Question

In: Computer Science

Question 1 : One of the storage technologies that is rapidly growing is radio frequency identification...

Question 1 :

One of the storage technologies that is rapidly growing is radio frequency identification (RFID).

a- Talk about this storage technology type.

b- Explain the privacy issues that may occur by using RFID

Question 2 :

What are the two major types of application software for end users? Explain the major distinctions of each with examples

Solutions

Expert Solution

a- Talk about this storage technology type.

Answer :::::

Radio frequency identification (RFID) technology provides a means of automatic identification.

Radio-Frequency Identification is the use of radio waves to read, capture, and interact with information stored on a tag.

These Tags are usually attached to objects.

They can be read from several feet away.

The tag doesn’t always have to be in the direct line-of-sight to initiate interaction.

You can assign a unique identity to an object by using RFID technology.

Advantage of radio-frequency identification is that information exchange between tags and readers is very rapid and it is automatic.

In daily life, we use automatic data capture technology that relies on radio-frequency electromagnetic fields. This technology is known as Radio-Frequency IDentification or RFID.

For example :

  • Using a key to start a car
  • A card to access a building or room
  • Using ski lifts on a winter sports holiday
  • Validating a bus or underground ticket
  • widely used in animal tagging
  • also used in electronic payment

A basic RFID system comprises two parts:

  1. Tag
  2. Reader

A)Tag

The RFID tag has an embedded transmitter and receiver.

A tag has two parts:

1)An integrated circuit for storing and processing information

2)An antenna to receive and transmit a signal.

The RFID tag has non-volatile memory storage.

Tag may be either read-only, or read/write.

A read-only tag has a factory assigned serial number used for identification in a database

A read/write tag can have specific custom data written to the tag by the user.

Tags can be passive, active, or battery-assistive passive.

A passive tag -- cheapest option, and features no battery. The tag uses radio energy transmitted by the reader.

An active tag-- features an onboard battery, periodically transmitting its credentials.

A battery-assistive passive tag also-- features a small onboard battery, but is only activated when in the presence of an RFID reader.

B)Reader

The RFID reader features a two-way radio transmitted-reciever (transciever)

Sometimes it is referred to as an interrogator.

The transceiver transmits an encoded radio signal to interogate the tag.

The radio signal essentially wakes or activates the tag.

In turn, the tag transponder converts the radio signal into usable power, and responds to the reader.

-------------------------------------------------------------------------------------------------------

b- Explain the privacy issues that may occur by using RFID

Answer :

Privacy Concerns :

The main concerns are:

  1. use of the data by a third party
  2. an increase in targeted direct marketing
  3. the ability to track individuals.

Security and privacy is a major issue for many elements of technology these days.

RFID security and RFID privacy are no exception.

A major concern over the increase in use of RFID tags is the personal security associated with the illicit tracking of RFID tags.

The unique identifiers within RFID tags can be used for profiling and identifying consumer and individual patterns.

Stealth readers can track people with RFID tags on them - RFID tags will normally remain active after an item has been bought, and when wearing a garment, for example, it is possible to utilise this tag illicitly.

Hidden tags could be placed within on or within an item to enable stealth tracking to be undertaken.

There are many other issues associated with RFID security, one of which is RFID tag cloning.

RFID security systems need to be able to prevent cloning as this would open the overall system to a variety of forms of security attack.

Typically when RFID tag cloning occurs, the responses of RFID tags are received by rogue monitors. Information received can then be used to replicate tags.

----------------------------------------------------------------------------------------------------------------------------

Question 2 :

What are the two major types of application software for end users? Explain the major distinctions of each with examples

Answer :

The term Application refers to Software which is a set of instructions or code written in a program for executing a task or an operation in a Computer.

Application software’s are the end-user programs designed to enhance the productivity in various fields of work.

The applications are used for creating documents, spreadsheets, databases, and publications, doing online research, sending email, designing graphics, running businesses, and also playing games.

Application Software can be divided into two broad categories are System Software and Applications Software.

Application Software

System Software

Application Software is a program or a group of program designed for the end-user to perform a specific task in a Computer.

System Software is a program designed to manage all the hardware resources and also runs the applications programs in a Computer.

application software resides above system software and includes applications such as database programs, word processors and spreadsheets

system software consists of low-level programs that interact with computers at a basic level

It is specific purpose software.

It is general-purpose software.

It executes as and when required.

It executes all the time in computer.

Application is not essential for a computer.

System software is essential for a computer

Application Software performs in a environment which created by System/Operating System

System Software Create his own environment to run itself and run other application.

Application software can’t run independently. They can’t run without the presence of system software.

System software can run independently. It provides platform for running application softwares.

In general, the user interacts with application sofwares.

In general, the user does not interact with system software because it works in the background.

Application Software is written in a high-level language like Java, C++, .net, VB, etc.

System Software is written in a low-level language, i.e. assembly language.

Some examples of application softwares are word processor, web browser, media player, etc.

Some examples of system softwares are compiler, assembler, debugger, driver, etc.


Related Solutions

The introduction of technologies such as radio frequency identification tags (RFIDs) have created efficiencies for manufacturers...
The introduction of technologies such as radio frequency identification tags (RFIDs) have created efficiencies for manufacturers and producers. true-false
Radio frequency identification (RFID) is known as one of the three new technology solutions for supply...
Radio frequency identification (RFID) is known as one of the three new technology solutions for supply chain management according to Mondragon, Lyons, Michaelides and Kehoe (2006). Critically discuss the concept of RFID and explain in your own understanding why old RFID technology can disrupt modern retail supply chains. [10]
What are The Advantages of Incorporating Radio Frequency Identification (RFID) Technology in Retail Stores?
What are The Advantages of Incorporating Radio Frequency Identification (RFID) Technology in Retail Stores?  
1. (Chs. 1 & 3) Rapidly developing technologies made peer-to-peer (p2p) lending a fast-growing segment of...
1. (Chs. 1 & 3) Rapidly developing technologies made peer-to-peer (p2p) lending a fast-growing segment of the financial services industry (see, e.g., lendingclub.com or google ‘peer-to-peer lending’). Do you think p2p lenders will become dominant, making traditional lenders such as depository institutions (e.g., banks and credit unions) obsolete in the next two or three decades? (Maximum 500 words.)
The combination of warehouse management systems (WMS), RFID (Radio Frequency Identification), barcodes and Global Positioning Systems...
The combination of warehouse management systems (WMS), RFID (Radio Frequency Identification), barcodes and Global Positioning Systems (GPS) have had a profound effect on transportation. What the benefits of these technologies and how efficiency is improved?
As vice president of sales for a rapidly growing company, you are grappling with the question...
As vice president of sales for a rapidly growing company, you are grappling with the question of expanding the size of your direct sales force (from its current level of 60 national salespeople). You are considering hiring from 5 to 10 additional personnel. sing hypotherical numbers, please explain (show work on excel): a)How would you estimate the additional dollar cost of each additional salesperson? b) Based on your company’s past sales experience, how would you estimate the expected net revenue...
As vice president of sales for a rapidly growing company, you are grappling with the question...
As vice president of sales for a rapidly growing company, you are grappling with the question of expanding the size of your direct sales force (from its current level of 60 national salespeople). You are considering hiring from five to 10 additional personnel. How would you estimate the additional dollar cost of each additional salesperson? Based on your company’s past sales experience, how would you estimate the expected net revenue generated by an additional salesperson? (Be specific about the information...
Social Media and Business Web technologies have been developed rapidly in the world. In this question...
Social Media and Business Web technologies have been developed rapidly in the world. In this question you are asked to: Compare and contrast Web 1.0, Web 2.0 and Web 3.0 and Discuss the motivation for the continuous development of web technologies.
QUESTION SIX “Riverbend is a rapidly growing biotech company that has a required rate of return...
QUESTION SIX “Riverbend is a rapidly growing biotech company that has a required rate of return of 12%. It plans to build a new facility. The building will take two years to complete. The building contractor offered Riverbend a choice of three payment plans, as follows:                                                                                                                                                  Plan I Payment of £100,000 at the time of signing the contract and £5,000,000 upon completion of the building. The end of the second year is the completion date.                                                                                                                                              ...
QUESTION : True or False A) Rapidly growing technology firms are well known for providing dividends...
QUESTION : True or False A) Rapidly growing technology firms are well known for providing dividends to their shareholders. True False B) A stock dividend is a lower cost alternative to a cash dividend and can be considered at all but the initial stages of a corporate life cycle. True False C) A poison pill strategy should be considered long before an invasive corporate raider attempts to buy your firm. True False D) The declaration of a dividend is an...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT