Deck 11: RFID - Radio Frequency Identification
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/20
Play
Full screen (f)
Deck 11: RFID - Radio Frequency Identification
1
To modulate a response signal using backscatter, a tag has to ______.
A) change the polarity of the incoming signal from the reader
B) deflect the signal from the transponder
C) change the characteristics of its own antenna
D) store the energy from the interrogator
A) change the polarity of the incoming signal from the reader
B) deflect the signal from the transponder
C) change the characteristics of its own antenna
D) store the energy from the interrogator
C
2
Which mode must an NFC-capable device be in to behave like a smart card?
A) Poll
B) Listen
C) Initiator
D) Smart card
A) Poll
B) Listen
C) Initiator
D) Smart card
B
3
Interrogators and tags communicate using _________ communications.
A) half-duplex
B) full-duplex
C) simplex
D) complex
A) half-duplex
B) full-duplex
C) simplex
D) complex
A
4
The protocol used to handle collisions in HF RFID is called _____.
A) STAC
B) Class 1
C) Class 0
D) blocker
A) STAC
B) Class 1
C) Class 0
D) blocker
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
5
One of the ways used by the Gen2 protocol to select tags is by transmitting _________.
A) a quiet command
B) a null CW
C) a bit mask
D) a higher or lower intensity signal
A) a quiet command
B) a null CW
C) a bit mask
D) a higher or lower intensity signal
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following RFID technologies does not support reading more than one tag at a time?
A) readers
B) UHF
C) smart labels
D) LF
A) readers
B) UHF
C) smart labels
D) LF
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following is an important characteristic of UHF passive tags?
A) They have a shorter read distance.
B) They require less power to be read.
C) They work at greater distances than most other tags.
D) They only support very slow communications.
A) They have a shorter read distance.
B) They require less power to be read.
C) They work at greater distances than most other tags.
D) They only support very slow communications.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
8
What is the purpose of an interrogator?
A) to read information from the tags
B) to prevent unauthorized access to the tags
C) to increase the read distance
D) to store a charge that powers passive tags
A) to read information from the tags
B) to prevent unauthorized access to the tags
C) to increase the read distance
D) to store a charge that powers passive tags
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
9
RFID is not expected to have a major impact on network traffic.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
10
The function of RFID middleware is to ________.
A) store information about the types of tags used
B) convert the data read from the tags into a format that is compatible with that of the business application
C) control the functions of the reader hardware
D) control the functions of the tag hardware
A) store information about the types of tags used
B) convert the data read from the tags into a format that is compatible with that of the business application
C) control the functions of the reader hardware
D) control the functions of the tag hardware
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
11
Reader antennas are sometimes designed for a specific application.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
12
What is one of the most critical challenges associated with RFID system implementation?
A) the cost of the tags
B) the fact that tags can be read by anyone with a smartphone
C) the large amount of storage required
D) the encryption protocols
A) the cost of the tags
B) the fact that tags can be read by anyone with a smartphone
C) the large amount of storage required
D) the encryption protocols
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
13
One of the main characteristics of sensory tags is that ______.
A) they can sense the presence of other tags
B) they can block the signal from other tags
C) they only respond to the reader if a password is sent first
D) they can capture information about environmental conditions
A) they can sense the presence of other tags
B) they can block the signal from other tags
C) they only respond to the reader if a password is sent first
D) they can capture information about environmental conditions
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
14
What kind of modulation is used with most NFC tags?
A) OFDM
B) DSSS
C) ASK
D) NRZ-I
A) OFDM
B) DSSS
C) ASK
D) NRZ-I
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
15
What is the largest amount of memory in an NFC passive tag today?
A) 2 KB
B) 8 KB
C) 16 KB
D) 32 KB
A) 2 KB
B) 8 KB
C) 16 KB
D) 32 KB
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following methods can be used to temporarily or permanently disable a tag? (Select two.)
A) a blocker tag
B) an authentication password
C) a very-high-power pulse
D) the destroy password
A) a blocker tag
B) an authentication password
C) a very-high-power pulse
D) the destroy password
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
17
Before an NFC-enabled smartphone can communicate with a tag or another device, what must it do?
A) read the serial number of the other device
B) identify the capabilities of the device or tag
C) receive a reply from all devices within its range
D) transmit its clock speed
A) read the serial number of the other device
B) identify the capabilities of the device or tag
C) receive a reply from all devices within its range
D) transmit its clock speed
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
18
What type of coupling is used in NFC between a smartphone and a tablet computer?
A) backscatter
B) capacitive
C) physical
D) inductive
A) backscatter
B) capacitive
C) physical
D) inductive
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following is true about 1-bit tags?
A) They store a unique identification code.
B) They can only be read by a passive reader.
C) They do not carry any information about the product.
D) They are also known as RF fibers.
A) They store a unique identification code.
B) They can only be read by a passive reader.
C) They do not carry any information about the product.
D) They are also known as RF fibers.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
20
The orientation of the tag's antenna usually does not affect readability.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck