logo - 刷刷题
下载APP
【单选题】

Thanks to the GPS, the apps on your phone have long been able to determine your general location. But what if they could do so with enough precision that a supermarket, say, could tempt you with digital coupons depending on whether you were hovering near the white bread or the bagels It may sound far-fetched, but there"s a good chance the technology is already built into your iPhone or Android device. All it takes for retailers to tap into it are small, inexpensive transmitters called beacons. Here"s how it works: using Bluetooth technology, handsets can pinpoint their position to within as little as 2cm by receiving signals from the beacons stores install. Apple"s version of the concept is called iBeacon; it"s in use at its own stores and is being tested by Macy"s, American Eagle, Safeway, the National Football League and Major League Baseball. Companies can then use your location to pelt(连续攻击)you with special offers or simply monitor your movements. But just as with GPS, they won"t see you unless you"ve installed their apps and granted them access. By melding your physical position with facts they"ve already collected about you from rewards programs, brick-and-mortar businesses can finally get the potentially profitable insight into your shopping habits that online merchants now take for granted. The possibilities go beyond coupons. PayPal is readying a beacon that will let consumers pay for goods without swiping a card or removing a phone from their pocket. Doug Thompson of industry site Beekn. net predicts the technology will become an everyday reality by year"s end. But don"t look for stores or venues to call attention to the devices. " People won"t know these beacons are there," he says. "They"ll just know their app has suddenly become smarter. " The phrase " brick-and-mortar businesses"(Para 3, Line 4)is relative and closest to______.

A.
rewards programs
B.
physical stores
C.
profitable insight
D.
shopping habits
举报
题目标签:连续攻击攻击
参考答案:
参考解析:
.
刷刷题刷刷变学霸
举一反三

【单选题】DDOS攻击是利用_____进行攻击

A.
其他网络
B.
通讯握手过程问题
C.
中间代理
D.
以上都不对

【多选题】51%攻击无法做到( )

A.
修改他人的交易记录
B.
凭空产生比特币
C.
改变每区块的比特币发行数量
D.
阻止交易发出

【多选题】WIDS攻击检测包含()。

A.
Flood 攻击检测
B.
Weak IV攻击检测
C.
Spoof 攻击检测
D.
微波炉干扰检测

【单选题】无法有效防御DDoS攻击。

A.
根据IP地址对数据包进行过滤
B.
为系统访问提供更高级别的身份认证
C.
安装防病毒软件
D.
使用工具软件检测不正常的高流量