flashcards (brainscape)
Which of the following is NOT a likely advantage of a persuasive virtual assistant over human persuaders?
1. Can be simultaneously used by lots of users.
2. Ability to continuously monitor the user 24/7 without getting fatigued.
3. Superior understanding of psychological nuances and social contexts.
4. Ability to process large amounts of health data for personalized analysis.
3
Context data must be coupled with the ability to interpret it. While virtual assistants can handle data processing and analysis of the context data, they still lack human-like common sense to fully comprehend psychological nuances, social norms and contexts that human persuaders would naturally possess. This is exactly the reason why we need “human-in-the-loop”. Therefore, 3 is the correct answer.
Which of the following are given as examples of a context-aware app where the app is designed to automatically do a command when certain contexts are met? (Select all that apply)
1. Active Badge system triggering reminders based on location
2. Geonotes for leaving location-based annotations
3. Siren app generating alerts for firefighters based on contexts
4. Cyberguide mobile tour guide providing contextual information
5. Automatic brightness adjustment based on ambient light levels
1 & 3
Based on the question explanation and the context-aware app design dimension, this app is categorized as “Context-triggered actions” where the design choices are “Automatic” and “Command”. Therefore, we should look at samples that correspond with those two design choices. 1. and 3. are the correct answers - The Active Badge and Siren app system using rules to trigger actions based on contextual conditions, so they belong “Automatic” and “Command” design dimension. The other choices are incorrect because they adopt a different choices in either design dimension.
According to Freeman Dyson, which of the following will contribute most to the new trends in science?
a) The development of new concepts
b) The introduction of new tools
c) Collaboration between different scientific disciplines
d) Government and institutional funding policies
b
According to Freeman Dyson, the aspect that most influences new directions in science is the introduction of new tools. Dyson, a renowned theoretical physicist and mathematician, emphasized the significant role that the development of new experimental and computational tools plays in driving scientific progress. While other factors like the development of new concepts, interdisciplinary collaboration, and funding policies are important, Dyson particularly highlighted how new tools can lead to groundbreaking discoveries and open up entirely new fields of study.
What is the correct functional triad for the ‘Baby Think It Over’ persuasive technology, designed to help teenage girls understand the challenges of caring for babies?
a) Tool: User behavior tracking; Medium: Baby simulator robot; Social Actor: Teenage girls
b) Tool: Educational messages; Medium: Baby simulator robot; Social Actor: Teenage girls
c) Tool: User behavior tracking; Medium: Interactive real-world simulation; Social Actor: Baby simulator robot
d) Tool: User behavior tracking; Medium: baby simulator robot; Social Actor: School teachers
c
The Tool in this case is user behavior tracking, implying that the technology keeps track of how the user interacts with and cares for the simulator. The Medium being an interactive real-world simulation means that the baby simulator provides a realistic experience of caring for a baby, allowing users to understand and respond to various scenarios in real time. The Social Actor as the robot (or the baby simulator) signifies that it is the entity through which the interaction occurs and upon which the user’s actions are focused.
Which of the following best describes the key difference between participatory and opportunistic mobile sensing paradigms?
a) Participatory sensing requires users to actively collect the sensor data, whereas opportunistic sensing relies on automatic sensor data collection without user intervention.
b) Participatory sensing only utilizes built-in smartphone sensors, while opportunistic sensing can incorporate external sensor devices.
c) Participatory sensing collects data automatically while opportunistic sensing relies on user involvement for high-quality data collection.
d) Participatory sensing focuses on collecting data for individual use, whereas opportunistic sensing is designed for large-scale data collection across multiple users or devices.
a
a) Correct
b) The distinction between participatory and opportunistic sensing is based on user involvement in data collection, not on the use of internal versus external sensors.
c) It is the opposite. Opportunistic sensing collects data automatically, and it is participatory sensing that relies on user involvement for high-quality data collection.
d) Both sensing paradigms can be scaled to individual or community levels. The defining factor of the two paradigms are their method of data collection, not the scale of deployment.
20235599
In the context of context-aware computing, which of the following best illustrates the use of context to enhance the effectiveness of persuasive technology?
a) Persuasive technology primarily uses the user’s current activity and environmental conditions to trigger contextually relevant behavioral suggestions.
b) Persuasive technology primarily relies on static user profiles and predetermined schedules for interventions.
c) Persuasive technology needs manual confirmation of the context from the users to be effective.
d) Persuasive technology applications avoid using sensor data from mobile devices to infer context, relying instead on explicit user settings.
a
a) Correct
b) Persuasive technology uses both static user profiles and dynamic contextual information to customize interventions, not just predetermined schedules.
c) While manual inputs can enhance context-aware computing, it primarily utilizes automatic sensing and data analysis to determine context in persuasive technology.
d) Persuasive technology often utilizes sensor data from mobile devices to infer context, enhancing interventions beyond what is possible with just explicit user settings.
Which of the following explanations is consistent with the definition of proper nouns?
a) Contexts: Contexts in one scenario can have some overlapped area, like persuasive technology being the overlapped area of computers and persuasion.
b) Proximate selection: This technology is aimed at making the located objects “emphasized” or “being easier to choose.”
c) Context-triggered actions: This technology is faced with one challenge in the accuracy of language for rules.
d) Persuasive technology: Nintendo’s Pocket Pikachu’s medium is raising a virtual pet.
b
In a given scenario, different contexts cannot have overlapping areas (for instance, in the context of indoor individuals, there is a distinction between sleeping and not sleeping, which are the only two mutually exclusive contexts in the awake state). Therefore, option (a) is incorrect. Option (b) reflects the verbatim content from the slides and is accurate. Option (c) refers to the expressiveness of language for rules rather than accuracy. Regarding option (d), “raising a virtual pet” pertains to the social actor, not the medium, making option (d) incorrect. So the correct answer is b.
Which of the following is the correct order of sensor data processing pipeline:
a) Data collection –> Model Building –> Segmentation –>Evaluation –> Feature Extration
b) Data collection –> Model Building –> Segmentation –> Feature Extration –> Evaluation
c) Model Building –> Segmentation –> Feature Extration –> Data Collection –> Evaluation
d) Data collection –> Segmentation –> Feature Extration –> Model Building –> Evaluation
The correct order in a sensor data processing pipeline is (d) which typically involves collecting data first, followed by segmentation, feature extraction, model building, and finally, evaluation. This sequence ensures that raw data is processed and refined before building a model and evaluating its performance.
20246104:
Which of the following is incorrect about advantages of persuasive technology over human persuaders? Persuasive technology a) Is less persistent than human beings b) Offers greater anonymity c) Scales more easily d) Goes where humans cannot go or may not be welcomed.
20246104:
The incorrect option is (a), computer technology is more persistent than human beings as the IT systems can operate 24/7 without any changes to its behaviours. Human beings can be influenced by other factors however, machines and are pre-programmed and therefore remain persistent through its life cycle unless manually altered.
Which of the following statements is incorrect about cyber-physical systems? (select one)
1. Digital transformation is used for managing interconnected systems between their physical assets and computational capabilities.
2. A rich variety of inputs and outputs, such as gesture input, voice commands, and wearable devices, are utilized.
3. The sensors primarily operate indoors to collect real-time data.
4. Data is gathered from cross-domain sensors and IoT devices, enabling data-driven intelligence.
5. Devices are available in diverse form factors, including smartphones, smart bulbs, and smart switches.
3
Transformative technologies are employed in cyber-physical systems to manage interconnected systems, integrating their physical assets with computational capabilities. These systems boast a diverse array of devices, leading to a rich variety of inputs and outputs. The vast amount of data collected from these inputs and outputs facilitates data-driven intelligence within cyber-physical systems. Notably, sensors in such systems can be installed both indoors and outdoors, depending on application requirements. Hence, option 3 is the correct answer.
Which of the following best describes the functional triads of persuasive technology? (select two)
1. The tool makes the target behavior more difficult to perform.
2. The medium provides users with unrealistic experiences that deter motivation.
3. The social factor performs calculations or measurements that motivate.
4. The medium assists users in exploring cause-and-effect relationships.
5. A social factor rewards users with positive feedback and models target behaviors.
4 & 5
The tool facilitates the target behavior, making it easier to perform, while the medium provides users with vicarious experiences that serve as motivation. Additionally, the tool performs calculations or measurements that motivate, and the medium enables users to explore cause-and-effect relationships. Moreover, a social factor rewards people with positive feedback and exemplifies target behaviors or attitudes. Therefore, options 4 and 5 are the correct answers.
20246104
Which statement is incorrect about the sensing paradigm? (Choose one)
a. Participatory sensing is entirely free from privacy issues.
b. Monitoring urban noise pollution by users measuring and sharing ambient noise (using their phone) is an example of participatory sensing.
c. Sensors installed in public transportation to automatically monitor passenger counts is a example of opportunistic sensing.
d. Opportunistic sensing minimize user data collection efforts.
20235599
Which statement is incorrect about the Sensing paradigm? (Choose one)
a. “Participatory” sensing is entirely free from privacy issues.
b. Monitoring urban noise pollution by users measuring and sharing ambient noise (using their phone) is an example of “Participatory” sensing.
c. Sensors installed in public transportation to automatically monitor passenger counts is a example of “Opportunistic” sensing.
d. “Opportunistic” sensing minimize user data collection efforts.
a
“Participatory “ sensing involves individuals actively engaging in data collection. However, even though users voluntarily collect data in participatory sensing, privacy issues can still arise regarding the protection and usage of the collected data. So, (a) is incorrect.
“Opportunistic” sensing means automated sensor data collection, which reduces the burden placed on the user. So (c) and (d) are correct.
Question:
In the context of context-aware computing, which of the following scenarios follow the definition of sensor fusion?
a) Utilizing a sophisticated algorithm to interpret data from a single high-precision accelerometer to determine the user’s physical activity.
b) Analyzing high-resolution video feeds from a single camera to deduce the user’s specific actions and environment.
c) Integrating input from a user’s keyboard strokes with application usage data to predict the user’s next task.
d) Synthesizing data from an array of sensors, including an accelerometer, GPS, and a light sensor, alongside ambient sound recordings to construct a detailed understanding of the user’s current context and environment.
d
Sensor fusion is defined as a fusion of multiple sensors to infer a user’s context. Here’s the breakdown of each option:
Option A: This option involves using data from only one sensor, an accelerometer, to predict the user’s activity. Since sensor fusion requires the integration of multiple sensor outputs, relying solely on an accelerometer does not qualify as sensor fusion.
Option B: Similar to Option A, this choice uses data from just one source, a camera, to interpret the user’s context. The absence of integration with other sensor data means this approach does not embody sensor fusion.
Option C: This option focuses on user input and collected data from the user’s interactions, which does not involve the integration of various sensor types. Sensor fusion aims to combine different sensory inputs to create a comprehensive context picture, which is not achieved by analyzing user input alone.
Option D: This is the correct choice for illustrating sensor fusion. It involves combining data from multiple sensors such as accelerometers, GPS, light sensors and ambient sound to form a detailed and nuanced understanding of the user’s environment and activities. This multi-sensor integration follows the definition of sensor fusion, leveraging the strengths of each sensor type to enhance context awareness.
Question: Which of the following best describes the advantage of persuasive computing over human persuaders? (select two)
A) Persuasive computing technologies cannot scale easily to reach a large audience.
B) They offer greater anonymity and can manage huge volumes of data.
C) They are less persistent than human beings in achieving behavioral changes.
D) They can use various modalities to influence, such as data, graphics, and simulations.
B, D
Persuasive computing has several advantages over human persuaders, including the ability to be more persistent, offer greater anonymity, manage vast amounts of data, and use multiple modalities to influence behavior. These technologies can scale easily and operate in environments where humans may not be welcome or cannot reach. The correct answers are B and D, highlighting the capabilities of persuasive computing to handle data and utilize various communication modalities to influence user behavior effectively.
