Filters
Question type

Study Flashcards

Protecting against theft can expose a company to many significant risks such as stolen IDs,__________,encryption keys,and even confidential company information.

Correct Answer

verifed

verified

GPS utilizes location-based services (LBS),applications that use location information to provide a service,whereas a GIS does not use LBS applications.

A) True
B) False

Correct Answer

verifed

verified

What are satellite communications used for?


A) Cell phones
B) Mobile base stations
C) Satellite dish receivers
D) All of the above

E) All of the above
F) A) and C)

Correct Answer

verifed

verified

Dynamic host configuration protocol is a utility application that monitors the network path of packet data sent to a remote computer.

A) True
B) False

Correct Answer

verifed

verified

A geocoin,a round coin-sized object,is uniquely numbered and hidden in geocache.Geocoins can also be shaped to match a theme like the state of Colorado or a birthday party hat.Geocoins are often decorative or commemorative,making them collectible and highly valuable for technology adventures.

A) True
B) False

Correct Answer

verifed

verified

Passive RFID tags have their own transmitter and a power source (typically a battery).

A) True
B) False

Correct Answer

verifed

verified

Which of the below offers a common example of a LAN?


A) College campus
B) Home office
C) City library
D) All of the above

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

What is the practice of tagging pavement with codes displaying where Wi-Fi access is available.


A) WEP
B) Wi-Fi protected access
C) War chalking
D) War driving

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

A ___________ area network connects a group of computers in close proximity,such as in an office building,school,or home.

Correct Answer

verifed

verified

Explain the different wireless network categories.

Correct Answer

verifed

verified

There are four types of wireless network...

View Answer

______________ in spatial databases is a coding process that takes a digital map feature and assigns it an attribute that serves as a unique ID (tract number,node number)or classification (soil type,zoning category).

Correct Answer

verifed

verified

What is a WLAN that uses Wi-Fi and has a built-in security mechanism that uses a wireless security protocol to protect Wi-Fi networks?


A) WEP
B) Wi-Fi protected access
C) War chalking
D) War driving

E) A) and C)
F) All of the above

Correct Answer

verifed

verified

___________-based services are applications that use location information to provide a service.Some examples include mapping,emergency services,navigation,and weather information.

Correct Answer

verifed

verified

___________ data identifies the geographic location of features and boundaries on Earth,such as natural or constructed features,oceans,and more.Spatial data can be mapped and is stored as coordinates and topology.A GIS accesses,manipulates,and analyzes spatial data.

Correct Answer

verifed

verified

Semi-passive RFID tags use a ______________ to run the microchip's circuitry,but communicate by drawing power from the RFID reader.

Correct Answer

verifed

verified

VPNs are often used to connect to a corporate server.VPN stands for a Valued Partner Network.

A) True
B) False

Correct Answer

verifed

verified

We measure network performance in terms of _______________,the maximum amount of data that can pass from one point to another in a unit of time.

Correct Answer

verifed

verified

A metropolitan area network (MAN)is a large computer network usually spanning a city.

A) True
B) False

Correct Answer

verifed

verified

What are the two main methods for encrypting network traffic on the Web?


A) SSL and HTTP
B) SSL and SHTTP
C) DSL and HTTP
D) HTML and SHTTP

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

What is a utility application that monitors the network path of packet data sent to a remote computer?


A) Traceroute
B) Standard packet
C) Packet header
D) Packet footer

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Showing 161 - 180 of 268

Related Exams

Show Answer