Filters
Question type

Study Flashcards

Ushahidi is a crisis-mapping tool that makes information instantly available to anyone in the world.

A) True
B) False

Correct Answer

verifed

verified

________ tools gather information from sources such as e-mails, text messages, and tweets and make the information instantly and publicly available for use in emergencies.


A) Social networking
B) Crowdsourcing
C) Crisis-mapping
D) Affective computing

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

Using software such as Adobe Illustrator, Adobe Photoshop, and Corel Painter allows artists to create ________ art.

Correct Answer

verifed

verified

The term ________ literate means being familiar enough with computers to understand their capabilities and limitations and knowing how to use them.

Correct Answer

verifed

verified

Unwanted or junk e-mail is called ________.


A) spam
B) spyware
C) adware
D) malware

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

________ solicits online input such as product ratings from consumers.


A) A quick response code
B) Computer forensics
C) Crowdsourcing
D) Crowdfunding

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

Crowdfunding is asking for large donations from a few people.

A) True
B) False

Correct Answer

verifed

verified

Hardware refers to the programs that give instructions to the computer.

A) True
B) False

Correct Answer

verifed

verified

Which of the following examples is the result of mining raw data to produce useful information?


A) An Excel spreadsheet listing all employees and their annual salaries in a random order
B) Amazon providing you a list of products similar to others you've viewed
C) Raw data from questionnaires given at the mall
D) A printout of all sales taken from the register at the end of the day

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Mastery is defined as ________.


A) combining leisure time with the tools to be creative
B) feeling confident and excited about learning new skills
C) working without continual direction and control
D) working for something larger

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

________ analyzes computer systems using techniques to gather legal evidence.

Correct Answer

verifed

verified

QR or ________ codes let any piece of print host a link to online information.


A) quick retention
B) quick response
C) quality response
D) quality retention

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

Which of these is NOT a system of ethics?


A) Humanism
B) Relativism
C) Divine Command Theory
D) Utilitarianism

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

________ behavior is not conforming to a set of approved standards of behavior.


A) Unethical
B) Amoral
C) Illegal
D) Dogmatic

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Computer forensics analyzes computer systems to gather potential legal evidence.

A) True
B) False

Correct Answer

verifed

verified

Showing 61 - 75 of 75

Related Exams

Show Answer