1,792
13
Essay, 2 pages (300 words)

Technology in action ch. 1

SpamUnwanted or junk email

Prosthetic limbsIn medicine 3D printing allows more stylish and less expensive designs for _________

Affective ComputingDeveloping systems that can recognize and simulate human emotions

SkypeA popular Voice Over Internet Protocol (VoIP) service

Quick ResponseQR Codes let any piece of print host a link to online information

Augmented RealityOur normal sense of the world around us, enhanced with digital information

Cognitive SurplusResults when leisure time & tools allows to engage in creative acts

Digital DivideThe gap between those who have easy access to the Internet & technology and those who don’t is known as_______________.

Purpose, Mastery & AutonomyFactors that lead to greater motivation

Crisis Mapping_______________Tools gather information from sources such as emails text message and tweets & make the information instantly and publicly available for use in emergencies

Crowd SourcingSolicits online input from consumers

Social networkingTools that enable groups of people to connect and exchange ideas

Computer LiterateTerm used to describe someone who is familiar enough with computers to understand their capabilities and limitations

Software/ApplicationsRefers to instructions that tell the computer what to do

The Witness ProjectHopes to stop human rights abuse throughout the world

Next Einstein InitiativeIs rallying the support of the world to identify mathematical genius

MasteryDefined as feeling excited and confident about learning new skills

One TrillionThe world’s population combined has an estimated ____________hours a year of free time.

Collaborative ConsumptionSharing products rather than owning them individually is known as ____

Crowd FundingUsing the Internet to get small donations from many people to start a business

Information TechnologyField of study focused on the management, processing and automatic retrieval of information

Data MiningThe process of searching huge amounts of data seeking a pattern

Computer ForensicsAnalyzing computer systems to gather potential legal evidence is _________

Examples of computer LiterateUse Web effectively; Avoid prey to hackers and viruses; Diagnose and fix hardware and software problems; protect identify theft; Avoid Spam

AutonomyWorking without continued direction and control

ONTECHNOLOGY IN ACTION CH. 1 SPECIFICALLY FOR YOUFOR ONLY$13. 90/PAGEOrder Now

Thank's for Your Vote!
Technology in action ch. 1. Page 1
Technology in action ch. 1. Page 2
Technology in action ch. 1. Page 3
Technology in action ch. 1. Page 4

This work, titled "Technology in action ch. 1" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2022) 'Technology in action ch. 1'. 27 September.

Reference

AssignBuster. (2022, September 27). Technology in action ch. 1. Retrieved from https://assignbuster.com/technology-in-action-ch-1/

References

AssignBuster. 2022. "Technology in action ch. 1." September 27, 2022. https://assignbuster.com/technology-in-action-ch-1/.

1. AssignBuster. "Technology in action ch. 1." September 27, 2022. https://assignbuster.com/technology-in-action-ch-1/.


Bibliography


AssignBuster. "Technology in action ch. 1." September 27, 2022. https://assignbuster.com/technology-in-action-ch-1/.

Work Cited

"Technology in action ch. 1." AssignBuster, 27 Sept. 2022, assignbuster.com/technology-in-action-ch-1/.

Get in Touch

Please, let us know if you have any ideas on improving Technology in action ch. 1, or our service. We will be happy to hear what you think: [email protected]