Info Chapter 8
The major types of wireless media are
satellite, radio, and microwave.
An advantage of a radio transmission system is that
signals pass through walls.
The rule of thumb in the wireless industry is that a smartphone uses 4 gigabytes of data per month where ____ percent travels through Wi-Fi.
75
The advantage of ________________ is they can be read over greater distances
Active RFID tags
Which of the following is NOT a limitation of bar codes? A: They can be easily ripped, soiled, or lost. B: They don't identify individual items. C: They don't identify the manufacturer. D: They require line of site.
C: They don't identify the manufacturer.
Which of the following technologies is wireless but NOT mobile? A: Smart phone B: Laptops C: Tablet computers D: Microwave towers
D. Microwave towers
______________ satellites are the most expensive to build and launch.
GEO
The adoption of __________ has been an important factor in the development of the Internet of Things
IPv6
Wi-Fi is a
LAN
GPS are supported by ______ satellites
MEO (medium earth orbit)
The use of multiple Wi-Fi access points to create a wide area network
Mesh Networks
Which of the following is the technology that enables most mobile wallet applications?
NFC
Facebook has discovered __________ are the most effective way of reaching consumers.
Native Ads
Marks & Spencer implemented _______ to track its inventory more effectively.
RFID
______________________ is the wireless transmission and receipt of data gathered from remote sensors.
Telemetry
_____________ means a mobile device can provide information and communication regardless of the user's location.
Ubiquity
_____________ is the act of locating WLANs while driving around a city.
War driving
Telecommunications around the world are shifting to ________ networks.
Wi-Fi
Using a hotspotter is useful for
creating a rogue access point
Efforts by unauthorized users to access data traveling over a wireless network is called
eavesdropping
A disadvantage of a microwave transmission system is that
it is susceptible to environmental interference.
Hotspots are an example of ______________ wireless networks.
medium-range
The two major characteristics that differentiate mobile computing from other forms of computing are _______ and _________
mobility; broad reach.
Retailers that use location-based services like iBeacon favor a(n) ___________ option to avoid alienating customers.
opt-in informed consent
An evil twin attack is a type of
rogue access point