Filters
Question type

Study Flashcards

Which of the below uses both GIS and GPS?


A) Navigation
B) Wireless advertising
C) Vehicle location
D) All of the above

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

What is geocoding?


A) Identifies the geographic location of features and boundaries on Earth, such as natural or constructed features, oceans, and more.
B) Links business assets to a centralized system where they can be tracked and monitored over time.
C) In spatial databases is a coding process that assigns a digital map feature to an attribute that serves as a unique ID (tract number, node number) or classification (soil type, zoning category) .
D) A round coin-sized object, is uniquely numbered and hidden in geocache.

E) All of the above
F) A) and C)

Correct Answer

verifed

verified

What is latitude?


A) Use plastic or conductive polymers instead of silicon-based microchips, allowing them to be washed or exposed to water without damaging the chip.
B) A device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxi cab speeds.
C) A satellite-based navigation system providing extremely accurate position, time, and speed information.
D) A north/south measurement of position.

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Passive RFID tags do not have a power source

A) True
B) False

Correct Answer

verifed

verified

What is software that prevents direct communication between a sending and receiving computer and is used to monitor packets for security reasons?


A) Proxy
B) Broadband over power line
C) Attenuation
D) Repeater

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

Radio-frequency identification (RFID)uses electronic tags and labels to identify objects wirelessly over short distances.

A) True
B) False

Correct Answer

verifed

verified

Active RFID tags do not depend on a silicon microchip and use plastic or conductive polymers instead of silicon-based microchips allowing them to be washed or exposed to water without damaging the chip.

A) True
B) False

Correct Answer

verifed

verified

Identify the challenges of business mobility.

Correct Answer

verifed

verified

There are several challenges of wireless...

View Answer

What are the five elements that are needed to create a connected world or a network?


A) Categories, programs, alternatives, people, and core philosophy
B) Program, providers, access, mechanics, and teachers
C) Categories, providers, access technologies, protocols, and convergence
D) LAN, WAN, MAN, PAN, and SAN

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

What is a wireless MAN?


A) A metropolitan area network that uses radio signals to transmit and receive data.
B) A communications technology aimed at providing high-speed wireless data over metropolitan area networks.
C) A means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves.
D) Includes the inner workings of a Wi-Fi service or utility, including the signal transmitters, towers, or poles and additional equipment required to send out a Wi-Fi signal.

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

Wi-Fi infrastructure includes the inner workings of a Wi-Fi service or utility, including the signal transmitters, towers, or poles and additional equipment required to send out a Wi-Fi signal.

A) True
B) False

Correct Answer

verifed

verified

Mobile application management (MAM)remotely controls smart phones and tablets, ensuring data security.

A) True
B) False

Correct Answer

verifed

verified

Wi-Fi protected access (WPA) a wireless security protocol to protect Wi-Fi networks.


A) A metropolitan area network that uses radio signals to transmit and receive data.
B) A communications technology aimed at providing high-speed wireless data over metropolitan area networks.
C) A means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves.
D) A wireless security protocol to protect Wi-Fi networks.

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

What is wired equivalent privacy (WEP) is an encryption algorithm designed to protect wireless transmission data.


A) A metropolitan area network that uses radio signals to transmit and receive data.
B) A communications technology aimed at providing high-speed wireless data over metropolitan area networks.
C) A means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves.
D) An encryption algorithm designed to protect wireless transmission data.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

The main challenges facing networks include security, social, ethical and political issues.

A) True
B) False

Correct Answer

verifed

verified

Identify the challenges of a connected world.

Correct Answer

verifed

verified

Networks have created a diverse, yet glo...

View Answer

What is the conversion of IP addresses that identifies labels that use a variety of recognizable naming conventions?


A) Domain grades
B) URL spaces
C) Domain national sequences (DNS)
D) Domain name system (DNS)

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Explain the different wireless network categories.

Correct Answer

verifed

verified

There are four types of wireless network...

View Answer

Mobile device management (MDM)administers and delivers applications to corporate and personal smart phones and tablets.

A) True
B) False

Correct Answer

verifed

verified

Traceroute occurs when paper maps are laid edge-to-edge and items that run across maps and do not match are reconfigured to match.

A) True
B) False

Correct Answer

verifed

verified

Showing 61 - 80 of 303

Related Exams

Show Answer