Deck 14: Emerging Trends,Technologies,and Applications
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/100
Play
Full screen (f)
Deck 14: Emerging Trends,Technologies,and Applications
1
Push technology can be effective for both business-to-consumer (B2C)and business-to-business (B2B)marketing.
True
2
A radio frequency identification (RFID)tag provides a unique identification for a credit or debit card carrying the tag.
True
3
With _____ technology,a Web server delivers information to users who have signed up for this service instead of waiting for them to request the information be sent to them.
A)push
B)pull
C)virtual reality
D)radio frequency identification
A)push
B)pull
C)virtual reality
D)radio frequency identification
A
4
In grid computing,each participant is referred to as a "branch."
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
5
Pull technology is adequate for marketing certain products and services and for providing customized information.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
6
Compared with Worldwide Interoperability for Microwave Access (WiMAX),Wireless Fidelity (Wi-Fi)theoretically has faster data transfer rates and a longer range.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
7
Utility computing can work with the software as a service (SaaS)model.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
8
Google AppEngine is an example of private cloud service.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
9
Which technology streamlines the process of users getting software updates and updated content?
A)Pull technology
B)Push technology
C)Data mining technology
D)Artificial intelligence technology
A)Pull technology
B)Push technology
C)Data mining technology
D)Artificial intelligence technology
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
10
Bluetooth has line-of-sight limitations.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
11
Active radio frequency identification (RFID)tags have no internal power supply.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following issues is faced by application service providers (ASPs)?
A)Portability issues
B)Flexibility issues
C)Compatibility issues
D)Privacy issues
A)Portability issues
B)Flexibility issues
C)Compatibility issues
D)Privacy issues
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
13
In virtual environment (VR)terminology,the everyday physical world is referred to as a "micro environment."
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
14
A QR (quick response)code offers a smaller storage capacity compared to standard UPC barcodes.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
15
In an exocentric environment of virtual reality (VR),users can interact with objects.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
16
People can enter other cave automatic virtual environments (CAVEs)in other locations,no matter how far away they are geographically.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
17
Nanomaterials have been applied as coatings on eyewear for increased comfort.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
18
With the _____ model,users do not need to be concerned with new software versions and compatibility problems because the application service providers (ASPs)offer the most recent version of the software.
A)rapid application development
B)software as a service (SaaS)
C)radio frequency identification (RFID)
D)waterfall
A)rapid application development
B)software as a service (SaaS)
C)radio frequency identification (RFID)
D)waterfall
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
19
Network administrators use _____ technology to get antivirus updates to be automatically downloaded on employees' workstations.
A)pull
B)artificial intelligence
C)push
D)data mining
A)pull
B)artificial intelligence
C)push
D)data mining
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
20
Before virtual reality (VR)technology,even the best graphics programs used a two-dimensional environment to illustrate a three-dimensional object.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following is an advantage of application service providers (ASPs)?
A)ASPs offer software customized to users' needs.
B)ASPs allow integration with a customer's other applications and systems easily.
C)ASPs ensure that software is kept up to date,based on users' requests.
D)ASPs ensure that applications fully meet an organization's needs.
A)ASPs offer software customized to users' needs.
B)ASPs allow integration with a customer's other applications and systems easily.
C)ASPs ensure that software is kept up to date,based on users' requests.
D)ASPs ensure that applications fully meet an organization's needs.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
22
A _____ can be used to create and test prototypes,develop interfaces,and simulate factory layouts and assembly lines.
A)virtual reality modeling language (VRML)
B)cave automatic virtual environment (CAVE)
C)head-mounted display (HMD)
D)scanning tunneling microscope (STM)
A)virtual reality modeling language (VRML)
B)cave automatic virtual environment (CAVE)
C)head-mounted display (HMD)
D)scanning tunneling microscope (STM)
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
23
_____ uses computer-generated,three-dimensional images to create the illusion of interaction in a real-world environment.
A)Nanotechnology
B)Cloud computing
C)Virtual reality
D)Grid computing
A)Nanotechnology
B)Cloud computing
C)Virtual reality
D)Grid computing
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
24
A _____ is a matrix barcode consisting of black modules arranged in a square pattern on a white background.
A)swift code
B)quick response code
C)color code
D)promo code
A)swift code
B)quick response code
C)color code
D)promo code
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
25
In the context of virtual reality (VR)technology,the main technology used in an exocentric environment is _____.
A)QR (quick response)codes
B)grid computations
C)3D graphics
D)nanotechnologies
A)QR (quick response)codes
B)grid computations
C)3D graphics
D)nanotechnologies
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
26
A(n)_____ is a simulated environment designed for users to interact via avatars.
A)real world
B)virtual world
C)artificial neural network
D)personal area network
A)real world
B)virtual world
C)artificial neural network
D)personal area network
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
27
One of the major disadvantages of an application service provider (ASP)is that _____.
A)it is highly expensive and delivers information at a slow rate
B)it does not guarantee that an application will fully meet an organization's needs
C)it does not provide any level of technical support to an organization
D)it often fails to keep an application up to date despite users' requests
A)it is highly expensive and delivers information at a slow rate
B)it does not guarantee that an application will fully meet an organization's needs
C)it does not provide any level of technical support to an organization
D)it often fails to keep an application up to date despite users' requests
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
28
In the context of virtual reality (VR),_____ refers to the concept of allowing users in different locations to interact and manipulate the same world at the same time by connecting two or more virtual worlds.
A)full-body immersion
B)networked communication
C)simulation
D)interaction
A)full-body immersion
B)networked communication
C)simulation
D)interaction
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
29
In the context of application software providers (ASPs),which of the following is also known as "on-demand software"?
A)On-premises software
B)Software as a service
C)Software as a product
D)Systems software
A)On-premises software
B)Software as a service
C)Software as a product
D)Systems software
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
30
One major obstacle to using virtual reality (VR)technology is that not enough _____ are currently available to carry out the data transmissions needed for a VR environment capable of re-creating a conference.
A)holographic devices
B)quick response codes
C)fiber-optic cables
D)cloud-computing services
A)holographic devices
B)quick response codes
C)fiber-optic cables
D)cloud-computing services
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
31
In the context of virtual reality (VR)technology,_____ refers to giving users the sense that they are in another location,even one geographically far away,and can manipulate objects as though they are actually in that location.
A)immersion
B)inherence
C)telepresence
D)interaction
A)immersion
B)inherence
C)telepresence
D)interaction
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
32
Which of the following technologies could be used to prevent one coworker from checking in for another in an organization?
A)Biometrics
B)Bluetooth
C)Cybernetics
D)Bioinformatics
A)Biometrics
B)Bluetooth
C)Cybernetics
D)Bioinformatics
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
33
In order to read a QR (quick response)code using a smartphone,one must have the _____ app.
A)visualizer
B)reader
C)decoder
D)scanner
A)visualizer
B)reader
C)decoder
D)scanner
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
34
Identify a component of a virtual reality (VR)system that generates and manipulates high-quality graphics.
A)Central coordinating processor and software system
B)Virtual system
C)Regulatory compliance system
D)Aural system
A)Central coordinating processor and software system
B)Virtual system
C)Regulatory compliance system
D)Aural system
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
35
_____ refers to giving objects in a virtual reality (VR)environment texture and shading for a three-dimensional (3D)appearance.
A)Interaction
B)Simulation
C)Transmission
D)Immersion
A)Interaction
B)Simulation
C)Transmission
D)Immersion
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
36
_____ means enabling users to act on objects in a virtual reality (VR)environment,such as using a data glove to pick up and move objects.
A)Interaction
B)Simulation
C)Telepresence
D)Immersion
A)Interaction
B)Simulation
C)Telepresence
D)Immersion
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
37
_____ radio frequency identification (RFID)tags can be embedded in a sticker or under the human or animal skin.
A)Active
B)Passive
C)Open
D)Closed
A)Active
B)Passive
C)Open
D)Closed
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
38
_____ radio frequency identification (RFID)tags have no internal power supply.
A)Active
B)Passive
C)Open
D)Closed
A)Active
B)Passive
C)Open
D)Closed
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
39
Which of the following is true of a cave automatic virtual environment (CAVE)?
A)It consists of white modules arranged in a certain pattern on a black background.
B)It is developed to make computers faster and smaller,with more memory.
C)It consists of a cube-shaped room in which the walls are rear-projection screens.
D)It produces environmentally friendly energy systems.
A)It consists of white modules arranged in a certain pattern on a black background.
B)It is developed to make computers faster and smaller,with more memory.
C)It consists of a cube-shaped room in which the walls are rear-projection screens.
D)It produces environmentally friendly energy systems.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
40
A _____ is a small electronic device consisting of a microchip and an antenna and performs the same task as bar codes.
A)nanomaterial
B)monitoring and surveillance agent
C)mirror disk
D)radio frequency identification tag
A)nanomaterial
B)monitoring and surveillance agent
C)mirror disk
D)radio frequency identification tag
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
41
Allocation of cost and responsibilities,governance,and the implementation of a tight security system are the major obstacles while using a _____ cloud computing option.
A)public
B)hybrid
C)community
D)private
A)public
B)hybrid
C)community
D)private
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
42
_____ automates the configuration,deployment,and ongoing management of applications in the cloud.
A)Infrastructure as a service (IaaS)
B)Software as a service (SaaS)
C)Backend as a service (BaaS)
D)Platform as a service (PaaS)
A)Infrastructure as a service (IaaS)
B)Software as a service (SaaS)
C)Backend as a service (BaaS)
D)Platform as a service (PaaS)
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
43
According to the nomenclature of cloud computing,infrastructure as a service (IaaS)is also known as _____.
A)platform as a service (PaaS)
B)software as a service (SaaS)
C)hardware as a service (HaaS)
D)backend as a service (BaaS)
A)platform as a service (PaaS)
B)software as a service (SaaS)
C)hardware as a service (HaaS)
D)backend as a service (BaaS)
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
44
Venus Technologies offer cloud computing services to several data centers throughout the world.They provide computer infrastructure such as servers,networking elements,and storage as a service.They own the equipment and are liable for housing,functioning,and maintaining it,as a part of the deal.Identify the type of cloud computing model Venus Technologies delivers as a service.
A)Infrastructure as a service (IaaS)
B)Platform as a service (PaaS)
C)Software as a service (SaaS)
D)Desktop as a service (DaaS)
A)Infrastructure as a service (IaaS)
B)Platform as a service (PaaS)
C)Software as a service (SaaS)
D)Desktop as a service (DaaS)
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
45
Platform as a service (PaaS)is hosted in the cloud and accessed by clients through their _____.
A)data gloves
B)Web browsers
C)smart cards
D)Web avatars
A)data gloves
B)Web browsers
C)smart cards
D)Web avatars
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
46
_____ is a cloud-computing risk that deals with the availability of external audits and security certifications.
A)Regulatory compliance
B)Investigative support
C)Data segregation
D)Long-term viability
A)Regulatory compliance
B)Investigative support
C)Data segregation
D)Long-term viability
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
47
_____ incorporates many recent technologies under one platform including the software as a service (SaaS)model and Web 2.0.
A)Forward chaining
B)Case-based reasoning
C)Cloud computing
D)Tunnel scanning
A)Forward chaining
B)Case-based reasoning
C)Cloud computing
D)Tunnel scanning
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
48
_____ could be useful for authentication purposes in voting via the Internet.
A)Bluetooth
B)Radio frequency identification (RFID)tags
C)Biometrics
D)QR (quick response)codes
A)Bluetooth
B)Radio frequency identification (RFID)tags
C)Biometrics
D)QR (quick response)codes
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
49
In grid computing,if one node in the grid fails,another node can take over.This advantage of grid computing can be termed as _____.
A)parallel processing
B)improved reliability
C)investigative report
D)data segregation
A)parallel processing
B)improved reliability
C)investigative report
D)data segregation
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
50
_____ clouds are more suitable for organizations that need scalability,do collaborative projects,and offer standard applications over the Web.
A)Private
B)Hybrid
C)Community
D)Public
A)Private
B)Hybrid
C)Community
D)Public
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
51
Worldwide Interoperability for Microwave Access (WiMAX)is designed for wireless _____.
A)wide area networks
B)personal area networks
C)local area networks
D)metropolitan area networks
A)wide area networks
B)personal area networks
C)local area networks
D)metropolitan area networks
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
52
Which of the following is a cloud computing risk that deals with specific jurisdictions and commitments to local privacy?
