- Published: September 25, 2022
- Updated: September 25, 2022
- University / College: Boston University
- Level: Masters
- Language: English
- Downloads: 18
Engineering Computer Technology Question Twitter, originally known as twittr, was launched seven years ago on July 15th the year 2006. Twitter is a micro-blogging platform founded by Evans Williams, Biz Stone and Jack Dorsey. It is a world wide real time communication platform with over 400 million global users in a month. In a day there are more than 400 million tweets, that translates to almost 340 million tweets in a month.
Question 2
Google has a number of tools for cloud computing. Most of the services offered by google are free. They include Gmail for basic email, chat and other services. Google Docs which allows users to create and store their spreadsheets including sharing. Picasa, which manages and store the user’s images online. YouTube which enables users to publish and store their videos online. Google Translate which does translation services of most languages.
Question 3
SQL database, originally known as SEQUEL, was developed back in 1970 by Raymond Boyce and Donal Chamberline of IBM.
Question 4 Bluetooth headsets
Blue tooth headsets have both advantages and disadvantages associated with the technology. The first advantage is that there are no wires used thus the limitations associated with distance constraints are minimized if not eliminated. With wireless headsets, handling calls while driving is easy and simplified. It allows hands free phone call reception thus eliminating accidents associated with driving while on a phone call. Bluetooth wireless signals use low power signal unlike wired headsets. Blue tooth headset is universal meaning it can be used in any device that is Bluetooth enabled.
On the other hand, Bluetooth headsets are more expensive compared to their wired counterpart. It can be as much as ten times the cost of the normal traditional headsets. It has a mono output which affects the quality of sound it generates as compared to the traditional wired headsets. Finally, Bluetooth headsets are limited in some way by signal range. The device has to be close to the headset for a quality sound and operation.
Question 5
Amazon. com, Inc is an e-commerce platform and company founded by Jeff Beros in 1994. It was originally based in a garage in Bellevue, Washington but since then it has grown to be then leading and largest online retailers. It has its headquarters based in Seattle, Washington USA. It was started as an online bookstore but since diversified to include other item like DVD, cd, software and video games. The company was incorporated as Cadabra after which it went online in 1995 as Amazon. com (Spector, 13).
Question 6
Management information system provides the information needed by an organization for effective and efficient management. Management information system entails the computer systems used to manage data, technology and people within the organization. Information technology on the other hand is the combination of computers and computer networks used to acquire, retrieve, manipulate, store and transfer information. (Mackey, 13)
Question 7
Radio frequency identification (RFID) is a wireless technology based on radio frequency electromagnetic waves to transfer data from the emitter to the radio signal reader. In stores, it has been adopted and it is used to automatically identify besides tracking the tags attached to the objects. In stores, the technology is used for anti-theft in order to track those items that have not been paid for.
Question 8
Critical path in project management is the longest sequence of activities within the project plan, all of which must be completed in order for the whole project to be completed in due date. The activities must be conducted in sequence, meaning that an activity cannot be started if the previous activity in the sequence has not been completed. Any delays in the sequence may cause the entire project to delay.
Question 9
Social engineering attack on business information technology is when an attacker uses social skills such as human interaction to gather and piece together information that can compromise the security of an organization and its computer system.
Work Cited
Mackey, Thomas P., and Trudi Jacobson. Using technology to teach information literacy. New
York: Neal-Schuman Publishers, 2008. Print.
Spector, Robert. Amazon. com: get big fast. New York: HarperBusiness, 2000. Print.