List advantages and name a few disadvantages of Bluetooth technology.

What will be an ideal response?

Advantages of using Bluetooth technology include the following:• If a device has Bluetooth capability, using Bluetooth technology is free.• Although Bluetooth devices need to be near each other, they do not have to be in the same room, within the same line of sight, or facing each other.• Bluetooth devices typically require low processing power and use little energy, so using Bluetooth technology will not drain a device's battery.• Establishing a wireless Bluetooth connection is easy. With most Bluetooth-enabled devices, you simply click a Bluetooth shortcut or icon to enable Bluetooth. Once enabled, the devices usually immediately recognize a connection. (Before initial use, you may need to pair two Bluetooth devices so that they can communicate with each other. Read How To 3-1 in Module 3 for instructions about pairing Bluetooth devices.)• Bluetooth connections have low security risks. If you want to secure a Bluetooth channel, you would define an identification number for the connection and create a PIN that you can distribute as needed. If the secured computer or device detects an unknown Bluetooth connection, you can choose to accept or reject it. Read Secure IT 10-2 to learn about security risks associated with using Bluetooth technology.• Bluetooth technology is standardized globally, meaning it can be used to connect devices that are not the same make or model.• Bluetooth connections have little risk of interference with other wireless networks because the strength of the wireless signals is weak and because of frequency hopping, which changes frequency channels periodically.?One disadvantage of Bluetooth technology is its low bandwidth. Because of its slow data transfer speeds, Bluetooth technology is not an ideal solution for replacing a LAN. Because Bluetooth-enabled mobile payment services are new, security risks may exist. Most agree that the advantages of Bluetooth technology far outweigh the disadvantages. 

Computer Science & Information Technology

You might also like to view...

Small programs known as ________ are used to coordinate communication between the computer and peripheral devices

A) system restore B) drivers C) administrators D) CLIs

Computer Science & Information Technology

Communications for which you specify one or more recipients would be classified as public.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology