Technology in Action
The process of searching huge amounts of data with the hope of finding a pattern is called ________.
A University of Michigan study shows that without Internet access at home, teens from low income households are more likely to use their cell phones to go online than their wealthier counterparts.
Unwanted e-mail is called ________.
Understanding how to use e-mail effectively is one example of what it means to be computer literate.
The goal of ________ is to provide solutions to physical problems, such as providing sight to the blind.
biomedical chip research
The ________ is a strategic plan to focus on the young, talented, mathematical minds of Africa.
The Next Einstein Initiative
Affective computing is a field of study focused on managing and processing information and the automatic retrieval of information.
Being computer literate means being able to separate the real privacy and security risks from things that you don’t have to worry about.
The Microexpression Training Tool software trains law enforcement officials to distinguish true emotion from deception.
SixthSense is a wearable device that consists of a camera, projector, and a mirror that can communicate with the Internet over wireless Bluetooth via a computer.
________ tags, when placed on a car, can be used to record and track in a database all of the vehicle’s movements.
Being computer savvy means you ________.
do all of these
The menuboard of the Khan Academy shows exactly which topic a student has mastered and where they are failing to progress. Answer
Any surface can become an input device using SixthSense.
The for-profit Khan Academy contains over 2,200 videos, and over 1 million students a month use the site.
The Witness Project uses the power of video and a grassroots movement to advocate for ________.
The Microsoft Authorized Refurbisher program supports refurbishers by allowing ________ to be installed for free on refurbished systems.
certain Microsoft operating systems and Office software
When a job is sent to other countries, as many programming jobs have been, it is said to have been data mined.
________ computing relates to emotion or deliberately tries to influence emotion.
A study by the National Research Council concludes that by the year 2030, computers will displace humans in 85 percent of the current occupations.
The difference between people with access to computers and the Internet and those without this access is known as the ________.
Affective computing is a science that attempts to produce machines that understand and can respond to human emotion.
Data mining is the process of searching huge amounts of data with the hope of finding a pattern.
________ is described as the ability of the world’s populace to volunteer and collaborate on large projects.
Hardware refers to the programs that give commands to the computer.
Mastering software animation tools, such as Autodesk 3ds Max, will enable you to create compelling new worlds and new characters.
Multimedia tours using mobile devices and wireless technology are not common in museums and galleries at this time.
One proposed answer to close the digital divide is to promote ________ as a means for low-income families to access the Internet.
Which of the following is NOT necessarily part of being computer literate?
being able to build a computer
As engineers work to create computers that can understand us emotionally, ________ are also evolving toward a more human
________ is a field of study focused on information handling and retrieval of information automatically.
Becoming computer literate means knowing which technologies are on the horizon and how to integrate them with your home setup.
Data mining is the set of techniques used in information handling and retrieval.
Mastery of software programs such as Adobe Illustrator and Corel Painter is essential to creating digital art.
Computer forensics analyzes computer systems in gathering potential legal evidence.
The motivation behind discount cards offered by grocery stores and drugstores is to encourage customers to frequent their stores.
Joining together as a group to use a specific product more efficiently is called ________.
Biomedical chip implants are being used to provide sight to the blind.
One potential application of ________ is to provide sight to the blind.
biomedical chip implants
A technology named ________ lets any piece of print in the real world host a live link to online information and video content.
quick response codes
You cannot be called computer literate unless you have knowledge of higher level computer skills, such as computer programming.
The National Center for the Analysis of Violent Crime database enables detectives to analyze information about similarities between crimes.
Children who do not have access to ________ and ________ won’t be prepared for future employment.
the Internet, computers
A crisis mapping tool such as ________ can collect information to make instantly and publicly available for use in emergencies.
Dancers can be wired with light electronic sensors so that their movements can be digitized for computer analysis.
The ________ lets information be created, distributed, and filtered by users themselves in real time.
The emotional-social prosthesis (ESP) device, developed by a group at the MIT Media Lab, is targeted at helping people who have ________.
________ is the gathering together of groups of people using online tools to connect and exchange ideas.
People who are ________ make the Internet a powerful tool and know how to find the information that they want effectively.
By studying the data produced by ________, scientists hope to improve the prediction of weather phenomena.
Speakers connect to the VGA port.
Large, expensive computers that support hundreds of users simultaneously are called ________.
The S-video and the ________ ports on a computer facilitate connecting the computer to multimedia devices such as TVs and DVD players.
A ________ is approximately 1 million bytes.
The hard drive is a ________ storage device, meaning that it stores data permanently even when the computer is turned off.
A ________ enables your computer to connect to other computers or to the Internet.
network interface card (NIC)
Restarting the computer while it’s powered on is called a cold boot.
________ is a power mode that allows the computer to save an image of the desktop to the hard drive and enter a state of reduced power consumption to save energy.
________ software is the set of programs that enables the computer’s hardware devices and application software to work together.
All the following are examples of input devices EXCEPT a ________.
USB ports are fast replacing traditional ________ ports because of their ability to transfer data quickly.
parallel and serial
Brightness determines how lighter colors appear on the display.
Serial ports and parallel ports have long been used to connect input and output devices to the computer.
The ________ is used in combination with other keys to perform shortcuts and special tasks.
Control (Ctrl) key
Embedded computers have their own programming. They typically do not receive input from you, nor do they interact with other systems
A(n) ________ is a device that looks like a skinny pen but has no ink.
________ are a form of permanent storage that can be seen and accessed from outside the system unit and are typically used for CD and DVD drives.
External drive bays
________ computers are specially designed computer chips that reside inside other devices such as your car or the electronic thermostat in your home.
________ is the place in a computer where the programs and data the computer is currently using are stored.
Any computer parts that you can actually touch are considered to be ________.
A ________ is approximately 1 billion bytes.
Restarting a computer when it is already powered on is called ________.
a warm boot
________ microphones pick up sound from only one direction.
________ ports are now the most common ports for connecting input and output devices to the computer.
Universal serial bus (USB)
________ displays use organic compounds that produce light when exposed to an electric current.
Inkjet printers and laser printers are examples of ________ printers.
________ is data that has been organized or presented in a meaningful fashion.
________ is the applied science concerned with designing and arranging things that people use so that the people and things interact most efficiently and safely.
The small, touch-sensitive area at the base of the keyboard on a notebook computer is known as a ________.
A(n) ________ is where a peripheral device can attach to a computer so that data can be exchanged between it and the operating system.
Which of the following is NOT one of the four major data processing functions of a computer?
analyzing the data or information
A(n) ________ enables you to enter data (text, images, and sound) and instructions (user responses and commands) into the computer
USB ports are causing serial and parallel ports to become legacy technology.
The term ________ describes computing devices or peripherals that use techniques, parts, and methods from an earlier time that are no longer popular.
A ________ was the first devices with touch screen capabilities.
When using Windows 7 power management tools, you really only need to shut down your computer when you need to repair the system, install hardware, or move the system.
________ printers have tiny hammerlike keys that strike the paper through an inked ribbon.
External hard drives are often used to back up data that is contained on the internal hard drive.
Flash drives plug into a(n) ________.
Devices such as monitors and printers that are connected to the computer are called ________.
The ________, housed inside the system unit, transforms the wall voltage to the voltages required by the computer chips.
Digital cameras, camcorders, and webcams are common devices for capturing pictures and video and are all considered output devices.
The ________ contains the central electronic components of the computer.
________ is a form of permanent memory that holds all the instructions the computer needs to start up.
________ plug into slots on the motherboard and provide additional functionality for your computer.
In binary language, each letter of the alphabet, each number, and each special character is made up of a unique combination of ________.
New technologies pushing the boundaries of printing include ________.
all of these
Monitor screen grids are made up of millions of pixels, with each pixel containing ________ subpixels of colors.
________ are shortcut keys that you press to perform special tasks; each software application has its own set of tasks assigned to these keys.
A Web site that allows anyone to add or edit content is called a ________.
Instant messaging is available only from AOL.
In the URL http://www.prenhall.com, the portion labeled .com is the ________.
The Internet backbone refers to ________.
he main pathway of high-speed communications lines through which all Internet traffic flows
The agency that first began funding the Internet was called the ________.
Advanced Research Projects Agency Network
A list of pages within a Web site that you have visited and that usually appears at the top of a page is referred to as a(n) ________.
The Internet2 is a project ________.
to develop new Internet technologies
Although Apple created the Safari browser, there is a Windows-based version available.
Webcasts differ from podcasts in that webcasts ________.
are not updated automatically
Podcasts use which of the following technologies?
Most webcasts are not updated automatically.
E-commerce that involves businesses buying and selling goods and services to other businesses is called ________.
The Internet is referred to as a client/server network.
There are sites that host blogs free of charge.
RSS stands for ________.
Really Simple Syndication
A universal chat client allows you to chat with users who are using a different IM service than you are.
When shopping on the Web, it is better to pay for your purchase with a debit card rather than a credit card.
Web-based e-mail programs are usually more full featured than client-based e-mail systems.
The text version of a Web site’s Internet address is called the ________.
Uniform Resource Locator (URL)
Weblogs or blogs are public, allowing anyone to view them.
All of the following are examples of multimedia EXCEPT:
A subject directory is an outline of Web sites organized by topic.
A webcast is ________.
the broadcast of audio or video content over the Internet
What does Web 2.0 describe?
a trend of new Web applications that combine the functionality of multiple applications
Boolean operators include such words as ________.
all of these
Webcasts can be used to initiate a response from a viewing audience.
One way to mark a Web site so that you can return to it later without typing the address is to ________.
use Favorites or Bookmarks
When evaluating a Web site, testing the relevancy of a site means checking to see if the information in the site is current.
With a client-based e-mail account, such as Microsoft Outlook, you are able to view your e-mail only from the computer on which the client program is installed.
The “s” in https stands for ________.
secure socket layer
The Internet protocol used to upload and download files is HTTP.
When purchasing items over the Internet, be sure to check ________.
all of these
The # sign can be used as a wildcard when conducting searches with most search engines.
n the URL http://www.prenhall.com, the portion labeled http is the ________.
Adobe Reader, Flash Player, and QuickTime Player are all examples of special software programs called ________.
________ is a social networking service that enables you to exchange short text messages with your friends or “followers.”
A(n) ________ is a keyword or term that is assigned to a piece of information such as a Web page, digital image, or video and describes the site so that it can be found again by browsing or searching.
A set of programs that searches the Web to find information is called a ________.
The name of the free Internet browser from Mozilla is ________.
Podcasts enable you to ________.
broadcast over the Internet using compressed audio and video files such as MP3s and MP4s
All of the following are parts of a URL EXCEPT:
What protocol allows files to be transferred from a Web server so that you can view them on your computer using a browser?
The Internet is ________.
a large network of networks
The World Wide Web was invented by ________.
Tim Berners-Lee at CERN
HTTP is the abbreviation for ________.
Hypertext Transfer Protocol
A tag can be assigned to a Web page, a digital image, or a video.
Search engines have which three parts?
a spider, an indexer, and search engine software
There are virtually no privacy risks in using today’s newest social networking sites.
In reference to URLs, domain name and host name are used interchangeably.
If you post a picture on your own social networking site, it could become available to the public via search engines.