TB_Chapter07

TB_Chapter07
TB_Chapter07

Chapter 07

1. Common examples of wireless devices include cellular phones and pagers, GPS, and two-way radios. TRUE

2. Mobile technology gives users a live (Internet) connection via satellite or radio transmitters.

FALSE

3. Wireless means the technology can travel with the user, but it is not necessarily in real-time.

FALSE

4. Microwave transmitters are commonly used to transmit radio signals over great distances.

TRUE

5. VoIP routes calls through the same paths used by network and Internet traffic, therefore it has the same vulnerabilities and is subject to the same Internet threats.

TRUE

6. Transmission speed means how fast the signal travels in terms such as miles per hour.

FALSE

7. A valued-added network is a way to use the public telecommunication infrastructure to provide secure access to an organisation's network.

FALSE

8. Broadband generally refers to high-speed Internet connections transmitting data at speeds greater than 200 kilobytes per second, compared to the 56 kbps maximum speed offered by traditional dial-up connections. TRUE

9. What is a telecommunications system?

A.Enables the transmission of data over public or private networks

B. A communications, data exchange, and resource-sharing system created by linking two or more computers and establishing standards, or protocols, so that they can work together

C.Any network without a central file server and in which all computers in the network have access to the public files located on all other workstations

D. A computer that is designed to request information from a server

10. What is a network?

A.Enables the transmission of data over public or private networks

B. A communications, data exchange, and resource-sharing system created by linking two or more computers and establishing standards, or protocols, so that they can work together

C.Any network without a central file server and in which all computers in the network have access to the public files located on all other workstations

D. A computer that is designed to request information from a server

11. What is designed to connect a group of computers in close proximity to each other such as in an office building, a school, or a home?

A.Local area network

B.Wide area network

C.Metropolitan area network

D.Peer-to-peer network

12. What spans a large geographic area, such as a state, province, or country?

A.Local area network

B.Wide area network

C.Metropolitan area network

D.Peer-to-peer network

13. What uses TCP/IP technology to transmit voice calls over long-distance telephone lines?

A.VoIP

B.WAN

C.MAN

https://www.360docs.net/doc/b413523400.html,N

14. Which of the following is not a common business network characteristic?

A.Provide for the transparent exchange of information with suppliers, trading partners, and customers

B.Respond to high demands with scalable processing power and networking capacity

C.Reliably and securely exchange information internally but never externally via the Internet

D.Allow end-to-end integration and provide message delivery across multiple systems

15. What is a virtual private network?

A.Natural parts of the Earth's environment that can be used as physical paths to carry electrical signals

B. A way to use the public telecommunication infrastructure (e.g. Internet) to provide secure access to an organisation's network

C. A private network, provided by a third party, for exchanging information through a high capacity connection

D.Refers to a type of cable composed of four (or more) copper wires twisted around each other within a plastic sheath

16. What is a value-added network?

A.Natural parts of the Earth's environment that can be used as physical paths to carry electrical signals

B. A way to use the public telecommunication infrastructure (e.g. Internet) to provide secure access to an organisation's network

C. A private network, provided by a third party, for exchanging information through a high capacity connection

D.Refers to a type of cable composed of four (or more) copper wires twisted around each other within a plastic sheath

17. Which of the following is not a significant challenge associated with VPNs and VANs?

A.They handle only limited kinds of business information

B.They offer little support for the real-time business process integration

C.They are relatively inexpensive and easy to implement

D.None of the given answers

18. What is the difference between the highest and the lowest frequencies that can be transmitted on a single medium, this being a measure of the medium's capacity?

A.VoIP

B.VPN

C.Broadband

D.Bandwidth

19. What refers to high-speed Internet connections transmitting data at speeds greater than 200 Kbps, compared to the 56 kbps maximum speed offered by traditional dial-up connections?

A.Broadband

B.Bluetooth

C.GIS

D.RFID

20. What combines the functions of a cellular phone and a PDA in a single device?

A.GPS

B.RFID

C.Smartphone

D.VoIP

21. What is wireless fidelity?

A. A means of linking computers using infrared or radio signals

B.An omnidirectional wireless technology that provides limited-range voice and data transmission over the unlicensed 2.4-GHz frequency band, allowing connections with a wide variety of fixed and portable devices that normally would have to be cabled together

C. A technology that uses active or passive tags in the form of chips or smart labels that can store unique identifiers and relay this information to electronic readers

https://www.360docs.net/doc/b413523400.html,monly used to transmit network signals over great distances

22. What is Bluetooth?

A. A means of linking computers using infrared or radio signals

B.An omnidirectional wireless technology that provides limited-range voice and data transmission over the unlicensed 2.4-GHz frequency band, allowing connections with a wide variety of fixed and portable devices that normally would have to be cabled together

