Browse Definitions:
Quiz

Quiz: Fear of nanopants and other scary technology

Many technological advances are applauded, but some are feared. Here are ten technophobic terms that that have struck fear into the hearts of mankind. Some may surprise you!

1. May 2005: What technological advance prompted a group of protesters to take of their clothes in the windows of a famous Chicago store?
Answer


2. Urban legend has it that if you use this technological device near a gas pump, you could ignite an explosion. It has also been blamed for causing cancer, brain tumors, marriage breakups and automobile accidents. What is it?
Answer


3. In agriculture, what kind of technology is responsible for something so scary it's been labeled "Frankenstein food"?
Answer


4. What do you call a person who hates technology, especially new forms of technology that threaten existing jobs?
Answer


5. The year is 1905. People feared that this new technological device would cause electricity to leak out of wall sockets if not used properly. What is it?
Answer


6. In the early 1990's, newspaper editors were afraid that this technological advance would soon render ink-on-paper useless to their readers. What is it?
Answer


7. The year is 1959: Blue collar workers in some vertical industries are afraid they will lose their jobs because of this new technology. What is it?
Answer


8. Ironically enough, the answer to Question 7 will be replaced by another new technology. What is it?
Answer


9. Photo lab owners aren't afraid this technology will steal their soul -- they are afraid it will steal their income! What is it?
Answer


10. In Steven Spielberg's 2005 version of War of the Worlds, this technological side effect temporarily disabled any type of machine that used electricity, including ignition systems in vehicles. Thousands of extras, including Whatis.com team member Margaret Rouse, fled for their lives. What is it?
Answer

This was last updated in November 2010

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

  • conduct risk

    Conduct risk is the prospect of financial loss to an organization that is caused by the actions of an organization's ...

SearchSecurity

  • security

    Security, in information technology (IT), is the defense of digital information and IT assets against internal and external, ...

  • insider threat

    An insider threat is a malicious hacker (also called a cracker or a black hat) who is an employee or officer of a business, ...

  • virus (computer virus)

    A computer virus is malicious code that replicates by copying itself to another program, computer boot sector or document.

SearchHealthIT

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

  • HIPAA business associate agreement (BAA)

    Under the U.S. Health Insurance Portability and Accountability Act of 1996, a HIPAA business associate agreement (BAA) is a ...

  • telemedicine

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

SearchDisasterRecovery

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

  • fault-tolerant

    Systems with integrated fault tolerance are designed to withstand multiple hardware failures to ensure continuous availability.

SearchStorage

  • Secure Digital card (SD card)

    SD cards use flash memory to provide nonvolatile storage. They are more rugged than traditional storage media and are used in ...

  • data storage

    In a computer, storage is the place where data is held in an electromagnetic or optical form for access by a computer processor.

  • flash storage

    Flash-based storage, based on flash memory, is used for data repositories, storage systems and consumer devices, such as USB ...

SearchSolidStateStorage

  • flash file system

    Flash file systems are designed specifically for memory devices. A well-designed flash device and flash file system ensure ...

  • IOPS (input/output operations per second)

    IOPS measures the maximum number of reads and writes to non-contiguous storage. It is not an actual benchmark since vendor ...

  • eMMC (embedded MultiMediaCard)

    An embedded MultiMediaCard (eMMC) is a small storage device made up of NAND flash memory and a simple storage controller.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close