over a thousand pieces of art.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
53
The AT&T mobile app that lets customers report locations where there are gaps in service is an example of crowdsourcing.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
54
You cannot be computer literate unless you have knowledge of higher-level computer skills, such as computer programming.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
55
Cognitive surplus is the combination of leisure time and creativity tools.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
56
________ can determine which products are selling on a given day and in a specific location.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
57
On a(n) ________ website, you can play a game called Moonbase Alpha that simulates life on a space settlement.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
58
Zipcar is an example of ownership.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
59
________ computing relates to recognizing and simulating human emotions.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
60
________ is a personal identification chip that is about the size of a grain of rice and implanted under the skin.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
61
Examples of information technology careers are telecommunication and software deployment.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
62
Information technology is the study of managing, processing, and the automatic retrieval of information.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
63
Affective computing is a field of study focused on the managing, processing, and automatic retrieval of information.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
64
Mastery of software programs, such as Adobe Illustrator and Corel Painter, is essential to creating digital art.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
65
VeriMed can be used to keep Alzheimer's patients safe.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
66
The National Center for the Analysis of Violent Crime database enables detectives to analyze information about similarities between crimes.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
67
Data warehousing is the process of searching large datasets to find patterns.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
68
Hospitals use nonimplant versions of identity chips on the wristbands of all patients.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
69
Computer forensics analyzes computer systems in gathering potential legal evidence.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
70
Match between columns
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
71
Match between columns
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
72
Match between columns
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck