
Essentials of MIS (12th Edition)
12th Edition
ISBN: 9780134238241
Author: Kenneth C. Laudon, Jane P. Laudon
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Concept explainers
Expert Solution & Answer
Chapter 7, Problem 3RQ
Explanation of Solution
Internet:
- The internet is a wide range of network that connects computers throughout the world.
- It holds vast area of information resources and services. This information can be sent and received through the internet.
- It uses routers and servers to connect a computer anywhere in the world.
- It uses the standard protocol such as TCP/IP.
- Some uses of internet are,
- Communication
- Shopping
- Entertainment
- Financial transaction
- Real-time updates
How Internet works:
- Internet constitutes of two components that helps in understanding the internet. They are:
- Hard ware
- Protocols
- Hardware:
- This component includes everything like the cables, routers, smartphones and other such devices. These create a network of networks
- Some hardware devices become the end points which are called the clients and the machines that store information which the users seek on the internet are servers.
- Other hardware devices are called nodes that act as a connecting point along the route.
- Protocols:
- The hardware would not be able to create a network without using the second component which is the protocol...
Explanation of Solution
Domain Name System (DNS):
DNS stands for Domain Name System. It is the way that internet domain names are located and translated into internet protocol address.
How DNS works:
- The servers of DNS maintain a
database that containing IP addresses mapped to their corresponding domain names. - It look like a hierarchical structure, root is the domain name.
- Top-level domain is a child domain of the root and second-level domain is a child domain of the top-level domain.
- Two and three character names in the top-level domain such as .com, .edu, .gov, .org etc.
- Second-level domains contains two parts, designating a top-level name such as amazon.ca, nyu.edu.
- In the hierarchical structure, the bottom is a host name that designates a specific computer on either the private or internet network.
Internet Protocol (IP) address:
- Internet Protocol is a protocol suite that offers routing of packets from one computer to another...
Explanation of Solution
Principal internet services:
- Chatting and messaging
- Telnet
- Newsgroups
- World Wide Web (WWW)
- File Transfer Protocol (FTP)
Chatting and messaging:
- It includes two or more people who are instantaneously connected to the internet so that they can hold live, interactive conversions.
- Messaging is a one kind of chat service that allows participants to make their own private chat channels.
- It will support voice and video chat and also written conversions.
E-mail:
- E-mail allowed to share the documents/ files from one computer to another, and sending and receiving the messages so that employees within the business can easily communicate with one another.
- This is a cost effective alternative to equivalent voice, postal or overnight delivery costs.
Telnet:
- It will creates possible for employees to log onto the computer and doing work on another...
Explanation of Solution
VoIP:
- Voice over IP (VoIP) is a used to delivers voice data in digital form using packet switching methods.
- Normal calls will transmitted over telephone networks can travel over the corporate network based on the internet protocol.
- It will save money by avoiding the costs of delivering information through telephone lines.
How VoIP provides business values:
- By a simple click- and-drag operation, it will allow the conference calls on the computer screen to select the names of those taking the calls.
- It is cost effective so all the business uses VoIP.
- Telecommunication and cable companies are giving VoIP service along with their high speed internet and cable offerings which tends to be more attractive to the customers...
Explanation of Solution
Alternative ways of locating information on the web:
- Intelligent agent shopping bots
- Wikipedia
- Search engine
- Blogs
- Social networking
- RSS
- Web 2.0
- Web 3.0
Intelligent agent shopping bots:
- For searching the internet for shopping information, the shopping bots use intelligent agent software.
- For availability and price of the products specified by the user, the shopping bots are used and this will return the list of sites that sell the item along with pricing information and purchase link.
Wikipedia:
- Wikipedia is the largest reference website across the worldwide. It is a multilingual, free encyclopedia, web-based website.
- In spite of its growth and success it faces certain limitations regarding plagiarism, vandalism and copyright.
Search engine:
- For find the information on the web, the search is used instantly.
- It will go through PDF documents, file of Microsoft Office applications, images, HTML files, audio and video files to produce the results that match the desired search.
Blog:
- A website that is maintained by an individual to express one‘s own opinions and the contents present are available to the public.
- The contents or opinions are shared by the blogger in a regular fashion based on the trends that are released day to day.
- The contents are presented in the form of stories, news, trends, links that could be redirected to other articles or websites that interests the bloggers much.
Social Networking or Social Media:
- Social media is making and sharing the information, career interests, ideas and other forms of expression through networks and virtual communities...
Explanation of Solution
Uses of online search technologies for marketing:
- Searching is one of the web most popular activities with billions of queries performed every month. It is the foundation for the most profitable form of online ads and marketing.
- The search engine contains two types of listing when the users enter the search term in the search engine. They are sponsored link and un-sponsored link...
Expert Solution & Answer

Want to see the full answer?
Check out a sample textbook solution
Students have asked these similar questions
can you please give me:
* the code (step 3)
*the list file (step 5)
*and answer step 6
Thank you
# Find the error# Why will the following code not print out a list of contact namesphoneBook = {'Doe, Jane' : '843-000-0000' ,'Doe, John' : '843-111-1111' ,'Smith, Adam' : '843-222-2222' ,'Jobs, Steve' : '999-333-3333' ,}for contact in phoneBook.values():print(contact)
# Find the error:# The following code creates an empty dictionary and attempts to add a record# Why will the following code not create a new dictionary entry as intended?phoneBook = {}phoneBook{'Jobs, Steve'} = '999-111-1111'
Chapter 7 Solutions
Essentials of MIS (12th Edition)
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- Select all the possible polar representations of the vector that is obtained from rotating where by Zrot Ź x = 3e² T= 3п 8 Hint: Consider the negative angle that is equivalent to the positive angle of the rotated vector. 0arrow_forwardCharacter Analysis If you have downloaded the source code you will find a file named text.txt on the Chapter 08 folder. Write a program that reads the file's contents and determines the following: The number of uppercase letters in the file The number of lowercase letter in the file The number of digits in the file The number of whitespace characters in the filearrow_forwardWrite a program that reads the text file's contents and calculates and outputs the following in this order: • The number of words in the file • The number of lines in the file • The number of uppercase letters in the file • The number of lowercase letters in the file • The number of digits in the file • The number of letter H's in the file • The number of whitespace characters in the file NOTE: Your program should include at least one try-except error handling statement block. Your program should also validate any input that could cause your program to crash. I'm Henery The Eighth, I Am! Henery The Eighth, I Am, I am!I got married to the widow next door,She's been married seven times before.And ev'ryone was a Henery,She wouldn't have Willie or a Sam.I'm her eighth old man named Henery,Henery the Eighth, I Am!Second verse same as the first!I'm Henery The Eighth, I Am! Henery The Eighth, I Am, I am!I got married to the widow next door,She's been married seven times before.And…arrow_forward
- Figure 4-40 Modern Database Management, 13th edition, question 4-53arrow_forwardWhich of the following needs improvement in the dashboard shown? A. Instructional clarity missing for the views B. Filter placed at the top of the dashboard C. Inconsistent use of colors to represent missed goals D. Dashboard title too largearrow_forwardIf we click Show dashboard title in this dashboard, what will the title be?arrow_forward
- Please draw the diagram where it is asked to be drawn. Don't just describe how to do it.arrow_forwardC. Homework Assignment Task: Write a one-page CV using the provided template. Steps: 1. Use the CV guide to structure your CV. 2. Fill in each section with real information about yourself. 3. Format your CV neatly and use professional language. 4. Submit to the instructor before the next classarrow_forwardSimulate on a vertical time axis (with events labeled with the senders names A-D) the contention period of FOUR equally distanced Ethernet stations that all attempt to transmit at T=0 a minimally sized frame, in the style of the binary Exponential Backoff Algorithm. Assume that time is measured in slot times, and that exactly one slot time is needed to detect a collision (so that if two stations transmit at T=1 and collide, and one of them chooses a backoff time k=0, then that station will transmit again at T=2). Use as coin flip (source of randomness) an ID written in binary. use the bits in order from the least significant to the most significant. If for a given coin throw you need k bits, use the least significant ID bit extracted in the corresponding group of bits, as the least significant bit of the coin thrown. Start be writing the ID, which is 904012207 As example of the expected answer format, with the random sequence R: 100101010101001011001010 01 01011 10010 1010 1010 010…arrow_forward
- Big State University The Big State University course catalog reads as follows: "To enroll in MIS 260, which is an advanced course, a student must complete two prerequisites: MIS 120 and MIS 222. A student who completes either one of these prerequisites and obtains the instructor's permission, however, will be allowed to take MIS 260." Tasks 1. Create a decision table that describes the Big State University course catalog regarding eligibility for MIS 260. Show all possible rules. 2. Simplify the table you just created. Describe the results. 3. Draw a simplified decision tree to represent the Big State University catalog. Describe the results. 4. Why might you use a decision tree rather than a decision table?arrow_forwardWhat is the ALU result if the 4-bit ALU Control signal is 0100? What happens if the ALU Control signal is 0101?arrow_forward#include int main (void) { int i, *p, count } p = &count; = 10%; for (i = 5; i >= 0; i--) { count++; (*p) ++; } printf("count return 0; = %d, Have a wonderful day.\n", count); 1. [20 pts] What is the output of the program? Please explain why. 2. [15 pts] What is the gdb command to set a breakpoint in line 6 (p = &count;)? 3. [15 pts] Explain in your own words how the [break. need to use such command? ... if expr] command works. When might youarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- Fundamentals of Information SystemsComputer ScienceISBN:9781305082168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningSystems Analysis and Design (Shelly Cashman Serie...Computer ScienceISBN:9781305494602Author:Scott Tilley, Harry J. RosenblattPublisher:Cengage LearningEnhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage Learning

Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning

Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning

Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning

Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning

Systems Analysis and Design (Shelly Cashman Serie...
Computer Science
ISBN:9781305494602
Author:Scott Tilley, Harry J. Rosenblatt
Publisher:Cengage Learning

Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning