Chapter 09 Emerging Trends and Technology
BCIS 1305 BUSINESS COMPUTER APPLICATIONS
Homework 11
Part I
True/False
1. A push technology is an environment in which businesses and organizations
come to you with information, services, and product offerings based on your
profile.
a) True b) False
2. Feature analysis occurs when the system matches your spoken phonemes to a
phoneme sequence stored in an acoustic model database.
a) True b) False
3. Language processing occurs when the system attempts to make sense of what
you're saying by comparing the word phonemes generated with a language model
database.
a) True b) False
4. An ASR system follows three steps including feature classification, pattern
processing, and language analysis.
a) True b) False
5. Virtual reality is a three-dimensional computer simulation in which you
actively and physically participate.
a) True b) False
6. A headset is an input device that captures and records the shape and
movement of your hand and fingers and the strength of your hand and finger
movements.
a) True b) False
7. A walker is an input device that captures and records the movement of your
feet as you walk or turn in different directions.
a) True b) False
8. A CAVE (cave automatic virtual environment) is a special 3-D virtual reality
room that can display images of other people and objects located in other
CAVEs all over the world.
a) True b) False
9. Mobility refers to how easy it is for you to carry around your technology.
a) True b) False
10. Portability encompasses what you have the ability to do with your technology
while carrying it around.
a) True b) False
11. When you do a search on the Internet you are using push technology.
a) True b) False
12. VoIP can only be done over a cable Internet connection.
a) True b) False
13. A glove is an input device that captures and records hand and finger
movements.
a) True b) False
Difficulty: Easy
Learning Objective: 2
14. The best form of biometric security encompasses two factors: what you know
and who you are.
a) True b) False
15. Future transaction processing systems may incorporate biometric processing
systems to capture personal characteristics of the person performing the
transaction.
a) True b) False
16. Application service providers have become very popular because they are
noted to keep data very private.
a) True b) False
17. SpeedPass is an example of using GPS.
a) True b) False
18. Nanotechnology is a discipline that seeks to control matter at the atomic
and subatomic levels for the purpose of building devices on the same scale.
a) True b) False
19. A multi-state CPU can process letters and special characters without
converting them to their binary equivalents.
a) True b) False
20. Holographic storage devices store information in a two-dimensional surface.
a) True b) False
Part II
Multiple Choice
21. On the average, how much time do people spend online?
a) Most of the day
b) One hour of the day
c) More time than watching TV
d) Half of the day
22. Which of the following is considered an e-society on the Internet?
a) ELife
b) MySpace and Facebook
c) AOL
d) Second Life
23. If you were traveling abroad and needed to use some software that you did
not currently have, and did not want to purchase, what type of software
could you rent during this trip?
a) Leasing Online Software and Services (LOSS)
b) Software-as-a-Service (SaaS)
c) Electronic Rental Software (eRent)
d) Application Service Provider (ASP)
24. What type of Internet company provides pay-per-use software?
a) Software leasing
b) Software developers
c) Software-as-a-service (Saas)
d) Application service provider (ASP)
25. When you are using a Web-based server to run applications, what issues
should you be concerned with?
a) Security of your data and personal information from the company; some
of these companies will sell this information to a third party
b) Quality and accuracy of data and information
c) The robustness and processing ability of the software
d) Privacy of your information and the reliability of the server
26. Which of the following technologies allows you to send voice communications
over the Internet and avoid the toll charges traditionally incurred by
consumers?
a) Telecommunication
b) Data communication
c) VoIP
d) Cellular and mobile computing
27. What is the difference between a social networking site and a blog?
a) Social networking sites create a community of people; blogs keep people
informed
b) A blog has more sophisticated systems than social networking site
c) Social networking sites provide frequently published news; blogs do not
d) Social networking sites allow you to be someone other than yourself;
blogs do not
28. Which term is used for a three-dimensional computer simulation in which you
actively and physically participate?
a) 3-D Modeling
b) Multi-state blending
c) Virtual Reality
d) Holosuite
29. What type of equipment can be used in a virtual reality environment?
a) Glove
b) Glove and Headset
c) Walker
d) Glove, Headset, and Walker
30. What industry currently provides the most applications with virtual reality?
a) Entertainment
b) Research and medical training
c) Space and commercial airlines
d) Sports (training and instruction)
31. What is a CAVE?
a) A simulation device used to train and instruct special forcers in the
climbing, firefighting, and search and rescue industry
b) A three-dimensional computer simulation in which you can actively and
physically participate
c) A virtual reality room that can display images and other people from
other CAVEs
d) An advanced and secured communication system used for extremely sensitive
data
32. What is the difference between virtual reality and CAVEs?
a) CAVEs area more advanced type of virtual reality that allow you to
interact with remote, but real, people
b) Virtual reality allows you to interact with people (e.g., playing games);
CAVEs provide holographic characters
c) Virtual reality provides props or objects in the environment; CAVEs
provides pictures through the use of a headset
d) CAVEs are used primarily for training and instruction; virtual reality
is primarily for entertainment
33. The best form of biometric security encompasses all but which of the
following factors?
a) What you know
b) Who you are
c) What you have
d) What you can do
34. A password is an example of which form of biometric security?
a) What you have
b) What you know
c) Who you are
d) What you can do
35. Which of the following is not a current application of RFID technology?
a) Tracking medical claims
b) Anti-theft car keys
c) Passports
d) Supply chain
36. What discipline seeks to control matter at the atomic and subatomic levels
for the purpose of building devices on the same small scale?
a) Nanotechnology
b) Biogenetics
c) Atometrics
d) Haptic technology
37. Unlike our current two-state binary storage and processing environment, what
type of CPU represents data in more than two states?
a) Hyper CPU
b) Holographic CPU
c) Haptic CPU
d) Muti-state CPU
38. Despite the advantages of technology, which of the following is sacrificed
in exchange for convenience?
a) Money
b) Privacy
c) Technology
d) Paper
39. Which of the following can be used to help identify people in a crowd?
a) Biochip
b) Implant chip
c) Facial recognition software
d) Vision chip
40. What is the term used to show the great differences between those who have
technology and those who do not?
a) Web barrier
b) Digital divide
c) Technological disadvantaged
d) Information Poor
................
................
In order to avoid copyright disputes, this page is only a partial summary.
To fulfill the demand for quickly locating and searching documents.
It is intelligent file search solution for home and business.
Related searches
- emerging trends in information technology
- emerging trends in technology
- emerging trends in computer technology
- identify emerging trends in ict
- emerging trends in communication technology
- emerging trends in communication pdf
- emerging trends in ict pdf
- emerging trends in ict
- emerging trends affecting health care
- emerging trends in communication skills
- emerging trends in education
- emerging trends in healthcare