Matching
Match each term with the correct statement below.
Premises:
an RFID tag that does not have its own power supply but uses the tiny electrical current induced in the antenna by the incoming signal
a network that utilizes sensors placed on the human body to monitor human biological functions that are transmitted to a third party physician
a network that introduces actuators in addition to sensors so that immediate effects can be made on the human body
an IEEE 802.15.7 standard that transmits data by the intensity of the modulating optical source
an optical,wireless,point-to-point,line-of-sight wireless technology for outdoor transmissions
a low-power,short-range,and low-data rate specification that is based on 802.15.4 but that includes standards for network configuration,security and other higher-level features
an attack that accesses unauthorized information from a wireless device through a Bluetooth connection
a WWAN based on IEEE 802.16-2004 that can serve as a substitute for fiber optic connections between buildings
an attack that sends unsolicited messages to Bluetooth-enabled devices
set of standards primarily for smartphones and smart cards that is used to establish communication between devices
Responses:
near field communication
bluesnarfing
ZigBee
VLC
passive RFID tag
free space optics
bluejacking
MBSN
Fixed WiMAX
ABSN
Correct Answer:
Premises:
Responses:
an RFID tag that does not have its own power supply but uses the tiny electrical current induced in the antenna by the incoming signal
a network that utilizes sensors placed on the human body to monitor human biological functions that are transmitted to a third party physician
a network that introduces actuators in addition to sensors so that immediate effects can be made on the human body
an IEEE 802.15.7 standard that transmits data by the intensity of the modulating optical source
an optical,wireless,point-to-point,line-of-sight wireless technology for outdoor transmissions
a low-power,short-range,and low-data rate specification that is based on 802.15.4 but that includes standards for network configuration,security and other higher-level features
an attack that accesses unauthorized information from a wireless device through a Bluetooth connection
a WWAN based on IEEE 802.16-2004 that can serve as a substitute for fiber optic connections between buildings
an attack that sends unsolicited messages to Bluetooth-enabled devices
set of standards primarily for smartphones and smart cards that is used to establish communication between devices
Premises:
an RFID tag that does not have its own power supply but uses the tiny electrical current induced in the antenna by the incoming signal
a network that utilizes sensors placed on the human body to monitor human biological functions that are transmitted to a third party physician
a network that introduces actuators in addition to sensors so that immediate effects can be made on the human body
an IEEE 802.15.7 standard that transmits data by the intensity of the modulating optical source
an optical,wireless,point-to-point,line-of-sight wireless technology for outdoor transmissions
a low-power,short-range,and low-data rate specification that is based on 802.15.4 but that includes standards for network configuration,security and other higher-level features
an attack that accesses unauthorized information from a wireless device through a Bluetooth connection
a WWAN based on IEEE 802.16-2004 that can serve as a substitute for fiber optic connections between buildings
an attack that sends unsolicited messages to Bluetooth-enabled devices
set of standards primarily for smartphones and smart cards that is used to establish communication between devices
Responses:
Related Questions
Q32: _ RFID tags do not have their
Q33: Describe visible light communications (VLC).
Q34: Slave devices that are connected to the
Q35: Describe wireless personal area networks.
Q36: List three applications for RFID.
Q37: Which of the following are advantages of
Q38: Which of the following are true about
Q39: What is a Bluetooth piconet?
Q40: List and describe three technologies in 802.11ac.
Q41: Describe the WiMAX MAC layer.
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents