test bank chapter 9

47 191 0
test bank chapter 9

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

Package Title: Testbank Questions Course Title: IS 5e Chapter Number: Question Type: True/False Wireless computing does not really affect productivity Answer: False Section reference 1: chapter opening case Difficulty: Easy Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerce Wireless is a term used to describe telecommunications in which electromagnetic waves carry the signal between communicating devices Answer: True Section reference 1: chapter opening case Difficulty: Easy Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerce Wireless technologies are not changing the ways that organizations are doing business, but they are enabling organizations to business faster Answer: False Section reference 1: chapter opening case Difficulty: Easy Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerce Short message service allows users to send short text messages on digital cell phones Answer: True Section reference 1: Wireless Technologies Difficulty: Easy Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media Microwave transmissions are affected by environmental conditions such as storms Answer: True Section reference 1: Wireless Technologies Difficulty: Easy Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media The higher the orbit of a satellite, the larger its footprint Answer: True Section reference 1: Wireless Technologies Difficulty: Easy Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media The global positioning system is supported by GEO satellites Answer: False Section reference 1: Wireless Technologies Difficulty: Easy Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media Radio transmissions are highly secure Answer: False Section reference 1: Wireless Technologies Difficulty: Easy Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media Bluetooth is a wireless standard that enables temporary, short-range connection between mobile devices Answer: True Section reference 1: Wireless Computer Networks and Internet Access Difficulty: Easy Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively 10 A hotspot is a small geographical perimeter within which a wireless access point provides service to a number of users Answer: True Section reference 1: Wireless Computer Networks and Internet Access Difficulty: Easy Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively 11 Wi-Fi provides excellent security Answer: False Section reference 1: Wireless Computer Networks and Internet Access Difficulty: Easy Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively 12 In a mesh network, the motes transmit their data to a central computer Answer: False Section reference 1: Pervasive Computing Difficulty: Easy Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing, providing examples of how businesses can utilize each one 13 Mesh networks are reliable, efficient, and fault tolerant Answer: True Section reference 1: Pervasive Computing Difficulty: Easy Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing, providing examples of how businesses can utilize each one 14 Personalization means that a mobile device can provide real-time communication, independent of the user’s location Answer: False Section reference 1: Mobile Computing and Mobile Commerce Difficulty: Easy Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business 15 A voice portal is a standard Web site that accepts voice commands Answer: False Section reference 1: Mobile Computing and Mobile Commerce Difficulty: Easy Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business 16 Mobile wallets enable users to make purchases with a single click from a mobile device Answer: True Section reference 1: Mobile Computing and Mobile Commerce Difficulty: Easy Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business 17 Telemetry is the science that measures physical remoteness by means of wireless transmissions from a remote source to a receiving station Answer: True Section reference 1: Mobile Computing and Mobile Commerce Difficulty: Easy Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business 18 Pervasive computing and virtual reality are just different names for the same thing Answer: False Section reference 1: Pervasive Computing Difficulty: Easy Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing, providing examples of how businesses can utilize each one 19 Two systems being developed to replace bar codes are QR codes and RFID systems Answer: True Section reference 1: Pervasive Computing Difficulty: Medium Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing, providing examples of how businesses can utilize each one 20 Rogue access points can be set up by employees Answer: True Section reference 1: Wireless Security Difficulty: Easy Learning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can damage a business 21 War driving is the act of locating wireless networks while driving around a certain area Answer: True Section reference 1: Wireless Security Difficulty: Easy Learning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can damage a business 22 Refer to IT’s About Business 8.6 – BP Uses Wireless Technologies: Wireless sensors can be used to increase safety and reliability by doing tasks that are too dangerous for humans Answer: False Section reference 1: IT’s About Business 8.6 Difficulty: Medium Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerce 23 Refer to IT’s About Business 8.7 – Brazil Uses Smart Meters: Smart Meters can be used to monitor electricity consumption and detect theft Answer: True Section reference 1: IT’s About Business 8.7 Difficulty: Easy Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerce Question Type: Multiple Choice 24 Individuals are finding it convenient and productive to use wireless devices for which of the following reasons? A To make use of time that was formerly wasted B To become more efficient C Work locations are more flexible D To be able to allocate working time around personal and professional obligations E All of the above Answer: E Section reference 1: Wireless Technologies Difficulty: Medium Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media 25 Of the following, which is the major problem with smart phones? A They are too slow B They are too expensive C They can be used to compromise security D Their screens are too small E Their browsers are not fully functional Answer: C Section reference 1: Wireless Technologies Difficulty: Medium Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media 26 The capabilities of smart phones include all of the following except _ A A calculator B E-mail Answer: B Section reference 1: Pervasive Computing Difficulty: Easy Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing, providing examples of how businesses can utilize each one 64 The act of locating wireless local area networks while moving around a city is called A Eavesdropping B War driving C RF jamming D Cybersquatting E Installing rogue access devices Answer: B Section reference 1: Wireless Security Difficulty: Easy Learning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can damage a business 65 A(n) _ allows unauthorized entry into a wireless network A Lack of encryption B Disgruntled employee C Open node D Illegal server E Rogue access point Answer: E Section reference 1: Wireless Security Difficulty: Easy Learning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can damage a business 66 _ refers to efforts by unauthorized users to access data traveling over wireless networks A RF jamming B War driving C Eavesdropping D Telemetry E Installing rogue access devices Answer: C Section reference 1: Wireless Security Difficulty: Easy Learning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can damage a business 67 In _, a person or a device intentionally or unintentionally interferes with your wireless network transmissions A RF jamming B War driving C Eavesdropping D Telemetry E Installing rogue access devices Answer: A Section reference 1: Wireless Security Difficulty: Easy Learning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can damage a business 68 Although rogue access devices can be installed innocently, they can also be installed by an attacker trying to gain unauthorized access to a wireless network In such cases, these devices are called an _ A Unencrypted node B Evil twin C Open node D Illegal server E Unauthorized rogue access point Answer: B Section reference 1: Wireless Security Difficulty: Easy Learning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can damage a business 69 Refer to Opening Case – The Battle for the Mobile Wallet: Which of the following statements concerning mobile wallets is true? A Traditional credit card issuers have not shown a serious interest in this technology B Individual companies cannot utilize this technology due to its prohibitive price C Google has launched a program to manufacture its own smart phone chips D Unlike traditional wallets, smart phones can be password protected E Consumer advocates endorse mobile systems because they will lead to lower prices Answer: D Section reference 1: Opening Case Difficulty: Medium Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerce 70 Refer to IT’s About Business 8.1 – Big Wheel Mobile Truck & Square: Products like Square offer small independent businesses the following advantages over the traditional credit card systems: A Square does not charge merchants a fee for each transaction B Square does not require expensive equipment C Square can run on most mobile devices that the merchant already has D Square can be easily customized and updated E All of the above Answer: E Section reference 1: IT’s About Business 8.1 Difficulty: Easy Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerce 71 Refer to IT’s About Business 8.2 – Cell Phones Revolutionize Healthcare in Uganda: Which of the following was not an outcome of using cell phones in Uganda? A Medication was removed from clinics that had too much B Doctors could text each other patient names C The mTrac system requires a long training period for users D Anonymous text messages can be sent to report any problems at the clinics E All of the above are true Answer: D Section reference 1: IT’s About Business 8.2 Difficulty: Medium Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerce 72 Refer to IT’s About Business 8.3 - Near-Field Communications Helps Travelers in Japan: Which of the following statements is false? A SKiP reduces the check-in, security and boarding time in the train stations to 15 mins B Retailers and merchants and send targeted marketing messages to customers who are physically near their store C Japanese smartphones can be used as translators and wallets D NFC technology in smart phones is used for ticketing and boarding passes Answer: A Section reference 1: IT’s About Business 8.3 Difficulty: Medium Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerce 73 Refer to IT’s About Business 8.4 – Airlines Provide Wi-Fi to Passengers: As customers get more used to having ubiquitous Internet access, Wi-Fi in airplanes will be A Free B More expensive than it is now C Provided by the government D Illegal E None of the above Answer: A Section reference 1: IT’s About Business 8.4 Difficulty: Medium Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerce 74 Refer to IT’s About Business 8.5 – Mobile Ads Still Aren’t Very Good: Which of the following statements is false? A Mobile advertising sends advertisements to users based on their current location B Mobile advertising requires new formats since banner ads are not visible on small screens C Pop-up window advertising does not work as well on mobile devices as it does on computer screens D It is easier to track the effectiveness of mobile advertising than other mediums E Mobile advertising can be used to distribute coupons Answer: A Section reference 1: IT’s About Business 8.5 Difficulty: Easy Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerce 75 Refer to Closing Case – Retailer Gains Many Benefits with RFID Item-Level Tagging: Which of the following is the primary advantage of using RFID tags for retailers? A Easy to see tags on items B Storing more information about each item C Cost savings from time and labor D Cost savings on tags E Cost savings on scanner installations Answer: C Section reference 1: Closing Case Difficulty: Medium Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerce Question Type: Essay 76 Discuss the differences between the traditional working environment and the wireless working environment Section reference 1: Material following chapter-opening case Difficulty: Medium Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerce 77 Describe the convergence of functions in today’s smart phones Section reference 1: Wireless Technologies Difficulty: Medium Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media 78 Differentiate among the three types of satellites Section reference 1: Wireless Technologies Difficulty: Medium Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media 79 Define Bluetooth, and give examples of its uses Section reference 1: Wireless Technologies Difficulty: Medium Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media 80 Describe the 802.11 family of standards Section reference 1: Wireless Computer Networks and Internet Access Difficulty: Medium Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively 81 Explain location-based commerce, and provide examples Section reference 1: Mobile Commerce Applications Difficulty: Medium Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business 82 What are micropayments and mobile wallets? Provide examples of their uses Section reference 1: Mobile Commerce Applications Difficulty: Medium Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business 83 What are mobile portals and voice portals? Provide examples of their uses Section reference 1: Mobile Commerce Applications Difficulty: Medium Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business 84 What is telemetry, and how is it used Section reference 1: Mobile Commerce Applications Difficulty: Medium Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business 85 How wireless sensor networks work, and what are they used for? Section reference 1: Pervasive Computing Difficulty: Medium Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing, providing examples of how businesses can utilize each one 86 What are the problems with Wi-Fi? Section reference 1: Wireless Computer Networks and Internet Access Difficulty: Medium Learning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can damage a business 87 What are the two characteristics of mobile computing, and what are the five value-added attributes of mobile computing? Section reference 1: Mobile Computing and Mobile Commerce Difficulty: Medium Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business 88 Explain the factors that are driving the development of mobile commerce Section reference 1: Mobile Computing and Mobile Commerce Difficulty: Hard Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business 89 Describe pervasive computing and the two technologies that provide its infrastructure Section reference 1: Pervasive Computing Difficulty: Medium Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing, providing examples of how businesses can utilize each one 90 Identify and discuss the four major threats to wireless networks Section reference 1: Wireless Security Difficulty: Medium Learning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can damage a business Question Type: Multiple Choice 91 Michaela runs a dog-walking business She has three employees, and she prides herself in maintaining a high level of customer service She gets about half of her business from lastminute requests When she receives such a request, she needs to know where her employees are so that she can identify the nearest one who might be able to the walk Significantly, she needs this information before she can confirm the walk with the client Which of the following technologies will help her obtain this information? A Radio transmission B Internet over Satellite C LEO constellation D GPS E Microwave Answer: D Section reference 1: Wireless Technologies Difficulty: Medium Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media 92 Frank and his wife, Paula, run a country store with a special room where husbands can sit while their wives are shopping The Men’s Corner already has a large-screen TV for sports viewing, but Frank and Paula are considering adding Wi-Fi Which of the following statements is false? A Their store would need to have broadband access B Their store will need a wireless access point C They could charge the customers for the service D Wi-Fi is based on radio waves, so they will need a clear line-of-sight into the room E They should consider using Wi-Fi Direct Answer: E Section reference 1: Wireless Computer Networks and Internet Access Difficulty: Medium Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively 93 Frank and his wife, Paula, run a country store in a high-foot-traffic area Which of the following would not be a beneficial use of mobile technology for their store? A Telemetry B Location-based C Wireless payments D Mobile app loyalty program E All of these could be used beneficial Answer: A Section reference 1: Mobile Computing and Mobile Commerce Difficulty: Medium Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business 94 Frank and his wife, Paula, run a country store in a high-foot-traffic area They are trying to understand what the traffic in the store is by using technology They are considering setting up a wireless sensor network Which of the following statements is false? A Motes can be locations throughout the store B Once they have created the network, they cannot add additional sensors C The data are moved from sensor to sensor to reach a central computer D The sensors can tell the direction in which a person is moving E The network will need a base station Answer: D Section reference 1: Pervasive Computing Difficulty: Medium Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing, providing examples of how businesses can utilize each one 95 Frank and his wife, Paula, run a country store with a special room where husbands can sit while their wives are shopping The Men’s Corner already has a large-screen TV for sports viewing, and they recently added Wi-Fi Which of the following is not a security issue? A A rogue access point B War driving C Motes D Eavesdropping E Radio-frequency jamming Answer: D Section reference 1: Wireless Technologies Difficulty: Medium Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media

Ngày đăng: 04/06/2018, 15:32

Từ khóa liên quan

Tài liệu cùng người dùng

Tài liệu liên quan