Skip to ContentGo to accessibility pageKeyboard shortcuts menu
OpenStax Logo

Review Questions

1 .
What solution do organizations usually select when they need to store sensitive information and/or function as central repositories for data syncing?
  1. public cloud
  2. hybrid cloud
  3. private cloud
  4. mashup cloud
2 .
Which cloud resources are provided by third parties and are fully managed services with multiple tenants?
  1. public cloud
  2. hybrid cloud
  3. private cloud
  4. mashup cloud
3 .
Usually, what means do organizations use to communicate in the hybrid cloud network?
  1. cold data backups
  2. application programming interfaces (APIs)
  3. on-premises systems
  4. centralized control tools
4 .
Which cloud solution allows developers to pick and combine different information from public sources and create their own application?
  1. public cloud
  2. hybrid cloud
  3. multicloud
  4. mashup cloud
5 .
What cloud service allows an organization’s employees or users to freely decide their own cloud vendor that best suits their tasks rather than standardizing a single specific provider?
  1. bring your own cloud solution (BYOCS)
  2. hybrid cloud
  3. private cloud
  4. public cloud
6 .
Which storage service manages data as blobs?
  1. file storage
  2. object storage
  3. application storage
  4. block storage
7 .
Which infrastructure component of cloud computing provides users with the ability to gain access to a private computing environment?
  1. compute service
  2. file storage
  3. software development
  4. storage service
8 .
Which cloud computing component accelerates the web and mobile workload globally?
  1. storage service
  2. compute service
  3. content delivery network
  4. application storage
9 .
Which innovation in cloud computing addressed the issue of an environmental mismatch between the application development environment and the environment where an application runs?
  1. object storage
  2. container management services
  3. content delivery network
  4. compute service
10 .
What service allows data to be managed under key/value pair?
  1. content delivery network
  2. relational database service
  3. container management services
  4. NoSQL database service
11 .
What is telecommand?
  1. a feature of 5G that creates higher radio frequencies, enabling data transfers at faster speeds
  2. a category of IoT network traffic that sends commands across a network to control devices or sensors
  3. a feature of 5G that enables multiple IoT devices to be used simultaneously within the same geographic area
  4. a category of IoT network traffic that aggregates data generated by sensors and devices and sends it to a server
12 .
What type of machine learning does big data analytics require?
  1. shallow machine learning
  2. telecommand
  3. telemetry
  4. deep machine learning
13 .
What feature ensures that smart contracts are secured against tampering and unauthorized revisions?
  1. deep machine learning
  2. IoT
  3. ML toolkits
  4. cryptography
14 .
What type of reality immerses a user in a computer-generated, interactive, 3-D environment?
  1. augmented reality (AR)
  2. virtual reality (VR)
  3. extended reality (XR)
  4. mixed reality (MR)
15 .
How does 4-D printing enhance 3-D printing?
  1. 4-D printing adds deep machine learning onto 3-D printing’s shallow machine learning.
  2. 4-D printing adds three-dimensional capabilities to 3-D printing’s two-dimensional properties.
  3. 4-D printing adds the capability of programming the fundamental materials used in 3-D printing.
  4. 4-D printing adds the capability of using both telemetry and telecommand to enhance 3-D printing.
16 .
Which PaaS service can support organizations with project management needs?
  1. integration management
  2. application life cycle management
  3. monitoring
  4. management and governance
17 .
What technology is best positioned to replace today’s web technology?
  1. quantum computing
  2. extended reality (XR)
  3. blockchain 4.0
  4. the metaverse
18 .
Which technology can produce holographic overlaying of images and data onto real-life contexts?
  1. neuroinformatics
  2. extended reality (XR)
  3. quantum computing
  4. virtual reality (VR)
19 .
What concept focuses on designing products to be effective, efficient, and satisfying?
  1. inclusion
  2. cognitive computing
  3. usability
  4. accessibility
20 .
Which type of robotics uses principles discovered in nature as the approach to design robots?
  1. cognitive robotics
  2. software robotics
  3. biomimetic robotics
  4. manipulative robotics
21 .
Which field is striving to build a computer that can mimic basic human brain functions?
  1. neuroinformatics
  2. biomimetic robotics
  3. robotic manipulators
  4. nanotechnology
22 .
How does the environment for automated networks differ from the environment for autonomous networks?
  1. It leverages AGI.
  2. It tends to be predictable.
  3. It leverages edge computing.
  4. It tends to be unpredictable.
Citation/Attribution

This book may not be used in the training of large language models or otherwise be ingested into large language models or generative AI offerings without OpenStax's permission.

Want to cite, share, or modify this book? This book uses the Creative Commons Attribution License and you must attribute OpenStax.

Attribution information
  • If you are redistributing all or part of this book in a print format, then you must include on every physical page the following attribution:
    Access for free at https://openstax.org/books/introduction-computer-science/pages/1-introduction
  • If you are redistributing all or part of this book in a digital format, then you must include on every digital page view the following attribution:
    Access for free at https://openstax.org/books/introduction-computer-science/pages/1-introduction
Citation information

© Oct 29, 2024 OpenStax. Textbook content produced by OpenStax is licensed under a Creative Commons Attribution License . The OpenStax name, OpenStax logo, OpenStax book covers, OpenStax CNX name, and OpenStax CNX logo are not subject to the Creative Commons license and may not be reproduced without the prior and express written consent of Rice University.