0% found this document useful (0 votes)
99 views40 pages

CH 10

This document contains 28 multiple choice questions from a testbank for a chapter on wireless technologies and mobile commerce. The questions cover topics such as different wireless transmission media, wireless computer networks, mobile computing applications, pervasive computing technologies, and wireless security threats. Each question includes the answer, title, learning objective, section reference, difficulty level, and Bloom's taxonomy level.

Uploaded by

Janna Karapetyan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
99 views40 pages

CH 10

This document contains 28 multiple choice questions from a testbank for a chapter on wireless technologies and mobile commerce. The questions cover topics such as different wireless transmission media, wireless computer networks, mobile computing applications, pervasive computing technologies, and wireless security threats. Each question includes the answer, title, learning objective, section reference, difficulty level, and Bloom's taxonomy level.

Uploaded by

Janna Karapetyan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 40

Package Title: Testbank Questions

Course Title: MIS 3e


Chapter Number: 10

Question Type: True/False

1) A working environment that requires users to use wired computers is an


effective environment.

Answer: False

Title: Testbank Question 10.01


Learning Objective 1: 10.0: Provide a real world example of wireless, mobile
computing, and mobile commerce.
Section Reference 1: Introduction
Difficulty: Easy
Bloom’s Taxonomy: Knowledge

2) The terms wireless and mobile mean different things.

Answer: True

Title: Testbank Question 10.02


Learning Objective 1: 10.0: Provide a real world example of wireless, mobile
computing, and mobile commerce.
Section Reference 1: Introduction
Difficulty: Easy
Bloom’s Taxonomy: Knowledge

3) Pervasive computing means that virtually every object has processing power
with either wired or wireless connections to a global network.

Answer: True

Title: Testbank Question 10.03


Learning Objective 1: 10.0: Provide a real world example of wireless, mobile
computing, and mobile commerce.
Section Reference 1: Introduction
Difficulty: Easy
Bloom’s Taxonomy: Knowledge

4) An understanding of wireless technology and mobile commerce applications


will increase your value to your organization.
Answer: True

Title: Testbank Question 10.04


Learning Objective 1: 10.0: Provide a real world example of wireless, mobile
computing, and mobile commerce.
Section Reference 1: Introduction
Difficulty: Easy
Bloom’s Taxonomy: Comprehension

5) Wireless computing does not really affect productivity.

Answer: False

Title: Testbank Question 10.05


Learning Objective 1: 10.1 Identify advantages and disadvantages of each of the
four main types of wireless transmission media.
Section Reference 1: 10.1 Wireless Technologies
Difficulty: Easy
Bloom’s Taxonomy: Application

6) Wireless is a term used to describe telecommunications in which


electromagnetic waves carry the signal between communicating devices.

Answer: True

Title: Testbank Question 10.06


Learning Objective 1: 10.1 Identify advantages and disadvantages of each of the
four main types of wireless transmission media.
Section Reference 1: 10.1 Wireless Technologies
Difficulty: Easy
Bloom’s Taxonomy: Knowledge

7) Dematerialization is when the functions of many physical devices are included


in one physical device.

Answer: True

Title: Testbank Question 10.07


Learning Objective 1: 10.1 Identify advantages and disadvantages of each of the
four main types of wireless transmission media.
Section Reference 1: 10.1 Wireless Technologies
Difficulty: Easy
Bloom’s Taxonomy: Application

8) Wireless technologies are not changing the ways that organizations are doing
business, but they are enabling organizations to do business faster.

Answer: False

Title: Testbank Question 10.08


Learning Objective 1: 10.1 Identify advantages and disadvantages of each of the
four main types of wireless transmission media.
Section Reference 1: 10.1 Wireless Technologies
Difficulty: Easy
Bloom’s Taxonomy: Application

9) One advantage of smartphones is that people can use them to copy and pass
on information that may be deemed confidential.

Answer: False

Title: Testbank Question 10.09


Learning Objective 1: 10.1 Identify advantages and disadvantages of each of the
four main types of wireless transmission media.
Section Reference 1: 10.1 Wireless Technologies
Difficulty: Easy
Bloom’s Taxonomy: Application

10) Short message service allows users to send short text messages on digital
cell phones.

Answer: True

Title: Testbank Question 10.10


Learning Objective 1: 10.1 Identify advantages and disadvantages of each of the
four main types of wireless transmission media.
Section Reference 1: 10.1 Wireless Technologies
Difficulty: Easy
Bloom’s Taxonomy: Knowledge

11) Microwave transmissions are affected by environmental conditions such as


storms.

Answer: True
Title: Testbank Question 10.11
Learning Objective 1: 10.1 Identify advantages and disadvantages of each of the
four main types of wireless transmission media.
Section Reference 1: 10.1 Wireless Technologies
Difficulty: Easy
Bloom’s Taxonomy: Application

12) The higher the orbit of a satellite, the larger its footprint.

Answer: True

Title: Testbank Question 10.12


Learning Objective 1: 10.1 Identify advantages and disadvantages of each of the
four main types of wireless transmission media.
Section Reference 1: 10.1 Wireless Technologies
Difficulty: Easy
Bloom’s Taxonomy: Application

13) The global positioning system is supported by GEO satellites.

Answer: False

Title: Testbank Question 10.13


Learning Objective 1: 10.1 Identify advantages and disadvantages of each of the
four main types of wireless transmission media.
Section Reference 1: 10.1 Wireless Technologies
Difficulty: Easy
Bloom’s Taxonomy: Comprehension

14) Radio transmissions are highly secure.

Answer: False

Title: Testbank Question 10.14


Learning Objective 1: 10.1 Identify advantages and disadvantages of each of the
four main types of wireless transmission media.
Section Reference 1: 10.1 Wireless Technologies
Difficulty: Easy
Bloom’s Taxonomy: Comprehension
15) Bluetooth is a wireless standard that enables temporary, short-range
connection between mobile devices.

Answer: True

Title: Testbank Question 10.15


Learning Objective 1: 10.2 Explain how businesses can use short-range,
medium-range, and long-range networks, respectively.
Section Reference 1: 10.2 Wireless Computer Networks and Internet Access
Difficulty: Easy
Bloom’s Taxonomy: Comprehension

16) A hotspot is a small geographical perimeter within which a wireless access


point provides service to a number of users.

Answer: True

Title: Testbank Question 10.16


Learning Objective 1: 10.2 Explain how businesses can use short-range,
medium-range, and long-range networks, respectively.
Section Reference 1: 10.2 Wireless Computer Networks and Internet Access
Difficulty: Easy
Bloom’s Taxonomy: Comprehension

17) Wi-Fi provides excellent security.

Answer:  False

Title: Testbank Question 10.17


Learning Objective 1: 10.2 Explain how businesses can use short-range,
medium-range, and long-range networks, respectively.
Section Reference 1: 10.2 Wireless Computer Networks and Internet Access
Difficulty: Easy
Bloom’s Taxonomy: Comprehension

18) In a mesh network, the motes transmit their data to a central computer.

Answer: False

Title: Testbank Question 10.18


Learning Objective 1: 10.2 Explain how businesses can use short-range,
medium-range, and long-range networks, respectively.
Section Reference 1: 10.2 Wireless Computer Networks and Internet Access
Difficulty: Easy
Bloom’s Taxonomy: Comprehension

19) Mesh networks are reliable, efficient, and fault tolerant.

Answer: True

Title: Testbank Question 10.19


Learning Objective 1: 10.2 Explain how businesses can use short-range,
medium-range, and long-range networks, respectively.
Section Reference 1: 10.2 Wireless Computer Networks and Internet Access
Difficulty: Easy
Bloom’s Taxonomy: Comprehension

20) Personalization means that a mobile device can provide real-time


communication, independent of the user’s location.

Answer: False

Title: Testbank Question 10.20


Learning Objective 1: 10.3 Provide a specific example of how each of the five
major m-commerce applications can benefit a business.
Section Reference 1: 10.3 Mobile Computing and Mobile Commerce
Difficulty: Easy
Bloom’s Taxonomy: Application

21) A voice portal is a standard Web site that accepts voice commands.

Answer: False

Title: Testbank Question 10.21


Learning Objective 1: 10.3 Provide a specific example of how each of the five
major m-commerce applications can benefit a business.
Section Reference 1: 10.3 Mobile Computing and Mobile Commerce
Difficulty: Easy
Bloom’s Taxonomy: Application

22) Mobile wallets enable users to make purchases with a single click from a
mobile device.

Answer: True
Title: Testbank Question 10.22
Learning Objective 1: 10.3 Provide a specific example of how each of the five
major m-commerce applications can benefit a business.
Section Reference 1: 10.3 Mobile Computing and Mobile Commerce
Difficulty: Easy
Bloom’s Taxonomy: Application

23) Telemetry is the science that measures physical remoteness by means of


wireless transmissions from a remote source to a receiving station.

Answer: True

Title: Testbank Question 10.23


Learning Objective 1: 10.3 Provide a specific example of how each of the five
major m-commerce applications can benefit a business.
Section Reference 1: 10.3 Mobile Computing and Mobile Commerce
Difficulty: Easy
Bloom’s Taxonomy: Comprehension

24) Pervasive computing and virtual reality are just different names for the same
thing.

Answer: False

Title: Testbank Question 10.24


Learning Objective 1: 10.4 Describe technologies that underlie pervasive
computing, providing examples of how a business can utilize each one.
Section Reference 1: 10.4 Pervasive Computing
Difficulty: Easy
Bloom’s Taxonomy: Comprehension

25) Two systems being developed to replace bar codes are QR codes and RFID
systems.

Answer: True

Title: Testbank Question 10.25


Learning Objective 1: 10.4 Describe technologies that underlie pervasive
computing, providing examples of how a business can utilize each one.
Section Reference 1: 10.4 Pervasive Computing
Difficulty: Medium
Bloom’s Taxonomy: Knowledge
26) Active RFID tags rely entirely on RFID readers for their power.

Answer: False

Title: Testbank Question 10.26


Learning Objective 1: 10.4 Describe technologies that underlie pervasive
computing, providing examples of how a business can utilize each one.
Section Reference 1: 10.4 Pervasive Computing
Difficulty: Medium
Bloom’s Taxonomy: Comprehension

27) Rogue access points can be set up by employees.

Answer: True

Title: Testbank Question 10.27


Learning Objective 1: 10.5 Explain how the four major threats to wireless
networks can damage a business.
Section Reference 1: 10.5 Wireless Security
Difficulty: Easy
Bloom’s Taxonomy: Comprehension

28) War driving is the act of locating wireless networks while driving around a
certain area.

Answer: True

Title: Testbank Question 10.28


Learning Objective 1: 10.5 Explain how the four major threats to wireless
networks can damage a business.
Section Reference 1: 10.5 Wireless Security
Difficulty: Easy
Bloom’s Taxonomy: Comprehension

Question Type: Multiple Choice

29) Refer to the Opening Case – Mobile Commerce via Telemedicine at the
Miami Children’s Hospital: Miami Children’s Hospital, developed three
telemedicine modules. Which of the following was not one of them?

a) Mobile
b) Pervasive
c) Semistatic
d) Extremely Static

Answer: b

Title: Testbank Question 10.29


Learning Objective 1: 10.0 Provide a real-world application of wireless, mobile
computing, and mobile commerce.
Section Reference 1: Opening Case – Mobile Commerce via Telemedicine at
the Miami Children’s Hospital
Difficulty: Medium
Bloom’s Taxonomy: Analysis

30) Refer to the Opening Case – Mobile Commerce via Telemedicine at the
Miami Children’s Hospital (MCH): In which model discussed, did MCH deploy a
number of medical carts equipped with videoconferencing technology and clinical
tools to other hospitals?

a) Mobile
b) Pervasive
c) Semistatic
d) Extremely Static

Answer: c

Title: Testbank Question 10.30


Learning Objective 1: 10.0 Provide a real-world application of wireless, mobile
computing, and mobile commerce.
Section Reference 1: Opening Case – Mobile Commerce via Telemedicine at
the Miami Children’s Hospital
Difficulty: Medium
Bloom’s Taxonomy: Analysis

31) Individuals are finding it convenient and productive to use wireless devices
for which of the following reasons?

a) To make use of time that was formerly wasted


b) To become more efficient
c) Work locations are more flexible
d) To be able to allocate working time around personal and professional
obligations
e) All of the choices are correct.
Answer: e

Title: Testbank Question 10.31


Learning Objective 1: 10.1 Identify advantages and disadvantages of each of the
four main types of wireless transmission media.
Section Reference 1: 10.1 Wireless Technologies
Difficulty: Medium
Bloom’s Taxonomy: Application

32) Which of the following is not an advantage of wireless devices to users?

a) They have sufficient computing power to perform productive tasks.


b) They are small enough to easily carry or wear.
c) They can communicate wirelessly with the Internet and other devices.
d) All of the above are advantages.

Answer: d

Title: Testbank Question 10.32


Learning Objective 1: 10.1 Identify advantages and disadvantages of each of the
four main types of wireless transmission media.
Section Reference 1: 10.1 Wireless Technologies
Difficulty: easy
Bloom’s Taxonomy: Application

33) Of the following, which is the major problem with smart phones?

a) They are too slow.


b) They are too expensive.
c) They can be used to compromise security.
d) Their screens are too small.
e) Their browsers are not fully functional.

Answer: c

Title: Testbank Question 10.33


Learning Objective 1: 10.1 Identify advantages and disadvantages of each of the
four main types of wireless transmission media.
Section Reference 1: 10.1 Wireless Technologies
Difficulty: Medium
Bloom’s Taxonomy: Comprehension
34) The capabilities of smart phones include all of the following except
_________.

a) A calculator
b) E-mail
c) A global positioning system
d) Corporate transaction processing
e) A fully-functioning Internet browser

Answer: d

Title: Testbank Question 10.34


Learning Objective 1: 10.1 Identify advantages and disadvantages of each of the
four main types of wireless transmission media.
Section Reference 1: 10.1 Wireless Technologies
Difficulty: Easy
Bloom’s Taxonomy: Comprehension

35) Unfortunately, many managers consider smart phones as only _____, rather
than as _____ that can transmit wirelessly.

a) Phones, digital cameras


b) Phones, pagers
c) Digital cameras, phones
d) Digital cameras, pagers
e) Cheap, expensive devices

Answer: a

Title: Testbank Question 10.35


Learning Objective 1: 10.1 Identify advantages and disadvantages of each of the
four main types of wireless transmission media.
Section Reference 1: 10.1 Wireless Technologies
Difficulty: Medium
Bloom’s Taxonomy: Application

36) Microwave transmission systems are used for _____ volume, _____
distance, _____ communications.

a) Low, long, broadcast


b) Low, short, line-of-sight
c) High, long, broadcast
d) High, short, broadcast
e) High, long, line-of-sight
Answer: e

Title: Testbank Question 10.36


Learning Objective 1: 10.1 Identify advantages and disadvantages of each of the
four main types of wireless transmission media.
Section Reference 1: 10.1 Wireless Technologies
Difficulty: Medium
Bloom’s Taxonomy: Application

37) Which type of satellite has the largest footprint?

a) Low-earth-orbit
b) Medium-earth-orbit
c) Geostationary
d) Polar orbit
e) Equatorial orbit

Answer: c

Title: Testbank Question 10.37


Learning Objective 1: 10.1 Identify advantages and disadvantages of each of the
four main types of wireless transmission media.
Section Reference 1: 10.1 Wireless Technologies
Difficulty: Easy
Bloom’s Taxonomy: Comprehension

38) The area of the earth reached by a satellite’s transmission is referred to as its
_____.

a) Hotspot
b) Coverage
c) Footprint
d) Zone
e) Wireless area

Answer: c

Title: Testbank Question 10.38


Learning Objective 1: 10.1 Identify advantages and disadvantages of each of the
four main types of wireless transmission media.
Section Reference 1: 10.1 Wireless Technologies
Difficulty: Easy
Bloom’s Taxonomy: Comprehension
39) The greatest problem with GEO satellites is which of the following?

a) Propagation delay
b) Expense
c) Orbital life
d) Size of the footprint
e) Relative speed with respect to a point on the earth’s surface

Answer: a

Title: Testbank Question 10.39


Learning Objective 1: 10.1 Identify advantages and disadvantages of each of the
four main types of wireless transmission media.
Section Reference 1: 10.1 Wireless Technologies
Difficulty: Easy
Bloom’s Taxonomy: Comprehension

40) Refer to IT’s About Business 10.1 – Skybox Imaging Provides Commercial
Images from Earth’s Orbit: Skybox’s long-term business model calls for the
______________.

a) sale of high quality satellite images


b) launching of a small number of expensive satellites
c) scanning their images for and collecting useful and valuable data
d) use of high resolution cameras on their satellites

Answer: c

Title: Testbank Question 10.40


Learning Objective 1: 10.1 Identify advantages and disadvantages of each of the
four main types of wireless transmission media.
Section Reference 1: IT’s About Business 10.1-- Skybox Imaging Provides
Commercial Images from Earth’s Orbit
Difficulty: Medium
Bloom’s Taxonomy: Analysis

41) _____ is a satellite-based tracking system that enables users to determine a


person’s position.

a) Bluetooth
b) Wireless application protocol
c) Short message service
d) Wi-Fi
e) Global positioning system

Answer: e

Title: Testbank Question 10.41


Learning Objective 1: 10.1 Identify advantages and disadvantages of each of the
four main types of wireless transmission media.
Section Reference 1: 10.1 Wireless Technologies
Difficulty: Easy
Bloom’s Taxonomy: Comprehension

42) Which of the following is not an advantage of radio?

a) No metallic wires are needed.


b) Radio waves propagate easily through office walls.
c) Radio devices are inexpensive.
d) Radio waves do not create electrical interference problems.
e) Radio devices are easy to install.

Answer: d

Title: Testbank Question 10.42


Learning Objective 1: 10.1 Identify advantages and disadvantages of each of the
four main types of wireless transmission media.
Section Reference 1: 10.1 Wireless Technologies
Difficulty: Medium
Bloom’s Taxonomy: Application

43) The main problem with radio transmission is which of the following?

a) Radio waves cannot travel through walls.


b) When you travel too far from the source, the signal fades.
c) Devices are difficult to install.
d) Radio waves are slow.
e) Devices are expensive to install.

Answer: b

Title: Testbank Question 10.43


Learning Objective 1: 10.1 Identify advantages and disadvantages of each of the
four main types of wireless transmission media.
Section Reference 1: 10.1 Wireless Technologies
Difficulty: Medium
Bloom’s Taxonomy: Application
44) The most common wireless technology for TV and DVD remote control
devices is _______.

a) Bluetooth
b) Ultra-wideband
c) Near-field communications
d) WiMAX
e) Infrared

Answer: e

Title: Testbank Question 10.44


Learning Objective 1: 10.1 Identify advantages and disadvantages of each of the
four main types of wireless transmission media.
Section Reference 1: 10.1 Wireless Technologies
Difficulty: Easy
Bloom’s Taxonomy: Application

45) Michaela runs a dog-walking business. She has three employees, and she
prides herself in maintaining a high level of customer service. She gets about half
of her business from last-minute requests. When she receives such a request,
she needs to know where her employees are so that she can identify the nearest
one who might be able to do the walk. Significantly, she needs this information
before she can confirm the walk with the client. Which of the following
technologies will help her obtain this information?

a) Radio transmission
b) Internet over Satellite
c) LEO constellation
d) GPS
e) Microwave

Answer: d

Title: Testbank Question 10.45


Learning Objective 1: 10.1 Identify advantages and disadvantages of each of the
four main types of wireless transmission media.
Section Reference 1: 10.1 Wireless Technologies
Difficulty: Medium
Bloom’s Taxonomy: Synthesis

46) Michaela runs a dog-walking business. She has three employees, and she
prides herself in maintaining a high level of customer service. She recently
purchased a smartphone for herself for the business and is giving each
employee $30 a month to subsidize their smartphone monthly bill. Using her
smartphone will help Michaela with all but which of the following?

a) Browse the Internet


b) Update the billing on her home laptop
c) Find her employees using GPS
d) Answer Email.
e) Take pictures of the dogs to post on her Web site.

