Hialeah High School Information Technology Questions

Description

1 attachmentsSlide 1 of 1attachment_1attachment_1

Unformatted Attachment Preview

Social media platforms, such as Twitter and Facebook, manage user data most often by
using a _____ to organize and deliver it.
Use letter keys to select choices
1.
2.
3.
4.
A-stylus
B-scanner
C-database
D-modem
A computer relies on the combination of _____ and _____ to turn input into output.
Use letter keys to select choices
1.
2.
3.
4.
A-hardware, software
B-the Internet, websites
C-analog waves, digital waves
D-electrical devices, electrical charges
Digital literacy has become a requirement for most careers, including careers in the
medical field and customer service.
Use letter keys to select choices
1. A-true
2. B-false
computer uses _____ to display an image after it has been digitized.
Use letter keys to select choices
1.
2.
3.
4.
A-samples
B-digits
C-icons
D-pixels
The prefix Giga represents approximately one _____ units of information.
Use letter keys to select choices
1.
2.
3.
4.
A-thousand
B-million
C-trillion
D-billion
The _____ system is used to represent RGB color in digital graphics.
Use letter keys to select choices
1.
2.
3.
4.
A-unary
B-binary
C-decimal
D-hexadecimal
A _____ is an example of a computer assigned to a special task.
Use letter keys to select choices
1.
2.
3.
4.
A-PC
B-Mack
C-smart phone
D-kiosk
One thing to consider when choosing a mobile device is _____.
Use letter keys to select choices
1.
2.
3.
4.
A-netiquette
B-battery life
C-keyboard compatibility
D-desk space
Wearable technologies are clothing and ________ that incorporate digital technologies.
Use letter keys to select choices
1.
2.
3.
4.
A-accessories
B-ultrabooks
C-handheld devices
D-desktop devices
Which of the following provides protection against server failures?
1. A-client/server network
2. B-backup server
3. C-motherboard
4. D-mainframe
Click an item in one column, then select its match in the other column. If using a keyboard,
use the tab key to highlight an item, then use the space bar to select it. Match the storage
capacity to its correct numerical representation.
You must provide all correct answers in order to receive credit; partial credit is not allowed.
Use the left and right arrow keys to navigate between terms and definitions. Use the up and
down arrow keys to navigate between choices




Gigabyte
Terabyte
Kilobyte
Megabyte




1,000,000 bytes
1,000,000,000,000 bytes
1,000 bytes
1,000,000,000 bytes
How many megabits are contained in a gigabyte?
Use letter keys to select choices
1.
2.
3.
4.
A-16 million
B-1,000
C-8,000
D-256
What kind of data is encoded by the ASCII standard?
Use letter keys to select choices
1.
2.
3.
4.
5.
A-music
B-photographs
C-characters
D-audio
Fill in the blank with the correct answer by typing in the box. A server is contained
within a large rack, and is populated by modular components comprising a
motherboard, one or more processors, and storage media, designed to be inserted or
removed easily as a unit. This is called a _____________server.
Devices from which category require an external monitor and keyboard?
Use letter keys to select choices
1.
2.
3.
4.
A-Mobile devices
B-Servers
C-Personal computers
D-Wearables
Which of these devices is considered a personal computer?
Use letter keys to select choices
1.
2.
3.
4.
A-file server
B-DVD player
C-printer
D-MacBook Pro
How is binary data encoded on a hard drive?
Use letter keys to select choices
1.
2.
3.
4.
A-as opposite polarity in a magnetic material
B-as different colors of photosensitive dye
C-as holes punched in rigid card stock
D-as bits and lands on a reflective metal disk
What is the name for computer users who have chosen to actively identify and expose the
mishandling of personal information on the Internet?
Use letter keys to select choices
1. A-hacktivists
2. B-lobbyists
3. C-crackers
4. D-change agents
If a behavior is considered ethical, this most likely suggests it is ____.
Use letter keys to select choices
1.
2.
3.
4.
A-morally wrong
B-morally right
C-legally right
D-legally wrong
When a government or its agents engage in detailed monitoring of an individual or
organization’s online activities, this is known as ______.
Use letter keys to select choices
1.
2.
3.
4.
A-surveillance
B-telemetry
C-forensics
D-espionage
Accessibility laws vary from country to country.
Use letter keys to select choices
1. A-true
2. B-false
Which of these is an example of green computing?
Use letter keys to select choices
1.
2.
3.
4.
A-maintaining old servers instead of replacing them
B-exporting waste to developing nations
C-planting trees inside commercial data centers
D-using virtual servers to replace physical servers
What is the digital divide?
Use letter keys to select choices
1.
2.
3.
4.
A-a mathematical function that causes modern computer processors to crash
B-the Internet backbone routers that handle 70 percent of the traffic on the Internet
C-a region of the Atlantic Ocean that cannot be spanned by networking cables
D-disadvantages caused by lack of access to computers and the Internet
The Children’s Online Privacy Protection Act prohibits businesses from collecting data on
children under the age of ____.
Use letter keys to select choices
1.
2.
3.
4.
A-21
B-16
C-18
D-13
Ethical rules for using computers and the Internet have been laid out by the FCC.
Use letter keys to select choices
1. A-true
2. B-false
What was the goal of the Identity Theft Protection Act arranged by the U.S. Chamber of
Commerce in 2005?
Use letter keys to select choices
1.
2.
3.
4.
A-to extend the period of legal protection for copyrighted works
B-to protect perpetrators of identity theft from legal reprisals
C-to foster ethical behavior by professional organizations
D-to provide financial renumeration for victims of identity theft
How does JAWS accessibility software help businesses and organizations meet government
accessibility requirements?
Use letter keys to select choices
1.
2.
3.
4.
A-by providing closed captions for deaf users
B-by magnifying text and images for visually impaired users
C-by accepting voice commands for users with limited mobility
D-by reading on-screen text to blind users
Which policies are designed to prevent Internet service providers from restricting user’s
choices of online content, or setting differential rates for online services?
Use letter keys to select choices
1.
2.
3.
4.
A-copyright
B-net neutrality
C-social media
D-broadband
The U.S. government believes that high-speed Internet access should be available to all
citizens who own laptop computers.
Use letter keys to select choices
1. A-true
2. B-false
Why are LEDs used in green computing?
Use letter keys to select choices
1.
2.
3.
4.
A-They reduce the energy used in displays.
B-They reduce the heat accumulation of data centers.
C-They produce ambient light.
D-They speed up data access rates at lower energy costs
What is the fastest-growing segment of Internet users?
Use letter keys to select choices
1.
2.
3.
4.
A-rural users
B-lower-income users
C-under-30 years of age
D-over-65 years of age
.
in the past 10 years, the digital divide in the United States has ____.
Use letter keys to select choices
1.
2.
3.
4.
A-vanished
B-doubled
C-grown
D-shrunk
A technology user’s carbon footprint measures the impact their technology usage has on
the environment.
Use letter keys to select choices
1. A true
2. B-false
Energy efficiency in computers involves things like LED display technology, solid-state
