Radio Frequency Identification (RFID)
Give this one a try later!
Uses electronic tags and labels to identify objects wirelessly over short
distances
Relational integrity constraint
,Give this one a try later!
rules that enforce basic and fundamental information-based constraints
(Can't create an order for a customer that doesn't exist)
Broadband:
Give this one a try later!
A highspeed internet connection that is always connected
Business critical integrity constraint
Give this one a try later!
enforce business rules vital to an organization's success and often require
more insight and knowledge than relational integrity constraints (Grocery
store dairy returns)
Which is an example of Biometrics?
Give this one a try later!
, A. Password
B. Keys
C. Voice Recognition system
D. Passcode
C
RFID tag:
Give this one a try later!
an electronic identification device that is made up of a chip and antenna
Why are systems vulnerable?
Give this one a try later!
- Hardware problems
- Software problems
- Disasters
- Use of networks, computers outside of firm's control
Passive RFID
Give this one a try later!
Give this one a try later!
Uses electronic tags and labels to identify objects wirelessly over short
distances
Relational integrity constraint
,Give this one a try later!
rules that enforce basic and fundamental information-based constraints
(Can't create an order for a customer that doesn't exist)
Broadband:
Give this one a try later!
A highspeed internet connection that is always connected
Business critical integrity constraint
Give this one a try later!
enforce business rules vital to an organization's success and often require
more insight and knowledge than relational integrity constraints (Grocery
store dairy returns)
Which is an example of Biometrics?
Give this one a try later!
, A. Password
B. Keys
C. Voice Recognition system
D. Passcode
C
RFID tag:
Give this one a try later!
an electronic identification device that is made up of a chip and antenna
Why are systems vulnerable?
Give this one a try later!
- Hardware problems
- Software problems
- Disasters
- Use of networks, computers outside of firm's control
Passive RFID
Give this one a try later!