View
237
Download
0
Category
Preview:
Citation preview
7/31/2019 Questions MIS AyaN
1/20
Short Notes on :
1) Distributed databases 223A database that consists of two or more data files located at different sites ona computer network. Because the database is distributed, different users canaccess it
without interfering with one another. However, theDBMSmust periodically
synchronize the scattered databases to make sure that they all have consistent data.
Distributed databases ----- ch 10, slide 20
A distributed database system is a collection of logically related databases that co-
operate in a transparent manner.Transparent implies that each user within the system may access all of the data within
all of the databases as if they were a single databaseThere should be location independence i.e.- as the user is unaware of where the data is
located it is possible to move the data from one physical location to another without
affecting the user.
Types of ddbms
Distributed Databases
Partitioned: Separate locations store different parts of database
Replicated: Central database duplicated in entirety at different locations
http://www.webopedia.com/TERM/D/database.htmlhttp://www.webopedia.com/TERM/D/data.htmlhttp://www.webopedia.com/TERM/F/file.htmlhttp://www.webopedia.com/TERM/C/computer.htmlhttp://www.webopedia.com/TERM/N/network.htmlhttp://www.webopedia.com/TERM/U/user.htmlhttp://www.webopedia.com/TERM/A/access.htmlhttp://www.webopedia.com/TERM/D/database_management_system_DBMS.htmlhttp://www.webopedia.com/TERM/D/database_management_system_DBMS.htmlhttp://www.webopedia.com/TERM/D/database_management_system_DBMS.htmlhttp://www.webopedia.com/TERM/D/database_management_system_DBMS.htmlhttp://www.webopedia.com/TERM/A/access.htmlhttp://www.webopedia.com/TERM/U/user.htmlhttp://www.webopedia.com/TERM/N/network.htmlhttp://www.webopedia.com/TERM/C/computer.htmlhttp://www.webopedia.com/TERM/F/file.htmlhttp://www.webopedia.com/TERM/D/data.htmlhttp://www.webopedia.com/TERM/D/database.html7/31/2019 Questions MIS AyaN
2/20
Advantages
Reduced Communication Overhead Most data access is local, less expensive and performs
better.
Improved Processing Power Instead of one server handling the full database, we now
have a collection of machines handling the same database.
Removal of Reliance on a Central Site
If a server fails, then the only part of the system that is affected is the relevant local site. The rest
of the system remains functional and available.
Expandability It is easier to accommodate increasing the size of the
global (logical) database.
Disadvantages
DrawbacksDepartures from using standard definitions
Security problems
2) Wireless Computer Networks 281
WPANWLAN 802.11
WMAN 802.16
Mobile telecommunicaion-GSM
3) Ajax 189-a new software techniques for enabling Web applications.
Introduction-In the world of Web development, the move from HTML to Ajax-
powered HTML often can be achieved at a relatively low cost, but there are both directand indirect costs associated with Ajax that must be taken into account. A close
analysis of these factors will enable business managers to make more well-informed
decisions when considering Ajax adoption within a particular application and acrosstheir organization.
Let's first look at the expected benefits from Ajax.
Ajax is all about ways to create a more interactive and productive connection between
a user and a Web-based application. Because Ajax provides similar advanced userinterface features to those in desktop applications (such as advanced UI controls,
animated effects and adjustable layout controls) -- thereby providing the visual andinteraction tools needed to make the application self-explanatory -- users spend lesstime learning and operating the application. The Ajax partial page update feature
minimizes user delays by eliminating the "click, wait, and refresh" approach of pre-
Ajax HTML applications.
Beyond better user interfaces for existing applications, Ajax enables new classes of
applications that fall under the umbrella term "Web 2.0" and that also fit into a service-
7/31/2019 Questions MIS AyaN
3/20
oriented architecture (SOA). Among the next-generation applications that will power
the enterprise and the Internet of the future are the following:
Users as co-developers - New Ajax-powered environments, such as "application
wikis," are empowering users to create their own customized mashups that include
personalized dashboards and situational composite applications. Collaboration- Ajax technologies are typically the centerpiece of Web 2.0
information collection and sharing environments that harness the collectiveintelligence of disparate communities.
Software above the level of a single device - Web 2.0 is accelerating the movement
from installable desktop applications to Web-based applications, thereby leveragingthe advantages of networks and information sharing.
Cross-device applications and mobility - Simultaneous with the adoption of Web
2.0 is the growing proliferation of Web-capable mobile devices. Ajax technologies
enable Web 2.0 applications across both large-screen desktops and small-screenmobile devices.
Because of competitive pressures, vendors often vie for your Ajax business basedon the developer productivity benefits they offer. Two common productivity features
are UI markup languages (UIMLs) and IDE integration. The UIMLs allow for the use
of declarative approaches using HTML and/or XML for large parts of an Ajaxapplication. IDEs can provide source code completion, source code highlighting,
drag-and-drop authoring, Javascript debugging, XHR monitors, run-time stack views,
and variable watching.
Ajax deployment offers several additional long-term strategic benefits, including:
Replacement for desktop applications - Ajax offers a desktop-like user experiencewhile retaining the benefits of server-based application deployment, centralized
infrastructure administration, easier scalability, and immediate availability of
application updates to all users. As a result, Ajax helps accelerate the movement awayfrom installable, two-tier, client-server applications to multi-tier web applications.
Higher customer expectations around user interface - The industry is embracing
richer, more desktop-like, user interfaces for customer-facing Web applications. Inmany circumstances, adopting Ajax techniques is becoming a business requirement to
maintain parity with the rest of the industry and match growing user expectations
about Web-based user experiences.
Operations efficiencies - In today's global economy, cost efficiency is moreimportant than ever. Ajax techniques can help maintain efficiency and
competitiveness of internal systems.
http://www.slideshare.net/JayaPrakash.m/Ajaxppt1
(http://www.sitepoint.com/build-your-own-ajax-web-apps/).
http://www.slideshare.net/JayaPrakash.m/Ajaxppt1http://www.slideshare.net/JayaPrakash.m/Ajaxppt1http://www.slideshare.net/JayaPrakash.m/Ajaxppt17/31/2019 Questions MIS AyaN
4/20
4) Global Supply Chains 351With increased globalization and offshore sourcing, global supply chain managementis becoming an important issue for many businesses. Like traditional, supply chain
management, the underlying factors behind the trend are reducing the costs of
procurement and decreasing the risks related to purchasing activities. The big
difference is that global supply chain management involves a company's worldwideinterests and suppliers rather than simply a local or national orientation.
Because global supply chain management usually involves a plethora of countries, italso usually comes with a plethora of new difficulties that need to be dealt with
appropriately. One that companies need to consider is the overall costs. While local
labor costs may be significantly lower, companies must also focus on the costs ofspace, tariffs, and other expenses related to doing business overseas. Additionally,
companies need to factor in the exchange rate. Obviously, companies must do their
research and give serious consideration to all of these different elements as part of
their global supply management approach.
Time is another big issue that should be addressed when dealing with global supply
chain management. The productivity of the overseas employees and the extendedshipping times can either positively or negatively affect the company's lead time, but
either way these times need to be figured into the overall procurement plan. Other
factors can also come into play here as well. For example, the weather conditions on
one side of the world often vary greatly from those on the other and can impactproduction and shipping dramatically. Also, customs clearance time and other
governmental red tape can add further delays that need to be planned for and figured
into the big picture.
Besides contemplating these issues, a business attempting to manage its global supply
chain must also ask itself a number of other serious questions.
First, the company needs to make decisions about its overall outsourcing plan.For whatever reason, businesses may desire to keep some aspects of supply chain
closer to home. However, these reasons are not quite as important as other countries
advance technologically. For example, soe parts of India have now become centers forhigh-tech outsourced services which may once have been done in-house only out of
necessity. Not only are provided to companies by highly qualified, overseas workers,
but they are being done at a fraction of the price they could be done in the UnitedStates or any other Western country.
Another issue that must be incorporated into a global supply chain management
strategy is supplier selection. Comparing vendor bids from within the company'sparent-country can be difficult enough but comparing bids from an array of global
suppliers can be even more complex. How to make these choices is one of the first
decisions companies must make, and it should be a decision firmly based on research.
Too often companies jump on the lowest price instead of taking the time to factor inall of the other elements, including those related to money and time which were
discussed above. Additionally, companies must make decisions about the number of
7/31/2019 Questions MIS AyaN
5/20
suppliers to use. Fewer supplies may be easier to manage but could also lead to
potential problems if one vendor is unable to deliver as expected or if one vendor triesto leverage its supply power to obtain price concessions.
Finally, companies who choose to ship their manufacturing overseas may have to face
some additional considerations as well. Questions regarding the number of plants thatare needed, as well as the locations for those plants can pose difficult logistical
problems for companies. However, it often helps to examine these issues in terms of
the global supply chain. For example, if a business uses a number of vendors aroundBangalore, India than it may make sense to locate the manufacturing plant that would
utilize those supplies in or around Bangalore as well. Not only will this provide lower
employee costs, but overall shipping and tariff expenses should also be reduced. Thiswould then save the company money.
5) Cloud Computing 171 +184
Cloud computing is a technology that uses the internet and central remote servers to
maintain data and applications. Cloud computing allows consumers and businesses to
use applications without installation and access their personal files at any computer
with internet access. This technology allows for much more efficient computing by
centralizing storage, memory, processing and bandwidth.
A simple example of cloud computing is Yahoo email, Gmail, or Hotmail etc. You
dont need software or a server to use them. All a consumer would need is just an
internet connection and you can start sending emails. The server and email
management software is all on the cloud (internet) and is totally managed by the cloud
service provider Yahoo, Google etc. The consumer gets to use the software alone and
enjoy the benefits. The analogy is, 'If you need milk, would you buy a cow?' All the
users or consumers need is to get the benefits of using the software or hardware of the
computer like sending emails etc. Just to get this benefit (milk) why should a consumer
buy a (cow) software /hardware?
Cloud computing is broken down into three segments: "application" "storage" and
"connectivity." Each segment serves a different purpose and offers different products
for businesses and individuals around the world. In June 2011, a study conducted byVersion One found that 91% of senior IT professionals actually don't know what cloud
computing is and two-thirds of senior finance professionals are clear by the
concept, highlighting the young nature of the technology. In Sept 2011, an Aberdeen
Group study found that disciplined companies achieved on average an 68% increase in
7/31/2019 Questions MIS AyaN
6/20
their IT expense because cloud computing and only a 10% reduction in data center
power costs.
Basically implies that the software & h/W capabilities are provided as a service
over the internet
Cloud computing is the delivery ofcomputingas aservicerather than aproduct,whereby shared resources, software, and information are provided to computers andother devices as autility(like theelectricity grid) over anetwork(typically the
Internet).[1]
Cloud computing provides computation, software applications, data access,data
management and storage resources without requiring cloud users to know the location
and other details of the computing infrastructure.
End users access cloud basedapplicationsthrough aweb browseror a light weightdesktop ormobile appwhile the businesssoftwareand data are stored onserversat a
remote location. Cloud application providers strive to give the same or better serviceand performance as if the software programs were installed locally on end-usercomputers.
At the foundation of cloud computing is the broader concept of infrastructure
convergence (orConverged Infrastructure) andshared services.[2] This type of data
centre environment allows enterprises to get their applications up and running faster,with easier manageability and less maintenance, and enables IT to more rapidly adjust
IT resources (such as servers, storage, and networking) to meet fluctuating and
unpredictable business demand.[3][4]
Infrastructure as a Service (IaaS)
See also:Category:Cloud infrastructure
In this most basic cloud service model, cloud providers offer computers as physical or
more often asvirtual machines, raw (block) storage,firewalls,load balancers, andnetworks. IaaS providers supply these resources on demand from their large pools installed
indata centers.Local area networksincluding IP addresses are part of the offer. For the
wide areaconnectivity, the Internet can be used or - incarrier clouds- dedicatedvirtualprivate networkscan be configured.
To deploy their applications, cloud users then install operating system images on the
machines as well as their application software. In this model, it is the cloud user who is
responsible for patching and maintaining the operating systems and application software.
Cloud providers typically bill IaaS services on autility computingbasis, that is, cost willreflect the amount of resources allocated and consumed.
[edit]
Platform as a Service (PaaS)
Main article:Platform as a Service
See also:Category:Cloud platforms
In the PaaS model, cloud providers deliver acomputing platformand/orsolution stack
http://en.wikipedia.org/wiki/Computinghttp://en.wikipedia.org/wiki/Computinghttp://en.wikipedia.org/wiki/Computinghttp://en.wikipedia.org/wiki/Service_(economics)http://en.wikipedia.org/wiki/Service_(economics)http://en.wikipedia.org/wiki/Service_(economics)http://en.wikipedia.org/wiki/Product_(business)http://en.wikipedia.org/wiki/Product_(business)http://en.wikipedia.org/wiki/Product_(business)http://en.wikipedia.org/wiki/Utility_computinghttp://en.wikipedia.org/wiki/Utility_computinghttp://en.wikipedia.org/wiki/Utility_computinghttp://en.wikipedia.org/wiki/Electrical_gridhttp://en.wikipedia.org/wiki/Electrical_gridhttp://en.wikipedia.org/wiki/Electrical_gridhttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Application_softwarehttp://en.wikipedia.org/wiki/Application_softwarehttp://en.wikipedia.org/wiki/Application_softwarehttp://en.wikipedia.org/wiki/Web_browserhttp://en.wikipedia.org/wiki/Web_browserhttp://en.wikipedia.org/wiki/Web_browserhttp://en.wikipedia.org/wiki/Mobile_apphttp://en.wikipedia.org/wiki/Mobile_apphttp://en.wikipedia.org/wiki/Mobile_apphttp://en.wikipedia.org/wiki/Softwarehttp://en.wikipedia.org/wiki/Softwarehttp://en.wikipedia.org/wiki/Softwarehttp://en.wikipedia.org/wiki/Server_(computing)http://en.wikipedia.org/wiki/Server_(computing)http://en.wikipedia.org/wiki/Server_(computing)http://en.wikipedia.org/wiki/Converged_Infrastructurehttp://en.wikipedia.org/wiki/Converged_Infrastructurehttp://en.wikipedia.org/wiki/Converged_Infrastructurehttp://en.wikipedia.org/wiki/Shared_serviceshttp://en.wikipedia.org/wiki/Shared_serviceshttp://en.wikipedia.org/wiki/Shared_serviceshttp://en.wikipedia.org/wiki/Category:Cloud_infrastructurehttp://en.wikipedia.org/wiki/Category:Cloud_infrastructurehttp://en.wikipedia.org/wiki/Category:Cloud_infrastructurehttp://en.wikipedia.org/wiki/Virtual_machinehttp://en.wikipedia.org/wiki/Virtual_machinehttp://en.wikipedia.org/wiki/Virtual_machinehttp://en.wikipedia.org/wiki/Firewallshttp://en.wikipedia.org/wiki/Firewallshttp://en.wikipedia.org/wiki/Firewallshttp://en.wikipedia.org/wiki/Load_balancerhttp://en.wikipedia.org/wiki/Load_balancerhttp://en.wikipedia.org/wiki/Load_balancerhttp://en.wikipedia.org/wiki/Data_centershttp://en.wikipedia.org/wiki/Data_centershttp://en.wikipedia.org/wiki/Data_centershttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/WANhttp://en.wikipedia.org/wiki/WANhttp://en.wikipedia.org/wiki/Carrier_cloudhttp://en.wikipedia.org/wiki/Carrier_cloudhttp://en.wikipedia.org/wiki/Carrier_cloudhttp://en.wikipedia.org/wiki/Virtual_private_networkhttp://en.wikipedia.org/wiki/Virtual_private_networkhttp://en.wikipedia.org/wiki/Virtual_private_networkhttp://en.wikipedia.org/wiki/Virtual_private_networkhttp://en.wikipedia.org/wiki/Utility_computinghttp://en.wikipedia.org/wiki/Utility_computinghttp://en.wikipedia.org/wiki/Utility_computinghttp://en.wikipedia.org/w/index.php?title=Cloud_computing&action=edit§ion=6http://en.wikipedia.org/w/index.php?title=Cloud_computing&action=edit§ion=6http://en.wikipedia.org/w/index.php?title=Cloud_computing&action=edit§ion=6http://en.wikipedia.org/wiki/Platform_as_a_Servicehttp://en.wikipedia.org/wiki/Platform_as_a_Servicehttp://en.wikipedia.org/wiki/Platform_as_a_Servicehttp://en.wikipedia.org/wiki/Category:Cloud_platformshttp://en.wikipedia.org/wiki/Category:Cloud_platformshttp://en.wikipedia.org/wiki/Category:Cloud_platformshttp://en.wikipedia.org/wiki/Computing_platformhttp://en.wikipedia.org/wiki/Computing_platformhttp://en.wikipedia.org/wiki/Computing_platformhttp://en.wikipedia.org/wiki/Solution_stackhttp://en.wikipedia.org/wiki/Solution_stackhttp://en.wikipedia.org/wiki/Solution_stackhttp://en.wikipedia.org/wiki/Solution_stackhttp://en.wikipedia.org/wiki/Computing_platformhttp://en.wikipedia.org/wiki/Category:Cloud_platformshttp://en.wikipedia.org/wiki/Platform_as_a_Servicehttp://en.wikipedia.org/w/index.php?title=Cloud_computing&action=edit§ion=6http://en.wikipedia.org/wiki/Utility_computinghttp://en.wikipedia.org/wiki/Virtual_private_networkhttp://en.wikipedia.org/wiki/Virtual_private_networkhttp://en.wikipedia.org/wiki/Carrier_cloudhttp://en.wikipedia.org/wiki/WANhttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Data_centershttp://en.wikipedia.org/wiki/Load_balancerhttp://en.wikipedia.org/wiki/Firewallshttp://en.wikipedia.org/wiki/Virtual_machinehttp://en.wikipedia.org/wiki/Category:Cloud_infrastructurehttp://en.wikipedia.org/wiki/Shared_serviceshttp://en.wikipedia.org/wiki/Converged_Infrastructurehttp://en.wikipedia.org/wiki/Server_(computing)http://en.wikipedia.org/wiki/Softwarehttp://en.wikipedia.org/wiki/Mobile_apphttp://en.wikipedia.org/wiki/Web_browserhttp://en.wikipedia.org/wiki/Application_softwarehttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Electrical_gridhttp://en.wikipedia.org/wiki/Utility_computinghttp://en.wikipedia.org/wiki/Product_(business)http://en.wikipedia.org/wiki/Service_(economics)http://en.wikipedia.org/wiki/Computing7/31/2019 Questions MIS AyaN
