Deck 8: Wireless, Mobile Computing, and Mobile Commerce
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/18
العب
ملء الشاشة (f)
Deck 8: Wireless, Mobile Computing, and Mobile Commerce
1
War driving is the act of locating wireless networks while driving around a certain area.
True
2
Bluetooth devices can be used to establish NFC for mobile commerce.
False
3
The development of mobile commerce is driven by the following factors (choose all that apply)
A) widespread availability of mobile devices
B) increasing prices of mobile devices
C) bandwidth improvement
D) higher costs for wireless services
A) widespread availability of mobile devices
B) increasing prices of mobile devices
C) bandwidth improvement
D) higher costs for wireless services
A AND C
4
Which of the following technologies is wireless but not mobile?
A) Smart phones
B) Laptops
C) Tablet computers
D) Microwave towers
A) Smart phones
B) Laptops
C) Tablet computers
D) Microwave towers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
5
Wireless jamming introduces noise in the environment to stop people from eavesdropping on private conversations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
6
The major types of wireless media are:
A) Satellite, radio, microwave, and television.
B) Cellular, television, radio, and microwave.
C) Microwave, satellite, radio, and infrared.
D) Smart phones, satellite, television, and radio.
A) Satellite, radio, microwave, and television.
B) Cellular, television, radio, and microwave.
C) Microwave, satellite, radio, and infrared.
D) Smart phones, satellite, television, and radio.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which of the following statements about Wi-Fi is not correct?
A) Wi-Fi provides simple Internet access.
B) Laptop PC scans contain chips that can send and receive Wi-Fi signals.
C) Many companies offer free Wi-Fi access in their stores.
D) Wi-Fi requires encryption for secure transmissions.
E) Wi-Fi is expensive to set up.
A) Wi-Fi provides simple Internet access.
B) Laptop PC scans contain chips that can send and receive Wi-Fi signals.
C) Many companies offer free Wi-Fi access in their stores.
D) Wi-Fi requires encryption for secure transmissions.
E) Wi-Fi is expensive to set up.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which of the following statements about wireless devices is not true?
A) They are small enough to easily carry or wear.
B) They have sufficient computing power to perform productive tasks.
C) They have strong security feature that make them impossible to hack.
D) They can communicate wirelessly with the Internet and other devices.
A) They are small enough to easily carry or wear.
B) They have sufficient computing power to perform productive tasks.
C) They have strong security feature that make them impossible to hack.
D) They can communicate wirelessly with the Internet and other devices.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
9
_____ collect data from many points over an extended space.
A) Location-based applications
B) Ultra-wideband networks
C) Wireless sensor networks
D) Wi-Max networks
E) Wi-Fi networks
A) Location-based applications
B) Ultra-wideband networks
C) Wireless sensor networks
D) Wi-Max networks
E) Wi-Fi networks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
10
The main purpose of location-based applications is to broadcast your current location coordinates to local businesses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
11
The technology that uses radio waves to identify individual items is:
A) telemetry
B) bar codes
C) shipping labels
D) radio-frequency identification
E) wireless access point
A) telemetry
B) bar codes
C) shipping labels
D) radio-frequency identification
E) wireless access point
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
12
Wi-Fi networks are typically classified as _______ wireless networks
A) Short-range
B) Medium-range
C) Wide-range
D) None of these
A) Short-range
B) Medium-range
C) Wide-range
D) None of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
13
The two major characteristics that differentiate mobile computing from other forms of computing are _______ and _________.
A) mobility, broad reach
B) mobility, lack of expense
C) security, broad reach
D) security, mobility
E) road reach, localization
A) mobility, broad reach
B) mobility, lack of expense
C) security, broad reach
D) security, mobility
E) road reach, localization
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
14
Wireless is a term used to describe telecommunications in which electromagnetic waves carry the signal between communicating devices.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
15
_____ use multiple Wi-Fi access points to create a wide area network.
A) Mesh networks
B) Pervasive networks
C) Global networks
D) Fixed networks
E) Ubiquitous networks
A) Mesh networks
B) Pervasive networks
C) Global networks
D) Fixed networks
E) Ubiquitous networks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
16
All of the following statements regarding QR codes are true except:
A) QR codes can store more information than bar codes.
B) QR codes can only store information that is comprised of numbers or text.
C) QR codes are more resistant to damage than bar codes.
D) QR codes can be read from any direction or angle.
A) QR codes can store more information than bar codes.
B) QR codes can only store information that is comprised of numbers or text.
C) QR codes are more resistant to damage than bar codes.
D) QR codes can be read from any direction or angle.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
17
An "evil twin" is associated with which type of threat to wireless networks?
A) Rogue access points
B) War driving
C) Eavesdropping
D) RF jamming
A) Rogue access points
B) War driving
C) Eavesdropping
D) RF jamming
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
18
With regard to mobile computing, _____ mean(s) that it is easy and fast to access the Web and other mobile devices.
A) ubiquity
B) convenience
C) instant connectivity
D) Both of the following are correct: convenience and instant connectivity
E) All of these
A) ubiquity
B) convenience
C) instant connectivity
D) Both of the following are correct: convenience and instant connectivity
E) All of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck