Management Information Systems: Managing The Digital Firm (16th Edition)
16th Edition
ISBN: 9780135191798
Author: Kenneth C. Laudon, Jane P. Laudon
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 7, Problem 3RQ
Explanation of Solution
Internet:
- The Internet is a wide range of network that connects computers throughout the world.
- It holds vast area of information, resources and services. This information can be sent and received through the Internet.
- It uses routers and servers to connect a computer anywhere in the world.
- It uses the standard protocol such as TCP/IP.
- Some uses of internet are as follows:
- Communication
- Shopping
- Entertainment
- Financial transaction
- Real-time updates
Working of Internet:
- Internet constitutes of two components that helps in understanding the internet. They are:
- Hardware
- This component includes everything like the cables, routers, smartphones and other such devices. These components create a network of networks.
- Some hardware devices become the end points which are called the clients and the machines that store information which the users seek on the internet are servers.
- Other hardware devices are called nodes that act as a connecting point along the route.
- Protocols
- The hardware would not be able to create a network without using the second component which is the protocol...
- Hardware
Explanation of Solution
Domain Name System (DNS):
DNS is the way internet domain names are located and translated into internet protocol address.
Working of DNS:
- The servers of DNS maintain a
database that contains the IP addresses mapped to their corresponding domain names. - It looks like a hierarchical structure, where root is the domain name.
- Top-level domain is a child domain of the root and second-level domain is a child domain of the top-level domain.
- Two- or three-character names are used in the top-level domain such as .com, .edu, .gov, .org etc.
- Second-level domain contains two parts, designating a top-level name such as amazon.ca, nyu.edu.
- In the hierarchical structure, the bottom is a host name that designates a specific computer on either the private or internet network.
Internet Protocol (IP) address:
- Internet Protocol is a protocol suite that offers routing of packets from one computer to another...
Explanation of Solution
Principal internet services:
- Chatting and messaging
- Telnet
- Newsgroups
- World Wide Web (WWW)
- File Transfer Protocol (FTP)
Chatting and messaging:
- It includes two or more people who are instantaneously connected to the internet so that they can hold live, and interactive conversions.
- Messaging is one kind of chat service that allows participants to make their own private chat channels.
- It will support voice and video chat and also written conversions.
E-mail:
- E-mail is allowed to share the documents or files from one computer to another, and for sending and receiving the messages so that employees within the business can easily communicate with one another.
- This is a cost effective alternative to equivalent voice, postal or overnight delivery costs.
Telnet:
- It will be possible for employees to log onto the computer and do work on another...
Explanation of Solution
VoIP:
- Voice over IP (VoIP) is used to deliver voice data in digital form using packet switching methods.
- Normal calls transmitted over telephone networks can travel over the corporate network based on the internet protocol.
- It will save money by avoiding the costs of delivering information through telephone lines.
VoIP providing business values:
- By a simple click- and-drag operation, it will allow conference calls on the computer screen to select the names of those taking the calls.
- It is cost effective, so all the business uses VoIP.
- Telecommunication and cable companies are giving VoIP service along with their high speed internet and cable offerings which tends to be more attractive to the customers...
Explanation of Solution
Alternative ways of locating information on the web:
- Intelligent agent shopping bots
- Wikipedia
- Search engine
- Blogs
- Social networking
- RSS
- Web 2.0
- Web 3.0
Intelligent agent shopping bots:
- For using internet for shopping information, the shopping bots use intelligent agent software.
- For availability and price of the products specified by the user, the shopping bots are used and this will return the list of sites that sell the item along with pricing information and purchase link.
Wikipedia:
- Wikipedia is the largest reference website across the worldwide. It is a multilingual, free encyclopedia, web-based website.
- In spite of its growth and success, it faces certain limitations regarding plagiarism, vandalism and copyright.
Search engine:
- For finding the information on the web, the search is used instantly.
- It will go through PDF documents, file of Microsoft Office applications, images, HTML files, audio and video files to produce the results that match the desired search.
Blog:
- A website that is maintained by an individual to express one‘s own opinions and the contents present are available to the public.
- The contents or opinions are shared by the blogger in a regular fashion based on the trends that are released day to day.
- The contents are presented in the form of stories, news, trends, links that could be redirected to other articles or websites that interests the bloggers much.
Social Networking or Social Media:
- Social media is making and sharing of information, career interests, ideas and other forms of expression through networks and virtual communities...
Explanation of Solution
Uses of online search technologies for marketing:
- Searching is one of the web most popular activities with billions of queries performed every month. It is the foundation for the most profitable form of online advertisements and marketing.
- The search engine contains two types of listing when the users enter the search term in the search engine...
Expert Solution & Answer

Trending nowThis is a popular solution!

Students have asked these similar questions
The images I have uploaded are the part 1 to 4 and questions below are continue on the questions uploaded
5. C++ Class Template with Method Stubs
#pragma once
#include <iostream>
#include <string>
#include <stdexcept>
#include <vector>
template <typename T>
class HashTable {
private:
struct Entry {
std::string key;
T value;
bool isOccupied;
bool isDeleted;
Entry() : key(""), value(), isOccupied(false), isDeleted(false) {}
};
Entry* table;
size_t capacity;
size_t size;
double loadFactorThreshold;
size_t customHash(const std::string& key) const {
size_t hash = 5381;
for (char c : key) {
hash = ((hash << 5) + hash) + c;
}
return hash;
}
size_t probe(const std::string& key, bool forInsert = false) const;
void resize();
public:
// Constructor
HashTable(size_t initialCapacity = 101);
// Big…
this project is NOT for graded(marks) purposes, please help me with the introduction. give me answers for the project. i will include an image explaining everything about the project.
Java Graphics
(Bonus
In this lab, we'll be practicing what we learned about GUIs, and Mouse events. You will need to
implement the following:
A GUI with a drawing panel. We can click in this panel, and you will capture those clicks as a
Point (see java.awt.Point) in a PointCollection class (you need to build this).
The points need to be represented by circles.
Below the drawing panel, you will need 5 buttons:
O
о
о
○
An input button to register your mouse to the drawing panel.
A show button to paint the points in your collection on the drawing panel.
A button to shift all the points to the left by 50 pixels.
The x position of the points is not allowed to go below zero.
Another button to shift all the points to the right 50 pixels.
"
The x position of the points cannot go further than the
You can implement this GUI in any way you choose. I suggest using the BorderLayout for a panel
containing the buttons, and a GridLayout to hold the drawing panel and button panels.
Regardless of how…
Chapter 7 Solutions
Management Information Systems: Managing The Digital Firm (16th Edition)
Ch. 7.3 - Prob. 1.1CQCh. 7.3 - Prob. 1.2CQCh. 7.3 - Prob. 1.3CQCh. 7.3 - Prob. 1.4CQCh. 7.3 - Prob. 2.1CQCh. 7.3 - Prob. 2.2CQCh. 7.3 - Prob. 2.3CQCh. 7 - Prob. 1IQCh. 7 - Prob. 2IQCh. 7 - Prob. 3IQ
Ch. 7 - Prob. 4IQCh. 7 - Prob. 5IQCh. 7 - Prob. 6IQCh. 7 - Prob. 1RQCh. 7 - Prob. 2RQCh. 7 - Prob. 3RQCh. 7 - Prob. 4RQCh. 7 - Prob. 5DQCh. 7 - Prob. 6DQCh. 7 - Prob. 7DQCh. 7 - Prob. 8HMPCh. 7 - Prob. 9HMPCh. 7 - Prob. 10HMPCh. 7 - Prob. 11HMPCh. 7 - Prob. 13CSQCh. 7 - Prob. 14CSQCh. 7 - Prob. 15CSQCh. 7 - Prob. 16CSQCh. 7 - Prob. 17MLMCh. 7 - Prob. 18MLM
Knowledge Booster
Similar questions
- also provide the number of moves(actions) made at state A and moves(actions) made state B. INCLUDE Java program required(this question is not graded)arrow_forwardYou are given a class that processes purchases for an online store. The class receives calls to: • Retrieve the prices for items from a database • Record the sold items • Update the database • Refresh the webpage a. What architectural pattern is suitable for this scenario? Illustrate your answer by drawing a model for the solution, showing the method calls/events. b. Comment on how applying this pattern will impact the modifiability of the system. c. Draw a sequence diagram for the update operation.arrow_forward2. The memory management has contiguous memory allocation, dynamic partitions, and paging. Compare the internal fragmentation and external fragmentation for these three approaches. [2 marks] 3. Suppose we have Logical address space = 24 = 16 (m = 4), Page size=2² =4 (n = 2), Physical address space = 26 = 64 (r = 6). Answer the following questions: [4 marks] 1) Total # of pages ? 2) Total # of frames ? 3) Number of bits to represent logical address? 4) Number of bits to represent offset ? 5) Number of bits to represent physical address? 6) Number of bits to represent a page number? 7) Number of bits to represent a frame number / 4. What is translation look-aside buffers (TLBS)? Why we need them to implement the page table? [2 marks] 5. Why we need shared pages for multiple processes? Give one example to show the benefits. [2 marks] 6. How to implement the virtual memory by using page out and page in? Explain with an example. [2 marks] 7. We have a reference string of referenced page…arrow_forward
- Good morning, please solve this trying to follow this criteria. (use Keil) Abstract describing the requirements and goals of the assignment. List file with no errors or warnings. Brief description of your implementation design and code. Debugging screen shots for different scenarios with your reference and comments. Conclusion (and please give me the code without errors, make sure it is working)arrow_forwardGood mrng, please solve this trying to follow this criteria. (use Keil) Abstract describing the requirements and goals of the assignment. List file with no errors or warnings. Brief description of your implementation design and code. Debugging screen shots for different scenarios with your reference and comments. Conclusion (and please give me the code without errors, make sure it is working)arrow_forward#include <stdio.h> #include <stdlib.h> #include <unistd.h> int global_var = 42; // int* function(int *a) { int local_var = 10; // *a = *a + local_var; int *local_pointer = (int *)malloc (size of (int) * 64); // Allocated array with 64 integers return local_pinter; } int main() { int local_main[1024*1024*1024*1024*1024] = {0}; // initialize an array and set all items as 0 int *heap_var = (int *)malloc(size of(int) * 16); // Allocated array with 16 integers *heap_var = 100; function(heap_var); printf(“the value is %d\n”, *heap_var); free(heap_var); // release the memory return 0; } 1) draw the memory layout of the created process, which should include text, data, heap and stack [2 marks]. 2) Indicate which section the variables are allocated [2 marks]: global_var local_var, local_pointer local_main heap_var, *heap_var (the data that it points to) 3) Does this code have memory leaking (heap memory is not released)? [2 marks] 4) The…arrow_forward
- 8. List three HDD scheduling algorithms. [2 marks] 9. True or False? The NVM has the same scheduling algorithms with HDD. Explain why? [2 marks] 10. Why the modern mouses use polling to detect movements instead of interrupts? [2 marks] 11. What is thrashing? How does it happen? [2 marks] 12. Given a reference string of page numbers 7, 0, 1, 2, 0, 3, 0, 4, 2, 3, 0, 3, 0, 3, 2, 1, 2, 0, 1, 7, 0, 1 and 4 frames show how the page replacement algorithms work, and how many page faults? [6 marks], 1) FIFO algorithm? [2 marks] 2) Optimal algorithm? [2 marks] 3) LRU algorithm? [2 marks] 13. List at least three file systems that you know. [2 marks] 14. In C programming, how the seek to a specific position in the file by offset? [2 marks]arrow_forwardA Personal Address Book application program allows the user to add, delete, search, save, and load contact information. The program separates the user interface (command-line) and the internal processing subsystem. The internal processing system consists of the following classes: • • Contact Manager (responsible for add and delete operations) Contact Finder (responsible for the search operation) pataManager (responsible for save and load operations) a. What design pattern can be used to implement the user interface? Explain your answer using a class diagram for the entire system. b. Draw a UML sequence diagram to show the behavioral view of the Personal Address Book program, demonstrating what happens when a user enters new contact information.arrow_forwardA system comprises three components: A, B, and C. Calling A requires calling B, and calling B requires calling A. Component C is responsible for dissimilar tasks T#1, #2, and T#3. a. Comment on the modifiability of this system. What problems do you see in this system, and how would you solve them? b. Suppose that T#1 is performed by both component A and C. What does this indicate about A and C? How would you solve this problem?arrow_forward
- Please answer questions from number 1 to 3 if these questions in the image provided below(NOTE: THESE QUESTIONS ARE NOT GRADED!)arrow_forwardIn a client-server system for a hypothetical banking application, the clients are ATM machines, and the server is the bank server. Suppose the client has two operations: withdraw and deposit. Use the broker architectural pattern to document an initial architecture design for this system: a. Draw a class diagram for this system. Use a client-side proxy to encrypt the data using an encrypt operation and a server-side proxy to decrypt the data. b. Discuss how you plan to apply redundancy tactics on the server. Additionally, identify the quality attribute that this tactic will achieve and discuss any potential side effects of applying it.arrow_forwarda. Comment on how you would achieve higher performance for a hypothetical Trent Course Registration System, assuming it utilizes a client-server architecture. b. Suppose we want greater availability of the server. Discuss what kind of tactics should be used to achieve that.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education

Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education

Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON

Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON

C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON

Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning

Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education