Questions MIS AyaN

download Questions MIS AyaN

of 20

Transcript of Questions MIS AyaN

  • 7/31/2019 Questions MIS AyaN

    1/20

    Short Notes on :

    1) Distributed databases 223A database that consists of two or more data files located at different sites ona computer network. Because the database is distributed, different users canaccess it

    without interfering with one another. However, theDBMSmust periodically

    synchronize the scattered databases to make sure that they all have consistent data.

    Distributed databases ----- ch 10, slide 20

    A distributed database system is a collection of logically related databases that co-

    operate in a transparent manner.Transparent implies that each user within the system may access all of the data within

    all of the databases as if they were a single databaseThere should be location independence i.e.- as the user is unaware of where the data is

    located it is possible to move the data from one physical location to another without

    affecting the user.

    Types of ddbms

    Distributed Databases

    Partitioned: Separate locations store different parts of database

    Replicated: Central database duplicated in entirety at different locations

    http://www.webopedia.com/TERM/D/database.htmlhttp://www.webopedia.com/TERM/D/data.htmlhttp://www.webopedia.com/TERM/F/file.htmlhttp://www.webopedia.com/TERM/C/computer.htmlhttp://www.webopedia.com/TERM/N/network.htmlhttp://www.webopedia.com/TERM/U/user.htmlhttp://www.webopedia.com/TERM/A/access.htmlhttp://www.webopedia.com/TERM/D/database_management_system_DBMS.htmlhttp://www.webopedia.com/TERM/D/database_management_system_DBMS.htmlhttp://www.webopedia.com/TERM/D/database_management_system_DBMS.htmlhttp://www.webopedia.com/TERM/D/database_management_system_DBMS.htmlhttp://www.webopedia.com/TERM/A/access.htmlhttp://www.webopedia.com/TERM/U/user.htmlhttp://www.webopedia.com/TERM/N/network.htmlhttp://www.webopedia.com/TERM/C/computer.htmlhttp://www.webopedia.com/TERM/F/file.htmlhttp://www.webopedia.com/TERM/D/data.htmlhttp://www.webopedia.com/TERM/D/database.html
  • 7/31/2019 Questions MIS AyaN

    2/20

    Advantages

    Reduced Communication Overhead Most data access is local, less expensive and performs

    better.

    Improved Processing Power Instead of one server handling the full database, we now

    have a collection of machines handling the same database.

    Removal of Reliance on a Central Site

    If a server fails, then the only part of the system that is affected is the relevant local site. The rest

    of the system remains functional and available.

    Expandability It is easier to accommodate increasing the size of the

    global (logical) database.

    Disadvantages

    DrawbacksDepartures from using standard definitions

    Security problems

    2) Wireless Computer Networks 281

    WPANWLAN 802.11

    WMAN 802.16

    Mobile telecommunicaion-GSM

    3) Ajax 189-a new software techniques for enabling Web applications.

    Introduction-In the world of Web development, the move from HTML to Ajax-

    powered HTML often can be achieved at a relatively low cost, but there are both directand indirect costs associated with Ajax that must be taken into account. A close

    analysis of these factors will enable business managers to make more well-informed

    decisions when considering Ajax adoption within a particular application and acrosstheir organization.

    Let's first look at the expected benefits from Ajax.

    Ajax is all about ways to create a more interactive and productive connection between

    a user and a Web-based application. Because Ajax provides similar advanced userinterface features to those in desktop applications (such as advanced UI controls,

    animated effects and adjustable layout controls) -- thereby providing the visual andinteraction tools needed to make the application self-explanatory -- users spend lesstime learning and operating the application. The Ajax partial page update feature

    minimizes user delays by eliminating the "click, wait, and refresh" approach of pre-

    Ajax HTML applications.

    Beyond better user interfaces for existing applications, Ajax enables new classes of

    applications that fall under the umbrella term "Web 2.0" and that also fit into a service-

  • 7/31/2019 Questions MIS AyaN

    3/20

    oriented architecture (SOA). Among the next-generation applications that will power

    the enterprise and the Internet of the future are the following:

    Users as co-developers - New Ajax-powered environments, such as "application

    wikis," are empowering users to create their own customized mashups that include

    personalized dashboards and situational composite applications. Collaboration- Ajax technologies are typically the centerpiece of Web 2.0

    information collection and sharing environments that harness the collectiveintelligence of disparate communities.

    Software above the level of a single device - Web 2.0 is accelerating the movement

    from installable desktop applications to Web-based applications, thereby leveragingthe advantages of networks and information sharing.

    Cross-device applications and mobility - Simultaneous with the adoption of Web

    2.0 is the growing proliferation of Web-capable mobile devices. Ajax technologies

    enable Web 2.0 applications across both large-screen desktops and small-screenmobile devices.

    Because of competitive pressures, vendors often vie for your Ajax business basedon the developer productivity benefits they offer. Two common productivity features

    are UI markup languages (UIMLs) and IDE integration. The UIMLs allow for the use

    of declarative approaches using HTML and/or XML for large parts of an Ajaxapplication. IDEs can provide source code completion, source code highlighting,

    drag-and-drop authoring, Javascript debugging, XHR monitors, run-time stack views,

    and variable watching.

    Ajax deployment offers several additional long-term strategic benefits, including:

    Replacement for desktop applications - Ajax offers a desktop-like user experiencewhile retaining the benefits of server-based application deployment, centralized

    infrastructure administration, easier scalability, and immediate availability of

    application updates to all users. As a result, Ajax helps accelerate the movement awayfrom installable, two-tier, client-server applications to multi-tier web applications.

    Higher customer expectations around user interface - The industry is embracing

    richer, more desktop-like, user interfaces for customer-facing Web applications. Inmany circumstances, adopting Ajax techniques is becoming a business requirement to

    maintain parity with the rest of the industry and match growing user expectations

    about Web-based user experiences.

