Test Bank Chapter 9

download Test Bank Chapter 9

If you can't read please download the document

description

Management Information System

Transcript of Test Bank Chapter 9

File: ch06, Chapter 6: Mobile, Wireless, and Pervasive ComputingPackage Title: Testbank QuestionsCourse Title: IS 5eChapter Number: 8Question Type: True/False1. Wireless computing does not really affect productivity.Answer: FalseSection reference 1: chapter opening caseDifficulty: Easy Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerce.2. Wireless is a term used to describe telecommunications in which electromagnetic waves carry the signal between communicating devices.Answer: TrueSection reference 1: chapter opening case Difficulty: Easy Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerce.3. Wireless technologies are not changing the ways that organizations are doing business, but they are enabling organizations to do business faster.Answer: FalseSection reference 1: chapter opening case Difficulty: Easy Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerce.4. Short message service allows users to send short text messages on digital cell phones. Answer: TrueSection reference 1: Wireless Technologies Difficulty: Easy Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.5. Microwave transmissions are affected by environmental conditions such as storms.Answer: TrueSection reference 1: Wireless Technologies Difficulty: Easy Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.6. The higher the orbit of a satellite, the larger its footprint.Answer: TrueSection reference 1: Wireless TechnologiesDifficulty: Easy Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.7. The global positioning system is supported by GEO satellites.Answer: FalseSection reference 1: Wireless Technologies Difficulty: Easy Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.8. Radio transmissions are highly secure. Answer: FalseSection reference 1: Wireless TechnologiesDifficulty: Easy Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.9. Bluetooth is a wireless standard that enables temporary, short-range connection between mobile devices. Answer: TrueSection reference 1: Wireless Computer Networks and Internet AccessDifficulty: Easy Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by short-range, medium-range, and long-range networks respectively.10. A hotspot is a small geographical perimeter within which a wireless access point provides service to a number of users.Answer: TrueSection reference 1: Wireless Computer Networks and Internet Access Difficulty: Easy Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by short-range, medium-range, and long-range networks respectively.11. Wi-Fi provides excellent security.Answer: FalseSection reference 1: Wireless Computer Networks and Internet AccessDifficulty: Easy Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by short-range, medium-range, and long-range networks respectively.12. In a mesh network, the motes transmit their data to a central computer.Answer: FalseSection reference 1: Pervasive ComputingDifficulty: Easy Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing, providing examples of how businesses can utilize each one.13. Mesh networks are reliable, efficient, and fault tolerant.Answer: TrueSection reference 1: Pervasive ComputingDifficulty: Easy Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing, providing examples of how businesses can utilize each one.14. Personalization means that a mobile device can provide real-time communication, independent of the users location. Answer: FalseSection reference 1: Mobile Computing and Mobile CommerceDifficulty: Easy Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major m-commerce applications can benefit a business.15. A voice portal is a standard Web site that accepts voice commands.Answer: FalseSection reference 1: Mobile Computing and Mobile CommerceDifficulty: Easy Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major m-commerce applications can benefit a business.16. Mobile wallets enable users to make purchases with a single click from a mobile device.Answer: TrueSection reference 1: Mobile Computing and Mobile CommerceDifficulty: Easy Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major m-commerce applications can benefit a business.17. Telemetry is the science that measures physical remoteness by means of wireless transmissions from a remote source to a receiving station. Answer: TrueSection reference 1: Mobile Computing and Mobile CommerceDifficulty: Easy Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major m-commerce applications can benefit a business.18. Pervasive computing and virtual reality are just different names for the same thing. Answer: FalseSection reference 1: Pervasive ComputingDifficulty: Easy Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing, providing examples of how businesses can utilize each one.19. Two systems being developed to replace bar codes are QR codes and RFID systems.Answer: True Section reference 1: Pervasive ComputingDifficulty: Medium Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing, providing examples of how businesses can utilize each one.20. Rogue access points can be set up by employees.Answer: TrueSection reference 1: Wireless SecurityDifficulty: Easy Learning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can damage a business.21. War driving is the act of locating wireless networks while driving around a certain area.Answer: TrueSection reference 1: Wireless SecurityDifficulty: Easy Learning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can damage a business.22. Refer to ITs About Business 8.6 BP Uses Wireless Technologies: Wireless sensors can be used to increase safety and reliability by doing tasks that are too dangerous for humans. Answer: FalseSection reference 1: ITs About Business 8.6Difficulty: MediumLearning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerce.23. Refer to ITs About Business 8.7 Brazil Uses Smart Meters: Smart Meters can be used to monitor electricity consumption and detect theft.Answer: TrueSection reference 1: ITs About Business 8.7Difficulty: EasyLearning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerce.Question Type: Multiple Choice24. Individuals are finding it convenient and productive to use wireless devices for which of the following reasons?A. To make use of time that was formerly wastedB. To become more efficientC. Work locations are more flexibleD. To be able to allocate working time around personal and professional obligationsE. All of the aboveAnswer: ESection reference 1: Wireless TechnologiesDifficulty: MediumLearning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.25. Of the following, which is the major problem with smart phones?A. They are too slow.B. They are too expensive.C. They can be used to compromise security.D. Their screens are too small.E. Their browsers are not fully functional.Answer: CSection reference 1: Wireless TechnologiesDifficulty: MediumLearning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.26. The capabilities of smart phones include all of the following except _________.A. A calculatorB. E-mail C. A global positioning systemD. Corporate transaction processingE. A full-function Internet browserAnswer: DSection reference 1: Wireless TechnologiesDifficulty: EasyLearning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.27. Unfortunately, many managers consider smart phones as only _____, rather than as _____ that can transmit wirelessly.A. Phones, digital camerasB. Phones, pagersC. Digital cameras, phonesD. Digital cameras, pagersE. Cheap, expensive devicesAnswer: ASection reference 1: Wireless TechnologiesDifficulty: MediumLearning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.28. Microwave transmission systems are used for _____ volume, _____ distance, _____ communications.A. Low, long, broadcastB. Low, short, line-of-sightC. High, long, broadcastD. High, short, broadcastE. High, long, line-of-sightAnswer: ESection reference 1: Wireless TechnologiesDifficulty: MediumLearning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.29. Which type of satellite has the largest footprint?A. Low-earth-orbitB. Medium-earth-orbitC. GeostationaryD. Polar orbitE. Equatorial orbitAnswer: CSection reference 1: Wireless Technologies Difficulty: EasyLearning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.30. The area of the earth reached by a satellites transmission is referred to as its _____.A. HotspotB. CoverageC. FootprintD. ZoneE. Wireless areaAnswer: CSection reference 1: Wireless TechnologiesDifficulty: EasyLearning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.31. The greatest problem with GEO satellites is which of the following?A. Propagation delayB. ExpenseC. Orbital lifeD. Size of the footprintE. Relative speed with respect to a point on the earths surfaceAnswer: ASection reference 1: Wireless TechnologiesDifficulty: EasyLearning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.32. _____ is a satellite-based tracking system that enables users to determine a persons position.A. BluetoothB. Wireless application protocolC. Short message serviceD. Wi-FiE. Global positioning systemAnswer: ESection reference 1: Wireless Technologies Difficulty: EasyLearning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.33. Which of the following is not an advantage of radio? A. No metallic wires are needed.B. Radio waves propagate easily through office walls.C. Radio devices are inexpensive.D. Radio waves do not create electrical interference problems.E. Radio devices are easy to install.Answer: DSection reference 1: Wireless TechnologiesDifficulty: MediumLearning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.34. The main problem with radio transmission is which of the following?A. Radio waves cannot travel through walls.B. When you travel too far from the source, the signal fades.C. Devices are difficult to install.D. Radio waves are slow.E. Devices are expensive to install.Answer: BSection reference 1: Wireless TechnologiesDifficulty: MediumLearning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.35. The most common wireless technology for TV and DVD remote control devices is _______.A. BluetoothB. Ultra-widebandC. Near-field communicationsD. WiMAXE. InfraredAnswer: ESection reference 1: Wireless TechnologiesDifficulty: EasyLearning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.36. _____ is a wireless standard that enables temporary, short-range connection between mobile devices.A. BluetoothB. Wireless application protocolC. Short message serviceD. Wi-FiE. Global positioning systemAnswer: ASection reference 1: Wireless Computer Networks and Internet AccessDifficulty: EasyLearning Objective 1: LO 8.2 Describe how businesses can use technology employed by short-range, medium-range, and long-range networks respectively.37. Which of the following is the most appropriate wireless networking standard for creating personal area networks?A. Wi-FiB. Cellular radioC. MicrowaveD. BluetoothE. WiMAXAnswer: DSection reference 1: Wireless Computer Networks and Internet AccessDifficulty: EasyLearning Objective 1: LO 8.2 Describe how businesses can use technology employed by short-range, medium-range, and long-range networks respectively.38. Which of the following is the most appropriate wireless technology for real-time location of caregivers and mobile equipment in healthcare environments?A. Wi-FiB. MicrowaveC. Ultra-widebandD. InfraredE. BluetoothAnswer: CSection reference 1: Wireless Computer Networks and Internet AccessDifficulty: MediumLearning Objective 1: LO 8.2 Describe how businesses can use technology employed by short-range, medium-range, and long-range networks respectively.39. _____, with the shortest range of any wireless network, is designed to be used with contactless credit cards.A. Near-field communicationsB. BluetoothC. Ultra-widebandD. Wi-FiE. InfraredAnswer: ASection reference 1: Wireless Computer Networks and Internet AccessDifficulty: EasyLearning Objective 1: LO 8.2 Describe how businesses can use technology employed by short-range, medium-range, and long-range networks respectively.40. Which of the following statements about Wi-Fi is not correct?A. Wi-Fi provides simple Internet access.B. Laptop PC scans contain chips that can send and receive Wi-Fi signals.C. Many companies offer free Wi-Fi access in their stores.D. Wi-Fi requires encryption for secure transmissions.E. Wi-Fi is expensive to set up.Answer: ESection reference 1: Wireless Computer Networks and Internet AccessDifficulty: MediumLearning Objective 1: LO 8.2 Describe how businesses can use technology employed by short-range, medium-range, and long-range networks respectively.41. Which of the following is not inhibiting faster Wi-Fi expansion?A. Users cannot roam from hotspot to hotspot if the hotspots use different Wi-Fi network services.B. A lack of security.C. The growth of WiMAXD. Unless the service is free, users have to log on to separate accounts for each hotspot.E. Wi-Fi services may not survive in the face of free hotspot access.Answer: CSection reference 1: Wireless Computer Networks and Internet AccessDifficulty: HardLearning Objective 1: LO 8.2 Describe how businesses can use technology employed by short-range, medium-range, and long-range networks respectively.42. A small geographical perimeter within which a wireless access point provides service to a number of users is called a ________. A. TransceiverB. HotspotC. Local reception nodeD. Wireless networkE. GPS locationAnswer: BSection reference 1: Wireless Computer Networks and Internet AccessDifficulty: EasyLearning Objective 1: LO 8.2 Describe how businesses can use technology employed by short-range, medium-range, and long-range networks respectively.43. Today, most wireless local area networks use the _____ standard, which can transmit up to 54 Mbps and has a range of about 300 feet.A. 802.11aB. 802.11bC. 802.11cD. 802.11gE. WiMAXAnswer: DSection reference 1: Wireless Computer Networks and Internet AccessDifficulty: EasyLearning Objective 1: LO 8.2 Describe how businesses can use technology employed by short-range, medium-range, and long-range networks respectively.44. _____ networks use multiple Wi-Fi access points to create a wide area network.A. Mesh B. Pervasive C. Global D. Fixed E. Ubiquitous Answer: ASection reference 1: Wireless Computer Networks and Internet AccessDifficulty: EasyLearning Objective 1: LO 8.2 Describe how businesses can use technology employed by short-range, medium-range, and long-range networks respectively.45. _____ communicate(s) via radio waves using radio antennas placed within adjacent geographic areas.A. BluetoothB. Cell phonesC. A satelliteD. Ultra-widebandE. Near-field communicationsAnswer: BSection reference 1: Wireless Computer Networks and Internet AccessDifficulty: EasyLearning Objective 1: LO 8.2 Describe how businesses can use technology employed by short-range, medium-range, and long-range networks respectively.46. The _____ standard can transmit up to 75 Mbps and has a range of 31 miles.A. Wi-FiB. 802.11bC. 802.11cD. 802.11gE. WiMAXAnswer: ESection reference 1: Wireless Computer Networks and Internet Access Difficulty: EasyLearning Objective 1: LO 8.2 Describe how businesses can use technology employed by short-range, medium-range, and long-range networks respectively.47. The two major characteristics that differentiate mobile computing from other forms of computing are ______ and ________. A. Mobility, broad reachB. Mobility, lack of expenseC. Security, broad reachD. Security, mobilityE. Broad reach, localizationAnswer: ASection reference 1: Mobile Computing and Mobile CommerceDifficulty: MediumLearning Objective 1: LO 8.3 Provide a specific example of how each of the five major m-commerce applications can benefit a business.48. With regard to mobile computing, _____ means that it is easy and fast to access the Web and other mobile devices. A. UbiquityB. ConvenienceC. Instant connectivityD. B and CE. A, B, and CAnswer: DSection reference 1: Mobile Computing and Mobile Commerce Difficulty: MediumLearning Objective 1: LO 8.3 Provide a specific example of how each of the five major m-commerce applications can benefit a business.49. With regard to mobile computing, _____ means that knowing where a user is physically located is a key to offering relevant products and services. A. UbiquityB. ConvenienceC. Instant connectivityD. PersonalizationE. Localization of products and servicesAnswer: ESection reference 1: Mobile Computing and Mobile Commerce Difficulty: EasyLearning Objective 1: LO 8.3 Provide a specific example of how each of the five major m-commerce applications can benefit a business.50. The development of mobile commerce is driven by all of the following factors except:A. The widespread availability of mobile devices.B. The cell phone culture.C. Increasing prices.D. Bandwidth improvement.E. It eliminates the need for a PC.Answer: CSection reference 1: Mobile Computing and Mobile Commerce Difficulty: MediumLearning Objective 1: LO 8.3 Provide a specific example of how each of the five major m-commerce applications can benefit a business.51. Which of the following is not a mobile application in financial services? A. Transaction processing systemsB. Mobile banking C. Wireless electronic payment systemsD. MicropaymentsE. Wireless walletsAnswer: ASection reference 1: Mobile Computing and Mobile Commerce Difficulty: MediumLearning Objective 1: LO 8.3 Provide a specific example of how each of the five major m-commerce applications can benefit a business.52. Parking meters that you can pay via your mobile telephone are an example of _________. A. Mobile bankingB. Wireless electronic paymentC. Wireless walletsD. Brokerage serviceE. Money transferAnswer: BSection reference 1: Mobile Computing and Mobile Commerce Difficulty: EasyLearning Objective 1: LO 8.3 Provide a specific example of how each of the five major m-commerce applications can benefit a business.53. If you buy a hot dog at a concession stand using your contactless credit card, you are using a ________.A. Wireless money transferB. Wireless walletC. Wireless bill paymentD. MicropaymentE. Wireless electronic payment systemAnswer: ESection reference 1: Mobile Computing and Mobile CommerceDifficulty: MediumLearning Objective 1: LO 8.3 Provide a specific example of how each of the five major m-commerce applications can benefit a business.54. Putting ads on top of taxicabs in New York City that change as the cabs travel around the city is an example of ________. A. Viral marketingB. Permission advertisingC. Geographical advertisingD. Location-based advertisingE. Direct marketingAnswer: DSection reference 1: Mobile Computing and Mobile CommerceDifficulty: MediumLearning Objective 1: LO 8.3 Provide a specific example of how each of the five major m-commerce applications can benefit a business.55. _____ refer(s) to the wireless communication of location-based information and control messages to and from vehicles and other mobile assets.A. Location-based servicesB. TelematicsC. Pervasive servicesD. RFIDE. Wi-FiAnswer: BSection reference 1: Mobile Computing and Mobile CommerceDifficulty: EasyLearning Objective 1: LO 8.3 Provide a specific example of how each of the five major m-commerce applications can benefit a business.56. Sense networks track users via all of the following technologies except _______.A. GPSB. Traffic camerasC. Cell towersD. Wi-Fi networksE. None of the aboveAnswer: BSection reference 1: Mobile Computing and Mobile CommerceDifficulty: MediumLearning Objective 1: LO 8.3 Provide a specific example of how each of the five major m-commerce applications can benefit a business.57. _____ is the science that measures physical remoteness by means of wireless transmission from a remote source to a receiving station. A. TelemetryB. Wireless access pointC. Near-field communications D. MicrowaveE. Wireless positioningAnswer: ASection reference 1: Mobile Computing and Mobile Commerce Difficulty: EasyLearning Objective 1: LO 8.3 Provide a specific example of how each of the five major m-commerce applications can benefit a business.58. The generic term for technologies that use radio waves to automatically identify individual items is __________. A. TelemetryB. Bar codesC. Shipping labelsD. Radio-frequency identificationE. Wireless access pointsAnswer: DSection reference 1: Pervasive Computing Difficulty: EasyLearning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing, providing examples of how businesses can utilize each one.59. Which of the following is not a limitation of barcodes?A. They require line-of-sight to the scanning device.B. They are printed on paper.C. They identify the manufacturer, product, and item.D. They are difficult to use in a manufacturing plant.E. They are useless in determining expiration date.Answer: CSection reference 1: Pervasive Computing Difficulty: MediumLearning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing, providing examples of how businesses can utilize each one.60. The major problem with RFID has been _______. A. ExpenseB. BandwidthC. LocationD. RFID readersE. RFID tagsAnswer: ASection reference 1: Pervasive Computing Difficulty: EasyLearning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing, providing examples of how businesses can utilize each one.61. What would be the best use of RFID in a business?A. Transaction processingB. Supply chain managementC. Personnel trackingD. Enabling communications with customersE. Decreasing network costsAnswer: BSection reference 1: Pervasive ComputingDifficulty: MediumLearning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing, providing examples of how businesses can utilize each one.62. _____ networks collect data from many points over an extended space.A. Bluetooth B. Ultra-wideband C. Wireless sensor D. WiMAX E. Wi-Fi Answer: CSection reference 1: Pervasive ComputingDifficulty: EasyLearning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing, providing examples of how businesses can utilize each one.63. Which of the following can be used for reading utility meters without a person having to get out of a truck?A. RuBeeB. ZigBeeC. Wi-FiD. Near-field communicationsE. RFIDAnswer: BSection reference 1: Pervasive ComputingDifficulty: EasyLearning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing, providing examples of how businesses can utilize each one.64. The act of locating wireless local area networks while moving around a city is called ____. A. Eavesdropping B. War drivingC. RF jamming D. Cybersquatting E. Installing rogue access devices Answer: BSection reference 1: Wireless SecurityDifficulty: EasyLearning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can damage a business.65. A(n) _____ allows unauthorized entry into a wireless network.A. Lack of encryptionB. Disgruntled employeeC. Open nodeD. Illegal serverE. Rogue access pointAnswer: ESection reference 1: Wireless SecurityDifficulty: EasyLearning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can damage a business.66. _____ refers to efforts by unauthorized users to access data traveling over wireless networks.A. RF jammingB. War drivingC. EavesdroppingD. Telemetry E. Installing rogue access devices Answer: CSection reference 1: Wireless SecurityDifficulty: EasyLearning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can damage a business.67. In _____, a person or a device intentionally or unintentionally interferes with your wireless network transmissions.A. RF jammingB. War drivingC. EavesdroppingD. Telemetry E. Installing rogue access devices Answer: ASection reference 1: Wireless SecurityDifficulty: EasyLearning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can damage a business.68. Although rogue access devices can be installed innocently, they can also be installed by an attacker trying to gain unauthorized access to a wireless network. In such cases, these devices are calledan _____.A. Unencrypted nodeB. Evil twinC. Open nodeD. Illegal serverE. Unauthorized rogue access pointAnswer: BSection reference 1: Wireless SecurityDifficulty: EasyLearning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can damage a business.69. Refer to Opening Case The Battle for the Mobile Wallet: Which of the following statements concerning mobile wallets is true?A. Traditional credit card issuers have not shown a serious interest in this technology.B. Individual companies cannot utilize this technology due to its prohibitive price.C. Google has launched a program to manufacture its own smart phone chips.D. Unlike traditional wallets, smart phones can be password protected.E. Consumer advocates endorse mobile systems because they will lead to lower prices.Answer: DSection reference 1: Opening CaseDifficulty: MediumLearning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerce.70. Refer to ITs About Business 8.1 Big Wheel Mobile Truck & Square: Products like Square offer small independent businesses the following advantages over the traditional credit card systems: A. Square does not charge merchants a fee for each transactionB. Square does not require expensive equipmentC. Square can run on most mobile devices that the merchant already has D. Square can be easily customized and updated E. All of the aboveAnswer: ESection reference 1: ITs About Business 8.1Difficulty: EasyLearning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerce71. Refer to ITs About Business 8.2 Cell Phones Revolutionize Healthcare in Uganda: Which of the following was not an outcome of using cell phones in Uganda? A. Medication was removed from clinics that had too muchB. Doctors could text each other patient namesC. The mTrac system requires a long training period for usersD. Anonymous text messages can be sent to report any problems at the clinicsE. All of the above are trueAnswer: DSection reference 1: ITs About Business 8.2Difficulty: MediumLearning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerce72. Refer to ITs About Business 8.3 - Near-Field Communications Helps Travelers in Japan: Which of the following statements is false?A. SKiP reduces the check-in, security and boarding time in the train stations to 15 mins B. Retailers and merchants and send targeted marketing messages to customers who are physically near their storeC. Japanese smartphones can be used as translators and walletsD. NFC technology in smart phones is used for ticketing and boarding passesAnswer: ASection reference 1: ITs About Business 8.3Difficulty: MediumLearning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerce73. Refer to ITs About Business 8.4 Airlines Provide Wi-Fi to Passengers: As customers get more used to having ubiquitous Internet access, Wi-Fi in airplanes will be ______.A. FreeB. More expensive than it is nowC. Provided by the governmentD. IllegalE. None of the aboveAnswer: ASection reference 1: ITs About Business 8.4Difficulty: MediumLearning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerce74. Refer to ITs About Business 8.5 Mobile Ads Still Arent Very Good: Which of the following statements is false?A. Mobile advertising sends advertisements to users based on their current location B. Mobile advertising requires new formats since banner ads are not visible on small screensC. Pop-up window advertising does not work as well on mobile devices as it does on computer screensD. It is easier to track the effectiveness of mobile advertising than other mediumsE. Mobile advertising can be used to distribute couponsAnswer: ASection reference 1: ITs About Business 8.5Difficulty: EasyLearning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerce75. Refer to Closing Case Retailer Gains Many Benefits with RFID Item-Level Tagging: Which of the following is the primary advantage of using RFID tags for retailers?A. Easy to see tags on itemsB. Storing more information about each itemC. Cost savings from time and laborD. Cost savings on tagsE. Cost savings on scanner installations Answer: CSection reference 1: Closing CaseDifficulty: MediumLearning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerceQuestion Type: Essay76. Discuss the differences between the traditional working environment and the wireless working environment. Section reference 1: Material following chapter-opening caseDifficulty: MediumLearning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerce77. Describe the convergence of functions in todays smart phones. Section reference 1: Wireless TechnologiesDifficulty: MediumLearning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.78. Differentiate among the three types of satellites. Section reference 1: Wireless TechnologiesDifficulty: MediumLearning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media79. Define Bluetooth, and give examples of its uses.Section reference 1: Wireless TechnologiesDifficulty: MediumLearning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media80. Describe the 802.11 family of standards.Section reference 1: Wireless Computer Networks and Internet AccessDifficulty: MediumLearning Objective 1: LO 8.2 Describe how businesses can use technology employed by short-range, medium-range, and long-range networks respectively.81. Explain location-based commerce, and provide examples.Section reference 1: Mobile Commerce ApplicationsDifficulty: MediumLearning Objective 1: LO 8.3 Provide a specific example of how each of the five major m-commerce applications can benefit a business.82. What are micropayments and mobile wallets? Provide examples of their uses.Section reference 1: Mobile Commerce ApplicationsDifficulty: MediumLearning Objective 1: LO 8.3 Provide a specific example of how each of the five major m-commerce applications can benefit a business.83. What are mobile portals and voice portals? Provide examples of their uses.Section reference 1: Mobile Commerce ApplicationsDifficulty: MediumLearning Objective 1: LO 8.3 Provide a specific example of how each of the five major m-commerce applications can benefit a business.84. What is telemetry, and how is it used.Section reference 1: Mobile Commerce ApplicationsDifficulty: MediumLearning Objective 1: LO 8.3 Provide a specific example of how each of the five major m-commerce applications can benefit a business.85. How do wireless sensor networks work, and what are they used for?Section reference 1: Pervasive ComputingDifficulty: MediumLearning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing, providing examples of how businesses can utilize each one.86. What are the problems with Wi-Fi?Section reference 1: Wireless Computer Networks and Internet AccessDifficulty: MediumLearning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can damage a business.87. What are the two characteristics of mobile computing, and what are the five value-added attributes of mobile computing?Section reference 1: Mobile Computing and Mobile CommerceDifficulty: MediumLearning Objective 1: LO 8.3 Provide a specific example of how each of the five major m-commerce applications can benefit a business.88. Explain the factors that are driving the development of mobile commerce.Section reference 1: Mobile Computing and Mobile CommerceDifficulty: HardLearning Objective 1: LO 8.3 Provide a specific example of how each of the five major m-commerce applications can benefit a business.89. Describe pervasive computing and the two technologies that provide its infrastructure. Section reference 1: Pervasive ComputingDifficulty: MediumLearning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing, providing examples of how businesses can utilize each one.90. Identify and discuss the four major threats to wireless networks.Section reference 1: Wireless SecurityDifficulty: MediumLearning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can damage a business.Question Type: Multiple Choice91. Michaela runs a dog-walking business. She has three employees, and she prides herself in maintaining a high level of customer service. She gets about half of her business from last-minute requests. When she receives such a request, she needs to know where her employees are so that she can identify the nearest one who might be able to do the walk. Significantly, she needs this information before she can confirm the walk with the client. Which of the following technologies will help her obtain this information? A. Radio transmissionB. Internet over Satellite C. LEO constellationD. GPSE. MicrowaveAnswer: DSection reference 1: Wireless TechnologiesDifficulty: MediumLearning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.92. Frank and his wife, Paula, run a country store with a special room where husbands can sit while their wives are shopping. The Mens Corner already has a large-screen TV for sports viewing, but Frank and Paula are considering adding Wi-Fi. Which of the following statements is false? A. Their store would need to have broadband access.B. Their store will need a wireless access point.C. They could charge the customers for the service.D. Wi-Fi is based on radio waves, so they will need a clear line-of-sight into the room.E. They should consider using Wi-Fi Direct.Answer: ESection reference 1: Wireless Computer Networks and Internet AccessDifficulty: MediumLearning Objective 1: LO 8.2 Describe how businesses can use technology employed by short-range, medium-range, and long-range networks respectively.93. Frank and his wife, Paula, run a country store in a high-foot-traffic area. Which of the following would not be a beneficial use of mobile technology for their store? A. TelemetryB. Location-basedC. Wireless paymentsD. Mobile app loyalty programE. All of these could be used beneficial.Answer: ASection reference 1: Mobile Computing and Mobile CommerceDifficulty: MediumLearning Objective 1: LO 8.3 Provide a specific example of how each of the five major m-commerce applications can benefit a business.94. Frank and his wife, Paula, run a country store in a high-foot-traffic area. They are trying to understand what the traffic in the store is by using technology. They are considering setting up a wireless sensor network. Which of the following statements is false? A. Motes can be locations throughout the store.B. Once they have created the network, they cannot add additional sensors.C. The data are moved from sensor to sensor to reach a central computer.D. The sensors can tell the direction in which a person is moving.E. The network will need a base station. Answer: DSection reference 1: Pervasive ComputingDifficulty: MediumLearning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing, providing examples of how businesses can utilize each one.95. Frank and his wife, Paula, run a country store with a special room where husbands can sit while their wives are shopping. The Mens Corner already has a large-screen TV for sports viewing, and they recently added Wi-Fi. Which of the following is not a security issue? A. A rogue access pointB. War drivingC. MotesD. EavesdroppingE. Radio-frequency jammingAnswer: DSection reference 1: Wireless TechnologiesDifficulty: MediumLearning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.