PART 2

advertisement
Reinforcement Activities 18.2
Name
Period
Chapter 18 Technology in the Workplace
Section 18.1 – Technology in the Workplace
PART 1: Business Week Case Study: “Math Will Rock Your World”
Directions: Read the Business Week Reader on page 318 of your textbook and answer the questions.
1. To what is Inform Technologies LLC compared?
Answer:
2. What two branches of math are involved in analyzing articles?
Answer:
3. In what language are the articles that undergo analysis written?
Answer:
4. What two aspects of the articles are used to group those that were related?
Answer:
5. The article mentions that Mr. Goldman works on Wall Street. In what type of work is
he probably involved?
Answer:
6. If you were a customer of Inform Technologies LLC, would you be likely to get many
news feeds you would glance at quickly and discard? Why?
Answer:
7. Why do you think it is “almost impossible to conjure up in our earthbound minds”
something that has near-infinite dimensions?
Answer:
PART 2: Review Reading
Directions: Read the article and answer the question.
Spyware’s Growing Arsenal
Dave Moll, CEO of Webroot and publisher of the quarterly repost State of Spyware, states:
“We’re finding out that the social-networking sites like MySpace are turning out to be hotbeds for
spyware” – programs that become embedded in computers and track users’ Web-surfing habits and
generate annoying pop-up ads.
Many younger users aren’t sufficiently cautious about where and how they surf the Web, Moll
says. “They’re not looking out for danger in quite the way that more skeptical adults do,” he says.
Young people tend to be less cautious, and that is being preyed upon by all kinds of Internet villains.”
1
Reinforcement Activities 18.2
Name
Period
Overall, Moll says, 89 percent of consumer PCs are infested with some kind of spyware, and on
the average, home computers contain 30 individual spyware programs.
1.
Explain why it is important for you to be aware and cautious when using social networking sties
on the Internet.
Answer:
Part 3 Content Vocabulary
Directions: Match each key term to its definition. Write the term in the space
provided.
computer-aided design
cookies
extranet
World Wide Web
hacker
information technology
Internet
intranet
1.
This is a collection of tens of thousands of
connected computer networks.
2.
This is a powerful tool for planning and design.
3.
This is hardware and software used to create,
process, store and communicate information.
4.
This is a network that allows a company to connect
employees but is closed to the public,
5.
These are pieces of information stored in a hard
drive and accessed by a server when the user
connects to a Web site.
6. This is a person who breaks into computer systems
for illegal purposes.
7. These are small, lightweight computers that
workers carry on themselves.
8. This is a program that allows more than one
company to access the same information.
9. This is a work arrangement that allows employees
to work away from the workplace.
10. This is a program that makes searching and
retrieving information on the Web easier.
2
telecommuting
wearable computers
Web browser
Reinforcement Activities 18.2
Name
Period
Part 4 Critical Thinking
Directions: Read the statement or question, think about your response then
type it in the space provided. Use complete sentences please.
1.
The electronic transfer of information has replaced much of the paper used in offices. What are
some benefits of using less paper in the office?
2.
Virtual reality is used by business for training. What are two more ways that virtual reality is
used?
3.
With mobile technology, workers can be in touch with their workplace all the time. Write a 3.8
paragraph about the pros and cons of mobile technology.
3
Download