CH4_ARQ_Dahalpandey Januka

docx

School

Northern Virginia Community College *

*We aren’t endorsed by this school

Course

226

Subject

Business

Date

Feb 20, 2024

Type

docx

Pages

9

Uploaded by BrigadierBoulder7609

Report
Chapter 4 Active Review Question Name: Januka Dahal Pandey September 19, 2023 Q4-1 What do business professionals need to know about computer hardware? List types of hardware and give an example of each. Hardware Type Example(s) Personal computer (PC) Including desktops and laptops Apple Mac Pro Tablet Including e-book readers iPad, Microsoft Surface, Google Nexus, Kindle Fire Phablet Samsung Galaxy Note, iPhone 8 Plus Smartphone Samsung Galaxy, iPhone Server Dell PowerEdge Server Server farm Racks of servers Define bit and byte . Computers represent data using binary digits , called bits . All forms of computer data are represented by bits. The data can be numbers, characters, currency amounts, photos, recordings, or whatever. All are simply a string of bits. For reasons that interest many but are irrelevant for future managers, bits are grouped into 8- bit chunks called bytes . Explain why bits are used to represent computer data. Bytes are used to measure sizes of noncharacter data as well. Someone might say, for example, that a given picture is 100,000 bytes in size. This statement means the length of the bit string that represents the picture is 100,000 bytes or 800,000 bits (because there are 8 bits per byte). Define the units of bytes used to size memory. The specifications for the size of main memory, disk, and other computer devices are expressed in bytes. Figure 4-4 shows the set of abbreviations that are used to represent data storage capacity. A kilobyte , abbreviated KB , is a collection of 1,024 bytes. A megabyte , or MB , is 1,024 kilobytes. A gigabyte , or GB , is 1,024 megabytes; a terabyte , or TB , is 1,024 gigabytes; a petabyte , or PB , is 1,024 terabytes; an exabyte , or EB , is 1,024 petabytes; and a zettabyte , or ZB , is 1,024 exabytes. Sometimes you will see these definitions simplified as 1KB equals 1,000 bytes and 1MB equals 1,000KB, and so on. Such simplifications are incorrect, but they do ease the math. Q4-2 How can new hardware affect competitive strategies? 1
Chapter 4 Active Review Question Name: Januka Dahal Pandey September 19, 2023 Define IoT and describe a smart device. The first disruptive force that has the power to change business is the Internet of Things (IoT) . This is the idea that objects are becoming connected to the Internet so they can interact with other devices, applications, or services. Take your mobile phone, for example; it’s probably a smartphone. But it wasn’t always “smart.” It started out as a simple device that just handled voice calls. Over time it became a smart device by adding more processing power, more memory, Internet access, Wi-Fi connectivity, and the ability to interconnect with other devices and applications. Explain why smart devices are desirable. Give two examples of how businesses could benefit from smart devices. Consumers like smart devices and are willing to pay more for them. Businesses want to improve the existing devices they manufacture into a smart device and then sell them for twice as much. If they don’t, someone else will. Describe the difference between AR, MR, and VR. Augmented reality (AR) is the altering of reality by overlaying digital information on real- world objects. Examples of AR devices include Google Glass ($1,250), Epson’s Moverio Smart Glasses ($700), and Daqri Smart Helmet (est. $5,000 to $15,000). Mixed reality (MR) is the combination of the real physical world with interactive virtual images or objects. The last step on the digital reality continuum is virtual reality (VR) , or a completely computer-generated virtual world with interactive digital objects. Here you’ll find devices like Facebook’s Oculus Rift ($465), Sony’s PlayStation VR ($349), and Samsung Gear VR ($129). Explain why sense of presence is important in virtual environments. If a device were able to create a strong sense of presence, you’d lean back and hold on tight if you were on a virtual roller coaster about to go off the track. Describe how self-driving cars could be safer and cheaper and make life easier. A self- driving car (also known as a driverless car) uses a variety of sensors to navigate like a traditional car but without human intervention. It will be full of advanced hardware and integrated software and is the epitome of a mobile system. Explain how 3D printing works and how it could affect new product design, manufacturing, distribution, and consumer purchasing. 3D printers have the potential to affect a broad array of industries beyond sporting equipment. You can get an idea of the scope of change when you realize that 3D printers can print in more than just plastics. They can print in metal, wood, ceramics, foods, and biological material too. 2
