523 -...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: ************************************************************************************************ *** ************************************************************************************************ *** CH 14 ************************************************************************************************ *** 1. Define the components of RFID and how active and passive tags works. Answer: In its simplest form, an RFID system consists of a tag attached to the product to be identified, a reader, one or more antennae attached to the reader, and a computer to control the reader and capture the data. Passive tags receive energy from the electromagnetic field created by the reader and backscatter information only when it is requested. The passive tag will remain energized only while it is within the interrogator's magnetic field. In contrast, active tags have a battery on board to energize them. Because active tags have their own power source, they don't need a reader to energize them; instead they can initiate the data transmission process on their own. ************************************************************************************************ *** 2. Describe three representative characteristics of the Web 2.0 environment. Answer: The ability to tap into the collective intelligence of users. The more users contribute, the more popular and valuable a Web 2.0 site becomes. Data is made available in new or never-intended ways. Web 2.0 data can be mashed up, often through Web service interfaces. Web 2.0 relies on user-generated and user-controlled content and data. Lightweight programming techniques and tools let nearly anyone act as a Web site developer. The virtual elimination of software-upgrade cycles makes everything a work-in-progress and allows rapid prototyping. Users can access applications entirely through a browser. An architecture of participation and digital democracy encourages users to add value to the application as they use it. A major emphasis on social networks and computing. Strong support of information sharing and collaboration. Rapid and continuous creation of new business models. ************************************************************************************************ *** 3. Describe social network analysis (SNA) software. Answer: Social network analysis (SNA) software is used to identify, represent, analyze, visualize, or simulate network nodes (e.g., agents, organizations, or knowledge) and edges (relationships) from various types of input data. Network analysis tools enable researchers to investigate representations of networks of different forms and different sizes, from small to very large. ************************************************************************************************ *** 4. What are some of the potential positive and negative impacts of MSS on managers' jobs?...
View Full Document

Page1 / 8

523 -...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online