Reference no: EM132202362
Identify: Two types of networks of your choice Two types of communications devices Two types of network communication standards and protocols 2. Discuss one of the followings: a. You are on the road and need to call home. Just as you pass a Pizza Hut, you open your mobile phone to make a call. What are the first words you hear? “The Best Pizza Under One Roof.” This scenario may seem a little futuristic, but today’s technology makes it possible to deliver targeted advertising in all sorts of new ways. Wireless marketing and advertising networks deliver targeted advertisements, coupons, and promotions to leading wireless Internet devices, including mobile phones, personal mobile devices, and two-way pagers. In one study of mobile phone users, participants were given free text-messaging capabilities in return for the more than 100,000 targeted advertising messages. More than 60 percent of the participants liked receiving targeted advertisements, and 20 percent asked for more information after viewing the advertising message. Will American users willingly accept wireless advertisements sent to them over mobile devices? What inducements might convince someone to accept the messages? Would you accept the advertising in return for a free service? How would you feel if the advertisements were targeted at your personal profile? Would this make a difference in your willingness to accept the advertisements? b. A primary reason many companies implement an intranet is to enhance productivity. The implementation of an intranet, however, can cause a number of problems within a company. Security can be an issue. The intranet is only as secure as its weakest link, which generally is the people managing and using the intranet. Without proper security, companies may open backdoors from the Internet to the intranet, unauthorized links to unsecured locations, and improper use of passwords. Other issues relate to who controls and maintains the information, access levels, and how to determine who has what level of access. Policies and procedures must be developed. Who should be responsible for a company’s intranet? Because an intranet generally is for all employees, should everyone have an opportunity to participate in writing the policies and procedures? What safeguards can be used to ensure the proper use of passwords? How should access levels be determined? Vermaat, M. E., Sebok, S. L., Freund, S. M., Campbell, J. T., Frydenberg, M., and Ly, A. (2016). Discovering computers 2016: Digital Technology, data, and devices. Boston, MA: Cengage Learning. Dr. Patrick Offor PLEASE DONT TAKE OTHER PEOPLE'S ANSWERS
ITS ABOUT COMPUTER SCIENCE.