Friday, October 30, 2009

Week 12: Chapter 10 questions: Acquiring Information Systems and Applications:

Section 10.1 - Before You Go On…


1. What are some problems associated with assessing the costs of IT?

One of the main challenges that companies face is to allocate fixed costs among different IT projects, for IT fixed costs includes infrastructure costs, cost of IT services, and IT management cost. For example, the salary of the IT director is fixed, and adding one more application will not change it.
Another complication is that the cost of a system does not end when the system is installed. For example in 2000 reprogramming projects that cost organisations worldwide billions of dollars at the end of the twentieth century.

2. What difficulties accompany the intangible benefits from IT?

Intangible benefits of IT include improved customer and partner relations. Thought with the utilization of different IT methods many diverse obscures occur such as benefit analysis. Thus the completion must be thriving, done in time and inside the financial plan to have benefits.

Intangible benefits -
http://emlab.berkeley.edu/users/bhhall/itqbryn.pdf
3. Define NPV and ROI, and business case approaches.

The (NVP) is the net present value calculations for cost-benefit analyses, using the NVP methods, analyst convert future values of benefits to their preset-value equivalent by “discontinuing” them at the organisations cost of funds.
ROI, or the return on your investment, refers to the percentage rate of revenue generated by an e-mail campaign over the total cost of the campaign, or the percentage gain in revenue. (www.kateycharles.com/glossary.html). It measures the management’s effectiveness in generating profits with the available assets.


Finally the business case approach provides the bridge between the initial plan and its execution. Its purpose is not only to get approval and funding but also to provide the foundation for tactical decision making and technology risk management. It clarifies how the organisation can best use its resources to accomplish its IT strategy it also helps the business to concentrate on justifying the investment.


Section 10.5 - Before You Go On…

1. What type of companies provide outsourcing service?

Small or medium-size companies with few IT staff and limited budgets are best served by outside contractors. Large companies may also choose this strategy in certain circumstances. They also might use outsourcing to protect their internal networks and to gain access to outside experts.


2. Define ASPs and list their advantages to companies using them.

ASPs is the application service provider an agent or a vendor who assembles the software needed by enterprises and packages the software with services such as development, operations, and maintenance.


The advantages include:


  • Save costs

  • Reduce software maintenance

  • Reduce user training

  • Make the company more competitive by reducing time-to-market and enhance the company’s ability to adapt to changing market conditions.

3. List some disadvantages of ASPs.

Some of the disadvantages include;
- ASPs might not offer adequate security protections
- Software might not be a perfect fit for the desired application
- Company must make certain that the speed of the internet connection between the customer and the Asp is adequate to handle the requirements of the application.

Section 10.6 - Before You Go On…

1. List the major steps of selection of a vendor and a software package.

The major steps of selection of a vendor and a software package include:

1. Identify Potential Vendors: when companies can identify potential software application vendors through various sources e.g. software catalogs, web searches etc.
2. Determine the Evaluation Criteria: the most difficult and crucial task in evacuating a vendor and a software package is to select a detailed set of evaluation criteria. This criteria should be set out in a request for proposal (RFP), a document that is sent to potential vendors inviting them to submit a proposal that describes their software package and explains how it would meet the company’s needs.
3. Evaluate Vendors and Packages: the response to an RFP generate massive volumes of information that a company must evaluate. The goal of the evaluation is to determine the gaps between the company’s needs and the capabilities of the vendors and their application packages.
4. Choose the Vendor and Package: once the company has shortened the list of potential suppliers, it can begin negotiations with these vendors to determine how their packages might be modifies to remove any discrepancies with the companies IT needs.
5. Negotiate a Contract: the contract software vendor is very important. It specifies both he price of the software and the type and amount of support that the vendor agrees to provide.
6. Establish a Service Level Agreement: SLA are final agreements the specify how work is to be divided between the company and its vendors.

2. Describe a request for proposal (RFP).

The request for proposal (RFP) is a document that is sent to potential vendors inviting them to submit a proposal that describes their software package and explain how it would meet the company’s needs. The RFP provides the vendors with the formation about the objectives and requirements of the system. Specifically, it describes the environment in which the system will be used, the general criteria that the company will use to evaluate the proposals, and the conditions for submitting proposals. The RFP ma also request a list of current users of the package whom the company may contact. Finally, it can require the vendor to demonstrate the package at the company’s facilities using specifies inputs and data files.


3. Describe SLAs.

Service legal agreements (SLA) are formal agreements regarding the division of work between a company and its vendors. They describe how quality checks will be made and what is to be done in case of disputes. SLA accomplish these goals:
(1) Defining the responsibility of both partners
(2) Providing a framework for designing support services
(3) Allowing the company to retain as much control as possible over its own systems..
SLA include such issues as performance, availability, backup, and recovery, upgrades and hardware and software ownership.

Week 11: Chapter 9 Managerial Support Systems:

Section 9.1 - Before You Go On…

1. Describe the decision-making process proposed by Simon.


Decision is a choice that individuals and groups make among two or more alternatives; decision making is a systematic process. Simon (1977) describes the process as composed of three major phases: intelligence, design and choice. A fourth phase implementation was added later. His model illustrates the four stage process, indicating which tasks are included in each phase.


An overview of the Model: http://sbaweb.wayne.edu/~absel/bkl/vol15/15aa.pdf


2. Why do managers need IT support?

Despite the widespread availability of information, making decisions is becoming increasingly difficult owing to the following trends:


· The number of alternatives to be considered is constantly increasing, due to innovations in technology, improves communications, the development of global markets, and the use of the Internet and e-business. A key to good decision making is to explore and compare many relevant alternatives. The more the alternatives that exist, the more computer-assisted search and comparisons are needed.


· Typically, decisions must be made under time pressure. Frequently it is not possible to process information manually fast enough to be effective.


· Due to increased uncertainty in the decision environment, decisions are becoming more complex. It is usually necessary to conduct a sophisticated analysis in order to make a good decision. Such analysis requires the use of modeling.


· It is often necessary to access remote information rapidly, consult with experts, or conduct a group decision-making session, all without incurring large expenses. Decision makers can be in different locations, as can the information. Bringing them all together quickly and inexpensively may be a difficult task.



3. Describe the decision matrix.



The decision matrix is has three primary classes of problem structure and the three broad categories of the nature of decisions can be combined in a decision support matrix that consists of nine cells, as seen in the diagram below. Low –level managers usually perform the structures and operational control-orientated tasks (cells 1,2and 4). The tasks in 3, 5, and 7 are usually the responsibility of middle managers and professional staff. Finally tasks in cells 6, 8, and 9 are generally the responsibility of senior executives.



Page 266 of Introduction to Information Systems By Rainer and Turban



·
Section 9.2 - Before You Go On…

1. Describe the capabilities of data mining.



Data mining derives its name from searching for valuable business information in a large databases, data warehouse, or data mart. Data mining can perform two basic operations: predicting trends and behaviours and identifying previously unknown patterns. We emphasise the multidimensional analysis provides users with a view of what is happening, and what will occur in the future.




  • · Data mining automates the process of finding predictive information in large databases.

  • · Can use past data to identify regular customers

  • · Forecasting bankruptcy

  • · Detecting fraudulent credit card transactions



Data Mining: http://www.anderson.ucla.edu/faculty/jason.frand/teacher/technologies/palace/datamining.htm
Section 9.3 - Before You Go On…

1. What are some of the capabilities of digital dashboards?


A digital dashboard, or dashboard report, is a visually intuitive display of data for monitoring personal or work group contributions to overall goals of the business. Dashboards provide easy-to-use access to enterprise data and help organizations track performance and optimize decision-making. At-a-glance, executives, managers, and business users can immediately understand their organization’s health through a range of insightful data visualizations such as key performance indicators (KPIs), tables, graphs, trend indicators, gauges, heat maps, and many more.
Digital dashboards enable business users to intuitively flip through many different perspectives of corporate performance without ever leaving the dashboard, allowing them to quickly and easily identify problems and diagnose root causes. Dashboards combine data from a variety of data sources into a single view, providing the user with multi-disciplined, multi-dimensional performance feedback on every dashboard.


Digital Dashboard - http://www.microstrategy.com/digital-dashboard/

Week 10: Chapter 8 – Functional Area Information Systems:

Section 8.1 - Before You Go On…

1. What is a Transactional Processing and the role of TP systems. State the key objective of TP/TPSs.
The main aspect of most information systems applications is the transaction processing system (TPS). TPS monitors, stores, collects, and process data generated from all business transactions. These data provide the inputs into the organisations database. They are also the inputs to the functional information systems, decision support systems, customer relationship management, knowledge management, knowledge management and e-commerce. TPS have to handle high volume and large variations in volume efficiently, avoid errors and downtime, record results accurately and securely and maintain privacy and security.
Section 8.2 - Before You Go On

1. What is a functional area information system? List its major characteristics.

The functional area information systems provide information mainly to lower and middle level managers in the functional areas. They use the information to help them plan, organize, and control operations. The information is provided in a variety of reports.

Functional Area Information System - http://www.bay3000.com/functional_area/information_systems.php

2. How does an FAIS support management by exception? How does it support on-demand reports?

FAIS support management by exception reports by collecting and analysing all data that is required for the report. For example in a sales example, management would establish sales quotas, the company would implement FAIS that collects and analyses all sales data.FAIS support ad hoc (on demand) reports by providing drill-down reports, which show a greater level of detail; key indicator reports, which summarise the performance of critical activities; and comparative reports, which compare there performances of different business units or time periods.

Section 8.3 - Before You Go On…

1. Define ERP and describe its functionalities.
Eterprise resource planning systems integrate the planning, management, and use of all of an organisations resources. The major objectives of ERP systems are to tightly integrate the functional areas of the organisations and to enable information to floe seamlessly across the functional areas. Tight integration means that changes in one functional area are immediately reflected in all other pertinent functional areas.

2. List some drawbacks of ERP software.

Enterprise Resource Planning Systems integrate the planning, management, and use of an organisations resource. The main objective is to tightly integrate the functional areas of the organisation and to enable information to flow seamlessly across the functional areas. Even though many companies develop their own Enterprise Resource Planning Systems (ERP) they do have drawbacks for instance these include:

  • Extremely complex
  • Expensive
  • Time consuming to implement
  • Need to change existing business process to fit the software
  • Companies must purchase the whole software if they only require a few models.
For these reasons ERP software is not attractive to everyone.

ERP Advantages & Disadvantages - http://gleez.com/erp-advantages-disadvantages


Section 8.5 - Before You Go On…

1. Define a supply chain and supply chain management (SCM).

The supply chain refers to the flow of materials, information, money and services from raw material suppliers through factories and warehouses to the end customer. Supply chains also include the organisations and process that create and deliver products, information, and services to end customers. Whereas the supply chain management is to plan, organise, and optimize the supply chain’s activities. A typical supply chain, which links a company with its suppliers and its distributors and customers, involves three segments: upstream, internal and downstream.



2. List the major components of supply chains.


The supply chain links the company with its suppliers, distributors and customers. The supply chain involves three main segments:

1) Upstream – when sourcing or pronouncement from external suppliers occur

2) Internal – where packaging, assembly, or manufacturing takes place

3) downstream – where distribution takes place, frequently b external distributors.

Supply Chain Management - www.slideshare.net/hazman/supply-chain-management



3. What is the bullwhip effect?

One of the major difficulties in properly setting inventory levels in various parts of the supply chain is known as the bullwhip effect. The effect refers to the erratic shifts in orders up and down the supply chain.


Bullwhip Effect - www.12manage.com/description_lee_bullwhip_effect_supply_chains.html


Section 8.6 - Before You Go On…

1. Define EDI and list its major benefits and limitations


Electronic data interchange (EDI) is a communication standard that enables business partners to exchange routine documents, such as purchasing orders, electronically. It formats these documents according to agreed-upon standards, and it reduces costs, delays, and error inherent in a manual document-delivery system.

The advantages of EDI include:

  • · Minimizes data entry errors because each entry is checked by computer.
  • · The length of the message is shorter
  • · The messages are secured
  • · Reduces cycle time
  • · Increase productivity
  • · Enhances customer service
  • · Minimises paper usage and storage.

In contrast there are disadvantages which prevent it from being more widely used, these include:

  • · A significant initial investment
  • · High and ongoing operating costs, due to the use of expensive and private VANs
  • · Traditional EDI is inflexible (thus difficult to make changes)
  • · Long start-up period
  • · Business process need to be restructured to fit EDI requirements
  • · EDI standards are in use, thus several standards are in use to communicate with different business partners.

EDI Comparison - http://ksi.cpsc.ucalgary.ca/courses/547-95/franz/547_pres.html

Week 9: Chapter 4 Data and Knowledge Management:

1. What are some of the difficulties in managing data?

Data should be of high quality, meaning it should be accurate, complete, timely, consistent, accessible, relevant and concise. Though the progression of acquiring, keeping and managing data is increasingly difficult to do so. Nevertheless the difficulties of managing data include:
  • · The amount of data increases exponentially with time


  • · Data are scattered throughout organizations and are collected by many individuals using various methods and devices.


  • · Data is coming from various aspects such as internal and external sources.


  • · New sources of data are always being developed and updated. (for example: blogs, video casts, podcasts and RFID tags)


  • · Data decays and changes over time.


  • · Data security, quality, and integrity are critical yet they are jeopardised.


  • · Additionally legal requirement differ among countries.


  • Due to data being difficult to manage organisations are using databases and datawarehouses to manage their data more efficiently and effectively.

2. What are the various sources for data?

The sources of data can be internal, personal, click stream and external (Internet). Internal data are usually located in corporate databases and are usually accessible via an organisations intranet. IS users create personal data by documenting their own expertise. These data can reside on the user’s PC, or they can be placed on corporate databases or on corporate databases or on corporate knowledge bases. Sources of external data range from commercial databases to sensors and satellites. Government’s reports constitute a major source of external data. Many thousands of databases all over the world are accessible through the internet.

3. What is a primary key and a secondary key?

Primary key is the identifier field or attribute that uniquely identifies a record. Where as a secondary key is the identifier field or attribute that has some identifying information, but typically does not identify the file with complete accuracy.
Definition - http://www.allinterview.com/showanswers/28849.html

4. What is an entity and a relationship?


An entity is a person, place thing, or event about which information is maintained in a record. Whilst a relationship is the connection among the different entities.

5. What are the advantages and disadvantages of relational databases?

The relational database model is based on the concept of two-dimensional tables, which contains all of the records and attributes. The advantages of this database include: The ability to join related tables when they contain common columns which also allows great flexibility in the variety of queries they can make. In contrast the disadvantages include: due to the large-scale databases they can be composed of many interrelated tables, thus having an overall complex and slow search and access time.

6. What is knowledge management?


Is a process that helps organisations identify, select, organise, disseminate, transfer, and apply information and expertise that are part of the organisation’s memory and that typically reside within the organisation in an unstructured manner.


7. What is the difference between tacit knowledge and explicit knowledge?


Tactic knowledge is the cumulative store of subjective or experiential learning; highly personal and hard to formalize knowledge. Though explicit knowledge is the more objective, rational, and technical types of knowledge.


“Tacit Knowledge” versus “Explicit Knowledge” - http://openarchive.cbs.dk/bitstream/handle/10398/7224/wp04-01.pdf?sequence=1

Tuesday, September 22, 2009

Week 3: Tech Guide 1

1. What is computer hardware and what are the major hardware components?

Hardware refers to the physical equipment used for the input, processing, output and storage activities of a computer system. The hardware includes the physical artefacts technology for instance PC’s, printers, mouses, monitors, routers and hard drives.

Hardware consist of many parts such as the Central Processing Unit (CPU): which manipulates data ad controls the tasks performed by other components, Primary storage: internal to the CPU; which stores data and program instructions during processing, Secondary Data: external to the CPU; which stores data and programs for future use; Input Technologies: accepts data and instructions and convert them to a form that the computer can understand; Output Technologies: data and information that people understand and finally; Communication Technologies: provides the flow of data from external computer networks (internet) to the CPU, and CPU to networks.

2. What is Moore's Law/what does it mean in relation to computers.
According to computer narration and its development Moore’s Law is the preeminent way to describe the stages.
The law explains the continuing change and trends of the computer history. The following changes of Moore’s Law include:
· The increasing miniaturization of transistors,
· Making the physical layout of the of the chip’s component as compressed and efficient as possible,
· Using materials for the chip that improve the flow of electricity, and
· Targeting the amount of basic instructions programmed into the chip.
Thus in relation to computers, It is evident that from the law that the microprocessor complexity would double every two years and as a result from a business perspective this means that over time the price of PC will decrease and the speed will increase. Moore’s Law was constructed in the 1950’s as he was the founder of the Intel computer, thus the conclusion above was derived from the results.

3. In basic terms, describe how a microprocessor functions.

The microprocessor also known as the ‘processor’ or ‘central processing unit (CPU)’ performs the actual computation inside any computer e.g. Intel Core Duo. It is the chip that interprets program instructions and process data. It manipulates the data and controls the tasks performed by the other components. As seen in the image the microprocessor is made up of millions of microscopic transistors in a circuit on a silicon chip it consist of:
- Control Unit: accesses program instructions, decodes and controls the flow of data to and from the arithmetic logic unit as it registers primary and secondary storage.
- Arithmetic Logic Unit: performs the mathematical calculations
- Registers: high speed storage that store very small amounts of data and instructions for short periods of time.


4. What factors determine the speed of the microprocessor?

The factors that determine the speed of the CPU include the clock speed, word length, bus width, and design of the chip however with the assistance of binary form and the machine instruction cycle the microprocessor speed is established. The clock speed in GHz helps to preset the speed of the computer clock, while the word length shows how many characters the PC reacts in one clock cycle, additionally the bus width assists the speed by performance of the amount of data that can travel at the same time finally the line width shows the distance between transistors thus the smaller the line width, the faster the chip.

5. What are the four main types of primary storage.

Primary storage: stores small amount of data and information that will be immediately used by the CPU. The four main types include:

1) Registers: part of the CPU with least capacity, storing little data only immediate before and after processing.

2) Random Access Memory (RAM): holds software and small amount of data when brought from secondary storage.

3) Cache Memory: stores blocks of data used more often.

4) Read Only Memory (ROM): storage is non-volatile thus, retains instructions when the power of the computer is turned off.

6. What are the main types of secondary storage?

Secondary storage: stores much larger amounts of data and information for extended periods of time, four main types of storage include:
1) Magnetic Tape: (Sequential Access) medium storage, large open reel or smaller cartridge or cassette.

2) Magnetic Disk: (Direct Access) magnetic disk divided into track and sectors provide addresses for various data example include: hard disk.

3) Hard Drives: Platte divided into concentric tracks and sectors; it reads / writes pivots across the rotating disk.

4) Direct Access: any piece of data retrieved anytime located by data’s address.

Secondary Storage - http://en.wikipedia.org/wiki/Computer_data_storage

7. How does primary storage differ from secondary storage in terms of speed cost and capacity?
Primary storage stores small amount of data and information that will be immediately stored on the CPU.

The primary storage stores many types of information for a short time:
§ Data to be processes by the CPU
§ Instructions for the CPU as to how to process the data
§ Operating system programs that manage various aspects of the computer operation.
§ The storage is faster, RAM quickly though more costly.
§ The storage takes place on ‘chips’ on the motherhood.

Secondary storage is the permanent of larger amounts of data. The secondary storage stores many types of information for an extended period of time the storage differs from primary as it:
§ Non volatile
§ Takes much more to retrieve data because of the electromechanical nature
§ Cheaper than primary storage
§ Can be taken place on a variety of media.
§ Storage is moderate, RAM is less costly

The primary and secondary storages differ as primary has faster storage though more costly however has more capacity. Whereas the secondary storage is limited and cheaper though it is reliable as it can be taken everywhere.

8. What are enterprise storage systems?
Enterprise storage systems are independent, external system with intelligence that includes two or more storage devices.
Three types of enterprise storage systems include:
I. Redundant Arrays of Independent Disks (RAID): Similar to standard hard drive, it is a specialised microcontroller that coordinates the drive therefore; appears to a single logical drive. II. Storage Area Network (SAN): building special area network, that allows rapid and reliable access to storage devices by multiple servers.
III. Network Attached Storage (NAS): device is a special purpose server that provides file storage to user when access the device over a network.


9. Distinguish between human data input devices and source data automation.

Human Data Entry is when the individual physical penetrates the information and process into the devices; this includes keyboards, optical mouse, trackball, joystick, and webcam. This procedure however takes longer.
In contrast, the Source-Data Automation Input is the gathering and amending data where it is primarily formed in so that it can be directly input in to the computer as a result indicating accuracy and timeliness. Types of source-data automation include barcodes scanners, Radio frequency identification (RFID), magnetic stripe readers and automated teller machines.

10. What is one new technology that will change how we do things?

Technology is a human innovation in action that involves the generation of knowledge and processes to develop systems that solve problems and extend human capabilities. (www.insme.org/page.asp)

However, a technology that will change how individuals perform their daily tasks and interaction in the world will be the iPhone.
With the release of the iPhone towards the end of 2007, the world had discovered a technology that combines three different devices, as it includes the innovative phone, widescreen iPod and advance internet device. With the combination of these three mechanisms, it has produced an efficient, effective, and reliable apparatus that assists the many busy people of the world helping them with their flexibility of time.

Nevertheless, the iPhone helps individuals that are always ‘on the go’ to check all their emails, make voice and video calls at any period. Additionally, it has the capability of downloading the latest songs and watching DVDs in the touch of a finger. If those were not enough reasons the iPhone uses the most up-to-date 3G and Wi-Fi connections to deliver all the aspects in web browsing. Therefore, this wireless technology will change the way we perform our daily tasks, as it will allow to multitask many events due to the masses of applications it holds and thus have no need to wait in queues!

iPhone - http://www.apple.com/iphone/why-iphone/

iPhone Specifications - http://en.wikipedia.org/wiki/IPhone

Monday, September 21, 2009

Week 8: Chapter 7 - Wireless, Mobile Computing, and Mobile Commerce

1. Identify common wireless devices and their application to business

Wireless technologies include both wireless devices, such as smart phones, and wireless transmission media, such as microwave, satellite and radio. These technologies are fundamentally changing the ways organizations operate and do business. Examples of wireless devices include:
· The Blackberry 8800 http://na.blackberry.com/eng/devices/blackberry8800/
· The Treo 750 http://www.palm.com/au/products/smartphones/treo750/
· The Motorola Q http://www.motorola.com/motoinfo/product/details.jsp?globalObjectId=113
· The Helio Ocean http://en.wikipedia.org/wiki/Helio_Ocean
· The Apple iPhone
· The Sony Mylo http://www.sonystyle.com/webapp/wcs/stores/servlet/ContentDisplayView?cmsId=content/FlankerBullets/mylo/index_mylo&hideHeaderFooter=false&storeId=10151&catalogId=10551&langId=-1

The capabilities of these devices include phone calls, Bluetooth, WI-Fi, a digital camera, GPS, organiser, a scheduler, address book, calculator, access to email and short messages, instant messaging, text messaging, MP3 player, video-player, internet access with full browser applications, and a QWERTY keyboard.

Businesses are finding the use of wireless devices convenient as it:
1. Make productive use of the time that was formally wasted (for example travelling to work.)
2. Is possible to take the devices with them whether at work or home any locations thus becoming more flexible.
3. Wireless technologies enable them to allocate their working time around personal and professional obligations.

2. Describe the various types and general characteristics of wireless transmission media/technologies - microwave, satellite, infrared and radio waves.


Wireless media; transmit signals without wires over the air or in space.
Microwave transmission systems are widely used for high-volume, long distance point-to-point communication. Communication satellites are used in satellite transmission systems. The three types of satellite geostationary earth orbit (GEO), medium earth orbit (MEO), and low earth orbit (LEO). Radio transmission uses radio – wave frequencies not commonly visible to human eye’s. The most common application of infrared light is in remote-control units for televisions and VCRs. Infrared transceivers are being used for short-distance connections between computers and peripheral equipment and LANs. Many portable PCs have infrared ports, which are handy when cable connections with a peripheral are not practical.


3. What is bluetooth/how is it used?

Bluetooth is chip technology that enables short-range connection (data and voice) between wireless devices. Bluetooth can link up to eight devices within a 10-metre area using low-power, radio-based communication. It can transmit up to 2.1 Mbps.
How does Bluetooth work - http://www.swedetrack.com/images/bluet13.htm

4. What are WLAN's, Wi-Fi, WWAN's, 3G?

Wireless local area network (WLAN) a computer network in a limited geographical area that uses wireless transmission for communication. WLAN - http://en.wikipedia.org/wiki/Wireless_LAN

Wireless fidelity (Wi-Fi) a set of standards for wireless local area networks based on the IEEE 802.11 standard. Wi-Fi - http://en.wikipedia.org/wiki/Wi-Fi

Wireless wide area network (WWAN) a network, generally provided by common carriers, that covers a wide geographic area.

3G is the third generation of wireless networks, which offer faster data transfers. 3G - http://en.wikipedia.org/wiki/3G


5. What are the drivers of mobile computing and mobile commerce

Mobile computing is a computing model designed for people who frequently travel. Mobile commerce is any e-commerce conducted in a wireless environment especially, the internet.


The drivers of m-commerce and mobile computing include:

Ø Widespread availability of mobile devices: approx 2.6 billion cells phones will be in use throughout the world in 2009 and in a few years 70% of mobiles will have internet access.
Ø No need for a PC: due to the increase in smart phones.
Ø The ‘cell phone culture’: the widespread use of cell phones is a social phenomenon, especially among young people.
Ø Declining prices: the price of wireless devices is declining and will continue to decline.
Ø Bandwidth improvement: sufficient bandwidth for transmitting text, video, and multimedia.


Mobile computing and m-commerce include many applications that results from the capabilities of various technologies.


6. Explain the nature of RFID

Radio frequency identification (RFID) allows manufactures to attach tags with antennas and computer chips on goods and then track their movement through radio signals. RFID systems use tags with embedded microchips, which contain data and antennas to transmit radio signals over a short distance to RFID readers. The readers pass the data over a network to a computer for processing. The chip in the RFID tag is programmed with information that uniquely identifies an item. It also identifies the location, where and when it was made.