Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / California State University, San Bernardino - IST 309 Package Title: Testbank Questions Course Title: IS 5e Chapter Number: 8 Question Type: True/False 1)Wireless computing does not really affect productivity

California State University, San Bernardino - IST 309 Package Title: Testbank Questions Course Title: IS 5e Chapter Number: 8 Question Type: True/False 1)Wireless computing does not really affect productivity

Business

California State University, San Bernardino - IST 309

Package Title: Testbank Questions Course Title: IS 5e

Chapter Number: 8

Question Type: True/False

1)Wireless computing does not really affect productivity.

 

 

 

 

 

 

  1. Wireless is a term used to describe telecommunications in which electromagnetic waves carry the signal between communicating devices.

 

 

 

 

 

 

  1. Wireless technologies are not changing the ways that organizations are doing business, but they are enabling organizations to do business faster.

 

 

 

 

 

 

  1. Short message service allows users to send short text messages on digital cell phones.

 

 

 

 

 

 

  1. Microwave transmissions are affected by environmental conditions such as storms.

 

 

 

 

 

 

  1. The higher the orbit of a satellite, the larger its footprint.

 

 

 

 

 

 

  1. The global positioning system is supported by GEO satellites.

 

 

 

 

 

 

  1. Radio transmissions are highly secure.

 

 

 

 

 

 

  1. Bluetooth is a wireless standard that enables temporary, short-range connection between mobile devices.

 

 

 

 

 

  1. A hotspot is a small geographical perimeter within which a wireless access point provides service to a number of users.

 

 

 

 

 

 

  1. Wi-Fi provides excellent security.

 

 

 

 

 

 

  1. In a mesh network, the motes transmit their data to a central computer.

 

 

 

 

 

 

  1. Mesh networks are reliable, efficient, and fault tolerant.

 

 

 

 

 

 

  1. Personalization means that a mobile device can provide real-time communication, independent of the user’s location.

 

 

 

 

 

 

  1. A voice portal is a standard Web site that accepts voice commands.

 

 

 

 

 

 

  1. Mobile wallets enable users to make purchases with a single click from a mobile device.

 

 

 

 

 

 

  1. Telemetry is the science that measures physical remoteness by means of wireless transmissions from a remote source to a receiving station.

 

 

 

 

 

 

  1. Pervasive computing and virtual reality are just different names for the same thing.

 

 

 

 

 

  1. Two systems being developed to replace bar codes are QR codes and RFID systems.

 

 

 

 

 

 

  1. Rogue access points can be set up by employees.

 

 

 

 

 

 

 

 

  1. War driving is the act of locating wireless networks while driving around a certain area.

 

 

 

 

 

 

  1. Refer to IT’s About Business 8.6 – BP Uses Wireless Technologies: Wireless sensors can be used to increase safety and reliability by doing tasks that are too dangerous for humans.

 

 

 

 

 

  1. Refer to IT’s About Business 8.7 – Brazil Uses Smart Meters: Smart Meters can be used to monitor electricity consumption and detect theft.

 

 

 

 

 

 

Question Type: Multiple Choice

 

 

  1. Individuals are finding it convenient and productive to use wireless devices for which of the following reasons?
  1. To make use of time that was formerly wasted
  2. To become more efficient
  3. Work locations are more flexible
  4. To be able to allocate working time around personal and professional obligations
  5. All of the above

 

 

 

 

 

  1. Of the following, which is the major problem with smart phones?
  1. They are too slow.
  2. They are too expensive.
  3. They can be used to compromise security.
  4. Their screens are too small.
  5. Their browsers are not fully functional.

 

 

 

 

 

 

 

  1. The capabilities of smart phones include all of the following except                  .
  1. A calculator
  2. E-mail
  3. A global positioning system
  4. Corporate transaction processing
  5. A full-function Internet browser

 

 

 

 

 

 

  1. Unfortunately, many managers consider smart phones as only           , rather than as           

that can transmit wirelessly.

  1. Phones, digital cameras
  2. Phones, pagers
  3. Digital cameras, phones
  4. Digital cameras, pagers
  5. Cheap, expensive devices

 

 

 

 

 

 

  1. Microwave transmission systems are used for            volume,            distance,            

communications.

  1. Low, long, broadcast
  2. Low, short, line-of-sight

 

  1. High, long, broadcast
  2. High, short, broadcast
  3. High, long, line-of-sight

 

 

 

 

 

 

  1. Which type of satellite has the largest footprint?
  1. Low-earth-orbit
  2. Medium-earth-orbit
  3. Geostationary
  4. Polar orbit
  5. Equatorial orbit

 

 

 

 

 

 

  1. The area of the earth reached by a satellite’s transmission is referred to as its          .
  1. Hotspot
  2. Coverage
  3. Footprint
  4. Zone
  5. Wireless area

 

 

 

 

 

 

  1. The greatest problem with GEO satellites is which of the following?
  1. Propagation delay
  2. Expense
  3. Orbital life
  4. Size of the footprint
  5. Relative speed with respect to a point on the earth’s surface

 

 

 

 

 

 

 

 

  1.            is a satellite-based tracking system that enables users to determine a person’s position.
  1. Bluetooth
  2. Wireless application protocol
  3. Short message service
  4. Wi-Fi
  5. Global positioning system

 

 

 

 

 

 

 

  1. Which of the following is not an advantage of radio?
  1. No metallic wires are needed.
  2. Radio waves propagate easily through office walls.
  3. Radio devices are inexpensive.
  4. Radio waves do not create electrical interference problems.
  5. Radio devices are easy to install.

 

 

 

 

 

 

  1. The main problem with radio transmission is which of the following?
  1. Radio waves cannot travel through walls.
  2. When you travel too far from the source, the signal fades.
  3. Devices are difficult to install.
  4. Radio waves are slow.
  5. Devices are expensive to install.

 

 

 

 

 

 

  1. The most common wireless technology for TV and DVD remote control devices is                .
  1. Bluetooth
  2. Ultra-wideband
  3. Near-field communications
  4. WiMAX
  5. Infrared

 

 

 

 

 

 

  1.            is a wireless standard that enables temporary, short-range connection between mobile devices.
  1. Bluetooth
  2. Wireless application protocol
  3. Short message service
  4. Wi-Fi
  5. Global positioning system

 

 

 

 

 

 

 

  1. Which of the following is the most appropriate wireless networking standard for creating personal area networks?
  1. Wi-Fi
  2. Cellular radio
  3. Microwave
  4. Bluetooth
  5. WiMAX

 

 

 

 

 

 

  1. Which of the following is the most appropriate wireless technology for real-time location of

 

caregivers and mobile equipment in healthcare environments?

  1. Wi-Fi
  2. Microwave
  3. Ultra-wideband
  4. Infrared
  5. Bluetooth

 

 

 

 

 

 

  1.           , with the shortest range of any wireless network, is designed to be used with contactless credit cards.
  1. Near-field communications
  2. Bluetooth
  3. Ultra-wideband
  4. Wi-Fi
  5. Infrared

 

 

 

 

 

 

 

  1. Which of the following statements about Wi-Fi is not correct?
  1. Wi-Fi provides simple Internet access.
  2. Laptop PC scans contain chips that can send and receive Wi-Fi signals.
  3. Many companies offer free Wi-Fi access in their stores.
  4. Wi-Fi requires encryption for secure transmissions.
  5. Wi-Fi is expensive to set up.

 

 

 

 

 

 

  1. Which of the following is not inhibiting faster Wi-Fi expansion?
  1. Users cannot roam from hotspot to hotspot if the hotspots use different Wi-Fi network services.
  2. A lack of security.

 

  1. The growth of WiMAX
  2. Unless the service is free, users have to log on to separate accounts for each hotspot.
  3. Wi-Fi services may not survive in the face of free hotspot access.

 

 

 

 

 

 

  1. A small geographical perimeter within which a wireless access point provides service to a number of users is called a                                   .
  1. Transceiver
  2. Hotspot
  3. Local reception node
  4. Wireless network
  5. GPS location

 

 

 

 

 

 

  1. Today, most wireless local area networks use the             standard, which can transmit up to 54 Mbps and has a range of about 300 feet.

A. 802.11a

B. 802.11b

C. 802.11c

D. 802.11g

E. WiMAX

 

 

 

 

 

 

 

 

  1.            networks use multiple Wi-Fi access points to create a wide area network.
  1. Mesh
  2. Pervasive
  3. Global
  4. Fixed

 

  1. Ubiquitous

 

 

 

 

 

 

  1.            communicate(s) via radio waves using radio antennas placed within adjacent geographic areas.
  1. Bluetooth
  2. Cell phones
  3. A satellite
  4. Ultra-wideband
  5. Near-field communications

 

 

 

 

 

 

 

 

 

 

 

 

 

  1. The two major characteristics that differentiate mobile computing from other forms of

computing are              and                  .

  1. Mobility, broad reach
  2. Mobility, lack of expense
  3. Security, broad reach
  4. Security, mobility
  5. Broad reach, localization

 

 

 

 

 

 

  1. With regard to mobile computing,           means that it is easy and fast to access the Web and other mobile devices.
  1. Ubiquity
  2. Convenience
  3. Instant connectivity
  4. B and C
  5. A, B, and C

 

 

 

 

 

 

  1. With regard to mobile computing,           means that knowing where a user is physically located is a key to offering relevant products and services.
  1. Ubiquity
  2. Convenience
  3. Instant connectivity
  4. Personalization
  5. Localization of products and services

 

 

 

 

 

 

  1. The development of mobile commerce is driven by all of the following factors except:
  1. The widespread availability of mobile devices.
  2. The cell phone culture.
  3. Increasing prices.
  4. Bandwidth improvement.
  5. It eliminates the need for a PC.

 

 

 

 

 

 

 

 

  1. Which of the following is not a mobile application in financial services?
  1. Transaction processing systems
  2. Mobile banking
  3. Wireless electronic payment systems
  4. Micropayments
  5. Wireless wallets

 

 

 

 

 

 

  1. Parking meters that you can pay via your mobile telephone are an example of                   .
  1. Mobile banking
  2. Wireless electronic payment
  3. Wireless wallets
  4. Brokerage service
  5. Money transfer

 

 

 

 

 

 

  1. If you buy a hot dog at a concession stand using your contactless credit card, you are using a            .
  1. Wireless money transfer
  2. Wireless wallet
  3. Wireless bill payment
  4. Micropayment
  5. Wireless electronic payment system

 

 

 

 

 

 

  1. Putting ads on top of taxicabs in New York City that change as the cabs travel around the

 

city is an example of                 .

  1. Viral marketing
  2. Permission advertising
  3. Geographical advertising
  4. Location-based advertising
  5. Direct marketing

 

 

 

 

 

 

  1.            refer(s) to the wireless communication of location-based information and control messages to and from vehicles and other mobile assets.
  1. Location-based services
  2. Telematics
  3. Pervasive services
  4. RFID
  5. Wi-Fi

 

 

 

 

 

 

  1. Sense networks track users via all of the following technologies except                .
  1. GPS
  2. Traffic cameras
  3. Cell towers
  4. Wi-Fi networks
  5. None of the above

 

 

 

 

 

 

  1.            is the science that measures physical remoteness by means of wireless transmission from a remote source to a receiving station.
  1. Telemetry
  2. Wireless access point
  3. Near-field communications

 

  1. Microwave
  2. Wireless positioning

 

 

 

 

 

 

  1. The generic term for technologies that use radio waves to automatically identify individual items is .
  1. Telemetry
  2. Bar codes
  3. Shipping labels
  4. Radio-frequency identification
  5. Wireless access points

 

 

 

 

 

 

  1. Which of the following is not a limitation of barcodes?
  1. They require line-of-sight to the scanning device.
  2. They are printed on paper.
  3. They identify the manufacturer, product, and item.
  4. They are difficult to use in a manufacturing plant.
  5. They are useless in determining expiration date.

 

 

 

 

 

 

  1. The major problem with RFID has been                .
  1. Expense
  2. Bandwidth
  3. Location
  4. RFID readers
  5. RFID tags

 

 

Section reference 1: Pervasive Computing

 

 

 

 

 

  1. What would be the best use of RFID in a business?
  1. Transaction processing
  2. Supply chain management
  3. Personnel tracking
  4. Enabling communications with customers
  5. Decreasing network costs

 

 

 

 

 

 

  1.            networks collect data from many points over an extended space.
  1. Bluetooth
  2. Ultra-wideband
  3. Wireless sensor
  4. WiMAX
  5. Wi-Fi

 

 

 

 

 

 

  1. Which of the following can be used for reading utility meters without a person having to get out of a truck?
  1. RuBee
  2. ZigBee
  3. Wi-Fi
  4. Near-field communications
  5. RFID

 

 

 

 

 

 

  1. The act of locating wireless local area networks while moving around a city is called        .
  1. Eavesdropping
  2. War driving
  3. RF jamming
  4. Cybersquatting
  5. Installing rogue access devices

 

 

 

 

 

 

  1. A(n)            allows unauthorized entry into a wireless network.
  1. Lack of encryption
  2. Disgruntled employee
  3. Open node
  4. Illegal server
  5. Rogue access point

 

 

 

 

 

 

  1.            refers to efforts by unauthorized users to access data traveling over wireless networks.
  1. RF jamming
  2. War driving
  3. Eavesdropping
  4. Telemetry
  5. Installing rogue access devices

 

 

 

 

 

 

  1. In           , a person or a device intentionally or unintentionally interferes with your wireless network transmissions.
  1. RF jamming
  2. War driving

 

  1. Eavesdropping
  2. Telemetry
  3. Installing rogue access devices

 

 

 

 

 

 

  1. Although rogue access devices can be installed innocently, they can also be installed by an attacker trying to gain unauthorized access to a wireless network. In such cases, these devices are called an       .
  1. Unencrypted node
  2. Evil twin
  3. Open node
  4. Illegal server
  5. Unauthorized rogue access point

 

 

 

 

 

 

  1. Refer to Opening Case – The Battle for the Mobile Wallet: Which of the following statements concerning mobile wallets is true?

 

  1. Traditional credit card issuers have not shown a serious interest in this technology.
  2. Individual companies cannot utilize this technology due to its prohibitive price.
  3. Google has launched a program to manufacture its own smart phone chips.
  4. Unlike traditional wallets, smart phones can be password protected.
  5. Consumer advocates endorse mobile systems because they will lead to lower prices.

 

 

 

 

 

 

  1. Refer to IT’s About Business 8.1 – Big Wheel Mobile Truck & Square: Products like Square offer small independent businesses the following advantages over the traditional credit card systems:
  1. Square does not charge merchants a fee for each transaction
  2. Square does not require expensive equipment
  3. Square can run on most mobile devices that the merchant already has

 

  1. Square can be easily customized and updated
  2. All of the above

 

 

 

 

 

  1. Refer to IT’s About Business 8.2 – Cell Phones Revolutionize Healthcare in Uganda: Which of the following was not an outcome of using cell phones in Uganda?
  1. Medication was removed from clinics that had too much
  2. Doctors could text each other patient names
  3. The mTrac system requires a long training period for users
  4. Anonymous text messages can be sent to report any problems at the clinics
  5. All of the above are true

