i. Military
The usage of VR in a training perspective is to allow professionals to conduct training in a
virtual environment where they can improve upon their skills without the consequence of failing
the operation.
VR plays an important role in combat training for the military. It allows the recruits to train
under a controlled environment where they are to respond to different types of combat situations.
A fully immersive virtual reality that uses Head-mounted display (HMD), data suits, data glove,
and VR weapon are used to train for combat. This setup allows the training's reset time to be cut
down, and allows more repetition in a shorter amount of time. The fully immersive training
environment allows the soldiers to train through a wide variety of terrains, situations and
scenarios.
VR is also used in flight simulation for the Air Force where people are trained to be pilots. The
simulator would sit on top of a hydraulic lift system that reacts to the user inputs and events.
When the pilot steer the aircraft, the module would turn and tilt accordingly to provide haptic
feedback. The flight simulator can range from a fully enclosed module to a series of computer
monitors providing the pilot's point of view. The most important reasons on using simulators
over learning with a real aircraft are the reduction of transference time between land training and
real flight, the safety, economy and absence of pollution. By the same token, virtual driving
simulations are used to train tank drivers on the basics before allowing them to operate the real
vehicle. Finally, the same goes for truck driving simulators, in which Belgian firemen are for
example trained to drive in a way that prevents as much damage as possible. As these drivers
often have less experience than other truck drivers, virtual reality training allows them to
compensate this. In the near future, similar projects are expected for all drivers of priority
vehicles, including the police.
Medical personnel are able to train through VR to deal with a wider variety of injuries. An
experiment was performed by sixteen surgical residents where eight of them went through
laparoscopic cholecystectomy through VR training. They then came out 29% faster at
gallbladder dissection than the controlled group.
VR application was used to train road crossing skills in children. It proved to be rather
successful. However some students with autistic spectrum disorders after such training might be
unable to distinguish virtual from real. As a result, they may attempt quite dangerous road
crossings.
ii. Education
Strides are being made in the realm of education, although much needs to be done. The
possibilities of VR and education are endless and bring many advantages to pupils of all ages.
Few are creating content that may be used for educational purposes, with most advances being
made in the entertainment industry, but many understand and realize the future and the
importance of education and VR.
iii. Medicine
virtual reality is used in many areas of healthcare which range from diagnosis, treatment, e.g.
surgery, rehab and counselling. it is also used to train the next generation of doctors, paramedics
and other medical personnel and has shown a range of benefits from doing so.
so what are the advantages of virtual reality in healthcare? there are several which are related to
medical/surgical training, preventative medicine, counselling and architectural design of new
hospitals.
Kavungya answered the question on May 14, 2019 at 11:35
- The information and connectivity of the internet have unique characteristics.
Briefly explain four such characteristics.(Solved)
The information and connectivity of the internet have unique characteristics.
Briefly explain four such characteristics.
Date posted: May 14, 2019. Answers (1)
- Briefly explain the meaning of the following terms as used in the context of information sharing:
(i) Bandwidth.
(ii) Browsing.
(iii) User net newsgroup.
(iv) File transfer protocol.(Solved)
Briefly explain the meaning of the following terms as used in the context of information sharing:
(i) Bandwidth.
(ii) Browsing.
(iii) User net newsgroup.
(iv) File transfer protocol.
Date posted: May 14, 2019. Answers (1)
- Explain four benefits of e-government.(Solved)
Explain four benefits of e-government.
Date posted: May 14, 2019. Answers (1)
- State three examples of internet service providers in your country.(Solved)
State three examples of internet service providers in your country.
Date posted: May 14, 2019. Answers (1)
- Highlight four factors that determine the downloading speed of a file from a website.(Solved)
Highlight four factors that determine the downloading speed of a file from a website.
Date posted: May 14, 2019. Answers (1)
- "The practice of telecommuting has ensured that there exists a thin line between work,,
family and leisure". In relation to the above statement, evaluate the merits...(Solved)
"The practice of telecommuting has ensured that there exists a thin line between work,,
family and leisure". In relation to the above statement, evaluate the merits and demerits of
telecommuting.
Date posted: May 14, 2019. Answers (1)
- Highlight four social-economic challenges brought about by the rapid advancements in
internet technology.(Solved)
Highlight four social-economic challenges brought about by the rapid advancements in
internet technology.
Date posted: May 14, 2019. Answers (1)
- Highlight four functions of an internet service provider (ISP)(Solved)
Highlight four functions of an internet service provider (ISP)
Date posted: May 14, 2019. Answers (1)
- In relation to internet technology, briefly describe the importance of each of the following:
i. Web server.
ii. Web browser.
iii. HTML.
iv. Cyber cafe(Solved)
In relation to internet technology, briefly describe the importance of each of the following:
i. Web server.
ii. Web browser.
iii. HTML.
iv. Cyber cafe
Date posted: May 14, 2019. Answers (1)
- (a) Briefly describe the flowing terms in relation to computer networking
i. Intranet. .
ii. Extranet,
iii. Global system for mobile (GSM) communication.
iv. Bluetooth.
(b) Explain the role of...(Solved)
(a) Briefly describe the flowing terms in relation to computer networking
i. Intranet. .
ii. Extranet,
iii. Global system for mobile (GSM) communication.
iv. Bluetooth.
(b) Explain the role of interface message processor (IMP) in a computer network.
Date posted: May 14, 2019. Answers (1)
- There is a global trend towards the adoption of digital data communication systems as opposed
to analog data communication systems.
Required:
Examine four advantages of digital data communication...(Solved)
There is a global trend towards the adoption of digital data communication systems as opposed
to analog data communication systems.
Required:
Examine four advantages of digital data communication systems over analog data
communication systems.
Date posted: May 14, 2019. Answers (1)
- a) Mr. Shadrack Kalamba a technician with Icon Systems Technology Ltd. is setting up a local
area network (LAN) for a client
Required:
i) Identify four network devices...(Solved)
a) Mr. Shadrack Kalamba a technician with Icon Systems Technology Ltd. is setting up a local
area network (LAN) for a client
Required:
i) Identify four network devices that he would use in setting up the LAN.
ii) State six advantages of a LAN.
b) Expound the following acronyms as used in computing:
i) TCP.
ii) FTP.
iii) HTTP.
iv) HTML.
v) WWW.
vi) IP.
Date posted: May 14, 2019. Answers (1)
- Transmission of data over computer networks raises certain security concerns.
Identify two possible causes of data insecurity and two mitigations that could be taken to secure
data.(Solved)
Transmission of data over computer networks raises certain security concerns.
Identify two possible causes of data insecurity and two mitigations that could be taken to secure
data.
Date posted: May 14, 2019. Answers (1)
- a) Define the term “world wide web”
b) The surface simplicity of the website is in fact that many individual protocols can be
contained within a single...(Solved)
a) Define the term “world wide web”
b) The surface simplicity of the website is in fact that many individual protocols can be
contained within a single website.
Required
i) Define the term “Protocol”
ii) Describe any four protocols used in the World Wide Web.
iii) Outline four ways of accessing web pages.
Date posted: May 14, 2019. Answers (1)
- Distinguish between synchronous and asynchronous data transmission modes.(Solved)
Distinguish between synchronous and asynchronous data transmission modes.
Date posted: May 14, 2019. Answers (1)
- i) Briefly explain the graphical user interface (GUI)
ii) State two reasons why a GUI is considered easier to use than a command line interface(Solved)
i) Briefly explain the graphical user interface (GUI)
ii) State two reasons why a GUI is considered easier to use than a command line interface
Date posted: May 14, 2019. Answers (1)
- Joyce Kubo is a Marketing Manager with Kay Ltd She intends to use her home computer to
connect to the company's network in order to analyse...(Solved)
Joyce Kubo is a Marketing Manager with Kay Ltd She intends to use her home computer to
connect to the company's network in order to analyse sales data but suspects that her home
computer might.be infected by computer viruses.
Required:
i) Illustrate any four unusual events that could alert Joyce Kubo of possible computer virus
infection.
ii) Suppose after completing her analysis, Joyce Kubo prepares her results in PDF file format
and posts them to the company's website.
Briefly explain two reasons why Joyce Kubo could prefer the PDF file format.
iii) Suppose Joyce Kubo intends to display her results using a presentation package.
Describe four precautions which Joyce Kubo should observe when putting text in
presentation.
Date posted: May 14, 2019. Answers (1)
- (i) Define the term "network firewall
(ii) Describe three advantages and three disadvantages of adopting hardware firewall.(Solved)
(i) Define the term "network firewall
(ii) Describe three advantages and three disadvantages of adopting hardware firewall.
Date posted: May 14, 2019. Answers (1)
- a) Distinguish between data privacy and data security,
b) Outline three countermeasures to information security threats,(Solved)
a) Distinguish between data privacy and data security,
b) Outline three countermeasures to information security threats,
Date posted: May 14, 2019. Answers (1)
- (i) Define the term "logical topology" as used in computer networks.
(i!) Explain two types of logical topologies.(Solved)
(i) Define the term "logical topology" as used in computer networks.
(i!) Explain two types of logical topologies.
Date posted: May 14, 2019. Answers (1)