Deck 14: Emerging Trends, Technologies, and Applications
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/105
العب
ملء الشاشة (f)
Deck 14: Emerging Trends, Technologies, and Applications
1
Bluetooth has line-of-sight limitations.
False
2
A quick response (QR) code offers a smaller storage capacity compared to standard universal product codes (UPC) barcodes.
False
3
Alconac Systems, a software start-up company, uses a technology in which the employees have to key in certain names and their respective codes to access information from different departments. Given this information, it can be concluded that Alconac Systems uses _____ to access information from different departments.
A) pull technology
B) artificial intelligence
C) push technology
D) data mining
A) pull technology
B) artificial intelligence
C) push technology
D) data mining
A
4
Google AppEngine is an example of a private cloud service.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
5
Active radio frequency identification (RFID) tags have internal power supply.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
6
A radio frequency identification (RFID) tag provides a generic identification for a credit or debit card carrying the tag.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
7
Push technology can be effective for both business-to-consumer (B2C) and business-to-business (B2B) marketing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which of the following is true of push technology?
A) It cannot provide customized information automatically.
B) It cannot update Web content in real time.
C) It streamlines the process of users getting software updates.
D) It requires users to state their needs before providing information.
A) It cannot provide customized information automatically.
B) It cannot update Web content in real time.
C) It streamlines the process of users getting software updates.
D) It requires users to state their needs before providing information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
9
Augmented reality users are immersed in the virtual world while interacting with objects.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
10
Pull technology is adequate for marketing certain products and services and for providing customized information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
11
Utility computing is incompatible with the software as a service (SaaS) model.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
12
In grid computing, each participant is referred to as a branch.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
13
Compared with Worldwide Interoperability for Microwave Access (WiMAX), Wireless Fidelity (Wi-Fi) theoretically has faster data transfer rates and a longer range.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
14
In an exocentric environment of virtual reality (VR), users can interact with objects.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
15
People can enter other cave automatic virtual environments (CAVEs) in other locations, no matter how far away they are geographically.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
16
With _____, a Web server delivers information to users, who have signed up for the service, instead of waiting for them to request the information be sent to them.
A) push technology
B) pull technology
C) virtual reality technology
D) radio frequency identification technology
A) push technology
B) pull technology
C) virtual reality technology
D) radio frequency identification technology
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
17
Nanomaterials have been applied as coatings on eyewear for increased comfort.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
18
With the _____, users do not need to be concerned with new software versions and compatibility problems because the application service providers (ASPs) offer the most recent version of the software.
A) software distribution model
B) software as a service model
C) radio frequency identification model
D) automatic virtual environment model
A) software distribution model
B) software as a service model
C) radio frequency identification model
D) automatic virtual environment model
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
19
In virtual environment (VR) terminology, the everyday physical world is referred to as a "micro environment."
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
20
Ziffcorp, an IT firm, uses a technology that automatically updates the antivirus software in all the computers in the firm whenever the software becomes outdated. It is evident that Ziffcorp uses _____ for automatically updating the antivirus software.
A) pull technology
B) artificial intelligence technology
C) push technology
D) data mining technology
A) pull technology
B) artificial intelligence technology
C) push technology
D) data mining technology
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
21
Saving data on the application service provider's (ASP's) servers instead of on users' own workstations might cause:
A) inconvenience for those who work in different locations.
B) the data to be exposed to theft by attackers.
C) the data to become immune to change.
D) problems related to the compatibility of the software versions.
A) inconvenience for those who work in different locations.
B) the data to be exposed to theft by attackers.
C) the data to become immune to change.
D) problems related to the compatibility of the software versions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
22
Which of the following is true of a cave automatic virtual environment (CAVE)?
A) It consists of white modules arranged in a grid on a black background.
B) It is developed to make computers faster and smaller, with more memory.
C) It consists of a cube-shaped room in which the walls are rear-projection screens.
D) It is environment friendly and produces green energy systems.
A) It consists of white modules arranged in a grid on a black background.
B) It is developed to make computers faster and smaller, with more memory.
C) It consists of a cube-shaped room in which the walls are rear-projection screens.
D) It is environment friendly and produces green energy systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
23
Which of the following is a problem associated with virtual reality (VR) systems?
A) VR systems cannot be of any assistance to the disabled.
B) VR systems cannot be used in educational games and simulation.
C) VR systems can cause confusion between the VR environment and the real environment.
D) VR systems can increase the cost of training airline pilots.
A) VR systems cannot be of any assistance to the disabled.
B) VR systems cannot be used in educational games and simulation.
C) VR systems can cause confusion between the VR environment and the real environment.
D) VR systems can increase the cost of training airline pilots.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
24
_____ radio frequency identification (RFID) tags can be embedded in a sticker or under the human or animal skin.
A) Active
B) Passive
C) Open
D) Closed
A) Active
B) Passive
C) Open
D) Closed
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
25
In the context of virtual reality (VR) technology, _____ refers to giving users the sense that they are in another location, even one geographically far away, and can manipulate objects as though they are actually in that location.
A) immersion
B) inherence
C) telepresence
D) interaction
A) immersion
B) inherence
C) telepresence
D) interaction
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
26
One of the major disadvantages of application service providers (ASPs) is that they:
A) are highly expensive and deliver information at a slow rate.
B) do not guarantee that applications will fully meet an organization's needs.
C) do not provide any level of technical support to an organization.
D) often fail to keep applications up to date despite users' requests.
A) are highly expensive and deliver information at a slow rate.
B) do not guarantee that applications will fully meet an organization's needs.
C) do not provide any level of technical support to an organization.
D) often fail to keep applications up to date despite users' requests.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
27
A(n) _____ is a simulated environment designed for users to interact via avatars.
A) real world
B) virtual world
C) artificial neural network
D) personal area network
A) real world
B) virtual world
C) artificial neural network
D) personal area network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
28
A _____ can be used to create and test prototypes, develop interfaces, and simulate factory layouts and assembly lines, without investing in physical equipment and layouts.
A) rapid prototyping machine
B) cave automatic virtual environment
C) radio frequency identification tag
D) quick response code
A) rapid prototyping machine
B) cave automatic virtual environment
C) radio frequency identification tag
D) quick response code
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
29
In the context of application software providers (ASPs), which of the following is also known as on-demand software?
A) Assembly software
B) Software as a service
C) Software as a product
D) Systems software
A) Assembly software
B) Software as a service
C) Software as a product
D) Systems software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
30
Which of the following statements is true of passive radio frequency identification (RFID) tags?
A) They have no internal power supply.
B) They have a shorter life expectancy than active RFID tags.
C) They do not require an antenna to absorb signals.
D) They are more reliable than active RFID tags.
A) They have no internal power supply.
B) They have a shorter life expectancy than active RFID tags.
C) They do not require an antenna to absorb signals.
D) They are more reliable than active RFID tags.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
31
A _____ is a small electronic device consisting of a microchip and an antenna and performs the same task as bar codes.
A) global positioning system
B) bluetooth low energy device
C) quick response code
D) radio frequency identification tag
A) global positioning system
B) bluetooth low energy device
C) quick response code
D) radio frequency identification tag
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
32
In a virtual reality (VR) environment, enabling users to act on objects, such as using a data glove to pick up and move objects, is known as _____.
A) interaction
B) simulation
C) telepresence
D) immersion
A) interaction
B) simulation
C) telepresence
D) immersion
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
33
Usually, active radio frequency identification (RFID) tags _____ than passive RFID tags.
A) are more reliable
B) have less internal energy
C) have a narrower signal range
D) last longer
A) are more reliable
B) have less internal energy
C) have a narrower signal range
D) last longer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
34
In a virtual reality (VR) environment, giving objects texture and shading for a three-dimensional (3D) appearance is known as _____.
A) interaction
B) simulation
C) transmission
D) immersion
A) interaction
B) simulation
C) transmission
D) immersion
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
35
_____ radio frequency identification (RFID) tags have no internal power supply.
A) Active
B) Passive
C) Transponder
D) Beacon
A) Active
B) Passive
C) Transponder
D) Beacon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
36
In the context of virtual reality (VR) technology, the main technology used in an exocentric environment is _____.
A) quick response codes
B) grid computations
C) 3D graphics
D) nanotechnologies
A) quick response codes
B) grid computations
C) 3D graphics
D) nanotechnologies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
37
In the context of virtual reality (VR), allowing users in different locations to interact and manipulate the same world at the same time by connecting two or more virtual worlds is known as _____.
A) full-body immersion
B) networked communication
C) simulation
D) interaction
A) full-body immersion
B) networked communication
C) simulation
D) interaction
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
38
Identify the component of a virtual reality (VR) system that generates and manipulates high-quality graphics.
