Wednesday, April 8, 2009

WEEK SIX QUESTIONS WIRELESS

Chapter 7 Questions


1. Identify common wireless devices and their application to business
· Mobile telephones: phone calls and text messaging can be made on the move, almost anywhere. Also internet and email access is possible with most new mobile phones. Internet and email access is crucial to any business.
· Digital Camera: photos can be taken, edited, sent, uploaded on the internet, deleted and developed using digital cameras. Applies to businesses as photos can be very useful for most.
· Digital music players: can play music and more recently videos. However some such as the Apple Ipod can be used to carry information which is relevant to businesses.
· Digital organizers: have been common for years, however some now have internet and email access, which is very useful to businesses.
· Laptop computers: common for years, however now thanks to the capabilities of Wi-Fi, internet and email access is easy and accessible in many places, making the duties of business personnel easier to carry out.

A diagram of major wireless devices, connecting to a server:




Photo: Compliments of CityWatch, accessed at: http://www.citywatch.com/images/deviceDiagram400b.jpg


2. Describe the various types and general characteristics of wireless transmission media/technologies - microwave, satellite, infrared and radio waves.
· Microwave transmission systems: uses 226 microwaves for high-volume, long-distance, point-to-point (line-of-sight) communication. This means transmitter and receiver must be in view of each other. Has a high-bandwidth and is inexpensive.
· Satellite transmission: uses communication satellites for broadcast communications. Has a high bandwidth and large cover area, however is very expensive. Line of sight must be unobstructed, signals experience delays and security is an issue, therefore encryption must be used.
· Radio wave frequencies used to send data directly between transmitters and receivers. This type of transmission has a high bandwidth, signals can pass through walls, and is inexpensive and easy to install. However electrical interference is an issue, and the signals must be encrypted to avoid snooping.
· Infrared uses a red light, not commonly visible to human eyes. It has a low-medium bandwidth, and used only for short distances. It must use a direct line of sight.

A diagram portraying a wireless transmission:



Photo: Compliments of SemCo Enterprises, accessed at: http://www.semcoenterprises.com/upload/wysiwyg/wireless.gif


3. What is bluetooth/how is it used?
Chip technology that enables short-range-connection (data and voice) between wireless devices. It is used to create small personal area networks.



4. What are WLAN's, Wi-Fi, WWAN's, 3G?
WLAN: Wireless local area network: a computer network in a limited geographical area that uses wireless transmission for communication.
Wi-Fi: Wireless fidelity: a set of standards for wireless local area networks based on the IEEE 802.11 standard.
WWAN: wide-area wireless networks: connects users to each other and to the internet over geographically dispersed distances.
3G: third generation: uses digital signals and can transmit voice and data up to 384 Kbps when the device is moving at a walking pace, 128 Kbps when moving in a car, and up to 2Mbps when the device is in a fixed location. It supports video, Web browsing and instant messaging.



5. What are the drivers of mobile computing and mobile commerce
Mobile computing was designed for workers who travel outside the boundaries of their organisations or for anyone traveling outside his or her home. As long as there is a need to move, mobile computing and commerce will be driven.



6. Explain the nature of RFID
Radio Frequency Identification technology: a wireless technology that allows manufacturers to attach tags with antennas and computer chips on goods and then track their movement through radio signals.

E.g. an E-tag uses Radio frequency identification technology:


Photo: Compliments of Radioactive Networks, accessed at: www.radio-active.net.au/web/technology/etag.html

WEEK FIVE QUESTIONS

1. Provide an IT example that relates to the ethical issues for the ideas of privacy, accuracy, property, and accessibility.
Privacy: electronic surveillance, the tracking of people’s activities with the aid of computers
Accuracy: identity theft
Property: software piracy
Accessibility: hacking

2. What are the 5 general types of IT threats? Provide an example for each one
Three main:
Human error: poor password selection and use.
Natural disasters: earthquake damaging servers.
Malicious activity: hackers that log into system and destroy data
Another two:
Malicious code: a virus
Management negligence: managers fail to have a data recovery system in place

3. Describe/discuss three types of software attack and a problem that may result from them
A denial of service: the front end of the company’s internet page is flooded with a ‘ping of death’; the site is then held for ransom. The attackers keep flooding the page until some amount of money is paid.
Viruses: a type of malicious code, more recently viruses have been used to steal information, therefore a loss of information is usually the result.
Phishing: using fake sender personal details an attacker disguises themselves as representatives of a service provider and in an email asks for a person’s password and username. If successful the victim faces the problem of a criminal having access to their account.

4. Describe the four major types of security controls in relation to protecting information systems.
Physical controls: prevent unauthorized individuals from gaining access to a company’s facilities.
Access controls: restrict unauthorised individuals from using information resources.
Communications controls: secure the movement of data across networks.
Application controls: security counter measures that protect specific applications.

5. What is information system auditing?
The examination of information systems, their inputs, outputs and processing. System auditing is going through servers to ensure that who views or accesses the files is actually authorised to do so.

6. What is the difference between authentication and authorization and why are they important to e-Commerce/give an example of their relevance to e-Commerce
Authentication: is the system of knowing who the person is. Knowing a password is an authentication, having a proximity code and biometric scanners such as thumb printers all authenticate usage.
Authorisation: a process that determines which actions, rights, or privileges the person has, based on verified identity.
The difference is that authenticity is determined by the identity of a person, and authorisation relies on the status of the person.
They are both relevant to e-commerce, as they ensure that only the correct people access specific information. If an unauthorized person has access to information they shouldn’t, this can be potentially damaging to a business.

WEEK FOUR QUESTIONS

1. What are main differences/distinction between system software and application software?
System software is the operating system such as Windows XP, it controls the computer, and is the link between hardware and software.
Application software is specific to certain functions, such as Microsoft Word.





Photo: compliments of Microsoft, accessed at: http://office-training.co.uk/microsoft_word_2007.gif


2. What are the two main types of system software?
System Control Programs: part of the operating system which controls the hardware, software, and data resources of a computer system.
System support programs/Utilities software: supports the operations, management, and users of a computer system by providing a variety of support services.


3. What is the difference between proprietary and open source software? What considerations should be made when a business selects either software.
Proprietary software is software bought with a llicense to use it. Such as Microsoft products, these products need a license to use, and/or change software code.
Open source software is when the license is free. Free to use, and free to change software code.
Proprietary costs money and license is needed, however it comes with detailed support, customer care and response. Open source software is not so good when remedying problems. Businesses should consider whether they wish to spend money on software, and whether or not there is someone capable of fixing any possible problems.


4. What are some of the legal issues involved in acquiring and using software in most businesses/organizations?
When using proprietary software, a business or organisation must pay for license to use it, and they cannot distribute it.


5. What is meant by SaaS? Name some examples of this software
SaaS means Software-as-a-Service: a method of delivering software in which a vendor hosts the applications, and customers access them over a network and pay only for using them.
E.g.

Sales force
Microsoft live
Google docs (however free to use)


Photo: Compliments of Google, accessed at: http://gurukreatif.files.wordpress.com/2009/02/google-docs-good-logo.jpg

Tuesday, April 7, 2009

WEEK THREE QUESTIONS



1. What is computer hardware and what are the major hardware components?
Hardware refers to the physical equipment used for the input, processing, output and storage activities of a computer system. Its major components are:
— Power supply
— Video card
— Sound Card
— Central processing unit (CPU)
— Primary storage
— Secondary storage
— Input technologies
— Output technologies
— Communication technologies



Photo: Compliments of Raj, accessed at: http://www.rajgovt.org/Computers-IT/Computer-Hardware/images/case[1].jpg



2. What is Moore's Law/what does it mean in relation to computers.
Founder of Intel, he predicted that microprocessor complexity would double every two years. This means that the speed of computers will double, and processing chips would get smaller and smaller.

3. In basic terms, describe how a microprocessor functions.
A microprocessor accepts input, processes the data and stores it till needed. Then retrieves it and processes it again to be used.

4. What factors determine the speed of the microprocessor?
Clock speed – cycles per second, usually in GHZ. 2 GHZ means 2 billion times per second.
Word length – refers to how many characters the PC can read in one clock cycle. Bit system: 32 bits = 32 bits of data
Bus width – the amount of data that can travel at the same time
Physical design of chip


A microprocessor's design is similar to:

Photo: Compliments of 'How Stuff Works', accessed at:http://static.howstuffworks.com/gif/microprocessor1.gif


5. What are the four main types of primary storage.
Random Access memory (RAM): more ram means more programs the computer can run.
Registers: stores extremely limited amounts of instructions and data only immediately before and after processing
Cache memory: where the computer can store blocks of data used more often
Read-only memory (ROM): certain critical instructions are safeguarded; the storage is nonvolatile and retains the instructions when the power to the computer is turned off.

6. What are the main types of secondary storage?
Magnetic media such as: hard disks and tapes
Optical media such as: CD-ROM and DVD
Solid state media such as: flash drives and Apple Ipods

7. How does primary storage differ from secondary storage in terms of speed cost and capacity?
Primary storage is faster but more costly, and secondary storage is slower yet more cost efficient.

8. What are enterprise storage systems?
An independent, external system with intelligence that includes two or more storage devices. There are three types of enterprise storage systems: Redundant Arrays of Independent Disks (RAID), Storage Area Network (SAN) and Network Attached Storage (NAS).

9. Distinguish between human data input devices and source data automation.
Human data input devices: rely on humans to input data, and prone to human error. Such as: keyboards, mouse
Source data automation: devices which contribute data with little human intervention. Such as barcode scanners, these are far more accurate and faster.

10. What is one new technology that will change how we do things? You need to do some research
Printable electronics: by using polymer “ink”, from an inkjet print head, innovator’s have created electronics that are less wasteful, flexible and very cheap. The technology can be used for a large variety of things, examples are wallpaper with changing designs, bulb less lamps and flexible e-book readers. The technology makes access to information even more flexible.
A video demonstrating some of the technology can be found at:
http://www.newscientist.com/article/dn16831-innovation-a-licence-to-print-gadgets.html

WEEK TWO QUESTIONS

Chapter 1


Q1. What are the characteristics of the modern business environment?
The modern business environment is extremely dynamic, and subject to rapid change. The characteristics are:
· Technological advances leading to:
o Intensifying competition and threats
o Easier transport and communications
· Political and legal factors. Laws and regulations impact significantly on businesses
· Economic factors.
· Social and culturally factors.

Q2. What is meant by a web-based, global platform, what does it provide, and how has it affected business?
A platform that uses the functioning of the World Wide Web, to enable individuals to connect, compute, communicate, collaborate, and compare everywhere and anywhere, anytime and all the time; to access limitless amounts of information, services, and entertainment; to exchange knowledge; and to produce and sell goods and services. With these capabilities, businesses are enable to globalise, with no regard to geography, time, distance and even language barriers.

Q3. What are the main pressures that characterize the modern global business environment?
Market pressures: generated by global economy and strong competition, the changing nature of the workforce, and powerful customers.
Technology pressures: refers to technological innovation and obsolescence and information overload.
Social/ Political/ Legal pressures: includes social responsibility, government regulation/deregulation, spending for social programs, spending to protect against terrorism and ethics.

Q4. What are/discuss some of the common, IT oriented organizational responses to these pressures?
Strategic systems: are being built to know what their customers and competitions are. Knowing the two enables them to increase their market share and/or profits.
Customer focus: attempts to provide superb customer service, to retain the customers rather than lose them.
Make-to-order: strategy of producing customized products and services.
Mass customization: produces a large quantity of items, but customizes them to fit the desires of each customer.
E-Business and E-commerce: essential strategy for companies competing in today’s business environment.

Q5. How are IT architecture and IT infrastructure are interrelated.
IT Architecture: is a high-level map or plan of the information assets in an organization. The information that simply runs an organisation
IT Infrastructure: consists of the actual implementation of the plan that will provide for effective information systems, including IT components, hardware, IT services, and IT personnel that support the entire organization.
The two are interrelated by people, people design and build the plan, others relate to it by constructing the facilities according to the plan.

Q6. Is the Internet an infrastructure, an architecture, or an application program? or something else. Why?
The Internet is consist of the use of all three. It uses infrastructure such as servers and cable to run it. Architecture enables the infrastructure to work sufficiently in spreading information. Applications are required to run the Internet, such as Microsoft Internet Explorer and Mozilla Firefox.


Chapter 2


Q1. What is the difference between an 'application' and a computer-based information systems?
Applications are one or more pieces of computer software put together. However, a Computer based information systems is a broader term relating to software, hardware and processors used in relation with each other to complete tasks.

Q2. What are strategic information systems?
Any system that helps an organisation gain a competitive advantage, by supporting its strategic goals and/or increasing performance and productivity.

Q3. According to Porter, what are the five forces that could endanger a firm’s position in its industry or marketplaces?
Threat of new competitors: the threat is high when it is easy for new competitors to join the market. The threat is low when significant barriers exist.
Bargaining power of suppliers: supplier power is high when buyers few choices from whom they can buy from.
Bargaining power of customers: buyer power is high when buyers have many choices from whom they can buy from.
Threat of substituted services: threat of substituted services is high when many substitutes exist.
Rivalry of existing firms in the industry: threat of rivalry is high when there is intense competition among many firms in an industry.

Q4. In relation to Porter's value chain model, what is meant by primary activities and support activities, and how does IT support these activities?
Primary activities are activities that relate to the production and distribution of the firm’s products. Support activities such as logistics are the things that support the primary activities in order to contribute to the firm’s competitive advantage. IT supports these activities by making them easier, faster and more efficient.

Q5. Discuss the logic of building information systems in accordance with the organizational hierarchical structure.
Once the hierarchical structure is formed, systems are then formed for each level of these structures. These systems enable employees of each level in the organisation to effectively carry out their tasks to further contribute to the firm’s goals.

Q6. How has the Internet affected each of the five forces in Porter’s competitive forces model.
Threat of new competitors come from anywhere in the world thanks to e-commerce, making the threat bigger than ever before.
Bargaining power of suppliers is decreased because they can find suppliers anywhere now.
Bargaining power of customers has increased because of so many places to buy from.
Threat of substitute products is increasing, because people can copy things very easily.
Competition and rivalry now more fierce.