

Technology and Society
Midterm Exam
Course Introduction
Technology and Society explores the dynamic relationship between technological innovation and social change. The course examines how advances in technology shape social structures, cultural values, economic systems, and political institutions, while also considering how societal needs and values drive the development and use of technology. Through case studies, historical analysis, and contemporary issues, students analyze the ethical, environmental, and global implications of technology, fostering a critical awareness of how technological choices impact individual lives and society as a whole.
Recommended Textbook
Digital Planet Tomorrows Technology and You Complete 10th Edition by George Beekman
Available Study Resources on Quizplus
16 Chapters
1825 Verified Questions
1825 Flashcards
Source URL: https://quizplus.com/study-set/1505

Page 2

Chapter 1: Exploring Our Digital Planet
Available Study Resources on Quizplus for this Chatper
133 Verified Questions
133 Flashcards
Source URL: https://quizplus.com/quiz/29812
Sample Questions
Q1) In the ________ age,most people earn their living working with words,numbers,and ideas.
Answer: information
Q2) The difficulty of defining and protecting intellectual property in an all-digital age refers to all of the following EXCEPT:
A)musical recordings.
B)software programs.
C)personal photographs.
D)books.
Answer: C
Q3) ________ applications are stored on the Web so they can be accessed and used by multiple computers with Internet access.
A)Database
B)Network
C)Web
D)Spreadsheet
Answer: C
Q4) A Web ________ is a program that allows access to the WWW. Answer: browser
To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Hardware Basics: Inside the Box
Available Study Resources on Quizplus for this Chatper
146 Verified Questions
146 Flashcards
Source URL: https://quizplus.com/quiz/29819
Sample Questions
Q1) If a user needs information instantly available to the CPU,it should be stored
A)in the CPU.
B)in RAM.
C)in secondary storage.
D)on a USB device.
Answer: B
Q2) A group of 8 bits is known as a A)kilobyte.
B)binary digit.
C)byte.
D)megabit.
Answer: C
Q3) To make words,sentences,and paragraphs fit into the computer's binary only circuitry, programmers have devised codes that represent each letter,digit,and special character as a unique string of bits.
A)True
B)False
Answer: True
Q4) The number of bits a CPU can process simultaneously is the CPU's ________ size.
Answer: word
To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Hardware Basics: Peripherals
Available Study Resources on Quizplus for this Chatper
133 Verified Questions
133 Flashcards
Source URL: https://quizplus.com/quiz/29820
Sample Questions
Q1) The display size of a monitor is measured
A)diagonally.
B)horizontally.
C)vertically.
D)from center to the furthest corner.
Answer: A
Q2) Controllers with force feedback,also known as ________ feedback,can receive signals from a computer and give tactile feedback-jolts,scrapes,and bumps-that matches the visual output of the game or simulation.
Answer: haptic
Q3) One way to describe resolution is by indicating the number of columns and rows of pixels,such as 1,024 x 768.
A)True
B)False
Answer: True
Q4) A CD-ROM drive is the oldest type of optical drive.
A)True
B)False Answer: True
To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Software Basics: the Ghost in the Machine
Available Study Resources on Quizplus for this Chatper
127 Verified Questions
127 Flashcards
Source URL: https://quizplus.com/quiz/29821
Sample Questions
Q1) The ________ driver functions as a behind-the-scenes intermediary whenever the user requests that a document be printed on a printer.
A)device driver
B)ROM
C)printer
D)Unix
Q2) MS-DOS stands for ________ Disk Operating System.
Q3) Minor revisions in software are often reflected in the use of
A)whole numbers.
B)decimal numbers.
C)version letters.
D)upgrade code letters.
Q4) If the computer is on and the computer is running properly,the ________ must be active and running.
A)BIOS instructions
B)operating system
C)large array of utility programs
D)ROM
Q5) A(n)________ protects mechanical inventions.
Q6) ________ is the best known example of open-source software.
To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Productivity Applications
Available Study Resources on Quizplus for this Chatper
118 Verified Questions
118 Flashcards
Source URL: https://quizplus.com/quiz/29822
Sample Questions
Q1) The type of chart used in a spreadsheet to discover rather than display a relationship between two variables is a(n)________ chart.
Q2) ________ in a spreadsheet,often text such as Quarter 1,Quarter 2,and Northwest District in the top row and far left column,are meaningless to the computer,but useful for the reader.
Q3) If a word-processed document is straight on the right margin but ragged on the left,it is ________ aligned.
Q4) Digital versions of books are also known as ________ books (also known as e-books).
Q5) Computer modeling can be done with all the following EXCEPT:
A)mathematical applications.
B)spreadsheets.
C)desktop-publishing software.
D)standard programming languages.
Q6) The bulk of the production process for a book or magazine is done using ________ publishing software.
Q7) When the title of a book consistently appears at the top of every page,the user has formatted a(n)________.
To view all questions and flashcards with answers, click on the resource link above. Page 7
Q8) The feature that automatically corrects the spelling mistake is called ________.

Chapter 6: Graphics, digital Media, and Multimedia
Available Study Resources on Quizplus for this Chatper
110 Verified Questions
110 Flashcards
Source URL: https://quizplus.com/quiz/29823
Sample Questions
Q1) Video projects normally start with an outline and a(n) A)digitizer.
B)analog backup.
C)digital feed.
D)storyboard.
Q2) The equivalent of PPI for print media is known by the acronym ________.
Q3) A vector graphics format that is associated with Adobe Flash is A)SWF.
B)SVG.
C)GIF.
D)JPG.
Q4) ________ photographs,drawings,text,or company logos should not be used without permission from the creator.
Q5) All EXCEPT ________ are music file formats.
A)AAC
B)MP3
C)WMA
D)SWF
Q6) When printing an object-oriented graphic,resolution is limited only by the ________ device,such as the printer.
Page 8
To view all questions and flashcards with answers, click on the resource link above.

Chapter 7: Database Applications and Privacy Implications
Available Study Resources on Quizplus for this Chatper
126 Verified Questions
126 Flashcards
Source URL: https://quizplus.com/quiz/29824
Sample Questions
Q1) Arranging all customer records in customer number order is an example of
A)querying.
B)sorting.
C)inquiring.
D)filtering.
Q2) Oracle offers support for multidimensional database products.
A)True
B)False
Q3) A computerized ________ is a good comparison to a database.
A)file cabinet
B)typewriter
C)overhead projector
D)calculator
Q4) One example of a PIM is ________.
A)Outlook
B)SQL Server
C)Access
D)MapQuest
Q5) In client/server computing,connectivity software can also be called ________.
Q6) In a client/server environment,a desktop computer is known as the ________.
To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Networking and Digital Communication
Available Study Resources on Quizplus for this Chatper
134 Verified Questions
134 Flashcards
Source URL: https://quizplus.com/quiz/29825
Sample Questions
Q1) Another name for the original Ethernet standard is ________.
A)10BASE-T Ethernet
B)Fast Ethernet
C)Gigabit Ethernet
D)3G
Q2) Most email messages are junk email,also known as A)IM.
B)a virus.
C)spam.
D)an avatar.
Q3) Computer ________ integration links computers and telephones to increase productivity.
Q4) Wi-Fi refers to A)wireless LAN connections.
B)a new connection which uses fiber-optic cables to connect a PC to the Internet.
C)a drive on a laptop that connects to the Internet.
D)the bandwidth of the server to which a laptop connects.
Q5) Network transmission speeds are measured in ________ per second,and this term can be proceeded by units such as kilo,mega or giga.
To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: The Evolving Internet
Available Study Resources on Quizplus for this Chatper
115 Verified Questions
115 Flashcards
Source URL: https://quizplus.com/quiz/29826
Sample Questions
Q1) The IP protocol defines the ________ system of the Internet.
A)packet
B)browser
C)addressing
D)search engine
Q2) URLs uniquely identify ________.
A)a Web site
B)an email address
C)a computer
D)a Web page
Q3) The newest version of the Internet Protocol is known by the abbreviation ________.
Q4) search engine
A)browser on client computer asks for information
B)information delivered from the Internet to the client computer
C)stores user preferences on a client computer
D)iGoogle or Yahoo!
E)finds Web pages to match user criteria
Q5) Streaming transmission of radio or a concert is done via a(n)________.
Q6) An example of an IP ________ might be 192.168.17.22.
Page 11
To view all questions and flashcards with answers, click on the resource link above.

Chapter 10: Computer Security and Risks
Available Study Resources on Quizplus for this Chatper
84 Verified Questions
84 Flashcards
Source URL: https://quizplus.com/quiz/29813
Sample Questions
Q1) Placing a phone call pretending to be someone else,in order to trick someone into doing something is also known as
A)phishing.
B)identity theft.
C)spoofing.
D)hacking.
Q2) Both viruses and ________ use computer hosts to replicate.
Q3) ________ is defined as any crime completed through the use of computer technology.
A)Computer forensics
B)Computer crime
C)Phishing
D)Cracking
Q4) RAID is a collection of Internet-based disks that serve to back up a hard drive.
A)True
B)False
Q5) An attack that creates so much bogus traffic it shuts down a network is known by the acronym ________.
Q6) ________ weapons are missiles that use computerized guidance systems to locate their targets.
Page 12
To view all questions and flashcards with answers, click on the resource link above.

Chapter 11: Computers at Work, school, and Home
Available Study Resources on Quizplus for this Chatper
96 Verified Questions
96 Flashcards
Source URL: https://quizplus.com/quiz/29814
Sample Questions
Q1) ________ provides custom newscasts and entertainment features aimed at one individual.
A)Pointcasting
B)Webcasting
C)Podcasting
D)Edutainment
Q2) The organization One Laptop Per ________ has the goal of creating a state-of-the-art laptop that costs less than $75.
Q3) In an automated environment,as the number of factory jobs declines,________ jobs increase and play a more important role in the economy.
A)office worker
B)blue-collar
C)physical laborer
D)top management
Q4) During the ________ age,the U.S.educational system was developed.
A)agricultural
B)information
C)mechanical
D)industrial
To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 12: Information Systems in Business
Available Study Resources on Quizplus for this Chatper
129 Verified Questions
129 Flashcards
Source URL: https://quizplus.com/quiz/29815
Sample Questions
Q1) A(n)________ system gives managers access to the knowledge of professionals in a narrow area of interest.
Q2) In the value chain model,the primary activity ________ includes receiving,storing,and distributing raw materials.
A)operations
B)procurement
C)service
D)inbound logistics
Q3) Two methods to keep track of a project's schedule are PERT and CPM.
A)True
B)False
Q4) All of the following are examples of transactions in an information system EXCEPT: A)acquiring products from vendors.
B)selling items.
C)paying employees.
D)storage of sales records.
Q5) An organization may develop a code of ________ to guide the behavior of its workers.
Q6) The three management levels are operational,strategic,and ________.
Page 14
To view all questions and flashcards with answers, click on the resource link above.
Chapter 13: E-Commerce and E-Business: the Evolving Internet Economy
Available Study Resources on Quizplus for this Chatper
68 Verified Questions
68 Flashcards
Source URL: https://quizplus.com/quiz/29816
Sample Questions
Q1) Mobile tickets,mobile coupons,and mobile purchases are examples of mobile ________ applications that will become increasingly common in the next few years.
Q2) One site that facilitates C2C commerce is A)eBay.
B)Google.
C)Walmart.
D)United Airlines.
Q3) Which of the following statements describes a code of ethics?
A)It generally contains information about the company's privacy policies.
B)It offers users almost unlimited freedom of choice in merchandise.
C)It increases Web site traffic by improving search engine rankings.
D)It allows users to make payments online.
Q4) When you purchase an item from eBay,the electronic payment can be processed using A)SQL.
B)Microsoft.
C)PayPal.
D)CRM.

Page 15
Q5) One example of a C2C site is the online auction site ________.
Q6) An alternative to Paypal is Google ________.
To view all questions and flashcards with answers, click on the resource link above.
Page 16

Chapter 14: Systems Design and Development
Available Study Resources on Quizplus for this Chatper
145 Verified Questions
145 Flashcards
Source URL: https://quizplus.com/quiz/29817
Sample Questions
Q1) Computer-aided systems engineering tools generally include charting and diagramming tools to draw system flowcharts and data flow diagrams.
A)True
B)False
Q2) Generally,logic errors are easier to detect than syntax errors.
A)True
B)False
Q3) The step in the problem-solving process that determines the resources that are available for a project is
A)understanding the problem.
B)devising a plan.
C)evaluating.
D)carrying out the plan.
Q4) ________ development is a problem-solving process that begins when someone recognizes a problem or opportunity and ends with evaluation of the solution.
Q5) A(n)________ is a program that translates and transmits computer program statements one at a time.
Q6) ________ is a mix of English and a computer language used to write algorithms.
To view all questions and flashcards with answers, click on the resource link above. Page 17

Chapter 15: Is Artificial Intelligence Real
Available Study Resources on Quizplus for this Chatper
80 Verified Questions
80 Flashcards
Source URL: https://quizplus.com/quiz/29818
Sample Questions
Q1) Successful expert systems were first developed in the field of A)insurance.
B)medicine.
C)accounting.
D)law enforcement.
Q2) heuristics
A)rules of thumb
B)identifies recurrences in input data
C)looking ahead at the possibilities generated by each possible move
D)the computer uses successful moves more often in the future
Q3) Traditional AI techniques include all of the following EXCEPT:
A)machine learning.
B)heuristics.
C)pattern recognition.
D)batch processing.
Q4) Stating a conclusion as "There is a 90% chance..." instead of fact is known as A)an expert system.
B)a Turing test.
C)fuzzy logic.
D)pattern recognition.
To view all questions and flashcards with answers, click on the resource link above. Page 18

Chapter 16: Computer and Internet Terminology
Available Study Resources on Quizplus for this Chatper
81 Verified Questions
81 Flashcards
Source URL: https://quizplus.com/quiz/29827
Sample Questions
Q1) Google's ________ is an electronic mail service accessible through a standard Web browser.
Q2) search engine
A)multimedia content through the Internet
B)clickable text on a Web page that takes you somewhere else
C)saved URL you want to revisit
D)collection of Web pages with text and images
E)http://www.pearsonhighered.com
F)database of Web page locations created automatically
G)hierarchical catalog of Web sites compiled by researchers
H)software to view Web pages
Q3) A computer may have a(n)________ connection to a network-cables might connect it to other computers,printers,and devices in an office or student lab.
Q4) What device is considered the "brains" of the computer?
A)CPU
B)RAM
C)hard disk
D)System unit
Q5) Unwanted email received from mass mailers is also known as ________.
Q6) The ________ name is the portion of an email address after the at sign (@).
Page 19
To view all questions and flashcards with answers, click on the resource link above.