A) The central coordinating processor and software system
B) Visual and aural systems
C) The manual control system
D) Radio frequency identification systems
A) The central coordinating processor and software system
B) Visual and aural systems
C) The manual control system
D) Radio frequency identification systems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
39
Which of the following is an advantage of application service providers (ASPs)?
A) They offer software customized to users' needs.
B) They integrate a customer's other applications and systems easily.
C) They ensure that software is kept up to date, based on users' requests.
D) They ensure that applications fully meet an organization's needs.
A) They offer software customized to users' needs.
B) They integrate a customer's other applications and systems easily.
C) They ensure that software is kept up to date, based on users' requests.
D) They ensure that applications fully meet an organization's needs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
40
_____ uses computer-generated, three-dimensional images to create the illusion of interaction in a real-world environment.
A) Nanotechnology
B) Cloud computing
C) Virtual reality
D) Grid computing
A) Nanotechnology
B) Cloud computing
C) Virtual reality
D) Grid computing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
41
In the context of cloud computing, infrastructure as a service (IaaS) is also known as _____.
A) platform as a service
B) software as a service
C) hardware as a service
D) backend as a service
A) platform as a service
B) software as a service
C) hardware as a service
D) backend as a service
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
42
Wytes Pharmaceuticals wants to shift its list of inventory to a cloud so that its different branches can access it easily. The company needs a cloud computing option that would offer the highest cost savings and would require the least amount of involvement by IT managers. Which of the following cloud computing options would be the most suitable for Wytes Pharmaceuticals?
A) A private cloud
B) A public cloud
C) A hybrid cloud
D) A community cloud
A) A private cloud
B) A public cloud
C) A hybrid cloud
D) A community cloud
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
43
_____ could be useful for authentication purposes in voting via the Internet.
A) Bluetooth
B) Radio frequency identification tags
C) Biometrics
D) Quick response codes
A) Bluetooth
B) Radio frequency identification tags
C) Biometrics
D) Quick response codes
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
44
A(n) _____ is a matrix barcode consisting of black modules arranged in a square pattern on a white background.
A) universal product code
B) quick response code
C) MaxiCode
D) EZcode
A) universal product code
B) quick response code
C) MaxiCode
D) EZcode
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
45
Equi Technologies offers cloud computing services to several data centers around the world. It hosts services in the cloud, which can be accessed by clients through Equibrowse-a Web browser designed by Equi Technologies. In the context of cloud computing services, it is evident that Equi Technologies provides _____.
A) infrastructure as a service
B) platform as a service
C) software as a service
D) backend as a service
A) infrastructure as a service
B) platform as a service
C) software as a service
D) backend as a service
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
46
Worldwide Interoperability for Microwave Access (WiMAX) is designed for _____.
A) wireless wide area networks
B) personal area networks
C) local area networks
D) wireless metropolitan area networks
A) wireless wide area networks
B) personal area networks
C) local area networks
D) wireless metropolitan area networks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
47
In a _____ cloud, a participating organization purchases and maintains the software and infrastructure itself.
A) public
B) private
C) community
D) hybrid
A) public
B) private
C) community
D) hybrid
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
48
_____ incorporates many recent technologies under one platform, including the software as a service (SaaS) model, Web 2.0, grid computing, and utility computing.
A) A biometric system
B) Distributed computing
C) Cloud computing
D) A mainframe computer system
A) A biometric system
B) Distributed computing
C) Cloud computing
D) A mainframe computer system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
49
Which of the following is true of biometrics?
A) They form the basis of radio frequency identification.
B) They can enhance Web page security and reduce defacing.
C) They form a virtual world and enable users to enter using avatars.
D) They can scan quick response codes to identify various products.
A) They form the basis of radio frequency identification.
B) They can enhance Web page security and reduce defacing.
C) They form a virtual world and enable users to enter using avatars.
D) They can scan quick response codes to identify various products.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
50
Symbic Technologies offers cloud computing services to several data centers around the world. It provides servers, networking elements, and storage. Symbic Technologies owns the equipment and is in charge of housing, functioning, and maintaining it. In the context of cloud computing services, it is evident that Symbic Technologies provides _____.
A) infrastructure as a service
B) platform as a service
C) software as a service
D) backend as a service
A) infrastructure as a service
B) platform as a service
C) software as a service
D) backend as a service
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
51
Platform as a service (PaaS) services are hosted in the cloud and accessed by clients through their _____.
A) data gloves
B) Web browsers
C) smart cards
D) Web avatars
A) data gloves
B) Web browsers
C) smart cards
D) Web avatars
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
52
Which of the following statements is true of quick response (QR) codes?
A) They cannot be created online.
B) They cannot be read by smartphones.
C) They offer a larger storage capacity than conventional barcodes.
D) They have a larger printout size than conventional barcodes.
A) They cannot be created online.
B) They cannot be read by smartphones.
C) They offer a larger storage capacity than conventional barcodes.
D) They have a larger printout size than conventional barcodes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
53
_____ clouds are more suitable for organizations that need scalability, do collaborative projects, and offer standard applications over the Web.
A) Private
B) Hybrid
C) Community
D) Public
A) Private
B) Hybrid
C) Community
D) Public
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
54
In the context of networking, on-demand computing is also known as ____.
A) hybrid computing
B) grid computing
C) nano computing
D) utility computing
A) hybrid computing
B) grid computing
C) nano computing
D) utility computing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
55
In the context of cloud computing, _____ automates the configuration, deployment, and ongoing management of applications in the cloud.
A) infrastructure as a service
B) software as a service
C) backend as a service
D) platform as a service
A) infrastructure as a service
B) software as a service
C) backend as a service
D) platform as a service
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
56
In the context of grid computing, each participant in a grid is referred to as a(n) _____.
A) element
B) node
C) pivot
D) iota
A) element
B) node
C) pivot
D) iota
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
57
To read a quick response (QR) code using a smartphone, one must have the _____ app.
A) visualizer
B) reader
C) decoder
D) scanner
A) visualizer
B) reader
C) decoder
D) scanner
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
58
Bluetooth can be used to create a _____ for communication among computerized devices.
A) personal area network
B) local area network
C) wide area network
D) metropolitan area network
A) personal area network
B) local area network
C) wide area network
D) metropolitan area network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
59
Which of the following is an advantage of wireless fidelity (Wi-Fi) connections?
A) They support high-quality media streaming.
B) They are immune to interference from other devices.
C) They are highly secure.
D) They offer mobility and flexibility.
A) They support high-quality media streaming.
B) They are immune to interference from other devices.
C) They are highly secure.
D) They offer mobility and flexibility.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
60
Which of the following technologies could be used to prevent one coworker from checking in for another in an organization?
A) Biometrics
B) Mechatronics
C) Cybernetics
D) Bioinformatics
A) Biometrics
B) Mechatronics
C) Cybernetics
D) Bioinformatics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
61
The _____ is capable of imaging atoms and incorporating nanomaterial layers into hard disk recording heads and magnetic disk coatings.
A) scanning tunneling microscope
B) head-mounted display
C) cave automatic virtual environment
D) heads-up display
A) scanning tunneling microscope
B) head-mounted display
C) cave automatic virtual environment
D) heads-up display
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
62
In a(n)_____ , a user is given a "window view."
A) exocentric environment
B) egocentric environment
C) one-dimensional environment
D) two-dimensional environment
A) exocentric environment
B) egocentric environment
C) one-dimensional environment
D) two-dimensional environment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
63
Which of the following is true of community cloud computing?
A) The costs are spread over fewer users than with a public cloud.
B) The infrastructure can be owned by just one organization.
C) It offers higher security as compared to private clouds.
D) It exposes mission-critical applications and data to the outside world.
A) The costs are spread over fewer users than with a public cloud.
B) The infrastructure can be owned by just one organization.
C) It offers higher security as compared to private clouds.
D) It exposes mission-critical applications and data to the outside world.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
64
Which of the following is a cloud-computing risk that deals with specific jurisdictions and commitment to local privacy?
A) Data location
B) Regulatory compliance
C) Privileged user access
D) Long-term viability
A) Data location
B) Regulatory compliance
C) Privileged user access
D) Long-term viability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
65
With_____ a user states a need before getting information, as when a uniform resource locator (URL) is entered in a Web browser so that the user can go to a certain Web site.
A) pull technology
B) data mining technology
C) push technology
D) virtual reality technology
A) pull technology
B) data mining technology
C) push technology
D) virtual reality technology
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
66
_____is a model in which application service providers (ASPs) deliver software to users for a fee.
A) Platform as a service
B) Software as a service
C) Application-based platform service
D) Open source software service
A) Platform as a service
B) Software as a service
C) Application-based platform service
D) Open source software service
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
67
Widget Corp. wants to shift its list of inventory to a cloud so that its different branches can access it easily. The company needs a cloud computing option that would provide high flexibility to add or drop resources. The cloud computing option should be cost-effective and should not expose mission-critical applications and data to the outside world. Which of the following cloud computing options would be most suitable for Widget Corp.?
A) A public cloud
B) A private cloud
C) A hybrid cloud
D) A community cloud
A) A public cloud
B) A private cloud
C) A hybrid cloud
D) A community cloud
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
68
In a(n)_____ , a user is totally immersed in the virtual reality (VR) world.
A) exocentric environment
B) two-dimensional environment
C) one-dimensional environment
D) egocentric environment
A) exocentric environment
B) two-dimensional environment
C) one-dimensional environment
D) egocentric environment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
69
In a technological conference, all the participating IT firms agreed to transfer the data pertaining to their human resources to a cloud. The objective behind this is to improve talent acquisition process and communication among HR professionals around the globe. The cloud referred to in this scenario is a _____ cloud.
A) public
B) private
C) hybrid
D) community
A) public
B) private
C) hybrid
D) community
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
70
_____provide access to software or services for a fee.
A) Web browsers
B) Business service providers
C) Web Sites
D) Application service providers
A) Web browsers
B) Business service providers
C) Web Sites
D) Application service providers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
71
Unlike bar codes and other systems, _____ devices do not have to be in contact with the scanner to be read.
A) MaxiCode
B) radio frequency identification
C) quick response code
D) Semacode
A) MaxiCode
B) radio frequency identification
C) quick response code
D) Semacode
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
72
_____ is a cloud-computing risk that deals with how a particular type of data is to be kept separate from other data in the cloud.
A) Data transmission
B) Data abstraction
C) Data location
D) Data segregation
A) Data transmission
B) Data abstraction
C) Data location
D) Data segregation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
73
A _____ cloud allows an organization to take advantage of the scalability and cost-effectiveness that a public cloud computing environment offers without exposing mission-critical applications and data to the outside world.
A) hybrid
B) private
C) point
D) community
A) hybrid
B) private
C) point
D) community
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
74
GuardIN is an IT security firm. It deals with highly secure data for a wide variety of software and e-commerce agreements, trademark licenses, and patent licenses. GuardIN needs a cloud computing option that would allow it to purchase and maintain the software and infrastructure itself. The cloud also needs to be designed in such a way that all users of the organization can access it without any lag. Which of the following cloud computing options would be most suitable for GuardIN?
A) A public cloud
B) A community cloud
C) A hybrid cloud
D) A private cloud
A) A public cloud
B) A community cloud
C) A hybrid cloud
D) A private cloud
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
75
A(n)_____ is a 2D or 3D graphical representation of a person in the virtual world, used in chat rooms and online games.
A) entity
B) schema
C) avatar
D) relvar
A) entity
B) schema
C) avatar
D) relvar
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
76
Nanomaterials, if added to golf balls, increase the _____ of the golf balls.
A) frailty
B) brittleness
C) responsiveness
D) delicacy
A) frailty
B) brittleness
C) responsiveness
D) delicacy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
77
_____is also known as prototyping.
A) prototyping
B) grid computing
C) webcasting
D) utility computing
A) prototyping
B) grid computing
C) webcasting
D) utility computing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
78
In the context of virtual reality (VR), _____ refers to allowing users to move around freely by combining interactive environments with cameras, monitors, and other devices.
A) full-body immersion
B) simulation
C) abstraction
D) networked communication
A) full-body immersion
B) simulation
C) abstraction
D) networked communication
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
79
A _____ is the most commonly used device that enables users to navigate in the virtual reality (VR) environment and manually control various objects.
A) data glove
B) head-mounted display
C) virtual retinal display
D) smart card
A) data glove
B) head-mounted display
C) virtual retinal display
D) smart card
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
80
_____ is a cloud-computing risk that deals with the availability of external audits and security certifications.
A) Regulatory compliance
B) Investigative support
C) Data segregation
D) Long-term viability
A) Regulatory compliance
B) Investigative support
C) Data segregation
D) Long-term viability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck