207 what are the various types of motion detectors a

Info icon This preview shows pages 2–5. Sign up to view the full content.

View Full Document Right Arrow Icon
207 What are the various types of motion detectors? A. Wave patterns and radar B. Audio, wave patterns, and capacitance C. Infrared and capacitance
Image of page 2

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
D. Audio and capacitance Answer: B See Chapter 11. Audio detectors are sensitive, passive microphones. Wave-pattern motion detectors emit wave patterns and note any changes in return signals, indicating moving objects. Capacitance can detect motion only a few inches in front of the detector. 208 Which of the following is NOT a characteristic of passive electronic access cards? A. They contain batteries that must be changed or charged. B. They're powered by the RF field transmitted by the reader. C. They transmit at a frequency different from the frequency emitted by the reader. D. They don't need to touch the reader, instead working by proximity. Answer: A See Chapter 11. Passive electronic cards have no batteries because they’re powered by the radio frequency (RF) field emitted by the reader. 209 Which of the following is NOT a characteristic of active electronic access cards? A. They contain batteries that must be changed or charged. B. They’re powered by the RF field transmitted by the reader. C. They transmit at a frequency different from the frequency emitted by the reader. D. They don't need to touch the reader, instead working by proximity. Answer: B See Chapter 11. Active electronic access cards have a power supply and aren’t powered by the reader’s radio frequency (RF) transmitter. 210 Which of the following is NOT an advantage of cipher locks over access-card locks? A. Cipher locks are independent and work even when centralized systems can’t. B. A cipher lock may be more cost-effective than an access-card lock for one door. C. Cipher locks offer better centralized control than do access-card locks.
Image of page 3
D. Cipher locks are self-contained, requiring no external power or wiring. Answer: C See Chapter 11. Cipher locks usually offer no centralized control at all. 211 Memory that's used to store computer instructions and data is known as: A. UART B. SIMM C. Cache D. ROM Answer: C See Chapter 12. Cache memory holds instructions and data that are likely to be frequently accessed. Cache memory is faster than RAM, so it can contribute to faster performance. 212 Firmware is generally stored on A. ROM or EPROM B. Tape C. RAM D. Any removable media Answer: A See Chapter 12. Firmware is software that's seldom changed. Firmware is generally used to control lower-level functions in computer hardware and embedded systems. 213 What's the purpose of memory protection? A. It protects memory from malicious code. B. It prevents a program from being able to access memory used by another program. C. Memory protection is another term used to describe virtual memory backing store. D. It assures that hardware refresh is frequent enough to maintain memory integrity.
Image of page 4

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern