A) cell phone
B) pager
C) personal digital assistant
D) smartphone
Correct Answer
verified
Multiple Choice
A) mobile banking
B) wireless wallet
C) micropayment
D) money transfer
Correct Answer
verified
Multiple Choice
A) locating WANs while driving or walking and using a wireless-enabled computer to intrude into the network.
B) unauthorized users accessing data that are traveling over wireless networks.
C) a person or a device that intentionally or unintentionally interferes with wireless network transmissions.
D) making private wireless communications available to the public.
Correct Answer
verified
Multiple Choice
A) widespread familiarity with communication via cell phones.
B) the decreasing costs of wireless devices.
C) the availability of greater bandwidth.
D) all of these options.
Correct Answer
verified
Multiple Choice
A) It utilizes approximately 1 million free, open Wi-Fi hotspots that Google has verified as fast and reliable.
B) It is a prepaid phone service that provides users with data services across all existing mobile networks.
C) It encrypts data when a customer uses public Wi-Fi.
D) It allows customers to change the size of their data plans whenever they want.
Correct Answer
verified
Multiple Choice
A) Brokerage services
B) Wireless electronic payment systems
C) Micropayments
D) All of these options
Correct Answer
verified
Multiple Choice
A) They capture how much energy is being consumed at each site.
B) They have the intelligence to know which types of home devices are consuming energy.
C) They broadcast consumption data over radio frequency to a PGE neighborhood area network.
D) They only collect raw usage data.
Correct Answer
verified
Multiple Choice
A) transceiver
B) hotspot
C) cellular radio
D) wireless access point
Correct Answer
verified
Multiple Choice
A) Low-earth-orbit
B) Medium-earth-orbit
C) Geostationary-earth-orbit
D) Polar-earth-orbit
Correct Answer
verified
Multiple Choice
A) Wi-Fi
B) Microwave
C) Ultra-wideband
D) Infrared
Correct Answer
verified
Multiple Choice
A) Mobile computing offers greater security.
B) Connectivity is slower but more reliable than in other forms of computing.
C) Mobile computing is limited to relatively short SMS messages.
D) Customized information can be sent to individuals as an SMS.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Low-earth-orbit
B) Medium-earth-orbit
C) Geostationary-earth-orbit
D) Polar-earth-orbit
Correct Answer
verified
Multiple Choice
A) rogue access points, telemetry, and WSNs.
B) rogue access points, war driving, and eavesdropping.
C) rogue access points, telemetry, and eavesdropping.
D) rogue access points, WSNs, and RF jamming.
Correct Answer
verified
Multiple Choice
A) uses satellites to enable users to determine their position anywhere on earth.
B) uses a type of transmission that uses red light that is not commonly visible to human eyes.
C) is an autonomous device that monitors its own condition, as well as physical and environmental conditions around it.
D) is a type of chip technology that enables short-range data and voice connections between wireless devices.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) expense
B) bandwidth
C) location
D) RFID readers
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) It refers to a real-time, wireless connection between a mobile device and other computing environments, such as an intranet.
B) It refers to e-commerce transactions that are conducted with a mobile device.
C) It means that virtually every device has processing power with wireless or wired connections to a global network.
D) None of these options
Correct Answer
verified
Multiple Choice
A) Low-earth-orbit
B) Medium-earth-orbit
C) Geostationary-earth-orbit
D) Polar-earth-orbit
Correct Answer
verified
Showing 1 - 20 of 28
Related Exams