

Technology in Society Exam Bank
Course Introduction
Technology in Society explores the complex and dynamic relationship between technological advancements and the social, cultural, ethical, and political contexts in which they develop. This course examines how technology influences various aspects of daily life, shapes societal structures, drives economic change, and raises critical questions about privacy, equity, sustainability, and global interdependence. Through historical and contemporary case studies, students analyze the reciprocal impacts between society and technology, considering both the benefits and challenges posed by rapid technological innovation.
Recommended Textbook
New Perspectives on Computer Concepts 2018 Comprehensive 20th Edition by June Jamrich Parsons
Available Study Resources on Quizplus
12 Chapters
1312 Verified Questions
1312 Flashcards
Source URL: https://quizplus.com/study-set/1984

Page 2

Chapter 1: Digital Content
Available Study Resources on Quizplus for this Chatper
108 Verified Questions
108 Flashcards
Source URL: https://quizplus.com/quiz/39421
Sample Questions
Q1) Which of the following is the technique for adding light and shadows to a 3D image?
A) Rendering
B) Ray tracing
C) Wireframe
D) Rasterize
Answer: B
Q2) 3D graphics can be animated.
A)True
B)False
Answer: True
Q3) The technical term for ripping music tracks is digital audio extraction.
A)True
B)False
Answer: True
Q4) The 0s and 1s used to represent digital data are referred to as _________ digits. Answer: binary
Q5) An undesirable jagged appearance of a graphics image is referred to as _______. Answer: pixelation
To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Digital Devices
Available Study Resources on Quizplus for this Chatper
124 Verified Questions
124 Flashcards
Source URL: https://quizplus.com/quiz/39422
Sample Questions
Q1) A solid state drive can be used as a substitute for a hard disk drive.
A)True
B)False
Answer: True
Q2) Remote storage that is available as an Internet service is called ______ storage. Answer: cloud
Q3) An example of system software is a computer operating system.
A)True
B)False
Answer: True
Q4) A dual in-line package (DIP) is a square chip package, typically used for microprocessors, with pins arranged in concentric squares.
A)True
B)False
Answer: False
Q5) __________ device has a keyboard as the base and a screen on the hinged cover.
Answer: Clamshell, Notebook, Laptop
Q6) The ALU uses __________ to hold data that is being processed. Answer: registers
Page 4
To view all questions and flashcards with answers, click on the resource link above.

Chapter 3: Networks
Available Study Resources on Quizplus for this Chatper
103 Verified Questions
103 Flashcards
Source URL: https://quizplus.com/quiz/39423
Sample Questions
Q1) A communication port is a physical circuit through which data flows.
A)True
B)False Answer: False
Q2) __________ uses 128-bit addresses to uniquely identify devices connected to the Internet.
Answer: IPv6
Q3) The organization that supervises Internet addressing is ARPANET.
A)True
B)False
Answer: False
Q4) A domain name ends with a(n) ________ that indicates its top-level domain. Answer: extension
Q5) File sharing poses no real security risks.
A)True
B)False
Answer: False
Q6) A(n) ______ address is used to uniquely identify devices on LANs. Answer: MAC, media access control
Page 5
To view all questions and flashcards with answers, click on the resource link above.

Chapter 4: The Web
Available Study Resources on Quizplus for this Chatper
100 Verified Questions
100 Flashcards
Source URL: https://quizplus.com/quiz/39424
Sample Questions
Q1) _____ is the current HTML specification.
Q2) Which of the following is data that would NOT be found in a cookie?
A) Information it reads from your hard drive
B) Access date
C) Customer number
D) Shopping cart number
Q3) A 404 status code indicates that the resource that your browser requested does not exist.
A)True
B)False
Q4) A(n) ____________ is a company that provides space on a server to house Web pages.
A) HTML editor
B) CSS
C) ISP (Internet service provider)
D) Web hosting service
Q5) A search engine's_________ processor looks for your search terms in the search engine's indexed database and returns a list of relevant Web sites.
Q6) ______ is a markup language designed to describe data.
Q7) Your browser _________ serves as temporary storage for Web documents.
To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Social Media
Available Study Resources on Quizplus for this Chatper
105 Verified Questions
105 Flashcards
Source URL: https://quizplus.com/quiz/39425
Sample Questions
Q1) A(n) ____________ work repackages a copyrighted work to add new meaning or produce a work that is used for a purpose different from the original work.
Q2) _________ refers to the status of works with expired copyrights or whose creators have forfeited their copyright.
Q3) Social media services such as Facebook emphasize _______ over the other six factors found in social media honeycombs.
Q4) What provides a visual model for classifying and comparing various social media services?
A) Social media honeycomb
B) Social media services
C) Geosocial services
D) Content communities
Q5) In the words of Justice Brandeis, what is the "right to be let alone"?
A) Anonymity
B) Social discovery
C) Privacy
D) Impersonation
Q6) _________ is the process of determining the coordinates of a specific place.
Q7) Twitter messages, called _________, carry a limit of 140 characters.
Page 7
To view all questions and flashcards with answers, click on the resource link above.

Chapter 6: Software
Available Study Resources on Quizplus for this Chatper
114 Verified Questions
114 Flashcards
Source URL: https://quizplus.com/quiz/39426
Sample Questions
Q1) Most Web apps require installation on your local computer or handheld device.
A)True
B)False
Q2) Microsoft Windows is used exclusively on desktop systems.
A)True
B)False
Q3) Which of the following would be classified as productivity software?
A) Microsoft Office
B) Google Docs
C) iWork
D) All of the above
Q4) Most commercial software is distributed under a single-user license that limits use to one person at a time.
A)True
B)False
Q5) An operating system ensures that input and output proceed in an orderly manner, using ___________ to collect and hold data while the device is busy with other tasks.
Q6) Unauthorized modification of any mobile device to overcome limitations imposed by mobile service providers is called _______.
Page 8
To view all questions and flashcards with answers, click on the resource link above.

Chapter 7: Digital Security
Available Study Resources on Quizplus for this Chatper
109 Verified Questions
109 Flashcards
Source URL: https://quizplus.com/quiz/39427
Sample Questions
Q1) Which of the following would be considered spyware?
A) A keylogger
B) Firewall software
C) Antivirus software
D) All of the above
Q2) _______ can be used to flood a Web site with so much traffic that it can no longer provide its intended service.
A) DDoS
B) An AES service attack
C) A Floodping attack
D) All of the above
Q3) ____________ is a service offered by Google that checks URLs against a list of suspicious Web site URLs.
A) Personal firewall
B) Safe Browsing
C) Heuristic analysis
D) SmartScreen Filter
Q4) A botnet has a server that is controlled by hackers.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: The ICT Industry
Available Study Resources on Quizplus for this Chatper
117 Verified Questions
117 Flashcards
Source URL: https://quizplus.com/quiz/39428
Sample Questions
Q1) When the PC version of the spreadsheet program __________ became available, the IBM PC quickly became the top-selling personal computer.
Q2) Which of the following options is a useful format for your resume?
A) Print
B) Email
C) HTML
D) All of the above
Q3) A key feature of the Apple Lisa was its use of _______________.
A) vacuum tubes
B) a graphical user interface
C) transistors
D) VisiCalc
Q4) HTML is the best format for an effective resume.
A)True
B)False
Q5) _________ technology displaces an existing business process, market, industry, or product.
Q6) With the proliferation of computer viruses and worms, computer __________ has become a hot niche for IT workers.
Page 10
To view all questions and flashcards with answers, click on the resource link above.

Chapter 9: Information Systems
Available Study Resources on Quizplus for this Chatper
121 Verified Questions
121 Flashcards
Source URL: https://quizplus.com/quiz/39429
Sample Questions
Q1) A decision ____________ system helps people make decisions by directly manipulating data, accessing data from external sources, generating statistical projections, and creating data models of various scenarios.
Q2) One type of decision support system (DSS), called an executive information system, is designed to provide senior managers with information relevant to ___________ management activities such as setting policies, planning, and preparing budgets.
Q3) A(n) ____________ system consists of hardware and application software designed to offer a complete information system solution.
Q4) After unit and integration testing are completed, _________ testing ensures that all hardware and software components work together.
A) application
B) system
C) unit
D) integration
Q5) __________ documentation describes a system's features, hardware architecture, and programming.
Q6) __________ are the people who directly carry out the organization's mission.
To view all questions and flashcards with answers, click on the resource link above.
Page 11

Chapter 10: Databases
Available Study Resources on Quizplus for this Chatper
102 Verified Questions
102 Flashcards
Source URL: https://quizplus.com/quiz/39430
Sample Questions
Q1) In a key-value database, each data item has a key that is a unique identifier similar to a relational database key.
A)True
B)False
Q2) Which of the following is not an SQL keyword?
A) DELETE
B) REMOVE
C) CREATE
D) SELECT
Q3) In a database, the template for a record is referred to as a record ______.
Q4) Exploits that use malicious SQL statements to gain unauthorized access to a database are called SQL _____________.
Q5) A DBMS feature known as __________ ensures that transactions are updated in an orderly manner by establishing update rules.
A) serializability
B) optimization
C) prioritization
D) normalization
Q6) The goal of ______________ is to minimize data redundancy.
Page 12
To view all questions and flashcards with answers, click on the resource link above.

Chapter 11: Programming
Available Study Resources on Quizplus for this Chatper
120 Verified Questions
120 Flashcards
Source URL: https://quizplus.com/quiz/39431
Sample Questions
Q1) __________-generation languages, such as COBOL and Fortran, were used extensively for business and scientific applications.
A) First
B) Second
C) Third
D) Fourth
Q2) Computer historians believe that ____________ was the first programming language to work with objects, classes, inheritance, and methods.
A) COBOL
B) SIMULA
C) Python
D) Java
Q3) The _______________ paradigm describes aspects of a problem that lead to a solution.
A) procedural
B) declarative
C) object-oriented
D) none of the above
Q4) A(n) _________ represents a value that can change.
To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 12: Module Py: Coding With Python
Available Study Resources on Quizplus for this Chatper
89 Verified Questions
89 Flashcards
Source URL: https://quizplus.com/quiz/39420
Sample Questions
Q1) The acronym IDE stands for which of the following?
A) Integral Database End User
B) Integrated Development Environment
C) Internet Data Enterprise
D) None of the above
Q2) An object created from a class is called an instance.
A)True
B)False
Q3) In Python, the order of operations dictates that addition and subtraction are performed first.
A)True
B)False
Q4) A string can contain which of the following?
A) Numerals
B) Words
C) Letters
D) All of the above
Q5) A programmer-defined _______ is typically a block of code that is part of a program but is not included in the main execution path.
Q6) The process of tracking down bugs and correcting them is called ______.
To view all questions and flashcards with answers, click on the resource link above. Page 14