 

 

 

 

 

  1. Refer to IT’s About Business 8.3 - Near-Field Communications Helps Travelers in Japan: Which of the following statements is false?
  1. SKiP reduces the check-in, security and boarding time in the train stations to 15 mins
  2. Retailers and merchants and send targeted marketing messages to customers who are physically near their store
  3. Japanese smartphones can be used as translators and wallets
  4. NFC technology in smart phones is used for ticketing and boarding passes

 

 

 

 

 

  1. Refer to IT’s About Business 8.4 – Airlines Provide Wi-Fi to Passengers: As customers get more used to having ubiquitous Internet access, Wi-Fi in airplanes will be                                   .
  1. Free
  2. More expensive than it is now
  3. Provided by the government
  4. Illegal
  5. None of the above

 

 

 

 

 

  1. Refer to IT’s About Business 8.5 – Mobile Ads Still Aren’t Very Good: Which of the following statements is false?
  1. Mobile advertising sends advertisements to users based on their current location
  2. Mobile advertising requires new formats since banner ads are not visible on small screens
  3. Pop-up window advertising does not work as well on mobile devices as it does on computer screens
  4. It is easier to track the effectiveness of mobile advertising than other mediums
  5. Mobile advertising can be used to distribute coupons

 

 

 

 

 

 

  1. Refer to Closing Case – Retailer Gains Many Benefits with RFID Item-Level Tagging: Which of the following is the primary advantage of using RFID tags for retailers?
  1. Easy to see tags on items
  2. Storing more information about each item
  3. Cost savings from time and labor
  4. Cost savings on tags
  5. Cost savings on scanner installations

 

 

 

 

 

 

 

 

 

 

  1. Michaela runs a dog-walking business. She has three employees, and she prides herself in

 

maintaining a high level of customer service. She gets about half of her business from last- minute requests. When she receives such a request, she needs to know where her employees are so that she can identify the nearest one who might be able to do the walk. Significantly, she needs this information before she can confirm the walk with the client. Which of the following technologies will help her obtain this information?

  1. Radio transmission
  2. Internet over Satellite
  3. LEO constellation
  4. GPS
  5. Microwave

 

 

 

 

 

  1. Frank and his wife, Paula, run a country store with a special room where husbands can sit while their wives are shopping. The Men’s Corner already has a large-screen TV for sports viewing, but Frank and Paula are considering adding Wi-Fi. Which of the following statements is false?
  1. Their store would need to have broadband access.
  2. Their store will need a wireless access point.
  3. They could charge the customers for the service.
  4. Wi-Fi is based on radio waves, so they will need a clear line-of-sight into the room.
  5. They should consider using Wi-Fi Direct.

 

 

 

 

 

 

  1. Frank and his wife, Paula, run a country store in a high-foot-traffic area. Which of the following would not be a beneficial use of mobile technology for their store?
  1. Telemetry
  2. Location-based
  3. Wireless payments
  4. Mobile app loyalty program
  5. All of these could be used beneficial.

 

 

 

 

 

  1. Frank and his wife, Paula, run a country store in a high-foot-traffic area. They are trying to understand what the traffic in the store is by using technology. They are considering setting up a wireless sensor network. Which of the following statements is false?

 

  1. Motes can be locations throughout the store.
  2. Once they have created the network, they cannot add additional sensors.
  3. The data are moved from sensor to sensor to reach a central computer.
  4. The sensors can tell the direction in which a person is moving.
  5. The network will need a base station.

 

 

 

 

 

  1. Frank and his wife, Paula, run a country store with a special room where husbands can sit while their wives are shopping. The Men’s Corner already has a large-screen TV for sports viewing, and they recently added Wi-Fi. Which of the following is not a security issue?
  1. A rogue access point
  2. War driving
  3. Motes
  4. Eavesdropping
  5. Radio-frequency jamming

 

 

 

 

pur-new-sol

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE