BCIS 1305 BUSINESS COMPUTER APPLICATIONS Homework 11 Part I True/False

wafflejourneyΤεχνίτη Νοημοσύνη και Ρομποτική

14 Νοε 2013 (πριν από 3 χρόνια και 7 μήνες)

80 εμφανίσεις


Chapter
9

-

Emerging Trends and Technology





Page
1

of
6

BCIS 1305 BUSINESS COMPUTER APPLICATIONS

Homework
11


Part I

True/False



1
.


A

push

technology

is

an

environment

in

which

businesses

and

organizations


come

to

you

with

information,

services,

and

product

offerings

based

on

your




profile.







a
) True

b) False





2
.


Feature

analysis

occurs

when

the

system

matches

your

spoken

phonemes

to

a



phoneme

sequence

stored

in

an

acoustic

model

database.







a) True

b) False





3
.


Languag
e

processing

occurs

when

the

system

attempts

to

make

sense

of

what



you're

saying

by

comparing

the

word

phonemes

generated

with

a

language

model



database.







a) True

b) False





4
.


An

ASR

system

follows

three

st
eps

including

feature

classification,

pattern



processing,

and

language

analysis.






a) True

b) False





5.


Virtual

reality

is

a

three
-
dimensional

computer

simulation

in

which

you



actively

and

physically

parti
cipate.








a) True

b) False





6.


A

headset

is

an

input

device

that

captures

and

records

the

shape

and



movement

of

your

hand

and

fingers

and

the

strength

of

your

hand

and

finger



movements.







a) True


b) False




7.


A

walker

is

an

input

device

that

captures

and

records

the

movement

of

your



feet

as

you

walk

or

turn

in

different

directions.







a) True

b) False





8
.


A

CAVE

(cave

automatic

virtual

environment)

is

a

special

3
-
D

virtual

reality



room

that

can

display

images

of

other

people

and

objects

located

in

other



CAVEs

all

over

the

world.







a) True

b) False




Chapter
9

-

Emerging Trends and Technology





Page
2

of
6

9
.


Mobility

refers

to

how

easy

it

is

for

you

to

carry

around

your

technology.







a) True

b) False



10
.


Portability

encompasses

what

you

have

the

ability

to

do

with

your

technology



while

carrying

it

around.







a) True


b) False



11
.


When

you

do

a

search

on

the

Internet

you

are

using

push

technology.







a) True

b) False



12
.


VoIP

can

only

be

done

over

a

cable

Internet

connection.







a) True

b) Fal
se



13
.


A

glove

is

an

input

device

that

captures

and

records

hand

and

finger



movements.








a) True

b) False




Difficulty:
Easy


Learning Objective:
2



1
4
.


The

best

form

of

biometric

security

encompasses

t
wo

factors:

what

you

know



and

who

you

are.







a) True

b) False



15
.


Future

transaction

processing

systems

may

incorporate

biometric

processing



systems

to

capture

personal

characteristics

of

the

person

performi
ng

the



transaction.







a) True

b) False



16
.


Application

service

providers

have

become

very

popular

because

they

are



noted

to

keep

data

very

private.






a) True

b) False



17
.


SpeedPass

is

an

example

of

using

GPS.







a) True

b) False







Chapter
9

-

Emerging Trends and Technology





Page
3

of
6

1
8
.


Nanotechnology

is

a

discipline

that

seeks

to

control

matter

at

the

atomic



and

subatomic

levels

for

the

purpose

of

building

devices

on

the

same

scale
.







a) True

b) False




1
9
.


A

multi
-
state

CPU

can

process

letters

and

special

characters

without



converting

them

to

their

binary

equivalents.







a) True

b) False



20
.


Holographic

storage

devices

store

information

in

a

two
-
dimensional

surface.






a) True

b) False




Part

I
I

Multiple

Choice



2
1.


On

the

average,

how

much

time

do

people

spend

online?




a)
Most

of

the

day


b)
One

hour

of

the

day



c)
More

time

than

watching

TV


d)
Half

of

the

day



2
2
.


Which

of

the

following

is

considered

an

e
-
society

on

the

Internet?




a)
ELife


b)
MySpace

and

Facebook


c)
AOL



d)
Second

Life



23
.


If

you

were

traveling

abroad

and

n
eeded

to

use

some

software

that

you

did



not

currently

have,

and

did

not

want

to

purchase,

what

type

of

software



could

you

rent

during

this

trip?




a)
Leasing

Online

Software

and

Services

(LOSS)



b)
Software
-
as
-
a
-
Service

(SaaS)


c)
El
ectronic

Rental

Software

(eRent)


d)
Application

Service

Provider

(ASP)



24
.


What

type

of

Internet

company

provides

pay
-
per
-
use

software?




a)
Software

leasing


b)
Software

developers


c)
Software
-
as
-
a
-
service

(Saas)



d)
Application

service

provider

(ASP)





Chapter
9

-

Emerging Trends and Technology





Page
4

of
6

25
.


When

you

are

using

a

Web
-
based

server

to

run

applications,

what

issues



should

you

be

concerned

with?




a)
Security

of

your

data

and

personal

information

from

the

company;

some



of

these

companies

will

sell

t
his

information

to

a

third

party


b)
Quality

and

accuracy

of

data

and

information


c)
The

robustness

and

processing

ability

of

the

software



d)
Privacy

of

your

information

and

the

reliability

of

the

server



26
.


Which

of

the

following

technolo
gies

allows

you

to

send

voice

communications



over

the

Internet

and

avoid

the

toll

charges

traditionally

incurred

by



consumers?




a)
Telecommunication


b)
Data

communication



c)
VoIP


d)
Cellular

and

mobile

computing



27
.


What

i
s

the

difference

between

a

social

networking

site

and

a

blog?





a)
Social

networking

sites

create

a

community

of

people;

blogs

keep

people



informed


b)
A

blog

has

more

sophisticated

systems

than

social

networking

site


c)
Social

networ
king

sites

provide

frequently

published

news;

blogs

do

not


d)
Social

networking

sites

allow

you

to

be

someone

other

than

yourself;



blogs

do

not



28.

W
hich

term

is

used

for

a

three
-
dimensional

computer

simulation

in

which

you



actively

an
d

physically

participate?




a)
3
-
D

Modeling


b)
Multi
-
state

blending



c)
Virtual

Reality


d)
Holosuite



29
.


What

type

of

equipment

can

be

used

in

a

virtual

reality

environment?




a)
Glove


b)
Glove

and

Headset


c)
Walker




d)
Glove,

Headset,

and

Walker



3
0
.


What

industry

currently

provides

the

most

applications

with

virtual

reality?





a)
Entertainment


b)
Research

and

medical

training


c)
Space

and

commercial

airlines


d)
Sports

(training

and

instruction
)






Chapter
9

-

Emerging Trends and Technology





Page
5

of
6

3
1
.


What

is

a

CAVE?




a)
A

simulation

device

used

to

train

and

instruct

special

forcers

in

the



climbing,

firefighting,

and

search

and

rescue

industry


b)
A

three
-
dimensional

computer

simulation

in

which

you

can

actively

and




physically

participate



c)
A

virtual

reality

room

that

can

display

images

and

other

people

from



other

CAVEs


d)
An

advanced

and

secured

communication

system

used

for

extremely

sensitive



data



3
2
.


What

is

the

difference

between

virtual

reality

and

CAVEs?





a)
CAVEs

area

more

advanced

type

of

virtual

reality

that

allow

you

to



interact

with

remote,

but

real,

people


b)
Virtual

reality

allows

you

to

interact

with

people

(e.g.,

playing

games);



CAVEs

provide

holographic

characters


c)
Virtual

reality

provides

props

or

objects

in

the

environment;

CAVEs



provides

pictures

through

the

use

of

a

headset


d)
CAVEs

are

used

primarily

for

training

and

instruction;

virtual

reality



is

primarily

for

entertainment



3
3
.


The

best

form

of

biometric

security

encompasses

all

but

which

of

the



following

factors?




a)
What

you

know


b)
Who

you

are


c)
What

you

have



d)
What

you

can

do



34
.


A

password

is

an

example

of

which

form

o
f

biometric

security?




a)
What

you

have



b)
What

you

know


c)
Who

you

are


d)
What

you

can

do



35
.


Which

of

the

following

is

not

a

current

application

of

RFID

technology?





a)
Tracking

medical

claims


b)
Anti
-
theft

car

keys



c)
Passports


d)
Supply

chain



36
.


What

discipline

seeks

to

control

matter

at

the

atomic

and

subatomic

levels



for

the

purpose

of

building

devices

on

the

same

small

scale?




a)
Nanotechnology


b)
Biogenetics


c)
Atometrics


d)
Haptic

technology




Chapter
9

-

Emerging Trends and Technology





Page
6

of
6

37
.


Unlike

our

current

two
-
state

binary

storage

and

processing

environment,

what



type

of

CPU

represents

data

in

more

than

two

states?




a)
Hyper

CPU


b)
Holographic

CPU


c)
Haptic

CPU



d)
Muti
-
state

CPU



38
.


Des
pite

the

advantages

of

technology,

which

of

the

following

is

sacrificed



in

exchange

for

convenience?





a)
Money



b)
Privacy


c)
Technology


d)
Paper



39
.


Which

of

the

following

can

be

used

to

help

identify

people

in

a

crowd?




a)
Biochip


b)
Implant

chip



c)
Facial

recognition

software


d)
Vision

chip



4
0
.


What

is

the

term

used

to

show

the

great

differences

between

those

who

have



technology

and

those

who

do

not?




a)
Web

barrier



b)
Digital

divide



c)
Technological

disadvantaged


d)
Information

Poor