Site MapHelpFeedbackPractice Quiz
Practice Quiz
(See related pages)

1
A new medium (technology), as observed in "Five Things We Need to Know About Technological Change":
A)simply adds something.
B)usually takes something away.
C)changes everything.
D)changes nothing.
2
As stated in "Five Things We Need to Know About Technological Change," in American society, the most significant "radicals" have always been:
A)religious figures.
B)capitalists.
C)socialists.
D)educators.
3
As asserted in "Five Things We Need to Know About Technological Change," there are always both winners and losers in technological change.
A)True
B)False
4
As mentioned in "Moore's Law and Technological Determinism," Thomas Parke Hughes, Wiebe Bijker, and Donald MacKenzie were among the generation of scholars who brought about the notion of technology's:
A)contextual approach.
B)static trajectory.
C)social construction.
D)determinism.
5
As expressed in "Moore's Law and Technological Determinism," the rapid introduction of an enormous number of new products, services, and ways of working and living is very much the result of the steady and unstoppable march of:
A)our "plug-and-play" mentality.
B)semiconductor density.
C)the so-called sixth dimension.
D)mass production.
6
As explained in "Moore's Law and Technological Determinism," Moore's law is analogous to Ohm's law, which relates resistance to current.
A)True
B)False
7
As suggested in "A Passion for Objects," Bill Gates recently pointed out that:
A)in math and science American students rank near the top worldwide at all grade levels.
B)American math and science education is among the best in the world.
C)American math and science education is sorely deficient compared to the rest of the world.
D)while American students rank highly in math and science worldwide in the fourth grade, by the twelfth grade their rank falls significantly.
8
As noted in "A Passion for Objects," the author states that it is not good to turn to computers to solve the educational crisis because:
A)they are ineffective and unreliable.
B)they have become increasingly opaque.
C)computer learning does not involve the object play critical to scientific education.
D)computer use does not require essential critical thinking skills.
9
As stated in "A Passion for Objects," the early personal computers were far too complex for the manipulation of assembly code.
A)True
B)False
10
The title "The Revolution Will Not Be Monetized" refers specifically to the revolutionary benefits of the "near-perfect, real-time zeitgeist engine" that is:
A)Facebook.
B)Twitter.
C)Google.
D)Foursquare.
11
Bob Garfield, the author of "The Revolution Will Not Be Monetized," concludes by predicting that the dominant online force with a significant social-media component over the next 20 years will be:
A)Facebook.
B)Apple.
C)Groupon.
D)Amazon.com.
12
As cited in "The Revolution Will Not Be Monetized," according to the Interactive Advertising Bureau, in 2010 online advertising expenditures surpassed ad expenditures for television.
A)True
B)False
13
According to the author of "How Google Dominates Us," Google is the oracle of:
A)prediction.
B)redirection.
C)information.
D)advertising.
14
As reported in "How Google Dominates Us," the ultimate dream for Google, according to its founders, is for Google to be:
A)the only search engine on the Internet.
B)the wealthiest company in the world.
C)a library containing every book ever printed.
D)implanted in people's brains as a way to get instant information.
15
As given in "How Google Dominates Us," the Google corporate motto is "Don't be evil."
A)True
B)False
16
The conclusion reached by the authors of "Click Trajectories" is that the best area for intervention in the spam ecosystem is:
A)hosting providers.
B)the payment tier.
C)merchandise fulfillment.
D)registrars.
17
As profiled in "Click Trajectories," some domain-hosting services are called "bulletproof" because they:
A)appear invulnerable to hackers.
B)resist take-down requests in exchange for payment premiums.
C)exist in countries that protect them from allegations of illegal activity.
D)dominate the market despite fierce competition from startups.
18
As detailed in "Click Trajectories," most spammers today handle both advertising and the back end of the value chain.
A)True
B)False
19
According to "Automation on the Job," the percentage of the adult population that is working or seeking work has risen throughout the period of automation taking hold, largely because of:
A)the increase in overall population.
B)growth in the service industry.
C)the need to monitor the machines, including computers, that provide automation.
D)women entering the workforce.
20
As mentioned in "Automation on the Job," the term "technological unemployment" originated with:
A)Bill Gates.
B)Henry Ford.
C)Karl Marx.
D)Charles Darwin.
