What is the term used to describe the feeling of being alone despite having social contact?
What is loneliness?
What is the name of the technology developed that made gene editing possible?
What is CRISPR-Cas9?
What is the primary purpose of 5G technology?
What is to enable faster data speeds and connect more devices simultaneously?
What is the phenomenon where someone only accepts something to be true if it confirms their existing beliefs?
What is confirmation bias?
Of the following statements, this is not one way to protect yourself against cyber attacks :A) Installing a firewall, B) Keeping software un-updated for as long as possible, C) Using encryption whenever possible, D) Using two-factor authentication
What is B: Keeping software un-updated for as long as possible?
What design philosophy, popularized by Don Norman, focuses on enhancing user satisfaction by considering the feelings and thoughts of individuals interacting with technology?
What is user experience (UX) design?
What was the first genetically modified animal?
What is a mouse?
This is the type of radiation that 5G technology primarily utilizes, which is absorbed within a few millimeters of human skin and has been linked to potential health risks.
What are millimeter waves?
What is a name for the echoing and homogenizing effect within social media communities.
What is cultural tribalism?
This type of cyber crime is a mimicry of a legitimate email, and typically will ask for a user’s sensitive information or prompt the clicking of a dangerous link.
What is phishing?
This term refers to a deliberate break from digital devices to regain focus on real-life interactions and reduce screen time.
What is a digital detox?
What is the difference between somatic and germline mutations?
Somatic mutations occur in a single body cell and cannot be inherited and germline mutations occur in reproductive cells and can be be inherited
What phenomenon occurs when numerous devices connected to a 5G network create an overwhelming amount of traffic that disrupts service?
What is a Distributed Denial of Service (DDoS) attack?
What is a career that the author believes most kids would prefer over a teacher, pilot, or doctor?
What is an influencer?
This cyber threat, also known as “malicious software”, is software that a cybercriminal or hacker has created to disrupt or damage a legitimate user's computer.
What is malware?
This process transforms individuals from human beings with needs into 'users' or 'traffic,' contributing to a lack of empathy in technology design.
What is dehumanization in UX design?
What was the unintended consequence of bioweaponry?
What is the accidental or purposeful creation and release of harmful organisms?
What significant environmental concern is associated with the production and disposal of devices used for 5G connectivity?
What is electronic waste and how is it contributing to climate change?
What are the five theories on truth that the author presents?
What are the correspondence theory, the semantic theory, the deflationary theory, the coherence theory, and the pragmatic theory?
This vast network in the USA has largely been thought of as a logical cyber attack target, and was actually attacked in 2020.
What is the US power/electric grid?
What country now has a minister for loneliness?
What is the UK OR Japan?
n the reading the author discussed many unintended consequences of gene modification, one of them being mosaicism. What is mosaicism in terms of gene modification?
What is when some cells carry the genetic edit but others do not?
What is the term for the potential division of the Internet into incompatible segments due to competing national 5G technologies?
What is a subdivided Internet?
What is the Ukrainian company StopFake’s approach to combating fake news?
What is peer-to-peer counter propaganda?
These types of hackers, named for a color and a clothing garment, are hired to hack into systems with the intention of revealing and fixing security flaws.
Who are “white hat” hackers?