Principles of Information Systems
13th Edition
ISBN: 9781337660556
Author: Ralph Stair; George Reynolds
Publisher: Cengage Learning US
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
Chapter 7, Problem 2CE
Program Plan Intro
Electronic commerce:
- Electronic commerce is a method of buying as well as selling of products or goods through online. Here, money and data transactions are done using internet.
- Electronic commerce is also called as E-commerce or Internet commerce.
- Even though the technologies available such as e-mail, social media, and mobiles, the modern e-commerce mostly uses the Internet for the online purchasing of products.
- It is the most efficient method to communicate within the organization of business transactions such as maintaining the financial records of the users such as bank balances, name, and address. But it is just a part of e-commerce business.
Six forms of electronic commerce:
- It includes different forms of commerce based on the transactions performed.
- Business-to-Business (B2B)
- It includes the transactions performed between two different businesses like manufacturer and wholesaler, wholesaler and retailer and many such.
- Example: automobile manufacturing.
- Business-to-Consumer (B2C)
- It includes the transactions performed between the companies and the consumers or customers.
- Here, the end users of that company are referred as consumers or customers.
- For example, customer buying a fridge from the electronic retailer is known as B2C transaction.
- Consumer-to-Consumer (C2C)
- It includes the transactions performed between two different customers or consumers.
- Example: Online auctions like OLX.
- Government-to-Business (G2B)
- It includes the transactions performed between the public administration and the enterprises.
- Government-to-Citizen (G2C)
- It includes the transactions performed between the government and the citizen or private individual.
- Example: applying for a certificate.
- Government-to-Government (G2G)
- It includes the transactions performed between two different government agencies.
- Example: Northeast Gang
Information System (NEGIS).
- Business-to-Business (B2B)
Expert Solution & Answer

Trending nowThis is a popular solution!

Students have asked these similar questions
There are two network models and name them while providing a couple of advantages and disadvantages for each network model.
https://docs.google.com/document/d/1lk0DgaWfVezagyjAEskyPoe9Ciw3J2XUH_HQfnWSmwU/edit?usp=sharing
use the link to answer the question below
b) As part of your listed data elements, define the following metadata for each: Data/FieldType, Field Size, and any possible constraint/s or needed
c) Identify and describe the relationship/s among the tables. Please provide an example toillustrate Referential Integrity and explain why it is essential for data credibility.
I have inserted the data elements below for reference
Why do we use NAT and PAT technologies? What happens without them? What is the major difference between NAT and PAT (Port Address Translation)?
please answer it in the simplest way as possible
Chapter 7 Solutions
Principles of Information Systems
Ch. 7.1 - Prob. 1RQCh. 7.1 - Prob. 2RQCh. 7.1 - Prob. 1CTQCh. 7.1 - Prob. 2CTQCh. 7.2 - Prob. 1RQCh. 7.2 - Prob. 2RQCh. 7.2 - Prob. 1CTQCh. 7.2 - Prob. 2CTQCh. 7.3 - Prob. 1RQCh. 7.3 - Prob. 2RQ
Ch. 7.3 - Prob. 1CTQCh. 7.3 - Prob. 2CTQCh. 7.4 - Prob. 1RQCh. 7.4 - Prob. 2RQCh. 7.4 - Prob. 1CTQCh. 7.4 - Prob. 2CTQCh. 7.5 - Prob. 1RQCh. 7.5 - Prob. 2RQCh. 7.5 - Prob. 1CTQCh. 7.5 - Prob. 2CTQCh. 7 - Prob. 1SATCh. 7 - Prob. 2SATCh. 7 - Prob. 3SATCh. 7 - Prob. 4SATCh. 7 - Prob. 5SATCh. 7 - Prob. 6SATCh. 7 - Prob. 7SATCh. 7 - Prob. 8SATCh. 7 - Prob. 9SATCh. 7 - Prob. 10SATCh. 7 - Prob. 11SATCh. 7 - Prob. 12SATCh. 7 - Prob. 13SATCh. 7 - Prob. 14SATCh. 7 - Prob. 15SATCh. 7 - Prob. 16SATCh. 7 - Prob. 17SATCh. 7 - Prob. 1RQCh. 7 - Prob. 2RQCh. 7 - Prob. 3RQCh. 7 - Prob. 4RQCh. 7 - Prob. 5RQCh. 7 - Prob. 6RQCh. 7 - Prob. 7RQCh. 7 - Prob. 8RQCh. 7 - Prob. 9RQCh. 7 - Prob. 10RQCh. 7 - Prob. 11RQCh. 7 - Prob. 12RQCh. 7 - Prob. 13RQCh. 7 - Prob. 14RQCh. 7 - Prob. 15RQCh. 7 - Prob. 16RQCh. 7 - Prob. 17RQCh. 7 - Prob. 18RQCh. 7 - Prob. 1DQCh. 7 - Prob. 2DQCh. 7 - Prob. 3DQCh. 7 - Prob. 4DQCh. 7 - Prob. 5DQCh. 7 - Prob. 6DQCh. 7 - Prob. 7DQCh. 7 - Prob. 8DQCh. 7 - Prob. 9DQCh. 7 - Prob. 10DQCh. 7 - Prob. 11DQCh. 7 - Prob. 12DQCh. 7 - Prob. 2PSECh. 7 - Prob. 3PSECh. 7 - Prob. 1TACh. 7 - Prob. 2TACh. 7 - Prob. 3TACh. 7 - Prob. 2WECh. 7 - Prob. 1CECh. 7 - Prob. 2CECh. 7 - Prob. 3CECh. 7 - Prob. 1CTQ1Ch. 7 - Prob. 2CTQ1Ch. 7 - Prob. 3CTQ1Ch. 7 - Prob. 1CTQ2Ch. 7 - Prob. 2CTQ2Ch. 7 - Prob. 3CTQ2
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- What is the difference between physical connection (Physical topology) and logical connection (Logical topology)? Why are both necessary? Why do we need the Seven-Layer OSI model? What will happen If we don’t have it? Why do we need official standards for copper cable and fiber-optic cable? What happens without the standard? please answer in the simplest way as possiblearrow_forwardSuppose that the MinGap method below is added to the Treap class on Blackboard. public int MinGap( ) Returns the absolute difference between the two closest numbers in the treap. For example, if the numbers are {2, 5, 7, 11, 12, 15, 20} then MinGap would returns 1, the absolute difference between 11 and 12. Requirements 1. Describe in a separate Design Document what additional data is needed and how that data is used to support an time complexity of O(1) for the MinGap method. Show as well that the methods Add and Remove can efficiently maintain this data as items are added and removed. (6 marks) 2. Re-implement the methods Add and Remove of the Treap class to maintain the augmented data in expected O(log n) time. (6 marks) 3. Implement the MinGap method. (4 marks) 4. Test your new method thoroughly. Include your test cases and results in a Test Document. (4 marks)arrow_forwardSuppose that the two Rank methods below are added to the Skip List class on Blackboard. public int Rank(T item) Returns the rank of the given item. public T Rank(int i) Returns the item with the given rank i. Requirements 1. Describe in a separate Design Document what additional data is needed and how that data is used to support an expected time complexity of O(log n) for each of the Rank methods. Show as well that the methods Insert and Remove can efficiently maintain this data as items are inserted and removed. (7 marks) 2. Re-implement the methods Insert and Remove of the Skip List class to maintain the augmented data in expected O(log n) time. Using the Contains method, ensure that added items are distinct. (6 marks) 3. Implement the two Rank methods. (8 marks) 4. Test your new methods thoroughly. Include your test cases and results in a Test Document. (4 marks)arrow_forward
