Deck 14: Emerging Trends,Technologies,and Applications

Full screen (f)
exit full mode
Question
Push technology can be effective for both business-to-consumer (B2C)and business-to-business (B2B)marketing.
Use Space or
up arrow
down arrow
to flip the card.
Question
A radio frequency identification (RFID)tag provides a unique identification for a credit or debit card carrying the tag.
Question
With _____ technology,a Web server delivers information to users who have signed up for this service instead of waiting for them to request the information be sent to them.

A)push
B)pull
C)virtual reality
D)radio frequency identification
Question
In grid computing,each participant is referred to as a "branch."
Question
Pull technology is adequate for marketing certain products and services and for providing customized information.
Question
Compared with Worldwide Interoperability for Microwave Access (WiMAX),Wireless Fidelity (Wi-Fi)theoretically has faster data transfer rates and a longer range.
Question
Utility computing can work with the software as a service (SaaS)model.
Question
Google AppEngine is an example of private cloud service.
Question
Which technology streamlines the process of users getting software updates and updated content?

A)Pull technology
B)Push technology
C)Data mining technology
D)Artificial intelligence technology
Question
Bluetooth has line-of-sight limitations.
Question
Active radio frequency identification (RFID)tags have no internal power supply.
Question
Which of the following issues is faced by application service providers (ASPs)?

A)Portability issues
B)Flexibility issues
C)Compatibility issues
D)Privacy issues
Question
In virtual environment (VR)terminology,the everyday physical world is referred to as a "micro environment."
Question
A QR (quick response)code offers a smaller storage capacity compared to standard UPC barcodes.
Question
In an exocentric environment of virtual reality (VR),users can interact with objects.
Question
People can enter other cave automatic virtual environments (CAVEs)in other locations,no matter how far away they are geographically.
Question
Nanomaterials have been applied as coatings on eyewear for increased comfort.
Question
With the _____ model,users do not need to be concerned with new software versions and compatibility problems because the application service providers (ASPs)offer the most recent version of the software.

A)rapid application development
B)software as a service (SaaS)
C)radio frequency identification (RFID)
D)waterfall
Question
Network administrators use _____ technology to get antivirus updates to be automatically downloaded on employees' workstations.

A)pull
B)artificial intelligence
C)push
D)data mining
Question
Before virtual reality (VR)technology,even the best graphics programs used a two-dimensional environment to illustrate a three-dimensional object.
Question
Which of the following is an advantage of application service providers (ASPs)?

A)ASPs offer software customized to users' needs.
B)ASPs allow integration with a customer's other applications and systems easily.
C)ASPs ensure that software is kept up to date,based on users' requests.
D)ASPs ensure that applications fully meet an organization's needs.
Question
A _____ can be used to create and test prototypes,develop interfaces,and simulate factory layouts and assembly lines.

A)virtual reality modeling language (VRML)
B)cave automatic virtual environment (CAVE)
C)head-mounted display (HMD)
D)scanning tunneling microscope (STM)
Question
_____ uses computer-generated,three-dimensional images to create the illusion of interaction in a real-world environment.

A)Nanotechnology
B)Cloud computing
C)Virtual reality
D)Grid computing
Question
A _____ is a matrix barcode consisting of black modules arranged in a square pattern on a white background.

A)swift code
B)quick response code
C)color code
D)promo code
Question
In the context of virtual reality (VR)technology,the main technology used in an exocentric environment is _____.

A)QR (quick response)codes
B)grid computations
C)3D graphics
D)nanotechnologies
Question
A(n)_____ is a simulated environment designed for users to interact via avatars.

A)real world
B)virtual world
C)artificial neural network
D)personal area network
Question
One of the major disadvantages of an application service provider (ASP)is that _____.

A)it is highly expensive and delivers information at a slow rate
B)it does not guarantee that an application will fully meet an organization's needs
C)it does not provide any level of technical support to an organization
D)it often fails to keep an application up to date despite users' requests
Question
In the context of virtual reality (VR),_____ refers to the concept of allowing users in different locations to interact and manipulate the same world at the same time by connecting two or more virtual worlds.

A)full-body immersion
B)networked communication
C)simulation
D)interaction
Question
In the context of application software providers (ASPs),which of the following is also known as "on-demand software"?

A)On-premises software
B)Software as a service
C)Software as a product
D)Systems software
Question
One major obstacle to using virtual reality (VR)technology is that not enough _____ are currently available to carry out the data transmissions needed for a VR environment capable of re-creating a conference.

A)holographic devices
B)quick response codes
C)fiber-optic cables
D)cloud-computing services
Question
In the context of virtual reality (VR)technology,_____ refers to giving users the sense that they are in another location,even one geographically far away,and can manipulate objects as though they are actually in that location.

A)immersion
B)inherence
C)telepresence
D)interaction
Question
Which of the following technologies could be used to prevent one coworker from checking in for another in an organization?

A)Biometrics
B)Bluetooth
C)Cybernetics
D)Bioinformatics
Question
In order to read a QR (quick response)code using a smartphone,one must have the _____ app.

A)visualizer
B)reader
C)decoder
D)scanner
Question
Identify a component of a virtual reality (VR)system that generates and manipulates high-quality graphics.

A)Central coordinating processor and software system
B)Virtual system
C)Regulatory compliance system
D)Aural system
Question
_____ refers to giving objects in a virtual reality (VR)environment texture and shading for a three-dimensional (3D)appearance.

A)Interaction
B)Simulation
C)Transmission
D)Immersion
Question
_____ means enabling users to act on objects in a virtual reality (VR)environment,such as using a data glove to pick up and move objects.

A)Interaction
B)Simulation
C)Telepresence
D)Immersion
Question
_____ radio frequency identification (RFID)tags can be embedded in a sticker or under the human or animal skin.

A)Active
B)Passive
C)Open
D)Closed
Question
_____ radio frequency identification (RFID)tags have no internal power supply.

A)Active
B)Passive
C)Open
D)Closed
Question
Which of the following is true of a cave automatic virtual environment (CAVE)?

A)It consists of white modules arranged in a certain pattern on a black background.
B)It is developed to make computers faster and smaller,with more memory.
C)It consists of a cube-shaped room in which the walls are rear-projection screens.
D)It produces environmentally friendly energy systems.
Question
A _____ is a small electronic device consisting of a microchip and an antenna and performs the same task as bar codes.

A)nanomaterial
B)monitoring and surveillance agent
C)mirror disk
D)radio frequency identification tag
Question
Allocation of cost and responsibilities,governance,and the implementation of a tight security system are the major obstacles while using a _____ cloud computing option.

A)public
B)hybrid
C)community
D)private
Question
_____ automates the configuration,deployment,and ongoing management of applications in the cloud.

A)Infrastructure as a service (IaaS)
B)Software as a service (SaaS)
C)Backend as a service (BaaS)
D)Platform as a service (PaaS)
Question
According to the nomenclature of cloud computing,infrastructure as a service (IaaS)is also known as _____.

A)platform as a service (PaaS)
B)software as a service (SaaS)
C)hardware as a service (HaaS)
D)backend as a service (BaaS)
Question
Venus Technologies offer cloud computing services to several data centers throughout the world.They provide computer infrastructure such as servers,networking elements,and storage as a service.They own the equipment and are liable for housing,functioning,and maintaining it,as a part of the deal.Identify the type of cloud computing model Venus Technologies delivers as a service.

A)Infrastructure as a service (IaaS)
B)Platform as a service (PaaS)
C)Software as a service (SaaS)
D)Desktop as a service (DaaS)
Question
Platform as a service (PaaS)is hosted in the cloud and accessed by clients through their _____.

A)data gloves
B)Web browsers
C)smart cards
D)Web avatars
Question
_____ is a cloud-computing risk that deals with the availability of external audits and security certifications.

A)Regulatory compliance
B)Investigative support
C)Data segregation
D)Long-term viability
Question
_____ incorporates many recent technologies under one platform including the software as a service (SaaS)model and Web 2.0.

A)Forward chaining
B)Case-based reasoning
C)Cloud computing
D)Tunnel scanning
Question
_____ could be useful for authentication purposes in voting via the Internet.

A)Bluetooth
B)Radio frequency identification (RFID)tags
C)Biometrics
D)QR (quick response)codes
Question
In grid computing,if one node in the grid fails,another node can take over.This advantage of grid computing can be termed as _____.

