IS Chapter 10

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

123. The act of locating wireless local area networks while moving around a city is called ____. a. Eavesdropping b. War driving c. RF jamming d. Cybersquatting e. Installing rogue access devices

b

70. True or False? Radio transmissions are highly secure.

false

none

none

100. _____, with the shortest range of any wireless network, is designed to be used with contactless credit cards. a. Near-field communications b. Bluetooth c. Ultra-wideband d. Wi-Fi e. Infrared

a

105. _____ networks use multiple Wi-Fi access points to create a wide area network. a) Mesh b) Pervasive c) Global d) Fixed e) Ubiquitous

a

108. The two major characteristics that differentiate mobile computing from other forms of computing are ______ and ________. a. Mobility, broad reach b. Mobility, lack of expense c. Security, broad reach d. Security, mobility e. Broad reach, localization

a

111. Which of the following is not a mobile application in financial services? a. Transaction processing systems b. Mobile banking c. Wireless electronic payment systems d. Micropayments e. Wireless wallets

a

117. _____ is the science that measures physical remoteness by means of wireless transmission from a remote source to a receiving station. a. Telemetry b. Wireless access point c. Near-field communications d. Microwave e. Wireless positioning

a

120. The major problem with RFID has been _______. a. Expense b. Bandwidth c. Location d. RFID readers e. RFID tags

a

126. In _____, a person or a device intentionally or unintentionally interferes with your wireless network transmissions. a. RF jamming b. War driving c. Eavesdropping d. Telemetry e. Installing rogue access devices

a

12What other purpose can SixthSense technology serve? (a) Being a fifth sense to those who are missing one. (b) Making it easier to text and drive without getting caught. (c) Removing the need for a traditional cellular phone. (d) Helping pediatricians make informed decisions.

a

17. Which type of satellite requires the highest number of satellites to cover the earth? a) low earth orbit b) medium earth orbit c) geostationary d) polar orbit

a

2. The report you read from 2008 in this activity suggested which of the following was a major trend at the time? (a) Going paperless. (b) Cloud computing. (c) USB thumb drives. (d) External hard drives.

a

21. Which type of satellite has the shortest orbital life? a) low earth orbit b) medium earth orbit c) geostationary d) polar orbit e) equatorial orbit

a

28. Mobile computing has two major characteristics that differentiate it from other forms of computing. What are these two characteristics? a) mobility, broad reach b) mobility, lack of expense c) security, broad reach d) security, mobility e) broad reach, localization

a

29. Which of the following is not a mobile application in financial services? a) transaction processing systems b) mobile banking c) wireless electronic payment systems d) micropayments e) wireless wallets

a

32. The major problem with RFID has been: a) expense b) bandwidth c) location d) RFID readers e) RFID tags

a

43. Mobile computing a) refers to a real-time, wireless connection between a mobile device and other computing environments, such as an intranet. b) refers to e-commerce transactions that are conducted with a mobile device. c) means that virtually every device has processing power with wireless or wired connections to a global network. d) None of these statements are correct.

a

87. Unfortunately, many managers consider smart phones as only _____, rather than as _____ that can transmit wirelessly. a. Phones, digital cameras b. Phones, pagers c. Digital cameras, phones d. Digital cameras, pagers e. Cheap, expensive devices

a

91. The greatest problem with GEO satellites is which of the following? a. Propagation delay b. Expense c. Orbital life d. Size of the footprint e. Relative speed with respect to a point on the earth's surface

a

96. _____ is a wireless standard that enables temporary, short-range connection between mobile devices. a. Bluetooth b. Wireless application protocol c. Short message service d. Wi-Fi e. Global positioning system

a

10. One of the concerns of Sixth Sense technology is that it can easily project information in public places thus violating (a) Government law. (b) Privacy issues. (c) Knowledge access. (d) Face-to-face communications.

b

103. A small geographical perimeter within which a wireless access point provides service to a number of users is called a ________. a. Transceiver b. Hotspot c. Local reception node d. Wireless network e. GPS location

b

106. _____ communicate(s) via radio waves using radio antennas placed within adjacent geographic areas. a. Bluetooth b. Cell phones c. A satellite d. Ultra-wideband e. Near-field communications

b

112. Parking meters that you can pay via your mobile telephone are an example of _________. a. Mobile banking b. Wireless electronic payment c. Wireless wallets d. Brokerage service e. Money transfer

b

115. _____ refer(s) to the wireless communication of location-based information and control messages to and from vehicles and other mobile assets. a. Location-based services b. Telematics c. Pervasive services d. RFID e. Wi-Fi

b

116. Sense networks track users via all of the following technologies except _______. a. GPS b. Traffic cameras c. Cell towers d. Wi-Fi networks e. None of the above

b

121. What would be the best use of RFID in a business? a. Transaction processing b. Supply chain management c. Personnel tracking d. Enabling communications with customers e. Decreasing network costs

b

127. Although rogue access devices can be installed innocently, they can also be installed by an attacker trying to gain unauthorized access to a wireless network. In such cases, these devices are called an _____. a. Unencrypted node b. Evil twin c. Open node d. Illegal server e. Unauthorized rogue access point

b

13. According to the article on the security issues for mobile phones, which of the following will be an important security feature for mobile phones for sensitive applications such as mobile banking? (a) RFID technology. (b) Fingerprinting and biometrics. (c) IP profiling. (d) Electronic cell phone lock.

b

3. Identifying IT trends and determining which ones are most beneficial and can help an organization to keep from doing what? (a) Jumping off the latest IT bandwagon. (b) Jumping on the latest IT bandwagon. (c) Preferring to be a late adopter. (d) Just watching and mirroring the competition.

b

34. A wireless sensor network a) uses satellites to enable users to determine their position anywhere on earth. b) consists of interconnected, battery-powered motes that relay data to other motes. c) is a type of transmission that uses red light that is not commonly visible to human eyes. d) is a type of chip technology that enables short-range data and voice connections between wireless devices.

b

37. Eavesdropping refers to a) locating WANs while driving or walking and using a wireless-enabled computer to intrude into the network. b) unauthorized users accessing data that are traveling over wireless networks. c) a person or device that intentionally or unintentionally interferes with wireless network transmissions. d) Making private wireless communications available to the public.

b

38. The major security threats to wireless communications include a) rogue access points, telemetry, and WSNs b) rogue access points, war driving, and eavesdropping c) rogue access points, telemetry and eavesdropping d) rogue access points, WSNs, and RF jamming

b

6. Wi-Fi sets up a wireless local area network (WLAN). Bluetooth sets up a (a) Wireless personal area network (WPAN). (b) Personal area network (PAN). (c) Impersonal area network (IAN). (d) My area network (MAN).

b

7. NTT DoCoMo is headquartered in which country? (a) Iran. (b) Japan. (c) China. (d) Korea.

b

94. The main problem with radio transmission is which of the following? a. Radio waves cannot travel through walls. b. When you travel too far from the source, the signal fades. c. Devices are difficult to install. d. Radio waves are slow. e. Devices are expensive to install.

b

1. Which of the following is difficult to measure concerning technology? (a) Net profit. (b) Net loss. (c) Return on investment. (d) Total cost.

c

102. Which of the following is not inhibiting faster Wi-Fi expansion? a. Users cannot roam from hotspot to hotspot if the hotspots use different Wi-Fi network services. b. A lack of security. c. The growth of WiMAX d. Unless the service is free, users have to log on to separate accounts for each hotspot. e. Wi-Fi services may not survive in the face of free hotspot access.

c

110. The development of mobile commerce is driven by all of the following factors except: a. The widespread availability of mobile devices. b. The cell phone culture. c. Increasing prices. d. Bandwidth improvement. e. It eliminates the need for a PC.

c

119. Which of the following is not a limitation of barcodes? a. They require line-of-sight to the scanning device. b. They are printed on paper. c. They identify the manufacturer, product, and item. d. They are difficult to use in a manufacturing plant. e. They are useless in determining expiration date.

c

122. _____ networks collect data from many points over an extended space. a. Bluetooth b. Ultra-wideband c. Wireless sensor d. WiMAX e. Wi-Fi

c

125. _____ refers to efforts by unauthorized users to access data traveling over wireless networks. a. RF jamming b. War driving c. Eavesdropping d. Telemetry e. Installing rogue access devices

c

14. Increasingly, mobile phone operators are providing services that can lock out everything in a phone if a phone is reported stolen. For that, the service providers must know (a) The SIM card number. (b) The model and make of the phone. (c) IEMI. (d) None of these answers are correct.

c

15. Cell phone providers are working together to create a database of (a) Consumer information. (b) Consumers who always seems to "lose" their phones. (c) Stolen cell phones. (d) Cell phones given as a gift.

c

18. With which type of satellite is there a propagation delay? a) low earth orbit b) medium earth orbit c) geostationary d) polar orbit e) equatorial orbit

c

25. Which of the following is the most appropriate wireless technology for real-time location of caregivers and mobile equipment in health-care environments? a) Wi-Fi b) Microwave c) Ultra wideband d) Infrared e) Bluetooth

c

27. Using your cell phone to purchase a Coke from a vending machine is an example of: a) mobile banking b) wireless wallet c) micropayment d) brokerage service e) money transfer

c

33. The advantages of RFID tags to Staples include all of the following except: a) accurate inventory b) precise location of each item in stores c) reduced transaction costs at checkout d) movement history of each item through the store to moment of sale e) labor savings

c

40. A device that plugs into an iPad to accept credit cards is called a(n): a) Tweet b) Circle c) Square d) Rectangle

c

44. Pervasive computing a) refers to a real-time, wireless connection between a mobile device and other computing environments, such as an intranet. b) refers to e-commerce transactions that are conducted with a mobile device. c) means that virtually every device has processing power with wireless or wired connections to a global network. d) None of these statements are correct.

c

45. All of the following wireless media require an unobstructed line of sight except a) Microwave b) Satellite c) Radio d) Infrared

c

47. Wireless broadcast media include a) satellites, radios, and fiber-optic cable b) RFID transmitters, satellites, and fiber-optic cable c) radios, TV remotes, and satellites d) fiber-optic cable, infrared, and GPS

c

55. Telemetry is a) a real-time connection between a mobile device and other computing environments, such as the Internet. b) mobile commerce transactions that are conducted with a mobile device. c) The wireless transmission and receipt of data gathered from remote sensors. d) a technology that allows users to make purchases with a single click from their mobile devices.

c

60. RF jamming refers to a) locating WANs while driving or walking and using a wireless-enabled computer to intrude into the network. b) unauthorized users accessing data that are traveling over wireless networks. c) a person or device that intentionally or unintentionally interferes with wireless network transmissions. d) Making private wireless communications available to the public.

c

85. Of the following, which is the major problem with smart phones? a. They are too slow. b. They are too expensive. c. They can be used to compromise security. d. Their screens are too small. e. Their browsers are not fully functional.

c

89. Which type of satellite has the largest footprint? a. Low-earth-orbit b. Medium-earth-orbit c. Geostationary d. Polar orbit e. Equatorial orbit

c

90. The area of the earth reached by a satellite's transmission is referred to as its _____. a. Hotspot b. Coverage c. Footprint d. Zone e. Wireless area

c

98. Which of the following is the most appropriate wireless technology for real-time location of caregivers and mobile equipment in healthcare environments? a. Wi-Fi b. Microwave c. Ultra-wideband d. Infrared e. Bluetooth

c

104. Today, most wireless local area networks use the _____ standard, which can transmit up to 54 Mbps and has a range of about 300 feet. a. 802.11a b. 802.11b c. 802.11c d. 802.11g e. WiMAX

d

114. Putting ads on top of taxicabs in New York City that change as the cabs travel around the city is an example of ________. a. Viral marketing b. Permission advertising c. Geographical advertising d. Location-based advertising e. Direct marketing

d

118. The generic term for technologies that use radio waves to automatically identify individual items is __________. a. Telemetry b. Bar codes c. Shipping labels d. Radio-frequency identification e. Wireless access points

d

16. _____ is the standard that enables wireless devices to access Web-based information and services. a) TCP/IP b) Ethernet c) World Wide Web d) Wireless Application Protocol e) T-Carrier

d

20.A(n) _____ is a new class of digital communication device that provides an organizer, cell phone, digital camera, access to e-mail, Internet access, and short message service. a) Blackberry b) pager c) personal digital assistant d) smart phone e) cell phone

d

22. A transmitter with an antenna that connects a mobile device to a wired local area network is called a(n): a) transceiver b) transmitter c) radio d) wireless access point e) hotspot

d

24. Which of the following characteristics distinguishes mobile computing from other forms of computing? a) Mobile computing offers greater security. b) Connectivity is slower but more reliable than in other forms of computing. c) Mobile computing is limited to relatively short SMS messages. d) Customized information can be sent to individuals as an SMS

d

30. The rapid development of m-commerce is driven by a) Widespread familiarity with communication via cell phones. b) The decreasing costs of wireless devices. c) The availability of greater bandwidth. d) All of these

d

46. Which of the following wireless broadcast media do global positioning systems (GPSs) use? a) RFID chips and readers to track automobiles b) Microwave signals to determine longitude and latitude of objects c) Radio signals to determine positions and to "talk" to drivers with directions d) d) Medium earth orbit (MEO) satellites

d

5. In what order are the technologies used to play Pandora over a factory radio as described by the author? (a) Wi-Fi—3G—FM—Bluetooth. (b) 3G—FM—Bluetooth—Wi-Fi. (c) FM—Bluetooth—Wi-Fi—3G. (d) 3G—Wi-Fi—Bluetooth—FM

d

8. The service NTT DoCoMo offered in 1999 to revive its flattening sales was called (a) U-Service. (b) i-Service. (c) Edna Mode. (d) i-Mode.

d

86. The capabilities of smart phones include all of the following except _________. a. A calculator b. E-mail c. A global positioning system d. Corporate transaction processing e. A full-function Internet browser

d

9. The activity refers to a chart that displays the advancing roles of the mobile phone. Which of the following is not on the chart? (a) Communication. (b) Information access. (c) Life assistance. (d) Spiritual assistance.

d

93. Which of the following is not an advantage of radio? a. No metallic wires are needed. b. Radio waves propagate easily through office walls. c. Radio devices are inexpensive. d. Radio waves do not create electrical interference problems. e. Radio devices are easy to install.

d

97. Which of the following is the most appropriate wireless networking standard for creating personal area networks? a. Wi-Fi b. Cellular radio c. Microwave d. Bluetooth e. WiMAX

d

101. Which of the following statements about Wi-Fi is not correct? a. Wi-Fi provides simple Internet access. b. Laptop PC scans contain chips that can send and receive Wi-Fi signals. c. Many companies offer free Wi-Fi access in their stores. d. Wi-Fi requires encryption for secure transmissions. e. Wi-Fi is expensive to set up

e

107. The _____ standard can transmit up to 75 Mbps and has a range of 31 miles. a. Wi-Fi b. 802.11b c. 802.11c d. 802.11g e. WiMAX

e

109. With regard to mobile computing, _____ means that knowing where a user is physically located is a key to offering relevant products and services. a. Ubiquity b. Convenience c. Instant connectivity d. Personalization e. Localization of products and services

e

113. If you buy a hot dog at a concession stand using your contactless credit card, you are using a ________. a. Wireless money transfer b. Wireless wallet c. Wireless bill payment d. Micropayment e. Wireless electronic payment system

e

124. A(n) _____ allows unauthorized entry into a wireless network. a. Lack of encryption b. Disgruntled employee c. Open node d. Illegal server e. Rogue access point

e

26. Mobile applications in financial services include which of the following? a) mobile banking b) wireless electronic payment systems c) micropayments d) brokerage services e) all of the these

e

35. A(n) _____ allows unauthorized entry into a wireless network. a) lack of encryption b) disgruntled employee c) open node d) illegal server e) rogue access point

e

84. Individuals are finding it convenient and productive to use wireless devices for which of the following reasons? a. To make use of time that was formerly wasted b. To become more efficient c. Work locations are more flexible d. To be able to allocate working time around personal and professional obligations e. All of the above

e

88. Microwave transmission systems are used for _____ volume, _____ distance, _____ communications. a. Low, long, broadcast b. Low, short, line-of-sight c. High, long, broadcast d. High, short, broadcast e. High, long, line-of-sight

e

92. _____ is a satellite-based tracking system that enables users to determine a person's position. a. Bluetooth b. Wireless application protocol c. Short message service d. Wi-Fi e. Global positioning system

e

95. The most common wireless technology for TV and DVD remote control devices is _______. a. Bluetooth b. Ultra-wideband c. Near-field communications d. WiMAX e. Infrared

e

19. True or False? Microwave transmissions are broadcast, where as satellite transmissions are point-to-point.

false

23. True or False? Wi-Fi is a wireless standard that enables temporary, short-range connections between mobile devices

false

4. True or false? FM Radio is available in the iPhone 4S.

false

42. True or False? When discussing communication media, wireless and mobile mean the same thing because if the device is wireless, it has to be mobile, and if it is mobile, it has to be wireless

false

50. True or False? Bluetooth is a wide-area wireless network that uses a hotspot to provide service to a number of users.

false

52. True or False? Wi-Fi has become so popular because it is almost problem-free when it is used in large geographic areas

false

58. True or False? RFID and GPS are two terms for the same tracking technology.

false

61. Mobile phone companies and technology companies would like consumers to use mobile wallets, but credit card companies are reluctant to provide mobile wallet technology to consumers because of the high risk of transmissions being jammed

false

63. True or False? Wireless computing does not really affect productivity.

false

65. True or False? Wireless technologies are not changing the ways that organizations are doing business, but they are enabling organizations to do business faster.

false

69. True or False? The global positioning system is supported by GEO satellites

false

73. True or False? Wi-Fi provides excellent security.

false

74. True or False? In a mesh network, the motes transmit their data to a central computer

false

76. True or False? Personalization means that a mobile device can provide real-time communication, independent of the user's location.

false

77. True or False? A voice portal is a standard Web site that accepts voice commands

false

80. True or False? Pervasive computing and virtual reality are just different names for the same thing

false

true/false: 31. Wireless payment systems offer people instant access to banking functions like transferring money, but these systems are not secure enough for widespread usage because the transmissions are not encrypted

false

36. True or False? Rogue access points can be set up by employees

true

39. True or False? Using smart phones as mobile wallets is made possible by near-field communications technology.

true

41. True or False? PayPal's online payment system is useful not only for paying for items purchased on the Internet but also for onsite or in-store payments.

true

48. True or False? Wireless computing can increase speed and improve customer service

true

49. True or False? Satellite radio offers uninterrupted, near-CD quality music that is beamed to your radio from satellites.

true

51. True or False? Many retailers now offer Wi-Fi because it provides their customers with Internet access

true

53. True or False? Advertisers can use mall apps to send user-specific messages to cell phones based on the location of the consumer

true

54. True or False? B2C m-commerce receives a lot of publicity, but apps are actually used more within companies to communicate with employees that work off-site

true

56. True or False? Pervasive computing is a computer environment in which virtually every object has processing power with wireless or wired connections to a global network.

true

57. True or False? Smart appliances can be controlled by hand-held devices with RFIDs or WSNs.

true

59. True or False? The OnStar system from General Motors is an example of telemetry

true

62. True or False? Using RFID cards, airlines can check in passengers much faster than traditional methods

true

64. True or False? Wireless is a term used to describe telecommunications in which electromagnetic waves carry the signal between communicating devices

true

66. True or False? Short message service allows users to send short text messages on digital cell phones

true

67. True or False? Microwave transmissions are affected by environmental conditions such as storms

true

68. True or False? The higher the orbit of a satellite, the larger its footprint

true

71. True or False? Bluetooth is a wireless standard that enables temporary, short-range connection between mobile devices

true

72. True or False? A hotspot is a small geographical perimeter within which a wireless access point provides service to a number of users.

true

75. True or False? Mesh networks are reliable, efficient, and fault tolerant

true

78. True or False? Mobile wallets enable users to make purchases with a single click from a mobile device

true

79. True or False? Telemetry is the science that measures physical remoteness by means of wireless transmissions from a remote source to a receiving station

true

81. True or False? Two systems being developed to replace bar codes are QR codes and RFID systems

true

82. True or False? Rogue access points can be set up by employees

true

83. True or False? War driving is the act of locating wireless networks while driving around a certain area

true


Set pelajaran terkait

Psychology Chapter 11 Gender, Sex, and Sexuality

View Set

TOM3010: Chapter 9: Quality and Statistical Process Control Smartbook

View Set

Section 10: Delaware Financing Processes and Types

View Set

Research Methods Chapter 14 Quiz

View Set

1 Texas Principles of Real Estate: Chapter 2 - Real Property - QUIZ

View Set