List advantages and name a few disadvantages of Bluetooth technology.

What will be an ideal response?


Advantages of using Bluetooth technology include the following:• If a device has Bluetooth capability, using Bluetooth technology is free.• Although Bluetooth devices need to be near each other, they do not have to be in the same room, within the same line of sight, or facing each other.• Bluetooth devices typically require low processing power and use little energy, so using Bluetooth technology will not drain a device's battery.• Establishing a wireless Bluetooth connection is easy. With most Bluetooth-enabled devices, you simply click a Bluetooth shortcut or icon to enable Bluetooth. Once enabled, the devices usually immediately recognize a connection. (Before initial use, you may need to pair two Bluetooth devices so that they can communicate with each other. Read How To 3-1 in Module 3 for instructions about pairing Bluetooth devices.)• Bluetooth connections have low security risks. If you want to secure a Bluetooth channel, you would define an identification number for the connection and create a PIN that you can distribute as needed. If the secured computer or device detects an unknown Bluetooth connection, you can choose to accept or reject it. Read Secure IT 10-2 to learn about security risks associated with using Bluetooth technology.• Bluetooth technology is standardized globally, meaning it can be used to connect devices that are not the same make or model.• Bluetooth connections have little risk of interference with other wireless networks because the strength of the wireless signals is weak and because of frequency hopping, which changes frequency channels periodically.?One disadvantage of Bluetooth technology is its low bandwidth. Because of its slow data transfer speeds, Bluetooth technology is not an ideal solution for replacing a LAN. Because Bluetooth-enabled mobile payment services are new, security risks may exist. Most agree that the advantages of Bluetooth technology far outweigh the disadvantages. 

Computer Science & Information Technology

You might also like to view...

The SSE-CMM assessment serves a similar purpose as the CMMI's security capability evaluation.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

On a form or report, the names of fields displays in a(n) ________ control

Fill in the blank(s) with correct word

Computer Science & Information Technology

An ellipsis following a command name in a command group indicates that a ________ will display when you click the command

A) file explorer window B) new tab C) dialog box D) new command screen

Computer Science & Information Technology

When defining a variable to be used to hold values that the user enters in a TextBox object, the declaration statement should have ____ at the end of the statement.

A. As Char B. As Char Type C. As String D. As String Type

Computer Science & Information Technology