A)parallel processing
B)improved reliability
C)investigative report
D)data segregation
Question
_____ clouds are more suitable for organizations that need scalability,do collaborative projects,and offer standard applications over the Web.

A)Private
B)Hybrid
C)Community
D)Public
Question
Worldwide Interoperability for Microwave Access (WiMAX)is designed for wireless _____.

A)wide area networks
B)personal area networks
C)local area networks
D)metropolitan area networks
Question
Which of the following is a cloud computing risk that deals with specific jurisdictions and commitments to local privacy?

A)Data location
B)Regulatory compliance
C)Privileged user access
D)Long-term viability
Question
In a _____ cloud,a participating organization purchases and maintains the software and infrastructure itself.

A)public
B)private
C)community
D)hybrid
Question
Cloud computing has many of the advantages and disadvantages of _____ computing.

A)hybrid
B)grid
C)distributed
D)utility
Question
_____ measures could add another layer of security to Web pages to guard against attacks and eliminate or reduce defacing.

A)Artificial intelligence
B)Biometric
C)Virtual reality
D)Nanotechnology
Question
Bluetooth can be used to create a _____,to communicate among computerized devices.

A)personal area network (PAN)
B)local area network (LAN)
C)wide area network (WAN)
D)metropolitan area network (MAN)
Question
Wytes Pharmaceuticals is in the process of shifting its list of inventory to the cloud for easier access among its different branches.The company is trying to find a cloud computing option that offers the highest cost saving among the lot and requires the least amount of involvement by IT managers.Which cloud computing option would be the most suitable for Wytes Pharmaceuticals?

A)Private cloud computing
B)Public cloud computing
C)Hybrid cloud computing
D)Community cloud computing
Question
A _____ cloud allows an organization to take advantage of the scalability and cost-effectiveness that a public cloud computing environment offers without exposing mission-critical applications and data to the outside world.

A)hybrid
B)private
C)point
D)community
Question
Which of the following is also known as on-demand computing?

A)Hybrid computing
B)Grid computing
C)Cloud computing
D)Utility computing
Question
GuardIT,a security company,works with other companies to obtain intellectual property and protect them.It deals with highly secure data for a wide variety of software and e-commerce agreements,trademark licenses,and patent licenses.It is looking for a cloud computing option that allows it to purchase and maintain the software and infrastructure itself.It also needs to be designed in such a way that all users of the organization can access it without any lag.Which cloud computing option would be most suitable for them?

A)Public cloud
B)Community cloud
C)Hybrid cloud
D)Private cloud
Question
With _____ computing,users can make use of other computers' resources to solve problems involving large-scale,complex calculations,such as circuit analysis or mechanical design-problems that a single computer is not capable of solving in a timely manner.

A)utility
B)cloud
C)mobile
D)grid​
Question
_____ is a cloud computing risk that deals with how a particular type of data is to be kept separate from other data in the cloud.

A)Data transmission
B)Data abstraction
C)Data location
D)Data segregation
Question
_________ provide access to software or services for a fee.

A)Web browsers
B)Business service providers (BSPs)
C)Web Sites
D)Application service providers (ASPs)
Question
_________ is a broadband technology that is suitable for data transmission,typically in the range of 120 feet indoors and 300 feet outdoors.

A)Wireless Fidelity (Wi-Fi)
B)Worldwide Interoperability for Microwave Access (WIMAX)
C)Code division multiple Access (CDMA)
D)Enhanced Data rates for Global Evolution (EDGE)​
Question
A(n)_________ is a 2D or 3D graphical representation of a person in the virtual world,used in chat rooms and online games.

A)entity
B)schema
C)avatar
D)relvar
Question
_________ computing is the provision of IT services on demand.

A)Utility
B)Grid
C)Mobile
D)Cloud
Question
In grid computing,when a large complex task is split into smaller tasks that run simultaneously on several nodes,it is known as _____ processing.

A)serial
B)multi
C)parallel
D)event
Question
With _________ technology,a user states a need before getting information,as when a uniform resource locator (URL)is entered in a Web browser so the user can go to a certain Web site.

A)pull
B)data mining
C)push
D)virtual reality​
Question
In the context of virtual reality (VR),_________ refers to allowing users to move around freely by combining interactive environments with cameras,monitors,and other devices.

A)full-body immersion
B)simulation
C)abstraction
D)networked communication
Question
Which of the following is used in clothing and footwear to cut down bacteria growth and improve stain resistance?

A)Nanomaterials
B)Nanofluids
C)Nanometers
D)Nanowires
Question
The _____ is capable of imaging atoms and incorporating nanomaterial layers into hard disk recording heads and magnetic disk coatings.

A)scanning tunneling microscope (STM)
B)head-mounted display (HMD)
C)cave automatic virtual environment (CAVE)
D)heads-up display (HUD)
Question
_____ have been added to sports gear,such as tennis and golf balls and tennis rackets,to make them more durable and improve their responsiveness.

A)Nanoframes
B)Nanoscales
C)Nanosensors
D)Nanomaterials
Question
A ________ is the most commonly used device for enabling users to navigate in the virtual reality (VR)environment and control various objects. a.data glove
B)head-mounted display (HMD)
C)virtual retinal display (VRD)
D)smart card
Question
In a(n)_________ environment,a user is totally immersed in the virtual reality (VR)world.

A)exocentric
B)two-dimensional
C)one-dimensional
D)egocentric
Question
_________ is a model in which application service providers (ASPs)deliver software to users for a fee.

A)Platform as a service (PaaS)
B)Software as a service (SaaS)
C)Infrastructure as a service (IaaS)
D)Backend as a service (BaaS)
Question
In a(n)_________ virtual reality (VR)environment,a user is given a "window view."

A)exocentric
B)egocentric
C)one-dimensional
D)two-dimensional
Question
Nanotechnology incorporates techniques that involve the structure and composition of materials on a _____.

A)nanoscale
B)nanometer
C)nanobyte
D)nanoframe
Question
Unlike bar codes and other systems,_________ devices do not have to be in contact with the scanner to be read.

A)monitoring and surveillance agent
B)radio frequency identification
C)rooted
D)virtual reality
Question
Another name for push technology is _________.

A)prototyping
B)grid computing
C)webcasting
D)utility computing
Question
Interruption from weather conditions is one of the major disadvantages of _________.

A)Wi-Fi
B)data mining
C)grid computing
D)WiMAX​
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/100
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 14: Emerging Trends,Technologies,and Applications
1
Push technology can be effective for both business-to-consumer (B2C)and business-to-business (B2B)marketing.
True
2
A radio frequency identification (RFID)tag provides a unique identification for a credit or debit card carrying the tag.
True
3
With _____ technology,a Web server delivers information to users who have signed up for this service instead of waiting for them to request the information be sent to them.

A)push
B)pull
C)virtual reality
D)radio frequency identification
A
4
In grid computing,each participant is referred to as a "branch."
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
5
Pull technology is adequate for marketing certain products and services and for providing customized information.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
6
Compared with Worldwide Interoperability for Microwave Access (WiMAX),Wireless Fidelity (Wi-Fi)theoretically has faster data transfer rates and a longer range.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
7
Utility computing can work with the software as a service (SaaS)model.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
8
Google AppEngine is an example of private cloud service.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
9
Which technology streamlines the process of users getting software updates and updated content?

A)Pull technology
B)Push technology
C)Data mining technology
D)Artificial intelligence technology
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
10
Bluetooth has line-of-sight limitations.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
11
Active radio frequency identification (RFID)tags have no internal power supply.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following issues is faced by application service providers (ASPs)?

A)Portability issues
B)Flexibility issues
C)Compatibility issues
D)Privacy issues
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
13
In virtual environment (VR)terminology,the everyday physical world is referred to as a "micro environment."
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
14
A QR (quick response)code offers a smaller storage capacity compared to standard UPC barcodes.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
15
In an exocentric environment of virtual reality (VR),users can interact with objects.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
16
People can enter other cave automatic virtual environments (CAVEs)in other locations,no matter how far away they are geographically.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
17
Nanomaterials have been applied as coatings on eyewear for increased comfort.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
18
With the _____ model,users do not need to be concerned with new software versions and compatibility problems because the application service providers (ASPs)offer the most recent version of the software.

A)rapid application development
B)software as a service (SaaS)
C)radio frequency identification (RFID)
D)waterfall
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
19
Network administrators use _____ technology to get antivirus updates to be automatically downloaded on employees' workstations.

A)pull
B)artificial intelligence
C)push
D)data mining
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
20
Before virtual reality (VR)technology,even the best graphics programs used a two-dimensional environment to illustrate a three-dimensional object.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following is an advantage of application service providers (ASPs)?

A)ASPs offer software customized to users' needs.
B)ASPs allow integration with a customer's other applications and systems easily.
C)ASPs ensure that software is kept up to date,based on users' requests.
D)ASPs ensure that applications fully meet an organization's needs.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
22
A _____ can be used to create and test prototypes,develop interfaces,and simulate factory layouts and assembly lines.

A)virtual reality modeling language (VRML)
B)cave automatic virtual environment (CAVE)
C)head-mounted display (HMD)
D)scanning tunneling microscope (STM)
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
23
_____ uses computer-generated,three-dimensional images to create the illusion of interaction in a real-world environment.

A)Nanotechnology
B)Cloud computing
C)Virtual reality
D)Grid computing
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
24
A _____ is a matrix barcode consisting of black modules arranged in a square pattern on a white background.

A)swift code
B)quick response code
C)color code
D)promo code
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
25
In the context of virtual reality (VR)technology,the main technology used in an exocentric environment is _____.

A)QR (quick response)codes
B)grid computations
C)3D graphics
D)nanotechnologies
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
26
A(n)_____ is a simulated environment designed for users to interact via avatars.

A)real world
B)virtual world
C)artificial neural network
D)personal area network
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
27
One of the major disadvantages of an application service provider (ASP)is that _____.

A)it is highly expensive and delivers information at a slow rate
B)it does not guarantee that an application will fully meet an organization's needs
C)it does not provide any level of technical support to an organization
D)it often fails to keep an application up to date despite users' requests
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
28
In the context of virtual reality (VR),_____ refers to the concept of allowing users in different locations to interact and manipulate the same world at the same time by connecting two or more virtual worlds.

A)full-body immersion
B)networked communication
C)simulation
D)interaction
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
29
In the context of application software providers (ASPs),which of the following is also known as "on-demand software"?

A)On-premises software
B)Software as a service
C)Software as a product
D)Systems software
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
30
One major obstacle to using virtual reality (VR)technology is that not enough _____ are currently available to carry out the data transmissions needed for a VR environment capable of re-creating a conference.

A)holographic devices
B)quick response codes
C)fiber-optic cables
D)cloud-computing services
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
31
In the context of virtual reality (VR)technology,_____ refers to giving users the sense that they are in another location,even one geographically far away,and can manipulate objects as though they are actually in that location.

A)immersion
B)inherence
C)telepresence
D)interaction
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
32
Which of the following technologies could be used to prevent one coworker from checking in for another in an organization?

A)Biometrics
B)Bluetooth
C)Cybernetics
D)Bioinformatics
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
33
In order to read a QR (quick response)code using a smartphone,one must have the _____ app.

A)visualizer
B)reader
C)decoder
D)scanner
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
34
Identify a component of a virtual reality (VR)system that generates and manipulates high-quality graphics.

A)Central coordinating processor and software system
B)Virtual system
C)Regulatory compliance system
D)Aural system
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
35
_____ refers to giving objects in a virtual reality (VR)environment texture and shading for a three-dimensional (3D)appearance.

A)Interaction
B)Simulation
C)Transmission
D)Immersion
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
36
_____ means enabling users to act on objects in a virtual reality (VR)environment,such as using a data glove to pick up and move objects.

A)Interaction
B)Simulation
C)Telepresence
D)Immersion
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
37
_____ radio frequency identification (RFID)tags can be embedded in a sticker or under the human or animal skin.

A)Active
B)Passive
C)Open
D)Closed
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
38
_____ radio frequency identification (RFID)tags have no internal power supply.

A)Active
B)Passive
C)Open
D)Closed
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
39
Which of the following is true of a cave automatic virtual environment (CAVE)?

A)It consists of white modules arranged in a certain pattern on a black background.
B)It is developed to make computers faster and smaller,with more memory.
C)It consists of a cube-shaped room in which the walls are rear-projection screens.
D)It produces environmentally friendly energy systems.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
40
A _____ is a small electronic device consisting of a microchip and an antenna and performs the same task as bar codes.

A)nanomaterial
B)monitoring and surveillance agent
C)mirror disk
D)radio frequency identification tag
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
41
Allocation of cost and responsibilities,governance,and the implementation of a tight security system are the major obstacles while using a _____ cloud computing option.

A)public
B)hybrid
C)community
D)private
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
42
_____ automates the configuration,deployment,and ongoing management of applications in the cloud.

A)Infrastructure as a service (IaaS)
B)Software as a service (SaaS)
C)Backend as a service (BaaS)
D)Platform as a service (PaaS)
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
43
According to the nomenclature of cloud computing,infrastructure as a service (IaaS)is also known as _____.

A)platform as a service (PaaS)
B)software as a service (SaaS)
C)hardware as a service (HaaS)
D)backend as a service (BaaS)
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
44
Venus Technologies offer cloud computing services to several data centers throughout the world.They provide computer infrastructure such as servers,networking elements,and storage as a service.They own the equipment and are liable for housing,functioning,and maintaining it,as a part of the deal.Identify the type of cloud computing model Venus Technologies delivers as a service.

A)Infrastructure as a service (IaaS)
B)Platform as a service (PaaS)
C)Software as a service (SaaS)
D)Desktop as a service (DaaS)
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
45
Platform as a service (PaaS)is hosted in the cloud and accessed by clients through their _____.

A)data gloves
B)Web browsers
C)smart cards
D)Web avatars
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
46
_____ is a cloud-computing risk that deals with the availability of external audits and security certifications.

A)Regulatory compliance
B)Investigative support
C)Data segregation
D)Long-term viability
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
47
_____ incorporates many recent technologies under one platform including the software as a service (SaaS)model and Web 2.0.

A)Forward chaining
B)Case-based reasoning
C)Cloud computing
D)Tunnel scanning
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
48
_____ could be useful for authentication purposes in voting via the Internet.

A)Bluetooth
B)Radio frequency identification (RFID)tags
C)Biometrics
D)QR (quick response)codes
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
49
In grid computing,if one node in the grid fails,another node can take over.This advantage of grid computing can be termed as _____.

A)parallel processing
B)improved reliability
C)investigative report
D)data segregation
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
50
_____ clouds are more suitable for organizations that need scalability,do collaborative projects,and offer standard applications over the Web.

A)Private
B)Hybrid
C)Community
D)Public
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
51
Worldwide Interoperability for Microwave Access (WiMAX)is designed for wireless _____.

A)wide area networks
B)personal area networks
C)local area networks
D)metropolitan area networks
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
52
Which of the following is a cloud computing risk that deals with specific jurisdictions and commitments to local privacy?

A)Data location
B)Regulatory compliance
C)Privileged user access
D)Long-term viability
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
53
In a _____ cloud,a participating organization purchases and maintains the software and infrastructure itself.

A)public
B)private
C)community
D)hybrid
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
54
Cloud computing has many of the advantages and disadvantages of _____ computing.

A)hybrid
B)grid
C)distributed
D)utility
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
55
_____ measures could add another layer of security to Web pages to guard against attacks and eliminate or reduce defacing.

A)Artificial intelligence
B)Biometric
C)Virtual reality
D)Nanotechnology
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
56
Bluetooth can be used to create a _____,to communicate among computerized devices.

A)personal area network (PAN)
B)local area network (LAN)
C)wide area network (WAN)
D)metropolitan area network (MAN)
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
57
Wytes Pharmaceuticals is in the process of shifting its list of inventory to the cloud for easier access among its different branches.The company is trying to find a cloud computing option that offers the highest cost saving among the lot and requires the least amount of involvement by IT managers.Which cloud computing option would be the most suitable for Wytes Pharmaceuticals?

A)Private cloud computing
B)Public cloud computing
C)Hybrid cloud computing
D)Community cloud computing
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
58
A _____ cloud allows an organization to take advantage of the scalability and cost-effectiveness that a public cloud computing environment offers without exposing mission-critical applications and data to the outside world.

A)hybrid
B)private
C)point
D)community
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
59
Which of the following is also known as on-demand computing?

A)Hybrid computing
B)Grid computing
C)Cloud computing
D)Utility computing
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
60
GuardIT,a security company,works with other companies to obtain intellectual property and protect them.It deals with highly secure data for a wide variety of software and e-commerce agreements,trademark licenses,and patent licenses.It is looking for a cloud computing option that allows it to purchase and maintain the software and infrastructure itself.It also needs to be designed in such a way that all users of the organization can access it without any lag.Which cloud computing option would be most suitable for them?

A)Public cloud
B)Community cloud
C)Hybrid cloud
D)Private cloud
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
61
With _____ computing,users can make use of other computers' resources to solve problems involving large-scale,complex calculations,such as circuit analysis or mechanical design-problems that a single computer is not capable of solving in a timely manner.

A)utility
B)cloud
C)mobile
D)grid​
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
62
_____ is a cloud computing risk that deals with how a particular type of data is to be kept separate from other data in the cloud.

A)Data transmission
B)Data abstraction
C)Data location
D)Data segregation
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
63
_________ provide access to software or services for a fee.

A)Web browsers
B)Business service providers (BSPs)
C)Web Sites
D)Application service providers (ASPs)
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
64
_________ is a broadband technology that is suitable for data transmission,typically in the range of 120 feet indoors and 300 feet outdoors.

A)Wireless Fidelity (Wi-Fi)
B)Worldwide Interoperability for Microwave Access (WIMAX)
C)Code division multiple Access (CDMA)
D)Enhanced Data rates for Global Evolution (EDGE)​
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
65
A(n)_________ is a 2D or 3D graphical representation of a person in the virtual world,used in chat rooms and online games.

A)entity
B)schema
C)avatar
D)relvar
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
66
_________ computing is the provision of IT services on demand.

A)Utility
B)Grid
C)Mobile
D)Cloud
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
67
In grid computing,when a large complex task is split into smaller tasks that run simultaneously on several nodes,it is known as _____ processing.

A)serial
B)multi
C)parallel
D)event
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
68
With _________ technology,a user states a need before getting information,as when a uniform resource locator (URL)is entered in a Web browser so the user can go to a certain Web site.

A)pull
B)data mining
C)push
D)virtual reality​
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
69
In the context of virtual reality (VR),_________ refers to allowing users to move around freely by combining interactive environments with cameras,monitors,and other devices.

A)full-body immersion
B)simulation
C)abstraction
D)networked communication
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
70
Which of the following is used in clothing and footwear to cut down bacteria growth and improve stain resistance?

A)Nanomaterials
B)Nanofluids
C)Nanometers
D)Nanowires
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
71
The _____ is capable of imaging atoms and incorporating nanomaterial layers into hard disk recording heads and magnetic disk coatings.

A)scanning tunneling microscope (STM)
B)head-mounted display (HMD)
C)cave automatic virtual environment (CAVE)
D)heads-up display (HUD)
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
72
_____ have been added to sports gear,such as tennis and golf balls and tennis rackets,to make them more durable and improve their responsiveness.

A)Nanoframes
B)Nanoscales
C)Nanosensors
D)Nanomaterials
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
73
A ________ is the most commonly used device for enabling users to navigate in the virtual reality (VR)environment and control various objects. a.data glove
B)head-mounted display (HMD)
C)virtual retinal display (VRD)
D)smart card
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
74
In a(n)_________ environment,a user is totally immersed in the virtual reality (VR)world.

A)exocentric
B)two-dimensional
C)one-dimensional
D)egocentric
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
75
_________ is a model in which application service providers (ASPs)deliver software to users for a fee.

A)Platform as a service (PaaS)
B)Software as a service (SaaS)
C)Infrastructure as a service (IaaS)
D)Backend as a service (BaaS)
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
76
In a(n)_________ virtual reality (VR)environment,a user is given a "window view."

A)exocentric
B)egocentric
C)one-dimensional
D)two-dimensional
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
77
Nanotechnology incorporates techniques that involve the structure and composition of materials on a _____.

A)nanoscale
B)nanometer
C)nanobyte
D)nanoframe
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
78
Unlike bar codes and other systems,_________ devices do not have to be in contact with the scanner to be read.

A)monitoring and surveillance agent
B)radio frequency identification
C)rooted
D)virtual reality
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
79
Another name for push technology is _________.

A)prototyping
B)grid computing
C)webcasting
D)utility computing
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
80
Interruption from weather conditions is one of the major disadvantages of _________.

A)Wi-Fi
B)data mining
C)grid computing
D)WiMAX​
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 100 flashcards in this deck.