• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back
_____________ tags are read-only.
class 0
1-bit tags _____________.
do not carry information
One of the main characteristics of sensory tags is ___________________.
they can capture information about environment conditions
What is the purpose of an interrogator?
to read information from the tags
RFID middleware is used to ___________________.
convert the data read from the tags into format that is compatible with that of the business application
Reader antennas are designed for the specific application. True or False?
True
The orientation of the tag's antenna usually does not affect readability. True or False?
True
RFID is not expected to have a major impact on network traffic? True or False?
False
UHF passive tags use a variation of amplitude and phase modulation. True or False?
False, they use a variation of amplitude shift keying and phase shift keying.
A reader uses a method called coupling to connect with the corporate network. True or False?
False
To power passive tags the reader transmits _______________.
continuous wave or CW
To modulate a response signal using backscatter a tag has to _________________.
Change the electrical properties or reflection coefficient of its antenna.
Interrogators and tags ____________ simultaneously. This is known as ____________ communications.
do not transmit; half-duplex
The minimum amount of information stored in a smart label is _________________.
the EPC, CRC, and the destroy password.
In a ________________ an interrogator will assume that there was a collision when ______________.
dense reader environment; it does not receive responses from any tags.
Which transmission techniques are included in the EPCglobal standards?
Basic ASK/PSK modulation, FHSS, DSSS.
List three specific challenges associated with RFID system implementation.
Increased network traffic, increased storage requirements, network availability, security.
Which methods can be used to temporarily or permanently disable a tag?
Physical destruction, the kill command, locking, blocker tags.
Explain the mechanism for handling tag collisions in HF.
STAC protocol.
List several potential application for RFID that were not discussed in the chapter's text.
people location within a building, parking lot access cards, laboratory experiment tracking, timber grade monitoring, permanent identification of valuable items such as art, security guard monitoring (rounds monitoring), etc.