Technology in Action

The process of searching huge amounts of data with the hope of finding a pattern is called ________.
data mining
A University of Michigan study shows that without Internet access at home, teens from low income households are more likely to use their cell phones to go online than their wealthier counterparts.
true
Unwanted e-mail is called ________.
spam
Understanding how to use e-mail effectively is one example of what it means to be computer literate.
true
The goal of ________ is to provide solutions to physical problems, such as providing sight to the blind.
biomedical chip research
The ________ is a strategic plan to focus on the young, talented, mathematical minds of Africa.
The Next Einstein Initiative
Affective computing is a field of study focused on managing and processing information and the automatic retrieval of information.
false
Being computer literate means being able to separate the real privacy and security risks from things that you don’t have to worry about.
true
The Microexpression Training Tool software trains law enforcement officials to distinguish true emotion from deception.
true
SixthSense is a wearable device that consists of a camera, projector, and a mirror that can communicate with the Internet over wireless Bluetooth via a computer.
false
________ tags, when placed on a car, can be used to record and track in a database all of the vehicle’s movements.
RFID
Being computer savvy means you ________.
do all of these
The menuboard of the Khan Academy shows exactly which topic a student has mastered and where they are failing to progress. Answer
false
Any surface can become an input device using SixthSense.
true
The for-profit Khan Academy contains over 2,200 videos, and over 1 million students a month use the site.
false
The Witness Project uses the power of video and a grassroots movement to advocate for ________.
human rights
The Microsoft Authorized Refurbisher program supports refurbishers by allowing ________ to be installed for free on refurbished systems.
certain Microsoft operating systems and Office software
When a job is sent to other countries, as many programming jobs have been, it is said to have been data mined.
false
________ computing relates to emotion or deliberately tries to influence emotion.
Affective
A study by the National Research Council concludes that by the year 2030, computers will displace humans in 85 percent of the current occupations.
false
The difference between people with access to computers and the Internet and those without this access is known as the ________.
digital divide
Affective computing is a science that attempts to produce machines that understand and can respond to human emotion.
true
Data mining is the process of searching huge amounts of data with the hope of finding a pattern.
true
________ is described as the ability of the world’s populace to volunteer and collaborate on large projects.
creative surplus
Hardware refers to the programs that give commands to the computer.
false
Mastering software animation tools, such as Autodesk 3ds Max, will enable you to create compelling new worlds and new characters.
True
Multimedia tours using mobile devices and wireless technology are not common in museums and galleries at this time.
false
One proposed answer to close the digital divide is to promote ________ as a means for low-income families to access the Internet.
mobile devices
Which of the following is NOT necessarily part of being computer literate?
being able to build a computer
As engineers work to create computers that can understand us emotionally, ________ are also evolving toward a more human
computer systems
________ is a field of study focused on information handling and retrieval of information automatically.
Information technology
Becoming computer literate means knowing which technologies are on the horizon and how to integrate them with your home setup.
true
Data mining is the set of techniques used in information handling and retrieval.
false
Mastery of software programs such as Adobe Illustrator and Corel Painter is essential to creating digital art.
true
Computer forensics analyzes computer systems in gathering potential legal evidence.
true
The motivation behind discount cards offered by grocery stores and drugstores is to encourage customers to frequent their stores.
false
Joining together as a group to use a specific product more efficiently is called ________.
collaborative consumption
Biomedical chip implants are being used to provide sight to the blind.
true
One potential application of ________ is to provide sight to the blind.
biomedical chip implants
A technology named ________ lets any piece of print in the real world host a live link to online information and video content.
quick response codes
You cannot be called computer literate unless you have knowledge of higher level computer skills, such as computer programming.
false
The National Center for the Analysis of Violent Crime database enables detectives to analyze information about similarities between crimes.
true
Children who do not have access to ________ and ________ won’t be prepared for future employment.
the Internet, computers
A crisis mapping tool such as ________ can collect information to make instantly and publicly available for use in emergencies.
Ushahidi
Dancers can be wired with light electronic sensors so that their movements can be digitized for computer analysis.
true
The ________ lets information be created, distributed, and filtered by users themselves in real time.
DYTHR project
The emotional-social prosthesis (ESP) device, developed by a group at the MIT Media Lab, is targeted at helping people who have ________.
autism
________ is the gathering together of groups of people using online tools to connect and exchange ideas.
Social networking
People who are ________ make the Internet a powerful tool and know how to find the information that they want effectively.
computer literate
By studying the data produced by ________, scientists hope to improve the prediction of weather phenomena.
simulations
Speakers connect to the VGA port.
False
Large, expensive computers that support hundreds of users simultaneously are called ________.
mainframes
The S-video and the ________ ports on a computer facilitate connecting the computer to multimedia devices such as TVs and DVD players.
DVI
A ________ is approximately 1 million bytes.
megabyte
The hard drive is a ________ storage device, meaning that it stores data permanently even when the computer is turned off.
nonvolatile
A ________ enables your computer to connect to other computers or to the Internet.
network interface card (NIC)
Restarting the computer while it’s powered on is called a cold boot.
false
________ is a power mode that allows the computer to save an image of the desktop to the hard drive and enter a state of reduced power consumption to save energy.
Hibernate
________ software is the set of programs that enables the computer’s hardware devices and application software to work together.
System
All the following are examples of input devices EXCEPT a ________.
Printer
USB ports are fast replacing traditional ________ ports because of their ability to transfer data quickly.
parallel and serial
Brightness determines how lighter colors appear on the display.
false
Serial ports and parallel ports have long been used to connect input and output devices to the computer.
true
The ________ is used in combination with other keys to perform shortcuts and special tasks.
Control (Ctrl) key
Embedded computers have their own programming. They typically do not receive input from you, nor do they interact with other systems
true
A(n) ________ is a device that looks like a skinny pen but has no ink.
stylus
________ are a form of permanent storage that can be seen and accessed from outside the system unit and are typically used for CD and DVD drives.
External drive bays
________ computers are specially designed computer chips that reside inside other devices such as your car or the electronic thermostat in your home.
Embedded
________ is the place in a computer where the programs and data the computer is currently using are stored.
RAM
Any computer parts that you can actually touch are considered to be ________.
hardware
A ________ is approximately 1 billion bytes.
gigabyte
Restarting a computer when it is already powered on is called ________.
a warm boot
________ microphones pick up sound from only one direction.
Unidirectional
________ ports are now the most common ports for connecting input and output devices to the computer.
Universal serial bus (USB)
________ displays use organic compounds that produce light when exposed to an electric current.
OLED
Inkjet printers and laser printers are examples of ________ printers.
nonimpact
________ is data that has been organized or presented in a meaningful fashion.
Information
________ is the applied science concerned with designing and arranging things that people use so that the people and things interact most efficiently and safely.
Ergonomics
The small, touch-sensitive area at the base of the keyboard on a notebook computer is known as a ________.
touch pad
A(n) ________ is where a peripheral device can attach to a computer so that data can be exchanged between it and the operating system.
port
Which of the following is NOT one of the four major data processing functions of a computer?
analyzing the data or information
A(n) ________ enables you to enter data (text, images, and sound) and instructions (user responses and commands) into the computer
input device
USB ports are causing serial and parallel ports to become legacy technology.
true
The term ________ describes computing devices or peripherals that use techniques, parts, and methods from an earlier time that are no longer popular.
legacy technology
A ________ was the first devices with touch screen capabilities.
Tablet PC
When using Windows 7 power management tools, you really only need to shut down your computer when you need to repair the system, install hardware, or move the system.
true
________ printers have tiny hammerlike keys that strike the paper through an inked ribbon.
Impact
External hard drives are often used to back up data that is contained on the internal hard drive.
true
Flash drives plug into a(n) ________.
USB port
Devices such as monitors and printers that are connected to the computer are called ________.
peripheral devices
The ________, housed inside the system unit, transforms the wall voltage to the voltages required by the computer chips.
power supply
Digital cameras, camcorders, and webcams are common devices for capturing pictures and video and are all considered output devices.
false
The ________ contains the central electronic components of the computer.
motherboard
________ is a form of permanent memory that holds all the instructions the computer needs to start up.
ROM
________ plug into slots on the motherboard and provide additional functionality for your computer.
Expansion cards
In binary language, each letter of the alphabet, each number, and each special character is made up of a unique combination of ________.
eight bits
New technologies pushing the boundaries of printing include ________.
all of these
Monitor screen grids are made up of millions of pixels, with each pixel containing ________ subpixels of colors.
three
________ are shortcut keys that you press to perform special tasks; each software application has its own set of tasks assigned to these keys.
Function keys
A Web site that allows anyone to add or edit content is called a ________.
wiki
Instant messaging is available only from AOL.
false
In the URL http://www.prenhall.com, the portion labeled .com is the ________.
top-level domain
The Internet backbone refers to ________.
he main pathway of high-speed communications lines through which all Internet traffic flows
The agency that first began funding the Internet was called the ________.
Advanced Research Projects Agency Network
A list of pages within a Web site that you have visited and that usually appears at the top of a page is referred to as a(n) ________.
breadcrumb trail
The Internet2 is a project ________.
to develop new Internet technologies
Although Apple created the Safari browser, there is a Windows-based version available.
true
Webcasts differ from podcasts in that webcasts ________.
are not updated automatically
Podcasts use which of the following technologies?
RSS
Most webcasts are not updated automatically.
true
E-commerce that involves businesses buying and selling goods and services to other businesses is called ________.
B2B
The Internet is referred to as a client/server network.
True
There are sites that host blogs free of charge.
True
RSS stands for ________.
Really Simple Syndication
A universal chat client allows you to chat with users who are using a different IM service than you are.
True
When shopping on the Web, it is better to pay for your purchase with a debit card rather than a credit card.
false
Web-based e-mail programs are usually more full featured than client-based e-mail systems.
false
The text version of a Web site’s Internet address is called the ________.
Uniform Resource Locator (URL)
Weblogs or blogs are public, allowing anyone to view them.
true
All of the following are examples of multimedia EXCEPT:
text
A subject directory is an outline of Web sites organized by topic.
true
A webcast is ________.
the broadcast of audio or video content over the Internet
What does Web 2.0 describe?
a trend of new Web applications that combine the functionality of multiple applications
Boolean operators include such words as ________.
all of these
Webcasts can be used to initiate a response from a viewing audience.
true
One way to mark a Web site so that you can return to it later without typing the address is to ________.
use Favorites or Bookmarks
When evaluating a Web site, testing the relevancy of a site means checking to see if the information in the site is current.
true
With a client-based e-mail account, such as Microsoft Outlook, you are able to view your e-mail only from the computer on which the client program is installed.
true
The “s” in https stands for ________.
secure socket layer
The Internet protocol used to upload and download files is HTTP.
false
When purchasing items over the Internet, be sure to check ________.
all of these
The # sign can be used as a wildcard when conducting searches with most search engines.
false
n the URL http://www.prenhall.com, the portion labeled http is the ________.
protocol
Adobe Reader, Flash Player, and QuickTime Player are all examples of special software programs called ________.
plug-ins
________ is a social networking service that enables you to exchange short text messages with your friends or “followers.”
Twitter
A(n) ________ is a keyword or term that is assigned to a piece of information such as a Web page, digital image, or video and describes the site so that it can be found again by browsing or searching.
tag
A set of programs that searches the Web to find information is called a ________.
search engine
The name of the free Internet browser from Mozilla is ________.
Firefox
Podcasts enable you to ________.
broadcast over the Internet using compressed audio and video files such as MP3s and MP4s
All of the following are parts of a URL EXCEPT:
hyperlinks
What protocol allows files to be transferred from a Web server so that you can view them on your computer using a browser?
HTTP
The Internet is ________.
a large network of networks
The World Wide Web was invented by ________.
Tim Berners-Lee at CERN
HTTP is the abbreviation for ________.
Hypertext Transfer Protocol
A tag can be assigned to a Web page, a digital image, or a video.
true
Search engines have which three parts?
a spider, an indexer, and search engine software
There are virtually no privacy risks in using today’s newest social networking sites.
false
In reference to URLs, domain name and host name are used interchangeably.
true
If you post a picture on your own social networking site, it could become available to the public via search engines.
true