    Operations efficiencies - In today's global economy, cost efficiency is moreimportant than ever. Ajax techniques can help maintain efficiency and

    competitiveness of internal systems.

    http://www.slideshare.net/JayaPrakash.m/Ajaxppt1

    (http://www.sitepoint.com/build-your-own-ajax-web-apps/).

    http://www.slideshare.net/JayaPrakash.m/Ajaxppt1http://www.slideshare.net/JayaPrakash.m/Ajaxppt1http://www.slideshare.net/JayaPrakash.m/Ajaxppt1
  • 7/31/2019 Questions MIS AyaN

    4/20

    4) Global Supply Chains 351With increased globalization and offshore sourcing, global supply chain managementis becoming an important issue for many businesses. Like traditional, supply chain

    management, the underlying factors behind the trend are reducing the costs of

    procurement and decreasing the risks related to purchasing activities. The big

    difference is that global supply chain management involves a company's worldwideinterests and suppliers rather than simply a local or national orientation.

    Because global supply chain management usually involves a plethora of countries, italso usually comes with a plethora of new difficulties that need to be dealt with

    appropriately. One that companies need to consider is the overall costs. While local

    labor costs may be significantly lower, companies must also focus on the costs ofspace, tariffs, and other expenses related to doing business overseas. Additionally,

    companies need to factor in the exchange rate. Obviously, companies must do their

    research and give serious consideration to all of these different elements as part of

    their global supply management approach.

    Time is another big issue that should be addressed when dealing with global supply

    chain management. The productivity of the overseas employees and the extendedshipping times can either positively or negatively affect the company's lead time, but

    either way these times need to be figured into the overall procurement plan. Other

    factors can also come into play here as well. For example, the weather conditions on

    one side of the world often vary greatly from those on the other and can impactproduction and shipping dramatically. Also, customs clearance time and other

    governmental red tape can add further delays that need to be planned for and figured

    into the big picture.

    Besides contemplating these issues, a business attempting to manage its global supply

    chain must also ask itself a number of other serious questions.

    First, the company needs to make decisions about its overall outsourcing plan.For whatever reason, businesses may desire to keep some aspects of supply chain

    closer to home. However, these reasons are not quite as important as other countries

    advance technologically. For example, soe parts of India have now become centers forhigh-tech outsourced services which may once have been done in-house only out of

    necessity. Not only are provided to companies by highly qualified, overseas workers,

    but they are being done at a fraction of the price they could be done in the UnitedStates or any other Western country.

    Another issue that must be incorporated into a global supply chain management

    strategy is supplier selection. Comparing vendor bids from within the company'sparent-country can be difficult enough but comparing bids from an array of global

    suppliers can be even more complex. How to make these choices is one of the first

    decisions companies must make, and it should be a decision firmly based on research.

    Too often companies jump on the lowest price instead of taking the time to factor inall of the other elements, including those related to money and time which were

    discussed above. Additionally, companies must make decisions about the number of

  • 7/31/2019 Questions MIS AyaN

    5/20

    suppliers to use. Fewer supplies may be easier to manage but could also lead to

    potential problems if one vendor is unable to deliver as expected or if one vendor triesto leverage its supply power to obtain price concessions.

    Finally, companies who choose to ship their manufacturing overseas may have to face

    some additional considerations as well. Questions regarding the number of plants thatare needed, as well as the locations for those plants can pose difficult logistical

    problems for companies. However, it often helps to examine these issues in terms of

    the global supply chain. For example, if a business uses a number of vendors aroundBangalore, India than it may make sense to locate the manufacturing plant that would

    utilize those supplies in or around Bangalore as well. Not only will this provide lower

    employee costs, but overall shipping and tariff expenses should also be reduced. Thiswould then save the company money.

    5) Cloud Computing 171 +184

    Cloud computing is a technology that uses the internet and central remote servers to

    maintain data and applications. Cloud computing allows consumers and businesses to

    use applications without installation and access their personal files at any computer

    with internet access. This technology allows for much more efficient computing by

    centralizing storage, memory, processing and bandwidth.

    A simple example of cloud computing is Yahoo email, Gmail, or Hotmail etc. You

    dont need software or a server to use them. All a consumer would need is just an

    internet connection and you can start sending emails. The server and email

    management software is all on the cloud (internet) and is totally managed by the cloud

    service provider Yahoo, Google etc. The consumer gets to use the software alone and

    enjoy the benefits. The analogy is, 'If you need milk, would you buy a cow?' All the

    users or consumers need is to get the benefits of using the software or hardware of the

    computer like sending emails etc. Just to get this benefit (milk) why should a consumer

    buy a (cow) software /hardware?

    Cloud computing is broken down into three segments: "application" "storage" and

    "connectivity." Each segment serves a different purpose and offers different products

    for businesses and individuals around the world. In June 2011, a study conducted byVersion One found that 91% of senior IT professionals actually don't know what cloud

    computing is and two-thirds of senior finance professionals are clear by the

    concept, highlighting the young nature of the technology. In Sept 2011, an Aberdeen

    Group study found that disciplined companies achieved on average an 68% increase in

  • 7/31/2019 Questions MIS AyaN

    6/20

    their IT expense because cloud computing and only a 10% reduction in data center

    power costs.

    Basically implies that the software & h/W capabilities are provided as a service

    over the internet

    Cloud computing is the delivery ofcomputingas aservicerather than aproduct,whereby shared resources, software, and information are provided to computers andother devices as autility(like theelectricity grid) over anetwork(typically the

    Internet).[1]

    Cloud computing provides computation, software applications, data access,data

    management and storage resources without requiring cloud users to know the location

    and other details of the computing infrastructure.

    End users access cloud basedapplicationsthrough aweb browseror a light weightdesktop ormobile appwhile the businesssoftwareand data are stored onserversat a

    remote location. Cloud application providers strive to give the same or better serviceand performance as if the software programs were installed locally on end-usercomputers.

