Deck 8: Wireless, Mobile Computing, and Mobile Commerce

ملء الشاشة (f)
exit full mode
سؤال
War driving is the act of locating wireless networks while driving around a certain area.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Bluetooth devices can be used to establish NFC for mobile commerce.
سؤال
The development of mobile commerce is driven by the following factors (choose all that apply)

A) widespread availability of mobile devices
B) increasing prices of mobile devices
C) bandwidth improvement
D) higher costs for wireless services
سؤال
Which of the following technologies is wireless but not mobile?

A) Smart phones
B) Laptops
C) Tablet computers
D) Microwave towers
سؤال
Wireless jamming introduces noise in the environment to stop people from eavesdropping on private conversations.
سؤال
The major types of wireless media are:

A) Satellite, radio, microwave, and television.
B) Cellular, television, radio, and microwave.
C) Microwave, satellite, radio, and infrared.
D) Smart phones, satellite, television, and radio.
سؤال
Which of the following statements about Wi-Fi is not correct?

A) Wi-Fi provides simple Internet access.
B) Laptop PC scans contain chips that can send and receive Wi-Fi signals.
C) Many companies offer free Wi-Fi access in their stores.
D) Wi-Fi requires encryption for secure transmissions.
E) Wi-Fi is expensive to set up.
سؤال
Which of the following statements about wireless devices is not true?

A) They are small enough to easily carry or wear.
B) They have sufficient computing power to perform productive tasks.
C) They have strong security feature that make them impossible to hack.
D) They can communicate wirelessly with the Internet and other devices.
سؤال
_____ collect data from many points over an extended space.

A) Location-based applications
B) Ultra-wideband networks
C) Wireless sensor networks
D) Wi-Max networks
E) Wi-Fi networks
سؤال
The main purpose of location-based applications is to broadcast your current location coordinates to local businesses.
سؤال
The technology that uses radio waves to identify individual items is:

A) telemetry
B) bar codes
C) shipping labels
D) radio-frequency identification
E) wireless access point
سؤال
Wi-Fi networks are typically classified as _______ wireless networks

A) Short-range
B) Medium-range
C) Wide-range
D) None of these
سؤال
The two major characteristics that differentiate mobile computing from other forms of computing are _______ and _________.

A) mobility, broad reach
B) mobility, lack of expense
C) security, broad reach
D) security, mobility
E) road reach, localization
سؤال
Wireless is a term used to describe telecommunications in which electromagnetic waves carry the signal between communicating devices.
سؤال
_____ use multiple Wi-Fi access points to create a wide area network.

A) Mesh networks
B) Pervasive networks
C) Global networks
D) Fixed networks
E) Ubiquitous networks
سؤال
All of the following statements regarding QR codes are true except:

A) QR codes can store more information than bar codes.
B) QR codes can only store information that is comprised of numbers or text.
C) QR codes are more resistant to damage than bar codes.
D) QR codes can be read from any direction or angle.
سؤال
An "evil twin" is associated with which type of threat to wireless networks?

A) Rogue access points
B) War driving
C) Eavesdropping
D) RF jamming
سؤال
With regard to mobile computing, _____ mean(s) that it is easy and fast to access the Web and other mobile devices.

A) ubiquity
B) convenience
C) instant connectivity
D) Both of the following are correct: convenience and instant connectivity
E) All of these
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/18
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 8: Wireless, Mobile Computing, and Mobile Commerce
1
War driving is the act of locating wireless networks while driving around a certain area.
True
2
Bluetooth devices can be used to establish NFC for mobile commerce.
False
3
The development of mobile commerce is driven by the following factors (choose all that apply)

A) widespread availability of mobile devices
B) increasing prices of mobile devices
C) bandwidth improvement
D) higher costs for wireless services
A AND C
4
Which of the following technologies is wireless but not mobile?

A) Smart phones
B) Laptops
C) Tablet computers
D) Microwave towers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
5
Wireless jamming introduces noise in the environment to stop people from eavesdropping on private conversations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
6
The major types of wireless media are:

A) Satellite, radio, microwave, and television.
B) Cellular, television, radio, and microwave.
C) Microwave, satellite, radio, and infrared.
D) Smart phones, satellite, television, and radio.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which of the following statements about Wi-Fi is not correct?

A) Wi-Fi provides simple Internet access.
B) Laptop PC scans contain chips that can send and receive Wi-Fi signals.
C) Many companies offer free Wi-Fi access in their stores.
D) Wi-Fi requires encryption for secure transmissions.
E) Wi-Fi is expensive to set up.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which of the following statements about wireless devices is not true?

A) They are small enough to easily carry or wear.
B) They have sufficient computing power to perform productive tasks.
C) They have strong security feature that make them impossible to hack.
D) They can communicate wirelessly with the Internet and other devices.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
9
_____ collect data from many points over an extended space.

A) Location-based applications
B) Ultra-wideband networks
C) Wireless sensor networks
D) Wi-Max networks
E) Wi-Fi networks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
10
The main purpose of location-based applications is to broadcast your current location coordinates to local businesses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
11
The technology that uses radio waves to identify individual items is:

A) telemetry
B) bar codes
C) shipping labels
D) radio-frequency identification
E) wireless access point
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
12
Wi-Fi networks are typically classified as _______ wireless networks

A) Short-range
B) Medium-range
C) Wide-range
D) None of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
13
The two major characteristics that differentiate mobile computing from other forms of computing are _______ and _________.

A) mobility, broad reach
B) mobility, lack of expense
C) security, broad reach
D) security, mobility
E) road reach, localization
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
14
Wireless is a term used to describe telecommunications in which electromagnetic waves carry the signal between communicating devices.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
15
_____ use multiple Wi-Fi access points to create a wide area network.

A) Mesh networks
B) Pervasive networks
C) Global networks
D) Fixed networks
E) Ubiquitous networks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
16
All of the following statements regarding QR codes are true except:

A) QR codes can store more information than bar codes.
B) QR codes can only store information that is comprised of numbers or text.
C) QR codes are more resistant to damage than bar codes.
D) QR codes can be read from any direction or angle.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
17
An "evil twin" is associated with which type of threat to wireless networks?

A) Rogue access points
B) War driving
C) Eavesdropping
D) RF jamming
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
18
With regard to mobile computing, _____ mean(s) that it is easy and fast to access the Web and other mobile devices.

A) ubiquity
B) convenience
C) instant connectivity
D) Both of the following are correct: convenience and instant connectivity
E) All of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.