1,369
29
Review, 3 pages (750 words)

Computer technology article review sample

– Explain how WiMAX will make a difference in how we “ connect” to the Internet. What are some of its key characteristics? (TC)
WIMAX is short for worldwide interoperability for microwave access. It has a potential of broadband internet access. It does not require cable and this enables people to connect to the internet automatically wherever they are. This is possible through the availability of WIMAX antenna.
– Briefly discuss the differences and the role of each of these wireless standards: Bluetooth, Zigbee, 802. 11b
Bluetooth is a wireless technology for connecting devices. The devices have to agree before they can exchange data. 802. 11b is a Wi-Fi communication technology that transmits at a maximum data rate of 11Mbps. It uses radio signal frequency (2. 4GHz). It is cheap compared to the other wireless technology devices. The unregulated frequency may be interfered by home appliances. Zigbee is used for high-level communication protocols and it is used to create personal networks. It requires low data rate unlike the 802. 11b.
– Describe how services and businesses take advantage of radio frequency identification (RFID). (TC)
Businesses benefits from Radio Frequency Identification (RFID) include cost reduction. This is possible because it reduces waste and the manual checks in the business do not exist. It also prevents theft in the business (Glover & Bhatt, 2006). It has made it possible in theft identification
– Explain the purpose of an intranet and the advantages it offers to a business. (IS)
Intranet enables the employees within a business unit to access the internet. It allows employees to access files and documents in their workstations. The sharing of data saves time (Grande, 2008). The employees can use the time to do something productive to the business. Intranet reduces costs in the business because the cost of printing does not occur.
– What can you do to protect yourself against identity theft? (IS)
– Authentication techniques such as passwords are an effective way to validate a user having access to important information. Describe some guidelines to creating a strong password. (IS)
Strong passwords should not contain complete words. The passwords must not have real names, usernames and company names. These names will allow the thief to guess and they may succeed.
– Discuss the various ways the Internet can be used to scam or trick users. What can be done to protect against these attacks? (IS)
The internet has many cons and way they swindle users of their money in many forms. They may send you emails that they have money but they cannot access it because they are in jail and they need you to bail them out and when he or she is out you share the big amount they have in the bank. They also dupe people into giving them their bank account details. They go ahead and withdraw the money without your knowledge. To stay protected from these cons, once you detect a fraud, avoid it and ensure you research on Google or a friend who has knowledge on the same.
– Explain the importance of software updates and how you can make sure that they are regularly installed on your computer. (IS)
Software updates prevent infection of the computer from malicious software. Software updates ensure that you get new features when they enter the market. It is also important for bug fixing. To ensure that your software is updated, it is recommended that you allow for automatic updates.
– Explain the four objectives of cryptography discussed in Professor Lee’s presentation.
The main objective of cryptography is to make it difficult for the attacker to access the information. It protects the information at a lesser cost than the value of the information.
– What are the advantages and disadvantages of newspapers moving into a digital format? (DM)
The advantage of digital format is that it is accessible at all times of the day. The digital format is free unlike the newspapers where you need to buy. The disadvantage of digital format of newspapers is that it is not accessible to all people because of limitation of internet connectivity. The connection of internet is also paid and sometimes it is expensive.
– What factors need to be considered when choosing a format to store a graphic file (. tif, . png, . jpg, gif, . bmp, etc.)? (MD)
The factors to consider in choosing a format to store graphic files include disclosure. Disclosure refers to the degree of accessibility of specifications and tools to the people who create the digital content. Another factor is the color support. The graphics produce a unique color depending on the format. Bit depth also determines the colors the figure contains

References

Glover, B., & Bhatt, H. (2006). RFID essentials. Beijing [u. a.: O’Reilly.
Grande, F. (2008). The intranet and human resources: Internal employee communication.

Thank's for Your Vote!
Computer technology article review sample. Page 1
Computer technology article review sample. Page 2
Computer technology article review sample. Page 3
Computer technology article review sample. Page 4

This work, titled "Computer technology article review sample" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Review

References

AssignBuster. (2021) 'Computer technology article review sample'. 14 November.

Reference

AssignBuster. (2021, November 14). Computer technology article review sample. Retrieved from https://assignbuster.com/computer-technology-article-review-sample/

References

AssignBuster. 2021. "Computer technology article review sample." November 14, 2021. https://assignbuster.com/computer-technology-article-review-sample/.

1. AssignBuster. "Computer technology article review sample." November 14, 2021. https://assignbuster.com/computer-technology-article-review-sample/.


Bibliography


AssignBuster. "Computer technology article review sample." November 14, 2021. https://assignbuster.com/computer-technology-article-review-sample/.

Work Cited

"Computer technology article review sample." AssignBuster, 14 Nov. 2021, assignbuster.com/computer-technology-article-review-sample/.

Get in Touch

Please, let us know if you have any ideas on improving Computer technology article review sample, or our service. We will be happy to hear what you think: [email protected]