Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Management
Q:
WiMAX is a coding process that takes a digital map feature and assigns it an attribute that serves as a unique ID (tract number, node number) or classification (soil type, zoning category). GIS professionals are certified in geocoding practices to ensure industry standards are met when classifying spatial data.
Q:
Spatial data (geospatial data or geographic information) identifies the geographic location of features and boundaries on Earth, such as natural or constructed features, oceans, and more. spatial data can be mapped and is stored as coordinates and topology. A GIS accesses, manipulates, and analyzes spatial data.
Q:
A great GIS example, Google earth, combines satellite imagery, geographic data, and Google's search capabilities to create a virtual globe that users can download to a computer or mobile device.
Q:
GIS map automation links business assets to a centralized system where they can be tracked and monitored over time.
Q:
Estimated time en route (ETE) is the time remaining before reaching a destination using the present speed and is typically used for navigation applications.
Q:
Estimated time of arrival (ETA) is the time of day of an expected arrival at a certain destination and is typically used for navigation applications.
Q:
A geocoin, a round coin-sized object, is uniquely numbered and hidden in geocache. Geocoins can also be shaped to match a theme like the state of Colorado or a birthday party hat. Geocoins are often decorative or commemorative, making them collectible and highly valuable for technology adventures.
Q:
Geocache is a GPS technology adventure game that posts the longitude and latitude location for an item on the Internet for users to find. GPS users find the geocache and typically sign a guest book or take an item and leave an item for the next adventure players to find. Caches are often placed in locations that are interesting or challenging for people to discover.
Q:
Latitude represents an east/west measurement of position.
Q:
Longitude represents a north/south measurement of position.
Q:
Traceroute occurs when paper maps are laid edge-to-edge and items that run across maps do not match are reconfigured to match.
Q:
Cartography is the science and art of making an illustrated map or chart. GIS allows users to interpret, analyze, and visualize data in different ways that reveal patterns and trends in the form of reports, charts, and maps.
Q:
A global positioning system (GPS) is a satellite-based navigation system providing extremely accurate position, time, and speed information.
Q:
Geographic information system (GIS) stores, views, and analyzes geographic data creating multidimensional charts or maps. For example, GIS are monitoring global warming by measuring the speed of glaciers melting in Canada, Greenland, and Antarctica.
Q:
Automatic vehicle location (AVL) uses GPS tracking to track vehicles.
Q:
A geographic information system (GIS) stores, views, and analyzes geographic data, creating multidimensional charts or maps.
Q:
A global positioning system (GPS) consists of hardware, software, and data that provide location information for display on a multidimensional map.
Q:
RFID innovations and technologies are being used in many industries including retail, hospitals, pharmaceuticals, and ranching.
Q:
RFID reader (RFID interrogator) is a transmitter/receiver that reads the contents of RFID tags in the area. A RFID system is composed of one or more RFID tags, one or more RFID readers, two or more antennas.
Q:
RFID tag is an electronic identification device that is made up of a chip and antenna.
Q:
Active RFID tags do not depend on a silicon microchip and use plastic or conductive polymers instead of silicon-based microchips allowing them to be washed or exposed to water without damaging the chip.
Q:
RFID accelerometer is a device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxi cab speeds.
Q:
Asset tracking occurs when a company places active or semi-passive RFID tags on expensive products or assets to gather data on the items location with little or no manual intervention.
Q:
Active RFID tags use a battery to run the microchip's circuitry, but communicate by drawing power from the RFID reader.
Q:
Passive RFID tags have their own transmitter and a power source (typically a battery).
Q:
Passive RFID tags do not have a power source.
Q:
Radio-frequency identification (RFID) uses electronic tags and labels to identify objects wirelessly over short distances.
Q:
Mobile device management (MDM) administers and delivers applications to corporate and personal smart phones and tablets.
Q:
Mobile application management (MAM) remotely controls smart phones and tablets, ensuring data security.
Q:
Device customization is the blending of personal and business use of technology devices and applications.
Q:
Mobile device management is a method of sending audio and video files over the Internet in such a way that the user can view the file while it is being transferred.
Q:
Mobile application management (MAM) administers and delivers applications to corporate and personal smart phones and tablets.
Q:
Mobile device management (MDM) remotely controls smart phones and tablets, ensuring data security.
Q:
IT consumerization is the blending of personal and business use of technology devices and applications.
Q:
War driving is deliberately searching for Wi-Fi signals while driving by in a vehicle.
Q:
War chalking is the practice of tagging pavement with codes displaying where Wi-Fi access is available. The codes for war chalking tell other users the kind of access available, the speed of the network, and if the network is secured.
Q:
War chalking is deliberately searching for Wi-Fi signals while driving by in a vehicle.
Q:
War consumerization is the practice of tagging pavement with codes displaying where Wi-Fi access is available.
Q:
Wired equivalent privacy (WEP) is a wireless security protocol to protect Wi-Fi networks.
Q:
A wireless LAN (WLAN) is a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves.
Q:
War driving allows mobile voice calls to be made over broadband networks, creatingunder the right network conditionsclearer audio and fewer dropped calls.
Q:
Wi-Fi protected access (WPA) a wireless security protocol to protect Wi-Fi networks.
Q:
A wireless WAN (WWAN) is a local area network that uses radio signals to transmit and receive data over distances of a few hundred feet.
Q:
Wired equivalent privacy (WEP) is an encryption algorithm designed to protect wireless transmission data.
Q:
A voice over LTE is the computer or network device that serves as an interface between devices and the network. Each computer initially connects to the access point and then to other computers on the network.
Q:
A satellite is a space station that orbits the Earth, receiving and transmitting signals from Earth-based stations over a wide area.
Q:
A satellite is a space station that orbits the Sun, receiving and transmitting signals from Mars-based stations over a wide area.
Q:
Voice over LTE (VoLTE) allows mobile voice calls to be made over broadband networks, creatingunder the right network conditionsclearer audio and fewer dropped calls.
Q:
Streaming is a method of sending audio and video files over the Internet in such a way that the user can view the file while it is being transferred.
Q:
A wireless WAN (WWAN) is a wide area network that uses radio signals to transmit and receive data.
Q:
Worldwide Interoperability for Microwave Access (WiMAX), a communications technology aimed at providing high-speed wireless data over metropolitan area networks.
Q:
A wireless MAN (WMAN) is a metropolitan area network that uses radio signals to transmit and receive data.
Q:
Worldwide Interoperability for Microwave Access (WiMAX) is a communications technology aimed at providing high-speed wireless data over metropolitan area networks.
Q:
The Institute of Electrical and Electronics Engineers (IEEE) is an organization that researches and institutes electrical standards for communication and other technologies. Known officially as IEEE 802.11n (or wireless-N) is the newest standard for wireless networking. Compared with earlier standards like 802.11b, wireless-N offers faster speeds, more flexibility and greater range.
Q:
Hotspots are designated locations where Wi-Fi access points are publicly available.
Q:
Wi-Fi infrastructure includes the inner workings of a Wi-Fi service or utility, including the signal transmitters, towers, or poles and additional equipment required to send out a Wi-Fi signal.
Q:
A secure socket layer enables devices to connect to a wireless network to communicate with each other.
Q:
An access point provides communication for devices owned by a single user that work over a short distance.
Q:
A wireless access point (WAP) enables devices to connect to a wireless network to communicate with each other.
Q:
An access point (AP) is the computer or network device that serves as an interface between devices and the network. Each computer initially connects to the access point and then to other computers on the network.
Q:
With the power of a wireless network, business professionals can take advantage of mobility allowing them to work from anywhere, at any time, using many different devices.
Q:
Wi-Fi protected access (WAP) is an encryption algorithm designed to protect wireless transmission data.
Q:
A wireless LAN (WLAN) is a local area network that uses radio signals to transmit and receive data over distances of a few hundred feet.
Q:
Bluetooth is a wireless PAN technology that transmits signals over short distances among cell phones, computers, and other devices.
Q:
The digital divide is a wireless PAN technology that transmits signals over short distances among cell phones, computers, and other devices.
Q:
A personal area network (PAN) provides communication for devices owned by a single user that work over a short distance.
Q:
Wireless, on the other hand, refers to any type of operation accomplished without the use of a hard-wired connection.
Q:
Mobile means the technology can travel with the user; for instance, users can download software, email messages, and web pages onto a laptop or other mobile device for portable reading or reference. Information collected while on the road can be synchronized with a PC or company server.
Q:
Mobile and wireless networks are identical and the terms can be used synonymously.
Q:
Some of the social challenges with networking occur with newsgroups or blogs where like-minded people can exchange messages. Problems can arise when sensitive social issues become the topic of discussion such as politics or religion.
Q:
Secure sockets layer (SSL) is a combination of HTTP and SSL to provide encryption and secure identification of an Internet server.
Q:
Two methods for encrypting network traffic on the web are secure sockets layer and secure hypertext transfer protocol.
Q:
The main challenges facing networks include security and social, ethical, and political issues.
Q:
VPNs are often used to connect to a corporate server. VPN stands for a Valued Partner Network.
Q:
Companies can establish direct private network links among themselves or create private, secure Internet access, in effect a private tunnel within the Internet, called an extranet.
Q:
An extranet is a restricted network that relies on Internet technologies to provide an Internet-like environment within the company for information sharing, communications, collaboration, web publishing, and the support of business processes.
Q:
Identify the challenges of business mobility.
Q:
Companies can establish direct private network links among themselves or create private, secure Internet access, in effect a private tunnel within the Internet, called a virtual private network (VPN).
Q:
Identify the benefits of business mobility.
Q:
An extranet is an extension of an intranet that is available only to authorized outsiders, such as customers, partners, and suppliers.