400 likes | 403 Views
Explore the business values and functionalities of wireless networking, including improved productivity, efficiency, and communication capabilities. Learn about telematics, GPS tracking, mobile technology, and access methods like WAP and Wi-Fi standards.
E N D
Which of the following is not a business value that companies can realize from the increased use of wireless networking? • More flexible work arrangements • Save on wiring offices • Makes moving employees easier • Increases worker productivity • Fewer software programs
Which of the following is not a business value that companies can realize from the increased use of wireless networking? • More flexible work arrangements • Save on wiring offices • Makes moving employees easier • Increases worker productivity • Fewer software programs Wireless networks for voice and data further amplify business value by providing anytime, anywhere communication and access to information, including the information resources of the Internet.
Which of the following combine wireless communication with tracking capabilities from GPS systems? • Microwave systems • Satellite positioning systems • Telematics • VHF-TV • Not sure
Which of the following combine wireless communication with tracking capabilities from GPS systems? • Microwave systems • Satellite positioning systems • Telematics • VHF-TV • Not sure Automotive manufacturers offer telematics as a value-added technology with their luxury cars. It has capabilities for on-board navigation, e-mail, stolen vehicle tracking, and accident assistance.
Which systems transmit high-frequency radio signals through the atmosphere and are widely used for high-volume, point-to-point communications? • Microwave systems • Infrared systems • Paging systems • Satellite systems • Cell phone systems
Which systems transmit high-frequency radio signals through the atmosphere and are widely used for high-volume, point-to-point communications? • Microwave systems • Infrared systems • Paging systems • Satellite systems • Cell phone systems Other types of wireless transmissions, such as cell phones and paging devices, have been assigned a specific range of frequencies.
A system of protocols and technologies that enables cell phones and other wireless devices to access Web-based information and services is called… • wireless markup language. • wireless application protocols. • microbrowser. • I-mode. • Not sure
A system of protocols and technologies that enables cell phones and other wireless devices to access Web-based information and services is called… • wireless markup language. • wireless application protocols. • microbrowser. • I-mode. • Not sure WAP enables cell phones and other wireless devices with tiny display screens, low-bandwidth connections and minimal memory to access Web-based information and services.
To access Web-based information, a person with a WAP-compliant phone would use a(n)… • wireless markup language. • wireless application protocol. • microbrowser. • I-mode. • Not sure
wireless markup language. • wireless application protocol. • microbrowser. • I-mode. • Not sure To access Web-based information, a person with a WAP-compliant phone would use a(n)… A microbrowser is an Internet browser with a small file size that can work with the low-memory constraints of handheld wireless devices and the low bandwidth of wireless networks.
The 802.15 wireless networking standard useful for creating small personal area networks is known as… • Wi-fi. • Wi-max. • Wi-mod. • Bluetooth. • Wireless NIC.
The 802.15 wireless networking standard useful for creating small personal area networks is known as… • Wi-fi. • Wi-max. • Wi-mod. • Bluetooth. • Wireless NIC. Wireless phones, keyboards, computers, printers, and computing devices using Bluetooth can communicate with each other and even operate each other without direct user intervention.
A box consisting of a radio receiver/transmitter and antennas that link to a wired network, router, or hub is called a(n)… • access point. • wireless NIC. • LAN bridge. • antenna point. • Wi-Max.
A box consisting of a radio receiver/transmitter and antennas that link to a wired network, router, or hub is called a(n)… • access point. • wireless NIC. • LAN bridge. • antenna point. • Wi-Max. A Wi-Fi system can operate in two different modes. In the infrastructure mode, wireless devices communicate with a wired LAN using access points.
One or more access points positioned in strategic public places to provide maximum wireless coverage are called… • EV-DO connections. • DSL access points. • cell access points. • hotspots. • Not sure
One or more access points positioned in strategic public places to provide maximum wireless coverage are called… • EV-DO connections. • DSL access points. • cell access points. • hotspots. • Not sure Users in range of a hotspot can access the Internet from laptop computers. Some hotspots are free or do not require any additional software to use.
A major drawback of increased Wi-Fi usage is… • too few users. • too many users. • weak security. • difficulty in establishing a connection. • Not sure
A major drawback of increased Wi-Fi usage is… • too few users. • too many users. • weak security. • difficulty in establishing a connection. • Not sure One of the major drawbacks of Wi-Fi is its weak security features, which make wireless networks vulnerable to intruders.
Which of the following offers wireless access ranges of up to 31 miles? • Wi-Fi • Wi-Max • Bluetooth • EV-DO • GSM cellular service
Which of the following offers wireless access ranges of up to 31 miles? • Wi-Fi • Wi-Max • Bluetooth • EV-DO • GSM cellular service Wi-Fi provides access ranges up to 300 feet. Bluetooth offers access up to 30 feet. EV-DO provides wireless access over cellular networks but won’t work in “dead spots.” GSM cellular service is only available outside the United States.
A type of wireless computing, in which users move from wireless hotspot to wireless hotspot, is sometimes referred to as… • wardriving. • nomadic computing. • hotspot computing. • hotspot jumping. • access computing.
A type of wireless computing, in which users move from wireless hotspot to wireless hotspot, is sometimes referred to as… • wardriving. • nomadic computing. • hotspot computing. • hotspot jumping. • access computing. Nomadic computing refers to the practice of jumping from hotspot to hotspot to gain network or Internet access wirelessly.
wireless portals. • sub-Web portals. • nomadic portals. • mobile portals. • Not sure Special Web sites that feature optimized content and services for mobile devices are known as…
Special Web sites that feature optimized content and services for mobile devices are known as… • wireless portals. • sub-Web portals. • nomadic portals. • mobile portals. • Not sure Wireless portals are optimized for mobile devices to steer users to the information they are most likely to need.
Digital wallets used for wireless mobile commerce transactions are referred to as… • d-wallets. • m-wallets. • c-wallets. • w-wallets. • p-wallets.
Digital wallets used for wireless mobile commerce transactions are referred to as… • d-wallets. • m-wallets. • c-wallets. • w-wallets. • p-wallets. Mobile wallets, also referred to as M-wallets, provides an easy-to-use method of making purchases using mobile devices.
A powerful technology for tracking the movement of goods throughout a supply chain using tags with embedded microchips is … • cell phone transponders. • pervasive computing. • wireless sensor networks. • RFID. • bar codes.
A powerful technology for tracking the movement of goods throughout a supply chain using tags with embedded microchips is … • cell phone transponders. • pervasive computing. • wireless sensor networks. • RFID. • bar codes. Radio Frequency ID tags are embedded in goods moving through the supply chain and are programmed with information that can uniquely identify an item and its location.
RFID tags consist of a microchip that stores data and a(n)… • processor. • antenna. • hard drive. • DVD recorder. • motherboard.
RFID tags consist of a microchip that stores data and a(n)… • processor. • antenna. • hard drive. • DVD recorder. • motherboard. The antenna embedded in each RFID tag transmits data to a reader with a decoding capability. Because the devices use radio frequencies, no line-of-sight transmission is necessary.
Which of the following describes the type of RFID tag that typically enables data to be rewritten or modified? • Read/Write • Active • Passive • RR/RW • Not sure
Which of the following describes the type of RFID tag that typically enables data to be rewritten or modified? • Read/Write • Active • Passive • RR/RW • Not sure Active RFID tags generally have a longer read range, but they are larger in size, cost more, and have a shorter operational life than passive tags.
The idea that computers will become increasingly embedded in our natural movements and throughout our environment is referred to as… • environmental computing. • wireless computing. • nomadic computing. • pervasive computing. • Not sure
The idea that computers will become increasingly embedded in our natural movements and throughout our environment is referred to as… • environmental computing. • wireless computing. • nomadic computing. • pervasive computing. • Not sure Innovations in wireless technology are pushing computing into every facet of life, including cars, homes, office buildings, tools, and factories. A mesh of these technologies will provide connections anywhere and any time.
ZigBee protocols • IP protocols • TCP protocols • Environmental protocols • Not sure Which of the following is widely used in wireless sensor networks that control environmental factors such as heating, air conditioning, and lighting in buildings?
Which of the following is widely used in wireless sensor networks that control environmental factors such as heating, air conditioning, and lighting in buildings? • ZigBee protocols • IP protocols • TCP protocols • Environmental protocols • Not sure ZigBee protocols are used in wireless sensor networks to control environmental factors by monitoring motion and temperature in rooms.
Which of the following is not necessarily a management challenge posed by wireless technology? • Managing the technology • Integrating the technology into the IT infrastructure • Determining the appropriate number of users • Maintaining security • Maintaining privacy
Which of the following is not necessarily a management challenge posed by wireless technology? • Managing the technology • Integrating the technology into the IT infrastructure • Determining the appropriate number of users • Maintaining security • Maintaining privacy Wireless technology gives firms more flexibility and the ability to innovate in unexpected ways. The technology provides a new channel for connecting with customers.
Which of the following is not a guideline for managing mobile technology in the enterprise? • Determine the validity of wireless computing • Identify areas in which it can provide value • Create a framework for the technology • Use pilot programs to test wireless systems • Not sure
Which of the following is not a guideline for managing mobile technology in the enterprise? • Determine the validity of wireless computing • Identify areas in which it can provide value • Create a framework for the technology • Use pilot programs to test wireless systems • Not sure Wireless systems support business processes that are not limited by time or location, extending the company’s reach and saving employees and customers substantial amounts of time.