4.8 / 5

Ratings

1 / 30

Questions
Question 1 of 30

1999’s epic sci-fi movie “The Matrix” depicts how this technology is used to create sentient and powerful robots.

The algorithms used today in AI are capable of processing vast amounts of data. This is why numerous organizations in healthcare, finance, manufacturing, retail, energy, education, and IT heavily rely on this technology to streamline their daily and long-term operations and spending.

Provides services such as servers, storage, database, and analytics over the Internet.

Cloud computing is becoming increasingly popular as it gets rid of expenses involving purchasing and setting up software, hardware, and on-site datacenters. It is secure, efficient, and fast and in case any trouble were to occur, it has reliable arrangements for data backup and disaster recovery.

Based on distributed ledger system, this controversial technology records transactions across peer-to-peer networks.

The most unique thing about blockchain technology is that it has no central authority. And because it is an immutable and shared platform the information is open for everyone to see, basically ensuring transparency. Also, it involves no transaction cost.

Handles voluminous amounts of information that can’t be managed by traditional data processing methods.

Big data technology is instrumental in saving redundant costs and discovering new developmental opportunities businesses. It enables organizations better understand market conditions and customer feedback, which can prepare them to cope with potential threats.

A wireless technology standard named after a Viking.

Named after Danish ruler Harald Bluetooth, who is said to haved united conflicting regions, Bluetooth brings together a wide range of devices across industries via a unifying wireless communication standard. Its logo is a merger of Harald's initials that are in the form of Younger Futhark runes.

In 2016, this technology was all the rage when it was used in the mobile game Pokemon Go.

AR can be applied to a plethora of avenues, but it's mostly used for creating a rich audio-visual experience. This technology uses computerized simulation and techniques including animation, image and voice recognition, head-mounted and hand-held devices, and powered display environments to introduce a virtual display superimposed on true surroundings.

This technology is used in Mission Impossible: Ghost Protocol to create mind-boggling latex masks.

You'll be intrigued to know that you can create masks using 3D printers. A little heads up: they might not be as good as the ones shown in Ghost Protocol. 3D printing is commonly used for building customized products, prototypes, movie props, and complex geometric models.

These devices were depicted by Ray Bradbury in his 1950 dystopian novel Fahrenheit 451.

The characters in Bradbury's books would walk around wearing seashells and thimble radios in their ears, which constantly bombarded them with information and music. Similarly, earbuds have become an essential part of our life. They make communication easier and let us enjoy on the go.

An alternative technology to make phone calls and transmit other multimedia using an IP.

Although VoIP is a relatively new technology, it widely accepted by both small and big businesses owing to its cost-effectiveness, flexibility, and various features. It is expected to have a lot more technological improvements in terms of bandwidth dependency, voice quality, power dependency, and security measures in the near future.

Hugo Gernsback imagined this technology in his book Ralph 124C 41+ in 1925.

This sci-fi novel, set in 2660, predicted the use of solar power, which has become a huge part of the sustainable movement today. Apart from solar power, the author speculated technology involving space travel, televisions, tape recorders, and movies with sound in this book.

This technology was imagined in Tom Cruise’s 2002 sci-fi drama Minority Report.

Facial recognition isn't widely employed, but it's gaining traction in medical research and law enforcement investigations. In healthcare, it is used to detect rare genetic diseases. Likewise, the FBI is said to have access more than half of the adult population's pictures taken from records such as state IDs, driver's licenses, or resident cards for future references.

A short-range wireless medium that is used to share data between 2 devices.

Compared to Bluetooth, near field communication (NFC) doesn't require devices to be paired, which enables easy data transmission. Also, for NFC to work, devices need to be within 4 cm (around 1.6 inches) from each other, which ensures low power consumption and a secure connection. Bluetooth can extend up to 30 feet, which gives third-party scanners a chance to intercept the connection.

This satellite-based navigation system was depicted in Star Trek.

Initially, the Global Positioning System (GPS) was created by the Department of Defense as a military tool. Although this technology has been active since the early 80s, it only became available to civilians by the late 90s. Now, consumer GPS has turned into a multi-billion-dollar industry that has an extensive range of Internet-based products and services.

A security measure that stands between the LAN and Internet, denying hackers access to internal networks.

A firewall can be either be a software application or hardware device, or a mix of both, that is positioned at the perimeter of the network as a gatekeeper for handling traffic. This technology uses four mechanisms to manage traffic: packet filtering, proxy server, circuit-level gateway, and application getaway. The application or device you have may employ one or more of these to offer additional protection.

Rendering high-speed data connection to the Internet, this technology made dial-up connections obsolete.

Whether it's via our computers, laptops or smartphones, broadband has truly transformed the way we communicate and use data. As this technology allows the data to be transmitted at higher speeds within a shorter period, the consumption of social media and streaming platform services has dramatically amplified.

The minute you walk into an airport, café, or bookstore, your smartphone will notify you about this Internet connection.

For a netizen, nothing can be better than finding a great hotspot. While they help you pass time outside, one problem with public hotspots is that all of them aren't reliable. To inhibit nefarious hackers from accessing your information, we install a solid anti-virus app. Likewise, it's advised that you enable two-factor authentication and forget the network as soon as you're done using it.

The next big thing in mobile telecommunications, this technology will succeed the 4G wireless system.

This next generation of mobile network technology will replace 4G in the next couple of years. Apart from improving multimedia streaming, 5G aims to make the augmented and virtual reality experience smoother. At the moment, only a few carriers including AT&T, Sprint, T-Mobile, Verizon and some smaller networks offer 5G, but only in major metros.

Utilizes a person’s unique biological traits to record and confirm their identity.

This technology involves the use of biological elements such as finger/palm prints, face, iris/retina, DNA, vein geometry, and even scent/odor. Voice, signature, gait, heartbeat, and keystroke are some behavioral characteristics used in biometrics. Numerous organizations typically apply biometrics in forensic sciences, diagnostic methods, computer and smartphone security, and home entertainment and automation.

Instead of metal wires, glass or plastic fibers are used to transmit data in this technology.

Fiber optic technology supports transmitting a higher capacity of network bandwidth as compared to copper wires. Moreover, since it covers longer distances without squandering its strength, the need for signal boosters is lowered. Also, unlike copper wires, fiber optic cables are less likely to suffer from electromagnetic interference owing to the multiple layers of protection.

Uses an Internet bot to track and collect URLs so that they can be indexed on a search engine.

Crawling is an integral part of web search engines as they help index the web entries. Web archiving is another job of crawlers that comprises the periodic collection and archiving of huge volumes of webpages. They are also employed in data mining where webpages are analyzed for multiple properties including statistics which help in performing data analytics.

This technology helps you establish an encrypted Internet connection over less-secure networks.

A virtual private network (VPN) shields your privacy by disguising your real IP address and location and by sheathing all your Internet traffic via a private channel. This channel further protects your Internet traffic and personal information by encrypting it, making it virtually impossible for hackers to access it from outside.

A multidisciplinary science that studies individual atoms and molecules.

Nanotechnology can be described as a hybrid science that combines chemistry and engineering for designing computer chip layouts and production of polymers. Also, many real-world applications involve the use of colloidal nanoparticles in bulk form for products like protective coatings, stain resistant clothing, and suntan lotions.

Using quantum mechanics, this computing technology has set the stage for a new generation of supercomputers.

Existing mainstream computer technologies will need billions of years to find solutions for the world's most challenging issues. On the other hand, quantum computing can help us solve problems in only minutes, hours, or even days. This advanced technology can allow scientists to create new materials, develop better medicines, accelerate artificial intelligence growth, and even answer some intriguing questions about the universe.

Napster pioneered this type of “sharing” on the Internet.

Napster, the music sharing platform, popularized the concept of peer-to-peer (P2P) technology back in 1999. Since then this medium has enabled millions of Internet users to connect, form groups and communities, and collaborate with one another. The most well-known P2P services are Kazaa, LimeWire (shut down in 2010) and BitTorrent.

Tom Cruise uses this technology in Minority Report to pull up information about suspects on a glass display.

Apart from enhancing the augmented reality experience in gaming, gesture recognition technology is increasingly being used in many industries. IT giants like Intel and Microsoft are applying this sensory technology to improve efficiency in healthcare technology. Likewise, Italian startup Limix is using gesture technology to record sign language and translate it into words that are then played by a smartphone voice synthesizer.

Showcased in the 1992 movie “Lawnmower’s Man,” this is one of the hottest techs in gaming and movies today.

Commonly, virtual reality (VR) technology is considered to be instrumental in creating an intense gaming experience despite having numerous other real-world applications. Currently, VR technology is also employed to develop interactive training and educational programs, marketing strategies for sales and promotions, and engineering and design endeavors in auto and architecture.

Which of these technologies covers vast distances and offers high-speed internet like broadband?

WiMAX devices can cover a radius of almost 30 miles. In a nutshell, WiMAX is like a one enormous hotspot. Apart from being flexible and cheap, it can be installed quickly as it employs shorter towers and uses less cabling.

A high-capacity optical disk technology developed to record, rewrite, and playback HD videos.

This technology is named after the blue-violet laser used to read Blu-ray discs. The blue laser allows you to store more information at a greater density than the DVD's red laser. To elaborate, a DVD can store 15 GB per layer, while single-layer Blu-ray discs can store 25 GB and double layer iterations can support up to 50 GB.

This technology emphasizes on the study of living organisms to help improve human life.

Biotechnology has played an instrumental role in healthcare by engineering genetic cures, life-saving vaccines, and antibiotics. This technology is also widely applied in fermenting processes for various foodstuffs and used to develop new varieties of crops, biofuels, and chemicals.

This is currently one of the fastest and most popular wireless means of transmitting data.

At the moment, devices like mobile phones, printers, gaming consoles, digital radios, scanners, tablets laptops, and televisions support WiFi. Manufacturers are even coming up automobiles, cameras, and refrigerators that can be paired using this technology. In a nutshell, there is an infinite array of possibilities that WiFi can be part of.

Can you guess these technologies?

18th July, 2019

Things have become much simpler for many of us as the complex codes of machines have made their way into our lives. Honestly, we are surrounded by so much technology that it's hard to gauge what's what! You think you can? If yes, then take the challenge and see how many of these technologies you can guess correctly.

Can you guess these technologies?
Can you guess these technologies?
0/30
Can you guess these technologies?
7th May, 2024
Share your results: