An analyst publishes a paper on cybersecurity. In that paper, he includes several
pages of a report written by another author, but he does not attribute those
pages to the other author.
Which type of law prohibits this kind of unethical behavior?
Patent
Trade Secret
Trademark
Copyright - ANSWERS-Copyright
Which communication technology has a range of approximately 30 feet and
allows smartphones, tablets, and handheld product scanner devices to
communicate with a network?
GPS Cellular
Bluetooth
Wi-Fi - ANSWERS-Bluetooth
What is an example of an Internet of Things (IoT) device?
,A wireless computer keyboard connected to a laptop
A light bulb that can be turned on or off with a smartphone
A tire-pressure indicator displayed on a car dashboard
A motion sensor that turns a light on when movement is detected - ANSWERS-A
light bulb that can be turned on or off with a smartphone
Where does IoT data collection begin?
The cloud
The edge
The database
The internet - ANSWERS-The edge
Which type of technology can be used to monitor every product in a warehouse
to enable real-time inventory tracking and updates?
WAN
Operations management system
RFID
Mobile utility application - ANSWERS-RFID
A homeowner arrives at home in the evening. A timer has turned on an exterior
light before her arrival, and the surveillance camera records her walking to the
, door. She unlocks the door using a mobile app, and a motion sensor turns on an
interior light when she enters the house.
What is an example of Internet of Things (IoT) technology in this scenario?
The interior light
The exterior light
The door lock
The camera - ANSWERS-The door lock
How does the healthcare industry use Internet of Things (IoT) devices?
To track ambulance locations and movements
TO research public health history
To monitor patient's heart rate and oxygen levels
To access electronic medical records - ANSWERS-To monitor patient's heart rate
and oxygen levels
A large automobile maker has added sensors to its assembly line equipment to
alert managers to manufacturing anomalies via a mobile application (app) on
their smartphones. This Internet of Things (IoT) system connects proprietary
manufacturing components.
What is the greatest risk created by incorporating this IoT system?