Exam 9: The Challenges of the Digital Age: Society and Information Technology Today
Exam 1: Introduction to Information Technology: the Future Now205 Questions
Exam 2: The Internet and the World Wide Web: Exploring Cyberspace232 Questions
Exam 3: Software: Tools for Productivity and Creativity263 Questions
Exam 4: Hardware: the Cpu and Storage: the Source of Computing Power198 Questions
Exam 5: Hardware: Input and Output: Taking Charge of Computing and Communications202 Questions
Exam 6: Communications, Networks, and Cyberthreats: the Wired and Wireless World171 Questions
Exam 7: Personal Technology: the Future Is You81 Questions
Exam 8: The Era of Big Data: Databases, Information Systems, and Artificial Intelligence182 Questions
Exam 9: The Challenges of the Digital Age: Society and Information Technology Today86 Questions
Exam 10: Building Systems and Applications: Software Development, Programming, and Languages209 Questions
Select questions type
Software obtained illegally is called open-source software.
Free
(True/False)
4.7/5
(33)
Correct Answer:
False
"Dirty data" problems are usually caused by ________ workers.
Free
(Short Answer)
4.9/5
(42)
Correct Answer:
data-entry or data entry
The process by which one picture is slowly altered or transformed into another image is called ________.
Free
(Short Answer)
4.9/5
(29)
Correct Answer:
morphing
Hurricane Katrina is an example of a ________ that can be harmful to computers and communications systems.
(Short Answer)
4.9/5
(29)
Information technology is basically a clean industry creating few toxic byproducts.
(True/False)
4.7/5
(43)
Many networks have ________ controls for tracking which programs and servers were used and which files were opened.
(Short Answer)
4.8/5
(42)
In the ________ scam,victims are given a chance to receive nonexistent government money as long as they pay a fee to help transfer the money to an overseas account.
(Short Answer)
4.8/5
(39)
In morphing,a film or video image is displayed on a computer screen and altered pixel by pixel.
(True/False)
4.8/5
(38)
Which of the following terms describes old,obsolete electronic gadgetry?
(Multiple Choice)
4.7/5
(40)
Increasingly intelligent machinery and automation have caused a _________ in several types of jobs.
(Short Answer)
4.8/5
(37)
A well-known software program used to alter (morph)photographs,for good or for ill,is ________.
(Short Answer)
4.8/5
(34)
Sending emails that appear to come from a trusted source,which direct you to a website where you're asked to reveal personal information is called _________.
(Multiple Choice)
4.8/5
(31)
A(n)________ is a record of how a transaction was handled from input through processing and output.
(Short Answer)
4.7/5
(38)
Misuse of technology,fussing with computers,and information overload are three workplace impediments to productivity.
(True/False)
4.7/5
(33)
Showing 1 - 20 of 86
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)