We will write a custom Essay on “Management Information Systems” by James O’Brien and George M. Marakas specifically for you
807 certified writers online
A Storage Area Network
This is a network or sub-network with a high speed that interconnects different types of data storage devices that have associated data servers on behalf of a larger network of users. It is part of a larger network of a set of computing resources. This system is used for the storage of data. The storage area network is important for keeping backups of data in a company. Sharing of data is easier to facilitate in this setup.
Examples include backup associated SNAs, data sharing associated SNAs, system integrator SNAs among others according to where they are applied.
This is a descriptive and informal term used to describe an abstract/wide/general view of some data. It is simply that data can be accessed through the data service. Data virtualization is used in data service documentation and majorly helps to explain and describe data which is in abstract forms. Statistical data can easily be modified using this tool so that they can easily be understood by the management.
Radio-Frequency Identification (Rfid)
Transponders are the main electronic gadgets that are used in frequency identification. RFID facilitates automatic and ready identification of different channels of frequency so that the receivers can channel the right frequency to the right persons. RFID tags are very mobile and can facilitate dynamism. This is because they can be placed anywhere from which they help to track the location using radio waves.
These gadgets can be used in a wide range of applications including supermarkets where they help to check the inventory and thus create efficiency. Some examples include modulating and demodulating radio frequency signals and other chipless RFID which furthers the identification process.
This is a style in computer technology that provides information technology capabilities that allow users to access technology-enabled services from the internet without knowing, having the expertise, or control over the technology infrastructure that supports them. A lot of networking is embraced in this setup. A variety of devices, software, and services are connected over a powerful network and the final array of networks is called the cloud.
It helps users to rely on the internet to have their needs satisfied. An example of its implementation is Google applications which store various software and data in a server to be accessed by users online.
Client-server computing: is a form of distributed computing. The two main components of this system are the client and the server. These two parts work together towards exchanging the data between them through the available network. It consists of the superior machine (server) which is the information reservoir and the requesting/ less superior machines (clients) The client sends the request to the server, waits for the server’s response, translates the response into “human-readable” results, presents the results to the user while the server listens for a client’s query, processes that query and returns the results to the client.
Service-Oriented Architecture (Soa)
SOA is a technique that is used to develop systems whose functionality is grouped around business processes. Through this, data can be exchanged from one gadget to another in the event of transactions. This architecture is normally developed using the distributed computing and modular programming technologies.
Peer to Peer Networks
This is a network computing technique in which two or more Personal Computers are connected and share resources without relying on or passing through a server. Here, for instance, there is no single source of information (superior computer) to other computers in the network. These computers can be connected through a Universal Serial Bus for file transfer or can be in a grand scale network in which various protocols and applications are used to relate users over the network.
Public Key Infrastructure/Encryption
This refers to an array of cryptography that binds public keys with relevant unique user identities in the course of a certificate authority. This enables computer users without prior contacts to be authenticated to each other and uses their public key information to encrypt messages to each other. It enables those communicating to establish confidentiality, message integrity, and user authentication without prior revealing of secret messages between them.
O’Brien, J. Maraka, G. (2006). Management Information Systems. Boston: McGraw Ltd.
Tomasi, M. (2000). Advanced electronic telecommunication. London: Oxford Ltd.
Informatics PAGE * MERGEFORMAT 5.