Question: QUESTION 16 Drones as commercial tools: Drones are classified according to their operations in : Raw materials; manufacturing, warehousing, and supply distribution; Air, land, cyberspace

QUESTION 16

  1. Drones as commercial tools: Drones are classified according to their operations in :

Raw materials; manufacturing, warehousing, and supply distribution;

Air, land, cyberspace and virtual reality;

Air, land, subsea and space;

Administration, logistics, shopping aid and supply distribution;

10 points

QUESTION 17

  1. GPS technologies include:

AIS-tracking unit; VTS logger (for data-pushing); and GPS Transponders (Data Pullers).

VHS-tracking unit; GPS logger (for data-pushing); and GPS Transponders (Data Pullers).

GPS-tracking unit; GPS logger (for data-pushing); and GPS Transponders (Data Pullers).

AIS-tracking unit; VTS logger (for data-pushing); and VHS Transponders (Data Pullers).

10 points

QUESTION 18

  1. Cloud-Computing Security and Cyber Threats: In brief, cloud security controls relate to:

Defect controls; Penetrating action; Threat sharing and Risk denial;

Deterrent controls; Penetrating action; Threat sharing and Corrective action;

Deficiency controls; Preventive action; threat identification and Concluding action;

Deterrent controls; Preventive action; threat identification and Corrective action;

10 points

QUESTION 19

  1. RFID Technologies are tools used in automatic identification and data capture (AIDC). They DO NOT include (Choose one):

Acceleration sensors and cargo pressure sensors for compressed gases, liquids or other hazmat cargoes.

Poor cargo quality notification, if the cargo was already of poor quality when the RFIDs were installed.

Inclination sensors and Shock and vibration sensors;

Temperature, light and humidity sensors;

10 points

QUESTION 20

  1. Smart container technologies: Smart container sensors can NOT identify (choose one):

Carriage of persons or animals in the containers;

Carriage of undeclared Hazmat;

Intrusion cracks or openings of the container in areas AWAY from the RFID.

Door tampering; Cracks or openings on the container;

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related General Management Questions!