|
1 | | A new medium (technology), as observed in "Five Things We Need to Know About Technological Change": |
| | A) | simply adds something. |
| | B) | usually takes something away. |
| | C) | changes everything. |
| | D) | changes nothing. |
|
|
|
2 | | As stated in "Five Things We Need to Know About Technological Change," in American society, the most significant "radicals" have always been: |
| | A) | religious figures. |
| | B) | capitalists. |
| | C) | socialists. |
| | D) | educators. |
|
|
|
3 | | As asserted in "Five Things We Need to Know About Technological Change," there are always both winners and losers in technological change. |
| | A) | True |
| | B) | False |
|
|
|
4 | | As mentioned in "Moore's Law and Technological Determinism," Thomas Parke Hughes, Wiebe Bijker, and Donald MacKenzie were among the generation of scholars who brought about the notion of technology's: |
| | A) | contextual approach. |
| | B) | static trajectory. |
| | C) | social construction. |
| | D) | determinism. |
|
|
|
5 | | As expressed in "Moore's Law and Technological Determinism," the rapid introduction of an enormous number of new products, services, and ways of working and living is very much the result of the steady and unstoppable march of: |
| | A) | our "plug-and-play" mentality. |
| | B) | semiconductor density. |
| | C) | the so-called sixth dimension. |
| | D) | mass production. |
|
|
|
6 | | As explained in "Moore's Law and Technological Determinism," Moore's law is analogous to Ohm's law, which relates resistance to current. |
| | A) | True |
| | B) | False |
|
|
|
7 | | As suggested in "A Passion for Objects," Bill Gates recently pointed out that: |
| | A) | in math and science American students rank near the top worldwide at all grade levels. |
| | B) | American math and science education is among the best in the world. |
| | C) | American math and science education is sorely deficient compared to the rest of the world. |
| | D) | while American students rank highly in math and science worldwide in the fourth grade, by the twelfth grade their rank falls significantly. |
|
|
|
8 | | As noted in "A Passion for Objects," the author states that it is not good to turn to computers to solve the educational crisis because: |
| | A) | they are ineffective and unreliable. |
| | B) | they have become increasingly opaque. |
| | C) | computer learning does not involve the object play critical to scientific education. |
| | D) | computer use does not require essential critical thinking skills. |
|
|
|
9 | | As stated in "A Passion for Objects," the early personal computers were far too complex for the manipulation of assembly code. |
| | A) | True |
| | B) | False |
|
|
|
10 | | As presented in "Online Salvation?", newspapers have responded to the increased interest in and utilization of the Internet by: |
| | A) | moving their content online. |
| | B) | increasing their print page count. |
| | C) | adding staff to their newsrooms. |
| | D) | increasing their subscriber base. |
|
|
|
11 | | As defined in "Online Salvation?", a "fly-by" is a person who: |
| | A) | does not use the Internet. |
| | B) | does not purchase products from Internet advertisers. |
| | C) | visits an Internet site briefly and irregularly. |
| | D) | reads both the print version and the online version of a newspaper. |
|
|
|
12 | | As noted in "Online Salvation?", Internet traffic at large, well-known newspaper sites is increasing, while traffic is decreasing at mid-sized and smaller newspaper sites. |
| | A) | True |
| | B) | False |
|
|
|
13 | | As noted in "Publish or Perish," in order to encourage sales of its e-book reader the Kindle, the online store Amazon: |
| | A) | offered free e-books with the purchase of a Kindle. |
| | B) | sold e-books at a loss. |
| | C) | discontinued the sale of hardcovers. |
| | D) | sold the Kindle at a loss. |
|
|
|
14 | | As outlined in "Publish or Perish," the profit generated by each $26 hardcover book amounts to: |
| | A) | $13.00. |
| | B) | $3.90. |
| | C) | $5.20. |
| | D) | about $1.00. |
|
|
|
15 | | As disclosed in "Publish or Perish," in 2009 electronic book sales increased by 177 percent. |
| | A) | True |
| | B) | False |
|
|
|
16 | | As reported in "Great Wall of Facebook," Facebookers in the know revealed that their company's favored partner had always been: |
| | A) | Apple. |
| | B) | Java. |
| | C) | Microsoft. |
| | D) | Mountain View. |
|
|
|
17 | | As cited in "Great Wall of Facebook," Facebook executives concede that Google has an insurmountable lead in: |
| | A) | user satisfaction. |
| | B) | consumer trust. |
| | C) | search advertising. |
| | D) | investment strategy. |
|
|
|
18 | | As noted in "Great Wall of Facebook," Facebook hopes to one day sell advertising across all of its partner sites and apps, not just on its own site. |
| | A) | True |
| | B) | False |
|
|
|
19 | | As stated in "Personally Controlled Online Health DataThe Next Big Thing in Medical Care?," perhaps the most widely used personal-health records are hospitals' or medical groups' electronic medical records reached through a secure Web connectionthat is, a: |
| | A) | client gateway. |
| | B) | sanctioned ingress. |
| | C) | discreet access. |
| | D) | patient portal. |
|
|
|
20 | | As noted in "Personally Controlled Online Health Data—The Next Big Thing in Medical Care?," Microsoft HealthVault, which allows patients to "collect, store and share health information with family members and participating healthcare providers," is currently available: |
| | A) | to all Internet subscribers. |
| | B) | only in the United States. |
| | C) | in more than 40 countries worldwide. |
| | D) | throughout North America. |
|
|
|
21 | | As pointed out in "Personally Controlled Online Health DataThe Next Big Thing in Medical Care?," promises about data privacy and security may lack legal force. |
| | A) | True |
| | B) | False |
|
|
|
22 | | As cited in "Computer Software Engineers and Computer Programmers," the job of the software engineer is to: |
| | A) | operate software as an end user. |
| | B) | write programs. |
| | C) | provide technical support to end users. |
| | D) | design and develop software. |
|
|
|
23 | | As discussed in "Computer Software Engineers and Computer Programmers," most software engineers have a bachelor's degree in: |
| | A) | mathematics. |
| | B) | a physical science degree such as physics. |
| | C) | computer science or information systems. |
| | D) | one of the social sciences such as economics. |
|
|
|
24 | | As related in "Computer Software Engineers and Computer Programmers," because they spend long periods of time working at computers, software engineers and programmers are at risk for carpal tunnel syndrome. |
| | A) | True |
| | B) | False |
|
|
|
25 | | As hypothesized in "Women, Mathematics, and Computing," women would be drawn more to studying computer science if: |
| | A) | more scholarships were offered. |
| | B) | the career outlook in the field were more favorable. |
| | C) | the field were structured with the precision of mathematics. |
| | D) | it were not so male-dominated. |
|
|
|
26 | | As noted in "Women, Mathematics, and Computing," one indication of the complexity of a computer-science course is the: |
| | A) | training of the professor. |
| | B) | evaluations by previous classes. |
| | C) | size of the textbook. |
| | D) | reputation of the school. |
|
|
|
27 | | As claimed in "Women, Mathematics, and Computing," women receive nearly half of bachelor's degrees conferred in mathematics. |
| | A) | True |
| | B) | False |
|
|
|
28 | | According to the author of "Out of Time: Reflections on the Programming Life," of the following job classifications, the best in the programmer scheme of things is to be a: |
| | A) | programmer. |
| | B) | software engineer. |
| | C) | end-user query tool. |
| | D) | sales-support engineer. |
|
|
|
29 | | As stated in "Out of Time: Reflections on the Programming Life," programmers do not talk because: |
| | A) | most are very shy. |
| | B) | they lack social skills. |
| | C) | they feel superior to all other employees. |
| | D) | they must not be interrupted. |
|
|
|
30 | | As pointed out in "Out of Time: Reflections on the Programming Life," programming is logical, a process like fixing a clock. |
| | A) | True |
| | B) | False |
|
|
|
31 | | As profiled in "Dilberts of the World, Unite!", the movement known as WashTech, an alliance of technology workers, was first formed by permatemp employees who were working at: |
| | A) | Microsoft. |
| | B) | Intel. |
| | C) | the Pentagon. |
| | D) | Apple. |
|
|
|
32 | | According to "Dilberts of the World, Unite!", if politics and culture still react to the mass public at all, they react almost exclusively to the: |
| | A) | blue-collar working class. |
| | B) | joint efforts of special-interest groups representing minorities. |
| | C) | upper-middle professional class. |
| | D) | ultra-wealthy who are able to make large donations. |
|
|
|
33 | | As detailed in "Dilberts of the World, Unite!", the incident that led to the formation of WashTech was a regulatory change that exempted high-tech companies from having to pay temps time-and-a-half for overtime. |
| | A) | True |
| | B) | False |
|
|
|
34 | | As mentioned in "How Deep Can You Probe?", some human resources professionals are vetting candidates for jobs by checking out the applicants' social networking on such sites as: |
| | A) | MySpace and Facebook. |
| | B) | Classmates.com and Buzznet. |
| | C) | Flixster and Match.com. |
| | D) | Reunion.com and Twitter. |
|
|
|
35 | | As quoted in "How Deep Can You Probe?", one investigator notes that a thorough criminal background check almost always requires: |
| | A) | the use of a paid online database. |
| | B) | a trip to the county courthouse in each of the places an applicant has lived. |
| | C) | the cooperation of the person being investigated. |
| | D) | hiring a private investigator. |
|
|
|
36 | | As pointed out in "How Deep Can You Probe?", one reason employers should use caution in using online information to vet job applicants is that it is always possible that the information found online simply is not true. |
| | A) | True |
| | B) | False |
|
|
|
37 | | As described in "Is Google Making Us Stupid?," in the late nineteenth century, Frederick Winslow Taylor conducted efficiency studies at a Philadelphia steel plant, from which he determined, for each worker's specific tasks, a set of precise instructions, or as we might say today: |
| | A) | a custom work design. |
| | B) | an algorithm. |
| | C) | an optimum procedure. |
| | D) | a production pattern. |
|
|
|
38 | | As expressed in "Is Google Making Us Stupid?," much like Taylor's system, the Internet is programmed by those intent on finding the "one best method" to carry out every mental movement of what we have come to describe as: |
| | A) | social brainpower. |
| | B) | the Taylor coefficient. |
| | C) | knowledge work. |
| | D) | the information appetite. |
|
|
|
39 | | According to "Is Google Making Us Stupid?," the latest bounty of literature written about the Internet is devoted to how we, individually and collectively, have been reprogrammed by our beloved cybertechnology. |
| | A) | True |
| | B) | False |
|
|
|
40 | | As identified in "The End of Solitude," the well-known friendship pairs born of Romanticism include all of the following, except: |
| | A) | Hawthorne and Melville. |
| | B) | Joyce and Proust. |
| | C) | Goethe and Schiller. |
| | D) | Wordsworth and Coleridge. |
|
|
|
41 | | As expressed in "The End of Solitude," solitude achieved its greatest cultural salience with: |
| | A) | Calvinism. |
| | B) | Modernism. |
| | C) | the Reformation. |
| | D) | Romanticism. |
|
|
|
42 | | As concluded in "The End of Solitude," Thoreau proved there is nothing impolite about solitude. |
| | A) | True |
| | B) | False |
|
|
|
43 | | As noted in "It's Not Easy to Stand up to Cyberbullies, But We Must," the Supreme Court's first major case about free speech online, Reno v. American Civil Liberties Union, involved the regulation of: |
| | A) | threatening language. |
| | B) | racially offensive terminology. |
| | C) | sexually explicit imagery. |
| | D) | politically subversive material. |
|
|
|
44 | | As reported in "It's Not Easy to Stand up to Cyberbullies, But We Must," the 2008 street festival held near Michigan State University that devolved into a melee that sparked police interest in event-promoting postings on Facebook was known as: |
| | A) | Sequoia Block Party. |
| | B) | Cedar Fest. |
| | C) | Dogwood Week. |
| | D) | Maple Days. |
|
|
|
45 | | As pointed out in "It's Not Easy to Stand up to Cyberbullies, But We Must," the readiness of state courts to compel bloggers and sites to "unmask" authors in response to harassment claims varies widely. |
| | A) | True |
| | B) | False |
|
|
|
46 | | As claimed in "The End of Forgetting," 70 percent of U.S. recruiters have rejected job candidates based on: |
| | A) | false education claims. |
| | B) | fraudulent claims of experience. |
| | C) | information readily found online. |
| | D) | information garnered from former employers. |
|
|
|
47 | | As pointed out in "The End of Forgetting," recording and keeping all activity on the web makes it difficult to: |
| | A) | recall older, archived material. |
| | B) | forgive a person's lapses in judgment for publishing inappropriate or embarrassing material. |
| | C) | archive the great quantity of material for the Library of Congress. |
| | D) | use social networking sites such as Facebook because the volume of data slows the site servers. |
|
|
|
48 | | As noted in "The End of Forgetting," the average MySpace user creates 70 pieces of content each month for that social networking site. |
| | A) | True |
| | B) | False |
|
|
|
49 | | As noted in "Archiving Writers' Work in the Age of E-Mail," iconic writer John Updike, who died in January 2009, had for decades been sending a steady stream of manuscripts and papers to: |
| | A) | Oxford's Bodleian Library. |
| | B) | Colgate's Case Library. |
| | C) | Harvard's Houghton Library. |
| | D) | Yale's Sterling Memorial Library. |
|
|
|
50 | | According to "Archiving Writers' Work in the Age of E-Mail," Emory University recently received four laptops, an external hard drive, and a Palm Treo personal digital assistant from: |
| | A) | Stephen Colbert. |
| | B) | O. J. Simpson. |
| | C) | Sandra Day O'Connor. |
| | D) | Salman Rushdie. |
|
|
|
51 | | As stated in "Archiving Writers' Work in the Age of E-Mail," personal computers and external storage devices have been around for more than a quarter-century, but only now, as the famous literary figures of the twentieth century begin to pass away, are these technologies showing up on archivists' doorsteps. |
| | A) | True |
| | B) | False |
|
|
|
52 | | As asserted in "Wikipedia in the Newsroom," the main objection to using Wikipedia as a source for news stories is that the contributors to Wikipedia: |
| | A) | mostly lack formal academic qualifications. |
| | B) | are members of the general public who may or may not have verified the information. |
| | C) | do not cite the sources they use. |
| | D) | are a small group whose members seem to be advocating a particular political agenda. |
|
|
|
53 | | As quoted in "Wikipedia in the Newsroom," Wikipedia cofounder Jimmy Wales suggests that Wikipedia's best journalistic use is for: |
| | A) | finding images to accompany news articles. |
| | B) | one-stop information gathering on any subject. |
| | C) | background research. |
| | D) | quotations from celebrities. |
|
|
|
54 | | As explained in "Wikipedia in the Newsroom," despite caveats, "according to Wikipedia" mentions are common in U.S. newspapers. |
| | A) | True |
| | B) | False |
|
|
|
55 | | As noted in "E-Mail in Academia," the most cited reasons for student-initiated e-mail to faculty were: |
| | A) | excuses for late work and missed class sessions. |
| | B) | requests for clarification of assignments. |
| | C) | inquiries about the specific editions of required books. |
| | D) | requests to drop or add the class. |
|
|
|
56 | | As mentioned in "E-Mail in Academia," the incentive for participation in the survey discussed in the article was: |
| | A) | one academic course credit for the students. |
| | B) | participation was required of all members of an introductory psychology course. |
| | C) | each respondent received a T-shirt with the university logo on it. |
| | D) | the change to win a $20 gift certificate to a local shopping mall. |
|
|
|
57 | | As indicated in "E-Mail in Academia," most students expressed a strong preference for one-on-one interaction with faculty, as during office hours, compared with interaction by e-mail. |
| | A) | True |
| | B) | False |
|
|
|
58 | | As stated in "The Trouble with Twittering," an individual's Twitter postings are: |
| | A) | public for all to see. |
| | B) | viewable only by one's followers. |
| | C) | viewable only by one's friends. |
| | D) | considered private published material owned wholly by its author. |
|
|
|
59 | | As reported in "The Trouble with Twittering," the world first learned about a major earthquake that hit China's Sichuan province via: |
| | A) | Facebook. |
| | B) | Twitter. |
| | C) | CNN. |
| | D) | the BBC. |
|
|
|
60 | | As noted in "The Trouble with Twittering," micro-blogging is the practice of publicly sharing short messages on a social network website. |
| | A) | True |
| | B) | False |
|
|
|
61 | | As postulated in "The Evolution of Cyber Warfare," many countries have been accused of launching cyber espionage, but the most active in such activities may be: |
| | A) | Russia. |
| | B) | Israel. |
| | C) | the United States. |
| | D) | China. |
|
|
|
62 | | According to "The Evolution of Cyber Warfare," in March 2004, the Pentagon announced its intention to streamline the military's cyber-attack capabilities by creating an Information Operations team that goes by the name of: |
| | A) | Cyber Patrol. |
| | B) | Network Attack Support Staff. |
| | C) | Squadron Netback. |
| | D) | G37 Assistance Group. |
|
|
|
63 | | As recounted in "The Evolution of Cyber Warfare," the "Bronze Statue" at the heart of a diplomatic dispute in 2007 is a monument to the Red Army that once stood in the center of Vilnius, Lithuania. |
| | A) | True |
| | B) | False |
|
|
|
64 | | As claimed in "War in the Fifth Domain," the "fifth domain" of war is: |
| | A) | outer space. |
| | B) | air. |
| | C) | sea. |
| | D) | cyberspace. |
|
|
|
65 | | As quoted in "War in the Fifth Domain," according to former spy chief Mike McConnell, the effects of a full-blown cyberwar would resemble the effects of: |
| | A) | a nuclear attack. |
| | B) | an aerial attack. |
| | C) | a tornado or hurricane. |
| | D) | the terrorist attacks on the World Trade Center. |
|
|
|
66 | | As noted in "War in the Fifth Domain," one of the more difficult aspects of a cyber attack is that the perpetrator often remains anonymous. |
| | A) | True |
| | B) | False |
|
|
|
67 | | As interpreted in "Geeks and Hackers, Uncle Sam's Cyber Force Wants You!", no one appears worried about a resurrection of the Cold War's "mutually assured destruction" as we forge ahead in pursuit of cyber-"destruction"something analogous to that "crush . . . kill . . .destroy" android from the: |
| | A) | 1936 film serial Flash Gordon. |
| | B) | 1950s radio series X Minus One. |
| | C) | 1960s TV series Lost in Space. |
| | D) | 1999 sci-fi thriller The Matrix. |
|
|
|
68 | | As brought out in "Geeks and Hackers, Uncle Sam's Cyber Force Wants You!", today's Air Force is in a flat spin, its new planes so expensive that relatively few can be purchased, leaving its pilots increasingly diverted to "fly" such unmanned aerial vehicles as: |
| | A) | Raptors and Stalkers. |
| | B) | Predators and Reapers. |
| | C) | Sappers and Miners. |
| | D) | Rakers and Breakers. |
|
|
|
69 | | As contemplated in "Geeks and Hackers, Uncle Sam's Cyber Force Wants You!", spending $6 billion a year for five years on a mini-Manhattan Project to atomize our opponents' computer networks is not nearly as foolhardy as it sounds. |
| | A) | True |
| | B) | False |
|
|
|
70 | | As suggested in "Untangling Attribution: Moving to Accountability in Cyberspace," deterrence is: |
| | A) | symmetry between rivals. |
| | B) | using the threat of reprisal to dissuade rivals from attack. |
| | C) | placing sanctions on states or organizations to counter their ability to attack. |
| | D) | the practice of making a first strike attack on rivals to prevent them from attack. |
|
|
|
71 | | As stated in "Untangling Attribution: Moving to Accountability in Cyberspace," for nuisance attacks, attribution is: |
| | A) | necessary in order to prevent it. |
| | B) | impossible; the system is set up such that it is hard to find the source of such attacks. |
| | C) | not really a problem; these attacks are rarely investigated because they do not pose a high monetary threat. |
| | D) | very easy to ascertain. |
|
|
|
72 | | As noted in "Untangling Attribution: Moving to Accountability in Cyberspace," deterrence is an essential tool in preventing cyber attacks. |
| | A) | True |
| | B) | False |
|
|
|
73 | | As indicated in "The Web's Goldmine: Your Secrets," a beacon is: |
| | A) | a new type of search engine. |
| | B) | a cookie. |
| | C) | software that captures what people type on a website. |
| | D) | software that tracks what websites people visit. |
|
|
|
74 | | As explained in "The Web's Goldmine: Your Secrets," today's advertisers are especially interested in: |
| | A) | maintaining a web presence through their own websites. |
| | B) | following people as they surf the web to identify their interests for marketing purposes. |
| | C) | buying priority space on search engines like Google. |
| | D) | buying ads on websites specifically geared toward their business. |
|
|
|
75 | | As noted in "The Web's Goldmine: Your Secrets," the nonprofit website Wikipedia installs an average of 64 pieces of tracking technology onto the computers of visitors. |
| | A) | True |
| | B) | False |
|
|
|
76 | | As remarked upon in "The Software Wars," the stuff of legend in the world of computers is: |
| | A) | the shrinking market in the United States. |
| | B) | the perfection of hardware. |
| | C) | software's unreliability. |
| | D) | the ability of people to learn and use new techniques. |
|
|
|
77 | | The characteristics of software often cited as leading to failure, as given in "The Software Wars," include all of the following EXCEPT its: |
| | A) | high expense. |
| | B) | complexity. |
| | C) | free-floating nature. |
| | D) | utter plasticity. |
|
|
|
78 | | As detailed in "The Software Wars," software projects usually fail because of technical problems. |
| | A) | True |
| | B) | False |
|
|
|
79 | | As claimed in "The BP Oil Spill: Could Software Be a Culprit?", one reason why it is thought that computer problems may have been a cause of the BP oil spill is that: |
| | A) | security systems were breached just days before the accident. |
| | B) | the display screen of the primary workstation controlling the drill had locked up more than once beforehand. |
| | C) | software controlling the drills had a tremendous number of bugs and glitches in it. |
| | D) | the computer equipment controlling the drill was dangerously outdated. |
|
|
|
80 | | As reported in "The BP Oil Spill: Could Software Be a Culprit?", the most important failure during the BP oil spill was: |
| | A) | software failures at the drill site. |
| | B) | hardware failures at the drill site. |
| | C) | unknown. |
| | D) | the lack of standards in the oil-drilling industry. |
|
|
|
81 | | As noted in "The BP Oil Spill: Could Software Be a Culprit?", it only took a month to stop the well from spilling oil into the Gulf of Mexico. |
| | A) | True |
| | B) | False |
|
|
|
82 | | As noted in "The Conundrum of Visibility: Youth Safety and the Internet," when it comes to sexual solicitation of minors, the Internet: |
| | A) | increases the chance that a youth will be at risk for this illegal interaction. |
| | B) | makes it harder to identify at-risk youth engaging in risky behaviors. |
| | C) | increases the probability that young children will be victims. |
| | D) | provides a new forum for this problematic interaction. |
|
|
|
83 | | As maintained in "The Conundrum of Visibility: Youth Safety and the Internet," cyber-bullying among youth: |
| | A) | is a new form of the age-old torment and harassment that some youths perpetrate on others. |
| | B) | is especially insidious since the perpetrators are often unknown. |
| | C) | operates at a level where it cannot be viewed by adults. |
| | D) | has created a new bully culture. |
|
|
|
84 | | As claimed in "The Conundrum of Visibility: Youth Safety and the Internet," 41 percent of youth who harass online are friends or former friends of their victim. |
| | A) | True |
| | B) | False |
|
|
|
85 | | As reported in "The List: Look Who's Censoring the Internet Now," although the Australian Parliament claimed that its Internet censorship would target specifically child pornography and terrorism, its blacklisting also includes all of the following, except: |
| | A) | Satanism. |
| | B) | Australian Aboriginal culture. |
| | C) | online poker. |
| | D) | euthanasia. |
|
|
|
86 | | As referred to in "The List: Look Who's Censoring the Internet Now," the anti-censorship site that disclosed the questionable scope of Australian censorship is: |
| | A) | Wikileaks. |
| | B) | Busted. |
| | C) | Wikispeaks. |
| | D) | Periscope. |
|
|
|
87 | | According to "The List: Look Who's Censoring the Internet Now," South Korea is one of the world's most wired countries, with about 90 percent of households hooked up to the Web. |
| | A) | True |
| | B) | False |
|
|
|
88 | | As explained in "Google and Saving Face in China," the confrontation between Google and the Chinese government: |
| | A) | demonstrates that Google must do what powerful foreign governments demand. |
| | B) | shows that governments are not able to interfere with Internet access or content. |
| | C) | is all about money. |
| | D) | has fed the foreign business community's feeling that China has become an increasingly hostile market. |
|
|
|
89 | | As described in "A Fantasy World Is Creating Problems in South Korea," South Korean adults who become addicted to Internet games: |
| | A) | are almost exclusively women. |
| | B) | have declined sharply in numbers in the past three years. |
| | C) | often do so when they are unemployed or otherwise feel alienated from society. |
| | D) | are usually high-functioning at their jobs. |
|
|
|
90 | | As noted in "In Good Company?: On the Threshold of Robotic Companions," a shift has occurred in the culture whereby people are open to seeing computational objects as: |
| | A) | people. |
| | B) | other minds. |
| | C) | useful tools. |
| | D) | best friends. |
|
|
|
91 | | As cited in "In Good Company?: On the Threshold of Robotic Companions," people are more likely to accept the company of robots when: |
| | A) | they have nobody to whom they can talk. |
| | B) | robots are programmed to converse with humans. |
| | C) | robots become more commonplace. |
| | D) | they feel the robots can understand them. |
|
|
|
92 | | As related in "In Good Company?: On the Threshold of Robotic Companions," there is currently a robot on the market that responds to caretaking by exhibiting different states of mind. |
| | A) | True |
| | B) | False |
|
|
|
93 | | According to "The Coming Superbrain," in a 1993 paper by computer scientist and sci-fi writer Vernor Vinge, the concept of ultrasmart computersmachines with "greater than human intelligence"was dubbed the: |
| | A) | Microchip Cleansing. |
| | B) | Transcendency. |
| | C) | Singularity. |
| | D) | Siliconization. |
|
|
|
94 | | As cited in "The Coming Superbrain," the artificial-intelligence pioneer who in 2005 predicted with great precision the arrival (in 2045) of post-human evolution is: |
| | A) | Raymond Kurzweil. |
| | B) | Gordon Moore. |
| | C) | Ken MacLeod. |
| | D) | Arthur C. Clarke. |
|
|
|
95 | | As defined in "The Coming Superbrain," Moore's Law is not a law of physics, but rather a description of the rate of industrial change. |
| | A) | True |
| | B) | False |
|
|
|
96 | | As considered in "Cloud Computing," for software vendors who have shifted their operations into the cloud, the incentives are similar to those that motivate: |
| | A) | hardware providers. |
| | B) | end users. |
| | C) | IT professionals. |
| | D) | program developers. |
|
|
|
97 | | As reported in "Cloud Computing," IBM has announced plans for an infrastructure called: |
| | A) | Think Cloud. |
| | B) | Blue Cloud. |
| | C) | Cloud Nine. |
| | D) | Partly Cloudy. |
|
|
|
98 | | As suggested in "Cloud Computing," the new model of remote computing seems to reverse the 1980s "liberation" movement that gave individual users custody over programs and data, as the shift is restoring control to managers in the corporate IT department. |
| | A) | True |
| | B) | False |
|
|
|
99 | | As described in "Chrome the Conqueror," with cloud computing: |
| | A) | Windows will be rendered obsolete. |
| | B) | software applications are stored on the user's computer. |
| | C) | software applications are stored on the web, not the user's computer. |
| | D) | only Internet browsing is supported. |
|
|
|
100 | | As noted in "Chrome the Conqueror," even critics concede that the Google Chrome browser: |
| | A) | runs faster and uses less memory than other browsers. |
| | B) | is very plain. |
| | C) | has more bells and whistles than other browsers. |
| | D) | costs less than other browsers. |
|
|
|
101 | | As mentioned in "Chrome the Conqueror," the entire Chrome suite will cost users between U.S. $400 and $700. |
| | A) | True |
| | B) | False |
|
|
|
102 | | As indicated in "Publishing: The Revolutionary Future," Gutenberg contributed to the evolution of publishing with: |
| | A) | the digital book. |
| | B) | a new convention for the script written by monks. |
| | C) | the introduction of moveable type. |
| | D) | the invention of paper. |
|
|
|
103 | | As noted in "Publishing: The Revolutionary Future," in preliterate societies great sagas and epics were: |
| | A) | written in script by monks. |
| | B) | recorded using the Gutenberg press. |
| | C) | committed to memory and passed along orally. |
| | D) | recorded using pictographs on stone. |
|
|
|
104 | | As maintained in "Publishing: The Revolutionary Future," literary writing is seldom collaborative but rather solitary work. |
| | A) | True |
| | B) | False |
|
|
|
105 | | As set forth in "Computers Learn to Listen, and Some Talk Back," one consequence of the use of artificial intelligence will be that: |
| | A) | present-day computers will become obsolete. |
| | B) | it will become more expensive to run call centers. |
| | C) | people will not learn how to interact with other humans. |
| | D) | millions of jobs will be eliminated. |
|
|
|
106 | | As noted in "Computers Learn to Listen, and Some Talk Back," the artificial intelligence technology that is already widely in use is: |
| | A) | computer-language translation of spoken speech. |
| | B) | physical computer response to human commands. |
| | C) | the ability to respond to and participate in conversations. |
| | D) | computer understanding of human speech. |
|
|
|
107 | | As shown in "Computers Learn to Listen, and Some Talk Back," some computers used in call centers can identify anger in a customer's voice and respond accordingly. |
| | A) | True |
| | B) | False |
|
|