Chapter 8 Quiz - Management Information Systems
________ refers to efforts by unauthorized users to access data that are traveling over wireless networks.
Eavesdropping
________ is designed to be embedded in mobile devices and can be used with mobile wallets. It is a _________-range wireless network technology.
NFC; short
Which of the following is FALSE of QR codes?
QR codes are larger than bar codes because they store information both horizontally and vertically.
Marc leaves a store in the mall and sets off the alarm. This is because the cashier likely left the ___________ on the item Marc purchased.
RFID tag
_________ is a system in which any object, natural or manmade, has a unique identity and is able to send and receive information over a network without human interaction.
The ioT
You want to be able to track the pencils in your store because they seem to be disappearing. You would want to mark the pencils with ________.
passive RFID codes.
________ is a short-range wireless network.
Bluetooth
________ is the wireless transmission and receipt of data gathered from remote sensors.
Telemetry
________ is the amount of bandwidth actually available for you to use.
Throughput
If you bring your own router to school to set-up Wi-Fi but do not have permission from your university to do this, this is ________.
a rogue access point
Find My iPhone is an example of ________.
telemetry
________ use internal batteries for power, and they broadcast radio waves to a reader.
Active RFID codes
________ transmission systems can have a large coverage area but encryption must be used for security.
Satellite
GPS uses the known speed of the signals and distance from ________ satellite(s) to find the location of a receiving station or user.
3G
_______ cellular networks use digital signals and can transmit voice and data at different speeds based on how fast the user is moving; it supports video, web browsing, and instant messaging.
3G
________ does NOT have an important role in the Internet of Things.
Ipv4
________ is a medium-range wireless network.
Wi-Fi
Your actual download speed is determined by ________.
throughput
The biggest problem with using wireless networks is ________.
security
RFID was developed to replace ________.
bar codes