Reinforcement Activities 18.2 Name Period Chapter 18 Technology in the Workplace Section 18.1 – Technology in the Workplace PART 1: Business Week Case Study: “Math Will Rock Your World” Directions: Read the Business Week Reader on page 318 of your textbook and answer the questions. 1. To what is Inform Technologies LLC compared? Answer: 2. What two branches of math are involved in analyzing articles? Answer: 3. In what language are the articles that undergo analysis written? Answer: 4. What two aspects of the articles are used to group those that were related? Answer: 5. The article mentions that Mr. Goldman works on Wall Street. In what type of work is he probably involved? Answer: 6. If you were a customer of Inform Technologies LLC, would you be likely to get many news feeds you would glance at quickly and discard? Why? Answer: 7. Why do you think it is “almost impossible to conjure up in our earthbound minds” something that has near-infinite dimensions? Answer: PART 2: Review Reading Directions: Read the article and answer the question. Spyware’s Growing Arsenal Dave Moll, CEO of Webroot and publisher of the quarterly repost State of Spyware, states: “We’re finding out that the social-networking sites like MySpace are turning out to be hotbeds for spyware” – programs that become embedded in computers and track users’ Web-surfing habits and generate annoying pop-up ads. Many younger users aren’t sufficiently cautious about where and how they surf the Web, Moll says. “They’re not looking out for danger in quite the way that more skeptical adults do,” he says. Young people tend to be less cautious, and that is being preyed upon by all kinds of Internet villains.” 1 Reinforcement Activities 18.2 Name Period Overall, Moll says, 89 percent of consumer PCs are infested with some kind of spyware, and on the average, home computers contain 30 individual spyware programs. 1. Explain why it is important for you to be aware and cautious when using social networking sties on the Internet. Answer: Part 3 Content Vocabulary Directions: Match each key term to its definition. Write the term in the space provided. computer-aided design cookies extranet World Wide Web hacker information technology Internet intranet 1. This is a collection of tens of thousands of connected computer networks. 2. This is a powerful tool for planning and design. 3. This is hardware and software used to create, process, store and communicate information. 4. This is a network that allows a company to connect employees but is closed to the public, 5. These are pieces of information stored in a hard drive and accessed by a server when the user connects to a Web site. 6. This is a person who breaks into computer systems for illegal purposes. 7. These are small, lightweight computers that workers carry on themselves. 8. This is a program that allows more than one company to access the same information. 9. This is a work arrangement that allows employees to work away from the workplace. 10. This is a program that makes searching and retrieving information on the Web easier. 2 telecommuting wearable computers Web browser Reinforcement Activities 18.2 Name Period Part 4 Critical Thinking Directions: Read the statement or question, think about your response then type it in the space provided. Use complete sentences please. 1. The electronic transfer of information has replaced much of the paper used in offices. What are some benefits of using less paper in the office? 2. Virtual reality is used by business for training. What are two more ways that virtual reality is used? 3. With mobile technology, workers can be in touch with their workplace all the time. Write a 3.8 paragraph about the pros and cons of mobile technology. 3