Part 6, Location-based computing Flashcards

1
Q

what is geolocation

A

this is a location using longitude and latitude

Note:

this may not refer to your position but instead your internet connected devices position

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what self identifying information does IBeacon transmit

A

this transmits

  1. UUID
  2. major
  3. minor
  4. Tx power
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

​this becomes personal data when:

  1. It is used to identify you as an individual
  2. Tracking the location of a device to single out a single person
A

in which two cases does location data become personal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

in this use case of geofencing:

when the fence boundary is crossed by either entering or leaving then an action can occur

A

when implementing geofencing describe the use case of boundary crossing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

this is a localisation process used for locating the geolocation of an object

A

describe the term

Geolocating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

when IBeacon transmits this it could hold something like

the identifier of the individual beacon and so its location will be known

A

what information does the minor hold that Ibeacon transmits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

describe

latitude

A

these are imaginary lines parallel to the equator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

describe the term

Location based services

A

this is any service that relies on the location of the person to be useful. It will provide information based on the users current location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

these use coordinates that are written in degrees

A

what are the values of the coordinates used in the latitude longitude system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This is the act of creating a virtual fence in which actions can take place when crossing or being inside or outside the fence

A

describe what geofencing is

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

these are two synonymous terms used to describe a device or service that is aware of its location and uses this information to provide services on this positional information

A

describe what the terms

Location based computing / location aware computing

refer to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

this is data sent by the satellite and tells the receiver roughly where all other satellites are in orbit and which are most likely in its line of site

A

what is the

almanic data

sent by GPS satellites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

these are imaginary lines parallel to the equator

A

describe

latitude

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

describe what geofencing is

A

This is the act of creating a virtual fence in which actions can take place when crossing or being inside or outside the fence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

this transmits

  1. UUID
  2. major
  3. minor
  4. Tx power
A

what self identifying information does IBeacon transmit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is the

Ephemeris data

sent by GPS satellites

A

this is data sent by the satellite and tells the receiver where it is in orbit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

when the app receives a message from an IBeacon it will carry out an action such as speaking to a central database and then carrying out relevant actions based on whats in the database and what the app was programmed to do

A

what does the app listening for IBecaons do upon receiving a message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what is the

almanic data

sent by GPS satellites

A

this is data sent by the satellite and tells the receiver roughly where all other satellites are in orbit and which are most likely in its line of site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what is one protection that the data protection act 1998 provides

A

this states that if personal data is being collected about you then you must be informed about the data being collected and how it is processed as well as an option to opt out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

this is a location using longitude and latitude

Note:

this may not refer to your position but instead your internet connected devices position

A

what is geolocation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  1. A satellite sends out a constant code
  2. The receiver has this same code running in sync with the satellite
  3. When the receiver compares the code it recieves with the code it is running it will see a time delay
  4. The time delay is used to find its distance from the satellite since radio waves travel at a constant speed and the position of the satellite is known
  5. When 3 distances from a satellite is known then its possible for the receiver to trilaterate its position
  6. A fourth satellite may be used for precision since it should meet the same points as all the others. If it does not then the receiver re syncs its own clock until all points meet
A

in 6 steps give an overview of how

GPS

works

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

describe the term

Geolocating

A

this is a localisation process used for locating the geolocation of an object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

what two modes might geofencing be used in

A

this may be used in the following to modes:

1. boundary crossing

2. restrictions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

what is trackR and tile and what do they both offer

A

these are both commercial services

what they offer

  1. they allow you to attach a bluetooth LE tag to an object.
  2. the tag then transmits its identifier
  3. an application will listen out for the tags transmissions
  4. when the app receives a transmission it will log the identifier and the location of the tag using GPS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
what is **trilateration**
When applied to finding the location of a receiver this works by knowing your distance from 3 or more senders and then determining your location by finding the point where all the signals meet
26
this would not be classed as personal data if the data was aggregated with many other peoples data such a situation would be if you were tracking a persons visit to different stores
when is the **Tracking the location of a device to single out a single person** not classed as personal data
27
describe what the terms **Location based computing / location aware computing** refer to
these are two synonymous terms used to describe a device or service that is aware of its location and uses this information to provide services on this positional information
28
this is any service that relies on the location of the person to be useful. It will provide information based on the users current location
describe the term **Location based services**
29
what information does the **Tx power** hold that Ibeacon transmits
when IBeacon transmits this it is the given power when you are a distance of 1 metre away. This will be hard coded upon install
30
while implementing geofencing describe the use case of placing ## Footnote **restrictions**
when geofencing is used for this purpose: ## Footnote **restrictions could be put in place depending on whether you are inside or outside the fence**
31
these are imaginary lines running in parallel from the north pole to the south pole
describe **longitude**
32
this is the point where the Greenwich meridian and equator cross, it can be written as 0,0
in terms of longitude and latitude where is the **origin** and how is it written
33
what is a use case of **trackR** and **tile**
one use case of these commercial services would be: to attach a tag to your keys. If anyone else was using the relevant application then you would be able to locate the last location of your keys
34
what information does the **UUID** hold that Ibeacon transmits
when IBeacon transmits this it could hold something like a name brand such as coca cola
35
in terms of longitude and latitude where is the **origin** and how is it written
this is the point where the Greenwich meridian and equator cross, it can be written as 0,0
36
when IBeacon transmits this it could hold something like the name of the store that the beacon is in
what information does the **major** hold that Ibeacon transmits
37
in 6 steps give an overview of how **GPS** works
1. A satellite sends out a constant code 2. The receiver has this same code running in sync with the satellite 3. When the receiver compares the code it recieves with the code it is running it will see a time delay 4. The time delay is used to find its distance from the satellite since radio waves travel at a constant speed and the position of the satellite is known 5. When 3 distances from a satellite is known then its possible for the receiver to trilaterate its position 6. A fourth satellite may be used for precision since it should meet the same points as all the others. If it does not then the receiver re syncs its own clock until all points meet
38
when implementing geofencing describe the use case of **boundary crossing**
in this use case of geofencing: ## Footnote **when the fence boundary is crossed by either entering or leaving then an action can occur**
39
Announced by apple in 2013 iBeacon is a protocol built for bluetooth low energy devices. Apps will listen out for iBeacons and act accordingly
what is ## Footnote **IBeacon**
40
this states that if personal data is being collected about you then you must be informed about the data being collected and how it is processed as well as an option to opt out
what is one protection that the **data protection act 1998** provides
41
what are the values of the coordinates used in the latitude longitude system
these use coordinates that are written in degrees (degrees of the greenwich meridian line, degrees of the equator)
42
one use case of these commercial services would be: to attach a tag to your keys. If anyone else was using the relevant application then you would be able to locate the last location of your keys
what is a use case of **trackR** and **tile**
43
describe **longitude**
these are imaginary lines running in parallel from the north pole to the south pole
44
this refers to the process of encoding a location into a human readable format such as ‘the shard’ from a geolocation
describe the term ## Footnote **Reverse geocoding**
45
when IBeacon transmits this it is the given power when you are a distance of 1 metre away. This will be hard coded upon install
what information does the **Tx power** hold that Ibeacon transmits
46
this may be used in the following to modes: 1**. boundary crossing** **2. restrictions**
what two modes might **geofencing** be used in
47
when is the **Tracking the location of a device to single out a single person** not classed as personal data
this would not be classed as personal data if the data was aggregated with many other peoples data such a situation would be if you were tracking a persons visit to different stores
48
describe the term localisation
this is a term used to describe the process used in which a location is found _some examples might be_ 1. using GPS 2. using WiFi 3. using cell towers / base stations 4. using bluetooth beacons
49
describe the term ## Footnote **Reverse geocoding**
this refers to the process of encoding a location into a human readable format such as ‘the shard’ from a geolocation
50
in which two cases does **location data** become personal data
​this becomes personal data when: ## Footnote 1. It is used to identify you as an individual 2. Tracking the location of a device to single out a single person
51
this refers to encoding a location from information such as an address into a geolocation
describe the term ## Footnote **Geocoding**
52
when geofencing is used for this purpose: ## Footnote **restrictions could be put in place depending on whether you are inside or outside the fence**
while implementing geofencing describe the use case of placing ## Footnote **restrictions**
53
what is ## Footnote **IBeacon**
Announced by apple in 2013 iBeacon is a protocol built for bluetooth low energy devices. Apps will listen out for iBeacons and act accordingly
54
describe the term ## Footnote **Geocoding**
this refers to encoding a location from information such as an address into a geolocation
55
what information does the **minor** hold that Ibeacon transmits
when IBeacon transmits this it could hold something like the identifier of the individual beacon and so its location will be known
56
what information does the **major** hold that Ibeacon transmits
when IBeacon transmits this it could hold something like the name of the store that the beacon is in
57
what does the app listening for IBecaons do upon receiving a message
when the app receives a message from an IBeacon it will carry out an action such as speaking to a central database and then carrying out relevant actions based on whats in the database and what the app was programmed to do
58
this is data sent by the satellite and tells the receiver where it is in orbit
what is the **Ephemeris data** sent by GPS satellites
59
when IBeacon transmits this it could hold something like a name brand such as coca cola
what information does the **UUID** hold that Ibeacon transmits
60
these are both commercial services _what they offer_ 1. they allow you to attach a bluetooth LE tag to an object. 2. the tag then transmits its identifier 3. an application will listen out for the tags transmissions 4. when the app receives a transmission it will log the identifier and the location of the tag using GPS
what is trackR and tile and what do they both offer
61
this is a term used to describe the process used in which a location is found _some examples might be_ 1. using GPS 2. using WiFi 3. using cell towers / base stations 4. using bluetooth beacons
describe the term localisation
62
When applied to finding the location of a receiver this works by knowing your distance from 3 or more senders and then determining your location by finding the point where all the signals meet
what is **trilateration**
63
describe the difference between trilateration and triangulation
1. trilateration is used to find your position using distances from known objects 2. triangulation is used to find your your position using angles (bearings) from known objects