Exam 7: Networks: Mobile Business

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Mobile device management (MDM)administers and delivers applications to corporate and personal smart phones and tablets.

(True/False)
4.9/5
(40)

Active RFID tags do not depend on a silicon microchip and use plastic or conductive polymers instead of silicon-based microchips allowing them to be washed or exposed to water without damaging the chip.

(True/False)
4.8/5
(38)

Identify the challenges of a connected world.

(Essay)
4.7/5
(38)

Mobile application management (MAM)remotely controls smart phones and tablets, ensuring data security.

(True/False)
4.7/5
(28)

Which of the below uses both GIS and GPS?

(Multiple Choice)
4.8/5
(35)

Radio-frequency identification (RFID)uses electronic tags and labels to identify objects wirelessly over short distances.

(True/False)
4.8/5
(43)

The main challenges facing networks include security, social, ethical and political issues.

(True/False)
4.8/5
(27)

What is software that prevents direct communication between a sending and receiving computer and is used to monitor packets for security reasons?

(Multiple Choice)
4.8/5
(39)

Explain the different wireless network categories.

(Essay)
4.9/5
(44)

Identify the challenges of business mobility.

(Essay)
4.8/5
(40)

Wi-Fi protected access (WPA)a wireless security protocol to protect Wi-Fi networks.

(Multiple Choice)
4.9/5
(32)

Passive RFID tags do not have a power source

(True/False)
4.9/5
(39)

Wi-Fi infrastructure includes the inner workings of a Wi-Fi service or utility, including the signal transmitters, towers, or poles and additional equipment required to send out a Wi-Fi signal.

(True/False)
4.9/5
(41)

What is latitude?

(Multiple Choice)
4.8/5
(27)

What is geocoding?

(Multiple Choice)
4.7/5
(46)

What is the conversion of IP addresses that identifies labels that use a variety of recognizable naming conventions?

(Multiple Choice)
4.8/5
(37)

Traceroute occurs when paper maps are laid edge-to-edge and items that run across maps and do not match are reconfigured to match.

(True/False)
4.9/5
(42)

What is wired equivalent privacy (WEP)is an encryption algorithm designed to protect wireless transmission data.

(Multiple Choice)
4.9/5
(47)

What are the five elements that are needed to create a connected world or a network?

(Multiple Choice)
4.9/5
(41)

What is a wireless MAN?

(Multiple Choice)
4.8/5
(46)
Showing 61 - 80 of 303
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)