Deck 11: RFID - Radio Frequency Identification

ملء الشاشة (f)
exit full mode
سؤال
To modulate a response signal using backscatter, a tag has to ______.

A) change the polarity of the incoming signal from the reader
B) deflect the signal from the transponder
C) change the characteristics of its own antenna
D) store the energy from the interrogator
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which mode must an NFC-capable device be in to behave like a smart card?

A) Poll
B) Listen
C) Initiator
D) Smart card
سؤال
Interrogators and tags communicate using _________ communications.

A) half-duplex
B) full-duplex
C) simplex
D) complex
سؤال
The protocol used to handle collisions in HF RFID is called _____.

A) STAC
B) Class 1
C) Class 0
D) blocker
سؤال
One of the ways used by the Gen2 protocol to select tags is by transmitting _________.

A) a quiet command
B) a null CW
C) a bit mask
D) a higher or lower intensity signal
سؤال
Which of the following RFID technologies does not support reading more than one tag at a time?

A) readers
B) UHF
C) smart labels
D) LF
سؤال
Which of the following is an important characteristic of UHF passive tags?

A) They have a shorter read distance.
B) They require less power to be read.
C) They work at greater distances than most other tags.
D) They only support very slow communications.
سؤال
What is the purpose of an interrogator?

A) to read information from the tags
B) to prevent unauthorized access to the tags
C) to increase the read distance
D) to store a charge that powers passive tags
سؤال
RFID is not expected to have a major impact on network traffic.
سؤال
The function of RFID middleware is to ________.

A) store information about the types of tags used
B) convert the data read from the tags into a format that is compatible with that of the business application
C) control the functions of the reader hardware
D) control the functions of the tag hardware
سؤال
Reader antennas are sometimes designed for a specific application.
سؤال
What is one of the most critical challenges associated with RFID system implementation?

A) the cost of the tags
B) the fact that tags can be read by anyone with a smartphone
C) the large amount of storage required
D) the encryption protocols
سؤال
One of the main characteristics of sensory tags is that ______.

A) they can sense the presence of other tags
B) they can block the signal from other tags
C) they only respond to the reader if a password is sent first
D) they can capture information about environmental conditions
سؤال
What kind of modulation is used with most NFC tags?

A) OFDM
B) DSSS
C) ASK
D) NRZ-I
سؤال
What is the largest amount of memory in an NFC passive tag today?

A) 2 KB
B) 8 KB
C) 16 KB
D) 32 KB
سؤال
Which of the following methods can be used to temporarily or permanently disable a tag? (Select two.)

A) a blocker tag
B) an authentication password
C) a very-high-power pulse
D) the destroy password
سؤال
Before an NFC-enabled smartphone can communicate with a tag or another device, what must it do?

A) read the serial number of the other device
B) identify the capabilities of the device or tag
C) receive a reply from all devices within its range
D) transmit its clock speed
سؤال
What type of coupling is used in NFC between a smartphone and a tablet computer?

A) backscatter
B) capacitive
C) physical
D) inductive
سؤال
Which of the following is true about 1-bit tags?

A) They store a unique identification code.
B) They can only be read by a passive reader.
C) They do not carry any information about the product.
D) They are also known as RF fibers.
سؤال
The orientation of the tag's antenna usually does not affect readability.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/20
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 11: RFID - Radio Frequency Identification
1
To modulate a response signal using backscatter, a tag has to ______.

A) change the polarity of the incoming signal from the reader
B) deflect the signal from the transponder
C) change the characteristics of its own antenna
D) store the energy from the interrogator
C
2
Which mode must an NFC-capable device be in to behave like a smart card?

A) Poll
B) Listen
C) Initiator
D) Smart card
B
3
Interrogators and tags communicate using _________ communications.

A) half-duplex
B) full-duplex
C) simplex
D) complex
A
4
The protocol used to handle collisions in HF RFID is called _____.

A) STAC
B) Class 1
C) Class 0
D) blocker
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
5
One of the ways used by the Gen2 protocol to select tags is by transmitting _________.

A) a quiet command
B) a null CW
C) a bit mask
D) a higher or lower intensity signal
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which of the following RFID technologies does not support reading more than one tag at a time?

A) readers
B) UHF
C) smart labels
D) LF
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which of the following is an important characteristic of UHF passive tags?

A) They have a shorter read distance.
B) They require less power to be read.
C) They work at greater distances than most other tags.
D) They only support very slow communications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
8
What is the purpose of an interrogator?

A) to read information from the tags
B) to prevent unauthorized access to the tags
C) to increase the read distance
D) to store a charge that powers passive tags
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
9
RFID is not expected to have a major impact on network traffic.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
10
The function of RFID middleware is to ________.

A) store information about the types of tags used
B) convert the data read from the tags into a format that is compatible with that of the business application
C) control the functions of the reader hardware
D) control the functions of the tag hardware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
11
Reader antennas are sometimes designed for a specific application.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
12
What is one of the most critical challenges associated with RFID system implementation?

A) the cost of the tags
B) the fact that tags can be read by anyone with a smartphone
C) the large amount of storage required
D) the encryption protocols
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
13
One of the main characteristics of sensory tags is that ______.

A) they can sense the presence of other tags
B) they can block the signal from other tags
C) they only respond to the reader if a password is sent first
D) they can capture information about environmental conditions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
14
What kind of modulation is used with most NFC tags?

A) OFDM
B) DSSS
C) ASK
D) NRZ-I
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
15
What is the largest amount of memory in an NFC passive tag today?

A) 2 KB
B) 8 KB
C) 16 KB
D) 32 KB
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which of the following methods can be used to temporarily or permanently disable a tag? (Select two.)

A) a blocker tag
B) an authentication password
C) a very-high-power pulse
D) the destroy password
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
17
Before an NFC-enabled smartphone can communicate with a tag or another device, what must it do?

A) read the serial number of the other device
B) identify the capabilities of the device or tag
C) receive a reply from all devices within its range
D) transmit its clock speed
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
18
What type of coupling is used in NFC between a smartphone and a tablet computer?

A) backscatter
B) capacitive
C) physical
D) inductive
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which of the following is true about 1-bit tags?

A) They store a unique identification code.
B) They can only be read by a passive reader.
C) They do not carry any information about the product.
D) They are also known as RF fibers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
20
The orientation of the tag's antenna usually does not affect readability.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.