DSIM chapter 7

¡Supera tus tareas y exámenes ahora con Quizwiz!

__________ is a wireless PAN technology that transmits signals over short distances among cell phones, computers, and other devices.

Bluetooth

What uses plastic or conductive polymers instead of silicon-based microchips, allowing them to be washed or exposed to water without damaging the chip?

Chipless RFID tags

What are designated locations where Wi-Fi access points are publicly available?

Hotspots

What is a security strategy that involves keeping sensitive data encrypted and allowing only approved applications to access or transmit it?

Mobile information management

________ uses electronic tags and labels to identify objects wirelessly over short distances. (Please use the acronym)

RFID

Select the two terms that represent a transmitter/receiver that reads the contents of RFID tags in the area.

RFID interrogator RFID reader

What is a transmitter/receiver that reads the contents of RFID tags in the area?

RFID reader

What is a combination of HTTP and SSL to provide encryption and secure identification of an Internet server?

SHTTP or HTTPS

What offers more advanced computing ability and connectivity than basic cell phones?

Smartphones

What identifies the geographic location of features and boundaries on Earth, such as natural or constructed features, oceans, and more?

Spatial data

What enables devices to connect to a wireless network to communicate with each other?

Wireless access point

Select the four wireless communication network categories.

Wireless wide area networks Personal area networks Wireless local area networks Wireless metropolitan area networks

What is another term for containerization?

application sandboxing

Data _______ refers to all data in computer storage.

at rest

What isolates corporate applications from personal applications on a device?

containerization

Mobile _________ management is a security strategy that administers and enforces corporate epolicies for application mobile devices.

device

____ data is the application of big data analytics to smaller data sets in near real or real time in order to solve a problem or create business value.

fast

Wireless ___________ is a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves.

fidelity

______ over LTE allows mobile voice calls to be made over broadband networks, creating clearer audio and fewer dropped calls.

fingerprint

________ over IP uses IP technology to transmit telephone calls.

voice

What is a deliberately searching for Wi-Fi signals while driving by in a vehicle?

war

What is the practice of tagging pavement with codes displaying where Wi-Fi access is available?

war chalking

What is an encryption algorithm designed to protect wireless transmission data?

WEP

What is a local area network that uses radio signals to transmit and receive data over distances of a few hundred feet?

WLAN

Wi-Fi __________ (please use the acronym) is a wireless security protocol to protect Wi-Fi networks.

WPA

What is a wide area network that uses radio signals to transmit and receive data?

WWAN

What is a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves?

Wi-Fi

What includes the inner workings of a Wi-Fi service or utility, including the signal transmitters, towers, or poles, along with additional equipment required to send out a Wi-Fi signal?

Wi-Fi infrastructure

What is a metropolitan area network that uses radio signals to transmit and receive data?

Wireless MAN

What is the fifth-generation wireless broadband technology based on the 802.11ac standard engineered to greatly increase the speed and responsiveness of wireless networks?

5G

____________ measures network performance and represents the maximum amount of data that can pass from one point to another in a unit of time.

Bandwidth

___________ (use acronym) uses GPS tracking to track vehicles.

AVL

What is measured in terms of bit rate (or data rate) or the number of bits transferred or received per unit of time?

Bandwidth

What creates two completely separate user interfaces on the same device, one for work and one for personal use?

Dual persona technology

What stores, views, and analyzes geographic data creating, multidimensional charts or maps?

GIS

What links business assets to a centralized system where they can be tracked and monitored over time?

GIS map automation

Select the three primary wireless business applications.

GIS, RFID, GPS

____________ (use acronym) applications use location information to provide a service.

LBS

A wireless _________ is a metropolitan area network that uses radio signals to transmit and receive data.

MAN

Select three common uses of GIS in a business.

Mapping quantities Sending information alerts Finding what is nearby

What is a security strategy that administers and enforces corporate epolicies for application mobile devices?

Mobile application management

What provides communication for devices owned by a single user that work over a short distance?

PAN

Select the three network categories.

WAN, LAN, MAN

Data _______ is a stream of data that is moving or being transported between locations within or between computer systems.

in motion

Data ________ is data that is currently being updated, processed, erased, accessed, or read by a system.

in use

A(n) __________ (one word) area network provides communication for devices owned by a single user that work over a short distance.

personal

What is a website that looks and behaves as if it is a mobile application, but it is just a normal website?

progressive web application

___________ is a method of sending audio and video files over the Internet in such a way that the user can view the file while it is being transferred.

streaming

An RFID ________ is an electronic identification device that is made up of a chip and antenna.

tag


Conjuntos de estudio relacionados

6.4 Intrusion Detection and Prevention

View Set

SOCI 261 Second Midterm Review (Concordia University)

View Set

International Business Practices

View Set

Microeconomics Chapter 16 Questions

View Set