A) The gap between those who have access to digital technologies and those who do not. B) The separation of digital content types. C) The differences in internet connection speeds. D) The division between online and offline activities.
A) Advertising products online. B) Studying online communities and interactions through observation. C) Imitating celebrities online. D) Creating digital art forms.
A) It promotes internet memes. B) It leverages digital technologies for social and political change. C) It advocates for digital advertising. D) It focuses on online fashion trends.
A) Disinformation B) Digital literacy C) Communication D) Online security
A) Functionalism. B) Technological determinism. C) Symbolic interactionism. D) Social constructionism.
A) The practice of watching documentaries online. B) The use of digital devices for home security. C) The phenomenon of sharing personal data on social media. D) The normalization of monitoring and tracking individuals through digital technologies.
A) Content regulated by digital laws. B) Content created by users that shapes online conversations and interactions. C) Content generated by internet providers. D) Content filtered by digital algorithms.
A) The fairness of online competitions. B) The availability of free digital content. C) The speed of internet connections. D) Unequal access to digital technologies and skills, which reinforces existing social disparities.
A) The feeling of being overwhelmed by constant digital connectivity and information overload. B) The exhaustion caused by digital fitness training. C) The fatigue resulting from digital privacy concerns. D) The strain from managing multiple online accounts.
A) Supporting a social cause online with minimal effort. B) Creating workplace efficiency using digital tools. C) Practicing digital mindfulness. D) Holding online business meetings.
A) Social media algorithms that boost engagement. B) Systematic errors in algorithms that result in unfair outcomes. C) Online algorithms that protect user data. D) Digital encryption methods.
A) They protect online privacy. B) They generate digital art collaborations. C) They can reinforce narrow viewpoints by limiting exposure to diverse perspectives. D) They are platforms for digital music sharing. |