A)Data location
B)Regulatory compliance
C)Privileged user access
D)Long-term viability
A)Data location
B)Regulatory compliance
C)Privileged user access
D)Long-term viability
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
53
In a _____ cloud,a participating organization purchases and maintains the software and infrastructure itself.
A)public
B)private
C)community
D)hybrid
A)public
B)private
C)community
D)hybrid
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
54
Cloud computing has many of the advantages and disadvantages of _____ computing.
A)hybrid
B)grid
C)distributed
D)utility
A)hybrid
B)grid
C)distributed
D)utility
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
55
_____ measures could add another layer of security to Web pages to guard against attacks and eliminate or reduce defacing.
A)Artificial intelligence
B)Biometric
C)Virtual reality
D)Nanotechnology
A)Artificial intelligence
B)Biometric
C)Virtual reality
D)Nanotechnology
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
56
Bluetooth can be used to create a _____,to communicate among computerized devices.
A)personal area network (PAN)
B)local area network (LAN)
C)wide area network (WAN)
D)metropolitan area network (MAN)
A)personal area network (PAN)
B)local area network (LAN)
C)wide area network (WAN)
D)metropolitan area network (MAN)
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
57
Wytes Pharmaceuticals is in the process of shifting its list of inventory to the cloud for easier access among its different branches.The company is trying to find a cloud computing option that offers the highest cost saving among the lot and requires the least amount of involvement by IT managers.Which cloud computing option would be the most suitable for Wytes Pharmaceuticals?
A)Private cloud computing
B)Public cloud computing
C)Hybrid cloud computing
D)Community cloud computing
A)Private cloud computing
B)Public cloud computing
C)Hybrid cloud computing
D)Community cloud computing
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
58
A _____ cloud allows an organization to take advantage of the scalability and cost-effectiveness that a public cloud computing environment offers without exposing mission-critical applications and data to the outside world.
A)hybrid
B)private
C)point
D)community
A)hybrid
B)private
C)point
D)community
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
59
Which of the following is also known as on-demand computing?
A)Hybrid computing
B)Grid computing
C)Cloud computing
D)Utility computing
A)Hybrid computing
B)Grid computing
C)Cloud computing
D)Utility computing
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
60
GuardIT,a security company,works with other companies to obtain intellectual property and protect them.It deals with highly secure data for a wide variety of software and e-commerce agreements,trademark licenses,and patent licenses.It is looking for a cloud computing option that allows it to purchase and maintain the software and infrastructure itself.It also needs to be designed in such a way that all users of the organization can access it without any lag.Which cloud computing option would be most suitable for them?
A)Public cloud
B)Community cloud
C)Hybrid cloud
D)Private cloud
A)Public cloud
B)Community cloud
C)Hybrid cloud
D)Private cloud
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
61
With _____ computing,users can make use of other computers' resources to solve problems involving large-scale,complex calculations,such as circuit analysis or mechanical design-problems that a single computer is not capable of solving in a timely manner.
A)utility
B)cloud
C)mobile
D)grid
A)utility
B)cloud
C)mobile
D)grid
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
62
_____ is a cloud computing risk that deals with how a particular type of data is to be kept separate from other data in the cloud.
A)Data transmission
B)Data abstraction
C)Data location
D)Data segregation
A)Data transmission
B)Data abstraction
C)Data location
D)Data segregation
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
63
_________ provide access to software or services for a fee.
A)Web browsers
B)Business service providers (BSPs)
C)Web Sites
D)Application service providers (ASPs)
A)Web browsers
B)Business service providers (BSPs)
C)Web Sites
D)Application service providers (ASPs)
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
64
_________ is a broadband technology that is suitable for data transmission,typically in the range of 120 feet indoors and 300 feet outdoors.
A)Wireless Fidelity (Wi-Fi)
B)Worldwide Interoperability for Microwave Access (WIMAX)
C)Code division multiple Access (CDMA)
D)Enhanced Data rates for Global Evolution (EDGE)
A)Wireless Fidelity (Wi-Fi)
B)Worldwide Interoperability for Microwave Access (WIMAX)
C)Code division multiple Access (CDMA)
D)Enhanced Data rates for Global Evolution (EDGE)
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
65
A(n)_________ is a 2D or 3D graphical representation of a person in the virtual world,used in chat rooms and online games.
A)entity
B)schema
C)avatar
D)relvar
A)entity
B)schema
C)avatar
D)relvar
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
66
_________ computing is the provision of IT services on demand.
A)Utility
B)Grid
C)Mobile
D)Cloud
A)Utility
B)Grid
C)Mobile
D)Cloud
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
67
In grid computing,when a large complex task is split into smaller tasks that run simultaneously on several nodes,it is known as _____ processing.
A)serial
B)multi
C)parallel
D)event
A)serial
B)multi
C)parallel
D)event
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
68
With _________ technology,a user states a need before getting information,as when a uniform resource locator (URL)is entered in a Web browser so the user can go to a certain Web site.
A)pull
B)data mining
C)push
D)virtual reality
A)pull
B)data mining
C)push
D)virtual reality
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
69
In the context of virtual reality (VR),_________ refers to allowing users to move around freely by combining interactive environments with cameras,monitors,and other devices.
A)full-body immersion
B)simulation
C)abstraction
D)networked communication
A)full-body immersion
B)simulation
C)abstraction
D)networked communication
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
70
Which of the following is used in clothing and footwear to cut down bacteria growth and improve stain resistance?
A)Nanomaterials
B)Nanofluids
C)Nanometers
D)Nanowires
A)Nanomaterials
B)Nanofluids
C)Nanometers
D)Nanowires
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
71
The _____ is capable of imaging atoms and incorporating nanomaterial layers into hard disk recording heads and magnetic disk coatings.
A)scanning tunneling microscope (STM)
B)head-mounted display (HMD)
C)cave automatic virtual environment (CAVE)
D)heads-up display (HUD)
A)scanning tunneling microscope (STM)
B)head-mounted display (HMD)
C)cave automatic virtual environment (CAVE)
D)heads-up display (HUD)
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
72
_____ have been added to sports gear,such as tennis and golf balls and tennis rackets,to make them more durable and improve their responsiveness.
A)Nanoframes
B)Nanoscales
C)Nanosensors
D)Nanomaterials
A)Nanoframes
B)Nanoscales
C)Nanosensors
D)Nanomaterials
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
73
A ________ is the most commonly used device for enabling users to navigate in the virtual reality (VR)environment and control various objects. a.data glove
B)head-mounted display (HMD)
C)virtual retinal display (VRD)
D)smart card
B)head-mounted display (HMD)
C)virtual retinal display (VRD)
D)smart card
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
74
In a(n)_________ environment,a user is totally immersed in the virtual reality (VR)world.
A)exocentric
B)two-dimensional
C)one-dimensional
D)egocentric
A)exocentric
B)two-dimensional
C)one-dimensional
D)egocentric
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
75
_________ is a model in which application service providers (ASPs)deliver software to users for a fee.
A)Platform as a service (PaaS)
B)Software as a service (SaaS)
C)Infrastructure as a service (IaaS)
D)Backend as a service (BaaS)
A)Platform as a service (PaaS)
B)Software as a service (SaaS)
C)Infrastructure as a service (IaaS)
D)Backend as a service (BaaS)
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
76
In a(n)_________ virtual reality (VR)environment,a user is given a "window view."
A)exocentric
B)egocentric
C)one-dimensional
D)two-dimensional
A)exocentric
B)egocentric
C)one-dimensional
D)two-dimensional
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
77
Nanotechnology incorporates techniques that involve the structure and composition of materials on a _____.
A)nanoscale
B)nanometer
C)nanobyte
D)nanoframe
A)nanoscale
B)nanometer
C)nanobyte
D)nanoframe
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
78
Unlike bar codes and other systems,_________ devices do not have to be in contact with the scanner to be read.
A)monitoring and surveillance agent
B)radio frequency identification
C)rooted
D)virtual reality
A)monitoring and surveillance agent
B)radio frequency identification
C)rooted
D)virtual reality
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
79
Another name for push technology is _________.
A)prototyping
B)grid computing
C)webcasting
D)utility computing
A)prototyping
B)grid computing
C)webcasting
D)utility computing
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
80
Interruption from weather conditions is one of the major disadvantages of _________.
A)Wi-Fi
B)data mining
C)grid computing
D)WiMAX
A)Wi-Fi
B)data mining
C)grid computing
D)WiMAX
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck