Podcast
Questions and Answers
There are 25,400,000 ______ in an inch.
There are 25,400,000 ______ in an inch.
nanometers
A sheet of newspaper is about 100,000 ______ thick.
A sheet of newspaper is about 100,000 ______ thick.
nanometers
An atom has a diameter of about ______ nm.
An atom has a diameter of about ______ nm.
0.1
Customization of ______ can allow drugs to be delivered directly to diseased cells.
Customization of ______ can allow drugs to be delivered directly to diseased cells.
Signup and view all the answers
Nanotechnology can impact food science, including the way food is ______.
Nanotechnology can impact food science, including the way food is ______.
Signup and view all the answers
______ is technology based on biology, focusing on cellular processes.
______ is technology based on biology, focusing on cellular processes.
Signup and view all the answers
In medicine, nanoparticles can reduce damage to healthy cells caused by ______.
In medicine, nanoparticles can reduce damage to healthy cells caused by ______.
Signup and view all the answers
Vehicle manufacturers benefit from lighter and stronger materials, leading to ______ vehicles.
Vehicle manufacturers benefit from lighter and stronger materials, leading to ______ vehicles.
Signup and view all the answers
A hybrid cloud connects private clouds to ______ clouds.
A hybrid cloud connects private clouds to ______ clouds.
Signup and view all the answers
The sudden expansion into the public cloud is known as ______ bursting.
The sudden expansion into the public cloud is known as ______ bursting.
Signup and view all the answers
Infrastructure as a Service (IaaS) provides management of servers and ______ development tools.
Infrastructure as a Service (IaaS) provides management of servers and ______ development tools.
Signup and view all the answers
Software as a Service (SaaS) allows access to ______-based apps through a web browser.
Software as a Service (SaaS) allows access to ______-based apps through a web browser.
Signup and view all the answers
One advantage of cloud computing is that it offers ______ of scale, leading to cheaper computing power.
One advantage of cloud computing is that it offers ______ of scale, leading to cheaper computing power.
Signup and view all the answers
Businesses can save on the electricity required to power and ______ their computing infrastructure.
Businesses can save on the electricity required to power and ______ their computing infrastructure.
Signup and view all the answers
Cloud providers can allocate resources like bandwidth and storage on a ______ scale.
Cloud providers can allocate resources like bandwidth and storage on a ______ scale.
Signup and view all the answers
With cloud computing, a business can process its data more ______, increasing productivity.
With cloud computing, a business can process its data more ______, increasing productivity.
Signup and view all the answers
Quantum computers derive their computing power by harnessing the power of ______.
Quantum computers derive their computing power by harnessing the power of ______.
Signup and view all the answers
The only organization providing a quantum computer in the ______ is IBM.
The only organization providing a quantum computer in the ______ is IBM.
Signup and view all the answers
A quantum bit is abbreviated as ______.
A quantum bit is abbreviated as ______.
Signup and view all the answers
In blockchain transactions, you will see ______ instead of a person's real identity.
In blockchain transactions, you will see ______ instead of a person's real identity.
Signup and view all the answers
A qubit can exist in ______ states at the same time.
A qubit can exist in ______ states at the same time.
Signup and view all the answers
Immutability means that once something has been entered into the blockchain, it cannot be ______.
Immutability means that once something has been entered into the blockchain, it cannot be ______.
Signup and view all the answers
The blockchain is built on a ______ hash function to ensure data security.
The blockchain is built on a ______ hash function to ensure data security.
Signup and view all the answers
With the addition of more qubits, a quantum computer becomes exponentially more ______.
With the addition of more qubits, a quantum computer becomes exponentially more ______.
Signup and view all the answers
Quantum computing could assist in the discovery of new ______ by analyzing complex chemical structures.
Quantum computing could assist in the discovery of new ______ by analyzing complex chemical structures.
Signup and view all the answers
The sharing economy has seen success with companies like ______ and Airbnb.
The sharing economy has seen success with companies like ______ and Airbnb.
Signup and view all the answers
Crowdfunding initiatives like ______ are paving the way for the peer-to-peer economy.
Crowdfunding initiatives like ______ are paving the way for the peer-to-peer economy.
Signup and view all the answers
Autonomic computing is patterned after the human body's autonomic ______ system.
Autonomic computing is patterned after the human body's autonomic ______ system.
Signup and view all the answers
One advantage of quantum computers is the ability to provide much safer ______ over the internet.
One advantage of quantum computers is the ability to provide much safer ______ over the internet.
Signup and view all the answers
A ______ cloud is typically used by businesses or organizations that want to keep their data private.
A ______ cloud is typically used by businesses or organizations that want to keep their data private.
Signup and view all the answers
Decentralized file storage on the internet protects files from being ______ or lost.
Decentralized file storage on the internet protects files from being ______ or lost.
Signup and view all the answers
In cloud computing, a ______ cloud allows anyone to subscribe to services offered by a third-party provider.
In cloud computing, a ______ cloud allows anyone to subscribe to services offered by a third-party provider.
Signup and view all the answers
An autonomic computing system would control the functioning of computer applications and systems without input from the ______.
An autonomic computing system would control the functioning of computer applications and systems without input from the ______.
Signup and view all the answers
The goal of autonomic computing is to create systems that run themselves, capable of high-level functioning while keeping the system's complexity ______ to the user.
The goal of autonomic computing is to create systems that run themselves, capable of high-level functioning while keeping the system's complexity ______ to the user.
Signup and view all the answers
An autonomic system can self-configure at runtime to meet changing operating ______.
An autonomic system can self-configure at runtime to meet changing operating ______.
Signup and view all the answers
An autonomic application/system should be able to detect and recover from potential problems and continue to function ______.
An autonomic application/system should be able to detect and recover from potential problems and continue to function ______.
Signup and view all the answers
An autonomic application/system should be capable of detecting and protecting its resources from both internal and external ______.
An autonomic application/system should be capable of detecting and protecting its resources from both internal and external ______.
Signup and view all the answers
An autonomic application/system should be aware of its execution ______ and be able to react to changes.
An autonomic application/system should be aware of its execution ______ and be able to react to changes.
Signup and view all the answers
An autonomic application/system must function in a heterogeneous world and should be portable across multiple hardware and software ______.
An autonomic application/system must function in a heterogeneous world and should be portable across multiple hardware and software ______.
Signup and view all the answers
An autonomic application/system should be able to detect suboptimal behaviors and optimize itself to improve its ______.
An autonomic application/system should be able to detect suboptimal behaviors and optimize itself to improve its ______.
Signup and view all the answers
Surveillance involves monitoring for ______, analyzing highway traffic, and monitoring pools for drowning victims.
Surveillance involves monitoring for ______, analyzing highway traffic, and monitoring pools for drowning victims.
Signup and view all the answers
Fingerprint recognition and ______ are used for automatic access authentication and forensic applications.
Fingerprint recognition and ______ are used for automatic access authentication and forensic applications.
Signup and view all the answers
Embedded systems are often based on ______ which are microprocessors with integrated memory and peripheral interfaces.
Embedded systems are often based on ______ which are microprocessors with integrated memory and peripheral interfaces.
Signup and view all the answers
The advantages of embedded systems include easily customizable designs, low power consumption, low cost, and enhanced ______.
The advantages of embedded systems include easily customizable designs, low power consumption, low cost, and enhanced ______.
Signup and view all the answers
A digital signal processor (DSP) is a common standard class of dedicated ______ used in embedded systems.
A digital signal processor (DSP) is a common standard class of dedicated ______ used in embedded systems.
Signup and view all the answers
The high development effort required is a disadvantage of ______ systems.
The high development effort required is a disadvantage of ______ systems.
Signup and view all the answers
An ______ measures the physical quantity and converts it to an electrical signal.
An ______ measures the physical quantity and converts it to an electrical signal.
Signup and view all the answers
An actuator compares the output given by the D-A Converter to the actual (expected) output ______ in it.
An actuator compares the output given by the D-A Converter to the actual (expected) output ______ in it.
Signup and view all the answers
Study Notes
Module 7: Other Emerging Technologies
- Emerging technologies include data science, artificial intelligence, internet of things, augmented reality, nanotechnology, biotechnology, blockchain technology, cloud and quantum computing, autonomic computing, computer vision, embedded systems, and 3D printing.
Learning Outcomes
- Students will be able to explain nanotechnology and its applications in various sectors.
- Students will be able to explain biotechnology and its applications in different sectors.
- Students will be able to explain blockchain technology and its applications.
- Students will gain insights into cloud, quantum, and autonomic computing, including differences and applications.
- Students will be able to explain how computer vision works and its applications.
- Students will identify and explain embedded systems, their pros and cons.
Nanotechnology
- Nanotechnology is a branch of science, engineering, and technology that deals with the nanoscale (1-100 nanometers).
- It involves the study and application of extremely small things across various scientific disciplines.
- Nanoscale is one-billionth of a meter.
- The concept was introduced by Richard Feynman in 1959.
- Professor Norio Taniguchi coined the term nanotechnology in the 1970s.
- Advances in scanning tunneling microscopes in 1981 were crucial for the development of modern nanotechnology through observation of individual atoms.
Nanotechnology Applications
- Medicine: Nanoparticles deliver drugs directly to diseased cells.
- Electronics: Improvement in electronics devices with reduced weight and power consumption.
- Food: Impact on food growth, packaging, safety.
- Agriculture: Potential changes in handling, bundling, transportation, and waste treatment of agricultural products.
- Vehicle manufacturing: Improvement in materials that create lighter and stronger materials.
Biotechnology
- Biotechnology harnesses biological processes for developing technologies and products that benefit humankind.
- Modern examples include specific biotechnology processes like genetic engineering.
- Genetic engineering involves transferring genes between or modifying genes within organisms.
- This technique was recognized with the development of vaccines (Edward Jenner) and antibiotics (Alexander Fleming), as well as fermentation processes.
Biotechnology Applications
- Agriculture (Green Biotechnology): Modification of genes in crops to enhance pest/disease/weed resistance.
- Medicine (Medicinal Biotechnology): Insulin production, gene therapy for genetic disorders.
- Aquaculture and Fisheries: Genetically improving quantity and quality of fish through hormone injections.
Blockchain Technology
- A blockchain is a time-stamped and immutable series of data blocks secured cryptographically.
- Data is managed by multiple independent computers.
- Each block holds information of transactions, date, time, and amounts, also including participants.
- Blocks are linked to form a chain to prevent data alteration and for increased security.
- The chain is verified/stored by many computers in a network. This process is required to confirm a transaction before it is added to the blockchain.
Blockchain Application
- Sharing Economy: Examples include companies like Uber and Airbnb.
- Crowdfunding: Initiatives like Kickstarter and GoFundMe.
- Governance: Enabling organizational decision-making on blockchain networks.
- Supply Chain Auditing Offering greater transparency in supply chain processes, confirming ethical claims of products.
- File Storage Increasing data security by decentralizing file storage networks.
Cloud Computing
- Cloud computing utilizes remote servers hosted on the internet.
- Data and processes are not stored locally.
- Public cloud: managed by third-party providers, subscriptions are common.
- Private cloud: Companies manage their own servers in an on-site or third-party location.
- Hybrid cloud: Combining public and private cloud systems.
- Cloud computing benefits include cost savings from economies of scale and avoided capital investment.
Quantum Computing
- Quantum computers leverage quantum physics for enhanced computing power, contrasting/outperforming classical computers.
- Data units are qubits, exhibiting multiple/superimposed states simultaneously.
- Qubits can hold more data than regular bits and could tackle sophisticated problems.
Autonomic Computing
- Autonomic computing (AC) models itself on the human autonomic nervous system, controlling computations without user input.
- It adapts to changing conditions without direct user intervention, performing functions such as configuration, optimization, recovery, and protection.
Computer Vision
- Interdisciplinary field of making computers understand visual images.
- Computer vision enables processes such as acquiring, processing, analyzing, and understanding images.
Embedded Systems
- Embedded systems are specialized controllers in a larger system or device.
- They run specific functions within equipment or machines.
- Embedded systems have real-time constraints and often incorporate hardware and mechanical parts.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers various emerging technologies such as nanotechnology, biotechnology, blockchain, cloud computing, and computer vision. Students will learn to explain their applications across different sectors. Gain a deeper understanding of the differences between cloud, quantum, and autonomic computing.