Académique Documents
Professionnel Documents
Culture Documents
Course Title: IS 5e
Chapter Number: 8
Answer: False
Section reference 1: chapter opening case
Difficulty: Easy
Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing,
and mobile commerce.
Answer: True
Section reference 1: chapter opening case
Difficulty: Easy
3. Wireless technologies are not changing the ways that organizations are doing business, but
they are enabling organizations to do business faster.
Answer: False
Section reference 1: chapter opening case
Difficulty: Easy
Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing,
and mobile commerce.
4. Short message service allows users to send short text messages on digital cell phones.
Answer: True
Section reference 1: Wireless Technologies
Difficulty: Easy
Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main
types of wireless transmission media.
Answer: True
Section reference 1: Wireless Technologies
Difficulty: Easy
Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main
types of wireless transmission media.
Answer: True
Section reference 1: Wireless Technologies
Difficulty: Easy
Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main
types of wireless transmission media.
Answer: False
Section reference 1: Wireless Technologies
Difficulty: Easy
Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main
types of wireless transmission media.
Answer: False
Section reference 1: Wireless Technologies
Difficulty: Easy
Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main
types of wireless transmission media.
Answer: True
Section reference 1: Wireless Computer Networks and Internet Access
Difficulty: Easy
Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.
10. A hotspot is a small geographical perimeter within which a wireless access point provides
service to a number of users.
Answer: True
Section reference 1: Wireless Computer Networks and Internet Access
Difficulty: Easy
Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.
Answer: False
Section reference 1: Wireless Computer Networks and Internet Access
Difficulty: Easy
Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.
12. In a mesh network, the motes transmit their data to a central computer.
Answer: False
Section reference 1: Pervasive Computing
Difficulty: Easy
Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing,
providing examples of how businesses can utilize each one.
Answer: True
Section reference 1: Pervasive Computing
Difficulty: Easy
14. Personalization means that a mobile device can provide real-time communication,
independent of the users location.
Answer: False
Section reference 1: Mobile Computing and Mobile Commerce
Difficulty: Easy
Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
15. A voice portal is a standard Web site that accepts voice commands.
Answer: False
Section reference 1: Mobile Computing and Mobile Commerce
Difficulty: Easy
Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
16. Mobile wallets enable users to make purchases with a single click from a mobile device.
Answer: True
17. Telemetry is the science that measures physical remoteness by means of wireless
transmissions from a remote source to a receiving station.
Answer: True
Section reference 1: Mobile Computing and Mobile Commerce
Difficulty: Easy
Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
18. Pervasive computing and virtual reality are just different names for the same thing.
Answer: False
Section reference 1: Pervasive Computing
Difficulty: Easy
Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing,
providing examples of how businesses can utilize each one.
19. Two systems being developed to replace bar codes are QR codes and RFID systems.
Answer: True
Answer: True
Section reference 1: Wireless Security
Difficulty: Easy
Learning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can
damage a business.
21. War driving is the act of locating wireless networks while driving around a certain area.
Answer: True
Section reference 1: Wireless Security
Difficulty: Easy
Learning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can
damage a business.
22. Refer to ITs About Business 8.6 BP Uses Wireless Technologies: Wireless sensors can
be used to increase safety and reliability by doing tasks that are too dangerous for humans.
Answer: False
Section reference 1: ITs About Business 8.6
Difficulty: Medium
Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing,
and mobile commerce.
23. Refer to ITs About Business 8.7 Brazil Uses Smart Meters: Smart Meters can be used to
monitor electricity consumption and detect theft.
Answer: True
Section reference 1: ITs About Business 8.7
Difficulty: Easy
Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing,
and mobile commerce.
24. Individuals are finding it convenient and productive to use wireless devices for which of the
following reasons?
A. To make use of time that was formerly wasted
B. To become more efficient
C. Work locations are more flexible
D. To be able to allocate working time around personal and professional obligations
E. All of the above
Answer: E
Section reference 1: Wireless Technologies
Difficulty: Medium
Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main
types of wireless transmission media.
25. Of the following, which is the major problem with smart phones?
A. They are too slow.
B. They are too expensive.
C. They can be used to compromise security.
D. Their screens are too small.
E. Their browsers are not fully functional.
Answer: C
Section reference 1: Wireless Technologies
Difficulty: Medium
Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main
types of wireless transmission media.
26. The capabilities of smart phones include all of the following except _________.
A. A calculator
B. E-mail
Answer: D
Section reference 1: Wireless Technologies
Difficulty: Easy
Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main
types of wireless transmission media.
27. Unfortunately, many managers consider smart phones as only _____, rather than as _____
that can transmit wirelessly.
A. Phones, digital cameras
B. Phones, pagers
C. Digital cameras, phones
D. Digital cameras, pagers
E. Cheap, expensive devices
Answer: A
Section reference 1: Wireless Technologies
Difficulty: Medium
Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main
types of wireless transmission media.
28. Microwave transmission systems are used for _____ volume, _____ distance, _____
communications.
A. Low, long, broadcast
B. Low, short, line-of-sight
C. High, long, broadcast
D. High, short, broadcast
E. High, long, line-of-sight
Answer: E
Section reference 1: Wireless Technologies
Difficulty: Medium
Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main
types of wireless transmission media.
30. The area of the earth reached by a satellites transmission is referred to as its _____.
A. Hotspot
B. Coverage
C. Footprint
D. Zone
E. Wireless area
Answer: C
Section reference 1: Wireless Technologies
Difficulty: Easy
Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main
types of wireless transmission media.
31. The greatest problem with GEO satellites is which of the following?
A. Propagation delay
B. Expense
C. Orbital life
D. Size of the footprint
E. Relative speed with respect to a point on the earths surface
Answer: A
Section reference 1: Wireless Technologies
Difficulty: Easy
Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main
types of wireless transmission media.
32. _____ is a satellite-based tracking system that enables users to determine a persons
position.
A. Bluetooth
B. Wireless application protocol
C. Short message service
D. Wi-Fi
E. Global positioning system
Answer: E
Section reference 1: Wireless Technologies
Difficulty: Easy
Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main
types of wireless transmission media.
34. The main problem with radio transmission is which of the following?
35. The most common wireless technology for TV and DVD remote control devices is _______.
A. Bluetooth
B. Ultra-wideband
C. Near-field communications
D. WiMAX
E. Infrared
Answer: E
Section reference 1: Wireless Technologies
Difficulty: Easy
Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main
types of wireless transmission media.
36. _____ is a wireless standard that enables temporary, short-range connection between
mobile devices.
A. Bluetooth
B. Wireless application protocol
C. Short message service
D. Wi-Fi
E. Global positioning system
Answer: A
Section reference 1: Wireless Computer Networks and Internet Access
Difficulty: Easy
Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.
37. Which of the following is the most appropriate wireless networking standard for creating
personal area networks?
A. Wi-Fi
B. Cellular radio
C. Microwave
D. Bluetooth
E. WiMAX
Answer: D
Section reference 1: Wireless Computer Networks and Internet Access
Difficulty: Easy
Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.
38. Which of the following is the most appropriate wireless technology for real-time location of
caregivers and mobile equipment in healthcare environments?
A. Wi-Fi
B. Microwave
C. Ultra-wideband
D. Infrared
E. Bluetooth
Answer: C
Section reference 1: Wireless Computer Networks and Internet Access
Difficulty: Medium
Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.
39. _____, with the shortest range of any wireless network, is designed to be used with
contactless credit cards.
A. Near-field communications
B. Bluetooth
C. Ultra-wideband
D. Wi-Fi
E. Infrared
Answer: A
Section reference 1: Wireless Computer Networks and Internet Access
Difficulty: Easy
Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.
Answer: E
Section reference 1: Wireless Computer Networks and Internet Access
Difficulty: Medium
Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.
Answer: C
Section reference 1: Wireless Computer Networks and Internet Access
Difficulty: Hard
Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.
42. A small geographical perimeter within which a wireless access point provides service to a
number of users is called a ________.
A. Transceiver
B. Hotspot
C. Local reception node
D. Wireless network
E. GPS location
Answer: B
Section reference 1: Wireless Computer Networks and Internet Access
Difficulty: Easy
Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.
43. Today, most wireless local area networks use the _____ standard, which can transmit up to
54 Mbps and has a range of about 300 feet.
A. 802.11a
B. 802.11b
C. 802.11c
D. 802.11g
E. WiMAX
Answer: D
Section reference 1: Wireless Computer Networks and Internet Access
Difficulty: Easy
Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.
44. _____ networks use multiple Wi-Fi access points to create a wide area network.