21
As stated in "Automation on the Job," the "economic problem" is, simply, how to get enough to eat.
A)True
B)False
22
As cited in "Computer Software Engineers and Computer Programmers," the job of the software engineer is to:
A)operate software as an end user.
B)write programs.
C)provide technical support to end users.
D)design and develop software.
23
As discussed in "Computer Software Engineers and Computer Programmers," most software engineers have a bachelor's degree in:
A)mathematics.
B)a physical science degree such as physics.
C)computer science or information systems.
D)one of the social sciences such as economics.
24
As related in "Computer Software Engineers and Computer Programmers," because they spend long periods of time working at computers, software engineers and programmers are at risk for carpal tunnel syndrome.
A)True
B)False
25
As specified in "Computer Scientists," computer scientists need to have an aptitude for:
A)language.
B)math
C)history.
D)science.
26
According to "Computer Scientists," after a student gains a bachelor's degree, the PhD generally requires at least an additional:
A)two years of study.
B)three years of study.
C)five years of study.
D)eight years of study.
27
As stated in "Computer Scientists," employment growth for computer scientists is expected to be much faster than the average for all occupations.
A)True
B)False
28
As hypothesized in "Women, Mathematics, and Computing," women would be drawn more to studying computer science if:
A)more scholarships were offered.
B)the career outlook in the field were more favorable.
C)the field were structured with the precision of mathematics.
D)it were not so male-dominated.
29
As noted in "Women, Mathematics, and Computing," one indication of the complexity of a computer-science course is the:
A)training of the professor.
B)evaluations by previous classes.
C)size of the textbook.
D)reputation of the school.
30
As claimed in "Women, Mathematics, and Computing," women receive nearly half of bachelor's degrees conferred in mathematics.
A)True
B)False
31
As described in "Is Google Making Us Stupid?," in the late nineteenth century, Frederick Winslow Taylor conducted efficiency studies at a Philadelphia steel plant, from which he determined, for each worker's specific tasks, a set of precise instructions, or as we might say today:
A)a custom work design.
B)an algorithm.
C)an optimum procedure.
D)a production pattern.
32
As expressed in "Is Google Making Us Stupid?," much like Taylor's system, the Internet is programmed by those intent on finding the "one best method" to carry out every mental movement of what we have come to describe as:
A)social brainpower.
B)the Taylor coefficient.
C)knowledge work.
D)the information appetite.
33
According to "Is Google Making Us Stupid?," the latest bounty of literature written about the Internet is devoted to how we, individually and collectively, have been reprogrammed by our beloved cybertechnology.
A)True
B)False
34
As identified in "The End of Solitude," the well-known friendship pairs born of Romanticism include all of the following, except:
A)Hawthorne and Melville.
B)Joyce and Proust.
C)Goethe and Schiller.
D)Wordsworth and Coleridge.
35
As expressed in "The End of Solitude," solitude achieved its greatest cultural salience with:
A)Calvinism.
B)Modernism.
C)the Reformation.
D)Romanticism.
36
As concluded in "The End of Solitude," Thoreau proved there is nothing impolite about solitude.
A)True
B)False
37
As explained in "Relationships, Community, and Identity in the New Virtual Society," although technology is being lauded for encouraging diversity and facilitating cross-cultural communication, there is a counter-trend known as:
A)the electronic divide.
B)intra-social solidarity.
C)virtual insularity.
D)digital tribalism.
38
As cited in "Relationships, Community, and Identity in the New Virtual Society," the pollster John Zogby calls the emerging generation that links up through IM, Twitter, blogs, smart-phones, and social networking sites:
A)Generation Z.
B)Virtual Villagers.
C)World Citizens.
D)First Globals.
39
As mentioned in "Relationships, Community, and Identity in the New Virtual Society," Chinese people who participate in wang hun, or online role-play marriages, are sometimes getting divorced on the grounds that this constitutes adultery.
A)True
B)False
40
The author of "Generational Myth" questions the underlying assumptions about a "digital generation" by casting doubts about the concept of:
A)social networking.
B)the class system.
C)generations.
D)statistical analysis.
41
The author of "Generational Myth," states that almost none of his college students know how to program computers or even:
A)delete songs from their iPods.
B)defragment a hard drive.
C)change a flat tire.
D)code text with HTML.
42
As noted in "Generational Myth," between 1994 and 2004, visits to public libraries in the United States increased 61 percent.
