Technology In Action Chapters 1 & 2

Created by LeahWild 

Upgrade to
remove ads

Bluetooth Technology

_____ is a type of wireless communication that transmits data through radio waves.

Nanotechnology

_____ is the science revolving around building devices on an extremely small scale.

Computer Literate

Being ____ means being familiar enough with computers that you understand their capabilities and limitations.

One-billionth

The prefix nano stands for ____.

RFID

____ tags, when placed on an animal, can be used to record and track in a database all of the animal's movements.

Peripheral Devices

Devices such as monitors and printers that are connected to the computer are called ____.

Numbers

Computers process data into information by working exclusively with ____.

Spam

All of the following are examples of real security and privacy risks except:

Three

Monitor screen grids are made up of millions of pixels, with each pixel containing ____ subpixels of colors.

Universal serial bus (USB)

____ ports are now the most common ports for connecting input and output devices to the computer.

USB port

Flash drives plug in a ____.

Computer Forensics

____ is the application of computer systems and techniques to gather potential legal evidence.

Megabyte

A ____ is approximately 1 million bytes.

Port

A(n) ____ is where a peripheral device can attach to a computer so that data can be exchanged between it and the operating systems.

Digital Divide

The difference between people with access to computers and the internet and those without this access is known as the ____.

Smartphone

A ____ is a small device that enables users to carry digital information.

Network adapter

A ____ is a special device that is installed in your computer and allows it to communiccate with other devices in the network.

Output

After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered ____.

Binary Digit

The term "bit" is short for ____.

A Warm boot

Restarting a computer when it is already powered on is called ____.

ROM

____ is a form of permanent memory that holds all the instructions the computer needs to start up.

Analyzing the data or information

Which of the following is NOT one of four major data processing functions of a computer?

Eight

____ binary digits (or bits) combine to create one byte.

Motherboard

The ____ contains the central electronic components of the computer.

Hardware

Any computer parts that you can actually touch are considered to be ____.

System

____ software is the set of programs that enables the computer's hardware devices and application software to work together.

Biomedical chip implants

One potential application of ____ is to provide sight to the blind.

Nonvolatile

The hard disk drive is a ____ storage device, meaning that it stores data permanently.

Input

Computers gather data, which means that they allow users to ____ data.

Binary

The ____ language consists of just two digits: 0 and 1.

Temporary

RAM is considered volatile storage, which means it is ____.

Data mining

The process of searching huge amounts of data with the hope of finding a pattern is called ____.

Legacy technology

The term ____ describes computing devices or peripherals that use techniques, parts, and methods from an earlier time that are no longer popular.

Robotics

Surgeons use ____ to perform delicate operations by manipulating devices through computers instead of manually.

Eight bytes

In binary language, each letter of the alphabet, each number, and each special character is made up of a unique combination or ____.

Information

____ is data that has been organized or presented in a meaningful fashion.

Biomedical chip research

The goal of ____ is to provide solutions to physical problems, such as providing sight to the blind.

Blackboard or Moodle

Many online courses are designed to use management software like ____ so that students can communicate outside of class, take quizzes online, and find their class materials easily.

Network interface card (NIC)

A ____ enables your computer to connect to other computers or to the internet.

Gigabyte

A ____ is approximately 1 billion bytes.

The contents in RAM are erased

What happens to RAM when electricity is lost or the computer shuts down suddenly and a document that you are working on has not yet been saved?

Information technology

____ is a field of study focused on information handling and retrieval of information automatically.

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set