Wednesday, April 21, 2010

Week 8 Questions

Explain the business benefits of using wireless technology.
Business benefits of using wireless technology include:
it enables employees to move laptops from office to office
they can connect to the network in lunchroom areas
quick and easy access
low cost
Bulleted List

Describe the business benefits associated with VoIP

VoIP uses TCP/IP technology to transmit voice calls over internet technology. Benefits of using this enables businesses to make voice calls over the internet. This is able to be of lower cost for companies or free. Businesses are able to use programs such as skype which gives businesses more opportunities to contact people overseas and interstate

Compare LANs and WANs
A LAN is a local area network it is designed to connect a group of computers in close proximity to each other such as in an office building, a school or home. It is useful for sharing resources such as files, printers or games. A LAN in turn often connects to other LAN's and to the internet or wide area networks
A WAN s a wide area network that spans a large geographic area such as a statem province or country. WAN's often connect multiple smaller networks, such as local area networks

Describe RFID and how it can be used to help make a supply chain more effective
RFID or Radio Frequency Indenfication technologies use active or passive tags in the form of chips or smart lables that can store unique identifiers and relay this information to electronic readers. RFID tags can cut costs by requiring fewer workers for scanning items, also provide more currency and accurate information to the supply chain

Identify the advantages and disadvantage of deploying mobile technology
By deploying mobile technology there are some advantages. These include technology being able to be taken anywhere, such as in the form of wireless internet, mobile phones, cordless computer peripherals, satellite television, WiMAX wireless broadband and security sensors
There are disadvantages as well as there are risks involved and data needs to be protected

All answers came from Business Driven Information Systems (Baltzan, Phillips, Lynch, Blakey)

No comments:

Post a Comment