Chapter 10

Ace your homework & exams now with Quizwiz!

True or False? Rogue access points can be set up by employees.

True

The major problem with RFID has been _______. a) Expense b) Bandwidth c) Location d) RFID readers e) RFID tags

a) Expense (Correct)

Which of the following is the most appropriate wireless networking standard for creating personal area networks? a) Wi-Fi b) Cellular radio c) Microwave d) Bluetooth e) WiMAX

d) Bluetooth (Correct)

The name of the main person working on the Sixth Sense project is _________.

(Pranav Mistry)

What other purpose can SixthSense technology serve? (a) Being a fifth sense to those who are missing one. (b) Making it easier to text and drive without getting caught. (c) Removing the need for a traditional cellular phone. (d) Helping pediatricians make informed decisions.

(a) Being a fifth sense to those who are missing one. (correct)

The report you read from 2008 in this activity suggested which of the following was a major trend at the time? (a) Going paperless. (b) Cloud computing. (c) USB thumb drives. (d) External hard drives.

(a) Going paperless. (correct)

RF jamming refers to a) locating WANs while driving or walking and using a wireless-enabled computer to intrude into the network. b) unauthorized users accessing data that are traveling over wireless networks. c) a person or device that intentionally or unintentionally interferes with wireless network transmissions. d) Making private wireless communications available to the public.

C) a person or device that intentionally or unintentionally interferes with wireless network transmissions. (Correct)

True or False? A voice portal is a standard Web site that accepts voice commands.

False

True or False? Wireless computing does not really affect productivity.

False

_____ is the standard that enables wireless devices to access Web-based information and services. a) TCP/IP b) Ethernet c) World Wide Web d) Wireless Application Protocol e) T-Carrier

Wireless Application Protocol (Correct)

_____ networks use multiple Wi-Fi access points to create a wide area network. a) Mesh b) Pervasive c) Global d) Fixed e) Ubiquitous

a) Mesh (Correct)

The two major characteristics that differentiate mobile computing from other forms of computing are ______ and ________. a) Mobility, broad reach b) Mobility, lack of expense c) Security, broad reach d) Security, mobility e) Broad reach, localization

a) Mobility, broad reach (Correct)

Mobile computing has two major characteristics that differentiate it from other forms of computing. What are these two characteristics? a) mobility, broad reach b) mobility, lack of expense c) security, broad reach d) security, mobility e) broad reach, localization

a) mobility, broad reach (Correct)

_____ refer(s) to the wireless communication of location-based information and control messages to and from vehicles and other mobile assets. a) Location-based services b) Telematics c) Pervasive services d) RFID e) Wi-F

b) Telematics (Correct)

The advantages of RFID tags to Staples include all of the following except: a) accurate inventory b) precise location of each item in stores c) reduced transaction costs at checkout d) movement history of each item through the store to moment of sale e) labor savings

c) reduced transaction costs at checkout (Correct)

According to the article on the security issues for mobile phones, which of the following will be an important security feature for mobile phones for sensitive applications such as mobile banking? (a) RFID technology. (b) Fingerprinting and biometrics. (c) IP profiling. (d) Electronic cell phone lock.

(b) Fingerprinting and biometrics. (correct)

NTT DoCoMo is headquartered in which country? (a) Iran. (b) Japan. (c) China. (d) Korea.

(b) Japan. (correct)

Identifying IT trends and determining which ones are most beneficial and can help an organization to keep from doing what? (a) Jumping off the latest IT bandwagon. (b) Jumping on the latest IT bandwagon. (c) Preferring to be a late adopter. (d) Just watching and mirroring the competition.

(b) Jumping on the latest IT bandwagon. (correct)

6. Wi-Fi sets up a wireless local area network (WLAN). Bluetooth sets up a (a) Wireless personal area network (WPAN). (b) Personal area network (PAN). (correct) (c) Impersonal area network (IAN). (d) My area network (MAN).

(b) Personal area network (PAN). (correct)

One of the concerns of Sixth Sense technology is that it can easily project information in public places thus violating (a) Government law. (b) Privacy issues. (c) Knowledge access. (d) Face-to-face communications.

(b) Privacy issues. (correct)

rted stolen. For that, the service providers must know (a) The SIM card number. (b) The model and make of the phone. (c) IEMI. (d) None of these answers are correct.

(c) IEMI. (correct)

Which of the following is difficult to measure concerning technology? (a) Net profit. (b) Net loss (c) Return on investment. (d) Total cost.

(c) Return on investment. (correct)

Cell phone providers are working together to create a database of (a) Consumer information. (b) Consumers who always seems to "lose" their phones. (c) Stolen cell phones. (d) Cell phones given as a gift.

(c) Stolen cell phones. (correct)

In what order are the technologies used to play Pandora over a factory radio as described by the author? (a) Wi-Fi—3G—FM—Bluetooth. (b) 3G—FM—Bluetooth—Wi-Fi. (c) FM—Bluetooth—Wi-Fi—3G. (d) 3G—Wi-Fi—Bluetooth—FM.

(d) 3G—Wi-Fi—Bluetooth—FM.

The activity refers to a chart that displays the advancing roles of the mobile phone. Which of the following is not on the chart? (a) Communication. (b) Information access. (c) Life assistance. (d) Spiritual assistance.

(d) Spiritual assistance. (correct)

The service NTT DoCoMo offered in 1999 to revive its flattening sales was called (a) U-Service. (b) i-Service. (c) Edna Mode. (d) i-Mode

(d) i-Mode

True or False, Mobile phone companies and technology companies would like consumers to use mobile wallets, but credit card companies are reluctant to provide mobile wallet technology to consumers because of the high risk of transmissions being jammed.

False

True or False? Bluetooth is a wide-area wireless network that uses a hotspot to provide service to a number of users.

False

True or False? In a mesh network, the motes transmit their data to a central computer.

False

True or False? Microwave transmissions are broadcast, where as satellite transmissions are point-to-point.

False

True or False? Personalization means that a mobile device can provide real-time communication, independent of the user's location.

False

True or False? Pervasive computing and virtual reality are just different names for the same thing.

False

True or False? RFID and GPS are two terms for the same tracking technology.

False

True or False? Radio transmissions are highly secure.

False

True or False? Short message service allows users to send short text messages on digital cell phones.

False

True or False? The global positioning system is supported by GEO satellites.

False

True or False? When discussing communication media, wireless and mobile mean the same thing because if the device is wireless, it has to be mobile, and if it is mobile, it has to be wireless.

False

True or False? Wi-Fi has become so popular because it is almost problem-free when it is used in large geographic areas.

False

True or False? Wi-Fi is a wireless standard that enables temporary, short-range connections between mobile devices.

False

True or False? Wi-Fi provides excellent security.

False

True or False? Wireless technologies are not changing the ways that organizations are doing business, but they are enabling organizations to do business faster.

False

True or Flase, Wireless payment systems offer people instant access to banking functions like transferring money, but these systems are not secure enough for widespread usage because the transmissions are not encrypted.

False

True or false? FM Radio is available in the iPhone 4S.

False

57. True or False? Smart appliances can be controlled by hand-held devices with RFIDs or WSNs.

True

True or False? A hotspot is a small geographical perimeter within which a wireless access point provides service to a number of users.

True

True or False? Advertisers can use mall apps to send user-specific messages to cell phones based on the location of the consumer.

True

True or False? B2C m-commerce receives a lot of publicity, but apps are actually used more within companies to communicate with employees that work off-site.

True

True or False? Bluetooth is a wireless standard that enables temporary, short-range connection between mobile devices.

True

True or False? Many retailers now offer Wi-Fi because it provides their customers with Internet access.

True

True or False? Mesh networks are reliable, efficient, and fault tolerant.

True

True or False? Microwave transmissions are affected by environmental conditions such as storms.

True

True or False? Mobile wallets enable users to make purchases with a single click from a mobile device.

True

True or False? PayPal's online payment system is useful not only for paying for items purchased on the Internet but also for onsite or in-store payments

True

True or False? Pervasive computing is a computer environment in which virtually every object has processing power with wireless or wired connections to a global network.

True

True or False? Satellite radio offers uninterrupted, near-CD quality music that is beamed to your radio from satellites.

True

True or False? Telemetry is the science that measures physical remoteness by means of wireless transmissions from a remote source to a receiving station.

True

True or False? The OnStar system from General Motors is an example of telemetry.

True

True or False? The higher the orbit of a satellite, the larger its footprint.

True

True or False? Two systems being developed to replace bar codes are QR codes and RFID systems.

True

True or False? Using RFID cards, airlines can check in passengers much faster than traditional methods.

True

True or False? Using smart phones as mobile wallets is made possible by near-field communications technology.

True

True or False? War driving is the act of locating wireless networks while driving around a certain area.

True

True or False? Wireless computing can increase speed and improve customer service.

True

True or False? Wireless is a term used to describe telecommunications in which electromagnetic waves carry the signal between communicating devices.

True

_____ is a wireless standard that enables temporary, short-range connection between mobile devices. a) Bluetooth b) Wireless application protocol c) Short message service d) Wi-Fi e) Global positioning system

a) Bluetooth (Correct)

_____, with the shortest range of any wireless network, is designed to be used with contactless credit cards. a) Near-field communications b) Bluetooth c) Ultra-wideband d) Wi-Fi e) Infrared

a) Near-field communications (Correct)

Unfortunately, many managers consider smart phones as only _____, rather than as _____ that can transmit wirelessly. a) Phones, digital cameras b) Phones, pagers c) Digital cameras, phones d) Digital cameras, pagers e) Cheap, expensive devices

a) Phones, digital cameras

91. The greatest problem with GEO satellites is which of the following? a) Propagation delay b) Expense c) Orbital life d) Size of the footprint e) Relative speed with respect to a point on the earth's surface

a) Propagation delay (Correct)

In _____, a person or a device intentionally or unintentionally interferes with your wireless network transmissions. a) RF jamming b) War driving c) Eavesdropping d) Telemetry e) Installing rogue access devices

a) RF jamming (Correct)

_____ is the science that measures physical remoteness by means of wireless transmission from a remote source to a receiving station. a) Telemetry b) Wireless access point c) Near-field communications d) Microwave e) Wireless positioning

a) Telemetry (Correct)

Which of the following is not a mobile application in financial services? a) Transaction processing systems b) Mobile banking c) Wireless electronic payment systems d) Micropayments e) Wireless wallets

a) Transaction processing systems (Correct)

Which type of satellite has the shortest orbital life? a) low earth orbit b) medium earth orbit c) geostationary d) polar orbit e) equatorial orbit

a) low earth orbit (Correct)

Which type of satellite requires the highest number of satellites to cover the earth? a) low earth orbit b) medium earth orbit c) geostationary d) polar orbit e) equatorial orbit

a) low earth orbit (Correct)

Mobile computing a) refers to a real-time, wireless connection between a mobile device and other computing environments, such as an intranet. b) refers to e-commerce transactions that are conducted with a mobile device. c) means that virtually every device has processing power with wireless or wired connections to a global network. d) None of these statements are correct.

a) refers to a real-time, wireless connection between a mobile device and other computing environments, such as an intranet. (Correct)

Which of the following is not a mobile application in financial services? a) transaction processing systems b) mobile banking c) wireless electronic payment systems d) micropayments e) wireless wallets

a) transaction processing systems (Correct)

Mobile applications in financial services include which of the following? a) mobile banking b) wireless electronic payment systems c) micropayments d) brokerage services e) all of the these

all of the these (Correct)

_____ communicate(s) via radio waves using radio antennas placed within adjacent geographic areas. a) Bluetooth b) Cell phones c) A satellite d) Ultra-wideband e) Near-field communications

b) Cell phones (Correct)

Although rogue access devices can be installed innocently, they can also be installed by an attacker trying to gain unauthorized access to a wireless network. In such cases, these devices are called an _____. a) Unencrypted node b) Evil twin c) Open node d) Illegal server e) Unauthorized rogue access point

b) Evil twin (Correct)

A small geographical perimeter within which a wireless access point provides service to a number of users is called a ________. a) Transceiver b) Hotspot c) Local reception node d) Wireless network e) GPS location

b) Hotspot (Correct)

What would be the best use of RFID in a business? a) Transaction processing b) Supply chain management c) Personnel tracking d) Enabling communications with customers e) Decreasing network costs

b) Supply chain management (Correct)

Sense networks track users via all of the following technologies except _______. a) GPS b) Traffic cameras c) Cell towers d) Wi-Fi networks e) None of the above

b) Traffic cameras (Correct)

The act of locating wireless local area networks while moving around a city is called ____. a) Eavesdropping b) War driving c) RF jamming d) Cybersquatting e) Installing rogue access devices

b) War driving (Correct)

The main problem with radio transmission is which of the following? a) Radio waves cannot travel through walls. b) When you travel too far from the source, the signal fades. c) Devices are difficult to install. d) Radio waves are slow. e) Devices are expensive to install.

b) When you travel too far from the source, the signal fades. (Correct)

Parking meters that you can pay via your mobile telephone are an example of _________. a) Mobile banking b) Wireless electronic payment c) Wireless wallets d) Brokerage service e) Money transfer

b) Wireless electronic payment (Correct)

A wireless sensor network a) uses satellites to enable users to determine their position anywhere on earth. b) consists of interconnected, battery-powered motes that relay data to other motes. c) is a type of transmission that uses red light that is not commonly visible to human eyes. d) is a type of chip technology that enables short-range data and voice connections between wireless devices.

b) consists of interconnected, battery-powered motes that relay data to other motes. (Correct)

The major security threats to wireless communications include a) rogue access points, telemetry, and WSNs b) rogue access points, war driving, and eavesdropping c) rogue access points, telemetry and eavesdropping d) rogue access points, WSNs, and RF jamming

b) rogue access points, war driving, and eavesdropping (Correct)

Eavesdropping refers to a )locating WANs while driving or walking and using a wireless-enabled computer to intrude into the network. b) unauthorized users accessing data that are traveling over wireless networks. c) a person or device that intentionally or unintentionally interferes with wireless network transmissions. d) Making private wireless communications available to the public.

b) unauthorized users accessing data that are traveling over wireless networks. (Correct)

_____ refers to efforts by unauthorized users to access data traveling over wireless networks. a) RF jamming b) War driving c) Eavesdropping d) Telemetry e) Installing rogue access devices

c) Eavesdropping (Correct)

The area of the earth reached by a satellite's transmission is referred to as its _____. a) Hotspot b) Coverage c) Footprint d) Zone e) Wireless area

c) Footprint (Correct)

Which type of satellite has the largest footprint? a) Low-earth-orbit b) Medium-earth-orbit c) Geostationary d) Polar orbit e) Equatorial orbit

c) Geostationary (Correct)

The development of mobile commerce is driven by all of the following factors except: a) The widespread availability of mobile devices. b) The cell phone culture. c) Increasing prices. d) Bandwidth improvement. e) It eliminates the need for a PC.

c) Increasing prices. (Correct)

All of the following wireless media require an unobstructed line of sight except a) Microwave b) Satellite c) Radio d) Infrared

c) Radio (Correct)

A device that plugs into an iPad to accept credit cards is called a(n): a) Tweet b) Circle c) Square d) Rectangle

c) Square (Correct)

Which of the following is not inhibiting faster Wi-Fi expansion? a) Users cannot roam from hotspot to hotspot if the hotspots use different Wi-Fi network services. b) A lack of security. c) The growth of WiMAX d) Unless the service is free, users have to log on to separate accounts for each hotspot. e) Wi-Fi services may not survive in the face of free hotspot access.

c) The growth of WiMAX (Correct)

Telemetry is a) a real-time connection between a mobile device and other computing environments, such as the Internet. b) mobile commerce transactions that are conducted with a mobile device. c) The wireless transmission and receipt of data gathered from remote sensors. d) a technology that allows users to make purchases with a single click from their mobile devices.

c) The wireless transmission and receipt of data gathered from remote sensors. (Correct)

Of the following, which is the major problem with smart phones? a) They are too slow. b) They are too expensive. c) They can be used to compromise security. d) Their screens are too small. e) Their browsers are not fully functional.

c) They can be used to compromise security. (Correct)

Which of the following is not a limitation of barcodes? a) They require line-of-sight to the scanning device. b) They are printed on paper. c) They identify the manufacturer, product, and item. d) They are difficult to use in a manufacturing plant. e) They are useless in determining expiration date.

c) They identify the manufacturer, product, and item. (Correct)

Which of the following is the most appropriate wireless technology for real-time location of caregivers and mobile equipment in health-care environments? a) Wi-Fi b) Microwave c) Ultra wideband d) Infrared e) Bluetooth

c) Ultra wideband (Correct)

Which of the following is the most appropriate wireless technology for real-time location of caregivers and mobile equipment in healthcare environments? a) Wi-Fi b) Microwave c) Ultra-wideband d) Infrared e) Bluetooth

c) Ultra-wideband (Correct)

_____ networks collect data from many points over an extended space. a) Bluetooth b) Ultra-wideband c) Wireless sensor d) WiMAX e) Wi-Fi

c) Wireless sensor (Correct)

With which type of satellite is there a propagation delay? a) low earth orbit b) medium earth orbit c) geostationary d) polar orbit e) equatorial orbit

c) geostationary (Correct)

Pervasive computing a) refers to a real-time, wireless connection between a mobile device and other computing environments, such as an intranet. b) refers to e-commerce transactions that are conducted with a mobile device. c) means that virtually every device has processing power with wireless or wired connections to a global network. d) None of these statements are correct.

c) means that virtually every device has processing power with wireless or wired connections to a global network. (Correct)

Using your cell phone to purchase a Coke from a vending machine is an example of: a) mobile banking b) wireless wallet c) micropayment d) brokerage service e) money transfer

c) micropayment (Correct)

Wireless broadcast media include a) satellites, radios, and fiber-optic cable b) RFID transmitters, satellites, and fiber-optic cable c) radios, TV remotes, and satellites d) fiber-optic cable, infrared, and GPS

c) radios, TV remotes, and satellites (Correct)

Today, most wireless local area networks use the _____ standard, which can transmit up to 54 Mbps and has a range of about 300 feet. a) 802.11a b) 802.11b c) 802.11c d) 802.11g e) WiMAX

d) 802.11g (Correct)

The rapid development of m-commerce is driven by a) Widespread familiarity with communication via cell phones. b) The decreasing costs of wireless devices. c) The availability of greater bandwidth. d) All of these.

d) All of these. (Correct)

The capabilities of smart phones include all of the following except _________. a) A calculator b) E-mail c) A global positioning system d) Corporate transaction processing e) A full-function Internet browser

d) Corporate transaction processing (Correct)

Which of the following characteristics distinguishes mobile computing from other forms of computing? a) Mobile computing offers greater security. b) Connectivity is slower but more reliable than in other forms of computing. c) Mobile computing is limited to relatively short SMS messages. d) Customized information can be sent to individuals as an SMS

d) Customized information can be sent to individuals as an SMS

Putting ads on top of taxicabs in New York City that change as the cabs travel around the city is an example of ________. a) Viral marketing b) Permission advertising c) Geographical advertising d) Location-based advertising e) Direct marketing

d) Location-based advertising (Correct)

Which of the following wireless broadcast media do global positioning systems (GPSs) use? a) RFID chips and readers to track automobiles b) Microwave signals to determine longitude and latitude of objects c) Radio signals to determine positions and to "talk" to drivers with directions d) Medium earth orbit (MEO) satellites

d) Medium earth orbit (MEO) satellites (Correct)

Which of the following is not an advantage of radio? a) No metallic wires are needed. b) Radio waves propagate easily through office walls. c) Radio devices are inexpensive. d) Radio waves do not create electrical interference problems. e) Radio devices are easy to install.

d) Radio waves do not create electrical interference problems.

The generic term for technologies that use radio waves to automatically identify individual items is __________. a) Telemetry b) Bar codes c) Shipping labels d) Radio-frequency identification e) Wireless access points

d) Radio-frequency identification (Correct)

.A(n) _____ is a new class of digital communication device that provides an organizer, cell phone, digital camera, access to e-mail, Internet access, and short message service. a) Blackberry b) pager c) personal digital assistant d) smart phone e) cell phone

d) smart phone (Correct)

A transmitter with an antenna that connects a mobile device to a wired local area network is called a(n): a) transceiver b) transmitter c) radio d) wireless access point e) hotspot

d) wireless access point (Correct)

_____ is a satellite-based tracking system that enables users to determine a person's position. a) Bluetooth b) Wireless application protocol c) Short message service d) Wi-Fi e) Global positioning system

e) Global positioning system (correct)

Microwave transmission systems are used for _____ volume, _____ distance, _____ communications. a) Low, long, broadcast b) Low, short, line-of-sight c) High, long, broadcast d) High, short, broadcast e) High, long, line-of-sight

e) High, long, line-of-sight (Correct)

The most common wireless technology for TV and DVD remote control devices is _______. a) Bluetooth b) Ultra-wideband c) Near-field communications d) WiMAX e) Infrared

e) Infrared (Correct)

With regard to mobile computing, _____ means that knowing where a user is physically located is a key to offering relevant products and services. a) Ubiquity d) Convenience c) Instant connectivity d) Personalization e) Localization of products and services

e) Localization of products and services (Correct)

A(n) _____ allows unauthorized entry into a wireless network. a) Lack of encryption b) Disgruntled employee c) Open node d) Illegal server e) Rogue access point

e) Rogue access point (Correct)

Which of the following statements about Wi-Fi is not correct? a) Wi-Fi provides simple Internet access. b) Laptop PC scans contain chips that can send and receive Wi-Fi signals. c) Many companies offer free Wi-Fi access in their stores. d) Wi-Fi requires encryption for secure transmissions. e) Wi-Fi is expensive to set up.

e) Wi-Fi is expensive to set up. (Correct)

The _____ standard can transmit up to 75 Mbps and has a range of 31 miles. a) Wi-Fi b) 802.11b c) 802.11c d) 802.11g e) WiMAX

e) WiMAX (Correct)

If you buy a hot dog at a concession stand using your contactless credit card, you are using a ________. a) Wireless money transfer b) Wireless wallet c) Wireless bill payment d) Micropayment e) Wireless electronic payment system

e) Wireless electronic payment system (Correct)

Individuals are finding it convenient and productive to use wireless devices for which of the following reasons? a) To make use of time that was formerly wasted b) To become more efficient c) Work locations are more flexible d) To be able to allocate working time around personal and professional obligations e) All of the above

e) all of the above

The major problem with RFID has been: a) bandwidth b) location c) RFID readers d) RFID tags e) expense

expense (Correct)

A(n) _____ allows unauthorized entry into a wireless network. a) lack of encryption b) disgruntled employee c) open node d) illegal server e) rogue access point

rogue access point (Correct)


Related study sets

Finance 2000 chapter 6 Chapter questions

View Set

Chapter 10 Interest Groups notes

View Set

Old Testament The History of Israel

View Set

Free Body Diagrams and Net forces

View Set