Exam 14: Emerging Trends, Technologies, and Applications

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In the context of networking, on-demand computing is also known as ____.

(Multiple Choice)
4.9/5
(39)

Which of the following is true of biometrics?

(Multiple Choice)
4.9/5
(39)

In an exocentric environment of virtual reality (VR), users can interact with objects.

(True/False)
4.8/5
(33)

Ziffcorp, an IT firm, uses a technology that automatically updates the antivirus software in all the computers in the firm whenever the software becomes outdated. It is evident that Ziffcorp uses _____ for automatically updating the antivirus software.

(Multiple Choice)
4.8/5
(35)

In virtual environment (VR) terminology, the everyday physical world is referred to as a "micro environment."

(True/False)
5.0/5
(44)

In grid computing, when a large complex task is split into smaller tasks that run simultaneously on several nodes, it is known as__________.

(Multiple Choice)
4.8/5
(45)

In a virtual reality (VR) environment, enabling users to act on objects, such as using a data glove to pick up and move objects, is known as _____.

(Multiple Choice)
4.7/5
(37)

Push technology is also known as__________.

(Multiple Choice)
4.8/5
(41)

Which of the following technologies could be used to prevent one coworker from checking in for another in an organization?

(Multiple Choice)
4.8/5
(37)

Push technology can be effective for both business-to-consumer (B2C) and business-to-business (B2B) marketing.

(True/False)
4.8/5
(37)

_____ uses computer-generated, three-dimensional images to create the illusion of interaction in a real-world environment.

(Multiple Choice)
5.0/5
(34)

A(n) _____ is a simulated environment designed for users to interact via avatars.

(Multiple Choice)
4.8/5
(43)

_____ radio frequency identification (RFID) tags can be embedded in a sticker or under the human or animal skin.

(Multiple Choice)
4.8/5
(40)

A _____ cloud allows an organization to take advantage of the scalability and cost-effectiveness that a public cloud computing environment offers without exposing mission-critical applications and data to the outside world.

(Multiple Choice)
4.8/5
(31)

GuardIN is an IT security firm. It deals with highly secure data for a wide variety of software and e-commerce agreements, trademark licenses, and patent licenses. GuardIN needs a cloud computing option that would allow it to purchase and maintain the software and infrastructure itself. The cloud also needs to be designed in such a way that all users of the organization can access it without any lag. Which of the following cloud computing options would be most suitable for GuardIN?

(Multiple Choice)
4.9/5
(34)

A radio frequency identification (RFID) tag provides a generic identification for a credit or debit card carrying the tag.

(True/False)
4.9/5
(38)

Pull technology is adequate for marketing certain products and services and for providing customized information.

(True/False)
4.9/5
(34)

__________provide access to software or services for a fee.

(Multiple Choice)
4.7/5
(30)

_____ radio frequency identification (RFID) tags have no internal power supply.

(Multiple Choice)
4.9/5
(36)

_____ clouds are more suitable for organizations that need scalability, do collaborative projects, and offer standard applications over the Web.

(Multiple Choice)
4.7/5
(36)
Showing 41 - 60 of 80
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)