Deck 17: Technology, the Workplace, and Society
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/44
Play
Full screen (f)
Deck 17: Technology, the Workplace, and Society
1
According to the National Center for Education Statistics, only 52% of public schools are connected to the Internet.
False
2
Nanotechnology relates to creating computer components that are less than 50 nanometers in size.
False
3
Optical computing uses light beams for the internal circuits instead of electricity.
True
4
Quantum computing uses the laws of quantum mechanics and the way that atoms can be in more than one state at once to do computational tasks.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
5
One of the more common types of groupware is e-mail.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
6
Computer piracy is presenting someone else's ideas or work as your own, without authorization.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
7
A sly horse is harmful software that does something different from what it is expected to do.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
8
Any high school student who is a Florida resident can attend the Florida Virtual School, a certified diploma-granting school, online for free.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
9
____ learning is an instructional method for which the teacher uses the computer to deliver the instruction.
A) Computer-based
B) Media
C) Interactive
D) Web engine
A) Computer-based
B) Media
C) Interactive
D) Web engine
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
10
____ are models of real-world activities, designed to allow you to experiment and explore environments that might be dangerous, unavailable, or inaccessible.
A) Simulations
B) Pretend models
C) Virtual realities
D) Play models
A) Simulations
B) Pretend models
C) Virtual realities
D) Play models
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
11
The goal for ____software is to process information on its own without human intervention.
A) CIA
B) FBI
C) Counter Intelligence
D) Artificial Intelligence
A) CIA
B) FBI
C) Counter Intelligence
D) Artificial Intelligence
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
12
____ engineering refers to changing the DNA in a living organism.
A) Medical
B) Genetic
C) Human
D) Future
A) Medical
B) Genetic
C) Human
D) Future
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
13
____ is an artificial environment that feels like a real environment.
A) Artificial Intelligence
B) Computer reality
C) Simulation
D) Virtual reality
A) Artificial Intelligence
B) Computer reality
C) Simulation
D) Virtual reality
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
14
____ commerce, which means having an online business, is changing the way our world does business.
A) Electronic
B) Computer
C) Cash
D) Virtual
A) Electronic
B) Computer
C) Cash
D) Virtual
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
15
____ refers to programs and software that help people work together even if they are located far from each other.
A) Far Connect
B) Close Connect
C) Groupware
D) Mediaware
A) Far Connect
B) Close Connect
C) Groupware
D) Mediaware
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
16
Computer ____ involves invading someone else's computer, usually for personal gain or just the satisfaction of doing it.
A) hacking
B) spamming
C) hoaxing
D) encrypting
A) hacking
B) spamming
C) hoaxing
D) encrypting
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
17
A(n) ____ is a program that has been written to cause the corruption of data on a computer.
A) virus
B) flu
C) illness
D) bacteria
A) virus
B) flu
C) illness
D) bacteria
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
18
Please use the figure below to answer the following two questions.
FIGURE 17-1

-Figure 17-1 shows an example of an ergonomically designed workstation. Suggestions made in the lesson included all of the following EXCEPT ____.
A) thighs parallel to the floor
B) feet flat on the floor or on a footrest
C) eyes looking at part top of screen
D) using the mouse that is integrated into the keyboard
FIGURE 17-1

-Figure 17-1 shows an example of an ergonomically designed workstation. Suggestions made in the lesson included all of the following EXCEPT ____.
A) thighs parallel to the floor
B) feet flat on the floor or on a footrest
C) eyes looking at part top of screen
D) using the mouse that is integrated into the keyboard
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
19
Please use the figure below to answer the following two questions.
FIGURE 17-1

-Looking at Figure 17-1, for good ergonomics the chair should ____.
A) be adjustable
B) have adequate lumbar support
C) both a. and b.
D) neither a. nor b.
FIGURE 17-1

-Looking at Figure 17-1, for good ergonomics the chair should ____.
A) be adjustable
B) have adequate lumbar support
C) both a. and b.
D) neither a. nor b.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
20
Changing data ____ into the computer is called data diddling.
A) before it has been entered
B) after it has been entered
C) either a. or b.
D) neither a. nor b.
A) before it has been entered
B) after it has been entered
C) either a. or b.
D) neither a. nor b.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
21
Illegally copying and using software is called software ____.
A) piracy
B) fraud
C) tampering
D) intelligence
A) piracy
B) fraud
C) tampering
D) intelligence
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
22
One remedy to reduce carpal tunnel syndrome is to replace a regular keyboard with a(n) ____ keyboard.
A) multi-media
B) new
C) ergonomic
D) tilted
A) multi-media
B) new
C) ergonomic
D) tilted
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
23
Employing ____ security measures, which examine a fingerprint, a voice pattern, or the iris or retina of the eye is usually used when high-level security is required
A) biometric
B) biological
C) optical
D) laser
A) biometric
B) biological
C) optical
D) laser
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
24
One of the newest types of virtual robots is called a bot, commonly used by ____.
A) search engines
B) medical facilities
C) the government
D) schools
A) search engines
B) medical facilities
C) the government
D) schools
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
25
One of the most widely known genetics projects is the ____ whose goal is to identify all of the approximately 100,000 genes in human DNA.
A) Human DNA Project
B) Human Genome Project
C) Human Biology Experiment
D) Human Map Project
A) Human DNA Project
B) Human Genome Project
C) Human Biology Experiment
D) Human Map Project
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
26
The first computer crime, electronic embezzlement, was committed in ____.
A) 1928
B) 1958
C) 1978
D) 1998
A) 1928
B) 1958
C) 1978
D) 1998
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
27
Selena is a student at one of the most modern high schools in town. Please answer the questions below.
-Selena begins to learn how to drive in a car that models the real-word activity of driving. Selena is learning how to drive via ____.
A) virtual reality
B) classic teaching
C) simulation
D) artificial intelligence
-Selena begins to learn how to drive in a car that models the real-word activity of driving. Selena is learning how to drive via ____.
A) virtual reality
B) classic teaching
C) simulation
D) artificial intelligence
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
28
Selena is a student at one of the most modern high schools in town. Please answer the questions below.
-Selena is able to order her lunch each day by speaking to a robot who is positioned at the entrance to the cafeteria. The robot is running a(n) ____ application.
A) virtual reality
B) classic teaching
C) simulation
D) artificial intelligence
-Selena is able to order her lunch each day by speaking to a robot who is positioned at the entrance to the cafeteria. The robot is running a(n) ____ application.
A) virtual reality
B) classic teaching
C) simulation
D) artificial intelligence
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
29
Derek is writing a paper on the latest computing trends. Please answer the questions below.
-In his research, Derek discovered that scientists are creating computer components less that 100 nanometers in size. This is in comparison to a grain of sand that is about ____ nanometers.
A) 900
B) 9,000
C) 90,000
D) 900,000
-In his research, Derek discovered that scientists are creating computer components less that 100 nanometers in size. This is in comparison to a grain of sand that is about ____ nanometers.
A) 900
B) 9,000
C) 90,000
D) 900,000
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
30
Derek is writing a paper on the latest computing trends. Please answer the questions below.
-Derek also finds out that light beams have an advantage over electricity. The advantage is ____.
A) light beams are much faster than electricity
B) light beams can cross each other
C) both a. and b.
D) neither a. nor b.
-Derek also finds out that light beams have an advantage over electricity. The advantage is ____.
A) light beams are much faster than electricity
B) light beams can cross each other
C) both a. and b.
D) neither a. nor b.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
31
____________________ are models of real-world activities, designed to allow you to experiment and explore environments that might be dangerous, unavailable, or inaccessible.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
32
____________________ engineering refers to changing the DNA in a living organism.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
33
____________________ relates to creating computer components that are less than 100 nanometers in size.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
34
____________________ is presenting someone else's ideas or work as your own, without authorization.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
35
____________________ is the legal protection for authors of creative works.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
36
Virtual computing uses light beams for the internal circuits instead of electricity. _________________________
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
37
Employing genetic security measures, which examine a fingerprint, a voice pattern, or the iris or retina of the eye is usually used when high-level security is required. _________________________
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
38
Working on computers for long periods of time can cause various types of ergonomic-related health problems and concerns. _________________________
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
39
Please identify the letter of the choice that best matches the numbered definitions below.
-Involves invading someone else's computer
A) computer fraud
B) copyright
C) plagiarism
D) computer hacking
E) computer crime
-Involves invading someone else's computer
A) computer fraud
B) copyright
C) plagiarism
D) computer hacking
E) computer crime
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
40
Please identify the letter of the choice that best matches the numbered definitions below.
-Manipulation of a computer in order to obtain money, property, or value dishonestly or to cause loss
A) computer fraud
B) copyright
C) plagiarism
D) computer hacking
E) computer crime
-Manipulation of a computer in order to obtain money, property, or value dishonestly or to cause loss
A) computer fraud
B) copyright
C) plagiarism
D) computer hacking
E) computer crime
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
41
Please identify the letter of the choice that best matches the numbered definitions below.
-A criminal act committed through the use of a computer
A) computer fraud
B) copyright
C) plagiarism
D) computer hacking
E) computer crime
-A criminal act committed through the use of a computer
A) computer fraud
B) copyright
C) plagiarism
D) computer hacking
E) computer crime
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
42
Please identify the letter of the choice that best matches the numbered definitions below.
-Legal protection for authors of creative works
A) computer fraud
B) copyright
C) plagiarism
D) computer hacking
E) computer crime
-Legal protection for authors of creative works
A) computer fraud
B) copyright
C) plagiarism
D) computer hacking
E) computer crime
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
43
Please identify the letter of the choice that best matches the numbered definitions below.
-Presenting someone else's ideas or work as your own, without authorization
A) computer fraud
B) copyright
C) plagiarism
D) computer hacking
E) computer crime
-Presenting someone else's ideas or work as your own, without authorization
A) computer fraud
B) copyright
C) plagiarism
D) computer hacking
E) computer crime
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
44
Define and give examples of the following: computer fraud, computer hacking, and a computer virus.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck