Name Rizwan Iqbal Class BBA Semester 5 Roll No BBHA-F17-048 Subject Management Information System Submitted To Sir Aneeb Lashari

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

Name Rizwan Iqbal

Class BBA

Semester 5th

Roll No BBHA-F17-048

Subject Management Information System

Submitted to Sir Aneeb Lashari


Chapter:

Computer Hardware which is assigned for project.

Contents:

Following are the contents which I have studied in presentation in class and summarized for project.

 Business Application

 Radio Frequency Identification

 RFID Privacy Issues

 Prediction for the future

 Real World Case 3

 Real World Case 4

Summary:

In further detail business application is a collection of components that provides a business functionality that

you can use internally, externally, or with other business applications. You can create business applications of

individual components, which are related to each other. Business application is a type of a custom collection. One

user must be able to perform most of his tasks from one business application. He should not be forced to switch to

another application to perform the tasks of the same role. For example a salesman should see in his menu Leads,

Opportunities, Meetings, Sales Orders, and Sales to Invoice etc. He should not be forced to go to the accounting

application to invoice the sales. In modern world the computer hardware is work to more technology is radio

frequency launch for our users. Radio frequency identification is a form of wireless communication that

incorporates the use of electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic

spectrum to uniquely identify an object, animal or person. Radio Frequency Identification (RFID) refers to a wireless

system comprised of two components: tags and readers. The reader is a device that has one or more antennas that

emit radio waves and receive signals back from the RFID tag. Active RFID tags are powered by batteries. It is the use

of radio waves to read and capture information stored on a tag attached to an object. A tag can be read from up to

several feet away and does not need to be within direct line-of-sight of the reader to be tracked. The (RDIF) privacy

issues and the technical challenges faced by the RFID tags in becoming a fundamental technology are discussed. Two

notable privacy issues include leaking information pertaining to personal property, and tracking the consumer's

spending history and patterns and physical whereabouts. Identity thieves could read the same information from

an RFID-enabled passport, or a security access card with an RFID chip. In 2006, a Dutch passport was read from ten

meters away. That's why some people purchase RFID-blocking wallets, card holders, or passport cases. In Prediction
cheaper an dfor the future we can readily imagine a being, possessing sufficient knowledge and ability, to calculate

the orbits of every person now living. Such a being must know all that is to be known in regard to our mental and

physical organisms, and the circumstances under which we are and he will placed. If Moore’s law prevails and

technology advancement continues, we can expect to see our lives change in remarkable and unimaginable ways.

Although we cannot really predict the future, it is interesting and fun to read the predictions of futurists—people

whose job is to think about what the future might bring. Here’s one man’s perspective on what computing technology

might do to change our lives in the decades to come. Real World case IBM researchers and a team of doctors are

building a database of digital images they hope will enable oncologists to diagnose and treat cancer patient faster and

with more success. Wachovia has switched from dedicated servers to 10,000 CPU resources pool spread across cities.

Wachovia has eight applications running on its grid that used in internal transaction. Linux grid power behind the

payment system at PayPal. Cheaper and easier to grow the grid as compared to mainframe computing. Real world

case 4, a large variety of technology products now have touch screens, for example mobile phones, tablets,

computers, and TV screens. People like being able to interact with a machine through touch screen technology,

because it is a more natural and intuitive interaction between human and machine. The post WIMP interfaces include

a range of reality-based interaction technologies virtual reality. Touch here is one of these components. However, this

technology has developed a great deal. Touch screen devices now handle multiple touches at once, and recognize

gestures among other abilities. Touch screens have been developed to contain no electronics or computer parts, so

they can be easily moved and reconfigured. Any everyday object can be transformed into a touch screen.

You might also like