Test Bank Chapter 9
Short Description
Management Information System...
Description
Package Title: Testbank Questions Course Title: IS 5e Chapter Number: 8
Question Type: True/False
1. Wireless computing does not really affect productivity.
Answer: False Section reference 1: chapter opening case Difficulty: Easy Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerce.
2. Wireless is a term used to describe telecommunications in which electromagnetic waves carry the signal between communicating devices.
Answer: True Section reference 1: chapter opening case Difficulty: Easy
Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerce.
3. Wireless technologies are not changing the ways that organizations are doing business, but they are enabling organizations to do business faster.
Answer: False Section reference 1: chapter opening case Difficulty: Easy Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerce.
4. Short message service allows users to send short text messages on digital cell phones.
Answer: True Section reference 1: Wireless Technologies Difficulty: Easy Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.
5. Microwave transmissions are affected by environmental conditions such as storms.
Answer: True Section reference 1: Wireless Technologies Difficulty: Easy Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.
6. The higher the orbit of a satellite, the larger its footprint.
Answer: True Section reference 1: Wireless Technologies Difficulty: Easy Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.
7. The global positioning system is supported by GEO satellites.
Answer: False Section reference 1: Wireless Technologies Difficulty: Easy Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.
8. Radio transmissions are highly secure.
Answer: False Section reference 1: Wireless Technologies Difficulty: Easy Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.
9. Bluetooth is a wireless standard that enables temporary, short-range connection between mobile devices.
Answer: True Section reference 1: Wireless Computer Networks and Internet Access Difficulty: Easy Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.
10. A hotspot is a small geographical perimeter within which a wireless access point provides service to a number of users.
Answer: True Section reference 1: Wireless Computer Networks and Internet Access Difficulty: Easy Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.
11. Wi-Fi provides excellent security.
Answer: False Section reference 1: Wireless Computer Networks and Internet Access Difficulty: Easy Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.
12. In a mesh network, the motes transmit their data to a central computer.
Answer: False Section reference 1: Pervasive Computing Difficulty: Easy Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing, providing examples of how businesses can utilize each one.
13. Mesh networks are reliable, efficient, and fault tolerant.
Answer: True Section reference 1: Pervasive Computing Difficulty: Easy
Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing, providing examples of how businesses can utilize each one.
14. Personalization means that a mobile device can provide real-time communication, independent of the user’s location.
Answer: False Section reference 1: Mobile Computing and Mobile Commerce Difficulty: Easy Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
15. A voice portal is a standard Web site that accepts voice commands.
Answer: False Section reference 1: Mobile Computing and Mobile Commerce Difficulty: Easy Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
16. Mobile wallets enable users to make purchases with a single click from a mobile device.
Answer: True
Section reference 1: Mobile Computing and Mobile Commerce Difficulty: Easy Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
17. Telemetry is the science that measures physical remoteness by means of wireless transmissions from a remote source to a receiving station.
Answer: True Section reference 1: Mobile Computing and Mobile Commerce Difficulty: Easy Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
18. Pervasive computing and virtual reality are just different names for the same thing.
Answer: False Section reference 1: Pervasive Computing Difficulty: Easy Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing, providing examples of how businesses can utilize each one.
19. Two systems being developed to replace bar codes are QR codes and RFID systems.
Answer: True
Section reference 1: Pervasive Computing Difficulty: Medium Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing, providing examples of how businesses can utilize each one.
20. Rogue access points can be set up by employees.
Answer: True Section reference 1: Wireless Security Difficulty: Easy Learning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can damage a business.
21. War driving is the act of locating wireless networks while driving around a certain area.
Answer: True Section reference 1: Wireless Security Difficulty: Easy Learning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can damage a business.
22. Refer to IT’s About Business 8.6 – BP Uses Wireless Technologies: Wireless sensors can be used to increase safety and reliability by doing tasks that are too dangerous for humans.
Answer: False Section reference 1: IT’s About Business 8.6 Difficulty: Medium Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerce.
23. Refer to IT’s About Business 8.7 – Brazil Uses Smart Meters: Smart Meters can be used to monitor electricity consumption and detect theft.
Answer: True Section reference 1: IT’s About Business 8.7 Difficulty: Easy Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerce.
