IS Exam 2 Chapter 10
What other purpose can SixthSense technology serve? (a) Being a fifth sense to those who are missing one. (b) Making it easier to text and drive without getting caught. (c) Removing the need for a traditional cellular phone. (d) Helping pediatricians make informed decisions.
(a) Being a fifth sense to those who are missing one.
NTT DoCoMo is headquartered in which country? (a) Iran. (b) Japan. (c) China. (d) Korea.
(b) Japan.
_____ networks use multiple Wi-Fi access points to create a wide area network. a) Mesh b) Pervasive c) Global d) Fixed e) Ubiquitous
a) Mesh
The major problem with RFID has been: a) expense b) bandwidth c) location d) RFID readers e) RFID tags
a) expense
Which type of satellite has the shortest orbital life? a) low earth orbit b) medium earth orbit c) geostationary d) polar orbit e) equatorial orbit
a) low earth orbit
Which type of satellite requires the highest number of satellites to cover the earth? a) low earth orbit b) medium earth orbit c) geostationary d) polar orbit e) equatorial orbit
a) low earth orbit
Mobile computing has two major characteristics that differentiate it from other forms of computing. What are these two characteristics? a) mobility, broad reach b) mobility, lack of expense c) security, broad reach d) security, mobility e) broad reach, localization
a) mobility, broad reach
Mobile computing a) refers to a real-time, wireless connection between a mobile device and other computing environments, such as an intranet. b) refers to e-commerce transactions that are conducted with a mobile device. c) means that virtually every device has processing power with wireless or wired connections to a global network. d) None of these statements are correct.
a) refers to a real-time, wireless connection between a mobile device and other computing environments, such as an intranet.
Which of the following is not a mobile application in financial services? a) transaction processing systems b) mobile banking c) wireless electronic payment systems d) micropayments e) wireless wallets
a) transaction processing systems
_____ is a wireless standard that enables temporary, short-range connection between mobile devices. a. Bluetooth b. Wireless application protocol c. Short message service d. Wi-Fi e. Global positioning system
a. Bluetooth
The major problem with RFID has been _______. a. Expense b. Bandwidth c. Location d. RFID readers e. RFID tags
a. Expense
The report you read from 2008 in this activity suggested which of the following was a major trend at the time? (a) Going paperless. (b) Cloud computing. (c) USB thumb drives. (d) External hard drives.
(a) Going paperless.
According to the article on the security issues for mobile phones, which of the following will be an important security feature for mobile phones for sensitive applications such as mobile banking? (a) RFID technology. (b) Fingerprinting and biometrics. (c) IP profiling. (d) Electronic cell phone lock.
(b) Fingerprinting and biometrics.
Identifying IT trends and determining which ones are most beneficial and can help an organization to keep from doing what? (a) Jumping off the latest IT bandwagon. (b) Jumping on the latest IT bandwagon. (c) Preferring to be a late adopter. (d) Just watching and mirroring the competition.
(b) Jumping on the latest IT bandwagon.
Wi-Fi sets up a wireless local area network (WLAN). Bluetooth sets up a (a) Wireless personal area network (WPAN). (b) Personal area network (PAN). (c) Impersonal area network (IAN). (d) My area network (MAN).
(b) Personal area network (PAN).
One of the concerns of Sixth Sense technology is that it can easily project information in public places thus violating (a) Government law (b) Privacy issues. (c) Knowledge access. (d) Face-to-face communications.
(b) Privacy issues.
Which of the following is difficult to measure concerning technology? (a) Net profit. (b) Net loss. (c) Return on investment. (d) Total cost.
(c) Return on investment.
Cell phone providers are working together to create a database of (a) Consumer information. (b) Consumers who always seems to "lose" their phones. (c) Stolen cell phones. (d) Cell phones given as a gift.
(c) Stolen cell phones.
In what order are the technologies used to play Pandora over a factory radio as described by the author? (a) Wi-Fi—3G—FM—Bluetooth. (b) 3G—FM—Bluetooth—Wi-Fi. (c) FM—Bluetooth—Wi-Fi—3G. (d) 3G—Wi-Fi—Bluetooth—FM.
(d) 3G—Wi-Fi—Bluetooth—FM.
The activity refers to a chart that displays the advancing roles of the mobile phone. Which of the following is not on the chart? (a) Communication. (b) Information access. (c) Life assistance. (d) Spiritual assistance.
(d) Spiritual assistance.
The service NTT DoCoMo offered in 1999 to revive its flattening sales was called (a) U-Service. (b) i-Service. (c) Edna Mode. (d) i-Mode.
(d) i-Mode.
The two major characteristics that differentiate mobile computing from other forms of computing are ______ and ________. a. Mobility, broad reach b. Mobility, lack of expense c. Security, broad reach d. Security, mobility e. Broad reach, localization
a. Mobility, broad reach
_____, with the shortest range of any wireless network, is designed to be used with contactless credit cards. a. Near-field communications b. Bluetooth c. Ultra-wideband d. Wi-Fi e. Infrared
a. Near-field communications
Unfortunately, many managers consider smart phones as only _____, rather than as _____ that can transmit wirelessly. a. Phones, digital cameras b. Phones, pagers c. Digital cameras, phones d. Digital cameras, pagers e. Cheap, expensive devices
a. Phones, digital cameras
The greatest problem with GEO satellites is which of the following? a. Propagation delay b. Expense c. Orbital life d. Size of the footprint e. Relative speed with respect to a point on the earth's surface
a. Propagation delay
In _____, a person or a device intentionally or unintentionally interferes with your wireless network transmissions. a. RF jamming b. War driving c. Eavesdropping d. Telemetry e. Installing rogue access devices
a. RF jamming
_____ is the science that measures physical remoteness by means of wireless transmission from a remote source to a receiving station. a. Telemetry b. Wireless access point c. Near-field communications d. Microwave e. Wireless positioning
a. Telemetry
Which of the following is not a mobile application in financial services? a. Transaction processing systems b. Mobile banking c. Wireless electronic payment systems d. Micropayments e. Wireless wallets
a. Transaction processing systems
A wireless sensor network a) uses satellites to enable users to determine their position anywhere on earth. b) consists of interconnected, battery-powered motes that relay data to other motes. c) is a type of transmission that uses red light that is not commonly visible to human eyes. d) is a type of chip technology that enables short-range data and voice connections between wireless devices.
b) consists of interconnected, battery-powered motes that relay data to other motes.
The major security threats to wireless communications include a) rogue access points, telemetry, and WSNs b) rogue access points, war driving, and eavesdropping c) rogue access points, telemetry and eavesdropping d) rogue access points, WSNs, and RF jamming
b) rogue access points, war driving, and eavesdropping
Eavesdropping refers to a) locating WANs while driving or walking and using a wireless-enabled computer to intrude into the network. b) unauthorized users accessing data that are traveling over wireless networks. c) a person or device that intentionally or unintentionally interferes with wireless network transmissions. d) Making private wireless communications available to the public.
b) unauthorized users accessing data that are traveling over wireless networks.
_____ communicate(s) via radio waves using radio antennas placed within adjacent geographic areas. a. Bluetooth b. Cell phones c. A satellite d. Ultra-wideband e. Near-field communications
b. Cell phones
Although rogue access devices can be installed innocently, they can also be installed by an attacker trying to gain unauthorized access to a wireless network. In such cases, these devices are called an _____. a. Unencrypted node b. Evil twin c. Open node d. Illegal server e. Unauthorized rogue access point
b. Evil twin
A small geographical perimeter within which a wireless access point provides service to a number of users is called a ________. a. Transceiver b. Hotspot c. Local reception node d. Wireless network e. GPS location
b. Hotspot
What would be the best use of RFID in a business? a. Transaction processing b. Supply chain management c. Personnel tracking d. Enabling communications with customers e. Decreasing network costs
b. Supply chain management
_____ refer(s) to the wireless communication of location-based information and control messages to and from vehicles and other mobile assets. a. Location-based services b. Telematics c. Pervasive services d. RFID e. Wi-Fi
b. Telematics
Sense networks track users via all of the following technologies except _______. a. GPS b. Traffic cameras c. Cell towers d. Wi-Fi networks e. None of the above
b. Traffic cameras
The act of locating wireless local area networks while moving around a city is called ____. a. Eavesdropping b. War driving c. RF jamming d. Cybersquatting e. Installing rogue access devices
b. War driving
The main problem with radio transmission is which of the following? a. Radio waves cannot travel through walls. b. When you travel too far from the source, the signal fades. c. Devices are difficult to install. d. Radio waves are slow. e. Devices are expensive to install.
b. When you travel too far from the source, the signal fades.
Parking meters that you can pay via your mobile telephone are an example of _________. a. Mobile banking b. Wireless electronic payment c. Wireless wallets d. Brokerage service e. Money transfer
b. Wireless electronic payment
All of the following wireless media require an unobstructed line of sight except a) Microwave b) Satellite c) Radio d) Infrared
c) Radio
A device that plugs into an iPad to accept credit cards is called a(n): a) Tweet b) Circle c) Square d) Rectangle
c) Square
Telemetry is a) a real-time connection between a mobile device and other computing environments, such as the Internet. b) mobile commerce transactions that are conducted with a mobile device. c) The wireless transmission and receipt of data gathered from remote sensors. d) a technology that allows users to make purchases with a single click from their mobile devices.
c) The wireless transmission and receipt of data gathered from remote sensors.
Which of the following is the most appropriate wireless technology for real-time location of caregivers and mobile equipment in health-care environments? a) Wi-Fi b) Microwave c) Ultra wideband d) Infrared e) Bluetooth
c) Ultra wideband
RF jamming refers to a) locating WANs while driving or walking and using a wireless-enabled computer to intrude into the network. b) unauthorized users accessing data that are traveling over wireless networks. c) a person or device that intentionally or unintentionally interferes with wireless network transmissions. d) Making private wireless communications available to the public.
c) a person or device that intentionally or unintentionally interferes with wireless network transmissions.
With which type of satellite is there a propagation delay? a) low earth orbit b) medium earth orbit c) geostationary d) polar orbit e) equatorial orbit
c) geostationary
Pervasive computing a) refers to a real-time, wireless connection between a mobile device and other computing environments, such as an intranet. b) refers to e-commerce transactions that are conducted with a mobile device. c) means that virtually every device has processing power with wireless or wired connections to a global network. d) None of these statements are correct.
c) means that virtually every device has processing power with wireless or wired connections to a global network.
Using your cell phone to purchase a Coke from a vending machine is an example of: a) mobile banking b) wireless wallet c) micropayment d) brokerage service e) money transfer
c) micropayment
Wireless broadcast media include a) satellites, radios, and fiber-optic cable b) RFID transmitters, satellites, and fiber-optic cable c) radios, TV remotes, and satellites d) fiber-optic cable, infrared, and GPS
c) radios, TV remotes, and satellites
The advantages of RFID tags to Staples include all of the following except: a) accurate inventory b) precise location of each item in stores c) reduced transaction costs at checkout d) movement history of each item through the store to moment of sale e) labor savings
c) reduced transaction costs at checkout
_____ refers to efforts by unauthorized users to access data traveling over wireless networks. a. RF jamming b. War driving c. Eavesdropping d. Telemetry e. Installing rogue access devices
c. Eavesdropping
The area of the earth reached by a satellite's transmission is referred to as its _____. a. Hotspot b. Coverage c. Footprint d. Zone e. Wireless area
c. Footprint
Which type of satellite has the largest footprint? a. Low-earth-orbit b. Medium-earth-orbit c. Geostationary d. Polar orbit e. Equatorial orbit
c. Geostationary
The development of mobile commerce is driven by all of the following factors except: a. The widespread availability of mobile devices. b. The cell phone culture. c. Increasing prices d. Bandwidth improvement. e. It eliminates the need for a PC.
c. Increasing prices.
Which of the following is not inhibiting faster Wi-Fi expansion? a. Users cannot roam from hotspot to hotspot if the hotspots use different Wi-Fi network services. b. A lack of security. c. The growth of WiMAX d. Unless the service is free, users have to log on to separate accounts for each hotspot. e. Wi-Fi services may not survive in the face of free hotspot access.
c. The growth of WiMAX
Of the following, which is the major problem with smart phones? a. They are too slow. b. They are too expensive. c. They can be used to compromise security. d. Their screens are too small. e. Their browsers are not fully functional.
c. They can be used to compromise security
Which of the following is not a limitation of barcodes? a. They require line-of-sight to the scanning device. b. They are printed on paper. c. They identify the manufacturer, product, and item. d. They are difficult to use in a manufacturing plant. e. They are useless in determining expiration date.
c. They identify the manufacturer, product, and item.
Which of the following is the most appropriate wireless technology for real-time location of caregivers and mobile equipment in healthcare environments? a. Wi-Fi b. Microwave c. Ultra-wideband d. Infrared e. Bluetooth
c. Ultra-wideband
_____ networks collect data from many points over an extended space. a. Bluetooth b. Ultra-wideband c. Wireless sensor d. WiMAX e. Wi-Fi
c. Wireless sensor
The rapid development of m-commerce is driven by a) Widespread familiarity with communication via cell phones. b) The decreasing costs of wireless devices. c) The availability of greater bandwidth. d) All of these.
d) All of these.
Which of the following characteristics distinguishes mobile computing from other forms of computing? a) Mobile computing offers greater security. b) Connectivity is slower but more reliable than in other forms of computing. c) Mobile computing is limited to relatively short SMS messages. d) Customized information can be sent to individuals as an SMS.
d) Customized information can be sent to individuals as an SMS.
Which of the following wireless broadcast media do global positioning systems (GPSs) use? a) RFID chips and readers to track automobiles b) Microwave signals to determine longitude and latitude of objects c) Radio signals to determine positions and to "talk" to drivers with directions d) Medium earth orbit (MEO) satellites
d) Medium earth orbit (MEO) satellites
_____ is the standard that enables wireless devices to access Web-based information and services. a) TCP/IP b) Ethernet c) World Wide Web d) Wireless Application Protocol e) T-Carrier
d) Wireless Application Protocol
A(n) _____ is a new class of digital communication device that provides an organizer, cell phone, digital camera, access to e-mail, Internet access, and short message service. a) Blackberry b) pager c) personal digital assistant d) smart phone e) cell phone
d) smart phone
A transmitter with an antenna that connects a mobile device to a wired local area network is called a(n): a) transceiver b) transmitter c) radio d) wireless access point e) hotspot
d) wireless access point
104. Today, most wireless local area networks use the _____ standard, which can transmit up to 54 Mbps and has a range of about 300 feet. a. 802.11a b. 802.11b c. 802.11c d. 802.11g e. WiMAX
d. 802.11g
Which of the following is the most appropriate wireless networking standard for creating personal area networks? a. Wi-Fi b. Cellular radio c. Microwave d. Bluetooth e. WiMAX
d. Bluetooth
The capabilities of smart phones include all of the following except _________. a. A calculator b. E-mail c. A global positioning system d. Corporate transaction processing e. A full-function Internet browser
d. Corporate transaction processing
Putting ads on top of taxicabs in New York City that change as the cabs travel around the city is an example of ________. a. Viral marketing b. Permission advertising c. Geographical advertising d. Location-based advertising e. Direct marketing
d. Location-based advertising
Which of the following is not an advantage of radio? a. No metallic wires are needed. b. Radio waves propagate easily through office walls. c. Radio devices are inexpensive. d. Radio waves do not create electrical interference problems. e. Radio devices are easy to install.
d. Radio waves do not create electrical interference problems.
The generic term for technologies that use radio waves to automatically identify individual items is __________. a. Telemetry b. Bar codes c. Shipping labels d. Radio-frequency identification e. Wireless access points
d. Radio-frequency identification
Mobile applications in financial services include which of the following? a) mobile banking b) wireless electronic payment systems c) micropayments d) brokerage services e) all of the these
e) all of the these
A(n) _____ allows unauthorized entry into a wireless network. a) lack of encryption b) disgruntled employee c) open node d) illegal server e) rogue access point
e) rogue access point
Individuals are finding it convenient and productive to use wireless devices for which of the following reasons? a. To make use of time that was formerly wasted b. To become more efficient c. Work locations are more flexible d. To be able to allocate working time around personal and professional obligations e. All of the above
e. All of the above
_____ is a satellite-based tracking system that enables users to determine a person's position. a. Bluetooth b. Wireless application protocol c. Short message service d. Wi-Fi e. Global positioning system
e. Global positioning system
Microwave transmission systems are used for _____ volume, _____ distance, _____ communications. a. Low, long, broadcast b. Low, short, line-of-sight c. High, long, broadcast d. High, short, broadcast e. High, long, line-of-sight
e. High, long, line-of-sight
The most common wireless technology for TV and DVD remote control devices is _______. a. Bluetooth b. Ultra-wideband c. Near-field communications d. WiMAX e. Infrared
e. Infrared
With regard to mobile computing, _____ means that knowing where a user is physically located is a key to offering relevant products and services. a. Ubiquity b. Convenience c. Instant connectivity d. Personalization e. Localization of products and services
e. Localization of products and services
A(n) _____ allows unauthorized entry into a wireless network. a. Lack of encryption b. Disgruntled employee c. Open node d. Illegal server e. Rogue access point
e. Rogue access point
Which of the following statements about Wi-Fi is not correct? a. Wi-Fi provides simple Internet access. b. Laptop PC scans contain chips that can send and receive Wi-Fi signals. c. Many companies offer free Wi-Fi access in their stores. d. Wi-Fi requires encryption for secure transmissions. e. Wi-Fi is expensive to set up.
e. Wi-Fi is expensive to set up.
The _____ standard can transmit up to 75 Mbps and has a range of 31 miles. a. Wi-Fi b. 802.11b c. 802.11c d. 802.11g e. WiMAX
e. WiMAX
If you buy a hot dog at a concession stand using your contactless credit card, you are using a ________. a. Wireless money transfer b. Wireless wallet c. Wireless bill payment d. Micropayment e. Wireless electronic payment system
e. Wireless electronic payment system