A)True
B)False
43
The research described in "Expressing My Inner Gnome" reveals that in a multiplayer online role-playing game, virtual behavior is affected by the:
A)time of day at which the game is played.
B)avatar's appearance.
C)age of the player.
D)avatar's name.
44
As reported in "Expressing My Inner Gnome," members of the group of griefers called GoonFleet measures their success in games by:
A)wealth gained within the game.
B)advancing to the higher levels of the game.
C)the number of kills they make within the game.
D)their ability to drive others away from the game.
45
As noted in "Expressing My Inner Gnome," a survey of World of Warcraft players showed that 25 percent chose to role-play as a character of the opposite gender.
A)True
B)False
46
As claimed in "The End of Forgetting," 70 percent of U.S. recruiters have rejected job candidates based on:
A)false education claims.
B)fraudulent claims of experience.
C)information readily found online.
D)information garnered from former employers.
47
As pointed out in "The End of Forgetting," recording and keeping all activity on the web makes it difficult to:
A)recall older, archived material.
B)forgive a person's lapses in judgment for publishing inappropriate or embarrassing material.
C)archive the great quantity of material for the Library of Congress.
D)use social networking sites such as Facebook because the volume of data slows the site servers.
48
As noted in "The End of Forgetting," the average MySpace user creates 70 pieces of content each month for that social networking site.
A)True
B)False
49
As given in "Google's Loss," Google was sued by the Author Guild and the Association of American Publishers for:
A)libel.
B)violation of their copyrights.
C)plagiarism.
D)unpaid royalties.
50
As reported in "Google's Loss," on March 23, 2011, Judge Denny Chin:
A)accepted the Amended Settlement Agreement reached in 2009.
B)awarded a massive financial settlement to the authors and publishers.
C)rejected the Amended Settlement Agreement reached in 2009.
D)dismissed the case brought by the authors and publishers.
51
As brought out in "Google's Loss," Google Book Search threatened to violate the privacy of users because it would accumulate information about who read what.
A)True
B)False
52
As noted in "Archiving Writers' Work in the Age of E-Mail," iconic writer John Updike, who died in January 2009, had for decades been sending a steady stream of manuscripts and papers to:
A)Oxford's Bodleian Library.
B)Colgate's Case Library.
C)Harvard's Houghton Library.
D)Yale's Sterling Memorial Library.
53
According to "Archiving Writers' Work in the Age of E-Mail," Emory University recently received four laptops, an external hard drive, and a Palm Treo personal digital assistant from:
A)Stephen Colbert.
B)O. J. Simpson.
C)Sandra Day O'Connor.
D)Salman Rushdie.
54
As stated in "Archiving Writers' Work in the Age of E-Mail," personal computers and external storage devices have been around for more than a quarter-century, but only now, as the famous literary figures of the twentieth century begin to pass away, are these technologies showing up on archivists' doorsteps.
A)True
B)False
55
As pointed out in "Degrees, Distance, and Dollars," the "biggest gorilla of them all" in for-profit universities is:
A)the University of Phoenix.
B)DeVry University.
C)Baker College.
D)Kaplan.
56
As asserted in "Degrees, Distance, and Dollars," low prices for online schools can increase the risk that the school will:
A)fail to attract qualified instructors because the school cannot afford them.
B)not be able to stay in business.
C)lose accreditation because of high dropout rates.
D)attract students not sufficiently prepared to do college-level work.
57
As mentioned in "Degrees, Distance, and Dollars," iTunes U offers free lectures from more than 600 schools, including Yale and the Massachusetts Institute of Technology.
A)True
B)False
58
In "Small Change," Gladwell focuses on the activities of the Greensboro Four, who worked for social change by beginning the:
A)voter registration movement in the South.
B)sit-in at the Woolworth lunch counter.
C)Montgomery bus boycott.
D)March on Washington.
59
In "Small Change," Malcolm Gladwell argues that Facebook and other online social media are networks, which are the opposite, in structure and character, of:
A)individuals.
B)governments.
C)hierarchies.
D)political parties.
60
As noted in "Small Change," the unquestioned leader of the Southern Christian Leadership Conference was Martin Luther King, Jr.
A)True
B)False
61
As described in "Don't Fear the Reaper," the effect on pilots who operate drones remotely has been dubbed the:
A)Nintendo effect.
