Exam 7: Networks: Mobile Business
Exam 1: Management Information Systems: Business Driven MIS313 Questions
Exam 2: Decisions Processes: Value Driven Business329 Questions
Exam 3: Ebusiness: Electronic Business Value383 Questions
Exam 4: Ethics Information Security: MIS Business Concerns342 Questions
Exam 5: Infrastructures: Sustainable Technologies250 Questions
Exam 6: Data: Business Intelligence284 Questions
Exam 7: Networks: Mobile Business268 Questions
Exam 8: Enterprise Applications: Business Communications241 Questions
Exam 9: Systems Development and Project Management: Corporate Responsibility289 Questions
Select questions type
Secure hypertext transfer _____________ is a combination of HTTP and SSL to provide encryption and secure identification of an Internet server.
(Short Answer)
4.7/5
(38)
A great GIS example,Google earth,combines satellite imagery,geographic data,and Google's search capabilities to create a virtual globe that users can download to a computer or mobile device.
(True/False)
4.9/5
(43)
An ___________ is an extension of an intranet that is available only to authorized outsiders,such as customers,partners,and suppliers.
(Short Answer)
4.9/5
(44)
Geographic information system (GIS)stores,views,and analyzes geographic data creating multidimensional charts or maps.For example,GIS are monitoring global warming by measuring the speed of glaciers melting in Canada,Greenland,and Antarctica.
(True/False)
4.9/5
(37)
Which of the below statements is inaccurate in reference to unified communications?
(Multiple Choice)
4.9/5
(45)
The three main benefits of networks or a connected world include sharing resources,providing opportunities,and reducing travel.
(True/False)
4.8/5
(40)
The packet ____________ lists the destination (for example in IP packets the destination is the IP address)along with the length of the message data.
(Short Answer)
4.8/5
(37)
What is the efficient coexistence of telephone,video,and data communication within a single network,offering convenience and flexibility not possible with separate infrastructures?
(Multiple Choice)
4.8/5
(41)
Two methods for encrypting network traffic on the Web are secure sockets layer and secure hypertext transfer protocol.
(True/False)
4.9/5
(35)
Enter passive or active in the space below:
________ RFID tags have their own transmitter and a power source (typically a battery).
(Short Answer)
4.8/5
(36)
A geocoin,a round coin-sized object,is uniquely numbered and hidden in geocache.Geocoins can also be shaped to match a theme like the state of Colorado or a birthday party hat.Geocoins are often decorative or commemorative,making them collectible and highly valuable for technology adventures.
(True/False)
4.8/5
(32)
______________ RFID tags do not depend on a silicon microchip and use plastic or conductive polymers instead of silicon-based microchips allowing them to be washed or exposed to water without damaging the chip.
(Short Answer)
4.8/5
(41)
Radio frequency ___________ uses electronic tags and labels to identify objects wirelessly over short distances.
(Short Answer)
5.0/5
(38)
What are the two most prevalent types of broadband access?
(Multiple Choice)
4.8/5
(30)
Cell phones have morphed into __________________ that offer more advanced computing ability and connectivity than basic cell phones.
(Multiple Choice)
4.8/5
(32)
RFID tag is an electronic identification device that is made up of a chip and antenna.
(True/False)
4.8/5
(41)
IP address is a unique number that identifies where computers are located on the network.
(True/False)
4.9/5
(37)
A global positioning system (GPS)consists of hardware,software,and data that provide location information for display on a multidimensional map.
(True/False)
4.9/5
(43)
Showing 161 - 180 of 268
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)