7/20
typically including operating system, programming language execution environment,
database, and web server. Application developers can develop and run their softwaresolutions on a cloud platform without the cost and complexity of buying and managing the
underlying hardware and software layers. With some PaaS offers, the underlying compute
and storage resources scale automatically to match application demand such that the cloud
user does not have to allocate resources manually.[edit]
Software as a Service (SaaS)
Main article:Software as a Service
In this model, cloud providers install and operateapplication softwarein the cloud andcloud users access the software fromcloud clients. The cloud users do not manage the
cloud infrastructure and platform on which the application is running. This eliminates the
need to install and run the application on the cloud user's own computers simplifying
maintenance and support. What makes a cloud application different from other applicationsis itselasticity. This can be achieved by cloning tasks onto multiplevirtual machinesat
run-time to meet the changing work demand.Load balancersdistribute the work over the
set of virtual machines. This process is transparent to the cloud user who sees only a singleaccess point. To accomodate a large number of cloud users, cloud applications can bemultitenant, that is, any machine serves more than one cloud user organization. It is
common to refer to special types of cloud based application software with a similar naming
convention:desktop as a service, business process as a service,Test Environment as aService,communication as a service.
6) Moores law and Microproceesing power 171
7) RFID 284Radio frequency identification (RFID) is a generic term that is used to describe a system
that transmits the identity (in the form of a unique serial number) of an object or person
wirelessly, using radio waves. It's grouped under the broad category of automatic
identification technologies.
RFID is in use all around us. If you have ever chipped your pet with an ID tag, used
EZPass through a toll booth, or paid for gas using Speed Pass, you've used RFID. In
addition, RFID is increasingly used with biometric technologies for security.
Unlike ubiquitous UPC bar-code technology, RFID technology does not require contact or
line of sight for communication. RFID data can be read through the human body, clothing
and non-metallic materials.
COMPONENTS
A basic RFID system consists of three components:
http://en.wikipedia.org/w/index.php?title=Cloud_computing&action=edit§ion=7http://en.wikipedia.org/w/index.php?title=Cloud_computing&action=edit§ion=7http://en.wikipedia.org/w/index.php?title=Cloud_computing&action=edit§ion=7http://en.wikipedia.org/wiki/Software_as_a_Servicehttp://en.wikipedia.org/wiki/Software_as_a_Servicehttp://en.wikipedia.org/wiki/Software_as_a_Servicehttp://en.wikipedia.org/wiki/Application_softwarehttp://en.wikipedia.org/wiki/Application_softwarehttp://en.wikipedia.org/wiki/Application_softwarehttp://en.wikipedia.org/wiki/Cloud_clientshttp://en.wikipedia.org/wiki/Cloud_clientshttp://en.wikipedia.org/wiki/Cloud_clientshttp://en.wikipedia.org/wiki/Elasticityhttp://en.wikipedia.org/wiki/Elasticityhttp://en.wikipedia.org/wiki/Elasticityhttp://en.wikipedia.org/wiki/Virtual_machineshttp://en.wikipedia.org/wiki/Virtual_machineshttp://en.wikipedia.org/wiki/Virtual_machineshttp://en.wikipedia.org/wiki/Load_balancerhttp://en.wikipedia.org/wiki/Load_balancerhttp://en.wikipedia.org/wiki/Load_balancerhttp://en.wikipedia.org/wiki/Multitenanthttp://en.wikipedia.org/wiki/Multitenanthttp://en.wikipedia.org/wiki/Desktop_as_a_servicehttp://en.wikipedia.org/wiki/Desktop_as_a_servicehttp://en.wikipedia.org/wiki/Desktop_as_a_servicehttp://en.wikipedia.org/wiki/Test_Environment_as_a_Servicehttp://en.wikipedia.org/wiki/Test_Environment_as_a_Servicehttp://en.wikipedia.org/wiki/Test_Environment_as_a_Servicehttp://en.wikipedia.org/wiki/Test_Environment_as_a_Servicehttp://en.wikipedia.org/wiki/Communication_as_a_servicehttp://en.wikipedia.org/wiki/Communication_as_a_servicehttp://en.wikipedia.org/wiki/Communication_as_a_servicehttp://en.wikipedia.org/wiki/Communication_as_a_servicehttp://en.wikipedia.org/wiki/Test_Environment_as_a_Servicehttp://en.wikipedia.org/wiki/Test_Environment_as_a_Servicehttp://en.wikipedia.org/wiki/Desktop_as_a_servicehttp://en.wikipedia.org/wiki/Multitenanthttp://en.wikipedia.org/wiki/Load_balancerhttp://en.wikipedia.org/wiki/Virtual_machineshttp://en.wikipedia.org/wiki/Elasticityhttp://en.wikipedia.org/wiki/Cloud_clientshttp://en.wikipedia.org/wiki/Application_softwarehttp://en.wikipedia.org/wiki/Software_as_a_Servicehttp://en.wikipedia.org/w/index.php?title=Cloud_computing&action=edit§ion=77/31/2019 Questions MIS AyaN
8/20
An antenna or coil
A transceiver (with decoder)
A transponder (RF tag) electronically
programmed with unique information
The antenna emits radio signals to activate the tag and to read and write data to it.
The reader emits radio waves in ranges of anywhere from one inch to 100 feet or more,depending upon its power output and the radio frequency used. When an RFID tag passes
through the electromagnetic zone, it detects the reader's activation signal.
The reader decodes the data encoded in the tag's integrated circuit (silicon chip) and the data is
passed to the host computer for processing.
The purpose of an RFID system is to enable data to be transmitted by a portable device, called a
tag, which is read by an RFID reader and processed according to the needs of a particular
application. The data transmitted by the tag may provide identification or location information,
or specifics about the product tagged, such as price, color, date of purchase, etc. RFID
technology has been used by thousands of companies for a decade or more. . RFID quickly
gained attention because of its ability to track moving objects. As the technology is refined, more
pervasive - and invasive - uses for RFID tags are in the works.
A typical RFID tag consists of a microchip attached to a radio antenna mounted on a substrate.
The chip can store as much as 2 kilobytes of data.
To retrieve the data stored on an RFID tag, you need a reader. A typical reader is a device that
has one or more antennas that emit radio waves and receive signals back from the tag. The reader
then passes the information in digital form to a computer system.
CURRENT AND POTENTIAL USES OF RFID
Asset Tracking
It's no surprise that asset tracking is one of the most common uses of RFID. Companies can put
RFID tags on assets that are lost or stolen often, that are underutilized or that are just hard to
locate at the time they are needed. Just about every type of RFID system is used for asset
http://void%28-1%29/http://void%28-1%29/http://void%28-1%29/http://void%28-1%29/http://void%28-1%29/http://void%28-1%29/http://void%28-1%29/http://void%28-1%29/7/31/2019 Questions MIS AyaN
9/20
management. NYK Logistics, a third-party logistics provider based in Secaucus, N.J., needed to
track containers at its Long Beach, Calif., distribution center. It chose a real-time locating system
that uses active RFID beacons to locate container to within 10 feet.
Manufacturing
RFID has been used in manufacturing plants for more than a decade. It's used to track parts and
work in process and to reduce defects, increase throughput and manage the production of
different versions of the same product.
Supply Chain Management
RFID technology has been used in closed loop supply chains or to automate parts of the supply
chain within a company's control for years.
As standards emerge, companies are increasingly turning to RFID to track shipments among
supply chain partners.
Retailing
Retailers such as Best Buy, Metro, Target, Tesco and Wal-Mart are in the forefront of RFID
adoption. These retailers are currently focused on improving supply chain efficiency and making
sure product is on the shelf when customers want to buy it.
Payment Systems
RFID is all the rage in the supply chain world, but the technology is also catching on as a
convenient payment mechanism. One of the most popular uses of RFID today is to pay for road
tolls without stopping. These active systems have caught on in many countries, and quick servicerestaurants are experimenting with using the same active RFID tags to pay for meals at drive-
through windows.
Security and Access Control
RFID has long been used as an electronic key to control who has access to office buildings or
areas within office buildings. The first access control systems used low-frequency RFID tags.
Recently, vendors have introduced 13.56 MHz systems that offer longer read range. The
advantage of RFID is it is convenient (an employee can hold up a badge to unlock a door, rather
than looking for a key or swiping a magnetic stripe card) and because there is no contact between
the card and reader, there is less wear and tear, and therefore less maintenance.
As RFID technology evolves and becomes less expensive and more robust, it's likely that
companies and RFID vendors will develop many new applications to solve common and unique
business problems.
7/31/2019 Questions MIS AyaN
10/20
8) Fuzzy logic systems. 433
9) Types of information systems. 45 --- Check note book
An information system is a collection of hardware, software, data, people and
procedures that are designed to generate information that supports the day-to-day,short-range, and long-range activities of users in an organization. Information systems
generally are classified into five categories: office information systems, transaction
processing systems, management information systems, decision support systems, andexpert systems.
2. Transaction Processing Systems
A transaction processing system (TPS) is an information system that captures
and processes data generated during an organizations day-to-day transactions. Atransaction is a business activity such as a deposit, payment, order or reservation.
Clerical staff typically perform the activities associated with transactionprocessing, which include the following:
1. Recording a business activity such as a students registration, a
customers order, an employees timecard or a clients payment.
2. Confirming an action or triggering a response, such as printing a
students schedule, sending a thank-you note to a customer, generating an
employees paycheck or issuing a receipt to a client.
3. Maintaining data, which involves adding new data, changing existing
data, or removing unwanted data.
Transaction processing systems were among the first computerized systems
developed to process business dataa function originally called data
processing. Usually, the TPS computerized an existing manual system to allow
for faster processing, reduced clerical costs and improved customer service.
The first transaction processing systems usually used batch processing. With batchprocessing, transaction data is collected over a period of time and all transactions
are processed later, as a group. As computers became more powerful, systemdevelopers built online transaction processing systems. With online transaction
processing (OLTP) the computer processes transactions as they are
entered. When you register for classes, your school probably uses OLTP. The
registration administrative assistant enters your desired schedule and the computer
immediately prints your statement of classes. The invoices, however, often areprinted using batch processing, meaning all student invoices are printed and mailed
at a later date.
7/31/2019 Questions MIS AyaN
11/20
Today, most transaction processing systems use online transactionprocessing. Some routine processing tasks such as calculating paychecks or
printing invoices, however, are performed more effectively on a batch basis. For
these activities, many organizations still use batch processing techniques.
3. Management Information Systems
While computers were ideal for routine transaction processing, managers soon
realized that the computers capability of performing rapid calculations and datacomparisons could produce meaningful information for
management. Management information systems thus evolved out of transactionprocessing systems. A management information system, or MIS (pronounced
em-eye-ess), is an information system that generates accurate, timely and
organized information so managers and other users can make decisions, solve
problems, supervise activities, and track progress. Because it generates reports on
a regular basis, a management information system sometimes is calleda management reporting system (MRS).
Management information systems often are integrated with transaction processing
systems. To process a sales order, for example, the transaction processing system
records the sale, updates the customers account balance, and makes a deduction
from inventory. Using this information, the related management informationsystem can produce reports that recap daily sales activities; list customers with past
due account balances; graph slow or fast selling products; and highlight inventory
items that need reordering. A management information system focuses ongenerating information that management and other users need to perform their
jobs.
An MIS generates three basic types of information: detailed, summary andexception. Detailed information typically confirms transaction processing
activities. A Detailed Order Report is an example of a detail report. Summary
information consolidates data into a format that an individual can review quicklyand easily. To help synopsize information, a summary report typically contains
totals, tables, or graphs. An Inventory Summary Report is an example of
a summary report.
Exception information filters data to report information that is outside of a
normal condition. These conditions, called the exception criteria, define the
range of what is considered normal activity or status. An example of an exception
report is an Inventory Exception Report is an Inventory Exception Report that
notifies the purchasing department of items it needs to reorder. Exception reports
help managers save time because they do not have to search through a detailed
report for exceptions. Instead, an exception report brings exceptions to the
managers attention in an easily identifiable form. Exception reports thus help
them focus on situations that require immediate decisions or actions.
7/31/2019 Questions MIS AyaN
12/20
4. Decision Support Systems
Transaction processing and management information systems provide information
on a regular basis. Frequently, however, users need information not provided in
these reports to help them make decisions. A sales manager, for example, mightneed to determine how high to set yearly sales quotas based on increased sales and
lowered product costs. Decision support systems help provide information to
support such decisions.
A decision support system (DSS) is an information system designed to help users
reach a decision when a decision-making situation arises. A variety of DSSs existto help with a range of decisions.
A decision support system uses data from internal and/or external sources.
Internal sources of data might include sales, manufacturing, inventory, orfinancial data from an organizations database. Data from external sources could
include interest rates, population trends, and costs of new housing construction orraw material pricing. Users of a DSS, often managers, can manipulate the data
used in the DSS to help with decisions.
Some decision support systems include query language, statistical analysiscapabilities, spreadsheets, and graphics that help you extract data and evaluate the
results. Some decision support systems also include capabilities that allow you to
create a model of the factors affecting a decision. A simple model for determiningthe best product price, for example, would include factors for the expected sales
volume at each price level. With the model, you can ask what-if questions by
changing one or more of the factors and viewing the projected results. Many
people use application software packages to perform DSS functions. Usingspreadsheet software, for example, you can complete simple modeling tasks or
what-if scenarios.
A special type of DSS, called an executive information system (EIS), is designed
to support the information needs of executive management. Information in an EIS
is presented in charts and tables that show trends, ratios, and other managerialstatistics. Because executives usually focus on strategic issues, EISs rely on
external data sources such as the Dow Jones News/Retrieval service or the
Internet. These external data sources can provide current information on interest
rates, commodity prices, and other leading economic indicators.
To store all the necessary decision-making data, DSSs or EISs often use extremely
large databases, called data warehouses. A data warehouse stores and manages
the data required to analyze historical and current business circumstances.
5. Expert Systems
7/31/2019 Questions MIS AyaN
13/20
An expert system is an information system that captures and stores theknowledge of human experts and then imitates human reasoning and decision-
making processes for those who have less expertise. Expert systems are composed
of two main components: a knowledge base and inference rules. A knowledge
base is the combined subject knowledge and experiences of the humanexperts. The inference rules are a set of logical judgments applied to the
knowledge base each time a user describes a situation to the expert system.
Although expert systems can help decision-making at any level in an organization,
nonmanagement employees are the primary users who utilize them to help with
job-related decisions. Expert systems also successfully have resolved such diverseproblems as diagnosing illnesses, searching for oil and making soup.
Expert systems are one part of an exciting branch of computer science called
artificial intelligence. Artificial intelligence (AI) is the application of human
intelligence to computers. AI technology can sense your actions and, based onlogical assumptions and prior experience, will take the appropriate action to
complete the task. AI has a variety of capabilities, including speech recognition,logical reasoning, and creative responses.
Experts predict that AI eventually will be incorporated into most computer systems
and many individual software applications. Many word processing programsalready include speech recognition.
Integrated Information Systems
With todays sophisticated hardware, software and communications technologies,it often is difficult to classify a system as belonging uniquely to one of the five
information system types discussed. Much of todays application softwaresupports transaction processing and generates management information. Other
applications provide transaction processing, management information, and
decision support. Although expert systems still operate primarily as separatesystems, organizations increasingly are consolidating their information needs into
a single, integrated information system.
10)Business Intelligence as an Information Management tool 228
7/31/2019 Questions MIS AyaN
14/20
11) CRM systems increase profits for a company. 354
12)Digital certificates. 323
Anattachmentto an electronic message used forsecuritypurposes. The mostcommon use of a digital certificate is to verify that a user sending a message iswho he or she claims to be, and to provide the receiver with the means toencode a reply.
An individual wishing to send anencryptedmessage applies for a digitalcertificate from aCertificate Authority (CA). The CA issues an encrypted digitalcertificate containing the applicant'spublic keyand a variety of otheridentification information. The CA makes its own public key readily available
through print publicity or perhaps on theInternet.The recipient of an encrypted message uses the CA's public key to decode thedigital certificate attached to the message, verifies it as issued by the CA andthen obtains the sender's public key and identification information held withinthe certificate. With this information, the recipient can send an encrypted reply.The most widely used standard for digital certificates isX.509
http://www.webopedia.com/TERM/A/attachment.htmlhttp://www.webopedia.com/TERM/A/attachment.htmlhttp://www.webopedia.com/TERM/A/attachment.htmlhttp://www.webopedia.com/TERM/S/security.htmlhttp://www.webopedia.com/TERM/S/security.htmlhttp://www.webopedia.com/TERM/S/security.htmlhttp://www.webopedia.com/TERM/E/encryption.htmlhttp://www.webopedia.com/TERM/E/encryption.htmlhttp://www.webopedia.com/TERM/E/encryption.htmlhttp://www.webopedia.com/TERM/C/certification_authority.htmlhttp://www.webopedia.com/TERM/C/certification_authority.htmlhttp://www.webopedia.com/TERM/C/certification_authority.htmlhttp://www.webopedia.com/TERM/P/public_key_cryptography.htmlhttp://www.webopedia.com/TERM/P/public_key_cryptography.htmlhttp://www.webopedia.com/TERM/P/public_key_cryptography.htmlhttp://www.webopedia.com/TERM/I/Internet.htmlhttp://www.webopedia.com/TERM/I/Internet.htmlhttp://www.webopedia.com/TERM/I/Internet.htmlhttp://www.webopedia.com/TERM/X/X_509.htmlhttp://www.webopedia.com/TERM/X/X_509.htmlhttp://www.webopedia.com/TERM/X/X_509.htmlhttp://www.webopedia.com/TERM/X/X_509.htmlhttp://www.webopedia.com/TERM/I/Internet.htmlhttp://www.webopedia.com/TERM/P/public_key_cryptography.htmlhttp://www.webopedia.com/TERM/C/certification_authority.htmlhttp://www.webopedia.com/TERM/E/encryption.htmlhttp://www.webopedia.com/TERM/S/security.htmlhttp://www.webopedia.com/TERM/A/attachment.html7/31/2019 Questions MIS AyaN
15/20
13)TCP/IP Networks 256
14)Networking Topologies 258
http://www.csl.mtu.edu/cs4451/www/notes/Network%20Topologies.pdf
15)Object Oriented databases 217
Questions :
1) Benefits of enterprise systems.What are the challenges of enterprise systems? 53 + 344(http://e-learning.mfu.ac.th/mflu/1203371/chapter2_3.htm )
Challenges
http://www.csl.mtu.edu/cs4451/www/notes/Network%20Topologies.pdfhttp://www.csl.mtu.edu/cs4451/www/notes/Network%20Topologies.pdfhttp://e-learning.mfu.ac.th/mflu/1203371/chapter2_3.htmhttp://e-learning.mfu.ac.th/mflu/1203371/chapter2_3.htmhttp://e-learning.mfu.ac.th/mflu/1203371/chapter2_3.htmhttp://e-learning.mfu.ac.th/mflu/1203371/chapter2_3.htmhttp://www.csl.mtu.edu/cs4451/www/notes/Network%20Topologies.pdf7/31/2019 Questions MIS AyaN
16/20
Generally, enterprise systems have a lifespan of 10 to 20 years, after which point they can
be upgraded. Although this might seem like a long time, data within organizations
accumulates exponentially and may prove too difficult to manage and store using a single
software system. Data overflow and a subsequent slowdown in one department will
certainly have a ripple effect in other functions of an organization.
One challenge is the expense of purchasing, installing, and maintaining the hardware and
software that enables the enterprise system.
First challenge: delivering flexibility
The first challenge, delivering flexibility, stems (arise) from the way Enterprise Systems
manufacturing companies are being forced to respond to fast changes in customer
requirements and technology. This has placed huge demands on the flexibility of supply
chain systems. Key issues revolve around managing outsourced manufacturing partners
and suppliers, product transition (NPI, new products introduction), exception handling and
change management in orders, forecasting for capacity planning and long-lead timecomponents, product quality amongst others.
Second challenge: managing configuration complexity
The second challenge, configuration complexity, has been a growing issue since the 1980s.
Before then, most elements of the systems configuration the hardware, operating system,
database and storage, and applications were simple and easily tied together in one
system. Now, however, the typical configuration consists of several separate mini-systems.
For example, a complex high-end server solution has separate storage area networks,
networking equipment, and software stacks for the middleware, database, portals,
application servers and web servers. Managing this explosion in complexity (especially the
software components) has become a nightmare for Enterprise Systems manufacturers.
Another reason for the increase in system complexity is that customers demand more exact
specifications, and more customization, than ever before. Yet another is that the software
complexity has increased. And finally, solutions to today's complex requirements tend to
emphasize hardware and software equally, rather than one or the other as in the 1980s.
Third challenge: optimally servicing the installed equipment base
The third challenge, optimally servicing the installed equipment base, revolves around the
difficult task of support and warranties and servicing them cost effectively, both
proactively and reactively. The installed base is a huge potential source of upgrade
revenue, especially for software upgrades.
7/31/2019 Questions MIS AyaN
17/20
2) How does the Internet benefit the development of a global information system? Shouldall global systems be based on the Internet?
http://www.decisionsciences.org/decisionline/vol30/30_2/intl30_2.pdf
3) How do cultural, legal, political, and social expectations affect global business? 558
4) Discuss the role and influence the user plays in software development.
5) What is a GIS? Describe at least three ways in which a GIS could be used by modernbusiness. 465Ch 15
Geographic information systems are a special category of DSS that use data visualization
technology to analyze and display data for planning and decision-making in the form ofdigitized maps. GIS can best be used to support decisions that require knowledge about the
geographic distribution of people or other resources in scientific research, resource
management, and development planning. GIS have modeling capabilities, allowing managers
to change data and automatically revise business scenarios to find better solutions. Forinstance, a company could display its customers on a map and then design the most efficient
delivery route for its products. A second way in which it could be used would be to analyze
demographic information to decide where to open branch restaurants. A third use could becustomer demographic data and map information to locate people who are likely to become
customers for the companys services.
6) How does a company's use of information systems affect its corporate strategies? Providean example. 94
7) How is the security of a firm's information system and data affected by its people,organization, and technology? 12
8) Describe MIS and DSS and differentiate between them. 45 + ppt + note book
9) What types of relationships are possible in a relational database? Describe and give an
example of each.
These tables can be related in one of three different ways: one-to-one, one-to-many or
many-to-many.
One-to-One Relationships
http://www.decisionsciences.org/decisionline/vol30/30_2/intl30_2.pdfhttp://www.decisionsciences.org/decisionline/vol30/30_2/intl30_2.pdfhttp://www.decisionsciences.org/decisionline/vol30/30_2/intl30_2.pdf7/31/2019 Questions MIS AyaN
18/20
Two tables are related in a one-to-one (11) relationship if, for every row in the first
table, there is at most one row in the second table. True one-to-one relationships seldom
occur in the real world. This type of relationship is often created to get around some
limitation of the database management software rather than to model a real-world situation.
In Microsoft Access, one-to-one relationships may be necessary in a database when youhave to split a table into two or more tables because of security or performance concerns or
because of the limit of 255 columns per table. For example, you might keep most patient
information in tblPatient, but put especially sensitive information (e.g., patient name, social
security number and address) in tblConfidential (see Figure 3). Access to the information
in tblConfidential could be more restricted than for tblPatient. As a second example,
perhaps you need to transfer only a portion of a large table to some other application on a
regular basis. You can split the table into the transferred and the non-transferred pieces,
and join them in a one-to-one relationship.
Figure 3. The tables tblPatient and tblConfidential are related in a one-to-one relationship.
The primary key of both tables is PatientId.
Tables that are related in a one-to-one relationship should always have the same primary
key, which will serve as the join column.
One-to-Many Relationships
Two tables are related in a one-to-many (1M) relationship if for every row in the first
table, there can be zero, one, or many rows in the second table, but for every row in the
second table there is exactly one row in the first table. For example, each order for a pizza
delivery business can have multiple items. Therefore, tblOrder is related to tblOrderDetails
in a one-to-many relationship (see Figure 4). The one-to-many relationship is also referred
7/31/2019 Questions MIS AyaN
19/20
to as a parent-child or master-detail relationship. One-to-many relationships are the most
commonly modeled relationship.
Figure 4. There can be many detail lines for each order in the pizza delivery business, so
tblOrder and tblOrderDetails are related in a one-to-many relationship.
One-to-many relationships are also used to link base tables to information stored in lookup
tables. For example, tblPatient might have a short one-letter DischargeDiagnosis code,
which can be linked to a lookup table, tlkpDiagCode, to get more complete Diagnosis
descriptions (stored in DiagnosisName). In this case, tlkpDiagCode is related to tblPatient
in a one-to-many relationship (i.e., one row in the lookup table can be used in zero or more
rows in the patient table).
Many-to-Many Relationships
Two tables are related in a many-to-many (MM) relationship when for every row in the
first table, there can be many rows in the second table, and for every row in the second
table, there can be many rows in the first table. Many-to-many relationships can't be
directly modeled in relational database programs, including Microsoft Access. These types
of relationships must be broken into multiple one-to-many relationships. For example, a
patient may be covered by multiple insurance plans and a given insurance company covers
multiple patients. Thus, the tblPatient table in a medical database would be related to thetblInsurer table in a many-to-many relationship. In order to model the relationship between
these two tables, you would create a third, linking table, perhaps called tblPtInsurancePgm
that would contain a row for each insurance program under which a patient was covered
(see Figure 5). Then, the many-to-many relationship between tblPatient and tblInsurer
could be broken into two one-to-many relationships (tblPatient would be related to
7/31/2019 Questions MIS AyaN
20/20
tblPtInsurancePgm and tblInsurer would be related to tblPtInsurancePgm in one-to-many
relationships).
Figure 5. A linking table, tblPtInsurancePgm, is used to model the many-to-many
relationship between tblPatient and tblInsurer.
In Microsoft Access, you specify relationships using the EditRelationships command. In
addition, you can create ad-hoc relationships at any point, using queries.
10)You are a Manager of a company,How could you use information systems to achievegreater customer intimacy?
Recommended