C. A technology that uses active or passive tags in the form of chips or smart labels that can store unique identifiers and relay this information to electronic readers

https://www.360docs.net/doc/b413523400.html,monly used to transmit network signals over great distances

23. What is radio frequency identification (RFID)?

A. A means of linking computers using infrared or radio signals

B.An omnidirectional wireless technology that provides limited-range voice and data transmission over the unlicensed 2.4-GHz frequency band, allowing connections with a wide variety of fixed and portable devices that normally would have to be cabled together

C. A technology that uses active or passive tags in the form of chips or smart labels that can store unique identifiers and relay this information to electronic readers

https://www.360docs.net/doc/b413523400.html,monly used to transmit network signals over great distances

24. What is a global positioning system (GPS)?

A. A device that determines current latitude, longitude, speed, and direction of movement

B. A system designed to work with information that can be shown on a map

C. A system that contains a microchip and an antenna, and typically works by transmitting a serial number via radio waves to an electronic reader, which confirms the identity of a person or object bearing the tag

D. A system commonly used to transmit network signals over great distances

25. What is a geographic information system (GIS)?

A. A device that determines current latitude, longitude, speed, and direction of movement

B. A system designed to work with information that can be shown on a map

C. A system containing a microchip and an antenna, which typically works by transmitting a serial number via radio waves to an electronic reader, which confirms the identity of a person or object bearing the tag

D. A system commonly used to transmit network signals over great distances

26. What is an RFID tag?

A. A device that determines current latitude, longitude, speed, and direction of movement

B. A system designed to work with information that can be shown on a map

C.Containing a microchip and an antenna, it typically works by transmitting a serial number via radio waves to an electronic reader, which confirms the identity of a person or object bearing the tag

D. A system commonly used to transmit network signals over great distances

27. Which of the following is not a component of an RFID tag?

A.Tag

B.Reader

C.Store

https://www.360docs.net/doc/b413523400.html,puter network

28. What is the order of how RFID works in the supply chain?

A.Manufacturer, store, distribution centre, home

B.Home, manufacturer, store, distribution centre

C.Distribution centre, manufacturer, store, home

D.Manufacturer, distribution centre, store, home

29. Which of the following is a driver of wireless growth?

A.Universal access to information and applications

B.The invention of the micro hard drive

C.GIS

D.All of the given answers

30. What gives a user a live Internet connection via satellite or radio transmitters?

A.Wireless

B.Mobile

C.GPS

D.RFID

31. Which of the following is the first step an organisation should take when deploying mobile strategies?

A.Defining risks

B.Knowing the limits of technology

C.Protecting data from loss

https://www.360docs.net/doc/b413523400.html,pliance in the mobile enterprise

32. What is a small handheld computer capable of entirely digital communications transmission?

A.PDA

B.GPS

C.GIS

D.RFID

33. What is Bluetooth's maximum range?

A. 3 feet

B.30 feet

C.300 feet

D.Unlimited

34. What are wireless mobile content services that provide location-specific information to mobile users moving form location to location?

A.RFID

B.Satellite

C.LBS

D.GPS

35. Which of the following is not a privacy issue associated with location based information?

A.Target marketing

B.Embarrassment

C.Harassment

D.Identity theft

36. Which of the following is a common GIS use?

A.Finding what is nearby

B.Routing information

https://www.360docs.net/doc/b413523400.html,rmation alerts

D.All of the given answers

37. What is a telecommunications technology aimed at providing wireless data over long distances in a variety of ways, from point-to-point links to full mobile cellular type access?

A.Satellite

B.Broadband

C.WiMAX

D.None of the given answers

38. What are the two components of a WiMAX system?

A.WiMAX tower, WiMAX GPS

B.WiMAX tower, WiMAX receiver

C.WiMAX receiver, WiMAX transponder

D.WiMAX transponder, WiMAX tower

39. ________ generally refers to high-speed Internet connections transmitting data at speeds greater than 200 kilobytes per second, compared to the 56 kbps maximum speed offered by traditional dial-up connections. Broadband

40. ____________ measures cycles per second, and baud is the number of signals sent per second.

Hertz

41. Location-based ____________ are wireless mobile content services which provide location-specific information to mobile users moving form location to location.

services

42. _____________ information means immediate, up-to-date information.

Real-time

43. Cellular telephones (cell phones) work by using _____________ to communicate with radio antennas (or towers) placed within adjacent geographic areas called cells.

radio waves

44. ____________ fidelity is a means of linking computers using infrared or radio signals.

Wireless

45. _________ technology means the technology can travel with the user, but it is not necessarily in

real-time.

Mobile

46. ________________ technology gives users a live connection via satellite or radio transmitters.

Wireless

47. ___________ is an omnidirectional wireless technology that provides limited-range voice and data transmission over the unlicensed 2.4-GHz frequency band, allowing connections with a wide variety of fixed and portable devices that normally would have to be cabled together.

Bluetooth

48. Radio frequency identification tags have the potential to reinvent the ___________ chain.

supply

49. The three components of an RFID system include the tag, ________, and computer network.

reader

50. RFID in the retail supply chain includes the manufacturer, distribution centreh, store, and __________. home

51. Microwave ____________ are commonly used to transmit network signals over great distances. transmitters

52. A global ____________ system is a device that determines current latitude, longitude, speed, and direction of movement.

positioning

53. A _________ information system is designed to work with information that can be shown on a map. geographic

54. A ___________ combines the functions of a cellular phone and a PDA in a single device.

smartphone

55. Compare LANs, WANs, and MANs.

A local area network (LAN) is designed to connect group of computers in close proximity to each other such as in an office building, a school, or a home. A wide area network (WAN) spans a large geographic area, such as a state, province or country. WANs often connect multiple smaller networks, such as local area networks (LANs) or metropolitan area networks (MANs). A metropolitan area network (MAN) is a large computer network usually spanning a city.

56. Describe the business benefits associated with VoIP.

VoIP uses existing network and Internet infrastructure to route telephone calls more efficiently and inexpensively than traditional telephone service. VoIP offers businesses significant cost savings, productivity gains and service enhancements.

57. Explain the difference between a VPN and a VAN.

A virtual private network (VPN) is a way to use the public telecommunication infrastructure (e.g. Internet) to provide secure access to an organisation's network. A valued-added network (VAN) is a private network, provided by a third party, for exchanging information through a high-capacity connection.

58. Identify the advantages and disadvantages of broadband technology.

Digital Subscriber Line (DSL) - Good upload rates, uses existing telephone lines, but speeds vary depending on distance from telephone company's central office and slower downloads than less expensive alternatives. Cable - uses existing cable infrastructure, low-cost equipment, but shared connections can overload system, slowing upload times. TI/T3 Dedicated Line - uses existing phone wiring, but performance drops significantly with range and susceptible to crosstalk. Fiber-to-the-Home (FTTH) - fast data speeds, infrastructure has long life expectancy, low maintenance, low power costs, but not widely available and significant deployment cost (for company). Fixed Wireless - typically inexpensive to install, no underground digging, but weather, topography, buildings, and electronics can cause interference. Satellite - nearly universal coverage, available in otherwise inaccessible area, but expensive service/equipment and upload/download delays.

59. List and describe many of the network security problems.

An organisation has to be concerned about proper identification of users and authorisation of network access, the control of access, and the protection of data integrity. Almost all networks require some kind of logon, including user name and password. Many people are casual with their passwords, making them easy to guess. A good password has both letters and numbers along with a few punctuation marks for added security. Most corporate security goes far beyond passwords such as using a "firewall," a computer that sits between an internal network and the Internet. The firewall allows access to internal data from specified incoming sites but tries to detect unauthorised access attempts and prevent them from occurring.

60. Identify the advantages and disadvantages of deploying cellular technology.

1G - Analogue voice service only. 2G - Digital voice service, 9.6 Kbps to 14.4 Kbps data service, enhanced calling features (such as caller ID), no always-on data connection. 3G - superior voice quality, always-on data connection up to 2 Mbps, broadband data services (such as streaming audio and video). 4G - Wi-Fi access networks, always-on data connection 20-100 Mbps, converged data and voice over IP.

61. Explain how LBS, GPS, and GIS help to create business value.

LBS, GPS, and GIS help to create business value by providing tools and techniques such as emergency services, navigation services, tracking services, location advertising, and security services.

62. Describe RFID and how it can be used to help make a supply chain more effective.

Radio frequency identification (RFID) technologies use active or passive tags in the form of chips or smart labels that can store unique identifiers and relay this information to electronic readers. Manufacturers improve

supply-chain planning and execution by incorporating RFID technologies. By placing RFID tags on cases and pallets shipped from manufacturers to distribution centres, companies would be able to keep close tabs on their shipments. In turn, that would allow distribution centres and its suppliers to streamline their supply chains and ultimately ensure shelves were always fully stocked.

63. Describe the difference between the terms mobile and wireless.

The terms mobile and wireless are often used synonymously, but actually denote two different technologies. Mobile means the technology can travel with the user, but it is not necessarily in real-time; users can download software, email messages, and web pages onto their personal digital assistant (PDA), laptop, or other mobile device for portable reading or reference. Wireless, on the other hand, gives users a live (Internet) connection via satellite or radio transmitters

64. List some of the advantages of using a communication satellite.

Communication satellites are cost effective for transmitting large quantities of data over very long distances. Satellites are typically used for communications in large, geographically dispersed organisations that would be difficult to tie together through cabling media or terrestrial microwave.

相关主题
相关文档
最新文档