Vous êtes sur la page 1sur 47

Package Title: Testbank Questions

Course Title: IS 5e
Chapter Number: 8

Question Type: True/False

1. Wireless computing does not really affect productivity.

Answer: False
Section reference 1: chapter opening case
Difficulty: Easy
Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing,
and mobile commerce.

2. Wireless is a term used to describe telecommunications in which electromagnetic waves


carry the signal between communicating devices.

Answer: True
Section reference 1: chapter opening case
Difficulty: Easy

Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing,


and mobile commerce.

3. Wireless technologies are not changing the ways that organizations are doing business, but
they are enabling organizations to do business faster.

Answer: False
Section reference 1: chapter opening case
Difficulty: Easy
Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing,
and mobile commerce.

4. Short message service allows users to send short text messages on digital cell phones.

Answer: True
Section reference 1: Wireless Technologies
Difficulty: Easy
Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main
types of wireless transmission media.

5. Microwave transmissions are affected by environmental conditions such as storms.

Answer: True
Section reference 1: Wireless Technologies
Difficulty: Easy
Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main
types of wireless transmission media.

6. The higher the orbit of a satellite, the larger its footprint.

Answer: True
Section reference 1: Wireless Technologies
Difficulty: Easy
Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main
types of wireless transmission media.

7. The global positioning system is supported by GEO satellites.

Answer: False
Section reference 1: Wireless Technologies
Difficulty: Easy
Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main
types of wireless transmission media.

8. Radio transmissions are highly secure.

Answer: False
Section reference 1: Wireless Technologies
Difficulty: Easy
Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main
types of wireless transmission media.

9. Bluetooth is a wireless standard that enables temporary, short-range connection between


mobile devices.

Answer: True
Section reference 1: Wireless Computer Networks and Internet Access
Difficulty: Easy
Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.

10. A hotspot is a small geographical perimeter within which a wireless access point provides
service to a number of users.

Answer: True
Section reference 1: Wireless Computer Networks and Internet Access
Difficulty: Easy
Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.

11. Wi-Fi provides excellent security.

Answer: False
Section reference 1: Wireless Computer Networks and Internet Access
Difficulty: Easy
Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.

12. In a mesh network, the motes transmit their data to a central computer.

Answer: False
Section reference 1: Pervasive Computing
Difficulty: Easy
Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing,
providing examples of how businesses can utilize each one.

13. Mesh networks are reliable, efficient, and fault tolerant.

Answer: True
Section reference 1: Pervasive Computing
Difficulty: Easy

Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing,


providing examples of how businesses can utilize each one.

14. Personalization means that a mobile device can provide real-time communication,
independent of the users location.

Answer: False
Section reference 1: Mobile Computing and Mobile Commerce
Difficulty: Easy
Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.

15. A voice portal is a standard Web site that accepts voice commands.

Answer: False
Section reference 1: Mobile Computing and Mobile Commerce
Difficulty: Easy
Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.

16. Mobile wallets enable users to make purchases with a single click from a mobile device.

Answer: True

Section reference 1: Mobile Computing and Mobile Commerce


Difficulty: Easy
Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.

17. Telemetry is the science that measures physical remoteness by means of wireless
transmissions from a remote source to a receiving station.

Answer: True
Section reference 1: Mobile Computing and Mobile Commerce
Difficulty: Easy
Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.

18. Pervasive computing and virtual reality are just different names for the same thing.

Answer: False
Section reference 1: Pervasive Computing
Difficulty: Easy
Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing,
providing examples of how businesses can utilize each one.

19. Two systems being developed to replace bar codes are QR codes and RFID systems.

Answer: True

Section reference 1: Pervasive Computing


Difficulty: Medium
Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing,
providing examples of how businesses can utilize each one.

20. Rogue access points can be set up by employees.

Answer: True
Section reference 1: Wireless Security
Difficulty: Easy
Learning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can
damage a business.

21. War driving is the act of locating wireless networks while driving around a certain area.

Answer: True
Section reference 1: Wireless Security
Difficulty: Easy
Learning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can
damage a business.

22. Refer to ITs About Business 8.6 BP Uses Wireless Technologies: Wireless sensors can
be used to increase safety and reliability by doing tasks that are too dangerous for humans.

Answer: False
Section reference 1: ITs About Business 8.6
Difficulty: Medium
Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing,
and mobile commerce.

23. Refer to ITs About Business 8.7 Brazil Uses Smart Meters: Smart Meters can be used to
monitor electricity consumption and detect theft.

Answer: True
Section reference 1: ITs About Business 8.7
Difficulty: Easy
Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing,
and mobile commerce.

Question Type: Multiple Choice

24. Individuals are finding it convenient and productive to use wireless devices for which of the
following reasons?
A. To make use of time that was formerly wasted
B. To become more efficient
C. Work locations are more flexible
D. To be able to allocate working time around personal and professional obligations
E. All of the above

Answer: E
Section reference 1: Wireless Technologies
Difficulty: Medium
Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main
types of wireless transmission media.

25. Of the following, which is the major problem with smart phones?
A. They are too slow.
B. They are too expensive.
C. They can be used to compromise security.
D. Their screens are too small.
E. Their browsers are not fully functional.

Answer: C
Section reference 1: Wireless Technologies
Difficulty: Medium
Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main
types of wireless transmission media.

26. The capabilities of smart phones include all of the following except _________.
A. A calculator
B. E-mail

C. A global positioning system


D. Corporate transaction processing
E. A full-function Internet browser

Answer: D
Section reference 1: Wireless Technologies
Difficulty: Easy
Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main
types of wireless transmission media.

27. Unfortunately, many managers consider smart phones as only _____, rather than as _____
that can transmit wirelessly.
A. Phones, digital cameras
B. Phones, pagers
C. Digital cameras, phones
D. Digital cameras, pagers
E. Cheap, expensive devices

Answer: A
Section reference 1: Wireless Technologies
Difficulty: Medium
Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main
types of wireless transmission media.

28. Microwave transmission systems are used for _____ volume, _____ distance, _____
communications.
A. Low, long, broadcast
B. Low, short, line-of-sight
C. High, long, broadcast
D. High, short, broadcast
E. High, long, line-of-sight

Answer: E
Section reference 1: Wireless Technologies
Difficulty: Medium
Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main
types of wireless transmission media.

29. Which type of satellite has the largest footprint?


A. Low-earth-orbit
B. Medium-earth-orbit
C. Geostationary
D. Polar orbit
E. Equatorial orbit
Answer: C
Section reference 1: Wireless Technologies
Difficulty: Easy
Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main
types of wireless transmission media.

30. The area of the earth reached by a satellites transmission is referred to as its _____.
A. Hotspot
B. Coverage

C. Footprint
D. Zone
E. Wireless area
Answer: C
Section reference 1: Wireless Technologies
Difficulty: Easy
Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main
types of wireless transmission media.

31. The greatest problem with GEO satellites is which of the following?
A. Propagation delay
B. Expense
C. Orbital life
D. Size of the footprint
E. Relative speed with respect to a point on the earths surface
Answer: A
Section reference 1: Wireless Technologies
Difficulty: Easy
Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main
types of wireless transmission media.

32. _____ is a satellite-based tracking system that enables users to determine a persons
position.
A. Bluetooth
B. Wireless application protocol
C. Short message service
D. Wi-Fi
E. Global positioning system

Answer: E
Section reference 1: Wireless Technologies
Difficulty: Easy
Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main
types of wireless transmission media.

33. Which of the following is not an advantage of radio?


A. No metallic wires are needed.
B. Radio waves propagate easily through office walls.
C. Radio devices are inexpensive.
D. Radio waves do not create electrical interference problems.
E. Radio devices are easy to install.
Answer: D
Section reference 1: Wireless Technologies
Difficulty: Medium
Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main
types of wireless transmission media.

34. The main problem with radio transmission is which of the following?

A. Radio waves cannot travel through walls.


B. When you travel too far from the source, the signal fades.
C. Devices are difficult to install.
D. Radio waves are slow.
E. Devices are expensive to install.
Answer: B
Section reference 1: Wireless Technologies
Difficulty: Medium
Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main
types of wireless transmission media.

35. The most common wireless technology for TV and DVD remote control devices is _______.
A. Bluetooth
B. Ultra-wideband
C. Near-field communications
D. WiMAX
E. Infrared
Answer: E
Section reference 1: Wireless Technologies
Difficulty: Easy
Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main
types of wireless transmission media.

36. _____ is a wireless standard that enables temporary, short-range connection between
mobile devices.
A. Bluetooth
B. Wireless application protocol
C. Short message service
D. Wi-Fi
E. Global positioning system

Answer: A
Section reference 1: Wireless Computer Networks and Internet Access
Difficulty: Easy
Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.

37. Which of the following is the most appropriate wireless networking standard for creating
personal area networks?
A. Wi-Fi
B. Cellular radio
C. Microwave
D. Bluetooth
E. WiMAX

Answer: D
Section reference 1: Wireless Computer Networks and Internet Access
Difficulty: Easy
Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.

38. Which of the following is the most appropriate wireless technology for real-time location of
caregivers and mobile equipment in healthcare environments?

A. Wi-Fi
B. Microwave
C. Ultra-wideband
D. Infrared
E. Bluetooth

Answer: C
Section reference 1: Wireless Computer Networks and Internet Access
Difficulty: Medium
Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.

39. _____, with the shortest range of any wireless network, is designed to be used with
contactless credit cards.
A. Near-field communications
B. Bluetooth
C. Ultra-wideband
D. Wi-Fi
E. Infrared

Answer: A
Section reference 1: Wireless Computer Networks and Internet Access
Difficulty: Easy
Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.

40. Which of the following statements about Wi-Fi is not correct?


A. Wi-Fi provides simple Internet access.
B. Laptop PC scans contain chips that can send and receive Wi-Fi signals.
C. Many companies offer free Wi-Fi access in their stores.
D. Wi-Fi requires encryption for secure transmissions.
E. Wi-Fi is expensive to set up.

Answer: E
Section reference 1: Wireless Computer Networks and Internet Access
Difficulty: Medium
Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.

41. Which of the following is not inhibiting faster Wi-Fi expansion?


A. Users cannot roam from hotspot to hotspot if the hotspots use different Wi-Fi network
services.
B. A lack of security.
C. The growth of WiMAX
D. Unless the service is free, users have to log on to separate accounts for each hotspot.
E. Wi-Fi services may not survive in the face of free hotspot access.

Answer: C
Section reference 1: Wireless Computer Networks and Internet Access
Difficulty: Hard
Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.

42. A small geographical perimeter within which a wireless access point provides service to a
number of users is called a ________.
A. Transceiver
B. Hotspot
C. Local reception node
D. Wireless network
E. GPS location

Answer: B
Section reference 1: Wireless Computer Networks and Internet Access
Difficulty: Easy
Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.

43. Today, most wireless local area networks use the _____ standard, which can transmit up to
54 Mbps and has a range of about 300 feet.
A. 802.11a

B. 802.11b
C. 802.11c
D. 802.11g
E. WiMAX

Answer: D
Section reference 1: Wireless Computer Networks and Internet Access
Difficulty: Easy
Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.

44. _____ networks use multiple Wi-Fi access points to create a wide area network.
A. Mesh
B. Pervasive
C. Global
D. Fixed
E. Ubiquitous

Answer: A
Section reference 1: Wireless Computer Networks and Internet Access
Difficulty: Easy

Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.

45. _____ communicate(s) via radio waves using radio antennas placed within adjacent
geographic areas.
A. Bluetooth
B. Cell phones
C. A satellite
D. Ultra-wideband
E. Near-field communications

Answer: B
Section reference 1: Wireless Computer Networks and Internet Access
Difficulty: Easy
Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.

46. The _____ standard can transmit up to 75 Mbps and has a range of 31 miles.
A. Wi-Fi
B. 802.11b
C. 802.11c
D. 802.11g
E. WiMAX

Answer: E
Section reference 1: Wireless Computer Networks and Internet Access
Difficulty: Easy
Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.

47. The two major characteristics that differentiate mobile computing from other forms of
computing are ______ and ________.
A. Mobility, broad reach
B. Mobility, lack of expense
C. Security, broad reach
D. Security, mobility
E. Broad reach, localization

Answer: A
Section reference 1: Mobile Computing and Mobile Commerce
Difficulty: Medium
Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.

48. With regard to mobile computing, _____ means that it is easy and fast to access the Web
and other mobile devices.
A. Ubiquity
B. Convenience
C. Instant connectivity
D. B and C
E. A, B, and C

Answer: D
Section reference 1: Mobile Computing and Mobile Commerce
Difficulty: Medium
Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.

49. With regard to mobile computing, _____ means that knowing where a user is physically
located is a key to offering relevant products and services.
A. Ubiquity
B. Convenience
C. Instant connectivity
D. Personalization
E. Localization of products and services

Answer: E
Section reference 1: Mobile Computing and Mobile Commerce
Difficulty: Easy

Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.

50. The development of mobile commerce is driven by all of the following factors except:
A. The widespread availability of mobile devices.
B. The cell phone culture.
C. Increasing prices.
D. Bandwidth improvement.
E. It eliminates the need for a PC.

Answer: C
Section reference 1: Mobile Computing and Mobile Commerce
Difficulty: Medium
Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.

51. Which of the following is not a mobile application in financial services?


A. Transaction processing systems
B. Mobile banking
C. Wireless electronic payment systems
D. Micropayments
E. Wireless wallets

Answer: A
Section reference 1: Mobile Computing and Mobile Commerce
Difficulty: Medium
Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.

52. Parking meters that you can pay via your mobile telephone are an example of _________.
A. Mobile banking
B. Wireless electronic payment
C. Wireless wallets
D. Brokerage service
E. Money transfer

Answer: B
Section reference 1: Mobile Computing and Mobile Commerce
Difficulty: Easy
Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.

53. If you buy a hot dog at a concession stand using your contactless credit card, you are using
a ________.
A. Wireless money transfer

B. Wireless wallet
C. Wireless bill payment
D. Micropayment
E. Wireless electronic payment system

Answer: E
Section reference 1: Mobile Computing and Mobile Commerce
Difficulty: Medium
Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.

54. Putting ads on top of taxicabs in New York City that change as the cabs travel around the
city is an example of ________.
A. Viral marketing
B. Permission advertising
C. Geographical advertising
D. Location-based advertising
E. Direct marketing

Answer: D
Section reference 1: Mobile Computing and Mobile Commerce
Difficulty: Medium
Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.

55. _____ refer(s) to the wireless communication of location-based information and control
messages to and from vehicles and other mobile assets.
A. Location-based services
B. Telematics
C. Pervasive services
D. RFID
E. Wi-Fi

Answer: B
Section reference 1: Mobile Computing and Mobile Commerce
Difficulty: Easy
Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.

56. Sense networks track users via all of the following technologies except _______.
A. GPS
B. Traffic cameras
C. Cell towers
D. Wi-Fi networks
E. None of the above

Answer: B

Section reference 1: Mobile Computing and Mobile Commerce


Difficulty: Medium
Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.

57. _____ is the science that measures physical remoteness by means of wireless transmission
from a remote source to a receiving station.
A. Telemetry
B. Wireless access point
C. Near-field communications
D. Microwave
E. Wireless positioning

Answer: A
Section reference 1: Mobile Computing and Mobile Commerce
Difficulty: Easy
Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.

58. The generic term for technologies that use radio waves to automatically identify individual
items is __________.
A. Telemetry
B. Bar codes
C. Shipping labels

D. Radio-frequency identification
E. Wireless access points

Answer: D
Section reference 1: Pervasive Computing
Difficulty: Easy
Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing,
providing examples of how businesses can utilize each one.

59. Which of the following is not a limitation of barcodes?


A. They require line-of-sight to the scanning device.
B. They are printed on paper.
C. They identify the manufacturer, product, and item.
D. They are difficult to use in a manufacturing plant.
E. They are useless in determining expiration date.

Answer: C
Section reference 1: Pervasive Computing
Difficulty: Medium
Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing,
providing examples of how businesses can utilize each one.

60. The major problem with RFID has been _______.


A. Expense
B. Bandwidth
C. Location
D. RFID readers
E. RFID tags

Answer: A
Section reference 1: Pervasive Computing
Difficulty: Easy
Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing,
providing examples of how businesses can utilize each one.

61. What would be the best use of RFID in a business?


A. Transaction processing
B. Supply chain management
C. Personnel tracking
D. Enabling communications with customers
E. Decreasing network costs

Answer: B
Section reference 1: Pervasive Computing
Difficulty: Medium

Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing,


providing examples of how businesses can utilize each one.

62. _____ networks collect data from many points over an extended space.
A. Bluetooth
B. Ultra-wideband
C. Wireless sensor
D. WiMAX
E. Wi-Fi

Answer: C
Section reference 1: Pervasive Computing
Difficulty: Easy
Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing,
providing examples of how businesses can utilize each one.

63. Which of the following can be used for reading utility meters without a person having to get
out of a truck?
A. RuBee
B. ZigBee
C. Wi-Fi
D. Near-field communications
E. RFID

Answer: B
Section reference 1: Pervasive Computing
Difficulty: Easy
Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing,
providing examples of how businesses can utilize each one.

64. The act of locating wireless local area networks while moving around a city is called ____.
A. Eavesdropping
B. War driving
C. RF jamming
D. Cybersquatting
E. Installing rogue access devices

Answer: B
Section reference 1: Wireless Security
Difficulty: Easy
Learning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can
damage a business.

65. A(n) _____ allows unauthorized entry into a wireless network.


A. Lack of encryption

B. Disgruntled employee
C. Open node
D. Illegal server
E. Rogue access point

Answer: E
Section reference 1: Wireless Security
Difficulty: Easy
Learning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can
damage a business.

66. _____ refers to efforts by unauthorized users to access data traveling over wireless
networks.
A. RF jamming
B. War driving
C. Eavesdropping
D. Telemetry
E. Installing rogue access devices

Answer: C
Section reference 1: Wireless Security
Difficulty: Easy
Learning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can
damage a business.

67. In _____, a person or a device intentionally or unintentionally interferes with your wireless
network transmissions.
A. RF jamming
B. War driving
C. Eavesdropping
D. Telemetry
E. Installing rogue access devices

Answer: A
Section reference 1: Wireless Security
Difficulty: Easy
Learning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can
damage a business.

68. Although rogue access devices can be installed innocently, they can also be installed by an
attacker trying to gain unauthorized access to a wireless network. In such cases, these devices
are called an _____.
A. Unencrypted node
B. Evil twin
C. Open node
D. Illegal server
E. Unauthorized rogue access point

Answer: B

Section reference 1: Wireless Security


Difficulty: Easy
Learning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can
damage a business.

69. Refer to Opening Case The Battle for the Mobile Wallet: Which of the following statements
concerning mobile wallets is true?

A. Traditional credit card issuers have not shown a serious interest in this technology.
B. Individual companies cannot utilize this technology due to its prohibitive price.
C. Google has launched a program to manufacture its own smart phone chips.
D. Unlike traditional wallets, smart phones can be password protected.
E. Consumer advocates endorse mobile systems because they will lead to lower prices.

Answer: D
Section reference 1: Opening Case
Difficulty: Medium
Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing,
and mobile commerce.

70. Refer to ITs About Business 8.1 Big Wheel Mobile Truck & Square: Products like Square
offer small independent businesses the following advantages over the traditional credit card
systems:
A. Square does not charge merchants a fee for each transaction
B. Square does not require expensive equipment
C. Square can run on most mobile devices that the merchant already has

D. Square can be easily customized and updated


E. All of the above

Answer: E
Section reference 1: ITs About Business 8.1
Difficulty: Easy
Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing,
and mobile commerce

71. Refer to ITs About Business 8.2 Cell Phones Revolutionize Healthcare in Uganda: Which
of the following was not an outcome of using cell phones in Uganda?
A. Medication was removed from clinics that had too much
B. Doctors could text each other patient names
C. The mTrac system requires a long training period for users
D. Anonymous text messages can be sent to report any problems at the clinics
E. All of the above are true

Answer: D
Section reference 1: ITs About Business 8.2
Difficulty: Medium
Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing,
and mobile commerce

72. Refer to ITs About Business 8.3 - Near-Field Communications Helps Travelers in Japan:
Which of the following statements is false?
A. SKiP reduces the check-in, security and boarding time in the train stations to 15 mins
B. Retailers and merchants and send targeted marketing messages to customers who are
physically near their store
C. Japanese smartphones can be used as translators and wallets

D. NFC technology in smart phones is used for ticketing and boarding passes

Answer: A
Section reference 1: ITs About Business 8.3
Difficulty: Medium
Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing,
and mobile commerce

73. Refer to ITs About Business 8.4 Airlines Provide Wi-Fi to Passengers: As customers get
more used to having ubiquitous Internet access, Wi-Fi in airplanes will be ______.
A. Free
B. More expensive than it is now
C. Provided by the government
D. Illegal
E. None of the above

Answer: A
Section reference 1: ITs About Business 8.4
Difficulty: Medium
Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing,
and mobile commerce

74. Refer to ITs About Business 8.5 Mobile Ads Still Arent Very Good: Which of the following
statements is false?
A. Mobile advertising sends advertisements to users based on their current location
B. Mobile advertising requires new formats since banner ads are not visible on small screens
C. Pop-up window advertising does not work as well on mobile devices as it does on computer
screens
D. It is easier to track the effectiveness of mobile advertising than other mediums

E. Mobile advertising can be used to distribute coupons

Answer: A
Section reference 1: ITs About Business 8.5
Difficulty: Easy
Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing,
and mobile commerce

75. Refer to Closing Case Retailer Gains Many Benefits with RFID Item-Level Tagging: Which
of the following is the primary advantage of using RFID tags for retailers?
A. Easy to see tags on items
B. Storing more information about each item
C. Cost savings from time and labor
D. Cost savings on tags
E. Cost savings on scanner installations

Answer: C
Section reference 1: Closing Case
Difficulty: Medium
Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing,
and mobile commerce

Question Type: Essay

76. Discuss the differences between the traditional working environment and the wireless
working environment.

Section reference 1: Material following chapter-opening case


Difficulty: Medium
Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing,
and mobile commerce

77. Describe the convergence of functions in todays smart phones.

Section reference 1: Wireless Technologies


Difficulty: Medium
Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main
types of wireless transmission media.

78. Differentiate among the three types of satellites.

Section reference 1: Wireless Technologies


Difficulty: Medium
Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main
types of wireless transmission media

79. Define Bluetooth, and give examples of its uses.

Section reference 1: Wireless Technologies


Difficulty: Medium

Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main
types of wireless transmission media

80. Describe the 802.11 family of standards.

Section reference 1: Wireless Computer Networks and Internet Access


Difficulty: Medium
Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.

81. Explain location-based commerce, and provide examples.

Section reference 1: Mobile Commerce Applications


Difficulty: Medium
Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.

82. What are micropayments and mobile wallets? Provide examples of their uses.

Section reference 1: Mobile Commerce Applications


Difficulty: Medium
Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.

83. What are mobile portals and voice portals? Provide examples of their uses.

Section reference 1: Mobile Commerce Applications

Difficulty: Medium
Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.

84. What is telemetry, and how is it used.

Section reference 1: Mobile Commerce Applications


Difficulty: Medium
Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.

85. How do wireless sensor networks work, and what are they used for?

Section reference 1: Pervasive Computing


Difficulty: Medium
Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing,
providing examples of how businesses can utilize each one.

86. What are the problems with Wi-Fi?

Section reference 1: Wireless Computer Networks and Internet Access


Difficulty: Medium
Learning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can
damage a business.

87. What are the two characteristics of mobile computing, and what are the five value-added
attributes of mobile computing?

Section reference 1: Mobile Computing and Mobile Commerce


Difficulty: Medium
Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.

88. Explain the factors that are driving the development of mobile commerce.

Section reference 1: Mobile Computing and Mobile Commerce


Difficulty: Hard
Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.

89. Describe pervasive computing and the two technologies that provide its infrastructure.

Section reference 1: Pervasive Computing


Difficulty: Medium
Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing,
providing examples of how businesses can utilize each one.

90. Identify and discuss the four major threats to wireless networks.

Section reference 1: Wireless Security


Difficulty: Medium

Learning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can
damage a business.

Question Type: Multiple Choice

91. Michaela runs a dog-walking business. She has three employees, and she prides herself in
maintaining a high level of customer service. She gets about half of her business from lastminute requests. When she receives such a request, she needs to know where her employees
are so that she can identify the nearest one who might be able to do the walk. Significantly, she
needs this information before she can confirm the walk with the client. Which of the following
technologies will help her obtain this information?
A. Radio transmission
B. Internet over Satellite
C. LEO constellation
D. GPS
E. Microwave

Answer: D
Section reference 1: Wireless Technologies
Difficulty: Medium
Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main
types of wireless transmission media.

92. Frank and his wife, Paula, run a country store with a special room where husbands can sit
while their wives are shopping. The Mens Corner already has a large-screen TV for sports
viewing, but Frank and Paula are considering adding Wi-Fi. Which of the following statements is
false?
A. Their store would need to have broadband access.
B. Their store will need a wireless access point.
C. They could charge the customers for the service.

D. Wi-Fi is based on radio waves, so they will need a clear line-of-sight into the room.
E. They should consider using Wi-Fi Direct.

Answer: E
Section reference 1: Wireless Computer Networks and Internet Access
Difficulty: Medium
Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.

93. Frank and his wife, Paula, run a country store in a high-foot-traffic area. Which of the
following would not be a beneficial use of mobile technology for their store?
A. Telemetry
B. Location-based
C. Wireless payments
D. Mobile app loyalty program
E. All of these could be used beneficial.

Answer: A
Section reference 1: Mobile Computing and Mobile Commerce
Difficulty: Medium
Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.

94. Frank and his wife, Paula, run a country store in a high-foot-traffic area. They are trying to
understand what the traffic in the store is by using technology. They are considering setting up
a wireless sensor network. Which of the following statements is false?
A. Motes can be locations throughout the store.
B. Once they have created the network, they cannot add additional sensors.

C. The data are moved from sensor to sensor to reach a central computer.
D. The sensors can tell the direction in which a person is moving.
E. The network will need a base station.

Answer: D
Section reference 1: Pervasive Computing
Difficulty: Medium
Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing,
providing examples of how businesses can utilize each one.

95. Frank and his wife, Paula, run a country store with a special room where husbands can sit
while their wives are shopping. The Mens Corner already has a large-screen TV for sports
viewing, and they recently added Wi-Fi. Which of the following is not a security issue?
A. A rogue access point
B. War driving
C. Motes
D. Eavesdropping
E. Radio-frequency jamming

Answer: D
Section reference 1: Wireless Technologies
Difficulty: Medium
Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main
types of wireless transmission media.

Vous aimerez peut-être aussi