“Management Information Systems” by James O’Brien and George M. Marakas Essay

Exclusively available on Available only on IvyPanda® Written by Human No AI

A Storage Area Network

This is a network or sub-network with a high speed that interconnects different types of data storage devices that have associated data servers on behalf of a larger network of users. It is part of a larger network of a set of computing resources. This system is used for the storage of data. The storage area network is important for keeping backups of data in a company. Sharing of data is easier to facilitate in this setup.

Examples include backup associated SNAs, data sharing associated SNAs, system integrator SNAs among others according to where they are applied.

Data Virtualization

This is a descriptive and informal term used to describe an abstract/wide/general view of some data. It is simply that data can be accessed through the data service. Data virtualization is used in data service documentation and majorly helps to explain and describe data which is in abstract forms. Statistical data can easily be modified using this tool so that they can easily be understood by the management.

Radio-Frequency Identification (Rfid)

Transponders are the main electronic gadgets that are used in frequency identification. RFID facilitates automatic and ready identification of different channels of frequency so that the receivers can channel the right frequency to the right persons. RFID tags are very mobile and can facilitate dynamism. This is because they can be placed anywhere from which they help to track the location using radio waves.

These gadgets can be used in a wide range of applications including supermarkets where they help to check the inventory and thus create efficiency. Some examples include modulating and demodulating radio frequency signals and other chipless RFID which furthers the identification process.

Cloud Computing

This is a style in computer technology that provides information technology capabilities that allow users to access technology-enabled services from the internet without knowing, having the expertise, or control over the technology infrastructure that supports them. A lot of networking is embraced in this setup. A variety of devices, software, and services are connected over a powerful network and the final array of networks is called the cloud.

It helps users to rely on the internet to have their needs satisfied. An example of its implementation is Google applications which store various software and data in a server to be accessed by users online.

Client-Server Computing

Client-server computing: is a form of distributed computing. The two main components of this system are the client and the server. These two parts work together towards exchanging the data between them through the available network. It consists of the superior machine (server) which is the information reservoir and the requesting/ less superior machines (clients) The client sends the request to the server, waits for the server’s response, translates the response into “human-readable” results, presents the results to the user while the server listens for a client’s query, processes that query and returns the results to the client.

Service-Oriented Architecture (Soa)

SOA is a technique that is used to develop systems whose functionality is grouped around business processes. Through this, data can be exchanged from one gadget to another in the event of transactions. This architecture is normally developed using the distributed computing and modular programming technologies.

Peer to Peer Networks

This is a network computing technique in which two or more Personal Computers are connected and share resources without relying on or passing through a server. Here, for instance, there is no single source of information (superior computer) to other computers in the network. These computers can be connected through a Universal Serial Bus for file transfer or can be in a grand scale network in which various protocols and applications are used to relate users over the network.

Public Key Infrastructure/Encryption

This refers to an array of cryptography that binds public keys with relevant unique user identities in the course of a certificate authority. This enables computer users without prior contacts to be authenticated to each other and uses their public key information to encrypt messages to each other. It enables those communicating to establish confidentiality, message integrity, and user authentication without prior revealing of secret messages between them.

Sources

O’Brien, J. Maraka, G. (2006). Management Information Systems. Boston: McGraw Ltd.

Tomasi, M. (2000). Advanced electronic telecommunication. London: Oxford Ltd.

Informatics PAGE * MERGEFORMAT 5.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2021, September 26). "Management Information Systems" by James O’Brien and George M. Marakas. https://ivypanda.com/essays/management-information-systems-by-james-obrien-and-george-m-marakas/

Work Cited

""Management Information Systems" by James O’Brien and George M. Marakas." IvyPanda, 26 Sept. 2021, ivypanda.com/essays/management-information-systems-by-james-obrien-and-george-m-marakas/.

References

IvyPanda. (2021) '"Management Information Systems" by James O’Brien and George M. Marakas'. 26 September.

References

IvyPanda. 2021. ""Management Information Systems" by James O’Brien and George M. Marakas." September 26, 2021. https://ivypanda.com/essays/management-information-systems-by-james-obrien-and-george-m-marakas/.

1. IvyPanda. ""Management Information Systems" by James O’Brien and George M. Marakas." September 26, 2021. https://ivypanda.com/essays/management-information-systems-by-james-obrien-and-george-m-marakas/.


Bibliography


IvyPanda. ""Management Information Systems" by James O’Brien and George M. Marakas." September 26, 2021. https://ivypanda.com/essays/management-information-systems-by-james-obrien-and-george-m-marakas/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
1 / 1