Filters
Question type

Study Flashcards

What represents the end of the packet or transmission end?


A) Traceroute
B) Standard packet
C) Packet header
D) Packet footer

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Which tags have their own transmitter and a power source (typically a battery) ?


A) Active RFID
B) Semi-passive RFID
C) RFID Accelerometer
D) Chipless RFID

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

A

What is a coding process that takes a digital map feature and assigns it an attribute that serves as a unique ID (tract number,node number) or classification (soil type,zoning category) ?


A) Geocoding
B) Geocache
C) Geocoin
D) All of the above

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

A

What are the two main methods for encrypting network traffic on the Web?


A) SSL and HTTP
B) SSL and SHTTP
C) DSL and HTTP
D) HTML and SHTTP

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

Which of the following is not a type of wireless network?


A) PAN
B) WLAN
C) WWAN
D) MAN

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

GPS utilizes location-based services (LBS),applications that use location information to provide a service,whereas a GIS does not use LBS applications.

A) True
B) False

Correct Answer

verifed

verified

Explain the different wireless network business applications.

Correct Answer

verifed

verified

Mobile and wireless business application...

View Answer

Which social media site uses LBS?


A) Foursquare
B) iTunes
C) Google
D) YouTube

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

____________ address is a unique number that identifies where computers are located on the network.

Correct Answer

verifed

verified

IP or internet protocol

Wireless networking includes personal area networks (PAN)that provide communication over a short distance that is intended for use with devices that are owned and operated by a single user.

A) True
B) False

Correct Answer

verifed

verified

The potential for contracting viruses on mobile devices is increasing;in fact,the first known mobile phone virus was called ______________.


A) Cabir
B) Cadet
C) Capital
D) Caviar

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What measures network performance by the maximum amount of data that can pass from one point to another in a unit of time?


A) Bandwidth
B) Frequency
C) Access
D) Protocol

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

Dynamic Host Configuration Protocol (DHCP)allows dynamic IP address allocation so users do not have to have a preconfigured IP address to use the network.

A) True
B) False

Correct Answer

verifed

verified

The largest and most important network,the ______________,is like a network made up of millions of smaller networks able to operate independently.

Correct Answer

verifed

verified

The packet footer represents the end of the packet or transmission end.The packet header and packet footer contain error-checking information to ensure the entire message is sent and received.The receiving device reassembles the individual packets into the original by stripping off the headers and footers and then piecing together the packets in the correct sequence.

A) True
B) False

Correct Answer

verifed

verified

Longitude represents a north/south measurement of position.

A) True
B) False

Correct Answer

verifed

verified

Wired equivalent privacy (WEP)is an encryption algorithm designed to protect wireless transmission data.

A) True
B) False

Correct Answer

verifed

verified

What is war driving?


A) An encryption algorithm designed to protect wireless transmission data
B) The practice of tagging pavement with codes displaying where Wi-Fi access is available
C) Deliberately searching for Wi-Fi signals while driving by in a vehicle
D) All of the above

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Passive RFID tags have their own transmitter and a power source (typically a battery).

A) True
B) False

Correct Answer

verifed

verified

What allows users to work from remote locations such as home or hotel using high-speed Internet to access business applications and data?


A) Telecommuting
B) Repeater
C) Packet header
D) Virtual attenuation

E) B) and D)
F) A) and C)

Correct Answer

verifed

verified

Showing 1 - 20 of 268

Related Exams

Show Answer