Question: Which of the following is a primary type of social cue used by persuasive technology acting as social actors? (select one)
A) Offering discounts and rewards unrelated to user behavior.
B) Providing positive feedback and modeling target behavior or attitude.
C) Relying solely on text-based communication without feedback.
D) Avoiding any interaction that simulates human-like exchanges.
B
Persuasive technology can act as a tool, medium, or social actor. When acting as a social actor, it can be persuasive by rewarding users with positive feedback, modeling a target behavior or attitude, and providing social support. This approach leverages social cues, such as language use, social dynamics, and roles, to influence behavior. Therefore, B is the correct answer as it accurately reflects how persuasive technology uses social interactions to encourage changes in behavior or attitude.
A) Citizens voluntarily taking and uploading photos to assess the amount of trash in city parks
B) Software that automatically collects data to analyze users’ web browsing patterns
C) A mobile app where consumers scan the barcodes on food packaging to share nutritional information
D) A system that collects data from sensors installed in cars to monitor traffic conditions in a smart city
E) A feature on smartwatches that automatically collects data on an individual’s daily activity and sleep patterns
————————————————————————————–
1)A, B
2)A, C
3)A, B, D
4)C, E
5)C, D, E
2
In this question, A) and C) belong to the participatory sensing paradigm, involving activities where users voluntarily collect and share data. Both cases require active participation from the users.
On the other hand, B), D), and E) are examples of the opportunistic sensing paradigm. These represent methods that automatically collect data through sensors or software, rather than requiring direct user intervention.
Therefore, the correct pairing of options that belong to the same sensing paradigm is 2) A, C.
Question: The following are descriptions of elements from the Functional triads of persuasive technology.
Which is the correct order of elements to fill in the blanks?
Providing social support—1)_____
Helping people rehearse a behavior (simulating environment or objects)—2)_____
Making target behavior easier to do—3)_____
A) 1)Social actor, 2)Medium, 3)Tool
B) 1)Medium, 2)Social actor, 3)Tool
C) 1)Tool, 2)Social actor, 3)Medium
D) 1)Social actor, 2)Tool, 3)Medium
A
The correct answer is A) 1)Social actor, 2)Medium, 3)Tool. In persuasive technology, a Social actor provides social support, offering encouragement or empathy. A Medium lets people practice behaviors in a simulated setting, preparing them for real-life scenarios. A Tool simplifies the desired behavior, making it more accessible and easier to adopt. Each plays a unique role in influencing and guiding user behavior towards a targeted outcome.
Which of the following examples best represents the opportunistic sensing paradigm?
A) Residents using a mobile app to record and report noise levels in their neighborhoods.
B) Citizens collecting water samples and using a testing kit to assess water quality in local water bodies.
C) Automatically collecting GPS location traces from users’ smartphones for traffic analysis.
D) Users taking photos of overflowing garbage cans to actively report and manage waste disposal.
C
20235599
The opportunistic sensing paradigm involves automated sensor data collection without requiring active participation from users. In the given options, automatically collecting GPS location traces from users’ smartphones aligns with this definition. This method utilizes the built-in GPS capabilities of smartphones to passively gather location data as users move about, without having them to actively engage with a specific app or device. This data can then be used for various purposes such as traffic analysis, location-based services, or urban planning, making it a prime example of opportunistic sensing.
In the activity recognition process, which step involves identifying portions of data that are likely to contain information about activities?
A) Data acquisition and pre-processing
B) Data segmentation
C) Feature extraction
D) Model building and classification
B
Data segmentation is the step in the activity recognition process where portions of data likely to contain information about activities are identified. During this step, techniques such as sliding window and energy-based methods are employed to isolate relevant segments of sensor data. These segments are then used for further analysis in subsequent steps, such as feature extraction, to extract meaningful information for activity recognition. Therefore, data segmentation plays a crucial role in identifying and preparing the data for subsequent processing in the activity recognition pipeline.
In the context of acquiring context information for context-aware computing, which of the following is NOT listed as a method or tool for acquiring context?
A) Smart environment infrastructure, such as active badge systems for location information.
B) Mobile sensors embedded in devices for sensing motion, light, and other environmental factors.
C) Sensor fusion, combining data from multiple sensors to infer a user’s context.
D) Utilizing social media activity to directly infer a user’s current physical environment.
D
While social media can give away information about a user’s location, this information is not reliable as it is irregular data (if it even exists), the accuracy depends heavily on the user input and social media usage in general. Also, the up-to-dateness of the information can heavily vary.
Which of the following best describes the sensor data processing pipeline in IoT data science processes?
A) Collect -> Analyze -> Implement -> Monitor
B) Collect -> Segment -> Extract -> Classify
C) Identify -> Process -> Store -> Analyze
D) Sense -> Process -> Actuate -> Feedback
B
20246104
First the data needs to be collected. Then the data is segmented into windows. Features are extracted from each window. Finally, a classification algorithm is used to determine the activity.
Which of the following statements is NOT true about Mobile Sensing Architecture? (Select one)
- Mobile Sensing Architecture involves inform, share, and persuasion stages.
- The most labor-intensive work in sensor data science is the integration of sensor data.
- Data visualization is one of the representative methods for Share stage
- Supervised learning in mobile sensing requires the data to be hand-labeled.
- Persuasive technology systems aim to change user behavior by providing tailored feedback.
2
Mobile Sensing Architecture involves the sense, learn, inform, share, and persuasion stages. The most labor-intensive work in sensor data science is sensor data and label collection in the sense stage. The representative methods for the Share stage include data visualization, community awareness, social network use, etc. Supervised learning in mobile sensing requires the data to be hand-labeled, and unsupervised learning does not. Persuasive technology’s goal is to change users’ attitudes and behavior with tailored feedback. Therefore, the incorrect answer is number 2.
Which of the following pairs correctly match a context-aware application category with its characteristics? (Select two)
- Proximate selection: Automatic, Information.
- Contextual information: Automatic, Information.
- Automatic contextual reconfiguration: Automatic, Information.
- Context-triggered actions: Manual, Command.
- Contextual commands: Manual, Command.
3 & 5
Proximate selection is a user interface technique where the located-objects that are nearby are emphasized or otherwise made easier to choose. In general, proximate selection involves entering a “locus” and “selection.” According to the context, Contextual information displays information and Contextual Commands perform the command. they need to get information about the context manually. Automatic Contextual Reconfiguration detects the user’s context automatically and adjusts information accordingly. Context-triggered actions automatically execute a command when certain context conditions are met. Therefore, the correct answers are number 3 and 5.
20246104
Which of the following steps is NOT typically part of the sensor data processing pipeline in mobile sensing with smartphones?
A) Data Collection
B) Segmentation
C) Model Deployment
D) Feature Extraction
20235599
Which of the following steps is NOT part of the sensor data processing pipeline in mobile sensing with smartphones?
A) Data Collection
B) Segmentation
C) Receiving User Feedback
D) Feature Extraction
C
The sensor data processing pipeline in mobile sensing with smartphones consists of the following steps:
Data Collection: Gathering sensor data from various sources such as built-in sensors (e.g., accelerometer, GPS) on smartphones.
Segmentation: Organizing the collected data into meaningful segments or chunks for further analysis.
Feature Extraction: Extracting relevant features or characteristics from the segmented data to represent the underlying patterns or trends.
Model Building: Developing machine learning or statistical models using the extracted features to learn from the data.
Evaluation: Assessing the performance and effectiveness of the built models using validation techniques.
However, “Model Deployment” is not typically considered as part of the data processing pipeline. Model deployment involves implementing the trained model into a production environment where it can be used to make predictions or decisions based on new data. While it is an important step in the broader process of deploying a system or real-world use, it is not directly involved in the processing of sensor data itself.