A Computer forensics B Database mining C RFID D Information technology Answer: D Diff: 2 Section Ref: Being Prepared for Your Career 6 The process of searching huge amounts of data with
Trang 1Technology in Action, Complete 8e (Evans et al.) - Stdnt Txt
Chapter 1: Why Computers Matter to You: Becoming Computer Literate
1) Being means being familiar enough with computers that you understand their capabilities and limitations
A) computer savvy
B) technology literate
C) computer literate
D) computer competent
Answer: C
Diff: 1
Section Ref: Why Should You Become Computer Literate?
2) All of the following are examples of real security and privacy risks EXCEPT:
A) hackers
B) viruses
C) spam
D) identity theft
Answer: C
Diff: 1
Section Ref: Becoming a Savvy Computer User and Consumer
3) Unwanted e-mail is called
A) spam
B) spyware
C) adware
D) software
Answer: A
Diff: 1
Section Ref: Becoming a Savvy Computer User and Consumer
4) Which of the following is NOT necessarily part of being computer literate?
A) avoiding hackers and viruses
B) protecting your privacy
C) being able to build a computer
D) using the Internet wisely
Answer: C
Diff: 1
Section Ref: Becoming a Savvy Computer User and Consumer
Trang 25) is a field of study focused on information handling and retrieval of information automatically
A) Computer forensics
B) Database mining
C) RFID
D) Information technology
Answer: D
Diff: 2
Section Ref: Being Prepared for Your Career
6) The process of searching huge amounts of data with the hope of finding a pattern is called
A) data mining
B) data searching
C) data warehousing
D) data retrieval
Answer: A
Diff: 1
Section Ref: Retail: Working in a Data Mine
7) A is a specially designed scannable sticker that resembles an inkblot and contains all the important information about a UPS package
A) mailing label
B) packing label
C) MaxiCode
D) PostCode
Answer: C
Diff: 2
Section Ref: Business: Data on the Go
8) is a type of wireless communication that transmits data through radio waves A) Nanotechnology
B) Bluetooth technology
C) POS technology
D) USB technology
Answer: B
Diff: 2
Section Ref: Business: Data on the Go
Trang 39) When a job is sent to other countries, as many programming jobs have been, it is said to have been
A) offshored
B) resourced
C) exported
D) imported
Answer: A
Diff: 2
Section Ref: Video Game Design: A Long Way from Pac-Man
10) A is a small device that enables users to carry digital information
A) PSS
B) Smartphone
C) GPS player
D) VeriChip
Answer: B
Diff: 2
Section Ref: Education: Teaching and Learning
11) Which of the following do today's educators NOT need to be familiar with to create
constructive computerized lessons and to interact with students?
A) computers
B) the Internet
C) programs like Moodle or Blackboard
D) Web authoring software
Answer: D
Diff: 2
Section Ref: Education: Teaching and Learning
12) Many online courses are designed to use management software like so that students can communicate outside of class, take quizzes online, and find their class materials easily
A) Blackboard or Moodle
B) Microsoft Access
C) Adobe Photoshop
D) CAD or Visio
Answer: A
Diff: 2
Section Ref: Education: Teaching and Learning
Trang 413) To set up a(n) , you must have an appropriate computer and digital devices connected to a home network
A) digital home
B) e-business
C) Web site
D) digital entertainment center
Answer: A
Diff: 1
Section Ref: Dig Deeper: Computers Migrate into the Living Room
14) The ability to recover and read deleted or damaged files from a criminal's computer is an example of a law enforcement specialty called
A) robotics
B) RFID simulation
C) computer forensics
D) HALO animation
Answer: C
Diff: 2
Section Ref: Law Enforcement: Put Down That Mouse-You're Under Arrest!
15) is the application of computer systems and techniques to gather potential legal evidence
A) Data mining processes
B) POS skills
C) Information gathering
D) Computer forensics
Answer: D
Diff: 1
Section Ref: Law Enforcement: Put Down That Mouse-You're Under Arrest!
16) tags, when placed on an animal, can be used to record and track in a database all
of the animal's movements
A) RFID
B) POS
C) PPS
D) GPS
Answer: A
Diff: 2
Section Ref: Agriculture: High-Tech Down on the Farm
Trang 517) tags are small versions of the roadway electronic toll system used in many states
to automate paying tolls as motorists pass through the toll station
A) PDA
B) RFID
C) PSS
D) UPS
Answer: B
Diff: 2
Section Ref: Agriculture: High-Tech Down on the Farm
18) Surgeons use to perform delicate operations by manipulating devices through computers instead of manually
A) forecasting
B) computer forensics
C) simulation
D) robotics
Answer: D
Diff: 2
Section Ref: Medicine: Technologies of Today and Tomorrow
19) Technology no longer protected by copyright, available to everyone, is considered to be
A) proprietary
B) open
C) experimental
D) in the public domain
Answer: D
Diff: 2
Section Ref: Medicine: Technologies of Today and Tomorrow
20) Medical students can train on and experience firsthand how a human would react
to a particular treatment
A) mannequins
B) patient simulators
C) robots
D) a 3D anatomical system
Answer: B
Diff: 3
Section Ref: Medicine: Technologies of Today and Tomorrow
Trang 621) The is a global effort in which bioengineers are creating realistic computer
simulations of all systems and features of the human anatomy
A) Y2K Project
B) Physiome Project
C) BrainGate Project
D) RFID Project
Answer: B
Diff: 2
Section Ref: Medicine: Technologies of Today and Tomorrow
22) The goal of is to provide solutions to physical problems, such as providing sight to the blind
A) 3D animations
B) computer forensics
C) biomedical chip research
D) RFID technology
Answer: C
Diff: 3
Section Ref: Medicine: The Chip Within
23) One type of chip already being implanted in humans as a means of verifying a person's identity is called a(n)
A) DogTag
B) ImplantChip
C) VeriChip
D) RFID chip
Answer: C
Diff: 2
Section Ref: Medicine: The Chip Within
24) One potential application of is to provide sight to the blind
A) RFID tags
B) patient simulators
C) biomedical chip implants
D) VeriChips
Answer: C
Diff: 2
Section Ref: Medicine: The Chip Within
Trang 725) By studying the data produced by , scientists hope to improve the prediction of weather phenomena
A) GPS
B) simulations
C) VeriChips
D) PSSs
Answer: B
Diff: 1
Section Ref: Science: Simulating Reality
26) is the science revolving around building devices on an extremely small scale A) Nanotechnology
B) Microtechnology
C) Computer forensics
D) Artificial intelligence
Answer: A
Diff: 2
Section Ref: Nanotechnology: Careers Yet to Come
27) is the study of molecules and structures whose sizes range from 1 to 100 nanometers
A) Artificial intelligence
B) Microelectrodes
C) Computer forensics
D) Nanoscience
Answer: D
Diff: 1
Section Ref: Nanotechnology: Careers Yet to Come
28) The prefix nano stands for .
A) one-hundredth
B) one-millionth
C) one-billionth
D) one-trillionth
Answer: C
Diff: 2
Section Ref: Nanotechnology: Careers Yet to Come
29) A nanometer is
A) one-tenth of a meter
B) one-millionth of a meter
C) one-billionth of a meter
D) the size of a human hair
Answer: C
Diff: 2
Section Ref: Nanotechnology: Careers Yet to Come
30) computing relates to emotion or deliberately tries to influence emotion
Trang 8A) Affective
B) Personal
C) Psychological
D) Emotional
Answer: A
Diff: 2
Section Ref: Psychology: You Should Smile Now
31) While engineers work to create computers that can understand us emotionally, are also evolving toward a more human appearance
A) affecting computing techniques
B) RFIDs
C) computer systems
D) ESP systems
Answer: C
Diff: 2
Section Ref: Psychology: You Should Smile Now
32) The emotional-social prosthesis (ESP) device, developed by a group at the MIT Media Lab,
is targeted at helping people who have
A) paralysis
B) diabetes
C) autism
D) brain damage
Answer: C
Diff: 2
Section Ref: Psychology: You Should Smile Now
33) Children who do not have access to and won't be prepared for future employment
A) databases, data mining
B) information, data
C) television, video games
D) the Internet, computers
Answer: D
Diff: 2
Section Ref: Ethics in IT: Knowledge Is Power-Bridging the Digital Divide
Trang 934) The difference between people with access to computers and the Internet and those without this access is known as the
A) Web divide
B) Internet divide
C) digital divide
D) broadband divide
Answer: C
Diff: 1
Section Ref: Ethics in IT: Knowledge Is Power-Bridging the Digital Divide
35) The Microsoft Authorized Refurbisher program supports refurbishers by allowing
to be installed for free on refurbished systems
A) certain Microsoft operating systems and Office software
B) certain gaming software packages
C) antivirus software
D) specific operating system utilities
Answer: A
Diff: 3
Section Ref: Ethics in IT: Knowledge Is Power-Bridging the Digital Divide
36) is the nerve center of any digital home, allowing you to interface with the different digital devices connected to the network
A) The Internet
B) A modem
C) A computer
D) A server
Answer: C
Diff: 1
Section Ref: Dig Deeper: Computers Migrate into the Living Room
37) A allows you to transfer media from your computer to other media devices (such
as a plasma TV)
A) digital TV
B) network adapter
C) digital media adapter
D) radio tuner
Answer: C
Diff: 3
Section Ref: Dig Deeper: Computers Migrate into the Living Room
Trang 1038) A is a special device that is installed in your computer and allows it to
communicate with other devices on the network
A) media center extender
B) network adapter
C) modem
D) digital media adapter
Answer: B
Diff: 1
Section Ref: Dig Deeper: Computers Migrate into the Living Room
39) The Microsoft Authorized Refurbisher program supports refurbishers by allowing certain Microsoft operating systems and applications to be installed for free on refurbished computers Answer: TRUE
Diff: 3
Section Ref: Ethics in IT: Knowledge Is Power-Bridging the Digital Divide
40) You cannot be called computer literate unless you have knowledge of higher level computer skills, such as computer programming
Answer: FALSE
Diff: 1
Section Ref: Why Should You Become Computer Literate?
41) Becoming computer literate includes being able to understand and form knowledgeable opinions on the challenges facing a digital society
Answer: TRUE
Diff: 1
Section Ref: Understanding the Challenges Facing a Digital Society
42) Data mining is the process of searching huge amounts of data with the hope of finding a pattern
Answer: TRUE
Diff: 1
Section Ref: Retail: Working in a Data Mine
43) Information technology careers are on the rise
Answer: TRUE
Diff: 2
Section Ref: Being Prepared for Your Career
44) Data mining is the set of techniques used in information handling and retrieval
Trang 1145) Hardware refers to the programs that give commands to the computer.
Answer: FALSE
Diff: 2
Section Ref: Becoming a Savvy Computer User and Consumer
46) When a job is sent to other countries, as many programming jobs have been, it is said to have been exported
Answer: FALSE
Diff: 1
Section Ref: Video Game Design: A Long Way from Pac-Man
47) Trend-spotting programs developed for business have been used to predict criminal activity Answer: TRUE
Diff: 2
Section Ref: Law Enforcement: Put Down That Mouse-You're Under Arrest!
48) Computer forensics is the application of computer systems in gathering potential legal evidence
Answer: TRUE
Diff: 1
Section Ref: Law Enforcement: Put Down That Mouse-You're Under Arrest!
49) Today, because of advances in computer technology, it is not theoretically necessary for a doctor to be in the same room as his or her patient
Answer: TRUE
Diff: 2
Section Ref: Medicine: Technologies of Today and Tomorrow
50) Copyrighted technology is said to be in the public domain
Answer: FALSE
Diff: 1
Section Ref: Medicine: Technologies of Today and Tomorrow
51) Biomedical chip implants are being used to provide sight to the blind
Answer: TRUE
Diff: 2
Section Ref: Medicine: The Chip Within
52) Ranchers use VeriChips to track their cattle
Answer: FALSE
Diff: 2
Section Ref: Agriculture: High-Tech Down on the Farm
53) Nanostructures represent the smallest human-made structures that can be built
Answer: TRUE
Diff: 2
Section Ref: Nanotechnology: Careers Yet to Come
54) Affective computing is a science that attempts to produce machines that understand and can
Trang 12respond to human emotion.
Answer: TRUE
Diff: 2
Section Ref: Psychology: You Should Smile Now
55) Employers have the right to monitor network traffic on employee systems used at work Answer: TRUE
Diff: 2
Section Ref: Understanding the Challenges Facing a Digital Society
56) Although the automotive industry has become more computerized in the last ten years, there
is still not a great need for automotive technicians to be computer literate
Answer: FALSE
Diff: 1
Section Ref: Automotive Technology: Sensors and CPUs
57) Being computer literate enables you to form educated opinions in today's digital society and
to take a stand based on accurate information rather than media hype and misinformation
Answer: TRUE
Diff: 1
Section Ref: Understanding the Challenges Facing a Digital Society
58) The discrepancy between the "haves" and "have nots" with regard to computer technology is commonly referred to as the digital society
Answer: FALSE
Diff: 2
Section Ref: Ethics in IT: Knowledge Is Power-Bridging the Digital Divide
59) A TV tuner allows your computer to receive television channels from a cable connection and display them on your computer monitor
Answer: TRUE
Diff: 2
Section Ref: Dig Deeper: Computers Migrate into the Living Room
60) Being means being familiar enough with computers to understand their
capabilities and limitations and knowing how to use them
Answer: computer literate
Diff: 1
Section Ref: Why Should You Become Computer Literate?
Trang 1362) is the act of stealing someone's identity.
Answer: Identity theft
Diff: 1
Section Ref: Becoming a Savvy Computer User and Consumer
63) is the field of study focused on information handling and retrieval
Answer: Information technology
Diff: 1
Section Ref: Being Prepared for Your Career
64) A process known as tracks trends and allows retailers to respond to consumer buying patterns
Answer: data mining
Diff: 3
Section Ref: Retail: Working in a Data Mine
65) is the process of searching huge amounts of data with the hope of finding a pattern
Answer: Data mining
Diff: 2
Section Ref: Retail: Working in a Data Mine
66) UPS workers use scanners with technology to transmit data to a terminal
Answer: Bluetooth
Diff: 2
Section Ref: Business: Data on the Go
67) Using software such as Adobe Illustrator, Adobe Photoshop, and Macromedia Flash allows artists to create art
Answer: digital
Diff: 2
Section Ref: Ink, Paints & a Notebook?
68) Because computer games are best developed for a local market by people native to that market, game development will most likely not be , or sent to other countries
Answer: offshored
Diff: 2
Section Ref: Video Game Design: A Long Way from Pac-Man
69) is the application of computer systems and techniques in the gathering of legal evidence
Answer: Computer forensics
Diff: 2
Section Ref: Law Enforcement: Put Down That Mouse-You're Under Arrest!