Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Full file at http://testbankcart.eu/Test-Bank-for-Technology-In-Action-8th-Edition-by-Evans Technology in Action, Complete 8e (Evans et al.) - Stdnt Txt Chapter 1: Why Computers Matter to You: Becoming Computer Literate 1) Being ________ means being familiar enough with computers that you understand their capabilities and limitations. A) computer savvy B) technology literate C) computer literate D) computer competent Answer: C Diff: 1 Section Ref: Why Should You Become Computer Literate? 2) All of the following are examples of real security and privacy risks EXCEPT: A) hackers. B) viruses. C) spam. D) identity theft. Answer: C Diff: 1 Section Ref: Becoming a Savvy Computer User and Consumer 3) Unwanted e-mail is called ________. A) spam B) spyware C) adware D) software Answer: A Diff: 1 Section Ref: Becoming a Savvy Computer User and Consumer 4) Which of the following is NOT necessarily part of being computer literate? A) avoiding hackers and viruses B) protecting your privacy C) being able to build a computer D) using the Internet wisely Answer: C Diff: 1 Section Ref: Becoming a Savvy Computer User and Consumer 1 Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall Full file at http://testbankcart.eu/Test-Bank-for-Technology-In-Action-8th-Edition-by-Evans 5) ________ is a field of study focused on information handling and retrieval of information automatically. A) Computer forensics B) Database mining C) RFID D) Information technology Answer: D Diff: 2 Section Ref: Being Prepared for Your Career 6) The process of searching huge amounts of data with the hope of finding a pattern is called ________. A) data mining B) data searching C) data warehousing D) data retrieval Answer: A Diff: 1 Section Ref: Retail: Working in a Data Mine 7) A ________ is a specially designed scannable sticker that resembles an inkblot and contains all the important information about a UPS package. A) mailing label B) packing label C) MaxiCode D) PostCode Answer: C Diff: 2 Section Ref: Business: Data on the Go 8) ________ is a type of wireless communication that transmits data through radio waves. A) Nanotechnology B) Bluetooth technology C) POS technology D) USB technology Answer: B Diff: 2 Section Ref: Business: Data on the Go 2 Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall Full file at http://testbankcart.eu/Test-Bank-for-Technology-In-Action-8th-Edition-by-Evans 9) When a job is sent to other countries, as many programming jobs have been, it is said to have been ________. A) offshored B) resourced C) exported D) imported Answer: A Diff: 2 Section Ref: Video Game Design: A Long Way from Pac-Man 10) A ________ is a small device that enables users to carry digital information. A) PSS B) Smartphone C) GPS player D) VeriChip Answer: B Diff: 2 Section Ref: Education: Teaching and Learning 11) Which of the following do today's educators NOT need to be familiar with to create constructive computerized lessons and to interact with students? A) computers B) the Internet C) programs like Moodle or Blackboard D) Web authoring software Answer: D Diff: 2 Section Ref: Education: Teaching and Learning 12) Many online courses are designed to use management software like ________ so that students can communicate outside of class, take quizzes online, and find their class materials easily. A) Blackboard or Moodle B) Microsoft Access C) Adobe Photoshop D) CAD or Visio Answer: A Diff: 2 Section Ref: Education: Teaching and Learning 3 Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall Full file at http://testbankcart.eu/Test-Bank-for-Technology-In-Action-8th-Edition-by-Evans 13) To set up a(n) ________, you must have an appropriate computer and digital devices connected to a home network. A) digital home B) e-business C) Web site D) digital entertainment center Answer: A Diff: 1 Section Ref: Dig Deeper: Computers Migrate into the Living Room 14) The ability to recover and read deleted or damaged files from a criminal's computer is an example of a law enforcement specialty called ________. A) robotics B) RFID simulation C) computer forensics D) HALO animation Answer: C Diff: 2 Section Ref: Law Enforcement: Put Down That Mouse-You're Under Arrest! 15) ________ is the application of computer systems and techniques to gather potential legal evidence. A) Data mining processes B) POS skills C) Information gathering D) Computer forensics Answer: D Diff: 1 Section Ref: Law Enforcement: Put Down That Mouse-You're Under Arrest! 16) ________ tags, when placed on an animal, can be used to record and track in a database all of the animal's movements. A) RFID B) POS C) PPS D) GPS Answer: A Diff: 2 Section Ref: Agriculture: High-Tech Down on the Farm 4 Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall Full file at http://testbankcart.eu/Test-Bank-for-Technology-In-Action-8th-Edition-by-Evans 17) ________ tags are small versions of the roadway electronic toll system used in many states to automate paying tolls as motorists pass through the toll station. A) PDA B) RFID C) PSS D) UPS Answer: B Diff: 2 Section Ref: Agriculture: High-Tech Down on the Farm 18) Surgeons use ________ to perform delicate operations by manipulating devices through computers instead of manually. A) forecasting B) computer forensics C) simulation D) robotics Answer: D Diff: 2 Section Ref: Medicine: Technologies of Today and Tomorrow 19) Technology no longer protected by copyright, available to everyone, is considered to be ________. A) proprietary B) open C) experimental D) in the public domain Answer: D Diff: 2 Section Ref: Medicine: Technologies of Today and Tomorrow 20) Medical students can train on ________ and experience firsthand how a human would react to a particular treatment. A) mannequins B) patient simulators C) robots D) a 3D anatomical system Answer: B Diff: 3 Section Ref: Medicine: Technologies of Today and Tomorrow 5 Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall Full file at http://testbankcart.eu/Test-Bank-for-Technology-In-Action-8th-Edition-by-Evans 21) The ________ is a global effort in which bioengineers are creating realistic computer simulations of all systems and features of the human anatomy. A) Y2K Project B) Physiome Project C) BrainGate Project D) RFID Project Answer: B Diff: 2 Section Ref: Medicine: Technologies of Today and Tomorrow 22) The goal of ________ is to provide solutions to physical problems, such as providing sight to the blind. A) 3D animations B) computer forensics C) biomedical chip research D) RFID technology Answer: C Diff: 3 Section Ref: Medicine: The Chip Within 23) One type of chip already being implanted in humans as a means of verifying a person's identity is called a(n) ________. A) DogTag B) ImplantChip C) VeriChip D) RFID chip Answer: C Diff: 2 Section Ref: Medicine: The Chip Within 24) One potential application of ________ is to provide sight to the blind. A) RFID tags B) patient simulators C) biomedical chip implants D) VeriChips Answer: C Diff: 2 Section Ref: Medicine: The Chip Within 6 Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall Full file at http://testbankcart.eu/Test-Bank-for-Technology-In-Action-8th-Edition-by-Evans 25) By studying the data produced by ________, scientists hope to improve the prediction of weather phenomena. A) GPS B) simulations C) VeriChips D) PSSs Answer: B Diff: 1 Section Ref: Science: Simulating Reality 26) ________ is the science revolving around building devices on an extremely small scale. A) Nanotechnology B) Microtechnology C) Computer forensics D) Artificial intelligence Answer: A Diff: 2 Section Ref: Nanotechnology: Careers Yet to Come 27) ________ is the study of molecules and structures whose sizes range from 1 to 100 nanometers. A) Artificial intelligence B) Microelectrodes C) Computer forensics D) Nanoscience Answer: D Diff: 1 Section Ref: Nanotechnology: Careers Yet to Come 28) The prefix nano stands for ________. A) one-hundredth B) one-millionth C) one-billionth D) one-trillionth Answer: C Diff: 2 Section Ref: Nanotechnology: Careers Yet to Come 29) A nanometer is ________. A) one-tenth of a meter B) one-millionth of a meter C) one-billionth of a meter D) the size of a human hair Answer: C Diff: 2 Section Ref: Nanotechnology: Careers Yet to Come 7 Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall Full file at http://testbankcart.eu/Test-Bank-for-Technology-In-Action-8th-Edition-by-Evans 30) ________ computing relates to emotion or deliberately tries to influence emotion. A) Affective B) Personal C) Psychological D) Emotional Answer: A Diff: 2 Section Ref: Psychology: You Should Smile . . . Now 31) While engineers work to create computers that can understand us emotionally, ________ are also evolving toward a more human appearance. A) affecting computing techniques B) RFIDs C) computer systems D) ESP systems Answer: C Diff: 2 Section Ref: Psychology: You Should Smile . . . Now 32) The emotional-social prosthesis (ESP) device, developed by a group at the MIT Media Lab, is targeted at helping people who have ________. A) paralysis B) diabetes C) autism D) brain damage Answer: C Diff: 2 Section Ref: Psychology: You Should Smile . . . Now 33) Children who do not have access to ________ and ________ won't be prepared for future employment. A) databases, data mining B) information, data C) television, video games D) the Internet, computers Answer: D Diff: 2 Section Ref: Ethics in IT: Knowledge Is Power-Bridging the Digital Divide 8 Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall Full file at http://testbankcart.eu/Test-Bank-for-Technology-In-Action-8th-Edition-by-Evans 34) The difference between people with access to computers and the Internet and those without this access is known as the ________. A) Web divide B) Internet divide C) digital divide D) broadband divide Answer: C Diff: 1 Section Ref: Ethics in IT: Knowledge Is Power-Bridging the Digital Divide 35) The Microsoft Authorized Refurbisher program supports refurbishers by allowing ________ to be installed for free on refurbished systems. A) certain Microsoft operating systems and Office software B) certain gaming software packages C) antivirus software D) specific operating system utilities Answer: A Diff: 3 Section Ref: Ethics in IT: Knowledge Is Power-Bridging the Digital Divide 36) ________ is the nerve center of any digital home, allowing you to interface with the different digital devices connected to the network. A) The Internet B) A modem C) A computer D) A server Answer: C Diff: 1 Section Ref: Dig Deeper: Computers Migrate into the Living Room 37) A ________ allows you to transfer media from your computer to other media devices (such as a plasma TV). A) digital TV B) network adapter C) digital media adapter D) radio tuner Answer: C Diff: 3 Section Ref: Dig Deeper: Computers Migrate into the Living Room 9 Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall Full file at http://testbankcart.eu/Test-Bank-for-Technology-In-Action-8th-Edition-by-Evans 38) A ________ is a special device that is installed in your computer and allows it to communicate with other devices on the network. A) media center extender B) network adapter C) modem D) digital media adapter Answer: B Diff: 1 Section Ref: Dig Deeper: Computers Migrate into the Living Room 39) The Microsoft Authorized Refurbisher program supports refurbishers by allowing certain Microsoft operating systems and applications to be installed for free on refurbished computers. Answer: TRUE Diff: 3 Section Ref: Ethics in IT: Knowledge Is Power-Bridging the Digital Divide 40) You cannot be called computer literate unless you have knowledge of higher level computer skills, such as computer programming. Answer: FALSE Diff: 1 Section Ref: Why Should You Become Computer Literate? 41) Becoming computer literate includes being able to understand and form knowledgeable opinions on the challenges facing a digital society. Answer: TRUE Diff: 1 Section Ref: Understanding the Challenges Facing a Digital Society 42) Data mining is the process of searching huge amounts of data with the hope of finding a pattern. Answer: TRUE Diff: 1 Section Ref: Retail: Working in a Data Mine 43) Information technology careers are on the rise. Answer: TRUE Diff: 2 Section Ref: Being Prepared for Your Career 44) Data mining is the set of techniques used in information handling and retrieval. Answer: FALSE Diff: 2 Section Ref: Being Prepared for Your Career 10 Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall Full file at http://testbankcart.eu/Test-Bank-for-Technology-In-Action-8th-Edition-by-Evans 45) Hardware refers to the programs that give commands to the computer. Answer: FALSE Diff: 2 Section Ref: Becoming a Savvy Computer User and Consumer 46) When a job is sent to other countries, as many programming jobs have been, it is said to have been exported. Answer: FALSE Diff: 1 Section Ref: Video Game Design: A Long Way from Pac-Man 47) Trend-spotting programs developed for business have been used to predict criminal activity. Answer: TRUE Diff: 2 Section Ref: Law Enforcement: Put Down That Mouse-You're Under Arrest! 48) Computer forensics is the application of computer systems in gathering potential legal evidence. Answer: TRUE Diff: 1 Section Ref: Law Enforcement: Put Down That Mouse-You're Under Arrest! 49) Today, because of advances in computer technology, it is not theoretically necessary for a doctor to be in the same room as his or her patient. Answer: TRUE Diff: 2 Section Ref: Medicine: Technologies of Today and Tomorrow 50) Copyrighted technology is said to be in the public domain. Answer: FALSE Diff: 1 Section Ref: Medicine: Technologies of Today and Tomorrow 51) Biomedical chip implants are being used to provide sight to the blind. Answer: TRUE Diff: 2 Section Ref: Medicine: The Chip Within 52) Ranchers use VeriChips to track their cattle. Answer: FALSE Diff: 2 Section Ref: Agriculture: High-Tech Down on the Farm 53) Nanostructures represent the smallest human-made structures that can be built. Answer: TRUE Diff: 2 Section Ref: Nanotechnology: Careers Yet to Come 11 Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall Full file at http://testbankcart.eu/Test-Bank-for-Technology-In-Action-8th-Edition-by-Evans 54) Affective computing is a science that attempts to produce machines that understand and can respond to human emotion. Answer: TRUE Diff: 2 Section Ref: Psychology: You Should Smile . . . Now 55) Employers have the right to monitor network traffic on employee systems used at work. Answer: TRUE Diff: 2 Section Ref: Understanding the Challenges Facing a Digital Society 56) Although the automotive industry has become more computerized in the last ten years, there is still not a great need for automotive technicians to be computer literate. Answer: FALSE Diff: 1 Section Ref: Automotive Technology: Sensors and CPUs 57) Being computer literate enables you to form educated opinions in today's digital society and to take a stand based on accurate information rather than media hype and misinformation. Answer: TRUE Diff: 1 Section Ref: Understanding the Challenges Facing a Digital Society 58) The discrepancy between the "haves" and "have nots" with regard to computer technology is commonly referred to as the digital society. Answer: FALSE Diff: 2 Section Ref: Ethics in IT: Knowledge Is Power-Bridging the Digital Divide 59) A TV tuner allows your computer to receive television channels from a cable connection and display them on your computer monitor. Answer: TRUE Diff: 2 Section Ref: Dig Deeper: Computers Migrate into the Living Room 60) Being ________ means being familiar enough with computers to understand their capabilities and limitations and knowing how to use them. Answer: computer literate Diff: 1 Section Ref: Why Should You Become Computer Literate? 61) The term ________ refers to the programs that give commands to the computer. Answer: software Diff: 1 Section Ref: Becoming a Savvy Computer User and Consumer 12 Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall Full file at http://testbankcart.eu/Test-Bank-for-Technology-In-Action-8th-Edition-by-Evans 62) ________ is the act of stealing someone's identity. Answer: Identity theft Diff: 1 Section Ref: Becoming a Savvy Computer User and Consumer 63) ________ is the field of study focused on information handling and retrieval. Answer: Information technology Diff: 1 Section Ref: Being Prepared for Your Career 64) A process known as ________ tracks trends and allows retailers to respond to consumer buying patterns. Answer: data mining Diff: 3 Section Ref: Retail: Working in a Data Mine 65) ________ is the process of searching huge amounts of data with the hope of finding a pattern. Answer: Data mining Diff: 2 Section Ref: Retail: Working in a Data Mine 66) UPS workers use scanners with ________ technology to transmit data to a terminal. Answer: Bluetooth Diff: 2 Section Ref: Business: Data on the Go 67) Using software such as Adobe Illustrator, Adobe Photoshop, and Macromedia Flash allows artists to create ________ art. Answer: digital Diff: 2 Section Ref: Ink, Paints & a Notebook? 68) Because computer games are best developed for a local market by people native to that market, game development will most likely not be ________, or sent to other countries. Answer: offshored Diff: 2 Section Ref: Video Game Design: A Long Way from Pac-Man 69) ________ is the application of computer systems and techniques in the gathering of legal evidence. Answer: Computer forensics Diff: 2 Section Ref: Law Enforcement: Put Down That Mouse-You're Under Arrest! 13 Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall Full file at http://testbankcart.eu/Test-Bank-for-Technology-In-Action-8th-Edition-by-Evans 70) A(n) ________ is a special device that is installed in your computer that allows it to communicate with other devices on the network. Answer: network adapter Diff: 2 Section Ref: Dig Deeper: Computers Migrate into the Living Room 71) A(n) ________ allows your computer to receive television channels from a cable connection and display them on your computer monitor. Answer: TV tuner Diff: 2 Section Ref: Dig Deeper: Computers Migrate into the Living Room 72) Farmers can use ________ to track the location of their cattle. Answer: RFID tags Diff: 2 Section Ref: Agriculture: High-Tech Down on the Farm 73) Surgeons can use computer-guided ________ to perform delicate surgery. Answer: robots Diff: 2 Section Ref: Medicine: Technologies of Today and Tomorrow 74) ________ are life-sized mannequins that have a pulse and a heartbeat and respond to procedures just like humans do. Answer: Patient simulators Diff: 2 Section Ref: Medicine: Technologies of Today and Tomorrow 75) Technology no longer protected by copyright, so it is available to everyone, is considered to be in the ________. Answer: public domain Diff: 2 Section Ref: Medicine: Technologies of Today and Tomorrow 76) One type of chip being implanted in humans as a means of verifying a person's identity is called the ________. Answer: VeriChip Diff: 2 Section Ref: Medicine: The Chip Within 77) Scientists use ________, or models, to study tornadoes and to re-create the ruins of Pompeii. Answer: simulations Diff: 2 Section Ref: Science: Simulating Reality 14 Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall Full file at http://testbankcart.eu/Test-Bank-for-Technology-In-Action-8th-Edition-by-Evans 78) In the future, ________, which are extremely small conductors, could be used to create extremely small pathways in computer chips. Answer: nanowires Diff: 3 Section Ref: Nanotechnology: Careers Yet to Come 79) ________ is the science revolving around the use of nanostructures to build devices on an extremely small scale. Answer: Nanotechnology Diff: 2 Section Ref: Nanotechnology: Careers Yet to Come 80) Researchers are investigating the use of ________ to deliver precise doses of drugs on a molecule-by-molecule basis within the human bloodstream. Answer: nanostructures Diff: 3 Section Ref: Nanotechnology: Careers Yet to Come 81) ________ is the study of molecules and structures ranging in size from 1 to 100 nanometers. Answer: Nanoscience Diff: 2 Section Ref: Nanotechnology: Careers Yet to Come 82) ________ computing relates to emotion or deliberately tries to influence emotion. Answer: Affective Diff: 2 Section Ref: Psychology: You Should Smile . . . Now 83) The discrepancy between the "haves" and the "have nots" with regard to computer technology is commonly referred to as the ________. Answer: digital divide Diff: 2 Section Ref: Ethics in IT: Knowledge Is Power-Bridging the Digital Divide 84) ________ versions of identity chips are used in hospitals to monitor the locations of newborn babies. Answer: Nonimplant Diff: 2 Section Ref: Medicine: The Chip Within 85) An application from NASA, called ________, makes available some 10 trillion bytes of imagery of the Earth. Answer: World Wind Diff: 3 Section Ref: Bits and Bytes: NASA Wants You . . . to Learn 15 Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall Full file at http://testbankcart.eu/Test-Bank-for-Technology-In-Action-8th-Edition-by-Evans 86) In an automobile, ________ measure everything from air pressure to temperature to throttle position. Answer: sensors Diff: 2 Section Ref: Automotive Technology: Sensors and CPUs 87) Nanotechnology research has helped create carbon ________, which can deliver patient medicine and information. Answer: nanotubes Diff: 3 Section Ref: Nanotechnology: Careers Yet to Come 88) ________ is a wearable system that isolates movements and facial expressions of people to help determine their mood and intention. Answer: ESP The emotional-social prosthesis Diff: 3 Section Ref: Psychology: You Should Smile . . . Now 89) ________ computing is a science that attempts to produce machines that understand and can respond to human emotion. Answer: Affective Diff: 3 Section Ref: Psychology: You Should Smile . . . Now 90) Match the following fields to the related computer technology. I. medicine A. Internet research and virtual tours II. business B. digital recreation of ruins III. law enforcement C. bioengineering and patient simulators IV. education D. computer forensics V. archaeology E. data mining Answer: C, E, D, A, B Diff: 3 Section Ref: Multiple Locations in the Chapter 91) Match the following terms to their meanings. I. Smartphone A. biomedical implant placed under the skin used for identification II. µ-chip B. identification tag used to track animals III. RFID C. device that enables user to carry digital information IV. VeriChip D. identity chip small enough to be ingested without a person's knowledge Answer: C, D, B, A Diff: 3 Section Ref: Multiple Locations in the Chapter 16 Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall Full file at http://testbankcart.eu/Test-Bank-for-Technology-In-Action-8th-Edition-by-Evans 92) Match the following terms to their meanings. I. computer forensics A. computing relating to emotion II. computer literacy B. using computer systems to gather legal evidence III. information technology C. understanding the capabilities and limitations of computers IV. affective computing D. the handling and retrieval of information Answer: B, C, D, A Diff: 3 Section Ref: Multiple Locations in the Chapter 93) Match the following terms to their meanings. I. digital home A. device that includes plasma and liquid display II. digital TV B. discrepancy between computer technologies haves and have nots III. digital divide C. changes a computer into a digital recorder IV. digital video recorder software D. computer and digital devices connected to a home network Answer: D, A, B, C Diff: 3 Section Ref: Multiple Locations in the Chapter 94) Match the following terms to their meanings. I. Bluetooth technology A. one-billionth of a meter II. nanoscience B. extremely small conductor III. nanometer C. study of molecules ranging in size from 1 to 100 nanometers IV. nanowire D. a type of wireless communication Answer: D, C, A, B Diff: 2 Section Ref: Multiple Locations in the Chapter 95) Match the following fields to the related computer technology. I. shipping A. uses Bluetooth technology II. video gaming B. uses computer forensics animations III. education C. uses management software such as Moodle IV. legal system D. uses software animation tools Answer: A, D, C, B Diff: 2 Section Ref: Multiple Locations in the Chapter 17 Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall