Chapter 09 Emerging Trends and Technology



BCIS 1305 BUSINESS COMPUTER APPLICATIONS

Homework 11

Part I

True/False

1. A push technology is an environment in which businesses and organizations

come to you with information, services, and product offerings based on your

profile.

a) True b) False

2. Feature analysis occurs when the system matches your spoken phonemes to a

phoneme sequence stored in an acoustic model database.

a) True b) False

3. Language processing occurs when the system attempts to make sense of what

you're saying by comparing the word phonemes generated with a language model

database.

a) True b) False

4. An ASR system follows three steps including feature classification, pattern

processing, and language analysis.

a) True b) False

5. Virtual reality is a three-dimensional computer simulation in which you

actively and physically participate.

a) True b) False

6. A headset is an input device that captures and records the shape and

movement of your hand and fingers and the strength of your hand and finger

movements.

a) True b) False

7. A walker is an input device that captures and records the movement of your

feet as you walk or turn in different directions.

a) True b) False

8. A CAVE (cave automatic virtual environment) is a special 3-D virtual reality

room that can display images of other people and objects located in other

CAVEs all over the world.

a) True b) False

9. Mobility refers to how easy it is for you to carry around your technology.

a) True b) False

10. Portability encompasses what you have the ability to do with your technology

while carrying it around.

a) True b) False

11. When you do a search on the Internet you are using push technology.

a) True b) False

12. VoIP can only be done over a cable Internet connection.

a) True b) False

13. A glove is an input device that captures and records hand and finger

movements.

a) True b) False

Difficulty: Easy

Learning Objective: 2

14. The best form of biometric security encompasses two factors: what you know

and who you are.

a) True b) False

15. Future transaction processing systems may incorporate biometric processing

systems to capture personal characteristics of the person performing the

transaction.

a) True b) False

16. Application service providers have become very popular because they are

noted to keep data very private.

a) True b) False

17. SpeedPass is an example of using GPS.

a) True b) False

18. Nanotechnology is a discipline that seeks to control matter at the atomic

and subatomic levels for the purpose of building devices on the same scale.

a) True b) False

19. A multi-state CPU can process letters and special characters without

converting them to their binary equivalents.

a) True b) False

20. Holographic storage devices store information in a two-dimensional surface.

a) True b) False

Part II

Multiple Choice

21. On the average, how much time do people spend online?

a) Most of the day

b) One hour of the day

c) More time than watching TV

d) Half of the day

22. Which of the following is considered an e-society on the Internet?

a) ELife

b) MySpace and Facebook

c) AOL

d) Second Life

23. If you were traveling abroad and needed to use some software that you did

not currently have, and did not want to purchase, what type of software

could you rent during this trip?

a) Leasing Online Software and Services (LOSS)

b) Software-as-a-Service (SaaS)

c) Electronic Rental Software (eRent)

d) Application Service Provider (ASP)

24. What type of Internet company provides pay-per-use software?

a) Software leasing

b) Software developers

c) Software-as-a-service (Saas)

d) Application service provider (ASP)

25. When you are using a Web-based server to run applications, what issues

should you be concerned with?

a) Security of your data and personal information from the company; some

of these companies will sell this information to a third party

b) Quality and accuracy of data and information

c) The robustness and processing ability of the software

d) Privacy of your information and the reliability of the server

26. Which of the following technologies allows you to send voice communications

over the Internet and avoid the toll charges traditionally incurred by

consumers?

a) Telecommunication

b) Data communication

c) VoIP

d) Cellular and mobile computing

27. What is the difference between a social networking site and a blog?

a) Social networking sites create a community of people; blogs keep people

informed

b) A blog has more sophisticated systems than social networking site

c) Social networking sites provide frequently published news; blogs do not

d) Social networking sites allow you to be someone other than yourself;

blogs do not

28. Which term is used for a three-dimensional computer simulation in which you

actively and physically participate?

a) 3-D Modeling

b) Multi-state blending

c) Virtual Reality

d) Holosuite

29. What type of equipment can be used in a virtual reality environment?

a) Glove

b) Glove and Headset

c) Walker

d) Glove, Headset, and Walker

30. What industry currently provides the most applications with virtual reality?

a) Entertainment

b) Research and medical training

c) Space and commercial airlines

d) Sports (training and instruction)

31. What is a CAVE?

a) A simulation device used to train and instruct special forcers in the

climbing, firefighting, and search and rescue industry

b) A three-dimensional computer simulation in which you can actively and

physically participate

c) A virtual reality room that can display images and other people from

other CAVEs

d) An advanced and secured communication system used for extremely sensitive

data

32. What is the difference between virtual reality and CAVEs?

a) CAVEs area more advanced type of virtual reality that allow you to

interact with remote, but real, people

b) Virtual reality allows you to interact with people (e.g., playing games);

CAVEs provide holographic characters

c) Virtual reality provides props or objects in the environment; CAVEs

provides pictures through the use of a headset

d) CAVEs are used primarily for training and instruction; virtual reality

is primarily for entertainment

33. The best form of biometric security encompasses all but which of the

following factors?

a) What you know

b) Who you are

c) What you have

d) What you can do

34. A password is an example of which form of biometric security?

a) What you have

b) What you know

c) Who you are

d) What you can do

35. Which of the following is not a current application of RFID technology?

a) Tracking medical claims

b) Anti-theft car keys

c) Passports

d) Supply chain

36. What discipline seeks to control matter at the atomic and subatomic levels

for the purpose of building devices on the same small scale?

a) Nanotechnology

b) Biogenetics

c) Atometrics

d) Haptic technology

37. Unlike our current two-state binary storage and processing environment, what

type of CPU represents data in more than two states?

a) Hyper CPU

b) Holographic CPU

c) Haptic CPU

d) Muti-state CPU

38. Despite the advantages of technology, which of the following is sacrificed

in exchange for convenience?

a) Money

b) Privacy

c) Technology

d) Paper

39. Which of the following can be used to help identify people in a crowd?

a) Biochip

b) Implant chip

c) Facial recognition software

d) Vision chip

40. What is the term used to show the great differences between those who have

technology and those who do not?

a) Web barrier

b) Digital divide

c) Technological disadvantaged

d) Information Poor

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download