What is an encryption algorithm designed to protect wireless transmission data Quizlet

Home

Subjects

Expert solutions

Create

Log in

Sign up

Upgrade to remove ads

Only SGD 41.99/year

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (13)

Explain the different wireless network categories

personal area networks -Provide communication over a short distance that is intended for use with devices that are owned and operated by a single user
wireless local area networks- A local area network that uses radio signals to transmit and receive data over distances of a few hundred feet
wireless metropolitan area network-A metropolitan area network that uses radio signals to transmit and receive data
wireless wide area network- A wide area network that uses radio signals to transmit and receive data

Explain the different wireless network business applications

Areas experiencing tremendous growth using wireless technologies include:
radio frequency identification - Uses electronic tags and labels to identify objects wirelessly over short distances
global positioning systems -A satellite-based navigation system providing extremely accurate position, time, and speed information
geographic information systems-Consists of hardware, software, and data that provide location information for display on a multidimensional map

Bluetooth

Wireless PAN technology that transmits signals over short distances between cell phones, computers, and other devices

Wireless fidelity (Wi-Fi) -

A means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves

Worldwide Interoperability for Microwave Access (WiMAX)

- A communications technology aimed at providing high-speed wireless data over metropolitan area networks

Satellite -

A space station that orbits the Earth receiving and transmitting signals from Earth-based stations over a wide area

Protecting Wireless Connections

Wired equivalent privacy (WEP) - An encryption algorithm designed to protect wireless transmission data

War chalking - The practice of tagging pavement with codes displaying where Wi-Fi access is available

War driving - Deliberately searching for Wi-Fi signals while driving by in a vehicle

managing mobile devices

IT Consumerization

Mobile device management (MDM)

Mobile application management (MAM)

Spatial data (geospatial data or geographic information) -

dentifies the geographic location of features and boundaries on Earth, such as natural or constructed features, oceans, and more

Geocoding -

A spatial databases coding process that assigns a digital map feature an attribute that serves as a unique ID or classification

Location based services (LBS) -

Applications that use location information to provide a service

benefits of business mobility

Enhance mobility

Provides immediate data access

Increases location and monitoring capability

Improves work flow

Provides mobile business opportunities

Provides alternative to wiring

challenge of business mobility

Protecting against theft

Protecting wireless connections

Preventing viruses on a mobile device

Addressing privacy concerns with RFID and LBS

Sets with similar terms

CTS - Chapter 16

45 terms

franci_cineus3

MIS 2 Final- CH 16

30 terms

Transter15

Chapter 7

69 terms

sookzu

ISM 3011 Chapter 7.2

28 terms

Tipapenny59

Other sets by this creator

Draman Exam 2 ch 7

25 terms

Taylor_Constantino

Magloff EXAM 8/9/11

38 terms

Taylor_Constantino

exam 2 review magloff

45 terms

Taylor_Constantino

EXAM 2 QUINN CH 5-8

47 terms

Taylor_Constantino

Verified questions

COMPUTER SCIENCE

What are the two models of interprocess communication? What are the strengths and weaknesses of the two approaches?

Verified answer

COMPUTER SCIENCE

Which of the following is not a Python data type? a) int b) float c) rational d) string

Verified answer

COMPUTER SCIENCE

Which of the following is not a set? a. {0, 3, 1, 2}, b. {2, 5, -5}, c. {19}, d. {-9, -4, -7}, e. {1, 46, 1}.

Verified answer

COMPUTER SCIENCE

Given a directed graph G = (V, E), explain how to create another graph G' = (V, E') such that (a) G' has the same strongly connected components as G, (b) G' has the same component graph as G, and (c) E' is a small as possible. Describe a fast algorithm to compute G'.

Verified answer

Recommended textbook solutions

What is an encryption algorithm designed to protect wireless transmission data Quizlet

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

What is an encryption algorithm designed to protect wireless transmission data Quizlet

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

What is an encryption algorithm designed to protect wireless transmission data Quizlet

Introduction to Algorithms

3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen

726 solutions

What is an encryption algorithm designed to protect wireless transmission data Quizlet

Service Management: Operations, Strategy, and Information Technology

7th EditionJames Fitzsimmons, Mona Fitzsimmons

103 solutions

Other Quizlet sets

Exam 2- Anatomy Final study guide

35 terms

vngieamaya

Freedom of expression midterm 1

33 terms

nic_lubben

Quiz 4

10 terms

howardml8

Section 2: Temperature of Fresh Concrete

13 terms

jonette_ancheta

Related questions

QUESTION

Which service will allow you to quickly deploy your application into the AWS Cloud without having to build or launch the individual resources yourself?

3 answers

QUESTION

services have been defined to include

2 answers

QUESTION

It is used by the mail server itself to send and receive emails from all other mail servers.

2 answers

QUESTION

CHAPTER 6 - How does the text define "the cloud"?

3 answers

What is an encryption algorithm design to protect wireless transmission data?

Wired Equivalent Privacy (WEP) is an encryption algorithm designed to protect wireless transmission data. It has been demonstrated that WEP is somewhat insecure compared to WPA. Wi-Fi Protected Access (WPA) a wireless security protocol to protect Wi-Fi networks.

What is the main purpose of encrypting data quizlet?

Data encryption to secure data. Digital signing to confirm the integrity of the message and the authenticity of the sender. Key exchange to ensure keys are secure during transit.

Which of the following are the benefits of wireless networking?

Advantages of wireless networking.
Increased efficiency. Improved data communications lead to faster transfer of information within businesses and between partners and customers. ... .
Access and availability. ... .
Flexibility. ... .
Cost savings. ... .
New opportunities. ... .
Security. ... .
Installation problems. ... .
Coverage..

What is Bluetooth MIS quizlet?

What is Bluetooth? An omnidirectional wireless technology that provides limited-range voice and data transmission over the unlicensed 2.4-GHz frequency band, allowing connections with a wide variety of fixed and portable devices that normally would have to be cabled together.