Chapter 4 Active Review Question Name: Januka Dahal Pandey September 19, 2023 Describe some of the benefits and risks of using a cryptocurrency like Bitcoin. Compared to traditional payment methods, crypto- currency transactions are faster and easier and have few to no fees. Governments can’t easily monitor, tax, or seize cryptocurrencies. Consumers holding cryptocurrencies are protected from inflation, too. Q4-3 What do business professionals need to know about software? Review Figure 4-12 and explain the meaning of each cell in this table. Nonmobile client operating systems are used on personal computers. The most popular is Microsoft Windows . Some version of Windows resides on more than 88 percent of the world’s desktops, and, if we consider just business users, the figure is more than 95 percent. The most recent version of Windows is Windows 10. Net Applications estimates that overall market share of Windows as of 2018 is Windows 7 at 44 percent, Windows 10 at 31 percent, Windows XP at 6 percent, Windows 8.1 at 6 percent, and Windows 8 at 1 percent. 20 It’s interesting to note that Windows 7 remains the most popular version of Windows despite the fact that Microsoft ended mainstream support for it in January 2015. Windows 8 was a major rewrite of prior versions. Windows 8 was distinguished by what Micro- soft calls modern-style applications . 21 These applications, now carried over into Windows 10, are touch-screen oriented and provide context-sensitive, pop-up menus. They can also be used with a mouse and keyboard. Microsoft claims that modern-style applications work just as well on portable, mobile devices, such as tablet computers, as they do on desktop computers. One key feature of modern-style applications is the minimization of menu bars, status lines, and other visual overhead. Figure 4-13 shows an example of a modern-style version of searching for images in Windows Explorer. Describe three kinds of virtualization and explain the use of each. With PC virtualization , a personal computer, such as a desktop or laptop, hosts several different operating systems. Say a user needs to have both Linux and Windows running on a computer for a training or development project. In that circumstance, the user can load software like Oracle VirtualBox or VMWare Workstation on the host operating system in order to create Linux and Windows virtual machines. With server virtualization , a server computer hosts one or more other server computers. In Figure 4-15, a Windows Server computer is hosting multiple virtual machines. Users can log on to any of those virtual machines, and they will appear as normal desktop computers. Figure 4-16 shows how one of those virtual machines would appear to a user of that virtual desktop. Notice that the user of that virtual machine is running a Web browser as if it is a local desktop. Server virtualization plays a key role for cloud vendors, as you’ll learn in Chapter 6. With desktop virtualization , a server hosts many versions of desktop operating systems. Each of those desktops has a complete user environment and appears to the user to be just another PC. However, the desktop can be accessed from any computer to which the user has access. Thus, you could be at an airport and go to a terminal computer and access your virtualized desktop. To you, it appears as if that airport computer is your own personal computer. Using a virtual desktop also means that you wouldn’t have to worry about losing 3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Chapter 4 Active Review Question Name: Januka Dahal Pandey September 19, 2023 a corporate laptop or confidential internal data. Meanwhile, many other users could have accessed the computer in the airport, and each thought he or she had his or her personal computer. Explain the difference between software ownership and software licenses. When you buy a computer program, you are not actually buying that program. Instead, you are buying a license to use that program. For example, when you buy a macOS license, Apple is selling you the right to use macOS. Apple continues to own the macOS program. Large organizations do not buy a license for each computer user. Instead, they negotiate a site license , which is a flat fee that authorizes the company to install the product (operating system or application) on all of that company’s computers or on all of the computers at a specific site. Explain the differences among horizontal-market, vertical-market, and one-of-a-kind applications. Horizontal-market application software provides capabilities common across all organizations and industries. Word processors, graphics programs, spreadsheets, and presentation programs are all horizontal-market application software. Examples of such software are Microsoft Word, Excel, and PowerPoint. Examples from other vendors are Adobe’s Acrobat, Photoshop, and PageMaker and Jasc Corporation’s Paint Shop Pro. These applications are used in a wide variety of businesses across all industries. They are purchased off the shelf, and little customization of features is necessary (or possible). They are the automobile equivalent of a sedan. Everybody buys them and then uses them for different purposes. Vertical-market application software serves the needs of a specific industry. Examples of such programs are those used by dental offices to schedule appointments and bill patients, those used by auto mechanics to keep track of customer data and customers’ automobile repairs, and those used by parts warehouses to track inventory, purchases, and sales. If horizontal-market applications are sedans, then vertical-market applications would be construction vehicles, like an excavator. They meet the needs of a specific industry. Vertical applications usually can be altered or customized. Typically, the company that sold the application software will provide such services or offer referrals to qualified consultants who can provide this service. One-of-a-kind application software is developed for a specific, unique need. The U.S. Department of Defense develops such software, for example, because it has needs that no other organization has. Describe the three ways that organizations can acquire software. You can buy computer software in exactly the same ways: off-the-shelf software , off-the- shelf with alterations software , or custom-developed software . Q4-4 Is open source software a viable alternative? Define GNU and GPL . Name three successful open source projects. 4
Chapter 4 Active Review Question Name: Januka Dahal Pandey September 19, 2023 GNU is a self-referential acronym meaning GNU Not Unix for creating a free Unix-like operating system. GNU general public license (GPL) agreement is one of the standard license agreements for open source software. The three successful open source projects are: LibreOffice (default office suite in Linux distributions) Firefox (a browser) MySQL Describe four reasons programmers contribute to open source projects. The first reason that people contribute to open source is that it is great fun! Additionally, some people contribute to open source because it gives them the freedom to choose the projects they work on. They may have a programming day job that is not terribly interesting —say, writing a program to manage a computer printer. Their job pays the bills, but it’s not fulfilling. In the 1950s, Hollywood studio musicians suffered as they recorded the same style of music over and over for a long string of uninteresting movies. To keep their sanity, those musicians would gather on Sundays to play jazz, and a number of high-quality jazz clubs resulted. That’s what open source is to programmers: a place where they can exercise their creativity while working on projects they find interesting and fulfilling. Another reason for contributing to open source is to exhibit one’s skill, both for pride and to find a job or consulting employment. A final reason is to start a business selling services to support an open source product. Define open source, closed source, source code, and machine code. The term open source means that the source code of the program is available to the public. Source code is computer code as written by humans and understandable by humans. Source code is compiled into machine code that is processed by a computer. Machine code is, in general, not understandable by humans and cannot be modified. When a user accesses a Web site, the machine code version of the program runs on the user’s computer. In a closed source project, say, Microsoft Office, the source code is highly protected and only available to trusted employees and carefully vetted contractors. The source code is protected like gold in a vault. Only those trusted programmers can make changes to a closed source project. In your own words, explain why open source is a legitimate alternative but might or might not be appropriate for a given application. The answer depends on to whom and for what. Open source has certainly become legitimate. According to The Economist, “It is now generally accepted that the future will involve a blend of both proprietary and open-source software.” 26 During your career, open source will likely take a greater and greater role in software. However, whether open source works for a particular situation depends on the requirements and constraints of that situation. You will learn more about matching requirements and programs in Chapter 12. 5
Chapter 4 Active Review Question Name: Januka Dahal Pandey September 19, 2023 In some cases, companies choose open source software because it is “free.” It turns out that this advantage may be less important than you’d think because in many cases support and operational costs swamp the initial licensing fee. Q4-5 What are the differences between native and Web applications? In your own words, summarize the differences between native applications and Web applications. Applications can be categorized as native applications that run on just one operating system or Web applications that run in browsers. In the latter case, the browser provides a more or less consistent environment for the application; the peculiarities of operating systems and hardware are handled by the browser’s code and hidden from the Web application. In high-level terms, explain the difference between object-oriented languages and scripting languages. Explain each cell of Figure 4-19. State which is better: native or Web applications. Justify your answer. Object-oriented means they can be used to create difficult, complex applications and, if used properly, will result in high-performance code that is easy to alter when requirements change. The particular characteristics of object-oriented languages are beyond the scope of this text. Object-oriented languages can be used only by professional programmers who have devoted years to learning object-oriented design and coding skills. Typically, such developers were computer science majors in college. As shown in the first row of Figure 4-19, Web development languages are html5, css3, and Javascript. html5 is the latest version of html, which you will learn about in Chapter 6. The advantages of this version are support for graphics, animation, 2D animations, and other sophisticated user experiences. css3 is used with html5 to specify the appearance of content coded in html. JavaScript is a scripting programming language that is much easier to learn than native-client languages. It is used to provide the underlying logic of the application. Web applications can be written by professional programmers, and, indeed, most are. However, it is possible for technically oriented Web developers and business professionals to develop them as well. The entry-level technical skill required is low, and simple applications are relatively easy to develop. But sophisticated user experiences are difficult. Web application developers may have degrees in computer science, information systems, or graphics design. Q4-6 Why are mobile systems increasingly important? Define mobile systems . Mobile systems are information systems that support users in motion. Mobile systems users access the system from any place —at home, at work, in the car, on the bus, or at the beach—using any smart device, such as a smartphone, tablet, or PC. The possibilities are endless. Name and describe the four elements of a mobile system. the major elements in a mobile system are users in motion, mobile devices, wireless connectivity , and a cloud-based resource. A mobile device is a small, lightweight, power- 6
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Chapter 4 Active Review Question Name: Januka Dahal Pandey September 19, 2023 conserving, computing device that is capable of wireless connectivity. Almost all mobile devices have a display and some means for data entry. Mobile devices include smartphones, tab- lets, smartwatches, and small, light laptops. Wireless connectivity is when downloading a book for a Kindle, for example, the cloud is one or more servers on the other end that store that book and download a copy of it to your device. Describe the size of the mobile market and explain why there are 3.9 billion mobile prospects. The major reason for the importance of mobile systems is the size of their market. According to Cisco, at the end of 2016 there were 8 billion mobile devices generating 7.2 exabytes of traffic per month. By 2021, this will jump to 11.6 billion mobile devices generating more than 49 exabytes per month. That’s 1.5 devices for every person on the planet. Smartphones will account for nearly 86 percent of global mobile traffic. Explain why the mobile market will become stronger in the future. Because of this vast and growing market, mobile systems are having a major impact on business and society today—impact that is forcing industry change while creating new career opportunities for mobile-IS-savvy professionals, as well as large numbers of new, interesting mobile-IS-related jobs. Many more mobile systems mean an incredible amount of new data, data that professionals can use to create much more information. In fact, many business professionals believe they’re drowning in data while starving for information. What can be done with all of this mobile-systems data to enable humans to conceive information of greater value to them? Explain why a problem for one organization is an opportunity for another. Using the five- component model, describe particular opportunities for each component. Hardware Software Data Procedures People Impact of mobile systems growth Many, many more mobile devices will be sold. Compact interfaces; new technology for active users; application scaling. More data, but more information? Less device real estate means fewer ads possible. Always on, always at work. Employee lifestyle becomes hybrid of personal and professional. Ability to thrive in a dynamic environment more important. Industry changes PCs less important; high demand (and requirement) for innovative devices as well as cheap copycats. html5, css3, and JavaScript increase capability of thin- clients. Loss of control. Ad model in danger? Personal mobile devices at work. More part-time employees and independent contractors. Career opportunities Jobs for mobile device sales, marketing, support. New technology levels the playing field for html5. Business expertise needed for mobile requirements. New companies! Reporting and data mining even more important. Design of effective mobile reports. Innovative use of just- in-time data. Need for adjusting business processes gives another premium to non- routine problem solvers. Independent contractors (and some employees) work where and when they want. What is this new social organism? 7
Chapter 4 Active Review Question Name: Januka Dahal Pandey September 19, 2023 Define just-in-time data and explain how it changes the value of human thinking. Mobile systems offer the potential of just-in-time data , which is data delivered to the user at the precise time it is needed. A pharmaceutical salesperson uses just-in-time data when she accesses a mobile system to obtain the latest literature on a new drug while waiting for the doctor to whom she will pitch it. She needn’t remember the drug’s characteristics any longer than it takes her to walk down the hallway and make the sale. Q4-7 What are the challenges of personal mobile devices at work? Summarize the advantages and disadvantages of employees’ using mobile systems at work. In truth, organizations today have a love/hate relationship with their employees’ use of their own mobile devices at work. They love the cost-saving possibility of having employees buy their own hardware, but they hate the increased vulnerability and loss of control. The result, at least today, is a wide array of organizational attitudes. Define BYOD and BYOD policy. A bring your own device (BYOD) policy is a statement concerning employees’ permissions and responsibilities when they use their own device for organizational business. BYOD policies according to functionality and control. Starting in the lower left-hand corner, the most primitive policy is to ignore mobile use. That posture, which provides neither functionality to the employee nor control to the organization, has no advantages and, as just stated, cannot last. The next step up in functionality is for the organization to offer its wireless network to mobile devices, as if it were a coffee shop. The advantage to the organization of this policy is that the organization can sniff employees’ mobile traffic, thus learning how employees are using their devices (and time) during work. Name six possible policies and compare them in terms of functionality and organizational control. Summarize the advantage of each to employers. BYOD Policy Description Advantage to Organization They don’t exist Organization looks the other way when employees bring mobile devices to work. None We’ll be a coffee shop You’ll be able to sign in to our wireless network using your mobile device. Packet sniffing of employee mobile device use at work. We’ll offer limited systems you can access from any device Organization creates https applications with sign-in and offers access to noncritical business systems. Employees gain public access from any device, not just mobile devices, without having to use VPN accounts. You’re responsible for damage Threatening posture to discourage employee use of mobile devices at work. Appear to be permissive without actually being so. We’ll check it out, reload software, and then manage remotely Employees can use their mobile devices just as if they were computers provided by the corporate IS department. Employee buys the hardware (perhaps with an employer's contribution). If you connect it, we own it Employees are not to use mobile devices at work. If they do, they lose them. Part of employment agreement. Ultimate in control for highly secure work situations (intelligence, military). 8
Chapter 4 Active Review Question Name: Januka Dahal Pandey September 19, 2023 Q4-8 2029? Explain how email usage has changed over the past 20 years. Describe how an anticipatory system might work. Explain how advances in hardware and software might change the types of jobs you take in the future. The term email was so new at the time that it hadn’t even caught on yet. You can see people in the movie reading newspapers and paper books. Oh, how times have changed. Email now comes in seconds after it’s sent. You check your email during commercial breaks while you’re watching TV, while you’re driving in traffic, and while you’re sitting on the toilet. Instead of checking your email with bated breath, you’re dreading seeing more work pile up in your inbox. Imagine your TV turning on every morning at just the right time so you can watch the markets open. You smell fresh-baked bread, your shower turns on by itself, and your car knows exactly when to self-start so it’s warm when you get in. Your self-driving car will let you work on your way to work. You’ll see these anticipatory systems at your job too. How will advances in hardware and software affect the types of jobs you’ll go to? Ten years from now, the best-paying jobs will be ones that don’t currently exist. The following are hot jobs today: IoT architect, marketing technologist, Big Data architect, and DevOps manager. These job titles didn’t exist 10 years ago. Ten years from now, there will be an entirely new set of jobs that you haven’t heard of before. How do you prepare for future jobs? What types of jobs will pay well? Regardless of your cur- rent college major, your future job will probably require a high level of tech skill. The best way to prepare for these types of jobs is to cultivate creativity, novel problem solving, and good judgment and have a sincere desire to learn new things. 9
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help