1. Identify common wireless devices and their application to business
Common wireless devices are the blackberry; the Treo 750; the Motorola; Apple iPhone. These wireless devices are important to business because they can make productive use of time that was formerly wasted; people can take these devices with them wherever they go, resulting in 24/7 access. Also, these wireless devices allow businesses and business people to allocate their working time around personal and professional obligations.
2. Describe the various types and general characteristics of wireless transmission media/technologies - microwave, satellite, infrared and radio waves.
The main types of wireless transmission media/technologies are microwave, satellite, infared and radio waves.
-Microwaves: widely used for high-volume, long-distance, line of sight communication
-Satellite: satellites, like microwave transmission, receive and transmit data via line of sight. However, satellites leave an enormous footprint
-Radio: uses radio-wave frequencies to send data directly between transmitters and receivers
-Infared: infared light is red light that is not commonly visible to human eyes. Common applications of infared light are in remote control units for televisions, VCRs, DVDs etc. Infared transceivers are used for short distance connections between computers and peripheral equipment and local area networks.
3. What is bluetooth/how is it used?
Bluetooth is an industry specification used to create small personal area networks. It is used for communication among computer devices close to one person. Bluetooth can link up to eight devices within a 10 metre area using low-power, radio based communication. It can transmit up to 2.3 Mbps.
4. What are WLAN's, Wi-Fi, WWAN's, 3G?
Wi-Fi is a wireless protocol used in medium range wireless LAN’s, called a WLAN.
It enables 1.Easy Access to the Web; 2.Enables Access to ‘live’ information; 3.Remove Cabling & Wiring; 4.Reduce the requirements for hubs/switches. 3G uses digital signals and can transmit voice and data up to 384 Kbps when the device is moving at a walking pace, 128Kbps when moving in a car, and up to 2 Mbps when the device is in a fixed location.
5. What are the drivers of mobile computing and mobile commerce
The drivers for Mobile Computing and Mobile Commerce include widespread availability of mobile devices; no need for a PC; the "cell phone" culture; declining prices and bandwidth improvement
6. Explain the nature of RFID
RFID is the term for technologies that use radio waves to automatically identify the location of individual items equipped with tags that contain embedded microchips.
http://www.ibiblio.org/Dave/Dr-Fun/df200601/df20060116.jpg
Friday, September 18, 2009
Wednesday, September 16, 2009
WEEK 7 QUESTIONS
CHAPTER 5:
1. Describe the underlying technologies, applications and types of Web sites that comprise Web 2.0.
There are many underlying technologies and applications that comprise Web 2.0. Some of these include AJAX; Tagging; Blogs and blogging; Wikis; Podcasts and videocasts. There are also many types of websited that comprise Web 2.0. Some of these websites inclyde Social Networking sites such as 'facebook'; Aggregators, which provide collections of content from the web; and Mashups, which takes content from a number of websites and mixes them together to create a new kind of content
http://hinchcliffe.org/img/web2tree.jpg
2. Describe the function of Web services.
Web services are applications, delivered over the internet, that users can select and combine through almost any device. By using a set of shared protocols and standards, these applications provide the function of permitting different systems to 'talk' with one another, without requiring human beings to translate the conversations.
3. Describe how you see Social Networking being used in Business.
I see social networking as a major issue for businesses. With increasing numbers of social networking sites, and increasing numbers of people joining these sites, it is almost impossible not to let these interfere with your everyday work. With people uploading information constantly, or even just constantly 'checking out' these sites, it means that they are taking time away from their work, whilst at work. Rather than promoting the business on these social networking sites, people are just socialising and not concentrating on the more important task at hand. For these reasons, many businesses have blocked these sites so that the workers will not get distracted by them, which I see as a good move.
CHAPTER 6
Section 6.1:
1. Define e-commerce and distinguish it from e-business.
E-Commerce describes the process of buying, selling, transferring or exchanging products, services or information via computer netoworks, including the internet. On the other hand, E-Business is a somewhat broader concept. As well as the functions of E-Commerce, it also refers to servicing customers, collaborating with business partners and performing electronic transactions within an organisation
2. Distinguish among B2C, B2B, C2C and B2E electronic commerce.
-B2C: the sellers are organisations, and the buyers are individuals
-B2B: both the sellers and buyers are business organisations
-C2C: an individual sells products or services to other individuals
-B2E: businesses use B2E internally to provide information and services to its employees
3. List some benefits and limitations of e-commerce.
Some benefits of E-Commerce for organisations include it makes national and international markets more accessible and lowers the cost of processing, retreiving and distributing information. Customers benefit by being able to access a vast number of products and services around the clock. The major benefit to society is the ability to easily and conveniently deliver information and services to people in cities, rural areas and developing countries.
Limitations include the lack of universally accepted security standards, insufficient telecommunications bandwidth and expensive accessibility. It is also non-secure and there are unresolved legal issues and at times, lacks a critical mass of sellers and buyers.
Section 6.2:
1. What are spamming, permission marketing and viral marketing?
These are all forms of advertising methods over the internet. Spamming is the indiscriminate distribution of electronic ads without the permission of the receiver. Permission marketing asks consumers to give their permission to voluntarily accept online advertising and e-mail. Viral marketing refers to online "word of mouth" marketing
Section 6.4:
1. What are micropayments?
Micropayments are small payments of a few dollars or less
2. What is Multichanneling?
Multichanneling is a process through which a company integrates its online and offline channels
Section 6.5:
1. List some ethical issues in EC.
Ethical issues in E-Commerce include how should the company handle the layoffs?; should companies be required to retrain employees for new positions?; should the company compensate or otherwise assist the displaced workers?
2. List the major legal issues of EC.
The major legal issues of EC include fraud; domain names; cybersquatting; taxes and other fees and copyright
1. Describe the underlying technologies, applications and types of Web sites that comprise Web 2.0.
There are many underlying technologies and applications that comprise Web 2.0. Some of these include AJAX; Tagging; Blogs and blogging; Wikis; Podcasts and videocasts. There are also many types of websited that comprise Web 2.0. Some of these websites inclyde Social Networking sites such as 'facebook'; Aggregators, which provide collections of content from the web; and Mashups, which takes content from a number of websites and mixes them together to create a new kind of content
http://hinchcliffe.org/img/web2tree.jpg
2. Describe the function of Web services.
Web services are applications, delivered over the internet, that users can select and combine through almost any device. By using a set of shared protocols and standards, these applications provide the function of permitting different systems to 'talk' with one another, without requiring human beings to translate the conversations.
3. Describe how you see Social Networking being used in Business.
I see social networking as a major issue for businesses. With increasing numbers of social networking sites, and increasing numbers of people joining these sites, it is almost impossible not to let these interfere with your everyday work. With people uploading information constantly, or even just constantly 'checking out' these sites, it means that they are taking time away from their work, whilst at work. Rather than promoting the business on these social networking sites, people are just socialising and not concentrating on the more important task at hand. For these reasons, many businesses have blocked these sites so that the workers will not get distracted by them, which I see as a good move.
CHAPTER 6
Section 6.1:
1. Define e-commerce and distinguish it from e-business.
E-Commerce describes the process of buying, selling, transferring or exchanging products, services or information via computer netoworks, including the internet. On the other hand, E-Business is a somewhat broader concept. As well as the functions of E-Commerce, it also refers to servicing customers, collaborating with business partners and performing electronic transactions within an organisation
2. Distinguish among B2C, B2B, C2C and B2E electronic commerce.
-B2C: the sellers are organisations, and the buyers are individuals
-B2B: both the sellers and buyers are business organisations
-C2C: an individual sells products or services to other individuals
-B2E: businesses use B2E internally to provide information and services to its employees
3. List some benefits and limitations of e-commerce.
Some benefits of E-Commerce for organisations include it makes national and international markets more accessible and lowers the cost of processing, retreiving and distributing information. Customers benefit by being able to access a vast number of products and services around the clock. The major benefit to society is the ability to easily and conveniently deliver information and services to people in cities, rural areas and developing countries.
Limitations include the lack of universally accepted security standards, insufficient telecommunications bandwidth and expensive accessibility. It is also non-secure and there are unresolved legal issues and at times, lacks a critical mass of sellers and buyers.
Section 6.2:
1. What are spamming, permission marketing and viral marketing?
These are all forms of advertising methods over the internet. Spamming is the indiscriminate distribution of electronic ads without the permission of the receiver. Permission marketing asks consumers to give their permission to voluntarily accept online advertising and e-mail. Viral marketing refers to online "word of mouth" marketing
Section 6.4:
1. What are micropayments?
Micropayments are small payments of a few dollars or less
2. What is Multichanneling?
Multichanneling is a process through which a company integrates its online and offline channels
Section 6.5:
1. List some ethical issues in EC.
Ethical issues in E-Commerce include how should the company handle the layoffs?; should companies be required to retrain employees for new positions?; should the company compensate or otherwise assist the displaced workers?
2. List the major legal issues of EC.
The major legal issues of EC include fraud; domain names; cybersquatting; taxes and other fees and copyright
Sunday, September 13, 2009
WEEK 6 QUESTIONS
1. Describe the basic telecommunications system?
A telecommunications system consists of hardware and software that transmit information from one location to another. These systems can transmit text, data, graphics, voice, documents, or full-motion video information with two basic types of signals, analog and digital. The main components of a telecommunications system includes devices, communications processors and communication channels and media.
http://www.nrc.gov/reading-rm/doc-collections/gen-comm/reg-issues/2000/ri00011/fig05.gif
2. Compare and contrast the main wired communications channels ? (Ethernet & Fibre Optic)
The two main wired communications channels are ethernet and fibre optic channels. Ethernet is a local area network protocol. Many companies use ethernet, usually gigabit, which means the network provides data transmission speeds of 1 billion bits per second. Fibre Optic Cables also transmit information, however the information is transmitted via light pulses generated by lasers.
3. What are the main business reasons for using networks?
Businesses use networks for many reasons. Some of these reasons include networked computer systems enable organisations to be more flexible so that they can adapt to rapidly changing business conditions; networks enable companies to share hardware, computer applications and data across the organisation and among organisations; networks make it possible for geographically dispersed employees and workgroups to share documents, ideas and creative insights.
4. What is the difference between LANs and WANs?
A Local Area Network (LAN) connects two or more devices in a limited geographical region, usually within the same building, so that every device on the network can communicate with every other device. On the other hand, Wide Area Networks (WANs) are networks that cover large geographic areas and typically connect multiple LANs. They are generally provided by common carriers such as telephone companies and the international networks of global communications service providers
5. What is a network protocol?
The network protocol is the set of rules and procedures governing transmission across a network
6. Describe TCP/IP protocol.
TCP/IP protocol is a file transfer protocol that can send large files of information across sometimes unreliable networks with the assurance that the data will arrive uncorrupted
A telecommunications system consists of hardware and software that transmit information from one location to another. These systems can transmit text, data, graphics, voice, documents, or full-motion video information with two basic types of signals, analog and digital. The main components of a telecommunications system includes devices, communications processors and communication channels and media.
http://www.nrc.gov/reading-rm/doc-collections/gen-comm/reg-issues/2000/ri00011/fig05.gif
2. Compare and contrast the main wired communications channels ? (Ethernet & Fibre Optic)
The two main wired communications channels are ethernet and fibre optic channels. Ethernet is a local area network protocol. Many companies use ethernet, usually gigabit, which means the network provides data transmission speeds of 1 billion bits per second. Fibre Optic Cables also transmit information, however the information is transmitted via light pulses generated by lasers.
3. What are the main business reasons for using networks?
Businesses use networks for many reasons. Some of these reasons include networked computer systems enable organisations to be more flexible so that they can adapt to rapidly changing business conditions; networks enable companies to share hardware, computer applications and data across the organisation and among organisations; networks make it possible for geographically dispersed employees and workgroups to share documents, ideas and creative insights.
4. What is the difference between LANs and WANs?
A Local Area Network (LAN) connects two or more devices in a limited geographical region, usually within the same building, so that every device on the network can communicate with every other device. On the other hand, Wide Area Networks (WANs) are networks that cover large geographic areas and typically connect multiple LANs. They are generally provided by common carriers such as telephone companies and the international networks of global communications service providers
5. What is a network protocol?
The network protocol is the set of rules and procedures governing transmission across a network
6. Describe TCP/IP protocol.
TCP/IP protocol is a file transfer protocol that can send large files of information across sometimes unreliable networks with the assurance that the data will arrive uncorrupted
Sunday, September 6, 2009
WEEK 5 QUESTIONS
1. Provide an IT example that relates to the ethical issues for the ideas of privacy, accuracy, property, and accessibility.
2. What are the 4 general types of IT threats? Provide an example for each one
There are 5 general types of IT threats. These threats include:
-Unintentional Acts- human error
-Natural Disaster- floods, earthquakes etc resulting in loss of system and data
-Technical Failures- problems with hardware and software
-Management Failures- lack of funding for information security efforts and a lack of interest in those efforts
Deliberate Acts- espionage, information extortion, identity thefts etc.
3. Describe/discuss three types of software attack and a problem that may result from them
Three types of software attacks include:
-Virus- performs malicious actions by attaching to another computer program
-Back Door- allows the hacker to access a computer system at will, without having to go through any security procedures
-Zero Day Attack- allows the perpetrator to attack the vulnerability of a software product before the software vendor can prepare a patch for the vulnerability
4. Describe the four major types of security controls in relation to protecting information systems.
The four major types of security controls in relation to protecting information systems are:
-Communication Controls- secure the movement of data across networks.
-Application Controls- security counter-measures that protect specific applications. The three major categories of these controls are input, processing and output controls
-Physical Controls- prevent unauthorised individuals form gaining access to a company's facilities
-Access Controls- restrict unauthorised individuals from using information resources
5. Name one recent software threat and briefly discuss it's effects and resolutions?
One type of software threat is a computer virus. This is where segment of computer code that performs malicious actions by attaching to another computer program. In order to stop viruses, people can use anit-malware systems. This is a software package that attempts to identify and emilinate viruses, worms and other malicious software. There are hundreds of these packages available, for example Norton Anti Virus, McAfee Virusscan and Trend Micro PC-cillin
Privacy Issues: what information about oneself should an individual be required to reveal to others?
Accuracy Issues: who is responsible for the authenticity, fidelity, and accuracy of the information collected?
Property Issues: Who owns the information?
Accessibility: Who is allowed to access information?
2. What are the 4 general types of IT threats? Provide an example for each one
There are 5 general types of IT threats. These threats include:
-Unintentional Acts- human error
-Natural Disaster- floods, earthquakes etc resulting in loss of system and data
-Technical Failures- problems with hardware and software
-Management Failures- lack of funding for information security efforts and a lack of interest in those efforts
Deliberate Acts- espionage, information extortion, identity thefts etc.
3. Describe/discuss three types of software attack and a problem that may result from them
Three types of software attacks include:
-Virus- performs malicious actions by attaching to another computer program
-Back Door- allows the hacker to access a computer system at will, without having to go through any security procedures
-Zero Day Attack- allows the perpetrator to attack the vulnerability of a software product before the software vendor can prepare a patch for the vulnerability
4. Describe the four major types of security controls in relation to protecting information systems.
The four major types of security controls in relation to protecting information systems are:
-Communication Controls- secure the movement of data across networks.
-Application Controls- security counter-measures that protect specific applications. The three major categories of these controls are input, processing and output controls
-Physical Controls- prevent unauthorised individuals form gaining access to a company's facilities
-Access Controls- restrict unauthorised individuals from using information resources
5. Name one recent software threat and briefly discuss it's effects and resolutions?
One type of software threat is a computer virus. This is where segment of computer code that performs malicious actions by attaching to another computer program. In order to stop viruses, people can use anit-malware systems. This is a software package that attempts to identify and emilinate viruses, worms and other malicious software. There are hundreds of these packages available, for example Norton Anti Virus, McAfee Virusscan and Trend Micro PC-cillin
Subscribe to:
Comments (Atom)