B)Robbie the Robot effect.
C)Sega effect.
D)Star Wars effect.
62
As put forth in "Don't Fear the Reaper," weaponized drones differ from other types of bombing platforms only in that they are:
A)much more precise.
B)significantly less expensive.
C)against international law.
D)remotely controlled.
63
As reported in "Don't Fear the Reaper," a weaponized drone was responsible for killing Osama bin Laden.
A)True
B)False
64
As reported in "Autonomous Robots in the Fog of War," John Canning of the Naval Surface Warfare Center Dahlgren Division has put forward as a key concept the idea of:
A)letting machines target other machines.
B)imbuing machines with a "conscience" that allows them to make value judgments.
C)matching the U.S. use of weaponized robots to the same levels as our adversaries.
D)working toward the abolishment of robots in warfare.
65
As noted in "Autonomous Robots in the Fog of War," the goal for autonomous robots that use sensors to gather data is to achieve what researchers call:
A)prioritization of data.
B)exact identifications.
C)precision targeting.
D)situational understanding.
66
As reported in "Autonomous Robots in the Fog of War," one problem that has been solved is communication between unmanned aerial vehicles and unmanned ground vehicles by adopting the JAUS (Joint Architecture for Unmanned Systems) as the standard means of communication.
A)True
B)False
67
As postulated in "The Evolution of Cyber Warfare," many countries have been accused of launching cyber espionage, but the most active in such activities may be:
A)Russia.
B)Israel.
C)the United States.
D)China.
68
According to "The Evolution of Cyber Warfare," in March 2004, the Pentagon announced its intention to streamline the military's cyber-attack capabilities by creating an Information Operations team that goes by the name of:
A)Cyber Patrol.
B)Network Attack Support Staff.
C)Squadron Netback.
D)G37 Assistance Group.
69
As recounted in "The Evolution of Cyber Warfare," the "Bronze Statue" at the heart of a diplomatic dispute in 2007 is a monument to the Red Army that once stood in the center of Vilnius, Lithuania.
A)True
B)False
70
As claimed in "War in the Fifth Domain," the "fifth domain" of war is:
A)outer space.
B)air.
C)sea.
D)cyberspace.
71
As quoted in "War in the Fifth Domain," according to former spy chief Mike McConnell, the effects of a full-blown cyberwar would resemble the effects of:
A)a nuclear attack.
B)an aerial attack.
C)a tornado or hurricane.
D)the terrorist attacks on the World Trade Center.
72
As noted in "War in the Fifth Domain," one of the more difficult aspects of a cyber attack is that the perpetrator often remains anonymous.
A)True
B)False
73
As suggested in "Untangling Attribution: Moving to Accountability in Cyberspace," deterrence is:
A)symmetry between rivals.
B)using the threat of reprisal to dissuade rivals from attack.
C)placing sanctions on states or organizations to counter their ability to attack.
D)the practice of making a first strike attack on rivals to prevent them from attack.
74
As stated in "Untangling Attribution: Moving to Accountability in Cyberspace," for nuisance attacks, attribution is:
A)necessary in order to prevent it.
B)impossible; the system is set up such that it is hard to find the source of such attacks.
C)not really a problem; these attacks are rarely investigated because they do not pose a high monetary threat.
D)very easy to ascertain.
75
As noted in "Untangling Attribution: Moving to Accountability in Cyberspace," deterrence is an essential tool in preventing cyber attacks.
A)True
B)False
76
As detailed in "Hacking the Lights Out," the Stuxnet virus entered a computer system via a:
A)Trojan horse.
B)software update.
C)botnet.
D)USB stick.
77
As related in "Hacking the Lights Out," one example of a computer virus attacking industrial machines was the Stuxnet virus, which targeted:
A)Iran's nuclear-enrichment facilities.
B)Detroit's automobile factories.
C)Japan's aircraft industry.
D)Iraq's oil refineries.
78
As noted in "Hacking the Lights Out," one reason the electrical grid is so vulnerable is that the computers that control the grid are directly connected to the Internet.
A)True
B)False
79
As indicated in "The Web's Goldmine: Your Secrets," a beacon is:
A)a new type of search engine.
B)a cookie.
C)software that captures what people type on a website.
D)software that tracks what websites people visit.
80
As explained in "The Web's Goldmine: Your Secrets," today's advertisers are especially interested in:
A)maintaining a web presence through their own websites.
B)following people as they surf the web to identify their interests for marketing purposes.
C)buying priority space on search engines like Google.
D)buying ads on websites specifically geared toward their business.
81
As noted in "The Web's Goldmine: Your Secrets," the nonprofit website Wikipedia installs an average of 64 pieces of tracking technology onto the computers of visitors.
A)True
B)False
82
As claimed in "The BP Oil Spill: Could Software Be a Culprit?", one reason why it is thought that computer problems may have been a cause of the BP oil spill is that:
A)security systems were breached just days before the accident.
B)the display screen of the primary workstation controlling the drill had locked up more than once beforehand.
C)software controlling the drills had a tremendous number of bugs and glitches in it.
D)the computer equipment controlling the drill was dangerously outdated.
83
As reported in "The BP Oil Spill: Could Software Be a Culprit?", the most important failure during the BP oil spill was:
A)software failures at the drill site.
B)hardware failures at the drill site.
C)unknown.
D)the lack of standards in the oil-drilling industry.
84
As noted in "The BP Oil Spill: Could Software Be a Culprit?", it only took a month to stop the well from spilling oil into the Gulf of Mexico.
A)True
B)False
85
As noted in "The Conundrum of Visibility: Youth Safety and the Internet," when it comes to sexual solicitation of minors, the Internet:
A)increases the chance that a youth will be at risk for this illegal interaction.
B)makes it harder to identify at-risk youth engaging in risky behaviors.
C)increases the probability that young children will be victims.
D)provides a new forum for this problematic interaction.
86
As maintained in "The Conundrum of Visibility: Youth Safety and the Internet," cyber-bullying among youth:
A)is a new form of the age-old torment and harassment that some youths perpetrate on others.
B)is especially insidious since the perpetrators are often unknown.
C)operates at a level where it cannot be viewed by adults.
D)has created a new bully culture.
87
As claimed in "The Conundrum of Visibility: Youth Safety and the Internet," 41 percent of youth who harass online are friends or former friends of their victim.
A)True
B)False
88
As reported in "The List: Look Who's Censoring the Internet Now," although the Australian Parliament claimed that its Internet censorship would target specifically child pornography and terrorism, its blacklisting also includes all of the following, except:
A)Satanism.
B)Australian Aboriginal culture.
C)online poker.
D)euthanasia.
89
As referred to in "The List: Look Who's Censoring the Internet Now," the anti-censorship site that disclosed the questionable scope of Australian censorship is:
A)Wikileaks.
B)Busted.
C)Wikispeaks.
D)Periscope.
90
According to "The List: Look Who's Censoring the Internet Now," South Korea is one of the world's most wired countries, with about 90 percent of households hooked up to the Web.
A)True
B)False
91
As explained in "Google and Saving Face in China," the confrontation between Google and the Chinese government:
A)demonstrates that Google must do what powerful foreign governments demand.
B)shows that governments are not able to interfere with Internet access or content.
C)is all about money.
D)has fed the foreign business community's feeling that China has become an increasingly hostile market.
92
As revealed in "Does Facebook Have a Foreign Policy?", in 2011, European privacy regulators began investigations of Facebook's photo tagging and the use of privacy data by:
A)advertisers.
B)friends of friends.
C)applications.
D)businesses that are "liked" by Facebook users.
93
As stated in "Does Facebook Have a Foreign Policy?", in the United States, most of the pressure on Facebook in regard to its privacy policies has come from journalists and:
A)the government.
B)advocacy groups such as the Electronic Privacy Information Center.
C)Facebook users.
D)MySpace.
94
According to "Does Facebook Have a Foreign Policy?", on paper, European privacy regulations are the strictest in the industrialized world.
A)True
B)False
95
As described in "A Fantasy World Is Creating Problems in South Korea," South Korean adults who become addicted to Internet games:
A)are almost exclusively women.
B)have declined sharply in numbers in the past three years.
C)often do so when they are unemployed or otherwise feel alienated from society.
D)are usually high-functioning at their jobs.
96
As noted in "In Good Company?: On the Threshold of Robotic Companions," a shift has occurred in the culture whereby people are open to seeing computational objects as:
A)people.
B)other minds.
C)useful tools.
D)best friends.
97
As cited in "In Good Company?: On the Threshold of Robotic Companions," people are more likely to accept the company of robots when:
A)they have nobody to whom they can talk.
B)robots are programmed to converse with humans.
C)robots become more commonplace.
D)they feel the robots can understand them.
98
As related in "In Good Company?: On the Threshold of Robotic Companions," there is currently a robot on the market that responds to caretaking by exhibiting different states of mind.
A)True
B)False
99
As considered in "Cloud Computing," for software vendors who have shifted their operations into the cloud, the incentives are similar to those that motivate:
A)hardware providers.
B)end users.
C)IT professionals.
D)program developers.
100
As reported in "Cloud Computing," IBM has announced plans for an infrastructure called:
A)Think Cloud.
B)Blue Cloud.
C)Cloud Nine.
D)Partly Cloudy.
101
As suggested in "Cloud Computing," the new model of remote computing seems to reverse the 1980s "liberation" movement that gave individual users custody over programs and data, as the shift is restoring control to managers in the corporate IT department.
A)True
B)False
102
As described in "Chrome the Conqueror," with cloud computing:
A)Windows will be rendered obsolete.
B)software applications are stored on the user's computer.
C)software applications are stored on the web, not the user's computer.
D)only Internet browsing is supported.
103
As noted in "Chrome the Conqueror," even critics concede that the Google Chrome browser:
A)runs faster and uses less memory than other browsers.
B)is very plain.
C)has more bells and whistles than other browsers.
D)costs less than other browsers.
104
As mentioned in "Chrome the Conqueror," the entire Chrome suite will cost users between U.S. $400 and $700.
A)True
B)False
105
As indicated in "Publishing: The Revolutionary Future," Gutenberg contributed to the evolution of publishing with:
A)the digital book.
B)a new convention for the script written by monks.
C)the introduction of moveable type.
D)the invention of paper.
106
As noted in "Publishing: The Revolutionary Future," in preliterate societies great sagas and epics were:
A)written in script by monks.
B)recorded using the Gutenberg press.
C)committed to memory and passed along orally.
D)recorded using pictographs on stone.
107
As maintained in "Publishing: The Revolutionary Future," literary writing is seldom collaborative but rather solitary work.
A)True
B)False
108
As set forth in "Computers Learn to Listen, and Some Talk Back," one consequence of the use of artificial intelligence will be that:
A)present-day computers will become obsolete.
B)it will become more expensive to run call centers.
C)people will not learn how to interact with other humans.
D)millions of jobs will be eliminated.
109
As noted in "Computers Learn to Listen, and Some Talk Back," the artificial intelligence technology that is already widely in use is:
A)computer-language translation of spoken speech.
B)physical computer response to human commands.
C)the ability to respond to and participate in conversations.
D)computer understanding of human speech.
110
As shown in "Computers Learn to Listen, and Some Talk Back," some computers used in call centers can identify anger in a customer's voice and respond accordingly.
A)True
B)False
111
As revealed in "Weighing Watson's Impact," Watson was named for:
A)Dr. John Watson, narrator of the Sherlock Holmes stories.
B)electrical designer Thomas A. Watson, the recipient of Alexander Graham Bell's first phone call.
C)IBM's founder, Thomas J. Watson.
D)Emma Watson, who played Hermione in the Harry Potter movies.
112
As related in "Weighing Watson's Impact," the million-dollar prize Watson won on Jeopardy! was:
A)paid to IBM and used for further research.
B)divided between his two human opponents.
C)paid as bonuses to members of the IBM team that created him.
D)donated to charity.
113
As reported in "Weighing Watson's Impact," Watson had to take the same tests that humans do to qualify for the show.
A)True
B)False
114
As noted in "Geek Life," the current definition of death involves the cessation of:
A)breathing.
B)the heartbeat.
C)brain activity.
D)autonomic reflexes.
115
As explained in "Geek Life," technically, the body is not frozen, but:
A)supercooled.
B)mummified.
C)placed in stasis.
D)vitrified.
116
As given in "Geek Life," the cost to freeze and maintain a body at Alcor Life Extension Foundation is $150,000.
A)True
B)False







Contemporary Learning SeriesOnline Learning Center

Home > Technologies, Social Media > 12/13 18e > Practice Quiz