Technology in Action, Complete 8e (Evans et al.) - Stdnt Txt

Chapter 1: Why Computers Matter to You: Becoming Computer Literate

1) Being ______means being familiar enough with computers that you understand their capabilities and limitations.

A) computer savvy

B) technology literate

C) computer literate

D) computer competent

Answer: C

Diff: 1

Section Ref: Why Should You Become Computer Literate?

2) All of the following are examples of real security and privacy risks EXCEPT:

A) hackers.

B) viruses.

C) spam.

D) identity theft.

Answer: C

Diff: 1

Section Ref: Becoming a Savvy Computer User and Consumer

3) Unwanted e-mail is called ______.

A) spam

B) spyware

C) adware

D) software

Answer: A

Diff: 1

Section Ref: Becoming a Savvy Computer User and Consumer

4) Which of the following is NOT necessarily part of being computer literate?

A) avoiding hackers and viruses

B) protecting your privacy

C) being able to build a computer

D) using the Internet wisely

Answer: C

Diff: 1

Section Ref: Becoming a Savvy Computer User and Consumer

5) ______is a field of study focused on information handling and retrieval of information automatically.

A) Computer forensics

B) Database mining

C) RFID

D) Information technology

Answer: D

Diff: 2

Section Ref: Being Prepared for Your Career

6) The process of searching huge amounts of data with the hope of finding a pattern is called ______.

A) data mining

B) data searching

C) data warehousing

D) data retrieval

Answer: A

Diff: 1

Section Ref: Retail: Working in a Data Mine

7) A ______is a specially designed scannable sticker that resembles an inkblot and contains all the important information about a UPS package.

A) mailing label

B) packing label

C) MaxiCode

D) PostCode

Answer: C

Diff: 2

Section Ref: Business: Data on the Go

8) ______is a type of wireless communication that transmits data through radio waves.

A) Nanotechnology

B) Bluetooth technology

C) POS technology

D) USB technology

Answer: B

Diff: 2

Section Ref: Business: Data on the Go

9) When a job is sent to other countries, as many programming jobs have been, it is said to have been ______.

A) offshored

B) resourced

C) exported

D) imported

Answer: A

Diff: 2

Section Ref: Video Game Design: A Long Way from Pac-Man

10) A ______is a small device that enables users to carry digital information.

A) PSS

B) Smartphone

C) GPS player

D) VeriChip

Answer: B

Diff: 2

Section Ref: Education: Teaching and Learning

11) Which of the following do today's educators NOT need to be familiar with to create constructive computerized lessons and to interact with students?

A) computers

B) the Internet

C) programs like Moodle or Blackboard

D) Web authoring software

Answer: D

Diff: 2

Section Ref: Education: Teaching and Learning

12) Many online courses are designed to use management software like ______so that students can communicate outside of class, take quizzes online, and find their class materials easily.

A) Blackboard or Moodle

B) Microsoft Access

C) Adobe Photoshop

D) CAD or Visio

Answer: A

Diff: 2

Section Ref: Education: Teaching and Learning

13) To set up a(n) ______, you must have an appropriate computer and digital devices connected to a home network.

A) digital home

B) e-business

C) Web site

D) digital entertainment center

Answer: A

Diff: 1

Section Ref: Dig Deeper: Computers Migrate into the Living Room

14) The ability to recover and read deleted or damaged files from a criminal's computer is an example of a law enforcement specialty called ______.

A) robotics

B) RFID simulation

C) computer forensics

D) HALO animation

Answer: C

Diff: 2

Section Ref: Law Enforcement: Put Down That Mouse-You're Under Arrest!

15) ______is the application of computer systems and techniques to gather potential legal evidence.

A) Data mining processes

B) POS skills

C) Information gathering

D) Computer forensics

Answer: D

Diff: 1

Section Ref: Law Enforcement: Put Down That Mouse-You're Under Arrest!

16) ______tags, when placed on an animal, can be used to record and track in a database all of the animal's movements.

A) RFID

B) POS

C) PPS

D) GPS

Answer: A

Diff: 2

Section Ref: Agriculture: High-Tech Down on the Farm

17) ______tags are small versions of the roadway electronic toll system used in many states to automate paying tolls as motorists pass through the toll station.

A) PDA

B) RFID

C) PSS

D) UPS

Answer: B

Diff: 2

Section Ref: Agriculture: High-Tech Down on the Farm

18) Surgeons use ______to perform delicate operations by manipulating devices through computers instead of manually.

A) forecasting

B) computer forensics

C) simulation

D) robotics

Answer: D

Diff: 2

Section Ref: Medicine: Technologies of Today and Tomorrow

19) Technology no longer protected by copyright, available to everyone, is considered to be ______.

A) proprietary

B) open

C) experimental

D) in the public domain

Answer: D

Diff: 2

Section Ref: Medicine: Technologies of Today and Tomorrow

20) Medical students can train on ______and experience firsthand how a human would react to a particular treatment.

A) mannequins

B) patient simulators

C) robots

D) a 3D anatomical system

Answer: B

Diff: 3

Section Ref: Medicine: Technologies of Today and Tomorrow

21) The ______is a global effort in which bioengineers are creating realistic computer simulations of all systems and features of the human anatomy.

A) Y2K Project

B) Physiome Project

C) BrainGate Project

D) RFID Project

Answer: B

Diff: 2

Section Ref: Medicine: Technologies of Today and Tomorrow

22) The goal of ______is to provide solutions to physical problems, such as providing sight to the blind.

A) 3D animations

B) computer forensics

C) biomedical chip research

D) RFID technology

Answer: C

Diff: 3

Section Ref: Medicine: The Chip Within

23) One type of chip already being implanted in humans as a means of verifying a person's identity is called a(n) ______.

A) DogTag

B) ImplantChip

C) VeriChip

D) RFID chip

Answer: C

Diff: 2

Section Ref: Medicine: The Chip Within

24) One potential application of ______is to provide sight to the blind.

A) RFID tags

B) patient simulators

C) biomedical chip implants

D) VeriChips

Answer: C

Diff: 2

Section Ref: Medicine: The Chip Within

25) By studying the data produced by ______, scientists hope to improve the prediction of weather phenomena.

A) GPS

B) simulations

C) VeriChips

D) PSSs

Answer: B

Diff: 1

Section Ref: Science: Simulating Reality

26) ______is the science revolving around building devices on an extremely small scale.

A) Nanotechnology

B) Microtechnology

C) Computer forensics

D) Artificial intelligence

Answer: A

Diff: 2

Section Ref: Nanotechnology: Careers Yet to Come

27) ______is the study of molecules and structures whose sizes range from 1 to 100 nanometers.

A) Artificial intelligence

B) Microelectrodes

C) Computer forensics

D) Nanoscience

Answer: D

Diff: 1

Section Ref: Nanotechnology: Careers Yet to Come

28) The prefix nano stands for ______.

A) one-hundredth

B) one-millionth

C) one-billionth

D) one-trillionth

Answer: C

Diff: 2

Section Ref: Nanotechnology: Careers Yet to Come

29) A nanometer is ______.

A) one-tenth of a meter

B) one-millionth of a meter

C) one-billionth of a meter

D) the size of a human hair

Answer: C

Diff: 2

Section Ref: Nanotechnology: Careers Yet to Come

30) ______computing relates to emotion or deliberately tries to influence emotion.

A) Affective

B) Personal

C) Psychological

D) Emotional

Answer: A

Diff: 2

Section Ref: Psychology: You Should Smile . . . Now

31) While engineers work to create computers that can understand us emotionally, ______are also evolving toward a more human appearance.

A) affecting computing techniques

B) RFIDs

C) computer systems

D) ESP systems

Answer: C

Diff: 2

Section Ref: Psychology: You Should Smile . . . Now

32) The emotional-social prosthesis (ESP) device, developed by a group at the MIT Media Lab, is targeted at helping people who have ______.

A) paralysis

B) diabetes

C) autism

D) brain damage

Answer: C

Diff: 2

Section Ref: Psychology: You Should Smile . . . Now

33) Children who do not have access to ______and ______won't be prepared for future employment.

A) databases, data mining

B) information, data

C) television, video games

D) the Internet, computers

Answer: D

Diff: 2

Section Ref: Ethics in IT: Knowledge Is Power-Bridging the Digital Divide

34) The difference between people with access to computers and the Internet and those without this access is known as the ______.

A) Web divide

B) Internet divide

C) digital divide

D) broadband divide

Answer: C

Diff: 1

Section Ref: Ethics in IT: Knowledge Is Power-Bridging the Digital Divide

35) The Microsoft Authorized Refurbisher program supports refurbishers by allowing ______to be installed for free on refurbished systems.

A) certain Microsoft operating systems and Office software

B) certain gaming software packages

C) antivirus software

D) specific operating system utilities

Answer: A

Diff: 3

Section Ref: Ethics in IT: Knowledge Is Power-Bridging the Digital Divide

36) ______is the nerve center of any digital home, allowing you to interface with the different digital devices connected to the network.

A) The Internet

B) A modem

C) A computer

D) A server

Answer: C

Diff: 1

Section Ref: Dig Deeper: Computers Migrate into the Living Room

37) A ______allows you to transfer media from your computer to other media devices (such as a plasma TV).

A) digital TV

B) network adapter

C) digital media adapter

D) radio tuner

Answer: C

Diff: 3

Section Ref: Dig Deeper: Computers Migrate into the Living Room

38) A ______is a special device that is installed in your computer and allows it to communicate with other devices on the network.

A) media center extender

B) network adapter

C) modem

D) digital media adapter

Answer: B

Diff: 1

Section Ref: Dig Deeper: Computers Migrate into the Living Room

39) The Microsoft Authorized Refurbisher program supports refurbishers by allowing certain Microsoft operating systems and applications to be installed for free on refurbished computers.

Answer: TRUE

Diff: 3

Section Ref: Ethics in IT: Knowledge Is Power-Bridging the Digital Divide

40) You cannot be called computer literate unless you have knowledge of higher level computer skills, such as computer programming.

Answer: FALSE

Diff: 1

Section Ref: Why Should You Become Computer Literate?

41) Becoming computer literate includes being able to understand and form knowledgeable opinions on the challenges facing a digital society.

Answer: TRUE

Diff: 1

Section Ref: Understanding the Challenges Facing a Digital Society

42) Data mining is the process of searching huge amounts of data with the hope of finding a pattern.

Answer: TRUE

Diff: 1

Section Ref: Retail: Working in a Data Mine

43) Information technology careers are on the rise.

Answer: TRUE

Diff: 2

Section Ref: Being Prepared for Your Career

44) Data mining is the set of techniques used in information handling and retrieval.

Answer: FALSE

Diff: 2

Section Ref: Being Prepared for Your Career

45) Hardware refers to the programs that give commands to the computer.

Answer: FALSE

Diff: 2

Section Ref: Becoming a Savvy Computer User and Consumer

46) When a job is sent to other countries, as many programming jobs have been, it is said to have been exported.

Answer: FALSE

Diff: 1

Section Ref: Video Game Design: A Long Way from Pac-Man

47) Trend-spotting programs developed for business have been used to predict criminal activity.

Answer: TRUE

Diff: 2

Section Ref: Law Enforcement: Put Down That Mouse-You're Under Arrest!

48) Computer forensics is the application of computer systems in gathering potential legal evidence.

Answer: TRUE

Diff: 1

Section Ref: Law Enforcement: Put Down That Mouse-You're Under Arrest!

49) Today, because of advances in computer technology, it is not theoretically necessary for a doctor to be in the same room as his or her patient.

Answer: TRUE

Diff: 2

Section Ref: Medicine: Technologies of Today and Tomorrow

50) Copyrighted technology is said to be in the public domain.

Answer: FALSE

Diff: 1

Section Ref: Medicine: Technologies of Today and Tomorrow

51) Biomedical chip implants are being used to provide sight to the blind.

Answer: TRUE

Diff: 2

Section Ref: Medicine: The Chip Within

52) Ranchers use VeriChips to track their cattle.

Answer: FALSE

Diff: 2

Section Ref: Agriculture: High-Tech Down on the Farm

53) Nanostructures represent the smallest human-made structures that can be built.

Answer: TRUE

Diff: 2

Section Ref: Nanotechnology: Careers Yet to Come

54) Affective computing is a science that attempts to produce machines that understand and can respond to human emotion.

Answer: TRUE

Diff: 2

Section Ref: Psychology: You Should Smile . . . Now

55) Employers have the right to monitor network traffic on employee systems used at work.

Answer: TRUE

Diff: 2

Section Ref: Understanding the Challenges Facing a Digital Society

56) Although the automotive industry has become more computerized in the last ten years, there is still not a great need for automotive technicians to be computer literate.

Answer: FALSE

Diff: 1

Section Ref: Automotive Technology: Sensors and CPUs

57) Being computer literate enables you to form educated opinions in today's digital society and to take a stand based on accurate information rather than media hype and misinformation.

Answer: TRUE

Diff: 1

Section Ref: Understanding the Challenges Facing a Digital Society

58) The discrepancy between the "haves" and "have nots" with regard to computer technology is commonly referred to as the digital society.

Answer: FALSE

Diff: 2

Section Ref: Ethics in IT: Knowledge Is Power-Bridging the Digital Divide

59) A TV tuner allows your computer to receive television channels from a cable connection and display them on your computer monitor.

Answer: TRUE

Diff: 2

Section Ref: Dig Deeper: Computers Migrate into the Living Room

60) Being ______means being familiar enough with computers to understand their capabilities and limitations and knowing how to use them.

Answer: computer literate

Diff: 1

Section Ref: Why Should You Become Computer Literate?

61) The term ______refers to the programs that give commands to the computer.

Answer: software

Diff: 1

Section Ref: Becoming a Savvy Computer User and Consumer

62) ______is the act of stealing someone's identity.

Answer: Identity theft

Diff: 1

Section Ref: Becoming a Savvy Computer User and Consumer

63) ______is the field of study focused on information handling and retrieval.

Answer: Information technology

Diff: 1

Section Ref: Being Prepared for Your Career

64) A process known as ______tracks trends and allows retailers to respond to consumer buying patterns.

Answer: data mining

Diff: 3

Section Ref: Retail: Working in a Data Mine

65) ______is the process of searching huge amounts of data with the hope of finding a pattern.

Answer: Data mining

Diff: 2

Section Ref: Retail: Working in a Data Mine

66) UPS workers use scanners with ______technology to transmit data to a terminal.

Answer: Bluetooth

Diff: 2

Section Ref: Business: Data on the Go

67) Using software such as Adobe Illustrator, Adobe Photoshop, and Macromedia Flash allows artists to create ______art.

Answer: digital

Diff: 2

Section Ref: Ink, Paints & a Notebook?

68) Because computer games are best developed for a local market by people native to that market, game development will most likely not be ______, or sent to other countries.

Answer: offshored

Diff: 2

Section Ref: Video Game Design: A Long Way from Pac-Man

69) ______is the application of computer systems and techniques in the gathering of legal evidence.

Answer: Computer forensics

Diff: 2

Section Ref: Law Enforcement: Put Down That Mouse-You're Under Arrest!

70) A(n) ______is a special device that is installed in your computer that allows it to communicate with other devices on the network.

Answer: network adapter

Diff: 2

Section Ref: Dig Deeper: Computers Migrate into the Living Room

71) A(n) ______allows your computer to receive television channels from a cable connection and display them on your computer monitor.

Answer: TV tuner

Diff: 2

Section Ref: Dig Deeper: Computers Migrate into the Living Room

72) Farmers can use ______to track the location of their cattle.

Answer: RFID tags

Diff: 2

Section Ref: Agriculture: High-Tech Down on the Farm

73) Surgeons can use computer-guided ______to perform delicate surgery.

Answer: robots

Diff: 2

Section Ref: Medicine: Technologies of Today and Tomorrow

74) ______are life-sized mannequins that have a pulse and a heartbeat and respond to procedures just like humans do.

Answer: Patient simulators

Diff: 2

Section Ref: Medicine: Technologies of Today and Tomorrow

75) Technology no longer protected by copyright, so it is available to everyone, is considered to be in the ______.

Answer: public domain

Diff: 2

Section Ref: Medicine: Technologies of Today and Tomorrow

76) One type of chip being implanted in humans as a means of verifying a person's identity is called the ______.

Answer: VeriChip

Diff: 2

Section Ref: Medicine: The Chip Within

77) Scientists use ______, or models, to study tornadoes and to re-create the ruins of Pompeii.

Answer: simulations

Diff: 2

Section Ref: Science: Simulating Reality

78) In the future, ______, which are extremely small conductors, could be used to create extremely small pathways in computer chips.

Answer: nanowires

Diff: 3

Section Ref: Nanotechnology: Careers Yet to Come

79) ______is the science revolving around the use of nanostructures to build devices on an extremely small scale.

Answer: Nanotechnology

Diff: 2

Section Ref: Nanotechnology: Careers Yet to Come

80) Researchers are investigating the use of ______to deliver precise doses of drugs on a molecule-by-molecule basis within the human bloodstream.

Answer: nanostructures

Diff: 3

Section Ref: Nanotechnology: Careers Yet to Come

81) ______is the study of molecules and structures ranging in size from 1 to 100 nanometers.

Answer: Nanoscience

Diff: 2

Section Ref: Nanotechnology: Careers Yet to Come

82) ______computing relates to emotion or deliberately tries to influence emotion.

Answer: Affective

Diff: 2

Section Ref: Psychology: You Should Smile . . . Now

83) The discrepancy between the "haves" and the "have nots" with regard to computer technology is commonly referred to as the ______.

Answer: digital divide

Diff: 2

Section Ref: Ethics in IT: Knowledge Is Power-Bridging the Digital Divide

84) ______versions of identity chips are used in hospitals to monitor the locations of newborn babies.

Answer: Nonimplant

Diff: 2

Section Ref: Medicine: The Chip Within

85) An application from NASA, called ______, makes available some 10 trillion bytes of imagery of the Earth.

Answer: World Wind

Diff: 3

Section Ref: Bits and Bytes: NASA Wants You . . . to Learn

86) In an automobile, ______measure everything from air pressure to temperature to throttle position.

Answer: sensors

Diff: 2

Section Ref: Automotive Technology: Sensors and CPUs

87) Nanotechnology research has helped create carbon ______, which can deliver patient medicine and information.

Answer: nanotubes

Diff: 3