Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Information Systems Supporting Study Set 1
Quiz 8: Wireless, Mobile Computing, and Mobile Commerce
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 61
Short Answer
Describe the convergence of functions in today's smart phones. Section reference 1: Wireless Technologies
Question 62
Multiple Choice
Refer to IT's About Business 8.3 - Near-Field Communications Helps Travelers in Japan: Which of the following statements is false?
Question 63
Multiple Choice
A(n) _____ allows unauthorized entry into a wireless network.
Question 64
Multiple Choice
The act of locating wireless local area networks while moving around a city is called ____.
Question 65
Multiple Choice
In _____, a person or a device intentionally or unintentionally interferes with your wireless network transmissions.
Question 66
Short Answer
Discuss the differences between the traditional working environment and the wireless working environment. Section reference 1: Material following chapter-opening case
Question 67
Multiple Choice
_____ refers to efforts by unauthorized users to access data traveling over wireless networks.
Question 68
Multiple Choice
Refer to IT's About Business 8.4 - Airlines Provide Wi-Fi to Passengers: As customers get more used to having ubiquitous Internet access, Wi-Fi in airplanes will be ______.
Question 69
Multiple Choice
What would be the best use of RFID in a business?
Question 70
Multiple Choice
Refer to IT's About Business 8.5 - Mobile Ads Still Aren't Very Good: Which of the following statements is false?
Question 71
Multiple Choice
Refer to IT's About Business 8.1 - Big Wheel Mobile Truck & Square: Products like Square offer small independent businesses the following advantages over the traditional credit card systems:
Question 72
Multiple Choice
Refer to Closing Case - Retailer Gains Many Benefits with RFID Item-Level Tagging: Which of the following is the primary advantage of using RFID tags for retailers?
Question 73
Multiple Choice
Refer to Opening Case - The Battle for the Mobile Wallet: Which of the following statements concerning mobile wallets is true?
Question 74
Short Answer
Define Bluetooth, and give examples of its uses. Section reference 1: Wireless Technologies
Question 75
Short Answer
Describe the 802.11 family of standards. Section reference 1: Wireless Computer Networks and Internet Access
Question 76
Multiple Choice
Refer to IT's About Business 8.2 - Cell Phones Revolutionize Healthcare in Uganda: Which of the following was not an outcome of using cell phones in Uganda?
Question 77
Short Answer
Differentiate among the three types of satellites. Section reference 1: Wireless Technologies
Question 78
Multiple Choice
Although rogue access devices can be installed innocently, they can also be installed by an attacker trying to gain unauthorized access to a wireless network. In such cases, these devices are called an _____.