A. Mesh
B. Pervasive
C. Global
D. Fixed
E. Ubiquitous
Answer: A
Section reference 1: Wireless Computer Networks and Internet Access
Difficulty: Easy
Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.
45. _____ communicate(s) via radio waves using radio antennas placed within adjacent
geographic areas.
A. Bluetooth
B. Cell phones
C. A satellite
D. Ultra-wideband
E. Near-field communications
Answer: B
Section reference 1: Wireless Computer Networks and Internet Access
Difficulty: Easy
Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.
46. The _____ standard can transmit up to 75 Mbps and has a range of 31 miles.
A. Wi-Fi
B. 802.11b
C. 802.11c
D. 802.11g
E. WiMAX
Answer: E
Section reference 1: Wireless Computer Networks and Internet Access
Difficulty: Easy
Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.
47. The two major characteristics that differentiate mobile computing from other forms of
computing are ______ and ________.
A. Mobility, broad reach
B. Mobility, lack of expense
C. Security, broad reach
D. Security, mobility
E. Broad reach, localization
Answer: A
Section reference 1: Mobile Computing and Mobile Commerce
Difficulty: Medium
Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
48. With regard to mobile computing, _____ means that it is easy and fast to access the Web
and other mobile devices.
A. Ubiquity
B. Convenience
C. Instant connectivity
D. B and C
E. A, B, and C
Answer: D
Section reference 1: Mobile Computing and Mobile Commerce
Difficulty: Medium
Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
49. With regard to mobile computing, _____ means that knowing where a user is physically
located is a key to offering relevant products and services.
A. Ubiquity
B. Convenience
C. Instant connectivity
D. Personalization
E. Localization of products and services
Answer: E
Section reference 1: Mobile Computing and Mobile Commerce
Difficulty: Easy
Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
50. The development of mobile commerce is driven by all of the following factors except:
A. The widespread availability of mobile devices.
B. The cell phone culture.
C. Increasing prices.
D. Bandwidth improvement.
E. It eliminates the need for a PC.
Answer: C
Section reference 1: Mobile Computing and Mobile Commerce
Difficulty: Medium
Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
Answer: A
Section reference 1: Mobile Computing and Mobile Commerce
Difficulty: Medium
Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
52. Parking meters that you can pay via your mobile telephone are an example of _________.
A. Mobile banking
B. Wireless electronic payment
C. Wireless wallets
D. Brokerage service
E. Money transfer
Answer: B
Section reference 1: Mobile Computing and Mobile Commerce
Difficulty: Easy
Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
53. If you buy a hot dog at a concession stand using your contactless credit card, you are using
a ________.
A. Wireless money transfer
B. Wireless wallet
C. Wireless bill payment
D. Micropayment
E. Wireless electronic payment system
Answer: E
Section reference 1: Mobile Computing and Mobile Commerce
Difficulty: Medium
Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
54. Putting ads on top of taxicabs in New York City that change as the cabs travel around the
city is an example of ________.
A. Viral marketing
B. Permission advertising
C. Geographical advertising
D. Location-based advertising
E. Direct marketing
Answer: D
Section reference 1: Mobile Computing and Mobile Commerce
Difficulty: Medium
Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
55. _____ refer(s) to the wireless communication of location-based information and control
messages to and from vehicles and other mobile assets.
A. Location-based services
B. Telematics
C. Pervasive services
D. RFID
E. Wi-Fi
Answer: B
Section reference 1: Mobile Computing and Mobile Commerce
Difficulty: Easy
Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
56. Sense networks track users via all of the following technologies except _______.
A. GPS
B. Traffic cameras
C. Cell towers
D. Wi-Fi networks
E. None of the above
Answer: B
57. _____ is the science that measures physical remoteness by means of wireless transmission
from a remote source to a receiving station.
A. Telemetry
B. Wireless access point
C. Near-field communications
D. Microwave
E. Wireless positioning
Answer: A
Section reference 1: Mobile Computing and Mobile Commerce
Difficulty: Easy
Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
58. The generic term for technologies that use radio waves to automatically identify individual
items is __________.
A. Telemetry
B. Bar codes
C. Shipping labels
D. Radio-frequency identification
E. Wireless access points
Answer: D
Section reference 1: Pervasive Computing
Difficulty: Easy
Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing,
providing examples of how businesses can utilize each one.
Answer: C
Section reference 1: Pervasive Computing
Difficulty: Medium
Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing,
providing examples of how businesses can utilize each one.
Answer: A
Section reference 1: Pervasive Computing
Difficulty: Easy
Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing,
providing examples of how businesses can utilize each one.
Answer: B
Section reference 1: Pervasive Computing
Difficulty: Medium
62. _____ networks collect data from many points over an extended space.
A. Bluetooth
B. Ultra-wideband
C. Wireless sensor
D. WiMAX
E. Wi-Fi
Answer: C
Section reference 1: Pervasive Computing
Difficulty: Easy
Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing,
providing examples of how businesses can utilize each one.
63. Which of the following can be used for reading utility meters without a person having to get
out of a truck?
A. RuBee
B. ZigBee
C. Wi-Fi
D. Near-field communications
E. RFID
Answer: B
Section reference 1: Pervasive Computing
Difficulty: Easy
Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing,
providing examples of how businesses can utilize each one.
64. The act of locating wireless local area networks while moving around a city is called ____.
A. Eavesdropping
B. War driving
C. RF jamming
D. Cybersquatting
E. Installing rogue access devices
Answer: B
Section reference 1: Wireless Security
Difficulty: Easy
Learning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can
damage a business.
B. Disgruntled employee
C. Open node
D. Illegal server
E. Rogue access point
Answer: E
Section reference 1: Wireless Security
Difficulty: Easy
Learning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can
damage a business.
66. _____ refers to efforts by unauthorized users to access data traveling over wireless
networks.
A. RF jamming
B. War driving
C. Eavesdropping
D. Telemetry
E. Installing rogue access devices
Answer: C
Section reference 1: Wireless Security
Difficulty: Easy
Learning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can
damage a business.
67. In _____, a person or a device intentionally or unintentionally interferes with your wireless
network transmissions.
A. RF jamming
B. War driving
C. Eavesdropping
D. Telemetry
E. Installing rogue access devices
Answer: A
Section reference 1: Wireless Security
Difficulty: Easy
Learning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can
damage a business.
68. Although rogue access devices can be installed innocently, they can also be installed by an
attacker trying to gain unauthorized access to a wireless network. In such cases, these devices
are called an _____.
A. Unencrypted node
B. Evil twin
C. Open node
D. Illegal server
E. Unauthorized rogue access point
Answer: B
69. Refer to Opening Case The Battle for the Mobile Wallet: Which of the following statements
concerning mobile wallets is true?
A. Traditional credit card issuers have not shown a serious interest in this technology.
B. Individual companies cannot utilize this technology due to its prohibitive price.
C. Google has launched a program to manufacture its own smart phone chips.
D. Unlike traditional wallets, smart phones can be password protected.
E. Consumer advocates endorse mobile systems because they will lead to lower prices.
Answer: D
Section reference 1: Opening Case
Difficulty: Medium
Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing,
and mobile commerce.
70. Refer to ITs About Business 8.1 Big Wheel Mobile Truck & Square: Products like Square
offer small independent businesses the following advantages over the traditional credit card
systems:
A. Square does not charge merchants a fee for each transaction
B. Square does not require expensive equipment
C. Square can run on most mobile devices that the merchant already has
Answer: E
Section reference 1: ITs About Business 8.1
Difficulty: Easy
Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing,
and mobile commerce
71. Refer to ITs About Business 8.2 Cell Phones Revolutionize Healthcare in Uganda: Which
of the following was not an outcome of using cell phones in Uganda?
A. Medication was removed from clinics that had too much
B. Doctors could text each other patient names
C. The mTrac system requires a long training period for users
D. Anonymous text messages can be sent to report any problems at the clinics
E. All of the above are true
Answer: D
Section reference 1: ITs About Business 8.2
Difficulty: Medium
Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing,
and mobile commerce
72. Refer to ITs About Business 8.3 - Near-Field Communications Helps Travelers in Japan:
Which of the following statements is false?
A. SKiP reduces the check-in, security and boarding time in the train stations to 15 mins
B. Retailers and merchants and send targeted marketing messages to customers who are
physically near their store
C. Japanese smartphones can be used as translators and wallets
D. NFC technology in smart phones is used for ticketing and boarding passes
Answer: A
Section reference 1: ITs About Business 8.3
Difficulty: Medium
Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing,
and mobile commerce
73. Refer to ITs About Business 8.4 Airlines Provide Wi-Fi to Passengers: As customers get
more used to having ubiquitous Internet access, Wi-Fi in airplanes will be ______.
A. Free
B. More expensive than it is now
C. Provided by the government
D. Illegal
E. None of the above
Answer: A
Section reference 1: ITs About Business 8.4
Difficulty: Medium
Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing,
and mobile commerce
74. Refer to ITs About Business 8.5 Mobile Ads Still Arent Very Good: Which of the following
statements is false?
A. Mobile advertising sends advertisements to users based on their current location
B. Mobile advertising requires new formats since banner ads are not visible on small screens
C. Pop-up window advertising does not work as well on mobile devices as it does on computer
screens
D. It is easier to track the effectiveness of mobile advertising than other mediums
Answer: A
Section reference 1: ITs About Business 8.5
Difficulty: Easy
Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing,
and mobile commerce
75. Refer to Closing Case Retailer Gains Many Benefits with RFID Item-Level Tagging: Which
of the following is the primary advantage of using RFID tags for retailers?
A. Easy to see tags on items
B. Storing more information about each item
C. Cost savings from time and labor
D. Cost savings on tags
E. Cost savings on scanner installations
Answer: C
Section reference 1: Closing Case
Difficulty: Medium
Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing,
and mobile commerce
76. Discuss the differences between the traditional working environment and the wireless
working environment.
Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main
types of wireless transmission media
82. What are micropayments and mobile wallets? Provide examples of their uses.
83. What are mobile portals and voice portals? Provide examples of their uses.
Difficulty: Medium
Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
85. How do wireless sensor networks work, and what are they used for?
87. What are the two characteristics of mobile computing, and what are the five value-added
attributes of mobile computing?
88. Explain the factors that are driving the development of mobile commerce.
89. Describe pervasive computing and the two technologies that provide its infrastructure.
90. Identify and discuss the four major threats to wireless networks.
Learning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can
damage a business.
91. Michaela runs a dog-walking business. She has three employees, and she prides herself in
maintaining a high level of customer service. She gets about half of her business from lastminute requests. When she receives such a request, she needs to know where her employees
are so that she can identify the nearest one who might be able to do the walk. Significantly, she
needs this information before she can confirm the walk with the client. Which of the following
technologies will help her obtain this information?
A. Radio transmission
B. Internet over Satellite
C. LEO constellation
D. GPS
E. Microwave
Answer: D
Section reference 1: Wireless Technologies
Difficulty: Medium
Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main
types of wireless transmission media.
92. Frank and his wife, Paula, run a country store with a special room where husbands can sit
while their wives are shopping. The Mens Corner already has a large-screen TV for sports
viewing, but Frank and Paula are considering adding Wi-Fi. Which of the following statements is
false?
A. Their store would need to have broadband access.
B. Their store will need a wireless access point.
C. They could charge the customers for the service.
D. Wi-Fi is based on radio waves, so they will need a clear line-of-sight into the room.
E. They should consider using Wi-Fi Direct.
Answer: E
Section reference 1: Wireless Computer Networks and Internet Access
Difficulty: Medium
Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.
93. Frank and his wife, Paula, run a country store in a high-foot-traffic area. Which of the
following would not be a beneficial use of mobile technology for their store?
A. Telemetry
B. Location-based
C. Wireless payments
D. Mobile app loyalty program
E. All of these could be used beneficial.
Answer: A
Section reference 1: Mobile Computing and Mobile Commerce
Difficulty: Medium
Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
94. Frank and his wife, Paula, run a country store in a high-foot-traffic area. They are trying to
understand what the traffic in the store is by using technology. They are considering setting up
a wireless sensor network. Which of the following statements is false?
A. Motes can be locations throughout the store.
B. Once they have created the network, they cannot add additional sensors.
C. The data are moved from sensor to sensor to reach a central computer.
D. The sensors can tell the direction in which a person is moving.
E. The network will need a base station.
Answer: D
Section reference 1: Pervasive Computing
Difficulty: Medium
Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing,
providing examples of how businesses can utilize each one.
95. Frank and his wife, Paula, run a country store with a special room where husbands can sit
while their wives are shopping. The Mens Corner already has a large-screen TV for sports
viewing, and they recently added Wi-Fi. Which of the following is not a security issue?
A. A rogue access point
B. War driving
C. Motes
D. Eavesdropping
E. Radio-frequency jamming
Answer: D
Section reference 1: Wireless Technologies
Difficulty: Medium
Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main
types of wireless transmission media.