Answer: b

Title: Testbank Question 10.46


Learning Objective 1: 10.1 Identify advantages and disadvantages of each of the
four main types of wireless transmission media.
Section Reference 1: 10.1 Wireless Technologies
Difficulty: Medium
Bloom’s Taxonomy: Synthesis

47) Frank and his wife, Paula, run a country store in a high-foot-traffic area in a
resort town. The store has a special area where husbands can sit while their
wives are shopping. The Men’s Corner already has a large-screen TV for sports
viewing, and they recently added Wi-Fi. Which of the following is not a security
issue?

a) A rogue access point


b) War driving
c) Motes
d) Eavesdropping
e) Radio-frequency jamming

Answer: d

Title: Testbank Question 10.47


Learning Objective 1: 10.1 Identify advantages and disadvantages of each of the
four main types of wireless transmission media.
Section Reference 1: 10.1 Wireless Technologies
Difficulty: Medium
Bloom’s Taxonomy: Synthesis

48) _____ is a wireless standard that enables temporary, short-range connection


between mobile devices.

a) Bluetooth
b) Wireless application protocol
c) Short message service
d) Wi-Fi
e) Global positioning system

Answer: a

Title: Testbank Question 10.48


Learning Objective 1: 10.2 Explain how businesses can use short-range,
medium-range, and long-range networks, respectively.
Section Reference 1: 10.2 Wireless Computer Networks and Internet Access
Difficulty: Easy
Bloom’s Taxonomy: Comprehension

49) Which of the following is the most appropriate wireless networking standard
for creating personal area networks?

a) Wi-Fi
b) Cellular radio
c) Microwave
d) Bluetooth
e) WiMAX

Answer: d

Title: Testbank Question 10.49


Learning Objective 1: 10.2 Explain how businesses can use short-range,
medium-range, and long-range networks, respectively.
Section Reference 1: 10.2 Wireless Computer Networks and Internet Access
Difficulty: Easy
Bloom’s Taxonomy: Analysis

50) Which of the following is the most appropriate wireless technology for real-
time location of caregivers and mobile equipment in healthcare environments?

a) Wi-Fi
b) Microwave
c) Ultra-wideband
d) Infrared
e) Bluetooth

Answer: c

Title: Testbank Question 10.50


Learning Objective 1: 10.2 Explain how businesses can use short-range,
medium-range, and long-range networks, respectively.
Section Reference 1: 10.2 Wireless Computer Networks and Internet Access
Difficulty: Medium
Bloom’s Taxonomy: Analysis

51) _____, with the shortest range of any wireless network, is designed to be
used with contactless credit cards.

a) Near-field communications
b) Bluetooth
c) Ultra-wideband
d) Wi-Fi
e) Infrared

Answer: a

Title: Testbank Question 10.51


Learning Objective 1: 10.2 Explain how businesses can use short-range,
medium-range, and long-range networks, respectively.
Section Reference 1: 10.2 Wireless Computer Networks and Internet Access
Difficulty: Easy
Bloom’s Taxonomy: Analysis

52) Which of the following statements about Wi-Fi is not correct?

a) Wi-Fi provides simple Internet access.


b) Laptop PC scans contain chips that can send and receive Wi-Fi signals.
c) Many companies offer free Wi-Fi access in their stores.
d) Wi-Fi requires encryption for secure transmissions.
e) Wi-Fi is expensive to set up.

Answer: e

Title: Testbank Question 10.52


Learning Objective 1: 10.2 Explain how businesses can use short-range,
medium-range, and long-range networks, respectively.
Section Reference 1: 10.2 Wireless Computer Networks and Internet Access
Difficulty: Medium
Bloom’s Taxonomy: Analysis

53) Refer to IT’s About Business 10.2 – A Wi-Fi Network Provides


Communications at the 2014 Winter Olympic Games: Building the WiFi network
for the Sochi games presented a number of challenges for Avaya. Which of the
following was not one of them?

a) Visitors to the games would have an unprecedented number of mobile


devices.
b) Had to deliver 30 Internet Protocol High-definition Television channels.
c) Wired traffic was projected to exceed wireless traffic.
d) Network equipment had to operate in extreme weather conditions.

Answer: c

Title: Testbank Question 10.53


Learning Objective 1: 10.2 Explain how businesses can use short-range,
medium-range, and long-range networks, respectively.
Section Reference 1: IT’s About Business 10.2-- A Wi-Fi Network Provides
Communications at the 2014 Winter Olympic Games
Difficulty: hard
Bloom’s Taxonomy: Analysis

54) Which of the following is not inhibiting faster Wi-Fi expansion?

a) Users cannot roam from hotspot to hotspot if the hotspots use different Wi-Fi
network services.
b) A lack of security.
c) The growth of WiMAX
d) Unless the service is free, users have to log on to separate accounts for each
hotspot.
e) Wi-Fi services may not survive in the face of free hotspot access.

Answer: c

Title: Testbank Question 10.54


Learning Objective 1: 10.2 Explain how businesses can use short-range,
medium-range, and long-range networks, respectively.
Section Reference 1: 10.2 Wireless Computer Networks and Internet Access
Difficulty: Hard
Bloom’s Taxonomy: Analysis

55) A small geographical perimeter within which a wireless access point provides
service to a number of users is called a ________.

a) Transceiver
b) Hotspot
c) Local reception node
d) Wireless network
e) GPS location

Answer: b

Title: Testbank Question 10.55


Learning Objective 1: 10.2 Explain how businesses can use short-range,
medium-range, and long-range networks, respectively.
Section Reference 1: 10.2 Wireless Computer Networks and Internet Access
Difficulty: Easy
Bloom’s Taxonomy: Comprehension

56) Today, most wireless local area networks use the _____ standard, which can
transmit up to 54 Mbps and has a range of about 300 feet.

a) 802.11a
b) 802.11b
c) 802.11c
d) 802.11g
e) WiMAX

Answer: d

Title: Testbank Question 10.56


Learning Objective 1: 10.2 Explain how businesses can use short-range,
medium-range, and long-range networks, respectively.
Section Reference 1: 10.2 Wireless Computer Networks and Internet Access
Difficulty: Easy
Bloom’s Taxonomy: Comprehension

57) _____ networks use multiple Wi-Fi access points to create a wide area
network.

a) Mesh
b) Pervasive
c) Global
d) Fixed
e) Ubiquitous

Answer: a

Title: Testbank Question 10.57


Learning Objective 1: 10.2 Explain how businesses can use short-range,
medium-range, and long-range networks, respectively.
Section Reference 1: 10.2 Wireless Computer Networks and Internet Access
Difficulty: Easy
Bloom’s Taxonomy: Comprehension

58) _____ communicate(s) via radio waves using radio antennas placed within
adjacent geographic areas.

a) Bluetooth
b) Cell phones
c) A satellite
d) Ultra-wideband
e) Near-field communications

Answer: b

Title: Testbank Question 10.58


Learning Objective 1: 10.2 Explain how businesses can use short-range,
medium-range, and long-range networks, respectively.
Section Reference 1: 10.2 Wireless Computer Networks and Internet Access
Difficulty: Easy
Bloom’s Taxonomy: Application

59) The _____ standard can transmit up to 75 Mbps and has a range of 31 miles.

a) Wi-Fi
b) 802.11b
c) 802.11c
d) 802.11g
e) WiMAX

Answer: e

Title: Testbank Question 10.59


Learning Objective 1: 10.2 Explain how businesses can use short-range,
medium-range, and long-range networks, respectively.
Section Reference 1: 10.2 Wireless Computer Networks and Internet Access
Difficulty: Medium
Bloom’s Taxonomy: Comprehension

60) Refer to IT’s About Business 10.3 – A Tiny Cellular Network for a Remote
Tribe in Indonesia: The remote indigenous tribe in Papua, Indonesia, uses a
specialized network configuration to provide themselves with access to the
Internet. Which of the following does this network not contain?
a) Utilizes power from an existing hydropower generator.
b) It uses an inexpensive base station roped to a treetop.
c) Uses a satellite dish to provide connectivity to a local school.
d) It uses a high power transmission tower situated on top of a hill near the
village.

Answer: d

Title: Testbank Question 10.60


Learning Objective 1: 10.2 Explain how businesses can use short-range,
medium-range, and long-range networks, respectively.
Section Reference 1: IT’s About Business 10.3 - A Tiny Cellular Network for a
Remote Tribe in Indonesia
Difficulty: Medium
Bloom’s Taxonomy: Analysis

61) Frank and his wife, Paula, run a country store in a high-foot-traffic area in a
resort town. The store has a special area where husbands can sit while their
wives are shopping. The Men’s Corner already has a large-screen TV for sports
viewing, but Frank and Paula are considering adding Wi-Fi. Which of the
following statements is false?

a) Their store would need to have broadband access.


b) Their store will need a wireless access point.
c) They could charge the customers for the service.
d) Wi-Fi is based on radio waves, so they will need a clear line-of-sight into the
room.
e) They should consider using Wi-Fi Direct.

Answer: e

Title: Testbank Question 10.61


Learning Objective 1: 10.2 Explain how businesses can use technology
employed by short-range, medium-range, and long-range networks, respectively.
Section Reference 1: 10.2 Wireless Computer Networks and Internet Access
Difficulty: Medium
Bloom’s Taxonomy: Synthesis

62) Frank and his wife, Paula, run a country store with a special room where
husbands can sit while their wives are shopping. The Men’s Corner already has a
large-screen TV for sports viewing, and they recently added Wi-Fi. In order to
provide Wi-Fi to this area, Frank and Paula had to install ___________.
a) a wireless access point
b) a local reception node
c) a motes
d) a GPS location
e) near-field communications.

Answer: a

Title: Testbank Question 10.62


Learning Objective 1: 10.2 Explain how businesses can use technology
employed by short-range, medium-range, and long-range networks, respectively.
Section Reference 1: 10.2 Wireless Computer Networks and Internet Access
Difficulty: Medium
Bloom’s Taxonomy: Analysis

63) Frank and his wife, Paula, run a country store with a special room where
husbands can sit while their wives are shopping. The Men’s Corner already has a
large-screen TV for sports viewing, and they recently added Wi-Fi. The area of
the store that is provided this service is called a _________.

a) transceiver
b) local reception node
c) GPS location
d) mote
e) hotspot

Answer: e

Title: Testbank Question 10.63


Learning Objective 1: 10.2 Explain how businesses can use technology
employed by short-range, medium-range, and long-range networks, respectively.
Section Reference 1: 10.2 Wireless Computer Networks and Internet Access
Difficulty: Medium
Bloom’s Taxonomy: Analysis

64) The two major characteristics that differentiate mobile computing from other
forms of computing are ______ and ________.

a) Mobility, broad reach


b) Mobility, lack of expense
c) Security, broad reach
d) Security, mobility
e) Broad reach, localization
Answer: a

Title: Testbank Question 10.64


Learning Objective 1: 10.3 Provide a specific example of how each of the five
major m-commerce applications can benefit a business.
Section Reference 1: 10.3 Mobile Computing and Mobile Commerce
Difficulty: Medium
Bloom’s Taxonomy: Analysis

65) With regard to mobile computing, _____ means that knowing where a user is
physically located is a key to offering relevant products and services.

a) Ubiquity
b) Convenience
c) Instant connectivity
d) Personalization
e) Localization of products and services

Answer: e

Title: Testbank Question 10.65


Learning Objective 1: 10.3 Provide a specific example of how each of the five
major m-commerce applications can benefit a business.
Section Reference 1: 10.3 Mobile Computing and Mobile Commerce
Difficulty: Easy
Bloom’s Taxonomy: Application

66) The development of mobile commerce is driven by all of the following factors
except _________________.

a) The widespread availability of mobile devices.


b) The cell phone culture.
c) Increasing prices.
d) Bandwidth improvement.
e) It eliminates the need for a PC.

Answer: c

Title: Testbank Question 10.66


Learning Objective 1: 10.3 Provide a specific example of how each of the five
major m-commerce applications can benefit a business.
Section Reference 1: 10.3 Mobile Computing and Mobile Commerce
Difficulty: Medium
Bloom’s Taxonomy: Application

67) Refer to IT’s About Business 10.4 – Apple’s iBeacons: The primary purpose
of Apple’s iBecons is to…

a) replace the need to plug Apple devices in to recharge their batteries.


b) allow advertisers and businesses partners to deliver information and other
media to a person’s location.
c) replace GPS satellites.
d) transmit credit card information.

Answer: b

Title: Testbank Question 10.67


Learning Objective 1: 10.3 Discuss the five major m-commerce applications, and
provide a specific example of how each application can benefit a business.
Section Reference 1: IT’s About Business 10.4: Apple’s iBeacons
Difficulty: easy
Bloom’s Taxonomy: Analysis

68) Refer to IT’s About Business 10.4 – Apple’s iBeacons: Which of the following
might not be an application for iBeacon?

a) Track which sessions a conference attendee attends.


b) Automatically unlock your front door as you approach it.
c) Permit a gas station to know when you are at a store’s gas pump and offer you
a discount on something inside the store.
d) All of the above are possible uses for iBeacon.

Answer: d

Title: Testbank Question 10.68


Learning Objective 1: 10.3 Discuss the five major m-commerce applications, and
provide a specific example of how each application can benefit a business.
Section Reference 1: IT’s About Business 10.4: Apple’s iBeacons
Difficulty: Medium
Bloom’s Taxonomy: Analysis

69) Which of the following is not a mobile application in financial services?

a) Transaction processing systems


b) Mobile banking
c) Wireless electronic payment systems
d) Micropayments
e) Wireless wallets

Answer: a

Title: Testbank Question 10.69


Learning Objective 1: 10.3 Provide a specific example of how each of the five
major m-commerce applications can benefit a business.
Section Reference 1: 10.3 Mobile Computing and Mobile Commerce
Difficulty: Medium
Bloom’s Taxonomy: Application

70) Parking meters that you can pay via your mobile telephone are an example
of _________.

a) Mobile banking
b) Wireless electronic payment
c) Wireless wallets
d) Brokerage service
e) Money transfer

Answer: b

Title: Testbank Question 10.70


Learning Objective 1: 10.3 Provide a specific example of how each of the five
major m-commerce applications can benefit a business.
Section Reference 1: 10.3 Mobile Computing and Mobile Commerce
Difficulty: Easy
Bloom’s Taxonomy: Application

71) If you buy a hot dog at a concession stand using your contactless credit card,
you are using a ________.

a) Wireless money transfer


b) Wireless wallet
c) Wireless bill payment
d) Micropayment
e) Wireless electronic payment system

Answer: e

Title: Testbank Question 10.71


Learning Objective 1: 10.3 Provide a specific example of how each of the five
major m-commerce applications can benefit a business.
Section Reference 1: 10.3 Mobile Computing and Mobile Commerce
Difficulty: Medium
Bloom’s Taxonomy: Application

72) Putting ads on top of taxicabs in New York City that change as the cabs
travel around the city is an example of ________.

a) Viral marketing
b) Permission advertising
c) Geographical advertising
d) Location-based advertising
e) Direct marketing

Answer: d

Title: Testbank Question 10.72


Learning Objective 1: 10.3 Provide a specific example of how each of the five
major m-commerce applications can benefit a business.
Section Reference 1: 10.3 Mobile Computing and Mobile Commerce
Difficulty: Medium
Bloom’s Taxonomy: Application

73) _____ is the science that measures physical remoteness by means of


wireless transmission from a remote source to a receiving station.

a) Telemetry
b) Wireless access point
c) Near-field communications
d) Microwave
e) Wireless positioning

Answer: a

Title: Testbank Question 10.73


Learning Objective 1: 10.3 Provide a specific example of how each of the five
major m-commerce applications can benefit a business.
Section Reference 1: 10.3 Mobile Computing and Mobile Commerce
Difficulty: Easy
Bloom’s Taxonomy: Application

74) Frank and his wife, Paula, run a country store in a high-foot-traffic area in a
resort town. Which of the following would not be a beneficial use of mobile
technology for their store?
a) Telemetry
b) Location-based
c) Wireless payments
d) Mobile app loyalty program
e) All of these could be used beneficial.

Answer: a

Title: Testbank Question 10.74


Learning Objective 1: 10.3 Provide a specific example of how each of the five
major m-commerce applications can benefit a business.
Section Reference 1: 10.3 Mobile Computing and Mobile Commerce
Difficulty: Medium
Bloom’s Taxonomy: Analysis

75) The generic term for technologies that use radio waves to automatically
identify individual items is __________.

a) Telemetry
b) Bar codes
c) Shipping labels
d) Radio-frequency identification
e) Wireless access points

Answer: d

Title: Testbank Question 10.75


Learning Objective 1: 10.4 Describe technologies that underlie pervasive
computing, providing examples of how a business can utilize each one.
Section Reference 1: 10.4 Pervasive Computing
Difficulty: Easy
Bloom’s Taxonomy: Application

76) Which of the following is not a limitation of barcodes?

a) They require line-of-sight to the scanning device.


b) They are printed on paper.
c) They identify the manufacturer, product, and item.
d) They are difficult to use in a manufacturing plant.
e) They are useless in determining expiration date.

Answer: c
Title: Testbank Question 10.76
Learning Objective 1: 10.4 Describe technologies that underlie pervasive
computing, providing examples of how a business can utilize each one.
Section Reference 1: 10.4 Pervasive Computing
Difficulty: Medium
Bloom’s Taxonomy: Analysis

77) The major problem with RFID has been _______.

a) Expense
b) Bandwidth
c) Location
d) RFID readers
e) RFID tags

Answer: a

Title: Testbank Question 10.77


Learning Objective 1: 10.4 Describe technologies that underlie pervasive
computing, providing examples of how a business can utilize each one.
Section Reference 1: 10.4 Pervasive Computing
Difficulty: Easy
Bloom’s Taxonomy: Analysis

78) What would be the best use of RFID in a business?

a) Transaction processing
b) Supply chain management
c) Personnel tracking
d) Enabling communications with customers
e) Decreasing network costs

Answer: b

Title: Testbank Question 10.78


Learning Objective 1: 10.4 Describe technologies that underlie pervasive
computing, providing examples of how a business can utilize each one.
Section Reference 1: 10.4 Pervasive Computing
Difficulty: Medium
Bloom’s Taxonomy: Analysis

79) Refer to IT’s About Business 10.5 – Marks & Spencer (M&S) Embraces
RFID: M&S’s first application of RFID was _______________.
a) RFID tagging to track men’s suits, shirts, and ties.
b) the use of one-time use RFID tags to track fresh food between suppliers and
distribution centers.
c) the use of reusable RFID tags to track fresh food between suppliers and
distribution centers.
d) the use of RFID tags to track food shipped between distribution centers and
stores.

Answer: c

Title: Testbank Question 10.79


Learning Objective 1: 10.4 Describe technologies that underlie pervasive
computing, providing examples of how a business can utilize each one.
Section Reference 1: IT’s About Business 10.5: Marks & Spencer Embraces
RFID
Difficulty: Medium
Bloom’s Taxonomy: Analysis

80) Refer to IT’s About Business 10.5 – Marks & Spencer Embraces RFID:
Which of the following was not an considered a benefit of RFID tags by M&S?

a) Reduced the number of calls from stores to distribution centers about missing
stock.
b) Lets them use off-the-shelf software for their inventory system.
c) Provided better information about the inventory level in an individual store.
d) Provided M&S information about the exact number of each item in stock in
each store.

Answer: b

Title: Testbank Question 10.80


Learning Objective 1: 10.4 Describe technologies that underlie pervasive
computing, providing examples of how a business can utilize each one.
Section Reference 1: IT’s About Business 10.5: Marks & Spencer Embraces
RFID
Difficulty: Hard
Bloom’s Taxonomy: Analysis

81) _____ networks collect data from many points over an extended space.

a) Bluetooth
b) Ultra-wideband
c) Wireless sensor
d) WiMAX
e) Wi-Fi

Answer: c

Title: Testbank Question 10.81


Learning Objective 1: 10.4 Describe technologies that underlie pervasive
computing, providing examples of how a business can utilize each one.
Section Reference 1: 10.4 Pervasive Computing
Difficulty: Easy
Bloom’s Taxonomy: Application

82) Frank and his wife, Paula, run a country store in a high-foot-traffic area in a
resort town. They are trying to understand what the traffic in the store is by using
technology. They are considering setting up a wireless sensor network. Which of
the following statements is false?

a) Motes can be locations throughout the store.


b) Once they have created the network, they cannot add additional sensors.
c) The data are moved from sensor to sensor to reach a central computer.
d) The sensors can tell the direction in which a person is moving.
e) The network will need a base station.

Answer: d

Title: Testbank Question 10.82


Learning Objective 1: 10.4 Describe technologies that underlie pervasive
computing, providing examples of how a business can utilize each one.
Section Reference 1: 10.4 Pervasive Computing
Difficulty: Medium
Bloom’s Taxonomy: Analysis

83) The act of locating wireless local area networks while moving around a city is
called ____.

a) Eavesdropping
b) War driving
c) RF jamming
d) Cybersquatting
e) Installing rogue access devices

Answer: b

Title: Testbank Question 10.83


Learning Objective 1: 10.5 Explain how the four major threats to wireless
networks can damage a business.
Section Reference 1: 10.5 Wireless Security
Difficulty: Easy Bloom’s Taxonomy: Comprehension

84) A(n) _____ allows unauthorized entry into a wireless network.

a) Lack of encryption
b) Disgruntled employee
c) Open node
d) Illegal server
e) Rogue access point

Answer: e

Title: Testbank Question 10.84


Learning Objective 1: 10.5 Explain how the four major threats to wireless
networks can damage a business.
Section Reference 1: 10.5 Wireless Security
Difficulty: Easy
Bloom’s Taxonomy: Analysis

85) _____ refers to efforts by unauthorized users to access data traveling over
wireless networks.

a) RF jamming
b) War driving
c) Eavesdropping
d) Telemetry
e) Installing rogue access devices

Answer: c

Title: Testbank Question 10.85


Learning Objective 1: 10.5 Explain how the four major threats to wireless
networks can damage a business.
Section Reference 1: 10.5 Wireless Security
Difficulty: Easy
Bloom’s Taxonomy: Analysis

86) In _____, a person or a device intentionally or unintentionally interferes with


your wireless network transmissions.
a) RF jamming
b) War driving
c) Eavesdropping
d) Telemetry
e) Installing rogue access devices

Answer: a

Title: Testbank Question 10.86


Learning Objective 1: 10.5 Explain how the four major threats to wireless
networks can damage a business.
Section Reference 1: 10.5 Wireless Security
Difficulty: Easy
Bloom’s Taxonomy: Comprehension

87) Although rogue access devices can be installed innocently, they can also be
installed by an attacker trying to gain unauthorized access to a wireless network.
In such cases, these devices are called an _____.

a) Unencrypted node
b) Evil twin
c) Open node
d) Illegal server
e) Unauthorized rogue access point

Answer: b

Title: Testbank Question 10.87


Learning Objective 1: 10.5 Explain how the four major threats to wireless
networks can damage a business.
Section Reference 1: 10.5 Wireless Security
Difficulty: Easy
Bloom’s Taxonomy: Analysis

88) Frank and his wife, Paula, run a country store with a special room where
husbands can sit while their wives are shopping. The Men’s Corner already has a
large-screen TV for sports viewing, and they recently added Wi-Fi. Paula says
she’s heard about people driving around trying to find wireless points. You tell
her this is called _____________.

a) Eavesdropping
b) Cybersquatting
c) RF jamming
d) War driving
e) Installing rogue access devices

Answer: d

Title: Testbank Question 10.88


Learning Objective 1: 10.5 Explain how the four major threats to wireless
networks can damage a business.
Section Reference 1: 10.5 Wireless Security
Difficulty: Medium
Bloom’s Taxonomy: Analysis

89) Frank and his wife, Paula, run a country store with a special room where
husbands can sit while their wives are shopping. The Men’s Corner already has a
large-screen TV for sports viewing, and they recently added Wi-Fi. Paula says
she’s heard about people driving around trying to access data as it’s being
transmitted on wireless networks. You tell her this is called ___________.

a) Eavesdropping
b) Cybersquatting
c) RF jamming
d) War driving
e) Installing rogue access devices

Answer: a

Title: Testbank Question 10.89


Learning Objective 1: 10.5 Explain how the four major threats to wireless
networks can damage a business.
Section Reference 1: 10.5 Wireless Security
Difficulty: Medium
Bloom’s Taxonomy: Analysis

90) Frank and his wife, Paula, run a country store with a special room where
husbands can sit while their wives are shopping. The Men’s Corner already has a
large-screen TV for sports viewing, and they recently added Wi-Fi. Paula says
she’s heard about people trying to interfere with other people’s wireless
transmissions. You tell her this is called ______________.

a) Eavesdropping
b) Cybersquatting
c) RF jamming
d) War driving
e) Installing rogue access devices
Answer: c

Title: Testbank Question 10.90


Learning Objective 1: 10.5 Explain how the four major threats to wireless
networks can damage a business.
Section Reference 1: 10.5 Wireless Security
Difficulty: Medium
Bloom’s Taxonomy: Analysis

91) Refer to Closing Case #1 – Republic Wireless and FreedomPop Might


Disrupt the Wireless Industry: Which of the following is not a correct statement
about Cisco’s 2012 cellular traffic report?

a) Cellular traffic grew more than expected.


b) Mobile device users adjusted their device settings to automatically jump from
home to office Wi-Fi networks.
c) Adjusting device settings enabled users to avoid for exceeding their data
limits.
d) The industry rule of thumb is a smartphone uses four gigabytes of data per
month.

Answer: a

Title: Testbank Question 10.91


Learning Objective 1: 10.6 Summarize the fundamental concepts related to
wireless, mobile computing, and mobile commerce.
Section Reference 1: Closing Case 1: Republic Wireless and FreedomPop Might
Disrupt the Wireless Industry
Difficulty: Medium
Bloom’s Taxonomy: Analysis

92) Refer to Closing Case #2 – Has Facebook Solved the Mobile Ad Problem?:
Facebook exploited several mobile marketing myths. Which of the following is
not one of the myths?

a) Facebook’s mobile ads take up more screen space than desktop ads do.
b) Advertisers cannot run big, flashy ads on a tiny screen.
c) Users might baulk at ads mixed with posts from friends.
d) All of the above are mobile advertising myths.

Answer: a

Title: Testbank Question 10.92


Learning Objective 1: 10.6 Summarize the fundamental concepts related to
wireless, mobile computing, and mobile commerce.
Section Reference 1: Closing Case 2: Has Facebook Solved the Mobile Ad
Problem?
Difficulty: Medium
Bloom’s Taxonomy: Analysis

Question Type: Essay

93) Discuss the differences between the traditional working environment and the
wireless working environment.

Title: Testbank Question 10.93


Learning Objective 1: 10.1 Identify advantages and disadvantages of each of the
four main types of wireless transmission media.
Section Reference 1: 10.1 Wireless Technologies
Difficulty: Medium
Bloom’s Taxonomy: Synthesis

94) Describe the convergence of functions in today’s smart phones.

Title: Testbank Question 10.94


Learning Objective 1: 10.1 Identify advantages and disadvantages of each of the
four main types of wireless transmission media.
Section Reference 1: 10.1 Wireless Technologies
Difficulty: Medium
Bloom’s Taxonomy: Synthesis

95) Differentiate among the three types of satellites.

Title: Testbank Question 10.95


Learning Objective 1: 10.1 Identify advantages and disadvantages of each of the
four main types of wireless transmission media.
Section Reference 1: 10.1 Wireless Technologies
Difficulty: Medium
Bloom’s Taxonomy: Synthesis

96) Define Bluetooth, and give examples of its uses.

Title: Testbank Question 10.96


Learning Objective 1: 10.1 Identify advantages and disadvantages of each of the
four main types of wireless transmission media.
Section Reference 1: 10.1 Wireless Technologies
Difficulty: Medium
Bloom’s Taxonomy: Synthesis

97) What are the problems with Wi-Fi?

Title: Testbank Question 10.97


Learning Objective 1: 10.2 Explain how businesses can use technology
employed by short-range, medium-range, and long-range networks, respectively.
Section Reference 1: 10.2 Wireless Computer Networks and Internet Access
Difficulty: Medium
Bloom’s Taxonomy: Synthesis

98) Explain location-based commerce, and provide examples.

Title: Testbank Question 10.98


Learning Objective 1: 10.3 Provide a specific example of how each of the five
major m-commerce applications can benefit a business.
Section Reference 1: 10.3 Mobile Commuting and Mobile Commerce: Mobile
Commerce Applications
Difficulty: Medium
Bloom’s Taxonomy: Synthesis

99) What are micropayments and mobile wallets? Provide examples of their
uses.

Title: Testbank Question 10.99


Learning Objective 1: 10.3 Provide a specific example of how each of the five
major m-commerce applications can benefit a business.
Section Reference 1: 10.3 Mobile Commuting and Mobile Commerce: Mobile
Commerce Applications
Difficulty: Medium
Bloom’s Taxonomy: Synthesis

100) What are mobile portals and voice portals? Provide examples of their uses.

Title: Testbank Question 10.100


Learning Objective 1: 10.3 Provide a specific example of how each of the five
major m-commerce applications can benefit a business.
Section Reference 1: 10.3 Mobile Commuting and Mobile Commerce: Mobile
Commerce Applications
Difficulty: Medium
Bloom’s Taxonomy: Synthesis

101) What is telemetry, and how is it used.

Title: Testbank Question 10.101


Learning Objective 1: 10.3 Provide a specific example of how each of the five
major m-commerce applications can benefit a business.
Section Reference 1: 10.3 Mobile Commuting and Mobile Commerce: Mobile
Commerce Applications
Difficulty: Medium
Bloom’s Taxonomy: Synthesis

102) What are the two characteristics of mobile computing, and what are the five
value-added attributes of mobile computing?

Title: Testbank Question 10.102


Learning Objective 1: 10.3 Provide a specific example of how each of the five
major m-commerce applications can benefit a business.
Section Reference 1: 10.3 Mobile Computing and Mobile Commerce
Difficulty: Medium
Bloom’s Taxonomy: Synthesis

103) Explain the factors that are driving the development of mobile commerce.

Title: Testbank Question 10.103


Learning Objective 1: 10.3 Provide a specific example of how each of the five
major m-commerce applications can benefit a business.
Section Reference 1: 10.3 Mobile Computing and Mobile Commerce
Difficulty: Hard
Bloom’s Taxonomy: Synthesis

104) Describe pervasive computing and the two technologies that provide its
infrastructure.

Title: Testbank Question 10.104


Learning Objective 1: 10.4 Describe technologies that underlie pervasive
computing, providing examples of how a business can utilize each one.
Section Reference 1: 10.4 Pervasive Computing
Difficulty: Medium
Bloom’s Taxonomy: Synthesis

105) How do wireless sensor networks work, and what are they used for?

Title: Testbank Question 10.105


Learning Objective 1: 10.4 Describe technologies that underlie pervasive
computing, providing examples of how a business can utilize each one.
Section Reference 1: 10.4 Pervasive Computing
Difficulty: Medium
Bloom’s Taxonomy: Synthesis

106) Michaela runs a dog-walking business. She has three employees, and she
prides herself in maintaining a high level of customer service. She is trying to
understand if RFID would help the store. Explain RFID technology and address
how it would benefit the store.

Title: Testbank 10.106


Learning Objective 1: 10.4 Describe technologies that underlie pervasive
computing, providing examples of how a business can utilize each one.
Section Reference 1: 10.4 Pervasive Computing
Difficulty: Medium
Bloom’s Taxonomy: Evaluation

107) Frank and his wife, Paula, run a country store in a high foot traffic area in a
resort town. They are trying to understand if RFID would help the store. Explain
RFID technology and address how it would benefit the store.

Title: Testbank 10.107


Learning Objective 1: 10.4 Describe technologies that underlie pervasive
computing, providing examples of how a business can utilize each one.
Section Reference 1: 10.4 Pervasive Computing
Difficulty: Medium
Bloom’s Taxonomy: Evaluation

108) Identify and discuss the four major threats to wireless networks.

Title: Testbank Question 10.108


Learning Objective 1: 10.5 Explain how the four major threats to wireless
networks can damage a business.
Section Reference 1: 10.5 Wireless Security
Difficulty: Medium
Bloom’s Taxonomy: Synthesis

You might also like