Professional Documents
Culture Documents
Name Rizwan Iqbal Class BBA Semester 5 Roll No BBHA-F17-048 Subject Management Information System Submitted To Sir Aneeb Lashari
Name Rizwan Iqbal Class BBA Semester 5 Roll No BBHA-F17-048 Subject Management Information System Submitted To Sir Aneeb Lashari
Name Rizwan Iqbal Class BBA Semester 5 Roll No BBHA-F17-048 Subject Management Information System Submitted To Sir Aneeb Lashari
Class BBA
Semester 5th
Roll No BBHA-F17-048
Contents:
Following are the contents which I have studied in presentation in class and summarized for project.
Business Application
Summary:
In further detail business application is a collection of components that provides a business functionality that
you can use internally, externally, or with other business applications. You can create business applications of
individual components, which are related to each other. Business application is a type of a custom collection. One
user must be able to perform most of his tasks from one business application. He should not be forced to switch to
another application to perform the tasks of the same role. For example a salesman should see in his menu Leads,
Opportunities, Meetings, Sales Orders, and Sales to Invoice etc. He should not be forced to go to the accounting
application to invoice the sales. In modern world the computer hardware is work to more technology is radio
frequency launch for our users. Radio frequency identification is a form of wireless communication that
incorporates the use of electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic
spectrum to uniquely identify an object, animal or person. Radio Frequency Identification (RFID) refers to a wireless
system comprised of two components: tags and readers. The reader is a device that has one or more antennas that
emit radio waves and receive signals back from the RFID tag. Active RFID tags are powered by batteries. It is the use
of radio waves to read and capture information stored on a tag attached to an object. A tag can be read from up to
several feet away and does not need to be within direct line-of-sight of the reader to be tracked. The (RDIF) privacy
issues and the technical challenges faced by the RFID tags in becoming a fundamental technology are discussed. Two
notable privacy issues include leaking information pertaining to personal property, and tracking the consumer's
spending history and patterns and physical whereabouts. Identity thieves could read the same information from
an RFID-enabled passport, or a security access card with an RFID chip. In 2006, a Dutch passport was read from ten
meters away. That's why some people purchase RFID-blocking wallets, card holders, or passport cases. In Prediction
cheaper an dfor the future we can readily imagine a being, possessing sufficient knowledge and ability, to calculate
the orbits of every person now living. Such a being must know all that is to be known in regard to our mental and
physical organisms, and the circumstances under which we are and he will placed. If Moore’s law prevails and
technology advancement continues, we can expect to see our lives change in remarkable and unimaginable ways.
Although we cannot really predict the future, it is interesting and fun to read the predictions of futurists—people
whose job is to think about what the future might bring. Here’s one man’s perspective on what computing technology
might do to change our lives in the decades to come. Real World case IBM researchers and a team of doctors are
building a database of digital images they hope will enable oncologists to diagnose and treat cancer patient faster and
with more success. Wachovia has switched from dedicated servers to 10,000 CPU resources pool spread across cities.
Wachovia has eight applications running on its grid that used in internal transaction. Linux grid power behind the
payment system at PayPal. Cheaper and easier to grow the grid as compared to mainframe computing. Real world
case 4, a large variety of technology products now have touch screens, for example mobile phones, tablets,
computers, and TV screens. People like being able to interact with a machine through touch screen technology,
because it is a more natural and intuitive interaction between human and machine. The post WIMP interfaces include
a range of reality-based interaction technologies virtual reality. Touch here is one of these components. However, this
technology has developed a great deal. Touch screen devices now handle multiple touches at once, and recognize
gestures among other abilities. Touch screens have been developed to contain no electronics or computer parts, so
they can be easily moved and reconfigured. Any everyday object can be transformed into a touch screen.