Two types of network communication standards and protocols

Assignment Help Operation Management
Reference no: EM132202362

Identify: Two types of networks of your choice Two types of communications devices Two types of network communication standards and protocols 2. Discuss one of the followings: a. You are on the road and need to call home. Just as you pass a Pizza Hut, you open your mobile phone to make a call. What are the first words you hear? “The Best Pizza Under One Roof.” This scenario may seem a little futuristic, but today’s technology makes it possible to deliver targeted advertising in all sorts of new ways. Wireless marketing and advertising networks deliver targeted advertisements, coupons, and promotions to leading wireless Internet devices, including mobile phones, personal mobile devices, and two-way pagers. In one study of mobile phone users, participants were given free text-messaging capabilities in return for the more than 100,000 targeted advertising messages. More than 60 percent of the participants liked receiving targeted advertisements, and 20 percent asked for more information after viewing the advertising message. Will American users willingly accept wireless advertisements sent to them over mobile devices? What inducements might convince someone to accept the messages? Would you accept the advertising in return for a free service? How would you feel if the advertisements were targeted at your personal profile? Would this make a difference in your willingness to accept the advertisements? b. A primary reason many companies implement an intranet is to enhance productivity. The implementation of an intranet, however, can cause a number of problems within a company. Security can be an issue. The intranet is only as secure as its weakest link, which generally is the people managing and using the intranet. Without proper security, companies may open backdoors from the Internet to the intranet, unauthorized links to unsecured locations, and improper use of passwords. Other issues relate to who controls and maintains the information, access levels, and how to determine who has what level of access. Policies and procedures must be developed. Who should be responsible for a company’s intranet? Because an intranet generally is for all employees, should everyone have an opportunity to participate in writing the policies and procedures? What safeguards can be used to ensure the proper use of passwords? How should access levels be determined? Vermaat, M. E., Sebok, S. L., Freund, S. M., Campbell, J. T., Frydenberg, M., and Ly, A. (2016). Discovering computers 2016: Digital Technology, data, and devices. Boston, MA: Cengage Learning. Dr. Patrick Offor PLEASE DONT TAKE OTHER PEOPLE'S ANSWERS

ITS ABOUT COMPUTER SCIENCE.

Reference no: EM132202362

Questions Cloud

Explain the concept of culture : Explain the concept of culture. Why is it important to avoid ethnocentricity and gain cultural literacy? Explain the Hofstede framework briefly
Kinds of relationships that consumer might engage : What is hedonic consumption? What are utilitarian needs? What are the different kinds of relationships that a consumer might engage in with a product?
Entering foreign markets : Entering foreign markets, by definition, means not investing in a firm’s home country.
Auto body supply stores from paint and equipment supply : Wesco Autobody Supply bought three auto body supply stores from Paint & Equipment Supply.
Two types of network communication standards and protocols : Two types of networks of your choice Two types of communications devices Two types of network communication standards and protocols 2.
Most effective for developing the skills of it engineers : Which three do you think would be most effective for developing the skills of IT engineers? Which do you think would be the least effective?
What are the proposed it initiatives : What are the proposed IT initiatives? What questions still need to be addressed in the systems planning and systems analysis phases?
Build simulation model to estimate expected npv of j-crew : Build a simulation model to estimate the expected NPV of J-Crew and run your simulation with 5,000 trials
When heavy rains caused water flows that breeched the banks : Arizona was hit by its second 100-year flood in 10 years when heavy rains caused water flows that breeched the banks of the Centennial Wash.

Reviews

Write a Review

Operation Management Questions & Answers

  Quarter pounder uses a quarter pound of meat

McBurger fast food restaurant sells quarter pounders and cheeseburgers. A quarter pounder uses a quarter pound of meat, and a cheeseburger uses only .2 lb. The restaurant starts the day with 200lb of meat but may order more at an additional cost of 2..

  Market performance of parent firms equity carve-out

Corporate Governance and Market Performance of Parent Firms Following Equity Carve-Out”.

  What is one recent news story that you have found

What is one recent news story that you have found illustrates the relationship between a business leader's role and the success or failure of his/her business?

  Evaluate the organizations facility with regard to capacity

Evaluate the organization's facilities with regard to capacity and location. Determine whether the organization has enough capacity.

  What is your small business or entrepreneurial idea

What is your small business or entrepreneurial idea? Why do you believe that this is a functional idea for a new business? How might your strengths help you be successful in terms of this opportunity?

  Describe the organizational culture at ideo

You have studied the organizational culture in place at IDEO and are making a presentation about this company to your company's top management team.

  Regulate inflation in commerce and economic transaction

A depositor does not have the right to draw against uncollected funds. The primary purpose of the Uniform Commercial Code is to regulate inflation in commerce and economic transaction. A certified check has already been accepted by the drawee bank.

  Compare and contrast the potential root causes of terrorism

Compare and contrast the potential root causes of terrorism. Make a case for what you perceive to be the most significant source of terrorism in the past, present, and future.

  What happens to the leased property

If Ann dies during the period of the lease, what happens to the leased property?

  Each level adds more consumer value

There are three levels of a product that require marketers to take into consideration when making strategy decisions. Each level adds more consumer value.

  Mobile telephony infrastructure services

Assume you have a job at Ericsson. As you know, Ericsson is currently developing 5G and mobile telephony infrastructure services.

  What must the rating of the bonds be

HMK Enterprises would like to raise $10 million to invest in capital expenditures. The company plans to issue five-year bonds with a face value of $1000.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd