Filters
Question type

Study Flashcards

Cloud computing has many of the advantages and disadvantages of _____ computing.


A) hybrid
B) grid
C) distributed
D) utility

Correct Answer

verifed

verified

People can enter other cave automatic virtual environments (CAVEs)in other locations,no matter how far away they are geographically.

Correct Answer

verifed

verified

GuardIT,a security company,works with other companies to obtain intellectual property and protect them.It deals with highly secure data for a wide variety of software and e-commerce agreements,trademark licenses,and patent licenses.It is looking for a cloud computing option that allows it to purchase and maintain the software and infrastructure itself.It also needs to be designed in such a way that all users of the organization can access it without any lag.Which cloud computing option would be most suitable for them?


A) Public cloud
B) Community cloud
C) Hybrid cloud
D) Private cloud

Correct Answer

verifed

verified

Describe the challenges of representing sound in a virtual reality (VR)system.

Correct Answer

verifed

verified

Representing sound in a 3D environment i...

View Answer

A QR (quick response)code offers a smaller storage capacity compared to standard UPC barcodes.

Correct Answer

verifed

verified

_____ is a cloud-computing risk that deals with the availability of external audits and security certifications.


A) Regulatory compliance
B) Investigative support
C) Data segregation
D) Long-term viability

Correct Answer

verifed

verified

In the context of recent trends in software and service distribution,provide an example of push technology in action.

Correct Answer

verifed

verified

Users often see notices such as "A newer...

View Answer

Platform as a service (PaaS) is hosted in the cloud and accessed by clients through their _____.


A) data gloves
B) Web browsers
C) smart cards
D) Web avatars

Correct Answer

verifed

verified

In the context of virtual reality (VR) ,_____ refers to the concept of allowing users in different locations to interact and manipulate the same world at the same time by connecting two or more virtual worlds.


A) full-body immersion
B) networked communication
C) simulation
D) interaction

Correct Answer

verifed

verified

Active radio frequency identification (RFID)tags have no internal power supply.

Correct Answer

verifed

verified

_____ uses computer-generated,three-dimensional images to create the illusion of interaction in a real-world environment.


A) Nanotechnology
B) Cloud computing
C) Virtual reality
D) Grid computing

Correct Answer

verifed

verified

With _____ computing,users can make use of other computers' resources to solve problems involving large-scale,complex calculations,such as circuit analysis or mechanical design-problems that a single computer is not capable of solving in a timely manner.


A) utility
B) cloud
C) mobile
D) grid​

Correct Answer

verifed

verified

Venus Technologies offer cloud computing services to several data centers throughout the world.They provide computer infrastructure such as servers,networking elements,and storage as a service.They own the equipment and are liable for housing,functioning,and maintaining it,as a part of the deal.Identify the type of cloud computing model Venus Technologies delivers as a service.


A) Infrastructure as a service (IaaS)
B) Platform as a service (PaaS)
C) Software as a service (SaaS)
D) Desktop as a service (DaaS)

Correct Answer

verifed

verified

Describe the different forms of the software as a service (SaaS)model.

Correct Answer

verifed

verified

The SaaS model can take several forms,su...

View Answer

Which of the following technologies could be used to prevent one coworker from checking in for another in an organization?


A) Biometrics
B) Bluetooth
C) Cybernetics
D) Bioinformatics

Correct Answer

verifed

verified

Identify a component of a virtual reality (VR) system that generates and manipulates high-quality graphics.


A) Central coordinating processor and software system
B) Virtual system
C) Regulatory compliance system
D) Aural system

Correct Answer

verifed

verified

Another name for push technology is _________.


A) prototyping
B) grid computing
C) webcasting
D) utility computing

Correct Answer

verifed

verified

How might biometrics be applied in passports and secure government ID cards?

Correct Answer

verifed

verified

A biometrically authenticated passport o...

View Answer

In grid computing,each participant is referred to as a "branch."

Correct Answer

verifed

verified

Discuss five uses of Bluetooth technology.

Correct Answer

verifed

verified

Bluetooth can be used in the following w...

View Answer

Showing 61 - 80 of 100

Related Exams

Show Answer