- https://docs.google.com/document/d/1lk0DgaWfVezagyjAEskyPoe9Ciw3J2XUH_HQfnWSmwU/edit?usp=sharing use the link to answer the question below b) As part of your listed data elements, define the following metadata for each: Data/FieldType, Field Size, and any possible constraint/s or needed c) Identify and describe the relationship/s among the tables. Please provide an example toillustrate Referential Integrity and explain why it is essential for data credibility. I have inserted the data elements below for referencearrow_forwardHighlight the main differences between Computer Assisted Coding and Alone Coding with their similaritiesarrow_forwardSuppose that the MinGap method below is added to the Treap class on Blackboard. public int MinGap ( ) Returns the absolute difference between the two closest numbers in the treap. For example, if the numbers are {2, 5, 7, 11, 12, 15, 20} then MinGap would returns 1, the absolute difference between 11 and 12. Requirements 1. Describe in a separate Design Document what additional data is needed and how that data is used to support an time complexity of O(1) for the MinGap method. Show as well that the methods Add and Remove can efficiently maintain this data as items are added and removed. (6 marks) 2. Re-implement the methods Add and Remove of the Treap class to maintain the augmented data in expected O(log n) time. (6 marks) 3. Implement the MinGap method. (4 marks) 4. Test your new method thoroughly. Include your test cases and results in a Test Document. (4 marks)arrow_forward
- Suppose that the two Rank methods below are added to the Skip List class on Blackboard. public int Rank (T item) Returns the rank of the given item. public T Rank(int i) Returns the item with the given rank i. Requirements 1. Describe in a separate Design Document what additional data is needed and how that data is used to support an expected time complexity of O(log n) for each of the Rank methods. Show as well that the methods Insert and Remove can efficiently maintain this data as items are inserted and removed. (7 marks) 2. Re-implement the methods Insert and Remove of the Skip List class to maintain the augmented data in expected O(log n) time. Using the Contains method, ensure that added items are distinct. (6 marks) 3. Implement the two Rank methods. (8 marks) 4. Test your new methods thoroughly. Include your test cases and results in a Test Document. (4 marks)arrow_forwardSuppose that the two Rank methods below are added to the Skip List class on Blackboard. public int Rank (T item) Returns the rank of the given item. public T Rank(int i) Returns the item with the given rank i. Requirements 1. Describe in a separate Design Document what additional data is needed and how that data is used to support an expected time complexity of O(log n) for each of the Rank methods. Show as well that the methods Insert and Remove can efficiently maintain this data as items are inserted and removed. (7 marks) 2. Re-implement the methods Insert and Remove of the Skip List class to maintain the augmented data in expected O(log n) time. Using the Contains method, ensure that added items are distinct. (6 marks) 3. Implement the two Rank methods. (8 marks) 4. Test your new methods thoroughly. Include your test cases and results in a Test Document. (4 marks)arrow_forwardautomata theoryarrow_forward
- I need help in construct a matlab code to find the voltage, the currents, and the watts based on that circuit.arrow_forwardObjective Implement Bottom-Up Iterative MergeSort and analyze its efficiency compared to recursive MergeSort. Unlike the recursive approach, which involves multiple function calls and stack overhead, the bottom-up version sorts iteratively by merging small subarrays first, reducing recursion depth and improving performance. Task 1. Implement Bottom-Up Iterative MergeSort о Start with single-element subarrays and iteratively merge them into larger sorted sections. Use a loop-based merging process instead of recursion. ○ Implement an efficient in-place merging strategy if possible. 2. Performance Analysis Compare execution time with recursive MergeSort on random, nearly sorted, and reversed datasets. ○ Measure and plot time complexity vs. input size. O Submission Explain why the iterative version reduces function call overhead and when it performs better. • Code implementation with comments. • A short report (1-2 pages) comparing performance. • Graph of execution time vs. input size for…arrow_forwardGiven a shared data set, we allow multiple readers to read at the same time, and only one single writer can access the shared data at the same time. In the lecture slides, a solution is given. However, the problem is that the write cannot write forever, if there are always at least one reader. How to ensure that the writer can eventually write? Propose your solution by using semaphores and implemented in Python from threading import Thread, Semaphore from time import sleep from sys import stdout class Reader(Thread): def__init__(self, name): self.n=name; Thread.__init__(self) defrun(self): globalnr, nw, dr, dw whileTrue: # ⟨await nw == 0 then nr += 1⟩ e.acquire() ifnw>0: #if nw > 0 or dw > 0 : dr+=1; e.release(); r.acquire() nr+=1 ifdr>0: dr-=1; r.release() else: e.release() # read data stdout.write(self.n+' reading\n') sleep(1) # ⟨nr -= 1⟩ e.acquire() nr-=1 ifnr==0anddw>0: dw-=1 ; w.release() else: e.release() class Writer(Thread): def__init__(self, name):…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781305082168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage Learning

Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning

Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning

Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning

Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning

Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning