Deck 10: Wireless Communications Systems
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/25
Play
Full screen (f)
Deck 10: Wireless Communications Systems
1
__________ uses a frequency-hopping spread-spectrum format.
A.Bluetooth
B.Broadband wireless access
C.Unlicensed national information infrastructure
D.Multiple-input multiple-output
A.Bluetooth
B.Broadband wireless access
C.Unlicensed national information infrastructure
D.Multiple-input multiple-output
Bluetooth
2
What type of radio provides the promise that licensed and unlicensed services can coexist in the same spectrum?
A.Cognitive
B.Two-way
C.Adaptable
D.Portable
A.Cognitive
B.Two-way
C.Adaptable
D.Portable
Cognitive
3
Both analog and digital land-mobile systems depend on __________ to provide wide-area coverage.
A.software-based signal-processing
B.repeaters
C.ADC converters
D.local oscillators
A.software-based signal-processing
B.repeaters
C.ADC converters
D.local oscillators
repeaters
4
A _________ is an ad-hoc network of up to eight Bluetooth devices,such as a computer,mouse,headset,or earpiece.
A.backscatter
B.mesh
C.topology
D.piconet
A.backscatter
B.mesh
C.topology
D.piconet
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
5
A "bad guy" is listening and picking up what information can be obtained from your wireless network. What type of computer attack is this considered?
A.Passive
B.External
C.Active
D.Internal
A.Passive
B.External
C.Active
D.Internal
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
6
What standards were developed to address key delivery problems with wireless data networks?
A.Broadband wireless access (BWA)
B.Data encryption standard (DES)
C.Global System for Mobile Communications (GSM)
D.Wireless application protocol (WAP)
A.Broadband wireless access (BWA)
B.Data encryption standard (DES)
C.Global System for Mobile Communications (GSM)
D.Wireless application protocol (WAP)
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
7
The biggest advantages of wireless accessibility are user mobility and ______________.
A.maximum operating range
B.privacy
C.cost-effectiveness
D.data transmission
A.maximum operating range
B.privacy
C.cost-effectiveness
D.data transmission
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
8
What causes Rayleigh fading,particularly in urban areas?
A.Receiver picks up transmitted signal from multiple paths
B.Issue of limited read distance
C.Equipment failure or unfavorable path conditions
D.Maximum range achievable varies inversely with frequency and data rate
A.Receiver picks up transmitted signal from multiple paths
B.Issue of limited read distance
C.Equipment failure or unfavorable path conditions
D.Maximum range achievable varies inversely with frequency and data rate
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
9
What is a distinguishing feature of ZigBee?
A.It can be used in a number of network topologies.
B.It provides flexible channel sizes.
C.It is less susceptible to signal blockage.
D.It optimizes link quality.
A.It can be used in a number of network topologies.
B.It provides flexible channel sizes.
C.It is less susceptible to signal blockage.
D.It optimizes link quality.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
10
There are five aspects to consider when securing a communication link. Which of the following aspects means that you can rely on the data getting through the communication channel without modification?
A.Authentication
B.Integrity
C.Nonrepudiation
D.Confidentiality
A.Authentication
B.Integrity
C.Nonrepudiation
D.Confidentiality
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
11
The use of cryptography means that the information being transmitted over the air is _________.
A.classified
B.jammed
C.disrupted
D.encrypted
A.classified
B.jammed
C.disrupted
D.encrypted
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
12
What signaling format does WiMAX use?
A.MIMO
B.OFDM
C.DSP
D.IEEE
A.MIMO
B.OFDM
C.DSP
D.IEEE
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following professions would most likely use a specialized land-mobile radio (SMR)?
A.Computer programmer
B.Emergency response personnel
C.Cyber security personnel
D.Radio broadcaster
A.Computer programmer
B.Emergency response personnel
C.Cyber security personnel
D.Radio broadcaster
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
14
What is the purpose of the vocoder?
A.To compress voice data for transmission
B.To expand voice data for transmission
C.To provide voicemail services
D.To double the voice handling capacity
A.To compress voice data for transmission
B.To expand voice data for transmission
C.To provide voicemail services
D.To double the voice handling capacity
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following is composed of bands of frequencies set aside by the Federal Communications Commission (FCC)to support short-range,high-speed,wireless data communications?
A.Unlicensed national information infrastructure (U-NII)
B.Wireless local-area networks (WLANs)
C.Wireless application protocol (WAP)
D.Radio frequency identification (RFID)
A.Unlicensed national information infrastructure (U-NII)
B.Wireless local-area networks (WLANs)
C.Wireless application protocol (WAP)
D.Radio frequency identification (RFID)
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
16
_________ involves the use of directional antennas to focus energy in preferred directions at the expense of others.
A.Channel setting
B.Space-division multiplexing
C.Sectorization
D.Cell splitting
A.Channel setting
B.Space-division multiplexing
C.Sectorization
D.Cell splitting
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
17
What is the basis of RFID tag classification?
A.How they obtain their operating power
B.Their overall power consumption
C.Their intended application
D.How they store information
A.How they obtain their operating power
B.Their overall power consumption
C.Their intended application
D.How they store information
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
18
_________is the reflection of radio waves striking the RFID tag and reflecting stored unique identification information back to the transmitter source.
A.Piconet
B.Frequency reuse
C.Slotted aloha
D.Backscatter
A.Piconet
B.Frequency reuse
C.Slotted aloha
D.Backscatter
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
19
What percentage of the world's population counts themselves as wireless subscribers?
A.50%
B.95%
C.25%
D.70%
A.50%
B.95%
C.25%
D.70%
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
20
What concept involves using a regular arrangement of transmitter-receiver systems?
A.Spreading code
B.Cellular
C.Communication security
D.Trunking
A.Spreading code
B.Cellular
C.Communication security
D.Trunking
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
21
What are assigned around licensed channels to minimize the possibility of interference?
A.Guard bands
B.Guarantees
C.Bug fixes
D.Basebands
A.Guard bands
B.Guarantees
C.Bug fixes
D.Basebands
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
22
__________ often use cryptography to protect the transmitted data from eavesdropping.
A.Authentication
B.Countermeasures
C.Confidentiality
D.Integrity
A.Authentication
B.Countermeasures
C.Confidentiality
D.Integrity
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
23
_______ is the time delay from the request for information until a response is obtained.
A.Transition protocol
B.Connection stability
C.Availability
D.Latency
A.Transition protocol
B.Connection stability
C.Availability
D.Latency
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
24
A(n)______ radio system to make maximal use of scarce radio spectrum.
A.software-defined
B.trunked
C.available
D.compliant
A.software-defined
B.trunked
C.available
D.compliant
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following is the secret code used in the encryption algorithm to create cipher text and to decode (decrypt)the message?
A.Sequence
B.Signal
C.Key
D.Link
A.Sequence
B.Signal
C.Key
D.Link
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck