Архитектура Аудит Военная наука Иностранные языки Медицина Металлургия Метрология
Образование Политология Производство Психология Стандартизация Технологии


Activity 8. Decode Bill Gates’ saying about innovations and comment on it:



http://puzzlemaker.discoveryeducation.com/code/BuildCryptogram.asp

Activity 9. Explain the difference between the following concepts using the Venn diagram below:

quantum programming- binary programming
bricks and clicks
outsourcing – insourcing
commuting – telecommuting
3D printing – 4D printing
cutting edge – bleeding edge
R & D (research and development)

 

Activity 10. Say what the following is used for:

1. life-hacking  
2. nanotechnology  
3. cloud computing  
4. beta testing  
5. biometrics  
6. a fool-proof device  
7. open source  

Activity 11. Give examples of the devices which may be called :

 

1. multi-purpose
2. multi-mode
3. multi-user
4. multi-functional
5. multi-media
6. fault-tolerant
7. ad hoc

 

Activity 12. Outline the major advantages of:

1. channel integration
2. biometric identification
3. cloud storage
4. cobotic devices
5. asynchronous computing
6. beta testing
7. optical character recognition

Activity 13. Do a mini-research and briefly characterize:

1. Knowledge economy

2. Quantum programming

3. Real-time technology

4. Bricks and clicks practices

Activity 14. Semantic mapping: Draw a diagram reflecting major breakthroughs and latest innovation trends in ICT development.

Activity 15. Analyze your computer experience and identify the areas in which it lags behind the best practices in the industry.

TEST

1 What is the logical relationship between the concepts “bricks - clicks”: a) general and specific b) cause and effect c) contrast d) part and whole
2 What is the logical relationship between the concepts “robot - cobot”: a) general and specific b) cause and effect c) method and purpose d) part and whole
3 Which of these are equivalents? a) biometrics – fingerprint b) biometrics – eye retina c) biometrics – biometry d) biometrics - face pattern
4 Which of these relates to a method of project management that is characterized by sequential stages and a fixed plan of work: a) waterfall b) flexible c) agile d) ad hoc
5   The practice of using an organization’s own personnel or other resources to accomplish a task is referred to as ___ . a) outsourcing b) insourcing c) sourcing d) open sourcing
6 The use of an original source code in software engineering which is made freely available and may be redistributed and modified is referred to ___. a) outsourcing b) insourcing c) sourcing d) open sourcing
7 Additive manufacturing that prints objects capable of transformation and, in some cases, of self-assembly is known as ___ D printing. a) 1 b) 2 c) 3 d) 4
8 This program is very well designed and totally ___proof. a) water b) bug c) fool d) bullet
9 This car has ___ proof windows. a) water b) bug c) fool d) bullet
10 The supposed ability to move objects at a distance by mental power or other non-physical means is known as tele___ . a) kinesis b) commuting c) communication d) marketing
11 Promotion of goods or services by means of telephone calls, typically unsolicited, to potential customers is known as tele-___ . a) kinesis b) commuting c) communication d) marketing
12 Mark the odd word: a) cutting-edge b) state-of-the-art c) adhocracy d) leading edge
13 The property that enables a system to continue operating properly in the event of the breakdown of some of its components is called failure__. a) tolerant b) tolerance c) toleration d) tolerantly
14 Any trick, shortcut, skill, or novelty method that increases productivity and efficiency, solves an everyday problem in an inspired, ingenious manner is called (a/n) ___ . a) breakthrough b) life hacker c) innovation d) best practice
15 The video went ___ and was seen by millions. a) virus b) viral c) virtual d) virtuous
16 Mark the odd word: a) enhance b) augment c) amplify d) modify
17 A strategy of using software to control multiple servers to provide fault-tolerant systems, quicker responses and more capable data management for large networks is known as application ___. a) clustering b) integration c) outsourcing d) amplification
18 The second (pre-release) phase of software testing in which a sampling of the intended audience tries the product out and reports bugs back to the developers is called ____ test. a) alpha b) beta c) gamma d) delta
19 The nouns “control”, “access”, “terminal”, “location”, “area” collocate with the word ____ . a) demote b) remote c) promote d) commote
20 Voice ___ is computer analysis of the human voice, especially for the purposes of interpreting words and phrases or identifying an individual voice. a) identification b) acknowledgement c) recognition d) perception

 


Поделиться:



Последнее изменение этой страницы: 2019-04-19; Просмотров: 758; Нарушение авторского права страницы


lektsia.com 2007 - 2024 год. Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав! (0.009 с.)
Главная | Случайная страница | Обратная связь