MIS Chapter 7

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Location-based services (LBS)

applications that use location information to provide a service

Hotspots

designated locations where Wi-Fi access points are publicly available

Containerization

(application sandboxing), isolates corporate applications from personal applications on a device

smart phones

Offer more advanced computing ability and connectivity than basic cell phones

Global Positioning System (GPS)

Satellite-based system for determining the absolute location of places or geographic features.

Wide Area Network (WAN)

Spans a large geographic area such as a state, province, or country

Cartography

The science of making maps

Mobile Device Management (MDM)

a security strategy comprised of products and services that offer remote support for mobile devices, such as smart phones, laptops, and tablets

Wi-Fi Protected Access (WPA)

a wireless security protocol to protect Wi-Fi networks

Longitude

east to west

active RFID tags

have their own transmitter and a power source (typically a battery)

Wireless MAN (WMAN)

A metropolitan area network that uses radio signals to transmit and receive data. Have not been highly successful because they are not widely available

Geocoin

A round coin-sized object uniquely numbered and hidden in geocache

satellite

A space station that orbits the Earth receiving and transmitting signals from Earth-based stations over a wide area

Geocoding

A spatial databases coding process that assigns a digital map feature an attribute that serves as a unique ID or classification

RFID reader (RFID interrogator)

A transmitter/receiver that reads the contents of RFID tags in the area

digital divide

A worldwide gap giving advantage to those with access to technology

Local Area Network (LAN)

Connects a group of computers in close proximity, such as in an office building, school, or home

Megabit

Mb, 1Mbps= 1000 Kbps Traditional Ethernet= 10 Mbps Fast Ethernet = 100 Mps

Asset tracking

Occurs when a company places active or semi-passive RFID tags on expensive products or assets to gather data on the items' location with little or no manual intervention

Estimated time enroute (ETE)

The time remaining before reaching a destination using the present speed and is typically used for navigation applications

Voice over IP (VoIP)

Uses IP technology to transmit telephone calls

Bluetooth

Wireless PAN technology that transmits signals over short distances between cell phones, computers, and other devices

Data in motion

a stream of data that is moving or being transported between locations within or between computer systems

Mobile

means the technology can travel with the user

mapping quantities

users can map quantities to find out where the most or least of a feature map can be

Sending Information alerts

users may be notified when information relevant to them becomes available near their location

Kilobit

Kb, 1 Kbps= 1000 bps Traditional modem= 56 Kbps

war chalking

The practice of tagging pavement with codes displaying where Wi-Fi access is available

Worldwide Interoperability for Microwave Access (WiMAX)

a communications technology aimed at providing high-speed wireless data over metropolitan area networks.

accelerometer

a device that can measure the force of acceleration, wether caused by gravity or by movement

Progressive web application (PWA)

a website that looks and behaves as if it is a mobile application but it is just a normal website

Data at rest

all data in a computer storage

Voice over LTE (VoLTE)

allows mobile voice calls to be made over broadband networks, creating—under the right network conditions—clearer audio and fewer dropped calls

RFID tag

an electronic identification device that is made up of a chip and antenna

Wired Equivalent Privacy (WEP)

an encryption algorithm designed to protect wireless transmission data

Enterprise Mobility Management (EMM)

an enterprise wide security strategy to enforce corporate e-policies while enabling employee use of mobile devices such as smart phones and tablets

Secure hypertext transfer protocol (SHTTP or HTTPS)

combination of HTTP and SSL to provide encryption and secure identification of an Internet server

chipless RFID tags

use plastic or conductive polymers instead of silicon-based microchips, allowing them to be washed or exposed to water without damaging the chip

Geocache

A GPS technology adventure game that posts the longitude and latitude location for an item on the Internet for users to find

RFID accelerometer

A device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxi cab speeds

Metropolitan Area Network (MAN)

A large computer network usually spanning a city

Wireless LAN (WLAN)

A local area network that uses radio signals to transmit and receive data over distances of a few hundred feet

Wireless Fidelity (Wi-Fi)

A means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves

streaming

A method of sending audio and video files over the Internet in such a way that the user can view the file while it is being transferred.

Wireless WAN (WWAN)

A wide area network that uses radio signals to transmit and receive data. Can be divided into two categories: cellular communication systems and satellite communication systems

SSL Certificate

An electronic document that confirms the identity of a website or server and verifies that a public key belongs to a trustworthy individual or company

War driving

Deliberately searching for Wi-Fi signals while driving by in a vehicle

Mapping densities

GIS can map population and event densities based on a standard area unit, such as square miles, making it east to see distributions and concentrations

Gigabit

Gb, 1 Gbps= 1000 Mbps Gigabit Ethernet = 1000 Mbps

Attenuation

Loss of network signal strength measured in decibels (dBs) and occurs because the transmissions gradually dissipate in strength over longer distances or because of radio interference or physical obstructions such as walls

Estimated time of arrival (ETA)

The time of day of an expected arrival at a certain destination and is typically used for navigation applications

mobile application management (MAM)

a security strategy that administers and enforces corporate e-policies for applications on mobile devices

Mobile information management (MIM)

a security strategy that involves keeping sensitive data encrypted and allowing only approved applications to access or transmit it. MIM limits the sharing of corporate data among applications and ensures a secure information management strategy for mobile workforces

mobile application development

a set of processes and procedures involved in writing software for use on wireless devices

Secure Sockets Layer (SSL)

a standard security technology for establishing an encrypted link between a web server and a browser, ensuring that all data passed between them remain private

dual persona technology

creates two completely separate user interfaces on the same device, one for work and one for personal use

Streaming data

data captured with sensors, actuators, or other devices that are embedded in objects, smart machines, etc.

Data in use

data that is currently being updated, processed, erased accessed, or read by a system

Passive RFID tags

do not have a power source

Wireless Access Point (WAP)

enables devices to connect to a wireless network to communicate with each other

Net Neutrality

ensures that everyone - individual users and behemoth companies - is guaranteed equal access to the "pipes" we rely on to access cyberspace

Finding what is nearby

given a specific location, the GIS finds sources within a defined radius

Multiple-in/multiple-out technology (MIMO)

have multiple transmitters and receivers, allowing them to send and receive greater amounts of data than traditional networking devices

Spatial data (geospatial data or geographic information)

identifies the geographic location of features and boundaries on Earth

wifi infrastructure

includes the inner workings of a wifi service or utility, including the signal transmitters, towers, or poles, along with additional equipment required to send out a wifi signal

IT consumerization

is the blending of personal and business use of technology devices and applications.

pervasive computing

is the growing trend of embedding computer capabilities into everyday objects to make them effectively communicate and perform useful tasks in a way that minimizes the end user's need to interact with computers as computers

GIS map automation

links business assets to a centralized system where they can be tracked and monitored over time

3 primary areas of an enterprise mobility management strategy

mobile device management, mobile application management, mobile information management

Latitude

north and south

Edge matching (warping, rubber sheeting)

occurs when paper maps are laid edge to edge and items that run across maps but do not match are reconfigured to match

Routing Information

once users have an idea where they want to go, GIS can provide directions to get there using either a map or step-by-step instructions

Personal Area Network (PAN)

provides communication for devices owned by a single user that work over a short distance

repeater

receives and repeats a signal to reduce its attenuation and extend its range

Wireless

refers to any type of operation accomplished without the use of a hard-wired connection

bit

short for binary digit, the smallest unit of information on a machine

Geographic Information System (GIS)

stores, views, and analyzes geographic data, creating multidimensional charts or maps

5G

the 5th generation wireless broadband technology based on the 802.11ac standard engineered to greatly increase the speed and responsiveness of wireless networks

Mobile business

the ability to purchase goods or services through a wireless Internet-enabled device

Fast Data

the application of big data analytics to smaller data sets in near-real or real-time in order to solve a problem or create business value

Access Point (AP)

the computer or network device that serves as an interface between devices and the network

bandwidth

the maximum amount of data that can pass from one point to another in a unit of time

bit rate

the number of bits transferred or received per unit of time (bandwidth measured in)fba

radio access network (RAN)

the technology that connects individual devices to other parts of a network through radio connections

semi-passive RFID tags

use a battery to run the microchip's circuitry, but communicate by drawing power from the RFID reader

Radio Frequency Identification (RFID)

uses electronic tags and labels to identify objects wirelessly over short distances


Ensembles d'études connexes

Chapter 26: Disorders of blood flow

View Set

Mission 6: Properties of Numbers

View Set

500149 Hazardous Waste Management Training Course

View Set

IB Chapter 8: Foreign Direct Investment

View Set

Ethical Hacking Chapter 1, Ethical Hacking Chapter 2, Ethical Hacking Chapter 3, Ethical Hacking Chapter 4, Ethical Hacking Chapter 5

View Set