Exam 14: Emerging Trends, Technologies, and Applications
Exam 1: Information Systems: an Overview80 Questions
Exam 2: Computers: the Machines Behind Computing79 Questions
Exam 3: Database Systems, Data Warehouses, and Data Marts80 Questions
Exam 4: Personal, Legal, Ethical, and Organizational Issues of Information Systems80 Questions
Exam 5: Protecting Information Resources84 Questions
Exam 6: Data Communication: Delivering Information Anywhere and Anytime80 Questions
Exam 7: The Internet, Intranets, and Extranets77 Questions
Exam 8: E-Commerce80 Questions
Exam 9: Global Information Systems83 Questions
Exam 10: Building Successful Information Systems80 Questions
Exam 11: Enterprise Systems81 Questions
Exam 12: Management Support Systems80 Questions
Exam 13: Intelligent Information Systems80 Questions
Exam 14: Emerging Trends, Technologies, and Applications80 Questions
Select questions type
In the context of networking, on-demand computing is also known as ____.
(Multiple Choice)
4.9/5
(39)
In an exocentric environment of virtual reality (VR), users can interact with objects.
(True/False)
4.8/5
(33)
Ziffcorp, an IT firm, uses a technology that automatically updates the antivirus software in all the computers in the firm whenever the software becomes outdated. It is evident that Ziffcorp uses _____ for automatically updating the antivirus software.
(Multiple Choice)
4.8/5
(35)
In virtual environment (VR) terminology, the everyday physical world is referred to as a "micro environment."
(True/False)
5.0/5
(44)
In grid computing, when a large complex task is split into smaller tasks that run simultaneously on several nodes, it is known as__________.
(Multiple Choice)
4.8/5
(45)
In a virtual reality (VR) environment, enabling users to act on objects, such as using a data glove to pick up and move objects, is known as _____.
(Multiple Choice)
4.7/5
(37)
Which of the following technologies could be used to prevent one coworker from checking in for another in an organization?
(Multiple Choice)
4.8/5
(37)
Push technology can be effective for both business-to-consumer (B2C) and business-to-business (B2B) marketing.
(True/False)
4.8/5
(37)
_____ uses computer-generated, three-dimensional images to create the illusion of interaction in a real-world environment.
(Multiple Choice)
5.0/5
(34)
A(n) _____ is a simulated environment designed for users to interact via avatars.
(Multiple Choice)
4.8/5
(43)
_____ radio frequency identification (RFID) tags can be embedded in a sticker or under the human or animal skin.
(Multiple Choice)
4.8/5
(40)
A _____ cloud allows an organization to take advantage of the scalability and cost-effectiveness that a public cloud computing environment offers without exposing mission-critical applications and data to the outside world.
(Multiple Choice)
4.8/5
(31)
GuardIN is an IT security firm. It deals with highly secure data for a wide variety of software and e-commerce agreements, trademark licenses, and patent licenses. GuardIN needs a cloud computing option that would allow it to purchase and maintain the software and infrastructure itself. The cloud also needs to be designed in such a way that all users of the organization can access it without any lag. Which of the following cloud computing options would be most suitable for GuardIN?
(Multiple Choice)
4.9/5
(34)
A radio frequency identification (RFID) tag provides a generic identification for a credit or debit card carrying the tag.
(True/False)
4.9/5
(38)
Pull technology is adequate for marketing certain products and services and for providing customized information.
(True/False)
4.9/5
(34)
__________provide access to software or services for a fee.
(Multiple Choice)
4.7/5
(30)
_____ radio frequency identification (RFID) tags have no internal power supply.
(Multiple Choice)
4.9/5
(36)
_____ clouds are more suitable for organizations that need scalability, do collaborative projects, and offer standard applications over the Web.
(Multiple Choice)
4.7/5
(36)
Showing 41 - 60 of 80
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)