    At the foundation of cloud computing is the broader concept of infrastructure

    convergence (orConverged Infrastructure) andshared services.[2] This type of data

    centre environment allows enterprises to get their applications up and running faster,with easier manageability and less maintenance, and enables IT to more rapidly adjust

    IT resources (such as servers, storage, and networking) to meet fluctuating and

    unpredictable business demand.[3][4]

    Infrastructure as a Service (IaaS)

    See also:Category:Cloud infrastructure

    In this most basic cloud service model, cloud providers offer computers as physical or

    more often asvirtual machines, raw (block) storage,firewalls,load balancers, andnetworks. IaaS providers supply these resources on demand from their large pools installed

    indata centers.Local area networksincluding IP addresses are part of the offer. For the

    wide areaconnectivity, the Internet can be used or - incarrier clouds- dedicatedvirtualprivate networkscan be configured.

    To deploy their applications, cloud users then install operating system images on the

    machines as well as their application software. In this model, it is the cloud user who is

    responsible for patching and maintaining the operating systems and application software.

    Cloud providers typically bill IaaS services on autility computingbasis, that is, cost willreflect the amount of resources allocated and consumed.

    [edit]

    Platform as a Service (PaaS)

    Main article:Platform as a Service

    See also:Category:Cloud platforms

    In the PaaS model, cloud providers deliver acomputing platformand/orsolution stack

    http://en.wikipedia.org/wiki/Computinghttp://en.wikipedia.org/wiki/Computinghttp://en.wikipedia.org/wiki/Computinghttp://en.wikipedia.org/wiki/Service_(economics)http://en.wikipedia.org/wiki/Service_(economics)http://en.wikipedia.org/wiki/Service_(economics)http://en.wikipedia.org/wiki/Product_(business)http://en.wikipedia.org/wiki/Product_(business)http://en.wikipedia.org/wiki/Product_(business)http://en.wikipedia.org/wiki/Utility_computinghttp://en.wikipedia.org/wiki/Utility_computinghttp://en.wikipedia.org/wiki/Utility_computinghttp://en.wikipedia.org/wiki/Electrical_gridhttp://en.wikipedia.org/wiki/Electrical_gridhttp://en.wikipedia.org/wiki/Electrical_gridhttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Application_softwarehttp://en.wikipedia.org/wiki/Application_softwarehttp://en.wikipedia.org/wiki/Application_softwarehttp://en.wikipedia.org/wiki/Web_browserhttp://en.wikipedia.org/wiki/Web_browserhttp://en.wikipedia.org/wiki/Web_browserhttp://en.wikipedia.org/wiki/Mobile_apphttp://en.wikipedia.org/wiki/Mobile_apphttp://en.wikipedia.org/wiki/Mobile_apphttp://en.wikipedia.org/wiki/Softwarehttp://en.wikipedia.org/wiki/Softwarehttp://en.wikipedia.org/wiki/Softwarehttp://en.wikipedia.org/wiki/Server_(computing)http://en.wikipedia.org/wiki/Server_(computing)http://en.wikipedia.org/wiki/Server_(computing)http://en.wikipedia.org/wiki/Converged_Infrastructurehttp://en.wikipedia.org/wiki/Converged_Infrastructurehttp://en.wikipedia.org/wiki/Converged_Infrastructurehttp://en.wikipedia.org/wiki/Shared_serviceshttp://en.wikipedia.org/wiki/Shared_serviceshttp://en.wikipedia.org/wiki/Shared_serviceshttp://en.wikipedia.org/wiki/Category:Cloud_infrastructurehttp://en.wikipedia.org/wiki/Category:Cloud_infrastructurehttp://en.wikipedia.org/wiki/Category:Cloud_infrastructurehttp://en.wikipedia.org/wiki/Virtual_machinehttp://en.wikipedia.org/wiki/Virtual_machinehttp://en.wikipedia.org/wiki/Virtual_machinehttp://en.wikipedia.org/wiki/Firewallshttp://en.wikipedia.org/wiki/Firewallshttp://en.wikipedia.org/wiki/Firewallshttp://en.wikipedia.org/wiki/Load_balancerhttp://en.wikipedia.org/wiki/Load_balancerhttp://en.wikipedia.org/wiki/Load_balancerhttp://en.wikipedia.org/wiki/Data_centershttp://en.wikipedia.org/wiki/Data_centershttp://en.wikipedia.org/wiki/Data_centershttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/WANhttp://en.wikipedia.org/wiki/WANhttp://en.wikipedia.org/wiki/Carrier_cloudhttp://en.wikipedia.org/wiki/Carrier_cloudhttp://en.wikipedia.org/wiki/Carrier_cloudhttp://en.wikipedia.org/wiki/Virtual_private_networkhttp://en.wikipedia.org/wiki/Virtual_private_networkhttp://en.wikipedia.org/wiki/Virtual_private_networkhttp://en.wikipedia.org/wiki/Virtual_private_networkhttp://en.wikipedia.org/wiki/Utility_computinghttp://en.wikipedia.org/wiki/Utility_computinghttp://en.wikipedia.org/wiki/Utility_computinghttp://en.wikipedia.org/w/index.php?title=Cloud_computing&action=edit&section=6http://en.wikipedia.org/w/index.php?title=Cloud_computing&action=edit&section=6http://en.wikipedia.org/w/index.php?title=Cloud_computing&action=edit&section=6http://en.wikipedia.org/wiki/Platform_as_a_Servicehttp://en.wikipedia.org/wiki/Platform_as_a_Servicehttp://en.wikipedia.org/wiki/Platform_as_a_Servicehttp://en.wikipedia.org/wiki/Category:Cloud_platformshttp://en.wikipedia.org/wiki/Category:Cloud_platformshttp://en.wikipedia.org/wiki/Category:Cloud_platformshttp://en.wikipedia.org/wiki/Computing_platformhttp://en.wikipedia.org/wiki/Computing_platformhttp://en.wikipedia.org/wiki/Computing_platformhttp://en.wikipedia.org/wiki/Solution_stackhttp://en.wikipedia.org/wiki/Solution_stackhttp://en.wikipedia.org/wiki/Solution_stackhttp://en.wikipedia.org/wiki/Solution_stackhttp://en.wikipedia.org/wiki/Computing_platformhttp://en.wikipedia.org/wiki/Category:Cloud_platformshttp://en.wikipedia.org/wiki/Platform_as_a_Servicehttp://en.wikipedia.org/w/index.php?title=Cloud_computing&action=edit&section=6http://en.wikipedia.org/wiki/Utility_computinghttp://en.wikipedia.org/wiki/Virtual_private_networkhttp://en.wikipedia.org/wiki/Virtual_private_networkhttp://en.wikipedia.org/wiki/Carrier_cloudhttp://en.wikipedia.org/wiki/WANhttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Data_centershttp://en.wikipedia.org/wiki/Load_balancerhttp://en.wikipedia.org/wiki/Firewallshttp://en.wikipedia.org/wiki/Virtual_machinehttp://en.wikipedia.org/wiki/Category:Cloud_infrastructurehttp://en.wikipedia.org/wiki/Shared_serviceshttp://en.wikipedia.org/wiki/Converged_Infrastructurehttp://en.wikipedia.org/wiki/Server_(computing)http://en.wikipedia.org/wiki/Softwarehttp://en.wikipedia.org/wiki/Mobile_apphttp://en.wikipedia.org/wiki/Web_browserhttp://en.wikipedia.org/wiki/Application_softwarehttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Electrical_gridhttp://en.wikipedia.org/wiki/Utility_computinghttp://en.wikipedia.org/wiki/Product_(business)http://en.wikipedia.org/wiki/Service_(economics)http://en.wikipedia.org/wiki/Computing
  • 7/31/2019 Questions MIS AyaN

    7/20

    typically including operating system, programming language execution environment,

    database, and web server. Application developers can develop and run their softwaresolutions on a cloud platform without the cost and complexity of buying and managing the

    underlying hardware and software layers. With some PaaS offers, the underlying compute

    and storage resources scale automatically to match application demand such that the cloud

    user does not have to allocate resources manually.[edit]

    Software as a Service (SaaS)

    Main article:Software as a Service

    In this model, cloud providers install and operateapplication softwarein the cloud andcloud users access the software fromcloud clients. The cloud users do not manage the

    cloud infrastructure and platform on which the application is running. This eliminates the

    need to install and run the application on the cloud user's own computers simplifying

    maintenance and support. What makes a cloud application different from other applicationsis itselasticity. This can be achieved by cloning tasks onto multiplevirtual machinesat

    run-time to meet the changing work demand.Load balancersdistribute the work over the

    set of virtual machines. This process is transparent to the cloud user who sees only a singleaccess point. To accomodate a large number of cloud users, cloud applications can bemultitenant, that is, any machine serves more than one cloud user organization. It is

    common to refer to special types of cloud based application software with a similar naming

    convention:desktop as a service, business process as a service,Test Environment as aService,communication as a service.

    6) Moores law and Microproceesing power 171

    7) RFID 284Radio frequency identification (RFID) is a generic term that is used to describe a system

    that transmits the identity (in the form of a unique serial number) of an object or person

    wirelessly, using radio waves. It's grouped under the broad category of automatic

    identification technologies.

    RFID is in use all around us. If you have ever chipped your pet with an ID tag, used

    EZPass through a toll booth, or paid for gas using Speed Pass, you've used RFID. In

    addition, RFID is increasingly used with biometric technologies for security.

    Unlike ubiquitous UPC bar-code technology, RFID technology does not require contact or

    line of sight for communication. RFID data can be read through the human body, clothing

    and non-metallic materials.

    COMPONENTS

    A basic RFID system consists of three components:

    http://en.wikipedia.org/w/index.php?title=Cloud_computing&action=edit&section=7http://en.wikipedia.org/w/index.php?title=Cloud_computing&action=edit&section=7http://en.wikipedia.org/w/index.php?title=Cloud_computing&action=edit&section=7http://en.wikipedia.org/wiki/Software_as_a_Servicehttp://en.wikipedia.org/wiki/Software_as_a_Servicehttp://en.wikipedia.org/wiki/Software_as_a_Servicehttp://en.wikipedia.org/wiki/Application_softwarehttp://en.wikipedia.org/wiki/Application_softwarehttp://en.wikipedia.org/wiki/Application_softwarehttp://en.wikipedia.org/wiki/Cloud_clientshttp://en.wikipedia.org/wiki/Cloud_clientshttp://en.wikipedia.org/wiki/Cloud_clientshttp://en.wikipedia.org/wiki/Elasticityhttp://en.wikipedia.org/wiki/Elasticityhttp://en.wikipedia.org/wiki/Elasticityhttp://en.wikipedia.org/wiki/Virtual_machineshttp://en.wikipedia.org/wiki/Virtual_machineshttp://en.wikipedia.org/wiki/Virtual_machineshttp://en.wikipedia.org/wiki/Load_balancerhttp://en.wikipedia.org/wiki/Load_balancerhttp://en.wikipedia.org/wiki/Load_balancerhttp://en.wikipedia.org/wiki/Multitenanthttp://en.wikipedia.org/wiki/Multitenanthttp://en.wikipedia.org/wiki/Desktop_as_a_servicehttp://en.wikipedia.org/wiki/Desktop_as_a_servicehttp://en.wikipedia.org/wiki/Desktop_as_a_servicehttp://en.wikipedia.org/wiki/Test_Environment_as_a_Servicehttp://en.wikipedia.org/wiki/Test_Environment_as_a_Servicehttp://en.wikipedia.org/wiki/Test_Environment_as_a_Servicehttp://en.wikipedia.org/wiki/Test_Environment_as_a_Servicehttp://en.wikipedia.org/wiki/Communication_as_a_servicehttp://en.wikipedia.org/wiki/Communication_as_a_servicehttp://en.wikipedia.org/wiki/Communication_as_a_servicehttp://en.wikipedia.org/wiki/Communication_as_a_servicehttp://en.wikipedia.org/wiki/Test_Environment_as_a_Servicehttp://en.wikipedia.org/wiki/Test_Environment_as_a_Servicehttp://en.wikipedia.org/wiki/Desktop_as_a_servicehttp://en.wikipedia.org/wiki/Multitenanthttp://en.wikipedia.org/wiki/Load_balancerhttp://en.wikipedia.org/wiki/Virtual_machineshttp://en.wikipedia.org/wiki/Elasticityhttp://en.wikipedia.org/wiki/Cloud_clientshttp://en.wikipedia.org/wiki/Application_softwarehttp://en.wikipedia.org/wiki/Software_as_a_Servicehttp://en.wikipedia.org/w/index.php?title=Cloud_computing&action=edit&section=7
  • 7/31/2019 Questions MIS AyaN

    8/20

    An antenna or coil

    A transceiver (with decoder)

    A transponder (RF tag) electronically

    programmed with unique information

    The antenna emits radio signals to activate the tag and to read and write data to it.

    The reader emits radio waves in ranges of anywhere from one inch to 100 feet or more,depending upon its power output and the radio frequency used. When an RFID tag passes

    through the electromagnetic zone, it detects the reader's activation signal.

    The reader decodes the data encoded in the tag's integrated circuit (silicon chip) and the data is

    passed to the host computer for processing.

    The purpose of an RFID system is to enable data to be transmitted by a portable device, called a

    tag, which is read by an RFID reader and processed according to the needs of a particular

    application. The data transmitted by the tag may provide identification or location information,

    or specifics about the product tagged, such as price, color, date of purchase, etc. RFID

    technology has been used by thousands of companies for a decade or more. . RFID quickly

    gained attention because of its ability to track moving objects. As the technology is refined, more

    pervasive - and invasive - uses for RFID tags are in the works.

    A typical RFID tag consists of a microchip attached to a radio antenna mounted on a substrate.

    The chip can store as much as 2 kilobytes of data.

    To retrieve the data stored on an RFID tag, you need a reader. A typical reader is a device that

    has one or more antennas that emit radio waves and receive signals back from the tag. The reader

    then passes the information in digital form to a computer system.

    CURRENT AND POTENTIAL USES OF RFID

    Asset Tracking

    It's no surprise that asset tracking is one of the most common uses of RFID. Companies can put

    RFID tags on assets that are lost or stolen often, that are underutilized or that are just hard to

    locate at the time they are needed. Just about every type of RFID system is used for asset

    http://void%28-1%29/http://void%28-1%29/http://void%28-1%29/http://void%28-1%29/http://void%28-1%29/http://void%28-1%29/http://void%28-1%29/http://void%28-1%29/
  • 7/31/2019 Questions MIS AyaN

    9/20

    management. NYK Logistics, a third-party logistics provider based in Secaucus, N.J., needed to

    track containers at its Long Beach, Calif., distribution center. It chose a real-time locating system

    that uses active RFID beacons to locate container to within 10 feet.

    Manufacturing

    RFID has been used in manufacturing plants for more than a decade. It's used to track parts and

    work in process and to reduce defects, increase throughput and manage the production of

    different versions of the same product.

    Supply Chain Management

    RFID technology has been used in closed loop supply chains or to automate parts of the supply

    chain within a company's control for years.

    As standards emerge, companies are increasingly turning to RFID to track shipments among

    supply chain partners.

    Retailing

    Retailers such as Best Buy, Metro, Target, Tesco and Wal-Mart are in the forefront of RFID

    adoption. These retailers are currently focused on improving supply chain efficiency and making

    sure product is on the shelf when customers want to buy it.

    Payment Systems

    RFID is all the rage in the supply chain world, but the technology is also catching on as a

    convenient payment mechanism. One of the most popular uses of RFID today is to pay for road

    tolls without stopping. These active systems have caught on in many countries, and quick servicerestaurants are experimenting with using the same active RFID tags to pay for meals at drive-

    through windows.

    Security and Access Control

    RFID has long been used as an electronic key to control who has access to office buildings or

    areas within office buildings. The first access control systems used low-frequency RFID tags.

    Recently, vendors have introduced 13.56 MHz systems that offer longer read range. The

    advantage of RFID is it is convenient (an employee can hold up a badge to unlock a door, rather

    than looking for a key or swiping a magnetic stripe card) and because there is no contact between

    the card and reader, there is less wear and tear, and therefore less maintenance.

    As RFID technology evolves and becomes less expensive and more robust, it's likely that

    companies and RFID vendors will develop many new applications to solve common and unique

    business problems.

  • 7/31/2019 Questions MIS AyaN

    10/20

    8) Fuzzy logic systems. 433

    9) Types of information systems. 45 --- Check note book

    An information system is a collection of hardware, software, data, people and

    procedures that are designed to generate information that supports the day-to-day,short-range, and long-range activities of users in an organization. Information systems

    generally are classified into five categories: office information systems, transaction

    processing systems, management information systems, decision support systems, andexpert systems.

    2. Transaction Processing Systems

    A transaction processing system (TPS) is an information system that captures

    and processes data generated during an organizations day-to-day transactions. Atransaction is a business activity such as a deposit, payment, order or reservation.

    Clerical staff typically perform the activities associated with transactionprocessing, which include the following:

    1. Recording a business activity such as a students registration, a

    customers order, an employees timecard or a clients payment.

    2. Confirming an action or triggering a response, such as printing a

    students schedule, sending a thank-you note to a customer, generating an

    employees paycheck or issuing a receipt to a client.

    3. Maintaining data, which involves adding new data, changing existing

    data, or removing unwanted data.

    Transaction processing systems were among the first computerized systems

    developed to process business dataa function originally called data

    processing. Usually, the TPS computerized an existing manual system to allow

    for faster processing, reduced clerical costs and improved customer service.

    The first transaction processing systems usually used batch processing. With batchprocessing, transaction data is collected over a period of time and all transactions

    are processed later, as a group. As computers became more powerful, systemdevelopers built online transaction processing systems. With online transaction

    processing (OLTP) the computer processes transactions as they are

    entered. When you register for classes, your school probably uses OLTP. The

    registration administrative assistant enters your desired schedule and the computer

    immediately prints your statement of classes. The invoices, however, often areprinted using batch processing, meaning all student invoices are printed and mailed

    at a later date.

  • 7/31/2019 Questions MIS AyaN

    11/20

    Today, most transaction processing systems use online transactionprocessing. Some routine processing tasks such as calculating paychecks or

    printing invoices, however, are performed more effectively on a batch basis. For

    these activities, many organizations still use batch processing techniques.

    3. Management Information Systems

    While computers were ideal for routine transaction processing, managers soon

    realized that the computers capability of performing rapid calculations and datacomparisons could produce meaningful information for

    management. Management information systems thus evolved out of transactionprocessing systems. A management information system, or MIS (pronounced

    em-eye-ess), is an information system that generates accurate, timely and

    organized information so managers and other users can make decisions, solve

    problems, supervise activities, and track progress. Because it generates reports on

    a regular basis, a management information system sometimes is calleda management reporting system (MRS).

    Management information systems often are integrated with transaction processing

    systems. To process a sales order, for example, the transaction processing system

    records the sale, updates the customers account balance, and makes a deduction

    from inventory. Using this information, the related management informationsystem can produce reports that recap daily sales activities; list customers with past

    due account balances; graph slow or fast selling products; and highlight inventory

    items that need reordering. A management information system focuses ongenerating information that management and other users need to perform their

    jobs.

    An MIS generates three basic types of information: detailed, summary andexception. Detailed information typically confirms transaction processing

    activities. A Detailed Order Report is an example of a detail report. Summary

    information consolidates data into a format that an individual can review quicklyand easily. To help synopsize information, a summary report typically contains

    totals, tables, or graphs. An Inventory Summary Report is an example of

    a summary report.

    Exception information filters data to report information that is outside of a

    normal condition. These conditions, called the exception criteria, define the

    range of what is considered normal activity or status. An example of an exception

    report is an Inventory Exception Report is an Inventory Exception Report that

    notifies the purchasing department of items it needs to reorder. Exception reports

    help managers save time because they do not have to search through a detailed

    report for exceptions. Instead, an exception report brings exceptions to the

    managers attention in an easily identifiable form. Exception reports thus help

    them focus on situations that require immediate decisions or actions.

  • 7/31/2019 Questions MIS AyaN

    12/20

    4. Decision Support Systems

    Transaction processing and management information systems provide information

    on a regular basis. Frequently, however, users need information not provided in

    these reports to help them make decisions. A sales manager, for example, mightneed to determine how high to set yearly sales quotas based on increased sales and

    lowered product costs. Decision support systems help provide information to

    support such decisions.

    A decision support system (DSS) is an information system designed to help users

    reach a decision when a decision-making situation arises. A variety of DSSs existto help with a range of decisions.

    A decision support system uses data from internal and/or external sources.

    Internal sources of data might include sales, manufacturing, inventory, orfinancial data from an organizations database. Data from external sources could

    include interest rates, population trends, and costs of new housing construction orraw material pricing. Users of a DSS, often managers, can manipulate the data

    used in the DSS to help with decisions.

    Some decision support systems include query language, statistical analysiscapabilities, spreadsheets, and graphics that help you extract data and evaluate the

    results. Some decision support systems also include capabilities that allow you to

    create a model of the factors affecting a decision. A simple model for determiningthe best product price, for example, would include factors for the expected sales

    volume at each price level. With the model, you can ask what-if questions by

    changing one or more of the factors and viewing the projected results. Many

    people use application software packages to perform DSS functions. Usingspreadsheet software, for example, you can complete simple modeling tasks or

    what-if scenarios.

    A special type of DSS, called an executive information system (EIS), is designed

    to support the information needs of executive management. Information in an EIS

    is presented in charts and tables that show trends, ratios, and other managerialstatistics. Because executives usually focus on strategic issues, EISs rely on

    external data sources such as the Dow Jones News/Retrieval service or the

    Internet. These external data sources can provide current information on interest

    rates, commodity prices, and other leading economic indicators.

    To store all the necessary decision-making data, DSSs or EISs often use extremely

    large databases, called data warehouses. A data warehouse stores and manages

    the data required to analyze historical and current business circumstances.

    5. Expert Systems

  • 7/31/2019 Questions MIS AyaN

    13/20

    An expert system is an information system that captures and stores theknowledge of human experts and then imitates human reasoning and decision-

    making processes for those who have less expertise. Expert systems are composed

    of two main components: a knowledge base and inference rules. A knowledge

    base is the combined subject knowledge and experiences of the humanexperts. The inference rules are a set of logical judgments applied to the

    knowledge base each time a user describes a situation to the expert system.

    Although expert systems can help decision-making at any level in an organization,

    nonmanagement employees are the primary users who utilize them to help with

    job-related decisions. Expert systems also successfully have resolved such diverseproblems as diagnosing illnesses, searching for oil and making soup.

    Expert systems are one part of an exciting branch of computer science called

    artificial intelligence. Artificial intelligence (AI) is the application of human

    intelligence to computers. AI technology can sense your actions and, based onlogical assumptions and prior experience, will take the appropriate action to

    complete the task. AI has a variety of capabilities, including speech recognition,logical reasoning, and creative responses.

    Experts predict that AI eventually will be incorporated into most computer systems

    and many individual software applications. Many word processing programsalready include speech recognition.

    Integrated Information Systems

    With todays sophisticated hardware, software and communications technologies,it often is difficult to classify a system as belonging uniquely to one of the five

    information system types discussed. Much of todays application softwaresupports transaction processing and generates management information. Other

    applications provide transaction processing, management information, and

    decision support. Although expert systems still operate primarily as separatesystems, organizations increasingly are consolidating their information needs into

    a single, integrated information system.

    10)Business Intelligence as an Information Management tool 228

  • 7/31/2019 Questions MIS AyaN

    14/20

    11) CRM systems increase profits for a company. 354

    12)Digital certificates. 323

    Anattachmentto an electronic message used forsecuritypurposes. The mostcommon use of a digital certificate is to verify that a user sending a message iswho he or she claims to be, and to provide the receiver with the means toencode a reply.

    An individual wishing to send anencryptedmessage applies for a digitalcertificate from aCertificate Authority (CA). The CA issues an encrypted digitalcertificate containing the applicant'spublic keyand a variety of otheridentification information. The CA makes its own public key readily available

    through print publicity or perhaps on theInternet.The recipient of an encrypted message uses the CA's public key to decode thedigital certificate attached to the message, verifies it as issued by the CA andthen obtains the sender's public key and identification information held withinthe certificate. With this information, the recipient can send an encrypted reply.The most widely used standard for digital certificates isX.509

    http://www.webopedia.com/TERM/A/attachment.htmlhttp://www.webopedia.com/TERM/A/attachment.htmlhttp://www.webopedia.com/TERM/A/attachment.htmlhttp://www.webopedia.com/TERM/S/security.htmlhttp://www.webopedia.com/TERM/S/security.htmlhttp://www.webopedia.com/TERM/S/security.htmlhttp://www.webopedia.com/TERM/E/encryption.htmlhttp://www.webopedia.com/TERM/E/encryption.htmlhttp://www.webopedia.com/TERM/E/encryption.htmlhttp://www.webopedia.com/TERM/C/certification_authority.htmlhttp://www.webopedia.com/TERM/C/certification_authority.htmlhttp://www.webopedia.com/TERM/C/certification_authority.htmlhttp://www.webopedia.com/TERM/P/public_key_cryptography.htmlhttp://www.webopedia.com/TERM/P/public_key_cryptography.htmlhttp://www.webopedia.com/TERM/P/public_key_cryptography.htmlhttp://www.webopedia.com/TERM/I/Internet.htmlhttp://www.webopedia.com/TERM/I/Internet.htmlhttp://www.webopedia.com/TERM/I/Internet.htmlhttp://www.webopedia.com/TERM/X/X_509.htmlhttp://www.webopedia.com/TERM/X/X_509.htmlhttp://www.webopedia.com/TERM/X/X_509.htmlhttp://www.webopedia.com/TERM/X/X_509.htmlhttp://www.webopedia.com/TERM/I/Internet.htmlhttp://www.webopedia.com/TERM/P/public_key_cryptography.htmlhttp://www.webopedia.com/TERM/C/certification_authority.htmlhttp://www.webopedia.com/TERM/E/encryption.htmlhttp://www.webopedia.com/TERM/S/security.htmlhttp://www.webopedia.com/TERM/A/attachment.html
  • 7/31/2019 Questions MIS AyaN

    15/20

    13)TCP/IP Networks 256

    14)Networking Topologies 258

    http://www.csl.mtu.edu/cs4451/www/notes/Network%20Topologies.pdf

    15)Object Oriented databases 217

    Questions :

    1) Benefits of enterprise systems.What are the challenges of enterprise systems? 53 + 344(http://e-learning.mfu.ac.th/mflu/1203371/chapter2_3.htm )

    Challenges

    http://www.csl.mtu.edu/cs4451/www/notes/Network%20Topologies.pdfhttp://www.csl.mtu.edu/cs4451/www/notes/Network%20Topologies.pdfhttp://e-learning.mfu.ac.th/mflu/1203371/chapter2_3.htmhttp://e-learning.mfu.ac.th/mflu/1203371/chapter2_3.htmhttp://e-learning.mfu.ac.th/mflu/1203371/chapter2_3.htmhttp://e-learning.mfu.ac.th/mflu/1203371/chapter2_3.htmhttp://www.csl.mtu.edu/cs4451/www/notes/Network%20Topologies.pdf
  • 7/31/2019 Questions MIS AyaN

    16/20

    Generally, enterprise systems have a lifespan of 10 to 20 years, after which point they can

    be upgraded. Although this might seem like a long time, data within organizations

    accumulates exponentially and may prove too difficult to manage and store using a single

    software system. Data overflow and a subsequent slowdown in one department will

    certainly have a ripple effect in other functions of an organization.

    One challenge is the expense of purchasing, installing, and maintaining the hardware and

    software that enables the enterprise system.

    First challenge: delivering flexibility

    The first challenge, delivering flexibility, stems (arise) from the way Enterprise Systems

    manufacturing companies are being forced to respond to fast changes in customer

    requirements and technology. This has placed huge demands on the flexibility of supply

    chain systems. Key issues revolve around managing outsourced manufacturing partners

    and suppliers, product transition (NPI, new products introduction), exception handling and

    change management in orders, forecasting for capacity planning and long-lead timecomponents, product quality amongst others.

    Second challenge: managing configuration complexity

    The second challenge, configuration complexity, has been a growing issue since the 1980s.

    Before then, most elements of the systems configuration the hardware, operating system,

    database and storage, and applications were simple and easily tied together in one

    system. Now, however, the typical configuration consists of several separate mini-systems.

    For example, a complex high-end server solution has separate storage area networks,

    networking equipment, and software stacks for the middleware, database, portals,

    application servers and web servers. Managing this explosion in complexity (especially the

    software components) has become a nightmare for Enterprise Systems manufacturers.

    Another reason for the increase in system complexity is that customers demand more exact

    specifications, and more customization, than ever before. Yet another is that the software

    complexity has increased. And finally, solutions to today's complex requirements tend to

    emphasize hardware and software equally, rather than one or the other as in the 1980s.

    Third challenge: optimally servicing the installed equipment base

    The third challenge, optimally servicing the installed equipment base, revolves around the

    difficult task of support and warranties and servicing them cost effectively, both

    proactively and reactively. The installed base is a huge potential source of upgrade

    revenue, especially for software upgrades.

  • 7/31/2019 Questions MIS AyaN

    17/20

    2) How does the Internet benefit the development of a global information system? Shouldall global systems be based on the Internet?

    http://www.decisionsciences.org/decisionline/vol30/30_2/intl30_2.pdf

    3) How do cultural, legal, political, and social expectations affect global business? 558

    4) Discuss the role and influence the user plays in software development.

    5) What is a GIS? Describe at least three ways in which a GIS could be used by modernbusiness. 465Ch 15

    Geographic information systems are a special category of DSS that use data visualization

    technology to analyze and display data for planning and decision-making in the form ofdigitized maps. GIS can best be used to support decisions that require knowledge about the

    geographic distribution of people or other resources in scientific research, resource

    management, and development planning. GIS have modeling capabilities, allowing managers

    to change data and automatically revise business scenarios to find better solutions. Forinstance, a company could display its customers on a map and then design the most efficient

    delivery route for its products. A second way in which it could be used would be to analyze

    demographic information to decide where to open branch restaurants. A third use could becustomer demographic data and map information to locate people who are likely to become

    customers for the companys services.

    6) How does a company's use of information systems affect its corporate strategies? Providean example. 94

    7) How is the security of a firm's information system and data affected by its people,organization, and technology? 12

    8) Describe MIS and DSS and differentiate between them. 45 + ppt + note book

    9) What types of relationships are possible in a relational database? Describe and give an

    example of each.

    These tables can be related in one of three different ways: one-to-one, one-to-many or

    many-to-many.

    One-to-One Relationships

    http://www.decisionsciences.org/decisionline/vol30/30_2/intl30_2.pdfhttp://www.decisionsciences.org/decisionline/vol30/30_2/intl30_2.pdfhttp://www.decisionsciences.org/decisionline/vol30/30_2/intl30_2.pdf
  • 7/31/2019 Questions MIS AyaN

    18/20

    Two tables are related in a one-to-one (11) relationship if, for every row in the first

    table, there is at most one row in the second table. True one-to-one relationships seldom

    occur in the real world. This type of relationship is often created to get around some

    limitation of the database management software rather than to model a real-world situation.

    In Microsoft Access, one-to-one relationships may be necessary in a database when youhave to split a table into two or more tables because of security or performance concerns or

    because of the limit of 255 columns per table. For example, you might keep most patient

    information in tblPatient, but put especially sensitive information (e.g., patient name, social

    security number and address) in tblConfidential (see Figure 3). Access to the information

    in tblConfidential could be more restricted than for tblPatient. As a second example,

    perhaps you need to transfer only a portion of a large table to some other application on a

    regular basis. You can split the table into the transferred and the non-transferred pieces,

    and join them in a one-to-one relationship.

    Figure 3. The tables tblPatient and tblConfidential are related in a one-to-one relationship.

    The primary key of both tables is PatientId.

    Tables that are related in a one-to-one relationship should always have the same primary

    key, which will serve as the join column.

    One-to-Many Relationships

    Two tables are related in a one-to-many (1M) relationship if for every row in the first

    table, there can be zero, one, or many rows in the second table, but for every row in the

    second table there is exactly one row in the first table. For example, each order for a pizza

    delivery business can have multiple items. Therefore, tblOrder is related to tblOrderDetails

    in a one-to-many relationship (see Figure 4). The one-to-many relationship is also referred

  • 7/31/2019 Questions MIS AyaN

    19/20

    to as a parent-child or master-detail relationship. One-to-many relationships are the most

    commonly modeled relationship.

    Figure 4. There can be many detail lines for each order in the pizza delivery business, so

    tblOrder and tblOrderDetails are related in a one-to-many relationship.

    One-to-many relationships are also used to link base tables to information stored in lookup

    tables. For example, tblPatient might have a short one-letter DischargeDiagnosis code,

    which can be linked to a lookup table, tlkpDiagCode, to get more complete Diagnosis

    descriptions (stored in DiagnosisName). In this case, tlkpDiagCode is related to tblPatient

    in a one-to-many relationship (i.e., one row in the lookup table can be used in zero or more

    rows in the patient table).

    Many-to-Many Relationships

    Two tables are related in a many-to-many (MM) relationship when for every row in the

    first table, there can be many rows in the second table, and for every row in the second

    table, there can be many rows in the first table. Many-to-many relationships can't be

    directly modeled in relational database programs, including Microsoft Access. These types

    of relationships must be broken into multiple one-to-many relationships. For example, a

    patient may be covered by multiple insurance plans and a given insurance company covers

    multiple patients. Thus, the tblPatient table in a medical database would be related to thetblInsurer table in a many-to-many relationship. In order to model the relationship between

    these two tables, you would create a third, linking table, perhaps called tblPtInsurancePgm

    that would contain a row for each insurance program under which a patient was covered

    (see Figure 5). Then, the many-to-many relationship between tblPatient and tblInsurer

    could be broken into two one-to-many relationships (tblPatient would be related to

  • 7/31/2019 Questions MIS AyaN

    20/20

    tblPtInsurancePgm and tblInsurer would be related to tblPtInsurancePgm in one-to-many

    relationships).

    Figure 5. A linking table, tblPtInsurancePgm, is used to model the many-to-many

    relationship between tblPatient and tblInsurer.

    In Microsoft Access, you specify relationships using the EditRelationships command. In

    addition, you can create ad-hoc relationships at any point, using queries.

    10)You are a Manager of a company,How could you use information systems to achievegreater customer intimacy?