Deck 14: Emerging Trends, Technologies, and Applications
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/80
Play
Full screen (f)
Deck 14: Emerging Trends, Technologies, and Applications
1
__________is a model in which application service providers (ASPs) deliver software to users for a fee.
A) Platform as a service
B) Software as a service
C) Application-based platform service
D) Open source software service
E) Select
A) Platform as a service
B) Software as a service
C) Application-based platform service
D) Open source software service
E) Select
B
2
A _____ can be used to create and test prototypes, develop interfaces, and simulate factory layouts and assembly lines, without investing in physical equipment and layouts.
A) rapid prototyping machine
B) cave automatic virtual environment
C) radio frequency identification tag
D) quick response code
A) rapid prototyping machine
B) cave automatic virtual environment
C) radio frequency identification tag
D) quick response code
B
3
_____ is a cloud-computing risk that deals with the availability of external audits and security certifications.
A) Regulatory compliance
B) Investigative support
C) Data segregation
D) Long-term viability
A) Regulatory compliance
B) Investigative support
C) Data segregation
D) Long-term viability
A
4
Nanomaterials have been applied as coatings on eyewear for increased comfort.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
5
Augmented reality users are immersed in the virtual world while interacting with objects.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
6
Bluetooth has line-of-sight limitations.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
7
Active radio frequency identification (RFID) tags have internal power supply.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
8
In virtual environment (VR) terminology, the everyday physical world is referred to as a "micro environment."
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
9
People can enter other cave automatic virtual environments (CAVEs) in other locations, no matter how far away they are geographically.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
10
Utility computing is incompatible with the software as a service (SaaS) model.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
11
In an exocentric environment of virtual reality (VR), users can interact with objects.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
12
A radio frequency identification (RFID) tag provides a generic identification for a credit or debit card carrying the tag.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
13
Push technology can be effective for both business-to-consumer (B2C) and business-to-business (B2B) marketing.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
14
Pull technology is adequate for marketing certain products and services and for providing customized information.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
15
Unlike bar codes and other systems,__________devices do not have to be in contact with the scanner to be read.
A) MaxiCode
B) radio frequency identification
C) quick response code
D) Semacode
E) Select
A) MaxiCode
B) radio frequency identification
C) quick response code
D) Semacode
E) Select
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
16
In grid computing, each participant is referred to as a branch.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
17
Symbic Technologies offers cloud computing services to several data centers around the world. It provides servers, networking elements, and storage. Symbic Technologies owns the equipment and is in charge of housing, functioning, and maintaining it. In the context of cloud computing services, it is evident that Symbic Technologies provides _____.
A) infrastructure as a service
B) platform as a service
C) software as a service
D) backend as a service
A) infrastructure as a service
B) platform as a service
C) software as a service
D) backend as a service
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
18
Google AppEngine is an example of a private cloud service.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
19
Compared with Worldwide Interoperability for Microwave Access (WiMAX), Wireless Fidelity (Wi-Fi) theoretically has faster data transfer rates and a longer range.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
20
A quick response (QR) code offers a smaller storage capacity compared to standard universal product codes (UPC) barcodes.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
21
In a virtual reality (VR) environment, giving objects texture and shading for a three-dimensional (3D) appearance is known as _____.
A) interaction
B) simulation
C) transmission
D) immersion
A) interaction
B) simulation
C) transmission
D) immersion
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
22
A__________is the most commonly used device that enables users to navigate in the virtual reality (VR) environment and manually control various objects.
A) data glove
B) head-mounted display
C) virtual retinal display
D) smart card
E) Select
A) data glove
B) head-mounted display
C) virtual retinal display
D) smart card
E) Select
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
23
_____ incorporates many recent technologies under one platform, including the software as a service (SaaS) model, Web 2.0, grid computing, and utility computing.
A) A biometric system
B) Distributed computing
C) Cloud computing
D) A mainframe computer system
A) A biometric system
B) Distributed computing
C) Cloud computing
D) A mainframe computer system
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
24
Which of the following is true of a cave automatic virtual environment (CAVE)?
A) It consists of white modules arranged in a grid on a black background.
B) It is developed to make computers faster and smaller, with more memory.
C) It consists of a cube-shaped room in which the walls are rear-projection screens.
D) It is environment friendly and produces green energy systems.
A) It consists of white modules arranged in a grid on a black background.
B) It is developed to make computers faster and smaller, with more memory.
C) It consists of a cube-shaped room in which the walls are rear-projection screens.
D) It is environment friendly and produces green energy systems.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
25
In a virtual reality (VR) environment, enabling users to act on objects, such as using a data glove to pick up and move objects, is known as _____.
A) interaction
B) simulation
C) telepresence
D) immersion
A) interaction
B) simulation
C) telepresence
D) immersion
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
26
Worldwide Interoperability for Microwave Access (WiMAX) is designed for _____.
A) wireless wide area networks
B) personal area networks
C) local area networks
D) wireless metropolitan area networks
A) wireless wide area networks
B) personal area networks
C) local area networks
D) wireless metropolitan area networks
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
27
A _____ is a small electronic device consisting of a microchip and an antenna and performs the same task as bar codes.
A) global positioning system
B) bluetooth low energy device
C) quick response code
D) radio frequency identification tag
A) global positioning system
B) bluetooth low energy device
C) quick response code
D) radio frequency identification tag
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
28
In the context of virtual reality (VR) technology, _____ refers to giving users the sense that they are in another location, even one geographically far away, and can manipulate objects as though they are actually in that location.
A) immersion
B) inherence
C) telepresence
D) interaction
A) immersion
B) inherence
C) telepresence
D) interaction
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
29
To read a quick response (QR) code using a smartphone, one must have the _____ app.
A) visualizer
B) reader
C) decoder
D) scanner
A) visualizer
B) reader
C) decoder
D) scanner
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
30
In a technological conference, all the participating IT firms agreed to transfer the data pertaining to their human resources to a cloud. The objective behind this is to improve talent acquisition process and communication among HR professionals around the globe. The cloud referred to in this scenario is a _____ cloud.
A) public
B) private
C) hybrid
D) community
A) public
B) private
C) hybrid
D) community
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
31
Interruption from weather conditions is one of the major disadvantages of__________.
A) Wireless Fidelity
B) data mining
C) grid computing
D) Worldwide Interoperability for Microwave Access
E) Select
A) Wireless Fidelity
B) data mining
C) grid computing
D) Worldwide Interoperability for Microwave Access
E) Select
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
32
In the context of cloud computing, infrastructure as a service (IaaS) is also known as _____.
A) platform as a service
B) software as a service
C) hardware as a service
D) backend as a service
A) platform as a service
B) software as a service
C) hardware as a service
D) backend as a service
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
33
In the context of cloud computing, _____ automates the configuration, deployment, and ongoing management of applications in the cloud.
A) infrastructure as a service
B) software as a service
C) backend as a service
D) platform as a service
A) infrastructure as a service
B) software as a service
C) backend as a service
D) platform as a service
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
34
_____ clouds are more suitable for organizations that need scalability, do collaborative projects, and offer standard applications over the Web.
A) Private
B) Hybrid
C) Community
D) Public
A) Private
B) Hybrid
C) Community
D) Public
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
35
With__________, a user states a need before getting information, as when a uniform resource locator (URL) is entered in a Web browser so that the user can go to a certain Web site.
A) pull technology
B) data mining technology
C) push technology
D) virtual reality technology
E) Select
A) pull technology
B) data mining technology
C) push technology
D) virtual reality technology
E) Select
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
36
Saving data on the application service provider's (ASP's) servers instead of on users' own workstations might cause:
A) inconvenience for those who work in different locations.
B) the data to be exposed to theft by attackers.
C) the data to become immune to change.
D) problems related to the compatibility of the software versions.
A) inconvenience for those who work in different locations.
B) the data to be exposed to theft by attackers.
C) the data to become immune to change.
D) problems related to the compatibility of the software versions.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
37
__________provide access to software or services for a fee.
A) Web browsers
B) Business service providers
C) Web Sites
D) Application service providers
E) Select
A) Web browsers
B) Business service providers
C) Web Sites
D) Application service providers
E) Select
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
38
Wytes Pharmaceuticals wants to shift its list of inventory to a cloud so that its different branches can access it easily. The company needs a cloud computing option that would offer the highest cost savings and would require the least amount of involvement by IT managers. Which of the following cloud computing options would be the most suitable for Wytes Pharmaceuticals?
A) A private cloud
B) A public cloud
C) A hybrid cloud
D) A community cloud
A) A private cloud
B) A public cloud
C) A hybrid cloud
D) A community cloud
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
39
In the context of grid computing, each participant in a grid is referred to as a(n) _____.
A) element
B) node
C) pivot
D) iota
A) element
B) node
C) pivot
D) iota
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
40
In the context of virtual reality (VR),__________refers to allowing users to move around freely by combining interactive environments with cameras, monitors, and other devices.
A) full-body immersion
B) simulation
C) abstraction
D) networked communication
E) Select
A) full-body immersion
B) simulation
C) abstraction
D) networked communication
E) Select
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
41
With the _____, users do not need to be concerned with new software versions and compatibility problems because the application service providers (ASPs) offer the most recent version of the software.
A) software distribution model
B) software as a service model
C) radio frequency identification model
D) automatic virtual environment model
A) software distribution model
B) software as a service model
C) radio frequency identification model
D) automatic virtual environment model
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
42
In the context of virtual reality (VR) technology, the main technology used in an exocentric environment is _____.
A) quick response codes
B) grid computations
C) 3D graphics
D) nanotechnologies
A) quick response codes
B) grid computations
C) 3D graphics
D) nanotechnologies
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
43
Which of the following is an advantage of application service providers (ASPs)?
A) They offer software customized to users' needs.
B) They integrate a customer's other applications and systems easily.
C) They ensure that software is kept up to date, based on users' requests.
D) They ensure that applications fully meet an organization's needs.
A) They offer software customized to users' needs.
B) They integrate a customer's other applications and systems easily.
C) They ensure that software is kept up to date, based on users' requests.
D) They ensure that applications fully meet an organization's needs.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
44
In grid computing, when a large complex task is split into smaller tasks that run simultaneously on several nodes, it is known as__________.
A) serial processing
B) multi processing
C) parallel processing
D) event processing
E) Select
A) serial processing
B) multi processing
C) parallel processing
D) event processing
E) Select
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
45
Equi Technologies offers cloud computing services to several data centers around the world. It hosts services in the cloud, which can be accessed by clients through Equibrowse-a Web browser designed by Equi Technologies. In the context of cloud computing services, it is evident that Equi Technologies provides _____.
A) infrastructure as a service
B) platform as a service
C) software as a service
D) backend as a service
A) infrastructure as a service
B) platform as a service
C) software as a service
D) backend as a service
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
46
Platform as a service (PaaS) services are hosted in the cloud and accessed by clients through their _____.
A) data gloves
B) Web browsers
C) smart cards
D) Web avatars
A) data gloves
B) Web browsers
C) smart cards
D) Web avatars
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
47
Which of the following is a cloud-computing risk that deals with specific jurisdictions and commitment to local privacy?
A) Data location
B) Regulatory compliance
C) Privileged user access
D) Long-term viability
A) Data location
B) Regulatory compliance
C) Privileged user access
D) Long-term viability
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
48
Bluetooth can be used to create a _____ for communication among computerized devices.
A) personal area network
B) local area network
C) wide area network
D) metropolitan area network
A) personal area network
B) local area network
C) wide area network
D) metropolitan area network
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
49
_____ is a cloud-computing risk that deals with how a particular type of data is to be kept separate from other data in the cloud.
A) Data transmission
B) Data abstraction
C) Data location
D) Data segregation
A) Data transmission
B) Data abstraction
C) Data location
D) Data segregation
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
50
Which of the following is a problem associated with virtual reality (VR) systems?
A) VR systems cannot be of any assistance to the disabled.
B) VR systems cannot be used in educational games and simulation.
C) VR systems can cause confusion between the VR environment and the real environment.
D) VR systems can increase the cost of training airline pilots.
A) VR systems cannot be of any assistance to the disabled.
B) VR systems cannot be used in educational games and simulation.
C) VR systems can cause confusion between the VR environment and the real environment.
D) VR systems can increase the cost of training airline pilots.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
51
A(n) _____ is a simulated environment designed for users to interact via avatars.
A) real world
B) virtual world
C) artificial neural network
D) personal area network
A) real world
B) virtual world
C) artificial neural network
D) personal area network
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
52
__________is a broadband technology that is suitable for data transmission, typically in the range of 120 feet indoors and 300 feet outdoors.
A) Wireless Fidelity (Wi-Fi)
B) Worldwide Interoperability for Microwave Access
C) Code division multiple access
D) Enhanced Data rates for Global Evolution
E) Select
A) Wireless Fidelity (Wi-Fi)
B) Worldwide Interoperability for Microwave Access
C) Code division multiple access
D) Enhanced Data rates for Global Evolution
E) Select
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
53
Which of the following technologies could be used to prevent one coworker from checking in for another in an organization?
A) Biometrics
B) Mechatronics
C) Cybernetics
D) Bioinformatics
A) Biometrics
B) Mechatronics
C) Cybernetics
D) Bioinformatics
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
54
Which of the following is true of push technology?
A) It cannot provide customized information automatically.
B) It cannot update Web content in real time.
C) It streamlines the process of users getting software updates.
D) It requires users to state their needs before providing information.
A) It cannot provide customized information automatically.
B) It cannot update Web content in real time.
C) It streamlines the process of users getting software updates.
D) It requires users to state their needs before providing information.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
55
In a(n)__________, a user is given a "window view."
A) exocentric environment
B) egocentric environment
C) one-dimensional environment
D) two-dimensional environment
E) Select
A) exocentric environment
B) egocentric environment
C) one-dimensional environment
D) two-dimensional environment
E) Select
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
56
One of the major disadvantages of application service providers (ASPs) is that they:
A) are highly expensive and deliver information at a slow rate.
B) do not guarantee that applications will fully meet an organization's needs.
C) do not provide any level of technical support to an organization.
D) often fail to keep applications up to date despite users' requests.
A) are highly expensive and deliver information at a slow rate.
B) do not guarantee that applications will fully meet an organization's needs.
C) do not provide any level of technical support to an organization.
D) often fail to keep applications up to date despite users' requests.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
57
With__________, users can make use of other computers' resources within an organization to solve problems involving large-scale, complex calculations, such as circuit analysis or mechanical design-problems that a single computer is not capable of solving in a timely manner.
A) utility computing
B) cloud computing
C) mobile computing
D) grid computing
E) Select
A) utility computing
B) cloud computing
C) mobile computing
D) grid computing
E) Select
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
58
The _____ is capable of imaging atoms and incorporating nanomaterial layers into hard disk recording heads and magnetic disk coatings.
A) scanning tunneling microscope
B) head-mounted display
C) cave automatic virtual environment
D) heads-up display
A) scanning tunneling microscope
B) head-mounted display
C) cave automatic virtual environment
D) heads-up display
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
59
__________is the provision of IT services on demand.
A) Utility computing
B) Grid computing
C) Mobile computing
D) Portable computing
E) Select
A) Utility computing
B) Grid computing
C) Mobile computing
D) Portable computing
E) Select
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
60
In the context of virtual reality (VR), allowing users in different locations to interact and manipulate the same world at the same time by connecting two or more virtual worlds is known as _____.
A) full-body immersion
B) networked communication
C) simulation
D) interaction
A) full-body immersion
B) networked communication
C) simulation
D) interaction
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
61
In a(n)__________, a user is totally immersed in the virtual reality (VR) world.
A) exocentric environment
B) two-dimensional environment
C) one-dimensional environment
D) egocentric environment
E) Select
A) exocentric environment
B) two-dimensional environment
C) one-dimensional environment
D) egocentric environment
E) Select
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
62
Widget Corp. wants to shift its list of inventory to a cloud so that its different branches can access it easily. The company needs a cloud computing option that would provide high flexibility to add or drop resources. The cloud computing option should be cost-effective and should not expose mission-critical applications and data to the outside world. Which of the following cloud computing options would be most suitable for Widget Corp.?
A) A public cloud
B) A private cloud
C) A hybrid cloud
D) A community cloud
A) A public cloud
B) A private cloud
C) A hybrid cloud
D) A community cloud
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
63
In the context of networking, on-demand computing is also known as ____.
A) hybrid computing
B) grid computing
C) nano computing
D) utility computing
A) hybrid computing
B) grid computing
C) nano computing
D) utility computing
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
64
A _____ cloud allows an organization to take advantage of the scalability and cost-effectiveness that a public cloud computing environment offers without exposing mission-critical applications and data to the outside world.
A) hybrid
B) private
C) point
D) community
A) hybrid
B) private
C) point
D) community
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
65
A(n)__________is a 2D or 3D graphical representation of a person in the virtual world, used in chat rooms and online games.
A) entity
B) schema
C) avatar
D) relvar
E) Select
A) entity
B) schema
C) avatar
D) relvar
E) Select
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
66
Nanomaterials, if added to golf balls, increase the _____ of the golf balls.
A) frailty
B) brittleness
C) responsiveness
D) delicacy
A) frailty
B) brittleness
C) responsiveness
D) delicacy
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
67
Ziffcorp, an IT firm, uses a technology that automatically updates the antivirus software in all the computers in the firm whenever the software becomes outdated. It is evident that Ziffcorp uses _____ for automatically updating the antivirus software.
A) pull technology
B) artificial intelligence technology
C) push technology
D) data mining technology
A) pull technology
B) artificial intelligence technology
C) push technology
D) data mining technology
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
68
Which of the following is true of biometrics?
A) They form the basis of radio frequency identification.
B) They can enhance Web page security and reduce defacing.
C) They form a virtual world and enable users to enter using avatars.
D) They can scan quick response codes to identify various products.
A) They form the basis of radio frequency identification.
B) They can enhance Web page security and reduce defacing.
C) They form a virtual world and enable users to enter using avatars.
D) They can scan quick response codes to identify various products.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
69
With _____, a Web server delivers information to users, who have signed up for the service, instead of waiting for them to request the information be sent to them.
A) push technology
B) pull technology
C) virtual reality technology
D) radio frequency identification technology
A) push technology
B) pull technology
C) virtual reality technology
D) radio frequency identification technology
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
70
A(n) _____ is a matrix barcode consisting of black modules arranged in a square pattern on a white background.
A) universal product code
B) quick response code
C) MaxiCode
D) EZcode
A) universal product code
B) quick response code
C) MaxiCode
D) EZcode
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
71
_____ radio frequency identification (RFID) tags can be embedded in a sticker or under the human or animal skin.
A) Active
B) Passive
C) Open
D) Closed
A) Active
B) Passive
C) Open
D) Closed
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
72
GuardIN is an IT security firm. It deals with highly secure data for a wide variety of software and e-commerce agreements, trademark licenses, and patent licenses. GuardIN needs a cloud computing option that would allow it to purchase and maintain the software and infrastructure itself. The cloud also needs to be designed in such a way that all users of the organization can access it without any lag. Which of the following cloud computing options would be most suitable for GuardIN?
A) A public cloud
B) A community cloud
C) A hybrid cloud
D) A private cloud
A) A public cloud
B) A community cloud
C) A hybrid cloud
D) A private cloud
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
73
Push technology is also known as__________.
A) prototyping
B) grid computing
C) webcasting
D) utility computing
E) Select
A) prototyping
B) grid computing
C) webcasting
D) utility computing
E) Select
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
74
In the context of application software providers (ASPs), which of the following is also known as on-demand software?
A) Assembly software
B) Software as a service
C) Software as a product
D) Systems software
A) Assembly software
B) Software as a service
C) Software as a product
D) Systems software
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
75
_____ could be useful for authentication purposes in voting via the Internet.
A) Bluetooth
B) Radio frequency identification tags
C) Biometrics
D) Quick response codes
A) Bluetooth
B) Radio frequency identification tags
C) Biometrics
D) Quick response codes
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
76
_____ radio frequency identification (RFID) tags have no internal power supply.
A) Active
B) Passive
C) Transponder
D) Beacon
A) Active
B) Passive
C) Transponder
D) Beacon
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
77
Identify the component of a virtual reality (VR) system that generates and manipulates high-quality graphics.
A) The central coordinating processor and software system
B) Visual and aural systems
C) The manual control system
D) Radio frequency identification systems
A) The central coordinating processor and software system
B) Visual and aural systems
C) The manual control system
D) Radio frequency identification systems
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
78
Which of the following is true of community cloud computing?
A) The costs are spread over fewer users than with a public cloud.
B) The infrastructure can be owned by just one organization.
C) It offers higher security as compared to private clouds.
D) It exposes mission-critical applications and data to the outside world.
A) The costs are spread over fewer users than with a public cloud.
B) The infrastructure can be owned by just one organization.
C) It offers higher security as compared to private clouds.
D) It exposes mission-critical applications and data to the outside world.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
79
_____ uses computer-generated, three-dimensional images to create the illusion of interaction in a real-world environment.
A) Nanotechnology
B) Cloud computing
C) Virtual reality
D) Grid computing
A) Nanotechnology
B) Cloud computing
C) Virtual reality
D) Grid computing
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
80
In a _____ cloud, a participating organization purchases and maintains the software and infrastructure itself.
A) public
B) private
C) community
D) hybrid
A) public
B) private
C) community
D) hybrid
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck