Chapter 8 Quiz - Management Information Systems

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

________ refers to efforts by unauthorized users to access data that are traveling over wireless networks.

Eavesdropping

________ is designed to be embedded in mobile devices and can be used with mobile wallets. It is a _________-range wireless network technology.

NFC; short

Which of the following is FALSE of QR codes?

QR codes are larger than bar codes because they store information both horizontally and vertically.

Marc leaves a store in the mall and sets off the alarm. This is because the cashier likely left the ___________ on the item Marc purchased.

RFID tag

_________ is a system in which any object, natural or manmade, has a unique identity and is able to send and receive information over a network without human interaction.

The ioT

You want to be able to track the pencils in your store because they seem to be disappearing. You would want to mark the pencils with ________.

passive RFID codes.

________ is a short-range wireless network.

Bluetooth

________ is the wireless transmission and receipt of data gathered from remote sensors.

Telemetry

________ is the amount of bandwidth actually available for you to use.

Throughput

If you bring your own router to school to set-up Wi-Fi but do not have permission from your university to do this, this is ________.

a rogue access point

Find My iPhone is an example of ________.

telemetry

________ use internal batteries for power, and they broadcast radio waves to a reader.

Active RFID codes

________ transmission systems can have a large coverage area but encryption must be used for security.

Satellite

GPS uses the known speed of the signals and distance from ________ satellite(s) to find the location of a receiving station or user.

3G

_______ cellular networks use digital signals and can transmit voice and data at different speeds based on how fast the user is moving; it supports video, web browsing, and instant messaging.

3G

________ does NOT have an important role in the Internet of Things.

Ipv4

________ is a medium-range wireless network.

Wi-Fi

Your actual download speed is determined by ________.

throughput

The biggest problem with using wireless networks is ________.

security

RFID was developed to replace ________.

bar codes


Set pelajaran terkait

Chapter 9: Controlling and other costs

View Set

сучасні технології навчання ІМ дітей раннього віку

View Set

OB PrepU 18 Nursing Management of the Newborn

View Set

STC Notes: Federal Regulations Governing Investment Advisers

View Set

Texas P&C Adjuster Untimed Test #1

View Set

Chapter 14 : Depressive Disorders

View Set

MGMT 365 Management Seminar Chapter 10

View Set