Lesson 17—Technology, the Workplace, and Society TRUE/FALSE

advertisement
Lesson 17—Technology, the Workplace, and Society
TRUE/FALSE
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
Computer Based Learning and CAI describe the same thing.
The amount of available information is increasing faster than we can process it.
E-commerce and electronic commerce are words that have the same meaning.
E-commerce is restricted to the banking industry.
Groupware is software you can use for free for a specified period of time.
When a person uses digital cash, you can obtain information about that person.
Copyright is the legal protection for authors of creative works.
A computer crime is a criminal act committed through the use of a computer.
Unauthorized use of a computer is not considered a crime.
A time bomb is a virus that does not cause damage to computer data until a certain date.
There is nothing you can do to protect your computer data from viruses.
There is no need to save e-mail attachments to disk before reading them.
A time bomb virus makes copies of itself.
Computer equipment also is subject to hazards such as flooding, fire, and electrical outages.
Software piracy is not an issue for most companies.
MULTIPLE CHOICE
1. ____ reality is an artificial environment that appears to feel like a real environment.
a. Artificial
c. Genetic
b. Cloned
d. Virtual
2. Computer simulation is sometimes referred to as ____.
a. desktop VR
c. artificial VR
b. virtual VR
d. cloning
3. Junk mail that is sent to your e-mail address is called ____.
a. digital trash
c. ROM
b. Electros
d. spam
4. ____ is the system that allows someone to pay by transmitting a number from one computer to another.
a. data diddling
c. distance learning
b. digital cash
d. electronic commerce
5. ____ refers to programs and software that help people work together even if they are far apart.
a. Electronic commerce
c. Virtual reality
b. Genetic engineering
d. Groupware
6. Which is an example of plagiarism?
a. buying a “free term paper”
b. paraphrasing information and not crediting the source
c. having someone write a report for you
d. all of the above
7. A ____ is a computer virus that makes many copies of itself.
a. time bomb
c. hacker
b. worm
d. slacker
8. You should change your computer ____ frequently as a security measure.
a. password
c. keyboard
b. position
d. mouse
9. The ____ method of security is usually used when high-level security is required.
a. piracy
c. biometric
b. shareware
d. genetic
10. What tool is said to be one of the biggest factors affecting education today?
11.
12.
13.
14.
15.
a. WebQuest
c. plagiarism
b. Internet
d. artificial intelligence
____ is a type of activity that uses the Internet for investigation and problem solving.
a. Simulation
c. WebQuest
b. Virtual reality
d. WebSearch
According to the National Center for Education, ____% of public schools are connected to the Internet.
a. 80
c. 90
b. 85
d. 93
____ provide guidance and testing for the online student.
a. Web-based teaching tools
c. Computer assignments
b. Open-book tests
d. All of the above
Computer-based learning uses a computer as a(n) ____.
a. assistant
c. tutor
b. maid
d. homework manager
____ are models of real-world activities.
a. Virtual reality shows
c. Tutorials
b. Simulations
d. Presentations
COMPLETION
1. ____________________ uses the Internet for investigation and problem solving and is used by
hundreds of schools all over the country.
2. The Star Schools Program provides ____________________ education.
3. Computer ____________________ are models of real-world activities.
4. A(n) ____________________-mounted display often is used in virtual reality.
5. Virtual reality environments are created with computer hardware and ____________________.
6. Electronic commerce means having a(n) ____________________ business.
7. With ____________________, you can pay for an item by transmitting a number from one computer to
another.
8. In e-commerce, digital cash numbers are issued by a(n) ____________________.
9. Computer ____________________ is conduct that involves the manipulation of computer data in order
to obtain money, property, or value dishonestly.
10. A(n) ____________________ is a program that is written to cause corruption of data on a computer.
11. ____________________ is a disorder caused by using a keyboard on a consistent basis.
12. The penalty for copying software can be up to $____________________..
13. The first computer crime was committed in ____________________.
14. Much of the personal data collected on the Internet is sold for ____________________ lists.
15. The best way to protect data is to control data ____________________.
16. ____________________ security measures examine fingerprints and voice patterns.
17. One computer security measure is to frequently change your login or ____________________.
18. The ____________________ protects the software developer.
19. A(n) ____________________ investigates different technology options to determine which is best for a
particular situation.
20. It is the employer’s responsibility to provide a(n) ____________________ working environment for
employees.
Download