In: Computer Science
Question 1 :
One of the storage technologies that is rapidly growing is radio frequency identification (RFID).
a- Talk about this storage technology type.
b- Explain the privacy issues that may occur by using RFID
Question 2 :
What are the two major types of application software for end users? Explain the major distinctions of each with examples
a- Talk about this storage technology type.
Answer :::::
Radio frequency identification (RFID) technology provides a means of automatic identification.
Radio-Frequency Identification is the use of radio waves to read, capture, and interact with information stored on a tag.
These Tags are usually attached to objects.
They can be read from several feet away.
The tag doesn’t always have to be in the direct line-of-sight to initiate interaction.
You can assign a unique identity to an object by using RFID technology.
Advantage of radio-frequency identification is that information exchange between tags and readers is very rapid and it is automatic.
In daily life, we use automatic data capture technology that relies on radio-frequency electromagnetic fields. This technology is known as Radio-Frequency IDentification or RFID.
For example :
A basic RFID system comprises two parts:
A)Tag
The RFID tag has an embedded transmitter and receiver.
A tag has two parts:
1)An integrated circuit for storing and processing information
2)An antenna to receive and transmit a signal.
The RFID tag has non-volatile memory storage.
Tag may be either read-only, or read/write.
A read-only tag has a factory assigned serial number used for identification in a database
A read/write tag can have specific custom data written to the tag by the user.
Tags can be passive, active, or battery-assistive passive.
A passive tag -- cheapest option, and features no battery. The tag uses radio energy transmitted by the reader.
An active tag-- features an onboard battery, periodically transmitting its credentials.
A battery-assistive passive tag also-- features a small onboard battery, but is only activated when in the presence of an RFID reader.
B)Reader
The RFID reader features a two-way radio transmitted-reciever (transciever)
Sometimes it is referred to as an interrogator.
The transceiver transmits an encoded radio signal to interogate the tag.
The radio signal essentially wakes or activates the tag.
In turn, the tag transponder converts the radio signal into usable power, and responds to the reader.
-------------------------------------------------------------------------------------------------------
b- Explain the privacy issues that may occur by using RFID
Answer :
Privacy Concerns :
The main concerns are:
Security and privacy is a major issue for many elements of technology these days.
RFID security and RFID privacy are no exception.
A major concern over the increase in use of RFID tags is the personal security associated with the illicit tracking of RFID tags.
The unique identifiers within RFID tags can be used for profiling and identifying consumer and individual patterns.
Stealth readers can track people with RFID tags on them - RFID tags will normally remain active after an item has been bought, and when wearing a garment, for example, it is possible to utilise this tag illicitly.
Hidden tags could be placed within on or within an item to enable stealth tracking to be undertaken.
There are many other issues associated with RFID security, one of which is RFID tag cloning.
RFID security systems need to be able to prevent cloning as this would open the overall system to a variety of forms of security attack.
Typically when RFID tag cloning occurs, the responses of RFID tags are received by rogue monitors. Information received can then be used to replicate tags.
----------------------------------------------------------------------------------------------------------------------------
Question 2 :
What are the two major types of application software for end users? Explain the major distinctions of each with examples
Answer :
The term Application refers to Software which is a set of instructions or code written in a program for executing a task or an operation in a Computer.
Application software’s are the end-user programs designed to enhance the productivity in various fields of work.
The applications are used for creating documents, spreadsheets, databases, and publications, doing online research, sending email, designing graphics, running businesses, and also playing games.
Application Software can be divided into two broad categories are System Software and Applications Software.
Application Software |
System Software |
Application Software is a program or a group of program designed for the end-user to perform a specific task in a Computer. |
System Software is a program designed to manage all the hardware resources and also runs the applications programs in a Computer. |
application software resides above system software and includes applications such as database programs, word processors and spreadsheets |
system software consists of low-level programs that interact with computers at a basic level |
It is specific purpose software. |
It is general-purpose software. |
It executes as and when required. |
It executes all the time in computer. |
Application is not essential for a computer. |
System software is essential for a computer |
Application Software performs in a environment which created by System/Operating System |
System Software Create his own environment to run itself and run other application. |
Application software can’t run independently. They can’t run without the presence of system software. |
System software can run independently. It provides platform for running application softwares. |
In general, the user interacts with application sofwares. |
In general, the user does not interact with system software because it works in the background. |
Application Software is written in a high-level language like Java, C++, .net, VB, etc. |
System Software is written in a low-level language, i.e. assembly language. |
Some examples of application softwares are word processor, web browser, media player, etc. |
Some examples of system softwares are compiler, assembler, debugger, driver, etc. |