![Using MIS (9th Edition)](https://www.bartleby.com/isbn_cover_images/9780134106786/9780134106786_largeCoverImage.gif)
Explanation of Solution
The Internet is an Internet:
The Internet simply called as “the Net” is a global network that connects millions of computers throughout the world via dedicated routers and servers. When two computers are connected they can send and receive all kinds of information such as text, images, graphics, etc.
IP Address:
A number which is used to identify a particular device is called an IP address, which also referred as an Internet address.
- It has two formats called “IPv4” and “IPv6”.
Reason for delivering packets with IP address:
Before sending a packet, it is important to provide internet address on the packet.
- Because, when a user enter a domain name in the browser, user’s system sends a request to the DNS server for asking its corresponding IP address.
- Finally, DNS server replies with the IP address and packets to be sent for that site.
Purpose of domain name:
Before sending a packet, it is important to provide domain name or IP address on the packet. It is difficult to remember the IP address to find a particular site; but it is easy to remember the domain name such as www.pondi.edu.in, www.yahoo.com and so on.
Way of associate domain names with IP address:
- The domain name can be defined as identification of any of the authority and control over the internet that contains rules and procedures known as the Domain Name System (DNS) where the domain name can be registered with the DNS.
- The domain name can be obtained by registering the name of any organization with any domain name system.
- DNS is used to assign the domain name to IP address.
Role of agencies like GoDaddy:
The role of GoDaddy Company is to register the domain name and gets approved from Internet Corporation for Assigned Names and Numbers (ICANN).
- It finds whether the name is unique. If the name is unique, then it applies the name for register.
- Finally, the applicant can associate a public IP address with the name once the registration is completed.
URL:
URL stands for “Uniform Resource Locator”, provides a method to locate a resource on the web.
- Basically, it contains protocols such as “http://”, “ftp://” and so on, followed by an Internet address or Domain name.
Three-tier architecture:
The three-tier architecture is a fundamental design of user computers and servers that contains three major components or tiers such as follows:
- User tier
- Server tier
Database tier
Role of each tier in above architecture:
User tier:
- This tier contains computers and mobile devices which have web browsers that request the web page to process it.
Server tier:
- It consists of computers that execute web servers and process the requesting application programs.
Database tier:
- It also contains computers that execute DBMS, which process the user request to fetch and store data in the database.
Working methodology of three-tier architecture:
- When user enter an e-commerce website to buy products online, example “www.zulily.com” in their browser, the browser send a request to a computer in the server tire. Server tier computers can execute applications like web server, a commerce server and so on.
- The requested “www.zulily.com” page will be displayed on the user’s computer. If the user had clicked any product such as shoe, then the commerce server will send a request to the DBMS to retrieve shoe’s data from the database.
- Finally the server formats the page with the data and sends that web page to the user’s computer.
SOA:
SOA stands for “Service-Oriented Architecture”. It is a philosophy that states, each interaction among computing devices are referred as services in a prescribed, standard way.
Reason for encapsulation:
According to SOA terms, the work of each department is encapsulated in the department.
- By using SOA philosophies, each department will formally state the services it provides...
![Check Mark](/static/check-mark.png)
Want to see the full answer?
Check out a sample textbook solution![Blurred answer](/static/blurred-answer.jpg)
Chapter 6 Solutions
Using MIS (9th Edition)
- In cell C21, enter a formula to calculate the number of miles you expect to drive each month. Divide the value of number of miles (cell A5 from the Data sheet) by the average MPG for the vehicle multiplied by the price of a gallon of gas (cell A6 from the Data sheet).arrow_forwardMicrosoft Excelarrow_forwardIn cell C16, enter a formula to calculate the price of the vehicle minus your available cash (from cell A3 in the Data worksheet). Use absolute references where appropriate—you will be copying this formula across the row what fomula would i use and how do i solve itarrow_forward
- What types of data visualizations or tools based on data visualizations have you used professionally, whether in a current or past position? What types of data did they involve? What, in your experience, is the value these data views or tools added to your performance or productivity?arrow_forwardQuestion: Finding the smallest element and its row index and column index in 2D Array: 1. Write a public Java class min2D. 2. In min2D, write a main method. 3. In the main method, create a 2-D array myArray with 2 rows and 5 columns: {{10, 21, 20, 13, 1}, {2, 6, 7, 8, 14}}. 4. Then, use a nested for loop to find the smallest element and its row index and column index. 5. Print the smallest element and its row index and column index on Java Consolearrow_forward(using R)The iris data set in R gives the measurements in centimeters of the variables sepal length and width andpetal length and width, respectively, for 50 flowers from each of 3 species of iris, setosa, versicolor, andvirginica. Use the iris data set and the t.test function, test if the mean of pepal length of iris flowers isgreater than the mean of sepal length.The iris data set in R gives the measurements in centimeters of the variables sepal length and width andpetal length and width, respectively, for 50 flowers from each of 3 species of iris, setosa, versicolor, andvirginica. Use the iris data set and the t.test function, test if the mean of pepal length of iris flowers isgreater than the mean of sepal length.arrow_forward
- Recognizing the Use of Steganography in Forensic Evidence (4e)Digital Forensics, Investigation, and Response, Fourth Edition - Lab 02arrow_forwardWrite a Java Program to manage student information of a university. The Javaprogram does the following steps:a) The program must use single-dimensional arrays to store the studentinformation such as Student ID, Name and Major.b) The program asks the user to provide the number of students.c) The program asks the user to enter the Student IDs for the number of studentsand stores them.d) The program asks the user to enter the corresponding names for the numberof students and stores them.e) The program then asks the user to provide the corresponding major for thestudents and stores them.f) The program then should display the following options:1. ID Search2. Major Enrollment3. Exitg) On selecting option 1, the user can search for a student using Student ID. Theprogram asks the user to enter a Student ID. It then should print thecorresponding student’s details such as Name and Major if the user providedStudent ID number is present in the stored data. If the user’s Student IDnumber does not…arrow_forward(a) Algebraically determine the output state |q3q2q1q0> (which is a 4-qubitvector in 16-dimensional Hilbert space). Show all steps of your calculations. (b) Run a Qiskit code which implements the circuit and append threemeasurement gates to measure the (partial) output state |q2q1q0> (which is a 3-qubit vector in 8-dimensional Hilbert space). this is for quantum soft dev class, you can use stuff like Deutsch Jozsa if u wantarrow_forward
- Write a C++ program that will count from 1 to 10 by 1. The default output should be 1, 2, 3, 4, 5, 6 , 7, 8, 9, 10 There should be only a newline after the last number. Each number except the last should be followed by a comma and a space. To make your program more functional, you should parse command line arguments and change behavior based on their values. Argument Parameter Action -f, --first yes, an integer Change place you start counting -l, --last yes, an integer Change place you end counting -s, --skip optional, an integer, 1 if not specified Change the amount you add to the counter each iteration -h, --help none Print a help message including these instructions. -j, --joke none Tell a number based joke. So, if your program is called counter counter -f 10 --last 4 --skip 2 should produce 10, 8, 6, 4 Please use the last supplied argument. If your code is called counter, counter -f 4 -f 5 -f 6 should count from 6. You should count from first to last inclusively.…arrow_forwardWrite a program that will count from 1 to 10 by 1. The default output should be 1, 2, 3, 4, 5, 6 , 7, 8, 9, 10 There should be only a newline after the last number. Each number except the last should be followed by a comma and a space. To make your program more functional, you should parse command line arguments and change behavior based on their values. Argument Parameter Action -f, --first yes, an integer Change place you start counting -l, --last yes, an integer Change place you end counting -s, --skip optional, an integer, 1 if not specified Change the amount you add to the counter each iteration -h, --help none Print a help message including these instructions. -j, --joke none Tell a number based joke. So, if your program is called counter counter -f 10 --last 4 --skip 2 should produce 10, 8, 6, 4 Please use the last supplied argument. If your code is called counter, counter -f 4 -f 5 -f 6 should count from 6. You should count from first to last inclusively. You…arrow_forwardWas What is the deference betwem full At Adber and Hold?arrow_forward
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
![Text book image](https://www.bartleby.com/isbn_cover_images/9780078022159/9780078022159_smallCoverImage.jpg)
![Text book image](https://www.bartleby.com/isbn_cover_images/9780134444321/9780134444321_smallCoverImage.gif)
![Text book image](https://www.bartleby.com/isbn_cover_images/9780132737968/9780132737968_smallCoverImage.gif)
![Text book image](https://www.bartleby.com/isbn_cover_images/9780133976892/9780133976892_smallCoverImage.gif)
![Text book image](https://www.bartleby.com/isbn_cover_images/9781337627900/9781337627900_smallCoverImage.gif)
![Text book image](https://www.bartleby.com/isbn_cover_images/9780073373843/9780073373843_smallCoverImage.gif)