drives, and low-energy-usage processors.
Use letter keys to select choices
1. A-true
2. B-false
Which of these is an argument against government regulation of the Internet?
Use letter keys to select choices
1.
2.
3.
4.
A-Regulations give consumers an illusion of safety that actually puts them at risk.
B-Private censorship of the Internet is more cost effective and fair.
C-Changes mandated by these regulations are not funded by the government.
D-The Internet is impossible to regulate due to its decentralized nature.
Section 255 of the U.S. Telecommunications Act of 1996 requires telecommunications
manufacturers and service providers to make their products and services accessible to
people with disabilities, if readily achievable.
Use letter keys to select choices
1. A-true
2. B-false
What would be a likely result if governments did not enforce net neutrality?
Use letter keys to select choices
1. A-ISPs would be unable to provide access to consumers due to excessive
competition.
2. B-ISPs would favor certain services and content via pricing and bandwidth
restrictions.
3. C-Businesses would have no incentive to provide truthful information about their
products.
4. D-Businesses would be able to provide faster, cheaper Internet services to
consumers.
Which government action is opposed to a citizen’s right to freedom of speech?
Use letter keys to select choices
1.
2.
3.
4.
A-taxation
B-empowerment
C-surveillance
D-censorship
When did the economic digital divide in the United States begin shrinking?
Use letter keys to select choices
1.
2.
3.
4.
A-1990
B-2000
C-2010
D-1980
What is a risk of ignoring the digital divide?
Use letter keys to select choices
1.
2.
3.
4.
A-increase in the cost of computers
B-decrease in security of online resources
C-a global increase in social unrest
D-Loss of market share for computer manufacturers
Which government action is opposed to a citizen’s right to privacy?
Use letter keys to select choices
1.
2.
3.
4.
A-surveillance
B-regulation
C-censorship
D-empowerment
Although much of this is owned by private corporations, governments are responsible for
maintaining its security, functionality, and accessibility.
Use letter keys to select choices
1.
2.
3.
4.
A-Internet infrastructure
B-intellectual property
C-cybersecurity legislation
D-source cod
which component was first used for processing in electronic computers?
Use letter keys to select choices
1. A-vacuum tubes
2. B-diodes
3. C-electric relays
4. D-transistors
Moore’s Law states that the number of transistors on a chip will double about every _____
months.
Use letter keys to select choices
1.
2.
3.
4.
A-24
B-36
C-12
D-10
A CPU component known as the _____ carries out the instructions used for mathematical
and logical operations.
Use letter keys to select choices
1.
2.
3.
4.
A-ALU
B-control unit
C-register
D-system clock
The speed of the _____ influences how fast the processor can process data.
Use letter keys to select choices
1.
2.
3.
4.
A-internal clock
B-storage device
C-software
D-critical transistor
ROM is used for important programs like _____, which come(s) from the manufacturer.
Use letter keys to select choices
1.
2.
3.
4.
A-firmware
B-RAM
C-VRAM
D-mobile apps
Which of the following is an example of optical storage?
Use letter keys to select choices
1.
2.
3.
4.
A-CD
B-hard disk
C-RAM
D-USB drive
A mouse and a touch pad are examples of ____ devices.
Use letter keys to select choices
1.
2.
3.
4.
A-pointing
B-output
C-resolution
D-multitouch
Monitor display size is measured _____.
Use letter keys to select choices
1.
2.
3.
4.
A-diagonally
B-horizontally
C-vertically
D-in megahertz
Using Moore’s Law, we can gauge how fast ____________ might be in the coming years.
Use letter keys to select choices
1.
2.
3.
4.
A-telecommunications
B-Internet access
C-processors
D-magnetic disk storage
Select whether the statement is true or false.
The history of the electronic computer can be traced back to the invention of the integrated
circuit in 1940.
Use letter keys to select choices
1. A-true
2. B-false
One of the earliest uses of an electronic digital computer involved ________.
Use letter keys to select choices
1.
2.
3.
4.
A-calculating missile trajectory in WWII
B-weather forecasting
C-statistical analysis of aircraft wing flutter
D-university research
The _____ is housed in the CPU and temporarily stores frequently used data.
Use letter keys to select choices
1.
2.
3.
4.
A-FPU
B-ALU
C-system clock
D-cache
Select whether the statement is true or false.
A motherboard can be found in almost all digital electronics devices.
Use letter keys to select choices
1. A-true
2. B-false
The size and shape of the _____ influences what a system component may look like.
Use letter keys to select choices
1. A-transistor
2. B-motherboard
3. C-microprocessor
4. D-bus
A Blu-ray disc is an example of solid-state storage.
Use letter keys to select choices
1. A-true
2. B-false
In computing and digital technologies, storage refers to the ability to maintain data within
the system temporarily or permanently.
Use letter keys to select choices
1. A-true
2. B-false
A touch screen monitor can serve as both an input and an output device.
Use letter keys to select choices
1. A-true
2. B-false
Resolution is measured by the physical size of your screen.
Use letter keys to select choices
1. A-true
2. B-false
Large retail stores use _____ terminals to track purchases and inventory.
Use letter keys to select choices
1.
2.
3.
4.
A-OMR
B-MICR
C-OCR
D-POS
There are ____ stages in the software development life cycle.
Use letter keys to select choices
1.
2.
3.
4.
A-five
B-three
C-four
D-two
Each programming language has a particular ____ or set of rules that guide how
programming statements are constructed.
Use letter keys to select choices
1.
2.
3.
4.
A-SDK
B-syntax
C-toolbox
D-heuristic
When you combine a system’s hardware configuration and operating system, it is
sometimes called the computer’s ____.
Use letter keys to select choices
1.
2.
3.
4.
A-application interface
B-platform
C-API
D-system interface
Which of the following is an example of a Creativity App?
Use letter keys to select choices
1.
2.
3.
4.
A-Pandora
B-FaceTime
C-GarageBand
D-MS Projec
A(n) ____ license can be used anywhere on a college campus.
Use letter keys to select choices
1.
2.
3.
4.
A-operating system
S-seat
C-site
D-collaboration
____ software allows the user to copy, modify, and redistribute source code.
Use letter keys to select choices
1.
2.
3.
4.
A-Open-source
B-Free
C-Creative
D-Proprietary
Object-oriented programming languages are no longer used by software developers.
Use letter keys to select choices
1. A-true
2. B-false
Many programming languages require a ____ to create executable files.
Use letter keys to select choices
1.
2.
3.
4.
A-debugger
B-text editor
C-compiler
D-browser
____ development is the systematic process of transforming an idea into functional software.
Model
Use letter keys to select choices
1.
2.
3.
4.
A-Software
B-Model
C-Execution
D-SDK
A printer requires a ____ installed on the computer in order to operate.
Use letter keys to select choices
1.
2.
3.
4.
A-development kit
B-GUI
C-device driver
D-UNIX box
Which of the following is an example of a software suite?
Use letter keys to select choices
1.
2.
3.
4.
A-Linux
B-Apache OpenOffice
C-Windows 8
D-MS Projec
An icon on your desktop is a component of a ____ interface.
Use letter keys to select choices
1.
2.
3.
4.
A-programming
B-graphical user
C-command-based
D-task-based
Apps accessed on the web are commonly known as Air apps.
Use letter keys to select choices
1. A-true
2. B-false
____ has gained popularity as an open-source operating system.
Use letter keys to select choices
1.
2.
3.
4.
A-Mac OS
B-Linux
C-IBM
D-Python
A software license defines the permissions, rights, and restrictions provided to the person
who purchases a copy of the software.
Use letter keys to select choices
1. A-true
2. B-false
____ artificial intelligence is very popular in the programming of robots.
Use letter keys to select choices
1.
2.
3.
4.
A-Expert
B-Behavior-based
C-Case-based
D-Subject-specific
Computerized expert systems can find trouble spots in computer networks, but still are
unable to diagnose diseases given a patient’s symptoms.
Use letter keys to select choices
1. A-true
2. B-false
AI neural networks use ____ to simulate the processing that takes place between neurons in
the brain.
Use letter keys to select choices
1.
2.
3.
4.
A-cognition
B-expert systems
C-synapses
D-software
In dangerous situations or small spaces where humans cannot fit, smart machines are
computer-controlled machines that are able to work ________ due to information accessed
from sensors and over a network.
Use letter keys to select choices
1.
2.
3.
4.
A-closely with humans
B-in the cloud
C-autonomously
D-side-by-side
Select whether the statement is true or false.
Computational intelligence methodologies set up a system whereby the software can
develop intelligence through an iterative learning process.
Use letter keys to select choices
1. A-true
2. B-false
One of the earliest personal digital assistants was ________.
Use letter keys to select choices
1.
2.
3.
4.
A-a program named Turing
B-based on pattern recognition
C-a paperclip named Clippy
D-a robot named ASIMO
Communication and language are key elements in the ____.
Use letter keys to select choices
1.
2.
3.
4.
A-Turing Test
B-Fuzzy Test
C-fuzzy set theory
D-neural network
Pattern recognition combines cameras, scanners, and AI software to capture, store, and
interpret visual images and pictures.
Use letter keys to select choices
1. A-true
2. B-false
A feature of neural networks includes the ability to quickly ____ stored data when new
information is identified.
Use letter keys to select choices
1.
2.
3.
4.
A-modify
B-export
C-transfer
D-delete
Click an item in one column, then select its match in the other column. If using a keyboard,
use the tab key to highlight an item, then use the space bar to select it. Match the term with
a current problem it solves.
You must provide all correct answers in order to receive credit; partial credit is not allowed.
Use the left and right arrow keys to navigate between terms and definitions. Use the up and
down arrow keys to navigate between choices



Genetic algorithm
Neural network
Fuzzy logic



Designing lightweight delivery drones
Decide if clothes in a dryer are still damp
Identifying objects in live video streams
An important element in exhibiting intelligence is the ability to communicate and use
language.
Use letter keys to select choices
1. A-true
2. B-false
Fill in the blank with the correct answer by typing in the box. Informal strategies, or rules of
thumb, employed by artificial intelligences to make decisions in situations with incomplete or
ambiguous data, are known as————-.
. To provide speech recognition for accessible computing, the computer must learn a
dictionary of words to determine how to parse a sentence into individual words.
Use letter keys to select choices
1. A-true
2. B-false
Constant texting on your cell phone can cause a repetitive stress injury.
Use letter keys to select choices
1. A-true
2. B-false
Carpal tunnel syndrome can cause ____.
Use letter keys to select choices
1.
2.
3.
4.
A-a migraine headache
B-misaligned vertebrae
C-a numb sensation in the wrists and hands
D-blurred vision
What is the best way to avoid texting and driving accidents?
Use letter keys to select choices
1.
2.
3.
4.
A-pull over before texting
B-buy a larger phone
C-use dictation apps while driving
D-use abbreviations and emojis
Which of the following is an example of good netiquette?
Use letter keys to select choices
1.
2.
3.
4.
A-using Reply-All to keep everyone informed of your ideas
B-keeping embarrassing photos of friends private
C-TYPING IN ALL CAPS FOR EASE OF READING
D-answering calls immediately during movies or meetings
In dangerous situations or small spaces where humans cannot fit, smart machines are
computer-controlled machines that are able to work ________ due to information accessed
from sensors and over a network.
Use letter keys to select choices
1.
2.
3.
4.
A-closely with humans
B-in the cloud
C-autonomously
D-side-by-side
Computational intelligence methodologies set up a system whereby the software can
develop intelligence through an iterative learning process.
Use letter keys to select choices
1. A-true
2. B-false
One of the earliest personal digital assistants was ________.
Use letter keys to select choices
1.
2.
3.
4.
A-a program named Turing
B-based on pattern recognition
C-a paperclip named Clippy
D-a robot named ASIMO
Communication and language are key elements in the ____.
Use letter keys to select choices
1.
2.
3.
4.
A-Turing Test
B-Fuzzy Test
C-fuzzy set theory
D-neural network
Pattern recognition combines cameras, scanners, and AI software to capture, store, and
interpret visual images and pictures.
Use letter keys to select choices
1. A-true
2. B-false
A feature of neural networks includes the ability to quickly ____ stored data when new
information is identified.
Use letter keys to select choices
1.
2.
3.
4.
A-modify
B-export
C-transfer
D-delete
Click an item in one column, then select its match in the other column. If using a keyboard,
use the tab key to highlight an item, then use the space bar to select it. Match the term with
a current problem it solves.
You must provide all correct answers in order to receive credit; partial credit is not allowed.
Use the left and right arrow keys to navigate between terms and definitions. Use the up and
down arrow keys to navigate between choices



Genetic algorithm
Neural network
Fuzzy logic



Designing lightweight delivery drones
Decide if clothes in a dryer are still damp
Identifying objects in live video streams
An important element in exhibiting intelligence is the ability to communicate and use
language.
Use letter keys to select choices
1. A -true
2. B-false
Fill in the blank with the correct answer by typing in the box. Informal strategies, or rules of
thumb, employed by artificial intelligences to make decisions in situations with incomplete or
ambiguous data, are known as__________.
To provide speech recognition for accessible computing, the computer must learn a
dictionary of words to determine how to parse a sentence into individual words.
Use letter keys to select choices
1. A-true
2. B-false
3. Fill in the blank with the correct answer by typing in the box. How a cell phone looks,
feels, and works is determined by its _________.
Which of the following should you consider first when purchasing a carrier plan for your
cell phone?
Use letter keys to select choices
1.
2.
3.
4.
A-popularity
B-usage
C-form factor
D-color
Digital cell phone service was first provided to users with the introduction of _______
networks.
Use letter keys to select choices
1.
2.
3.
4.
A-second-generation (2G)
B-fourth-generation (4G)
C-third-generation (3G)
D-first-generation (1G)
Click an item in one column, then select its match in the other column. If using a keyboard, use the
tab key to highlight an item, then use the space bar to select it. Match the wireless protocol with its
theoretical range.
You must provide all correct answers in order to receive credit; partial credit is not allowed.
Use the left and right arrow keys to navigate between terms and definitions. Use the up and down arrow
keys to navigate between choices




Wi-Fi
NFC
Bluetooth
LTE




33 feet
230 feet
3-15 miles
8 inches
Wireless communications that take place at a distance of about eight inches or less is called
________.
Use letter keys to select choices
1.
2.
3.
4.
A-synchronous communications
B-Bluetooth
C-secure signal (SSL)
D-near field communications
Which term describes a mobile phone that supports both voice and Internet, with the
ability to download and install thousands of apps?
Use letter keys to select choices
1.
2.
3.
4.
A-smartphone
B-cell phone
C-IP phone
D-feature phone
Fill in the blank with the correct answer by typing in the box.
_________________
is the process of adding geographic identification metadata to digital media and messages.
A(n) _____ is a network device that makes decisions about the fastest paths between
networks for data traffic.
Use letter keys to select choices
1.
2.
3.
4.
A-access point
B-hub
C-POP
D-router
The service performed by a server is determined by the ________ it runs.
Use letter keys to select choices
1.
2.
3.
4.
A-operating system
B-hardware
C-temperature
D-software
Which Internet connection type would be a viable option for rural users outside of the
service areas of cable TV and telephone providers?
Use letter keys to select choices
1.
2.
3.
4.
A-DSS
B-DSL
C-Dial-up
D-BPL
What are network service providers?
Use letter keys to select choices
1. A-IT support organizations for smaller ISPs
2. B-large media content distributors on the web
3. C-telecoms that control the Internet backbone
4. D-firms that design and install network equipment
Users, and their computers, connected to decentralized file-sharing networks are known as
______.
Use letter keys to select choices
1.
2.
3.
4.
A-peers
B-servers
C-masters
D-clients
Fill in the blank with the correct answer by typing in the box. Google has become an ISP in
several cities, offering gigabit_____________connections to subscribers.
Select whether the statement is true or false. Data transmitted across peer-to-peer
networks is the responsibility of private corporations.
Use letter keys to select choices
1. A-true
2. B-false
Select whether the statement is true or false. The Internet of Things (IoT) has caused
concerns in two primary areas: bandwidth and cost.
Use letter keys to select choices
1. A-true
2. B-false
The term ____ implies that the webpage you design with web development software will
look the same when published on the web.
Use letter keys to select choices
1. A-WYSIWYG
2. B-semantic web
3. C-real-time
4. D-as you see it
Fill in the blank with the correct answer by typing in the box. A(n) ____________
is a small file saved on a user’s computer by a web server in order to identify that user on
repeat visits.
Java is a popular ____ programming language that allows programmers to write programs
for multiple platforms.
Use letter keys to select choices
1.
2.
3.
4.
A-object-oriented
B-client-side
C-HTML
D-content-streaming
A Cascading Style Sheets file can be identified by its ____ extension.
Use letter keys to select choices
1.
2.
3.
4.
A-.htm
B-.csx
C-.cas
D-.css
A web server responds to http webpage requests from web clients.
Use letter keys to select choices
1. A-true
2. B-false
Multiple companies may take advantage of the ____ cloud to pool their cloud resources.
Use letter keys to select choices
1.
2.
3.
4.
A-topology
B-public
C-community
D-private
____ is a popular software program that can be used to manage podcasts.
Use letter keys to select choices
1.
2.
3.
4.
A-iTunes
B-NPR
C-wikipod
D-PodMan
Click an item in one column, then select its match in the other column. If using a keyboard,
use the tab key to highlight an item, then use the space bar to select it. Match the object
with its descriptor.
You must provide all correct answers in order to receive credit; partial credit is not allowed.
Use the left and right arrow keys to navigate between terms and definitions. Use the up and
down arrow keys to navigate between choices





google.com
192.168.0.1
index.html
http://





webpage
HTML
protocol
IP address
domain name
Which of the following is an illegal act in the United States?
Use letter keys to select choices
1.
2.
3.
4.
A-exporting advanced encryption technologies to some foreign governments
B-producing, publishing, and/or distributing pornographic material
C-publishing bomb-making information in a criminal justice textbook
D-expressing a mistaken belief that another person committed a crime
Which of the following demonstrates acceptable statements protected by freedom of
speech in the United States? (Assume that Miss Scarlet has not committed murder when
these statements are published.)
Use letter keys to select choices
1.
2.
3.
4.
A-“Miss Scarlet is a terrible person who makes terrible decisions!”
B-“I, Miss Scarlet, will kill Colonel Mustard with a lead pipe in the conservatory!”
C-“Miss Scarlet killed Colonel Mustard with the lead pipe in the conservatory!”
D-“Miss Scarlet ____________–with the_______________in the________________!”
The First Amendment to the Constitution of the United States guarantees that citizens are
free from government censorship.
Use letter keys to select choices
1. A-true
2. B-false
Fill in the blank with the correct answer by typing in the box. Publishing false statements of fact
in a deliberate attempt to defame the character of another person is ____________.
_____ Internet and service providers are bringing motion pictures, television programming,
and other video services to PCs and cell phones.
Use letter keys to select choices
1.
2.
3.
4.
A-Narrowband
B-Digital
C-Integrated
D-Broadband
Fill in the blank with the correct answer by typing in the box. Charge-coupled device (CCD) and
complementary metal-oxide semiconductor (CMOS) are two types of digital
video_____________.
Apple, Amazon, and Google provide services that let users store their music _____, making it
accessible to the owner from any Internet-connected device.
Use letter keys to select choices
1.
2.
3.
4.
A-in the cloud
B-on a CD
C-on a hard drive
D-on a flash drive
Geographical technology advances in the iPhone, such as user location and _____ software,
have improved augmented reality.
Use letter keys to select choices
1.
2.
3.
4.
A-virtual
B-environmental
C-immersive
D-directional
_____ is the technology used to distribute blogs and other regularly updated online content
to which people can subscribe.
Use letter keys to select choices
1.
2.
3.
4.
A-RSS
B-MIDI
C-HTML
D-DAC
_____ virtual reality refers to a user experience where you may feel like you are actually part
of the experience generated by the computer.
Use letter keys to select choices
1. A-Hyper-engaging
2. B-Bioreal
3. C-Immersive
4. D-Dynamic
Select whether the statement is true or false. Digital video cameras are available for less
than $30.
Use letter keys to select choices
1. A-true
2. B-false
Which of these is an example of immersive media?
Use letter keys to select choices
1.
2.
3.
4.
A-shopping apps that show how products will look in your home
B-the latest comic-book superhero movie in 3D and surround-sound
C-high-resolution ereaders that are also completely waterproof
D-location-based advertisements that offer discounts to nearby stores
Select whether the statement is true or false. Adding surround sound to a virtual,
interactive experience is distracting and unrealistic.
Use letter keys to select choices
1. A-true
2. B-false
Click an item in one column, then select its match in the other column. If using a keyboard,
use the tab key to highlight an item, then use the space bar to select it. Match the hardware
with the Immersive technology created to run on it.
You must provide all correct answers in order to receive credit; partial credit is not allowed.
Use the left and right arrow keys to navigate between terms and definitions. Use the up and
down arrow keys to navigate between choices



Video Game Console
Mobile Phone
Stereo Headset



Virtual Reality
Augmented Reality
Motion Controls
In a database, first name would be an example of a ____.
Use letter keys to select choices
1.
2.
3.
4.
A-field
B-record
C-unit
D-file
A ________ is a set of programs that manipulate the data within a database.
Use letter keys to select choices
1.
2.
3.
4.
A-data manipulation language
B-data definition language
C-database management system
D-query by example
Select whether the statement is true or false. A primary key is always made up of only one
field.
Use letter keys to select choices
1. A-true
2. B-false
Click an item in one column, then select its match in the other column. If using a keyboard,
use the tab key to highlight an item, then use the space bar to select it. Match the data level
with the correct description.
You must provide all correct answers in order to receive credit; partial credit is not allowed.
Use the left and right arrow keys to navigate between terms and definitions. Use the up and
down arrow keys to navigate between choices




File
Field
Database
Record




a collection of all the attributes of a single object
data describing a single attribute of an object
multiple collections of related data objects
a collection of related object descriptions
A popular database software program called ____ offers a wizard and QBE tool to help build
and generate SQL queries.
Use letter keys to select choices
1.
2.
3.
4.
A-MS Data Manager
B-MS Outlook
C-MS Excel
D-MS Access
Fill in the blank with the correct answer by typing in the box. A___________
database stores database records in a plain text file.
________ is used on databases in both mainframe and personal computers.
Use letter keys to select choices
1.
2.
3.
4.
A-SQL
B-Cobol
C-JCL
D-SLQ
In 1986, the American National Standards Institute (ANSI) adopted ____ as the standard
query language for relational databases.
Use letter keys to select choices
1.
2.
3.
4.
A-SQL
B-QBE
C-DDL
D-Schema
Data ____ refers to the quality and accuracy of the data.
Use letter keys to select choices
1.
2.
3.
4.
A-integrity
B-redundancy
C-modification
D-warehousing
Select whether the statement is true or false. Data integrity refers to the quality of data: the
degree to which it is accurate and up to date.
Use letter keys to select choices
1. A-true
2. B-false
The earliest legal act to address privacy issues in the United States was the ________.
Use letter keys to select choices
1.
2.
3.
4.
A-Privacy Act of 1974
B-Freedom of Information Act
C-Bill of Rights
D-Emancipation Proclamation
Select whether the statement is true or false. People who have voluntarily abandoned their
right to privacy are said to be living a transparent lifestyle.
Use letter keys to select choices
1. A-true
2. B-false
Twitter is a ____ site, in which users frequently share personal data, relying on Twitter to
provide security to protect their privacy.
Use letter keys to select choices
1.
2.
3.
4.
A-microblogging
B-network-neutral
C-behavioral marketing
D-lifestreaming
Select whether the statement is true or false. Surveillance camera networks in public places
are not considered a potential threat to privacy.
Use letter keys to select choices
1. A-true
2. B-false
Fill in the blank with the correct answer by typing in the box. Lifestreaming is a type
of______________
Google Wallet software utilizes Android phones with near field communication technology,
such as _____, to allow shoppers to swipe their phones at checkout to pay for items.
Use letter keys to select choices
1.
2.
3.
4.
A-RFID
B-B2C
C-HTTP
D-EDI
Which of the following is a benefit to the United States of offshoring?
Use letter keys to select choices
1.
2.
3.
4.
A-an increase in the domestic labor market
B-increased demand for American exports
C-a reduction in global competition
D-a higher income tax base
Click an item in one column, then select its match in the other column. If using a keyboard,
use the tab key to highlight an item, then use the space bar to select it. Match the term with
the correct example.
You must provide all correct answers in order to receive credit; partial credit is not allowed.
Use the left and right arrow keys to navigate between terms and definitions. Use the up and
down arrow keys to navigate between choices



Distributed workforce
Offshoring
Outsourcing



Production companies in the US, UK, and France collaborating on a film
A game publisher closing its studio in Houston and moving to Canada
An American film studio paying workers in Korea to create 3D models
Select whether the statement is true or false. The Y2K scare in 2000 played a significant
role in the U.S. business practice of outsourcing to programmers in India.
Use letter keys to select choices
1. A-true
2. B-false
A(n) _____ provides software and a network that connects businesses within an industry.
Use letter keys to select choices
1.
2.
3.
4.
A-etail site
B-cybermall
C-electronic exchange
D-online community
Fill in the blank with the correct answer by typing in the box. Although delivery
by ____________-sounds like a marketing gimmick and has run into obstacles from the U.S.
Federal Aviation Administration, it is expected to be widely implemented within the next ten
years.
EDI, ________, smart cards, and digital certificates are designed to support safe and secure
online transactions.
Use letter keys to select choices
1.
2.
3.
4.
A-USB
B-easyCash
C-ecert
D-ecash
A(n) ________ company maintains management in its home country and markets its products
the same way in all countries and cultures in which they are sold.
Use letter keys to select choices
1.
2.
3.
4.
A-international
B-transnational
C-multinational
D-global
A(n) ____ company maintains its management and business operations in its home country
while exporting products to or importing products from other countries.
Use letter keys to select choices
1.
2.
3.
4.
A-transnational
B-global
C-international
D-multinational
Select whether the statement is true or false. GSM companies are sometimes referred to as
spend management services because they assist businesses in managing inventory.
Use letter keys to select choices
1. A-true
2. B-false
1. Explain how digital technology affects modern life(ESSAY)
In a new document, write a one-page essay in which you answer the following question.
Re-watch your favorite movie (from at least ten years ago) and make note of plot
elements that no longer make sense, given the advancement of digital technology since
it was released. How would you change the plot to make it relevant today?
Example: Every plot from the television show “Seinfeld” would have been resolved in
minutes if all the characters had cell phones.
-Review the rubric for this assignment to see how you will be graded on the essay.
-Upload your completed document to the assignment and submit for grading.

Purchase answer to see full
attachment

Explanation & Answer:
150 Answers 41 Pages

Tags:
social media platforms

Digital Literacy

Information Technoilogy

User generated content is uploaded by users for the purposes of learning and should be used following Studypool’s honor code & terms of service.

Reviews, comments, and love from our customers and community:

Article Writing

Keep doing what you do, I am really impressed by the work done.

Alexender

Researcher

PowerPoint Presentation

I am speechless…WoW! Thank you so much!

Stacy V.

Part-time student

Dissertation & Thesis

This was a very well-written paper. Great work fast.

M.H.H. Tony

Student

Annotated Bibliography

I love working with this company. You always go above and beyond and exceed my expectations every time.

Francisca N.

Student

Book Report / Review

I received my order wayyyyyyy sooner than I expected. Couldn’t ask for more.

Mary J.

Student

Essay (Any Type)

On time, perfect paper

Prof. Kate (Ph.D)

Student

Case Study

Awesome! Great papers, and early!

Kaylin Green

Student

Proofreading & Editing

Thank you Dr. Rebecca for editing my essays! She completed my task literally in 3 hours. For sure will work with her again, she is great and follows all instructions

Rebecca L.

Researcher

Critical Thinking / Review

Extremely thorough summary, understanding and examples found for social science readings, with edits made as needed and on time. Transparent

Arnold W.

Customer

Coursework

Perfect!

Joshua W.

Student

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes:

<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>