TABLE OF CONTENTS
Study Guide...............................................................................................................................................1
Extend Your Knowledge...........................................................................................................................5
Checkpoint.................................................................................................................................................6
True/False................................................................................................................................................6
Matching..................................................................................................................................................7
Problem Solving.........................................................................................................................................8
Personal...................................................................................................................................................8
Professional.............................................................................................................................................9
Collaboration.........................................................................................................................................11
How To: Your Turn................................................................................................................................12
Internet Research....................................................................................................................................13
Critical Thinking.....................................................................................................................................14
STUDY GUIDE
1. Define the term, digital literacy. What does it mean to be a digital citizen? Digital literacy, also known as
computer literacy, means having a current knowledge and understanding of computers, mobile
devices, the web, and related technologies. A digital citizen is a person familiar with how to use
technology to become and educated and productive member of the digital world.
2. Define the terms, computer, Internet, and online social network. A computer is an electronic device,
operating under the control of instructions stored in its own memory. The Internet is a global
collection of millions of computers linked together to share information. An online social network is
an online community where users can share their interest with other registered users.
3. Big Data refers to large and complex data sources that defy easy handling with traditional data processing
methods.
4. What are the negative effects of digital distraction? Digital distraction can lead to lower grades, strained
relationships, or danger of an injury or accident.
5. Explain the role of vacuum tubes, transistors, and integrated circuits in computer development. Vacuum
tools were used by the first generation of computers to control the flow of electrons. The next
generation of computers replaced vacuum tubes with transistors, which were smaller, cheaper, and
more reliable. Integrated circuits packed the equivalent of thousands of vacuum tubes or transistors
into a silicon chip.
,6. How did the microprocessor contribute to the development of the PC? Microprocessors were even faster,
smaller, and less expensive than integrated circuits.
7. Define the Internet of Things. The Internet of Things is an environment in which processors are
embedded in every product imaginable that these things, in turn, communicate with each other via
the Internet or wireless networks.
8. Explain the role of embedded computers in IoT. List examples. Embedded computers enhance the
capabilities of everyday devices by performing a specific function. Examples include: a printer
monitoring ink levels, and in-vehicle cameras.
9. Chip-and-Pin technology stores data on a credit card’s embedded chip instead of a magnetic stripe.
10. Define kiosk. Describe its uses. A kiosk is a freestanding booth that contains a display device used to
show information. Kiosks enable self-serve transactions in hotels, airports, and also are used by
health care providers.
11. How does IoT affect home and business users? IoT enables you to manage devices remotely in your
home, such as starting your dishwasher from your phone. All businesses can use IoT; for example,
robotic arms for manufacturing, shipping companies tracking mileage and location of trucks, and
retail sensors used to track inventory.
12. Describe the digital divide, and how it is harmful. The digital divide is the gap between those who have
access to technology and its resources and information, and those who do not. Inequalities affect
learning, knowledge, and opportunities of those affected.
13. Explain how privacy has been impacted by technology. Data is collected on almost all actions and
transactions, such as web surfing, purchases, questionnaires, and more. Today it is virtually
impossible to remain private.
14. What privacy risks are involved with using technology? Attackers can target your personal information
by identity theft and steal your money or ruin your ability to receive a loan.
15. What is a data broker, and how do they access, collect, and sell your data? A data broker sells collected
data to third parties. They can access your data using social media, web history, credit card
applications or statements, and official records. They collect your name, address, age, social security,
and more. They sell your data you marketers and advertisers, fraud detection agencies, investment
officers, individual businesses, and government agencies.
16. Describe the effects of identity theft on the victim. How does identity theft occur, and what can you do to
prevent it? Identity theft involve using someone’s personal information to commit financial fraud to
obtain a credit card, for example. The victim suffers a damaged credit history. To prevent identify
theft, some guidelines include use encryption, shred financial paperwork, do not carry your Social
Security card in your wallet, and be careful about sharing personal information.
17. A(n) phishing attack attempts to deceive you into revealing personal or financial information when you
respond to an email message or visit a website.
18. List guidelines for creating a strong password. Do not used personal information, such as name, pets,
family, bird date, or schools. Use at least 8 characters, and mix upper- and lowercase letters,
numbers, punctuation, and symbols. Change passwords frequency, avoid common sequences, and do
not use the same password for all websites or app. Manage your passwords using an app.
,19. Define telecommuting and intelligent workplace. Explain how these and other technologies impact the
professional world. Telecommuting is working from home. An intelligent workplace uses technology
to enable workers to connect to the network, communicate, use apps, and meet via web conferencing.
Companies provide technology or use a bring your own device policy. Online collaborative
productivity software allows employees to share documents.
20. How has technology impacted K-12 education? How do instructors use an interactive white board? School
use social networking and online productivity software to communicate and collaborate, submit
assignments, and more. Interactive whiteboards are one factor in an intelligent classroom, enabling
teachers to project from a computer to a screen to enter, add, or manipulate data.
21. What is the purpose of a learning management system? How else has technology impacted higher
education? An LMS is used to set up web-based training sites where students can check progress, take
tests, and exchange messages. EBooks and digital assets also impact students’ experiences.
22. Describe the mHealth trend. How does telemedicine help patients? mHealth refers to using smartphones
or tablets to access health records on the cloud or using digital devices to monitor conditions or
treatments. mHealth reduces the needs for visits, enables telemedicine to reach remote patients, and
helps with data tracking.
23. Explain how technology has impacted the transportation industry. Transportation workers use handheld
devices to scan packages, which then can be tracked as they are shipped. Drivers use GPS.
24. Define M2M communication. What other ways has technology impacted the manufacturing industry?
CAM and machine-to-machine (communications among machines, equipment and devices) help
perform work that is dangerous, detailed, or monotonous.
25. List guidelines for creating a professional online presence. Why is this important? Some guidelines
include the following: do not use an informal name for your accounts; include a photo, PDF resume,
and links to videos or content you have created; proofread; and enable privacy settings on personal
accounts. Professionals use your online presence to view your resume and determine whether to
contact you for an interview.
26. Describe how achieving a technology certification might help you in your job search or career. A
certification demonstrates your knowledge in a specific area to employers.
27. Define the term, software. Software also is called a(n) program or app. Software is a set of coded
instructions that tell a computer or device what tasks to perform.
28. Explain the role of instructions as they are used in software. Instructions tell the computer how to
perform a particular task.
29. Define convergence and give examples. Convergence is the increasing integration of technological
capabilities on a grown number of previously unrelated devices. Examples include accessing the same
email, social, network, and gaming apps on your laptop, tablet, or smartphone.
30. A(n) user is anyone who interacts with a computer or mobile device or utilizes the information it generates.
31. Differentiate among the following computing devices: laptop, desktop, and all-in-one. A laptop also is
known as a(n) Notebook computer. A laptop is a lightweight mobile computer with a screen in its lid
and a keyboard in its base. A desktop is a personal computer in a stationary location with all
, components fitting on or under a desk. An all-in-one is a desktop without a tower and uses the same
case to house the display and processing circuitry.
32. What are the typical input and output methods for computer devices? Keyboards, a mouse, and touch
screen are the main input methods. Output is displayed visually on the screen, printed, or as audio.
33. List types of mobile devices, and describe the purpose of each. A tablet is a mobile device with a touch
screen, often associated with an e-reader, which is used primarily for digital media. A smartphone is
an Internet-capable that usually includes a calendar, address, book, and games.
34. Explain whether or not a mobile device is a computer. A mobile device is a portable or handheld
computing device, which you can use to exchange information or access the Internet.
35. How does convergence affect media and gaming devices? While many users still purchase separate
media and gaming devices, many of the capabilities overlap with computers and mobile devices.
36. What questions might you ask when determining whether something is ethical, legal, or moral? Questions
include: Are there laws the prohibit the use of technology for this purpose? Does society generally
approve or disapprove of this action? What about your professional or academic code of ethics? Does
this feel right to you based on your own personal code of morals?
37. Define netiquette. What behaviors does it provide rules for? Netiquette describes the rules of Internet
etiquette, including the web, social media, Internet messaging, chat rooms, online discussions, and
methods to transfer or store files.
38. Give examples of states’ attempts to regulate digital ethical behavior. Laws are being debated, revised,
and passed to deal with technology and harassment, free speech abuses, invasions of privacy,
copyright infringement, and bullying. Missouri has attempted a law defining cyberbullying. Other
states enacted laws prohibiting texting and driving.
39. A(n) acceptable use policy (AUP) is a document that lists guidelines and repercussions of use of the
Internet and other digital company resources, including network storage and email servers.
40. What is cyberbullying? Give examples. Cyberbullying is bullying using digital devices and platforms.
Examples include messages, text, sound, or images.
41. List ways you can practice green computing. How can you dispose of devices responsibly? Personal green
computing practices include using ENERGY STAR products, shutting down devices, donating old
equipment, paperless communication, recycling products, and telecommuting or videoconferencing.
You can return devices to manufacturers or donate a device.
42. Define accessibility. Accessibility is the practice of removing barriers that may prevent individuals
with disabilities from interacting with data, a website, or an app.
43. Give examples of assistive technologies. Describe the purpose of alt text. Assistive technologies include
screen readers, Braille printers, and captioning software. Alt text is descriptive text a screen reader
reads aloud so the user understands the image and its purpose.
44. Explain the legal ramifications of the ADA and IDEA. The ADA requires companies with 15 or more
employees to accommodate needs of physically challenged workers. The IDEA requires schools to
purchase or acquire funding for adaptive technologies.