Skip to ContentGo to accessibility pageKeyboard shortcuts menu
OpenStax Logo
Introduction to Sociology 2e

Section Quiz

Introduction to Sociology 2eSection Quiz

8.1 Technology Today

1.

Jerome is able to use the Internet to select reliable sources for his research paper, but Charlie just copies large pieces of web pages and pastes them into his paper. Jerome has _____________ while Charlie does not.

  1. a functional perspective
  2. the knowledge gap
  3. e-readiness
  4. a digital divide
2.

The ________ can be directly attributed to the digital divide, because differential ability to access the internet leads directly to a differential ability to use the knowledge found on the Internet.

  1. digital divide
  2. knowledge gap
  3. feminist perspective
  4. e-gap
3.

The fact that your cell phone is using outdated technology within a year or two of purchase is an example of ____________.

  1. the conflict perspective
  2. conspicuous consumption
  3. media
  4. planned obsolescence
4.

The history of technology began _________.

  1. in the early stages of human societies
  2. with the invention of the computer
  3. during the Renaissance
  4. during the nineteenth century

Short Answer

9.
5.

Can you think of people in your own life who support or defy the premise that access to technology leads to greater opportunities? How have you noticed technology use and opportunity to be linked, or does your experience contradict this idea?

10.
6.

Should the U.S. government be responsible for providing all citizens with access to the Internet? Or is gaining Internet access an individual responsibility?

11.
7.

How have digital media changed social interactions? Do you believe it has deepened or weakened human connections? Defend your answer.

12.
8.

Conduct sociological research. Google yourself. How much information about you is available to the public? How many and what types of companies offer private information about you for a fee? Compile the data and statistics you find. Write a paragraph or two about the social issues and behaviors you notice.

Further Research

To learn more about the digital divide and why it matters, check out these web sites: http://openstax.org/l/Digital_Divide and http://openstax.org/l/Digital_Divide2

To find out more about Internet privacy and security, check out the web site below: http://openstax.org/l/2EPrivacy

References

Guillén, M.F., and S.L. Suárez. 2005. “Explaining the Global Digital Divide: Economic, Political and Sociological Drivers of Cross-National Internet Use.” Social Forces 84:681–708.

Lewis, Dave. 2014. "ICloud Data Breach: Hacking and Celebrity Photos." Forbes.com. Forbes. Retrieved October 6, 2014 (http://www.sans.org%2Freading-room%2Fwhitepapers%2Fcasestudies%2Fcase-study-critical-controls-prevented-target-breach-35412).

Liff, Sondra, and Adrian Shepherd. 2004. “An Evolving Gender Digital Divide.” Oxford Internet Institute, Internet Issue Brief No. 2. Retrieved January 11, 2012 (https://educ.ubc.ca/faculty/bryson/565/genderdigdiv.pdf).

McChesney, Robert. 1999. Rich Media, Poor Democracy: Communication Politics in Dubious Times. Urbana and Chicago: University of Illinois Press.

Mossberger, Karen, Caroline Tolbert, and Michele Gilbert. 2006. “Race, Place, and Information Technology.” Urban Affairs Review 41:583–620.

Pew Research Center. 2011. “Demographics of Internet Users.” Pew Internet and American Life Project, May. Retrieved January 12, 2012 (http://www.pewinternet.org/Trend-Data/Whos-Online.aspx).

“Planned Obsolescence.” 2009. The Economist, March 23. Retrieved January 12, 2012 (http://www.economist.com/node/13354332).

Rainie, Lee, Sara Kiesler, Ruogo Kang, and Mary Madden. 2013. "Anonymity, Privacy, and Security Online." Pew Research Centers Internet American Life Project RSS. Pew Research Center. Retrieved October 5, 2014 (http://www.pewinternet.org/2013/09/05/anonymity-privacy-and-security-online/).

Rappaport, Richard. 2009. “A Short History of the Digital Divide.” Edutopia, October 27. Retrieved January 10, 2012 (http://www.edutopia.org/digital-generation-divide-connectivity).

Sciadas, George. 2003. “Monitoring the Digital Divide … and Beyond.” World Bank Group. Retrieved January 22, 2012 (http://www.infodev.org/en/Publication.20.html).

Smith, Aaron. 2012. "The Best (and Worst) of Mobile Connectivity." Pew Research Internet Project. Retrieved December 19, 2014 (http://www.pewinternet.org/2012/11/30/the-best-and-worst-of-mobile-connectivity/).

Time.com. 2014. "Rankings." Fortune. Time.com. Retrieved October 1, 2014 (http://fortune.com/rankings/).

Washington, Jesse. 2011. “For Minorities, New ‘Digital Divide’ Seen.” Pew Internet and American Life Project, January 10. Retrieved January 12, 2012 (http://www.pewinternet.org/Media-Mentions/2011/For-minorities-new-digital-divide-seen.aspx).

8.2 Media and Technology in Society

13.

When it comes to technology, media, and society, which of the following is true?

  1. Media can influence technology, but not society.
  2. Technology created media, but society has nothing to do with these.
  3. Technology, media, and society are bound and cannot be separated.
  4. Society influences media but is not connected to technology.
14.

If the U.S. Patent Office were to issue a patent for a new type of tomato that tastes like a jellybean, it would be issuing a _________ patent?

  1. utility patent
  2. plant patent
  3. design patent
  4. The U.S. Patent Office does not issue a patent for plants.
15.

Which of the following is the primary component of the evolutionary model of technological change?

  1. Technology should not be subject to patenting.
  2. Technology and the media evolve together.
  3. Technology can be traced back to the early stages of human society.
  4. A breakthrough in one form of technology leads to a number of variations, and technological developments.
16.

Which of the following is not a form of new media?

  1. The cable television program Dexter
  2. Wikipedia
  3. Facebook
  4. A cooking blog written by Rachael Ray
17.

Research regarding video game violence suggests that _________.

  1. boys who play violent video games become more aggressive, but girls do not
  2. girls who play violent video games become more aggressive, but boys do not
  3. violent video games have no connection to aggressive behavior
  4. violent video games lead to an increase in aggressive thought and behavior
18.

Comic books, Wikipedia, MTV, and a commercial for Coca-Cola are all examples of:

  1. media
  2. symbolic interaction perspective
  3. e-readiness
  4. the digital divide

8.3 Global Implications of Media and Technology

19.

When Japanese scientists develop a new vaccine for swine flu and offer that technology to U.S. pharmaceutical companies, __________ has taken place.

  1. media globalization
  2. technological diffusion
  3. monetizing
  4. planned obsolescence
20.

In the mid-90s, the U.S. government grew concerned that Microsoft was a _______________, exercising disproportionate control over the available choices and prices of computers.

  1. monopoly
  2. conglomerate
  3. oligopoly
  4. technological globalization
21.

The movie Babel featured an international cast and was filmed on location in various nations. When it screened in theaters worldwide, it introduced a number of ideas and philosophies about cross-cultural connections. This might be an example of:

  1. technology
  2. conglomerating
  3. symbolic interaction
  4. media globalization
22.

Which of the following is not a risk of media globalization?

  1. The creation of cultural and ideological biases
  2. The creation of local monopolies
  3. The risk of cultural imperialism
  4. The loss of local culture
23.

The government of __________ blocks citizens’ access to popular new media sites like Facebook, YouTube, and Twitter.

  1. China
  2. India
  3. Afghanistan
  4. Australia

8.4 Theoretical Perspectives on Media and Technology

24.

A parent secretly monitoring the babysitter through the use of GPS, site blocker, and nanny cam is a good example of:

  1. the social construction of reality
  2. technophilia
  3. a neo-Luddite
  4. panoptic surveillance
25.

The use of Facebook to create an online persona by only posting images that match your ideal self exemplifies the_____________ that can occur in forms of new media.

  1. social construction of reality
  2. cyberfeminism
  3. market segmentation
  4. referencing
26.

_________ tend to be more pro-technology, while _______ view technology as a symbol of the coldness of modern life.

  1. Luddites; technophiles
  2. technophiles; Luddites
  3. cyberfeminists; technophiles
  4. liberal feminists; conflict theorists
27.

When it comes to media and technology, a functionalist would focus on:

  1. the symbols created and reproduced by the media
  2. the association of technology and technological skill with men
  3. the way that various forms of media socialize users
  4. the digital divide between the technological haves and have-nots
28.

When all media sources report a simplified version of the environmental impact of hydraulic fracturing, with no effort to convey the hard science and complicated statistical data behind the story, ___________ is probably occurring.

  1. gatekeeping
  2. the digital divide
  3. technophilia
  4. market segmentation
Citation/Attribution

This book may not be used in the training of large language models or otherwise be ingested into large language models or generative AI offerings without OpenStax's permission.

Want to cite, share, or modify this book? This book uses the Creative Commons Attribution License and you must attribute OpenStax.

Attribution information
  • If you are redistributing all or part of this book in a print format, then you must include on every physical page the following attribution:
    Access for free at https://openstax.org/books/introduction-sociology-2e/pages/1-introduction-to-sociology
  • If you are redistributing all or part of this book in a digital format, then you must include on every digital page view the following attribution:
    Access for free at https://openstax.org/books/introduction-sociology-2e/pages/1-introduction-to-sociology
Citation information

© Feb 9, 2022 OpenStax. Textbook content produced by OpenStax is licensed under a Creative Commons Attribution License . The OpenStax name, OpenStax logo, OpenStax book covers, OpenStax CNX name, and OpenStax CNX logo are not subject to the Creative Commons license and may not be reproduced without the prior and express written consent of Rice University.