Technology in Action, Complete 8e

confidencehandΗλεκτρονική - Συσκευές

27 Νοε 2013 (πριν από 4 χρόνια και 1 μήνα)

328 εμφανίσεις


1

Copyright © 201
2

Pearson Education, Inc. Publishing as Prentice Hall

Technology in Action, Complete 8e

(Evans et al.)
-

Stdnt Txt

Chapter 1: Why Computers Matter to You: Becoming Computer Literate


1) Being ________ means being familiar enough with computers that you understand their
capabilities and limitations.

A) comput
er savvy

B) technology literate

C) computer literate

D) computer competent

Answer: C

Diff: 1

Section Ref: Why Should You Become Computer Literate?


2) All of the following are examples of real security and privacy risks EXCEPT:

A) hackers.

B) viruses.

C)

spam.

D) identity theft.

Answer: C

Diff: 1

Section Ref: Becoming a Savvy Computer User and Consumer


3) Unwanted e
-
mail is called ________.

A) spam

B) spyware

C) adware

D) software

Answer: A

Diff: 1

Section Ref: Becoming a Savvy Computer User and Cons
umer


4) Which of the following is NOT necessarily part of being computer literate?

A) avoiding hackers and viruses

B) protecting your privacy

C) being able to build a computer

D) using the Internet wisely

Answer: C

Diff: 1

Section Ref: Becoming a Savvy
Computer User and Consumer


2

Copyright © 201
2

Pearson Education, Inc. Publishing as Prentice Hall

5) ________ is a field of study focused on information handling and retrieval of information
automatically.

A) Computer forensics

B) Database mining

C) RFID

D) Information technology

Answer: D

Diff: 2

Section Ref: Being Prepar
ed for Your Career


6) The process of searching huge amounts of data with the hope of finding a pattern is called
________.

A) data mining

B) data searching

C) data warehousing

D) data retrieval

Answer: A

Diff: 1

Section Ref: Retail: Working in a Data Mi
ne


7) A ________ is a specially designed scannable sticker that resembles an inkblot and contains
all the important information about a UPS package.

A) mailing label

B) packing label

C) MaxiCode

D) PostCode

Answer: C

Diff: 2

Section Ref: Business: Data
on the Go


8) ________ is a type of wireless communication that transmits data through radio waves.

A) Nanotechnology

B) Bluetooth technology

C) POS technology

D) USB technology

Answer: B

Diff: 2

Section Ref: Business: Data on the Go


3

Copyright © 201
2

Pearson Education, Inc. Publishing as Prentice Hall

9) When a job is se
nt to other countries, as many programming jobs have been, it is said to have
been ________.

A) offshored

B) resourced

C) exported

D) imported

Answer: A

Diff: 2

Section Ref: Video Game Design: A Long Way from Pac
-
Man


10) A ________ is a small device tha
t enables users to carry digital information.

A) PSS

B) Smartphone

C) GPS player

D) VeriChip

Answer: B

Diff: 2

Section Ref: Education: Teaching and Learning


11) Which of the following do today's educators NOT need to be familiar with to create
construct
ive computerized lessons and to interact with students?

A) computers

B) the Internet

C) programs like Moodle or Blackboard

D) Web authoring software

Answer: D

Diff: 2

Section Ref: Education: Teaching and Learning


12) Many online courses are designed to
use management software like ________ so that
students can communicate outside of class, take quizzes online, and find their class materials
easily.

A) Blackboard or Moodle

B) Microsoft Access

C) Adobe Photoshop

D) CAD or Visio

Answer: A

Diff: 2

Section R
ef: Education: Teaching and Learning


4

Copyright © 201
2

Pearson Education, Inc. Publishing as Prentice Hall

13) To set up a(n) ________, you must have an appropriate computer and digital devices
connected to a home network.

A) digital home

B) e
-
business

C) Web site

D) digital entertainment center

Answer: A

Diff: 1

Section
Ref: Dig Deeper: Computers Migrate into the Living Room


14) The ability to recover and read deleted or damaged files from a criminal's computer is an
example of a law enforcement specialty called ________.

A) robotics

B) RFID simulation

C) computer foren
sics

D) HALO animation

Answer: C

Diff: 2

Section Ref: Law Enforcement: Put Down That Mouse
-
You're Under Arrest!


15) ________ is the application of computer systems and techniques to gather potential legal
evidence.

A) Data mining processes

B) POS skill
s

C) Information gathering

D) Computer forensics

Answer: D

Diff: 1

Section Ref: Law Enforcement: Put Down That Mouse
-
You're Under Arrest!


16) ________ tags, when placed on an animal, can be used to record and track in a database all
of the animal's move
ments.

A) RFID

B) POS

C) PPS

D) GPS

Answer: A

Diff: 2

Section Ref: Agriculture: High
-
Tech Down on the Farm


5

Copyright © 201
2

Pearson Education, Inc. Publishing as Prentice Hall

17) ________ tags are small versions of the roadway electronic toll system used in many states
to automate paying tolls as motorists pass through

the toll station.

A) PDA

B) RFID

C) PSS

D) UPS

Answer: B

Diff: 2

Section Ref: Agriculture: High
-
Tech Down on the Farm


18) Surgeons use ________ to perform delicate operations by manipulating devices through
computers instead of manually.

A) forecastin
g

B) computer forensics

C) simulation

D) robotics

Answer: D

Diff: 2

Section Ref: Medicine: Technologies of Today and Tomorrow


19) Technology no longer protected by copyright, available to everyone, is considered to be
________.

A) proprietary

B) open

C)

experimental

D) in the public domain

Answer: D

Diff: 2

Section Ref: Medicine: Technologies of Today and Tomorrow


20) Medical students can train on ________ and experience firsthand how a human would react
to a particular treatment.

A) mannequins

B) pat
ient simulators

C) robots

D) a 3D anatomical system

Answer: B

Diff: 3

Section Ref: Medicine: Technologies of Today and Tomorrow


6

Copyright © 201
2

Pearson Education, Inc. Publishing as Prentice Hall

21) The ________ is a global effort in which bioengineers are creating realistic computer
simulations of all systems and feat
ures of the human anatomy.

A) Y2K Project

B) Physiome Project

C) BrainGate Project

D) RFID Project

Answer: B

Diff: 2

Section Ref: Medicine: Technologies of Today and Tomorrow


22) The goal of ________ is to provide solutions to physical problems, such a
s providing sight to
the blind.

A) 3D animations

B) computer forensics

C) biomedical chip research

D) RFID technology

Answer: C

Diff: 3

Section Ref: Medicine: The Chip Within


23) One type of chip already being implanted in humans as a means of verifying

a person's
identity is called a(n) ________.

A) DogTag

B) ImplantChip

C) VeriChip

D) RFID chip

Answer: C

Diff: 2

Section Ref: Medicine: The Chip Within


24) One potential application of ________ is to provide sight to the blind.

A) RFID tags

B) patient
simulators

C) biomedical chip implants

D) VeriChips

Answer: C

Diff: 2

Section Ref: Medicine: The Chip Within


7

Copyright © 201
2

Pearson Education, Inc. Publishing as Prentice Hall

25) By studying the data produced by ________, scientists hope to improve the prediction of
weather phenomena.

A) GPS

B) simulations

C) VeriChip
s

D) PSSs

Answer: B

Diff: 1

Section Ref: Science: Simulating Reality


26) ________ is the science revolving around building devices on an extremely small scale.

A) Nanotechnology

B) Microtechnology

C) Computer forensics

D) Artificial intelligence

Answer:

A

Diff: 2

Section Ref: Nanotechnology: Careers Yet to Come


27) ________ is the study of molecules and structures whose sizes range from 1 to 100
nanometers.

A) Artificial intelligence

B) Microelectrodes

C) Computer forensics

D) Nanoscience

Answer: D

D
iff: 1

Section Ref: Nanotechnology: Careers Yet to Come


28) The prefix
nano

stands for ________.

A) one
-
hundredth

B) one
-
millionth

C) one
-
billionth

D) one
-
trillionth

Answer: C

Diff: 2

Section Ref: Nanotechnology: Careers Yet to Come

29) A nanometer is
________.

A) one
-
tenth of a meter

B) one
-
millionth of a meter

C) one
-
billionth of a meter

D) the size of a human hair

Answer: C

Diff: 2

Section Ref: Nanotechnology: Careers Yet to Come



8

Copyright © 201
2

Pearson Education, Inc. Publishing as Prentice Hall

30) ________ computing relates to emotion or deliberately tries to i
nfluence emotion.

A) Affective

B) Personal

C) Psychological

D) Emotional

Answer: A

Diff: 2

Section Ref: Psychology: You Should Smile . . . Now


31) While engineers work to create computers that can understand us emotionally, ________ are
also evolving to
ward a more human appearance.

A) affecting computing techniques

B) RFIDs

C) computer systems

D) ESP systems

Answer: C

Diff: 2

Section Ref: Psychology: You Should Smile . . . Now


32) The emotional
-
social prosthesis (ESP) device, developed by a group at t
he MIT Media Lab,
is targeted at helping people who have ________.

A) paralysis

B) diabetes

C) autism

D) brain damage

Answer: C

Diff: 2

Section Ref: Psychology: You Should Smile . . . Now

33) Children who do not have access to ________ and ________ won't

be prepared for future
employment.

A) databases, data mining

B) information, data

C) television, video games

D) the Internet, computers

Answer: D

Diff: 2

Section Ref: Ethics in IT: Knowledge Is Power
-
Bridging the Digital Divide



9

Copyright © 201
2

Pearson Education, Inc. Publishing as Prentice Hall

34) The difference betw
een people with access to computers and the Internet and those without
this access is known as the ________.

A) Web divide

B) Internet divide

C) digital divide

D) broadband divide

Answer: C

Diff: 1

Section Ref: Ethics in IT: Knowledge Is Power
-
Bridging t
he Digital Divide


35) The Microsoft Authorized Refurbisher program supports refurbishers by allowing ________
to be installed for free on refurbished systems.

A) certain Microsoft operating systems and Office software

B) certain gaming software packages

C) antivirus software

D) specific operating system utilities

Answer: A

Diff: 3

Section Ref: Ethics in IT: Knowledge Is Power
-
Bridging the Digital Divide


36) ________ is the nerve center of any digital home, allowing you to interface with the different
d
igital devices connected to the network.

A) The Internet

B) A modem

C) A computer

D) A server

Answer: C

Diff: 1

Section Ref: Dig Deeper: Computers Migrate into the Living Room

37) A ________ allows you to transfer media from your computer to other media
devices (such
as a plasma TV).

A) digital TV

B) network adapter

C) digital media adapter

D) radio tuner

Answer: C

Diff: 3

Section Ref: Dig Deeper: Computers Migrate into the Living Room



10

Copyright © 201
2

Pearson Education, Inc. Publishing as Prentice Hall

38) A ________ is a special device that is installed in your compu
ter and allows it to
communicate with other devices on the network.

A) media center extender

B) network adapter

C) modem

D) digital media adapter

Answer: B

Diff: 1

Section Ref: Dig Deeper: Computers Migrate into the Living Room


39) The Microsoft Authori
zed Refurbisher program supports refurbishers by allowing certain
Microsoft operating systems and applications to be installed for free on refurbished computers.

Answer: TRUE

Diff: 3

Section Ref: Ethics in IT: Knowledge Is Power
-
Bridging the Digital Divi
de


40) You cannot be called computer literate unless you have knowledge of higher level computer
skills, such as computer programming.

Answer: FALSE

Diff: 1

Section Ref: Why Should You Become Computer Literate?


41) Becoming computer literate includes b
eing able to understand and form knowledgeable
opinions on the challenges facing a digital society.

Answer: TRUE

Diff: 1

Section Ref: Understanding the Challenges Facing a Digital Society


42) Data mining is the process of searching huge amounts of data
with the hope of finding a
pattern.

Answer: TRUE

Diff: 1

Section Ref: Retail: Working in a Data Mine

43) Information technology careers are on the rise.

Answer: TRUE

Diff: 2

Section Ref: Being Prepared for Your Career


44) Data mining is the set of tec
hniques used in information handling and retrieval.

Answer: FALSE

Diff: 2

Section Ref: Being Prepared for Your Career



11

Copyright © 201
2

Pearson Education, Inc. Publishing as Prentice Hall

45) Hardware refers to the programs that give commands to the computer.

Answer: FALSE

Diff: 2

Section Ref: Becoming a Savvy Computer

User and Consumer


46) When a job is sent to other countries, as many programming jobs have been, it is said to have
been exported.

Answer: FALSE

Diff: 1

Section Ref: Video Game Design: A Long Way from Pac
-
Man


47) Trend
-
spotting programs developed for
business have been used to predict criminal activity.

Answer: TRUE

Diff: 2

Section Ref: Law Enforcement: Put Down That Mouse
-
You're Under Arrest!


48) Computer forensics is the application of computer systems in gathering potential legal
evidence.

Answer
: TRUE

Diff: 1

Section Ref: Law Enforcement: Put Down That Mouse
-
You're Under Arrest!


49) Today, because of advances in computer technology, it is not theoretically necessary for a
doctor to be in the same room as his or her patient.

Answer: TRUE

Diff:

2

Section Ref: Medicine: Technologies of Today and Tomorrow


50) Copyrighted technology is said to be in the public domain.

Answer: FALSE

Diff: 1

Section Ref: Medicine: Technologies of Today and Tomorrow

51) Biomedical chip implants are being used to p
rovide sight to the blind.

Answer: TRUE

Diff: 2

Section Ref: Medicine: The Chip Within


52) Ranchers use VeriChips to track their cattle.

Answer: FALSE

Diff: 2

Section Ref: Agriculture: High
-
Tech Down on the Farm


53) Nanostructures represent the small
est human
-
made structures that can be built.

Answer: TRUE

Diff: 2

Section Ref: Nanotechnology: Careers Yet to Come


12

Copyright © 201
2

Pearson Education, Inc. Publishing as Prentice Hall

54) Affective computing is a science that attempts to produce machines that understand and can
respond to human emotion.

Answer: TRUE

Diff
: 2

Section Ref: Psychology: You Should Smile . . . Now


55) Employers have the right to monitor network traffic on employee systems used at work.

Answer: TRUE

Diff: 2

Section Ref: Understanding the Challenges Facing a Digital Society


56) Although the
automotive industry has become more computerized in the last ten years, there
is still not a great need for automotive technicians to be computer literate.

Answer: FALSE

Diff: 1

Section Ref: Automotive Technology: Sensors and CPUs


57) Being computer lit
erate enables you to form educated opinions in today's digital society and
to take a stand based on accurate information rather than media hype and misinformation.

Answer: TRUE

Diff: 1

Section Ref: Understanding the Challenges Facing a Digital Society

58
) The discrepancy between the "haves" and "have nots" with regard to computer technology is
commonly referred to as the digital society.

Answer: FALSE

Diff: 2

Section Ref: Ethics in IT: Knowledge Is Power
-
Bridging the Digital Divide


59) A TV tuner allow
s your computer to receive television channels from a cable connection and
display them on your computer monitor.

Answer: TRUE

Diff: 2

Section Ref: Dig Deeper: Computers Migrate into the Living Room


60) Being ________ means being familiar enough with co
mputers to understand their
capabilities and limitations and knowing how to use them.

Answer: computer literate

Diff: 1

Section Ref: Why Should You Become Computer Literate?


61) The term ________ refers to the programs that give commands to the computer
.

Answer: software

Diff: 1

Section Ref: Becoming a Savvy Computer User and Consumer



13

Copyright © 201
2

Pearson Education, Inc. Publishing as Prentice Hall

62) ________ is the act of stealing someone's identity.

Answer: Identity theft

Diff: 1

Section Ref: Becoming a Savvy Computer User and Consumer


63) ________ is the f
ield of study focused on information handling and retrieval.

Answer: Information technology

Diff: 1

Section Ref: Being Prepared for Your Career


64) A process known as ________ tracks trends and allows retailers to respond to consumer
buying patterns.

An
swer: data mining

Diff: 3

Section Ref: Retail: Working in a Data Mine


65) ________ is the process of searching huge amounts of data with the hope of finding a
pattern.

Answer: Data mining

Diff: 2

Section Ref: Retail: Working in a Data Mine

66) UPS wor
kers use scanners with ________ technology to transmit data to a terminal.

Answer: Bluetooth

Diff: 2

Section Ref: Business: Data on the Go


67) Using software such as Adobe Illustrator, Adobe Photoshop, and Macromedia Flash allows
artists to create _____
___ art.

Answer: digital

Diff: 2

Section Ref: Ink, Paints & a Notebook?


68) Because computer games are best developed for a local market by people native to that
market, game development will most likely not be ________, or sent to other countries.

Ans
wer: offshored

Diff: 2

Section Ref: Video Game Design: A Long Way from Pac
-
Man


69) ________ is the application of computer systems and techniques in the gathering of legal
evidence.

Answer: Computer forensics

Diff: 2

Section Ref: Law Enforcement: Put
Down That Mouse
-
You're Under Arrest!



14

Copyright © 201
2

Pearson Education, Inc. Publishing as Prentice Hall

70) A(n) ________ is a special device that is installed in your computer that allows it to
communicate with other devices on the network.

Answer: network adapter

Diff: 2

Section Ref: Dig Deeper: Computers Migrate in
to the Living Room


71) A(n) ________ allows your computer to receive television channels from a cable connection
and display them on your computer monitor.

Answer: TV tuner

Diff: 2

Section Ref: Dig Deeper: Computers Migrate into the Living Room


72) Far
mers can use ________ to track the location of their cattle.

Answer: RFID tags

Diff: 2

Section Ref: Agriculture: High
-
Tech Down on the Farm

73) Surgeons can use computer
-
guided ________ to perform delicate surgery.

Answer: robots

Diff: 2

Section Ref: M
edicine: Technologies of Today and Tomorrow


74) ________ are life
-
sized mannequins that have a pulse and a heartbeat and respond to
procedures just like humans do.

Answer: Patient simulators

Diff: 2

Section Ref: Medicine: Technologies of Today and Tomor
row


75) Technology no longer protected by copyright, so it is available to everyone, is considered to
be in the ________.

Answer: public domain

Diff: 2

Section Ref: Medicine: Technologies of Today and Tomorrow


76) One type of chip being implanted in hu
mans as a means of verifying a person's identity is
called the ________.

Answer: VeriChip

Diff: 2

Section Ref: Medicine: The Chip Within


77) Scientists use ________, or models, to study tornadoes and to re
-
create the ruins of Pompeii.

Answer: simulatio
ns

Diff: 2

Section Ref: Science: Simulating Reality



15

Copyright © 201
2

Pearson Education, Inc. Publishing as Prentice Hall

78) In the future, ________, which are extremely small conductors, could be used to create
extremely small pathways in computer chips.

Answer: nanowires

Diff: 3

Section Ref: Nanotechnology: Careers Y
et to Come


79) ________ is the science revolving around the use of nanostructures to build devices on an
extremely small scale.

Answer: Nanotechnology

Diff: 2

Section Ref: Nanotechnology: Careers Yet to Come

80) Researchers are investigating the use of
________ to deliver precise doses of drugs on a
molecule
-
by
-
molecule basis within the human bloodstream.

Answer: nanostructures

Diff: 3

Section Ref: Nanotechnology: Careers Yet to Come


81) ________ is the study of molecules and structures ranging in siz
e from 1 to 100 nanometers.

Answer: Nanoscience

Diff: 2

Section Ref: Nanotechnology: Careers Yet to Come


82) ________ computing relates to emotion or deliberately tries to influence emotion.

Answer: Affective

Diff: 2

Section Ref: Psychology: You Shoul
d Smile . . . Now


83) The discrepancy between the "haves" and the "have nots" with regard to computer
technology is commonly referred to as the ________.

Answer: digital divide

Diff: 2

Section Ref: Ethics in IT: Knowledge Is Power
-
Bridging the Digital D
ivide


84) ________ versions of identity chips are used in hospitals to monitor the locations of newborn
babies.

Answer: Nonimplant

Diff: 2

Section Ref: Medicine: The Chip Within


85) An application from NASA, called ________, makes available some 10 tri
llion bytes of
imagery of the Earth.

Answer: World Wind

Diff: 3

Section Ref: Bits and Bytes: NASA Wants You . . . to Learn



16

Copyright © 201
2

Pearson Education, Inc. Publishing as Prentice Hall

86) In an automobile, ________ measure everything from air pressure to temperature to throttle
position.

Answer: sensors

Diff: 2

Section Ref: Automotive Technology: Sensors and CPUs

87) Nanotechnology research has helped create carbon ________, which can deliver patient
medicine and information.

Answer: nanotubes

Diff: 3

Section Ref: Nanotechnology: Careers Yet to Come


88) ____
____ is a wearable system that isolates movements and facial expressions of people to
help determine their mood and intention.

Answer:

ESP

The emotional
-
social prosthesis

Diff: 3

Section Ref: Psychology: You Should Smile . . . Now


89) ________ computing

is a science that attempts to produce machines that understand and can
respond to human emotion.

Answer: Affective

Diff: 3

Section Ref: Psychology: You Should Smile . . . Now


90) Match the following fields to the related computer technology.

I.

medicin
e

A.

Internet research and virtual tours

II.

business

B.

digital recreation of ruins

III.

law enforcement

C.

bioengineering and patient simulators

IV.

education

D.

computer forensics

V.

archaeology

E.

data mining

Answer: C, E, D, A, B

Diff: 3

Section Ref:

Multiple Locations in the Chapter


91) Match the following terms to their meanings.

I.

Smartphone

A.

biomedical implant placed under the skin used for identification

II.

µ
-
chip

B.

identification tag used to track animals

III.

RFID

C.

device that enables
user to carry digital information

IV.

VeriChip

D.

identity chip small enough to be ingested without a person's knowledge

Answer: C, D, B, A

Diff: 3

Section Ref: Multiple Locations in the Chapter


17

Copyright © 201
2

Pearson Education, Inc. Publishing as Prentice Hall

92) Match the following terms to their meanings.

I.

comp
uter forensics

A.

computing relating to emotion

II.

computer literacy

B.

using computer systems to gather legal evidence

III.

information technology

C.

understanding the capabilities and limitations of computers

IV.

affective computing

D.

the handling and
retrieval of information

Answer: B, C, D, A

Diff: 3

Section Ref: Multiple Locations in the Chapter


93) Match the following terms to their meanings.

I.

digital home

A.

device that includes plasma and liquid display

II.

digital TV

B.

discrepancy between
computer technologies haves and



have
nots

III.

digital divide

C.

changes a computer into a digital recorder

IV.

digital video recorder software

D.

computer and digital devices connected to a home
network

Answer: D, A, B, C

Diff: 3

Section Ref: Multi
ple Locations in the Chapter


94) Match the following terms to their meanings.

I.

Bluetooth technology

A.

one
-
billionth of a meter

II.

nanoscience

B.

extremely small conductor

III.

nanometer

C.

study of molecules ranging in size from 1 to 100 nanometers

IV
.

nanowire

D.

a type of wireless communication

Answer: D, C, A, B

Diff: 2

Section Ref: Multiple Locations in the Chapter


95) Match the following fields to the related computer technology.

I.

shipping

A.

uses Bluetooth technology

II.

video gaming

B.

uses

computer forensics animations

III.

education

C.

uses management software such as Moodle

IV.

legal system

D.

uses software animation tools

Answer: A, D, C, B

Diff: 2

Section Ref: Multiple Locations in the Chapter