Chapter 6
Chapter 7
Chapter 8
Chapter 9
Chapter 10
100

What is the term used to describe the feeling of being alone despite having social contact?

What is loneliness?

100

What is the name of the technology developed that made gene editing possible?

What is CRISPR-Cas9?

100

What is the primary purpose of 5G technology?

What is to enable faster data speeds and connect more devices simultaneously?

100

What is the phenomenon where someone only accepts something to be true if it confirms their existing beliefs?

What is confirmation bias?

100

Of the following statements, this is not one way to protect yourself against cyber attacks :A) Installing a firewall, B) Keeping software un-updated for as long as possible, C) Using encryption whenever possible, D) Using two-factor authentication

What is B: Keeping software un-updated for as long as possible?

200

What design philosophy, popularized by Don Norman, focuses on enhancing user satisfaction by considering the feelings and thoughts of individuals interacting with technology?

What is user experience (UX) design?

200

What was the first genetically modified animal?

What is a mouse?

200

This is the type of radiation that 5G technology primarily utilizes, which is absorbed within a few millimeters of human skin and has been linked to potential health risks.

What are millimeter waves?

200

What is a name for the echoing and homogenizing effect within social media communities.

What is cultural tribalism?

200

This type of cyber crime is a mimicry of a legitimate email, and typically will ask for a user’s sensitive information or prompt the clicking of a dangerous link.

What is phishing?

300

This term refers to a deliberate break from digital devices to regain focus on real-life interactions and reduce screen time.

What is a digital detox?

300

What is the difference between somatic and germline mutations?

Somatic mutations occur in a single body cell and cannot be inherited and germline mutations occur in reproductive cells and can be be inherited

300

What phenomenon occurs when numerous devices connected to a 5G network create an overwhelming amount of traffic that disrupts service?

What is a Distributed Denial of Service (DDoS) attack?

300

What is a career that the author believes most kids would prefer over a teacher, pilot, or doctor?

What is an influencer?

300

This cyber threat, also known as “malicious software”, is software that a cybercriminal or hacker has created to disrupt or damage a legitimate user's computer.

What is malware?

400

This process transforms individuals from human beings with needs into 'users' or 'traffic,' contributing to a lack of empathy in technology design.

What is dehumanization in UX design?

400

What was the unintended consequence of bioweaponry?

What is the accidental or purposeful creation and release of harmful organisms?

400

What significant environmental concern is associated with the production and disposal of devices used for 5G connectivity?

What is electronic waste and how is it contributing to climate change?

400

What are the five theories on truth that the author presents?

What are the correspondence theory, the semantic theory, the deflationary theory, the coherence theory, and the pragmatic theory?

400

This vast network in the USA has largely been thought of as a logical cyber attack target, and was actually attacked in 2020.

What is the US power/electric grid?

500

What country now has a minister for loneliness?

What is the UK OR Japan?

500

n the reading the author discussed many unintended consequences of gene modification, one of them being mosaicism. What is mosaicism in terms of gene modification?

What is when some cells carry the genetic edit but others do not?

500

What is the term for the potential division of the Internet into incompatible segments due to competing national 5G technologies?

What is a subdivided Internet?

500

What is the Ukrainian company StopFake’s approach to combating fake news?

What is peer-to-peer counter propaganda?

500

These types of hackers, named for a color and a clothing garment, are hired to hack into systems with the intention of revealing and fixing security flaws.

Who are “white hat” hackers?