Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
20 Cards in this Set
- Front
- Back
_____________ tags are read-only.
|
class 0
|
|
1-bit tags _____________.
|
do not carry information
|
|
One of the main characteristics of sensory tags is ___________________.
|
they can capture information about environment conditions
|
|
What is the purpose of an interrogator?
|
to read information from the tags
|
|
RFID middleware is used to ___________________.
|
convert the data read from the tags into format that is compatible with that of the business application
|
|
Reader antennas are designed for the specific application. True or False?
|
True
|
|
The orientation of the tag's antenna usually does not affect readability. True or False?
|
True
|
|
RFID is not expected to have a major impact on network traffic? True or False?
|
False
|
|
UHF passive tags use a variation of amplitude and phase modulation. True or False?
|
False, they use a variation of amplitude shift keying and phase shift keying.
|
|
A reader uses a method called coupling to connect with the corporate network. True or False?
|
False
|
|
To power passive tags the reader transmits _______________.
|
continuous wave or CW
|
|
To modulate a response signal using backscatter a tag has to _________________.
|
Change the electrical properties or reflection coefficient of its antenna.
|
|
Interrogators and tags ____________ simultaneously. This is known as ____________ communications.
|
do not transmit; half-duplex
|
|
The minimum amount of information stored in a smart label is _________________.
|
the EPC, CRC, and the destroy password.
|
|
In a ________________ an interrogator will assume that there was a collision when ______________.
|
dense reader environment; it does not receive responses from any tags.
|
|
Which transmission techniques are included in the EPCglobal standards?
|
Basic ASK/PSK modulation, FHSS, DSSS.
|
|
List three specific challenges associated with RFID system implementation.
|
Increased network traffic, increased storage requirements, network availability, security.
|
|
Which methods can be used to temporarily or permanently disable a tag?
|
Physical destruction, the kill command, locking, blocker tags.
|
|
Explain the mechanism for handling tag collisions in HF.
|
STAC protocol.
|
|
List several potential application for RFID that were not discussed in the chapter's text.
|
people location within a building, parking lot access cards, laboratory experiment tracking, timber grade monitoring, permanent identification of valuable items such as art, security guard monitoring (rounds monitoring), etc.
|