Deck 14: Emerging Trends,Technologies,and Applications

ملء الشاشة (f)
exit full mode
سؤال
People can enter other cave automatic virtual environments (CAVEs)in other locations,no matter how far away they are geographically.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Augmented reality users are immersed in the virtual world while interacting with objects.
سؤال
Pull technology is adequate for marketing certain products and services and for providing customized information.
سؤال
Alconac Systems,a software start-up company,uses a technology in which the employees have to key in certain names and their respective codes to access information from different departments.Given this information,it can be concluded that Alconac Systems uses _____ to access information from different departments.

A)pull technology
B)artificial intelligence
C)push technology
D)data mining
سؤال
In virtual environment (VR)terminology,the everyday physical world is referred to as a "micro environment."
سؤال
Google AppEngine is an example of a private cloud service.
سؤال
A radio frequency identification (RFID)tag provides a generic identification for a credit or debit card carrying the tag.
سؤال
Ziffcorp,an IT firm,uses a technology that automatically updates the antivirus software in all the computers in the firm whenever the software becomes outdated.It is evident that Ziffcorp uses _____ for automatically updating the antivirus software.

A)pull technology
B)artificial intelligence technology
C)push technology
D)data mining technology
سؤال
With _____ technology,a Web server delivers information to users,who have signed up for the service,instead of waiting for them to request the information be sent to them.

A)push
B)pull   
C)virtual reality
D)radio frequency identification 
سؤال
With the _____ model,users do not need to be concerned with new software versions and compatibility problems because the application service providers (ASPs)offer the most recent version of the software.

A)software distribution
B)software as a service 
C)radio frequency identification
D)automatic virtual environment 
سؤال
Push technology can be effective for both business-to-consumer (B2C)and business-to-business (B2B)marketing.
سؤال
A quick response (QR)code offers a smaller storage capacity compared to standard universal product codes (UPC)barcodes.
سؤال
In grid computing,each participant is referred to as a branch.
سؤال
Which is true of push technology?

A)It cannot provide customized information automatically.
B)It cannot update Web content in real time.
C)It streamlines the process of users getting software updates.
D)It requires users to state their needs before providing information.
سؤال
Compared with Worldwide Interoperability for Microwave Access (WiMAX),Wireless Fidelity (Wi-Fi)theoretically has faster data transfer rates and a longer range.
سؤال
Active radio frequency identification (RFID)tags have internal power supply.
سؤال
In an exocentric environment of virtual reality (VR),users can interact with objects.
سؤال
Bluetooth has line-of-sight limitations.
سؤال
Nanomaterials have been applied as coatings on eyewear for increased comfort.
سؤال
Utility computing is incompatible with the software as a service (SaaS)model.
سؤال
Usually,active radio frequency identification (RFID)tags _____ than passive RFID tags.

A)are more reliable
B)have less internal energy
C)have a narrower signal range
D)last longer
سؤال
In the context of virtual reality (VR)technology,the main technology used in an exocentric environment is _____.

A)quick response codes
B)grid computations
C)3D graphics
D)nanotechnologies
سؤال
A _____ is a small electronic device consisting of a microchip and an antenna and performs the same task as bar codes.

A)global positioning system
B)bluetooth low energy device
C)quick response code
D)radio frequency identification tag
سؤال
A _____ can be used to create and test prototypes,develop interfaces,and simulate factory layouts and assembly lines,without investing in physical equipment and layouts.

A)rapid prototyping machine
B)cave automatic virtual environment
C)radio frequency identification tag
D)quick response code
سؤال
Identify the component of a virtual reality (VR)system that generates and manipulates high-quality graphics.

A)The central coordinating processor and software system
B)Visual and aural systems
C)The manual control system
D)Radio frequency identification systems
سؤال
Which statement is true of passive radio frequency identification (RFID)tags?

A)They have no internal power supply.
B)They have a shorter life expectancy than active RFID tags.
C)They do not require an antenna to absorb signals.
D)They are more reliable than active RFID tags.
سؤال
Which is an advantage of application service providers (ASPs)?

A)They offer software customized to users' needs.
B)They integrate a customer's other applications and systems easily.
C)They ensure that software is kept up to date,based on users' requests.
D)They ensure that applications fully meet an organization's needs.
سؤال
One of the major disadvantages of application service providers (ASPs)is that they:

A)are highly expensive and deliver information at a slow rate.
B)do not guarantee that applications will fully meet an organization's needs.
C)do not provide any level of technical support to an organization.
D)often fail to keep applications up to date despite users' requests.
سؤال
In the context of application software providers (ASPs),which of the following is also known as on-demand software?

A)Assembly software
B)Software as a service
C)Software as a product
D)Systems software
سؤال
A(n)_____ is a simulated environment designed for users to interact via avatars.

A)real world
B)virtual world
C)artificial neural network
D)personal area network
سؤال
In a virtual reality (VR)environment,enabling users to act on objects,such as using a data glove to pick up and move objects,is known as _____.

A)interaction
B)simulation
C)telepresence
D)immersion
سؤال
_____ radio frequency identification (RFID)tags have no internal power supply.

A)Active
B)Passive
C)Transponder
D)Beacon
سؤال
In the context of virtual reality (VR)technology,_____ refers to giving users the sense that they are in another location,even one geographically far away,and can manipulate objects as though they are actually in that location.

A)immersion
B)inherence
C)telepresence
D)interaction
سؤال
Which is a problem associated with virtual reality (VR)systems?

A)VR systems cannot be of any assistance to the disabled.
B)VR systems cannot be used in educational games and simulation.
C)VR systems can cause confusion between the VR environment and the real environment.
D)VR systems can increase the cost of training airline pilots.
سؤال
_____ radio frequency identification (RFID)tags can be embedded in a sticker or under the human or animal skin.

A)Active
B)Passive
C)Open
D)Closed
سؤال
In a virtual reality (VR)environment,giving objects texture and shading for a three-dimensional (3D)appearance is known as _____.

A)interaction
B)simulation
C)transmission
D)immersion
سؤال
_____ uses computer-generated,three-dimensional images to create the illusion of interaction in a real-world environment.

A)Nanotechnology
B)Cloud computing
C)Virtual reality
D)Grid computing
سؤال
Which of the following is true of a cave automatic virtual environment (CAVE)?

A)It consists of white modules arranged in a grid on a black background.
B)It is developed to make computers faster and smaller,with more memory.
C)It consists of a cube-shaped room in which the walls are rear-projection screens.
D)It is environment friendly and produces green energy systems.
سؤال
In the context of virtual reality (VR),allowing users in different locations to interact and manipulate the same world at the same time by connecting two or more virtual worlds is known as _____.

A)full-body immersion
B)networked communication
C)simulation
D)interaction
سؤال
Saving data on the application service provider's (ASP's)servers instead of on users' own workstations might cause:

A)inconvenience for those who work in different locations.
B)the data to be exposed to theft by attackers.
C)the data to become immune to change.
D)problems related to the compatibility of the software versions.
سؤال
Wytes Pharmaceuticals wants to shift its list of inventory to a cloud so that its different branches can access it easily.The company needs a cloud computing option that would offer the highest cost savings and would require the least amount of involvement by IT managers.Which of the following cloud computing options would be the most suitable for Wytes Pharmaceuticals?

A)A private cloud
B)A public cloud
C)A hybrid cloud
D)A community cloud
سؤال
_____ could be useful for authentication purposes in voting via the Internet.

A)Bluetooth
B)Radio frequency identification tags
C)Biometrics
D)Quick response codes
سؤال
Platform as a service (PaaS)services are hosted in the cloud and accessed by clients through their _____.

A)data gloves
B)Web browsers
C)smart cards
D)Web avatars
سؤال
Symbic Technologies offers cloud computing services to several data centers around the world.It provides servers,networking elements,and storage.Symbic Technologies owns the equipment and is in charge of housing,functioning,and maintaining it.In the context of cloud computing services,it is evident that Symbic Technologies provides _____ as a service.

A)infrastructure
B)platform 
C)software
D)backend 
سؤال
_____ clouds are more suitable for organizations that need scalability,do collaborative projects,and offer standard applications over the Web.

A)Private
B)Hybrid
C)Community
D)Public
سؤال
Which technology could be used to prevent one coworker from checking in for another in an organization?

A)Biometrics
B)Mechatronics
C)Cybernetics
D)Bioinformatics
سؤال
To read a quick response (QR)code using a smartphone,one must have the _____ app.

A)visualizer
B)reader
C)decoder
D)scanner
سؤال
_____ incorporates many recent technologies under one platform,including the software as a service (SaaS)model,Web 2.0,grid computing,and utility computing.

A)A biometric system
B)Distributed computing
C)Cloud computing
D)A mainframe computer system
سؤال
Which statement is true of quick response (QR)codes?

A)They cannot be created online.
B)They cannot be read by smartphones.
C)They offer a larger storage capacity than conventional barcodes.
D)They have a larger printout size than conventional barcodes.
سؤال
In the context of grid computing,each participant in a grid is referred to as a(n)_____.

A)element
B)node
C)pivot
D)iota
سؤال
Equi Technologies offers cloud computing services to several data centers around the world.It hosts services in the cloud,which can be accessed by clients through Equibrowse-a Web browser designed by Equi Technologies.In the context of cloud computing services,it is evident that Equi Technologies provides _____ as a service.

A)infrastructure
B)platform 
C)software
D)backend 
سؤال
A(n)_____ is a matrix barcode consisting of black modules arranged in a square pattern on a white background.

A)universal product code
B)quick response code
C)MaxiCode
D)EZcode
سؤال
In the context of cloud computing,_____ as a service automates the configuration,deployment,and ongoing management of applications in the cloud.

A)infrastructure  
B)software 
C)backend
D)platform 
سؤال
Worldwide Interoperability for Microwave Access (WiMAX)is designed for _____ networks.

A)wireless wide area
B)personal area 
C)local area
D)wireless metropolitan area 
سؤال
In the context of networking,on-demand computing is also known as ____ computing.

A)hybrid
B)grid 
C)nano
D)utility 
سؤال
Which is an advantage of wireless fidelity (Wi-Fi)connections?

A)They support high-quality media streaming.
B)They are immune to interference from other devices.
C)They are highly secure.
D)They offer mobility and flexibility.
سؤال
Bluetooth can be used to create a _____ network for communication among computerized devices.

A)personal area
B)local area 
C)wide area
D)metropolitan area 
سؤال
In a _____ cloud,a participating organization purchases and maintains the software and infrastructure itself.

A)public
B)private
C)community
D)hybrid
سؤال
In the context of cloud computing,infrastructure as a service (IaaS)is also known as _____ as a service.

A)platform
B)software 
C)hardware
D)backend 
سؤال
Which is true of biometrics?

A)They form the basis of radio frequency identification.
B)They can enhance Web page security and reduce defacing.
C)They form a virtual world and enable users to enter using avatars.
D)They can scan quick response codes to identify various products.
سؤال
_____ is a cloud-computing risk that deals with the availability of external audits and security certifications.

A)Regulatory compliance
B)Investigative support
C)Data segregation
D)Long-term viability
سؤال
Unlike bar codes and other systems,_____ devices do not have to be in contact with the scanner to be read.

A)MaxiCode
B)radio frequency identification
C)quick response code
D)Semacode
سؤال
The _____ is capable of imaging atoms and incorporating nanomaterial layers into hard disk recording heads and magnetic disk coatings.

A)scanning tunneling microscope
B)head-mounted display
C)cave automatic virtual environment
D)heads-up display
سؤال
A _____ is the most commonly used device that enables users to navigate in the virtual reality (VR)environment and manually control various objects.

A)data glove
B)head-mounted display
C)virtual retinal display
D)smart card
سؤال
A _____ cloud allows an organization to take advantage of the scalability and cost-effectiveness that a public cloud computing environment offers without exposing mission-critical applications and data to the outside world.

A)hybrid
B)private
C)point
D)community
سؤال
Data _____ is a cloud-computing risk that deals with how a particular type of data is to be kept separate from other data in the cloud.

A)transmission
B)abstraction
C)location
D)segregation
سؤال
Which is true of community cloud computing?

A)The costs are spread over fewer users than with a public cloud.
B)The infrastructure can be owned by just one organization.
C)It offers higher security as compared to private clouds.
D)It exposes mission-critical applications and data to the outside world.
سؤال
In a technological conference,all the participating IT firms agreed to transfer the data pertaining to their human resources to a cloud.The objective behind this is to improve talent acquisition process and communication among HR professionals around the globe.The cloud referred to in this scenario is a _____ cloud.

A)public
B)private
C)hybrid
D)community
سؤال
Push technology is also known as _____.

A)prototyping
B)grid computing
C)webcasting
D)utility computing
سؤال
GuardIN is an IT security firm.It deals with highly secure data for a wide variety of software and e-commerce agreements,trademark licenses,and patent licenses.GuardIN needs a cloud computing option that would allow it to purchase and maintain the software and infrastructure itself.The cloud also needs to be designed in such a way that all users of the organization can access it without any lag.Which cloud computing option would be most suitable for GuardIN?

A)A public cloud
B)A community cloud
C)A hybrid cloud
D)A private cloud
سؤال
A(n) _____ is a 2D or 3D graphical representation of a person in the virtual world,used in chat rooms and online games.

A)entity
B)schema
C)avatar
D)relvar
سؤال
_____ provide access to software or services for a fee.

A)Web browsers
B)Business service providers
C)Web Sites
D)Application service providers
سؤال
With _____ a user states a need before getting information,as when a uniform resource locator (URL)is entered in a Web browser so that the user can go to a certain Web site.

A)pull technology
B)data mining technology
C)push technology
D)virtual reality technology
سؤال
In the context of virtual reality (VR),_____ refers to allowing users to move around freely by combining interactive environments with cameras,monitors,and other devices.

A)full-body immersion
B)simulation
C)abstraction
D)networked communication
سؤال
Widget Corp.wants to shift its list of inventory to a cloud so that its different branches can access it easily.The company needs a cloud computing option that would provide high flexibility to add or drop resources.The cloud computing option should be cost-effective and should not expose mission-critical applications and data to the outside world.Which cloud computing option would be most suitable for Widget Corp.?

A)A public cloud
B)A private cloud
C)A hybrid cloud
D)A community cloud
سؤال
In which environment is a user is totally immersed in the virtual reality (VR)world?

A)exocentric
B)two-dimensional 
C)one-dimensional
D)egocentric 
سؤال
Which cloud-computing risk that deals with specific jurisdictions and commitment to local privacy?

A)Data location
B)Regulatory compliance
C)Privileged user access
D)Long-term viability
سؤال
In which environment is a user is given a "window" view?

A)exocentric
B)egocentric 
C)one-dimensional
D)two-dimensional 
سؤال
Nanomaterials,if added to golf balls,increase the _____ of the golf balls.

A)frailty
B)brittleness
C)responsiveness
D)delicacy
سؤال
_____ is a model in which application service providers (ASPs)deliver software to users for a fee.

A)Platform as a service
B)Software as a service
C)Application-based platform service
D)Open source software service
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/105
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 14: Emerging Trends,Technologies,and Applications
1
People can enter other cave automatic virtual environments (CAVEs)in other locations,no matter how far away they are geographically.
True
2
Augmented reality users are immersed in the virtual world while interacting with objects.
False
3
Pull technology is adequate for marketing certain products and services and for providing customized information.
False
4
Alconac Systems,a software start-up company,uses a technology in which the employees have to key in certain names and their respective codes to access information from different departments.Given this information,it can be concluded that Alconac Systems uses _____ to access information from different departments.

A)pull technology
B)artificial intelligence
C)push technology
D)data mining
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
5
In virtual environment (VR)terminology,the everyday physical world is referred to as a "micro environment."
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
6
Google AppEngine is an example of a private cloud service.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
7
A radio frequency identification (RFID)tag provides a generic identification for a credit or debit card carrying the tag.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
8
Ziffcorp,an IT firm,uses a technology that automatically updates the antivirus software in all the computers in the firm whenever the software becomes outdated.It is evident that Ziffcorp uses _____ for automatically updating the antivirus software.

A)pull technology
B)artificial intelligence technology
C)push technology
D)data mining technology
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
9
With _____ technology,a Web server delivers information to users,who have signed up for the service,instead of waiting for them to request the information be sent to them.

A)push
B)pull   
C)virtual reality
D)radio frequency identification 
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
10
With the _____ model,users do not need to be concerned with new software versions and compatibility problems because the application service providers (ASPs)offer the most recent version of the software.

A)software distribution
B)software as a service 
C)radio frequency identification
D)automatic virtual environment 
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
11
Push technology can be effective for both business-to-consumer (B2C)and business-to-business (B2B)marketing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
12
A quick response (QR)code offers a smaller storage capacity compared to standard universal product codes (UPC)barcodes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
13
In grid computing,each participant is referred to as a branch.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which is true of push technology?

A)It cannot provide customized information automatically.
B)It cannot update Web content in real time.
C)It streamlines the process of users getting software updates.
D)It requires users to state their needs before providing information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
15
Compared with Worldwide Interoperability for Microwave Access (WiMAX),Wireless Fidelity (Wi-Fi)theoretically has faster data transfer rates and a longer range.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
16
Active radio frequency identification (RFID)tags have internal power supply.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
17
In an exocentric environment of virtual reality (VR),users can interact with objects.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
18
Bluetooth has line-of-sight limitations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
19
Nanomaterials have been applied as coatings on eyewear for increased comfort.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
20
Utility computing is incompatible with the software as a service (SaaS)model.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
21
Usually,active radio frequency identification (RFID)tags _____ than passive RFID tags.

A)are more reliable
B)have less internal energy
C)have a narrower signal range
D)last longer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
22
In the context of virtual reality (VR)technology,the main technology used in an exocentric environment is _____.

A)quick response codes
B)grid computations
C)3D graphics
D)nanotechnologies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
23
A _____ is a small electronic device consisting of a microchip and an antenna and performs the same task as bar codes.

A)global positioning system
B)bluetooth low energy device
C)quick response code
D)radio frequency identification tag
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
24
A _____ can be used to create and test prototypes,develop interfaces,and simulate factory layouts and assembly lines,without investing in physical equipment and layouts.

A)rapid prototyping machine
B)cave automatic virtual environment
C)radio frequency identification tag
D)quick response code
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
25
Identify the component of a virtual reality (VR)system that generates and manipulates high-quality graphics.

A)The central coordinating processor and software system
B)Visual and aural systems
C)The manual control system
D)Radio frequency identification systems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
26
Which statement is true of passive radio frequency identification (RFID)tags?

A)They have no internal power supply.
B)They have a shorter life expectancy than active RFID tags.
C)They do not require an antenna to absorb signals.
D)They are more reliable than active RFID tags.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
27
Which is an advantage of application service providers (ASPs)?

A)They offer software customized to users' needs.
B)They integrate a customer's other applications and systems easily.
C)They ensure that software is kept up to date,based on users' requests.
D)They ensure that applications fully meet an organization's needs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
28
One of the major disadvantages of application service providers (ASPs)is that they:

A)are highly expensive and deliver information at a slow rate.
B)do not guarantee that applications will fully meet an organization's needs.
C)do not provide any level of technical support to an organization.
D)often fail to keep applications up to date despite users' requests.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
29
In the context of application software providers (ASPs),which of the following is also known as on-demand software?

A)Assembly software
B)Software as a service
C)Software as a product
D)Systems software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
30
A(n)_____ is a simulated environment designed for users to interact via avatars.

A)real world
B)virtual world
C)artificial neural network
D)personal area network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
31
In a virtual reality (VR)environment,enabling users to act on objects,such as using a data glove to pick up and move objects,is known as _____.

A)interaction
B)simulation
C)telepresence
D)immersion
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
32
_____ radio frequency identification (RFID)tags have no internal power supply.

A)Active
B)Passive
C)Transponder
D)Beacon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
33
In the context of virtual reality (VR)technology,_____ refers to giving users the sense that they are in another location,even one geographically far away,and can manipulate objects as though they are actually in that location.

A)immersion
B)inherence
C)telepresence
D)interaction
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
34
Which is a problem associated with virtual reality (VR)systems?

A)VR systems cannot be of any assistance to the disabled.
B)VR systems cannot be used in educational games and simulation.
C)VR systems can cause confusion between the VR environment and the real environment.
D)VR systems can increase the cost of training airline pilots.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
35
_____ radio frequency identification (RFID)tags can be embedded in a sticker or under the human or animal skin.

A)Active
B)Passive
C)Open
D)Closed
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
36
In a virtual reality (VR)environment,giving objects texture and shading for a three-dimensional (3D)appearance is known as _____.

A)interaction
B)simulation
C)transmission
D)immersion
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
37
_____ uses computer-generated,three-dimensional images to create the illusion of interaction in a real-world environment.

A)Nanotechnology
B)Cloud computing
C)Virtual reality
D)Grid computing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
38
Which of the following is true of a cave automatic virtual environment (CAVE)?

A)It consists of white modules arranged in a grid on a black background.
B)It is developed to make computers faster and smaller,with more memory.
C)It consists of a cube-shaped room in which the walls are rear-projection screens.
D)It is environment friendly and produces green energy systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
39
In the context of virtual reality (VR),allowing users in different locations to interact and manipulate the same world at the same time by connecting two or more virtual worlds is known as _____.

A)full-body immersion
B)networked communication
C)simulation
D)interaction
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
40
Saving data on the application service provider's (ASP's)servers instead of on users' own workstations might cause:

A)inconvenience for those who work in different locations.
B)the data to be exposed to theft by attackers.
C)the data to become immune to change.
D)problems related to the compatibility of the software versions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
41
Wytes Pharmaceuticals wants to shift its list of inventory to a cloud so that its different branches can access it easily.The company needs a cloud computing option that would offer the highest cost savings and would require the least amount of involvement by IT managers.Which of the following cloud computing options would be the most suitable for Wytes Pharmaceuticals?

A)A private cloud
B)A public cloud
C)A hybrid cloud
D)A community cloud
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
42
_____ could be useful for authentication purposes in voting via the Internet.

A)Bluetooth
B)Radio frequency identification tags
C)Biometrics
D)Quick response codes
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
43
Platform as a service (PaaS)services are hosted in the cloud and accessed by clients through their _____.

A)data gloves
B)Web browsers
C)smart cards
D)Web avatars
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
44
Symbic Technologies offers cloud computing services to several data centers around the world.It provides servers,networking elements,and storage.Symbic Technologies owns the equipment and is in charge of housing,functioning,and maintaining it.In the context of cloud computing services,it is evident that Symbic Technologies provides _____ as a service.

A)infrastructure
B)platform 
C)software
D)backend 
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
45
_____ clouds are more suitable for organizations that need scalability,do collaborative projects,and offer standard applications over the Web.

A)Private
B)Hybrid
C)Community
D)Public
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
46
Which technology could be used to prevent one coworker from checking in for another in an organization?

A)Biometrics
B)Mechatronics
C)Cybernetics
D)Bioinformatics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
47
To read a quick response (QR)code using a smartphone,one must have the _____ app.

A)visualizer
B)reader
C)decoder
D)scanner
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
48
_____ incorporates many recent technologies under one platform,including the software as a service (SaaS)model,Web 2.0,grid computing,and utility computing.

A)A biometric system
B)Distributed computing
C)Cloud computing
D)A mainframe computer system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
49
Which statement is true of quick response (QR)codes?

A)They cannot be created online.
B)They cannot be read by smartphones.
C)They offer a larger storage capacity than conventional barcodes.
D)They have a larger printout size than conventional barcodes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
50
In the context of grid computing,each participant in a grid is referred to as a(n)_____.

A)element
B)node
C)pivot
D)iota
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
51
Equi Technologies offers cloud computing services to several data centers around the world.It hosts services in the cloud,which can be accessed by clients through Equibrowse-a Web browser designed by Equi Technologies.In the context of cloud computing services,it is evident that Equi Technologies provides _____ as a service.

A)infrastructure
B)platform 
C)software
D)backend 
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
52
A(n)_____ is a matrix barcode consisting of black modules arranged in a square pattern on a white background.

A)universal product code
B)quick response code
C)MaxiCode
D)EZcode
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
53
In the context of cloud computing,_____ as a service automates the configuration,deployment,and ongoing management of applications in the cloud.

A)infrastructure  
B)software 
C)backend
D)platform 
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
54
Worldwide Interoperability for Microwave Access (WiMAX)is designed for _____ networks.

A)wireless wide area
B)personal area 
C)local area
D)wireless metropolitan area 
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
55
In the context of networking,on-demand computing is also known as ____ computing.

A)hybrid
B)grid 
C)nano
D)utility 
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
56
Which is an advantage of wireless fidelity (Wi-Fi)connections?

A)They support high-quality media streaming.
B)They are immune to interference from other devices.
C)They are highly secure.
D)They offer mobility and flexibility.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
57
Bluetooth can be used to create a _____ network for communication among computerized devices.

A)personal area
B)local area 
C)wide area
D)metropolitan area 
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
58
In a _____ cloud,a participating organization purchases and maintains the software and infrastructure itself.

A)public
B)private
C)community
D)hybrid
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
59
In the context of cloud computing,infrastructure as a service (IaaS)is also known as _____ as a service.

A)platform
B)software 
C)hardware
D)backend 
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
60
Which is true of biometrics?

A)They form the basis of radio frequency identification.
B)They can enhance Web page security and reduce defacing.
C)They form a virtual world and enable users to enter using avatars.
D)They can scan quick response codes to identify various products.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
61
_____ is a cloud-computing risk that deals with the availability of external audits and security certifications.

A)Regulatory compliance
B)Investigative support
C)Data segregation
D)Long-term viability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
62
Unlike bar codes and other systems,_____ devices do not have to be in contact with the scanner to be read.

A)MaxiCode
B)radio frequency identification
C)quick response code
D)Semacode
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
63
The _____ is capable of imaging atoms and incorporating nanomaterial layers into hard disk recording heads and magnetic disk coatings.

A)scanning tunneling microscope
B)head-mounted display
C)cave automatic virtual environment
D)heads-up display
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
64
A _____ is the most commonly used device that enables users to navigate in the virtual reality (VR)environment and manually control various objects.

A)data glove
B)head-mounted display
C)virtual retinal display
D)smart card
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
65
A _____ cloud allows an organization to take advantage of the scalability and cost-effectiveness that a public cloud computing environment offers without exposing mission-critical applications and data to the outside world.

A)hybrid
B)private
C)point
D)community
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
66
Data _____ is a cloud-computing risk that deals with how a particular type of data is to be kept separate from other data in the cloud.

A)transmission
B)abstraction
C)location
D)segregation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
67
Which is true of community cloud computing?

A)The costs are spread over fewer users than with a public cloud.
B)The infrastructure can be owned by just one organization.
C)It offers higher security as compared to private clouds.
D)It exposes mission-critical applications and data to the outside world.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
68
In a technological conference,all the participating IT firms agreed to transfer the data pertaining to their human resources to a cloud.The objective behind this is to improve talent acquisition process and communication among HR professionals around the globe.The cloud referred to in this scenario is a _____ cloud.

A)public
B)private
C)hybrid
D)community
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
69
Push technology is also known as _____.

A)prototyping
B)grid computing
C)webcasting
D)utility computing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
70
GuardIN is an IT security firm.It deals with highly secure data for a wide variety of software and e-commerce agreements,trademark licenses,and patent licenses.GuardIN needs a cloud computing option that would allow it to purchase and maintain the software and infrastructure itself.The cloud also needs to be designed in such a way that all users of the organization can access it without any lag.Which cloud computing option would be most suitable for GuardIN?

A)A public cloud
B)A community cloud
C)A hybrid cloud
D)A private cloud
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
71
A(n) _____ is a 2D or 3D graphical representation of a person in the virtual world,used in chat rooms and online games.

A)entity
B)schema
C)avatar
D)relvar
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
72
_____ provide access to software or services for a fee.

A)Web browsers
B)Business service providers
C)Web Sites
D)Application service providers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
73
With _____ a user states a need before getting information,as when a uniform resource locator (URL)is entered in a Web browser so that the user can go to a certain Web site.

A)pull technology
B)data mining technology
C)push technology
D)virtual reality technology
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
74
In the context of virtual reality (VR),_____ refers to allowing users to move around freely by combining interactive environments with cameras,monitors,and other devices.

A)full-body immersion
B)simulation
C)abstraction
D)networked communication
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
75
Widget Corp.wants to shift its list of inventory to a cloud so that its different branches can access it easily.The company needs a cloud computing option that would provide high flexibility to add or drop resources.The cloud computing option should be cost-effective and should not expose mission-critical applications and data to the outside world.Which cloud computing option would be most suitable for Widget Corp.?

A)A public cloud
B)A private cloud
C)A hybrid cloud
D)A community cloud
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
76
In which environment is a user is totally immersed in the virtual reality (VR)world?

A)exocentric
B)two-dimensional 
C)one-dimensional
D)egocentric 
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
77
Which cloud-computing risk that deals with specific jurisdictions and commitment to local privacy?

A)Data location
B)Regulatory compliance
C)Privileged user access
D)Long-term viability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
78
In which environment is a user is given a "window" view?

A)exocentric
B)egocentric 
C)one-dimensional
D)two-dimensional 
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
79
Nanomaterials,if added to golf balls,increase the _____ of the golf balls.

A)frailty
B)brittleness
C)responsiveness
D)delicacy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
80
_____ is a model in which application service providers (ASPs)deliver software to users for a fee.

A)Platform as a service
B)Software as a service
C)Application-based platform service
D)Open source software service
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.