A) The division between online and offline activities. B) The differences in internet connection speeds. C) The separation of digital content types. D) The gap between those who have access to digital technologies and those who do not.
A) Advertising products online. B) Studying online communities and interactions through observation. C) Imitating celebrities online. D) Creating digital art forms.
A) It advocates for digital advertising. B) It promotes internet memes. C) It leverages digital technologies for social and political change. D) It focuses on online fashion trends.
A) Disinformation B) Communication C) Online security D) Digital literacy
A) Technological determinism. B) Social constructionism. C) Symbolic interactionism. D) Functionalism.
A) The normalization of monitoring and tracking individuals through digital technologies. B) The practice of watching documentaries online. C) The use of digital devices for home security. D) The phenomenon of sharing personal data on social media.
A) Content created by users that shapes online conversations and interactions. B) Content filtered by digital algorithms. C) Content generated by internet providers. D) Content regulated by digital laws.
A) Unequal access to digital technologies and skills, which reinforces existing social disparities. B) The availability of free digital content. C) The speed of internet connections. D) The fairness of online competitions.
A) The exhaustion caused by digital fitness training. B) The feeling of being overwhelmed by constant digital connectivity and information overload. C) The strain from managing multiple online accounts. D) The fatigue resulting from digital privacy concerns.
A) Practicing digital mindfulness. B) Creating workplace efficiency using digital tools. C) Supporting a social cause online with minimal effort. D) Holding online business meetings.
A) Systematic errors in algorithms that result in unfair outcomes. B) Online algorithms that protect user data. C) Social media algorithms that boost engagement. D) Digital encryption methods.
A) They generate digital art collaborations. B) They are platforms for digital music sharing. C) They can reinforce narrow viewpoints by limiting exposure to diverse perspectives. D) They protect online privacy. |