Question Type: Multiple Choice
24. Individuals are finding it convenient and productive to use wireless devices for which of the following reasons? A. To make use of time that was formerly wasted B. To become more efficient C. Work locations are more flexible D. To be able to allocate working time around personal and professional obligations E. All of the above
Answer: E Section reference 1: Wireless Technologies Difficulty: Medium Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.
25. Of the following, which is the major problem with smart phones? A. They are too slow. B. They are too expensive. C. They can be used to compromise security. D. Their screens are too small. E. Their browsers are not fully functional.
Answer: C Section reference 1: Wireless Technologies Difficulty: Medium Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.
26. The capabilities of smart phones include all of the following except _________. A. A calculator B. E-mail
C. A global positioning system D. Corporate transaction processing E. A full-function Internet browser
Answer: D Section reference 1: Wireless Technologies Difficulty: Easy Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.
27. Unfortunately, many managers consider smart phones as only _____, rather than as _____ that can transmit wirelessly. A. Phones, digital cameras B. Phones, pagers C. Digital cameras, phones D. Digital cameras, pagers E. Cheap, expensive devices
Answer: A Section reference 1: Wireless Technologies Difficulty: Medium Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.
28. Microwave transmission systems are used for _____ volume, _____ distance, _____ communications. A. Low, long, broadcast B. Low, short, line-of-sight C. High, long, broadcast D. High, short, broadcast E. High, long, line-of-sight
Answer: E Section reference 1: Wireless Technologies Difficulty: Medium Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.
29. Which type of satellite has the largest footprint? A. Low-earth-orbit B. Medium-earth-orbit C. Geostationary D. Polar orbit E. Equatorial orbit Answer: C Section reference 1: Wireless Technologies Difficulty: Easy Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.
30. The area of the earth reached by a satellite’s transmission is referred to as its _____. A. Hotspot B. Coverage
C. Footprint D. Zone E. Wireless area Answer: C Section reference 1: Wireless Technologies Difficulty: Easy Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.
31. The greatest problem with GEO satellites is which of the following? A. Propagation delay B. Expense C. Orbital life D. Size of the footprint E. Relative speed with respect to a point on the earth’s surface Answer: A Section reference 1: Wireless Technologies Difficulty: Easy Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.
32. _____ is a satellite-based tracking system that enables users to determine a person’s position. A. Bluetooth B. Wireless application protocol C. Short message service D. Wi-Fi E. Global positioning system
Answer: E Section reference 1: Wireless Technologies Difficulty: Easy Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.
33. Which of the following is not an advantage of radio? A. No metallic wires are needed. B. Radio waves propagate easily through office walls. C. Radio devices are inexpensive. D. Radio waves do not create electrical interference problems. E. Radio devices are easy to install. Answer: D Section reference 1: Wireless Technologies Difficulty: Medium Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.
34. The main problem with radio transmission is which of the following?
A. Radio waves cannot travel through walls. B. When you travel too far from the source, the signal fades. C. Devices are difficult to install. D. Radio waves are slow. E. Devices are expensive to install. Answer: B Section reference 1: Wireless Technologies Difficulty: Medium Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.
35. The most common wireless technology for TV and DVD remote control devices is _______. A. Bluetooth B. Ultra-wideband C. Near-field communications D. WiMAX E. Infrared Answer: E Section reference 1: Wireless Technologies Difficulty: Easy Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.
36. _____ is a wireless standard that enables temporary, short-range connection between mobile devices. A. Bluetooth B. Wireless application protocol C. Short message service D. Wi-Fi E. Global positioning system
Answer: A Section reference 1: Wireless Computer Networks and Internet Access Difficulty: Easy Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.
37. Which of the following is the most appropriate wireless networking standard for creating personal area networks? A. Wi-Fi B. Cellular radio C. Microwave D. Bluetooth E. WiMAX
Answer: D Section reference 1: Wireless Computer Networks and Internet Access Difficulty: Easy Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.
38. Which of the following is the most appropriate wireless technology for real-time location of caregivers and mobile equipment in healthcare environments?
A. Wi-Fi B. Microwave C. Ultra-wideband D. Infrared E. Bluetooth
Answer: C Section reference 1: Wireless Computer Networks and Internet Access Difficulty: Medium Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.
39. _____, with the shortest range of any wireless network, is designed to be used with contactless credit cards. A. Near-field communications B. Bluetooth C. Ultra-wideband D. Wi-Fi E. Infrared
Answer: A Section reference 1: Wireless Computer Networks and Internet Access Difficulty: Easy Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.
40. Which of the following statements about Wi-Fi is not correct? A. Wi-Fi provides simple Internet access. B. Laptop PC scans contain chips that can send and receive Wi-Fi signals. C. Many companies offer free Wi-Fi access in their stores. D. Wi-Fi requires encryption for secure transmissions. E. Wi-Fi is expensive to set up.
Answer: E Section reference 1: Wireless Computer Networks and Internet Access Difficulty: Medium Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.
41. Which of the following is not inhibiting faster Wi-Fi expansion? A. Users cannot roam from hotspot to hotspot if the hotspots use different Wi-Fi network services. B. A lack of security. C. The growth of WiMAX D. Unless the service is free, users have to log on to separate accounts for each hotspot. E. Wi-Fi services may not survive in the face of free hotspot access.
Answer: C Section reference 1: Wireless Computer Networks and Internet Access Difficulty: Hard Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.
42. A small geographical perimeter within which a wireless access point provides service to a number of users is called a ________. A. Transceiver B. Hotspot C. Local reception node D. Wireless network E. GPS location
Answer: B Section reference 1: Wireless Computer Networks and Internet Access Difficulty: Easy Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.
43. Today, most wireless local area networks use the _____ standard, which can transmit up to 54 Mbps and has a range of about 300 feet. A. 802.11a
B. 802.11b C. 802.11c D. 802.11g E. WiMAX
Answer: D Section reference 1: Wireless Computer Networks and Internet Access Difficulty: Easy Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.
44. _____ networks use multiple Wi-Fi access points to create a wide area network. A. Mesh B. Pervasive C. Global D. Fixed E. Ubiquitous
Answer: A Section reference 1: Wireless Computer Networks and Internet Access Difficulty: Easy
Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.
45. _____ communicate(s) via radio waves using radio antennas placed within adjacent geographic areas. A. Bluetooth B. Cell phones C. A satellite D. Ultra-wideband E. Near-field communications
Answer: B Section reference 1: Wireless Computer Networks and Internet Access Difficulty: Easy Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.
46. The _____ standard can transmit up to 75 Mbps and has a range of 31 miles. A. Wi-Fi B. 802.11b C. 802.11c D. 802.11g E. WiMAX
Answer: E Section reference 1: Wireless Computer Networks and Internet Access Difficulty: Easy Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.
47. The two major characteristics that differentiate mobile computing from other forms of computing are ______ and ________. A. Mobility, broad reach B. Mobility, lack of expense C. Security, broad reach D. Security, mobility E. Broad reach, localization
Answer: A Section reference 1: Mobile Computing and Mobile Commerce Difficulty: Medium Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
48. With regard to mobile computing, _____ means that it is easy and fast to access the Web and other mobile devices. A. Ubiquity B. Convenience C. Instant connectivity D. B and C E. A, B, and C
Answer: D Section reference 1: Mobile Computing and Mobile Commerce Difficulty: Medium Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
49. With regard to mobile computing, _____ means that knowing where a user is physically located is a key to offering relevant products and services. A. Ubiquity B. Convenience C. Instant connectivity D. Personalization E. Localization of products and services
Answer: E Section reference 1: Mobile Computing and Mobile Commerce Difficulty: Easy
Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
50. The development of mobile commerce is driven by all of the following factors except: A. The widespread availability of mobile devices. B. The cell phone culture. C. Increasing prices. D. Bandwidth improvement. E. It eliminates the need for a PC.
Answer: C Section reference 1: Mobile Computing and Mobile Commerce Difficulty: Medium Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
51. Which of the following is not a mobile application in financial services? A. Transaction processing systems B. Mobile banking C. Wireless electronic payment systems D. Micropayments E. Wireless wallets
Answer: A Section reference 1: Mobile Computing and Mobile Commerce Difficulty: Medium Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
52. Parking meters that you can pay via your mobile telephone are an example of _________. A. Mobile banking B. Wireless electronic payment C. Wireless wallets D. Brokerage service E. Money transfer
Answer: B Section reference 1: Mobile Computing and Mobile Commerce Difficulty: Easy Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
53. If you buy a hot dog at a concession stand using your contactless credit card, you are using a ________. A. Wireless money transfer
B. Wireless wallet C. Wireless bill payment D. Micropayment E. Wireless electronic payment system
Answer: E Section reference 1: Mobile Computing and Mobile Commerce Difficulty: Medium Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
54. Putting ads on top of taxicabs in New York City that change as the cabs travel around the city is an example of ________. A. Viral marketing B. Permission advertising C. Geographical advertising D. Location-based advertising E. Direct marketing
Answer: D Section reference 1: Mobile Computing and Mobile Commerce Difficulty: Medium Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
55. _____ refer(s) to the wireless communication of location-based information and control messages to and from vehicles and other mobile assets. A. Location-based services B. Telematics C. Pervasive services D. RFID E. Wi-Fi
Answer: B Section reference 1: Mobile Computing and Mobile Commerce Difficulty: Easy Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
56. Sense networks track users via all of the following technologies except _______. A. GPS B. Traffic cameras C. Cell towers D. Wi-Fi networks E. None of the above
Answer: B
Section reference 1: Mobile Computing and Mobile Commerce Difficulty: Medium Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
57. _____ is the science that measures physical remoteness by means of wireless transmission from a remote source to a receiving station. A. Telemetry B. Wireless access point C. Near-field communications D. Microwave E. Wireless positioning
Answer: A Section reference 1: Mobile Computing and Mobile Commerce Difficulty: Easy Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
58. The generic term for technologies that use radio waves to automatically identify individual items is __________. A. Telemetry B. Bar codes C. Shipping labels
D. Radio-frequency identification E. Wireless access points
Answer: D Section reference 1: Pervasive Computing Difficulty: Easy Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing, providing examples of how businesses can utilize each one.
59. Which of the following is not a limitation of barcodes? A. They require line-of-sight to the scanning device. B. They are printed on paper. C. They identify the manufacturer, product, and item. D. They are difficult to use in a manufacturing plant. E. They are useless in determining expiration date.
Answer: C Section reference 1: Pervasive Computing Difficulty: Medium Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing, providing examples of how businesses can utilize each one.
60. The major problem with RFID has been _______. A. Expense B. Bandwidth C. Location D. RFID readers E. RFID tags
Answer: A Section reference 1: Pervasive Computing Difficulty: Easy Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing, providing examples of how businesses can utilize each one.
61. What would be the best use of RFID in a business? A. Transaction processing B. Supply chain management C. Personnel tracking D. Enabling communications with customers E. Decreasing network costs
Answer: B Section reference 1: Pervasive Computing Difficulty: Medium
Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing, providing examples of how businesses can utilize each one.
62. _____ networks collect data from many points over an extended space. A. Bluetooth B. Ultra-wideband C. Wireless sensor D. WiMAX E. Wi-Fi
Answer: C Section reference 1: Pervasive Computing Difficulty: Easy Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing, providing examples of how businesses can utilize each one.
63. Which of the following can be used for reading utility meters without a person having to get out of a truck? A. RuBee B. ZigBee C. Wi-Fi D. Near-field communications E. RFID
Answer: B Section reference 1: Pervasive Computing Difficulty: Easy Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing, providing examples of how businesses can utilize each one.
64. The act of locating wireless local area networks while moving around a city is called ____. A. Eavesdropping B. War driving C. RF jamming D. Cybersquatting E. Installing rogue access devices
Answer: B Section reference 1: Wireless Security Difficulty: Easy Learning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can damage a business.
65. A(n) _____ allows unauthorized entry into a wireless network. A. Lack of encryption
B. Disgruntled employee C. Open node D. Illegal server E. Rogue access point
Answer: E Section reference 1: Wireless Security Difficulty: Easy Learning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can damage a business.
66. _____ refers to efforts by unauthorized users to access data traveling over wireless networks. A. RF jamming B. War driving C. Eavesdropping D. Telemetry E. Installing rogue access devices
Answer: C Section reference 1: Wireless Security Difficulty: Easy Learning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can damage a business.
67. In _____, a person or a device intentionally or unintentionally interferes with your wireless network transmissions. A. RF jamming B. War driving C. Eavesdropping D. Telemetry E. Installing rogue access devices
Answer: A Section reference 1: Wireless Security Difficulty: Easy Learning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can damage a business.
68. Although rogue access devices can be installed innocently, they can also be installed by an attacker trying to gain unauthorized access to a wireless network. In such cases, these devices are called an _____. A. Unencrypted node B. Evil twin C. Open node D. Illegal server E. Unauthorized rogue access point
Answer: B
Section reference 1: Wireless Security Difficulty: Easy Learning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can damage a business.
69. Refer to Opening Case – The Battle for the Mobile Wallet: Which of the following statements concerning mobile wallets is true?
A. Traditional credit card issuers have not shown a serious interest in this technology. B. Individual companies cannot utilize this technology due to its prohibitive price. C. Google has launched a program to manufacture its own smart phone chips. D. Unlike traditional wallets, smart phones can be password protected. E. Consumer advocates endorse mobile systems because they will lead to lower prices.
Answer: D Section reference 1: Opening Case Difficulty: Medium Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerce.
70. Refer to IT’s About Business 8.1 – Big Wheel Mobile Truck & Square: Products like Square offer small independent businesses the following advantages over the traditional credit card systems: A. Square does not charge merchants a fee for each transaction B. Square does not require expensive equipment C. Square can run on most mobile devices that the merchant already has
D. Square can be easily customized and updated E. All of the above
Answer: E Section reference 1: IT’s About Business 8.1 Difficulty: Easy Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerce
71. Refer to IT’s About Business 8.2 – Cell Phones Revolutionize Healthcare in Uganda: Which of the following was not an outcome of using cell phones in Uganda? A. Medication was removed from clinics that had too much B. Doctors could text each other patient names C. The mTrac system requires a long training period for users D. Anonymous text messages can be sent to report any problems at the clinics E. All of the above are true
Answer: D Section reference 1: IT’s About Business 8.2 Difficulty: Medium Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerce
72. Refer to IT’s About Business 8.3 - Near-Field Communications Helps Travelers in Japan: Which of the following statements is false? A. SKiP reduces the check-in, security and boarding time in the train stations to 15 mins B. Retailers and merchants and send targeted marketing messages to customers who are physically near their store C. Japanese smartphones can be used as translators and wallets
D. NFC technology in smart phones is used for ticketing and boarding passes
Answer: A Section reference 1: IT’s About Business 8.3 Difficulty: Medium Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerce
73. Refer to IT’s About Business 8.4 – Airlines Provide Wi-Fi to Passengers: As customers get more used to having ubiquitous Internet access, Wi-Fi in airplanes will be ______. A. Free B. More expensive than it is now C. Provided by the government D. Illegal E. None of the above
Answer: A Section reference 1: IT’s About Business 8.4 Difficulty: Medium Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerce
74. Refer to IT’s About Business 8.5 – Mobile Ads Still Aren’t Very Good: Which of the following statements is false? A. Mobile advertising sends advertisements to users based on their current location B. Mobile advertising requires new formats since banner ads are not visible on small screens C. Pop-up window advertising does not work as well on mobile devices as it does on computer screens D. It is easier to track the effectiveness of mobile advertising than other mediums
E. Mobile advertising can be used to distribute coupons
Answer: A Section reference 1: IT’s About Business 8.5 Difficulty: Easy Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerce
75. Refer to Closing Case – Retailer Gains Many Benefits with RFID Item-Level Tagging: Which of the following is the primary advantage of using RFID tags for retailers? A. Easy to see tags on items B. Storing more information about each item C. Cost savings from time and labor D. Cost savings on tags E. Cost savings on scanner installations
Answer: C Section reference 1: Closing Case Difficulty: Medium Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerce
Question Type: Essay
76. Discuss the differences between the traditional working environment and the wireless working environment.
Section reference 1: Material following chapter-opening case Difficulty: Medium Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerce
77. Describe the convergence of functions in today’s smart phones.
Section reference 1: Wireless Technologies Difficulty: Medium Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.
78. Differentiate among the three types of satellites.
Section reference 1: Wireless Technologies Difficulty: Medium Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media
79. Define Bluetooth, and give examples of its uses.
Section reference 1: Wireless Technologies Difficulty: Medium
Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media
80. Describe the 802.11 family of standards.
Section reference 1: Wireless Computer Networks and Internet Access Difficulty: Medium Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.
81. Explain location-based commerce, and provide examples.
Section reference 1: Mobile Commerce Applications Difficulty: Medium Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
82. What are micropayments and mobile wallets? Provide examples of their uses.
Section reference 1: Mobile Commerce Applications Difficulty: Medium Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
83. What are mobile portals and voice portals? Provide examples of their uses.
Section reference 1: Mobile Commerce Applications
Difficulty: Medium Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
84. What is telemetry, and how is it used.
Section reference 1: Mobile Commerce Applications Difficulty: Medium Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
85. How do wireless sensor networks work, and what are they used for?
Section reference 1: Pervasive Computing Difficulty: Medium Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing, providing examples of how businesses can utilize each one.
86. What are the problems with Wi-Fi?
Section reference 1: Wireless Computer Networks and Internet Access Difficulty: Medium Learning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can damage a business.
87. What are the two characteristics of mobile computing, and what are the five value-added attributes of mobile computing?
Section reference 1: Mobile Computing and Mobile Commerce Difficulty: Medium Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
88. Explain the factors that are driving the development of mobile commerce.
Section reference 1: Mobile Computing and Mobile Commerce Difficulty: Hard Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
89. Describe pervasive computing and the two technologies that provide its infrastructure.
Section reference 1: Pervasive Computing Difficulty: Medium Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing, providing examples of how businesses can utilize each one.
90. Identify and discuss the four major threats to wireless networks.
Section reference 1: Wireless Security Difficulty: Medium
Learning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can damage a business.
Question Type: Multiple Choice
91. Michaela runs a dog-walking business. She has three employees, and she prides herself in maintaining a high level of customer service. She gets about half of her business from lastminute requests. When she receives such a request, she needs to know where her employees are so that she can identify the nearest one who might be able to do the walk. Significantly, she needs this information before she can confirm the walk with the client. Which of the following technologies will help her obtain this information? A. Radio transmission B. Internet over Satellite C. LEO constellation D. GPS E. Microwave
Answer: D Section reference 1: Wireless Technologies Difficulty: Medium Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.
92. Frank and his wife, Paula, run a country store with a special room where husbands can sit while their wives are shopping. The Men’s Corner already has a large-screen TV for sports viewing, but Frank and Paula are considering adding Wi-Fi. Which of the following statements is false? A. Their store would need to have broadband access. B. Their store will need a wireless access point. C. They could charge the customers for the service.
D. Wi-Fi is based on radio waves, so they will need a clear line-of-sight into the room. E. They should consider using Wi-Fi Direct.
Answer: E Section reference 1: Wireless Computer Networks and Internet Access Difficulty: Medium Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.
93. Frank and his wife, Paula, run a country store in a high-foot-traffic area. Which of the following would not be a beneficial use of mobile technology for their store? A. Telemetry B. Location-based C. Wireless payments D. Mobile app loyalty program E. All of these could be used beneficial.
Answer: A Section reference 1: Mobile Computing and Mobile Commerce Difficulty: Medium Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
94. Frank and his wife, Paula, run a country store in a high-foot-traffic area. They are trying to understand what the traffic in the store is by using technology. They are considering setting up a wireless sensor network. Which of the following statements is false? A. Motes can be locations throughout the store. B. Once they have created the network, they cannot add additional sensors.
C. The data are moved from sensor to sensor to reach a central computer. D. The sensors can tell the direction in which a person is moving. E. The network will need a base station.
Answer: D Section reference 1: Pervasive Computing Difficulty: Medium Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing, providing examples of how businesses can utilize each one.
95. Frank and his wife, Paula, run a country store with a special room where husbands can sit while their wives are shopping. The Men’s Corner already has a large-screen TV for sports viewing, and they recently added Wi-Fi. Which of the following is not a security issue? A. A rogue access point B. War driving C. Motes D. Eavesdropping E. Radio-frequency jamming
Answer: D Section reference 1: Wireless Technologies Difficulty: Medium Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.
View more...
Comments