Search This Blog(textbook name or author as the keywords)You can cantact me by the Contact Form

9/13/14

Electronic Commerce, 10th Edition solutions manual and test bank by Gary Schneider

Electronic Commerce, 10th Edition solutions manual and test bank by Gary Schneider 

Chapter 2: Technology Infrastructure: The Internet and the World Wide Web

TRUE/FALSE

1. Networks of computers and the Internet that connects them to each other form the basic technological structure that underlies virtually all electronic commerce.

ANS: T PTS: 1 REF: 55

2. The USENET was the earliest of the networks that eventually combined to become what we now call the Internet.

ANS: F PTS: 1 REF: 56

3. E-mail was born in 1972 when a researcher wrote a program that could send and receive messages over the Defense Department network.

ANS: T PTS: 1 REF: 56

4. In 1989, the NSF permitted two commercial e-mail services, MCI Mail and CompuServe, to establish limited connections to the Internet for the sole purpose of exchanging e-mail transmissions with users of the Internet.

ANS: T PTS: 1 REF: 57

5. A network of computers that are located close together—for example, in the same building—is called a local area network.

ANS: T PTS: 1 REF: 58

6. The Internet provides a high degree of security in its basic structure.

ANS: F PTS: 1 REF: 60

7. Although fax, telephone, e-mail, and overnight express carriers have been the main communications tools for business for many years, extranets can replace many of them at a lower cost.

ANS: T PTS: 1 REF: 61

8. An intranet extends beyond the organization that created it.

ANS: F PTS: 1 REF: 61

9. The “virtual” part of VPN means that the connection seems to be a temporary, internal network connection, but the connection is actually permanent.

ANS: F PTS: 1 REF: 61

10. VPN software must be installed on the computers at both ends of the transmission.

ANS: T PTS: 1 REF: 61

11. The technologies used (public networks, private networks, or VPNs) are independent of organizational boundaries.

ANS: T PTS: 1 REF: 62

12. IP addresses appear as five numbers separated by periods.

ANS: F PTS: 1 REF: 63

13. SMTP is a common protocol used for sending and retrieving e-mail.

ANS: T PTS: 1 REF: 65

14. IMAP is a newer e-mail protocol that performs the same basic functions as POP, but includes additional features.

ANS: T PTS: 1 REF: 65

15. The POP protocol provides support for MIME.

ANS: T PTS: 1 REF: 65

16. At a technological level, the Web is nothing more than software that runs on computers that are connected to the Internet.

ANS: T PTS: 1 REF: 66

17. The set of rules for delivering Web page files over the Internet is in a protocol called the Hypertext Transfer Protocol (HTTP).

ANS: T PTS: 1 REF: 66

18. An HTML document is similar to a word-processing document in that it specifies how a particular text element will appear.

ANS: F PTS: 1 REF: 67

19. Domain names are sets of words that are assigned to specific IP addresses.

ANS: T PTS: 1 REF: 69

20. The Internet Corporation for Actualized Names and Nuances has the responsibility of managing domain names and coordinating them with the IP address registrars.

ANS: F PTS: 1 REF: 69

21. HTML is a meta language because users can create their own markup elements that extend the usefulness of XML.

ANS: F PTS: 1 REF: 71

22. SGML offers a system of marking up documents that is independent of any software application.

ANS: T PTS: 1 REF: 72

23. The term cascading is used because designers can apply many style sheets to the same Web page, one on top of the other.

ANS: T PTS: 1 REF: 78

24. The higher the bandwidth, the faster data files travel and the faster Web pages appear on your screen.

ANS: T PTS: 1 REF: 84

25. Asymmetric connections provide the same bandwidth for each direction.

ANS: F PTS: 1 REF: 84

MULTIPLE CHOICE

1. The combination of telephone lines and the closed switches that connect them to each other is called a ____.

a.

LAN

c.

circuit

b.

WAN

d.

pathway

ANS: C PTS: 1 REF: 58

2. On a packet-switched network, files and e-mail messages are broken down into small pieces, called ____.

a.

messages

c.

circuits

b.

pieces

d.

packets

ANS: D PTS: 1 REF: 59

3. When packets leave a network to travel on the Internet, they must be translated into a standard format. ____ usually perform this translation function.

a.

Switches

c.

Routers

b.

Bridges

d.

Routing algorithms

ANS: C PTS: 1 REF: 59

4. Routers and the telecommunications lines connecting them are collectively referred to as ____.

a.

backbone routers

c.

an asynchronous backbone

b.

Internet routers

d.

the Internet backbone

ANS: D PTS: 1 REF: 60

5. A(n) ____ does not extend beyond the boundaries of a particular organization.

a.

Internet

c.

intranet

b.

extranet

d.

ARPANET

ANS: C PTS: 1 REF: 61

6. A(n) ____ is like a separate, covered commuter lane on a highway (the Internet) in which passengers are protected from being seen by the vehicles traveling in the other lanes.

a.

VPN

c.

extranet

b.

IP wrapper

d.

IAP

ANS: A PTS: 1 REF: 61

7. A(n) ____ is a connection that uses public networks and their protocols to send data in a way that protects the data as well as a private network would, but at a lower cost.

a.

public network

c.

virtual private network

b.

virtual public network

d.

private network

ANS: C PTS: 1 REF: 61

8. A ____ is a collection of rules for formatting, ordering, and error checking data sent across a network.

a.

routing algorithm

c.

protocol

b.

backbone router

d.

packet

ANS: C PTS: 1 REF: 62

9. ____ determine how the sending device indicates that it has finished sending a message, and how the receiving device indicates that it has received the message.

a.

Routers

c.

Protocols

b.

Bridges

d.

Adapters

ANS: C PTS: 1 REF: 62

10. In networking applications, an 8-bit number is often called a(n) ____.

a.

octet

c.

piconet

b.

netbit

d.

bit

ANS: A PTS: 1 REF: 63

11. Network engineers have devised a number of stopgap techniques to stretch the supply of IP addresses. One of the most popular techniques is ____.

a.

subnetting

c.

sub-blocking

b.

subletting

d.

piconetting

ANS: A PTS: 1 REF: 64

12. A computer called a ____ converts private IP addresses into normal IP address when it forwards packets from those computers to the Internet.

a.

routing algorithm device

c.

subnet translation device

b.

network address translation device

d.

private network device

ANS: B PTS: 1 REF: 64

13. The ____ numbering system uses 16 characters.

a.

hexadecimal

c.

binary

b.

decimal

d.

ASCII

ANS: A PTS: 1 REF: 64

14. IPv6 uses a ___ number for addresses.

a.

32-bit

c.

128-bit

b.

56-bit

d.

256-bit

ANS: C PTS: 1 REF: 64

15. The purpose of a(n) ____ is to respond to requests for Web pages from Web clients.

a.

URL

c.

Web server

b.

e-mail

d.

top-level domain

ANS: C PTS: 1 REF: 65

16. ____ specifies the format of a mail message and describes how mail is to be administered on the e-mail server and transmitted on the Internet.

a.

SMTP

c.

MIME

b.

TCP/IP

d.

POP

ANS: A PTS: 1 REF: 65

17. A newer e-mail protocol that performs the same basic functions as POP, but includes additional features, is known as ____.

a.

IMAP

c.

POPI

b.

SMTP

d.

IPOP

ANS: A PTS: 1 REF: 65

18. ____ lets users create and manipulate e-mail folders and individual e-mail messages while the messages are still on the e-mail server.

a.

POP

c.

IMAP

b.

SMTP

d.

MIME

ANS: C PTS: 1 REF: 65

19. ____ is a set of rules for handling binary files, such as word-processing documents, spreadsheets, photos, or sound clips, that are attached to e-mail messages.

a.

IMAP

c.

SMTP

b.

MIME

d.

POP

ANS: B PTS: 1 REF: 65

20. The combination of the protocol name and the domain name is called the ____.

a.

URT

c.

URL

b.

URO

d.

HTTP

ANS: C PTS: 1 REF: 66

21. HTML was developed by ____.

a.

ARPANET

c.

Ted Nelson

b.

NSF

d.

Tim Berners-Lee

ANS: D PTS: 1 REF: 67

22. ____ was the first Web browser that became widely available for personal computers.

a.

Mosaic

c.

Internet Explorer

b.

Netscape

d.

CompuServe

ANS: A PTS: 1 REF: 67

23. ____ are sets of words that are assigned to specific IP addresses.

a.

Domain names

c.

Octets

b.

URLs

d.

Piconets

ANS: A PTS: 1 REF: 69

24. The early versions of ____ let Web page designers create text-based electronic documents with headings, title bar titles, bullets, lines, and ordered lists.

a.

HTTP

c.

SGML

b.

HTML

d.

XML

ANS: B PTS: 1 REF: 72

25. In HTML, hyperlinks are created using the HTML ____ tag.

a.

head

c.

title

b.

anchor

d.

ol

ANS: B PTS: 1 REF: 77

COMPLETION

1. A computer ____________________ is any technology that allows people to connect computers to each computer.

ANS: network

PTS: 1 REF: 55

2. A network which uses a specific set of rules and connects networks all over the world to each other, is called the ____________________.

ANS: Internet

PTS: 1 REF: 55

3. The part of the Internet known as the ____________________ is a subset of the computers on the Internet that are connected to one other in a specific way that makes them and their contents easily accessible to each other.

ANS:

World Wide Web

WWW

Web

WWW (World Wide Web)

World Wide Web (WWW)

PTS: 1 REF: 55

4. A(n) ____________________ is an e-mail address that forwards any message it receives to any user subscribed to the list.

ANS: mailing list

PTS: 1 REF: 56

5. In 1979, a group of students and programmers at Duke University and the University of North Carolina started ____________________, which allows anyone who connects to the network to read and post articles on a variety of subjects.

ANS:

Usenet

User’s News Network

PTS: 1 REF: 56

6. Usenet survives on the Internet today, with more than 1000 different topic areas that are called ____________________.

ANS: newsgroups

PTS: 1 REF: 56

7. Internet ____________________ are computers that are directly connected to the Internet.

ANS: hosts

PTS: 1 REF: 57

8. ____________________ providers sell Internet access rights directly to larger customers and indirectly to smaller firms and individuals through other companies, called ISPs.

ANS: Network access

PTS: 1 REF: 57

9. Programs apply their routing algorithms to information they have stored in routing tables or ____________________ tables.

ANS: configuration

PTS: 1 REF: 59

10. The routers connected to the Internet backbone are sometimes called ____________________ routers.

ANS: backbone

PTS: 1 REF: 60

11. A(n) ____________________ is any computer network or telecommunications network that is available to the public.

ANS: public network

PTS: 1 REF: 60

12. A(n) ____________________ is used when the internet extends beyond the boundaries of an organization.

ANS: extranet

PTS: 1 REF: 61-62

13. The ____________________ Protocol controls the disassembly of a message or a file into packets before it is transmitted over the Internet, and it controls the reassembly of those packets into their original formats when they reach their destinations.

ANS: Transmission Control

PTS: 1 REF: 62

14. The ____________________ Protocol specifies the addressing details for each packet, labeling each with the packet's origination and destination addresses.

ANS: Internet

PTS: 1 REF: 62-63

15. The set of rules for delivering Web page files over the Internet is in a protocol called the ____________________.

ANS:

Hypertext Transfer Protocol

Hypertext Transfer Protocol (HTTP)

HTTP

HTTP (Hypertext Transfer Protocol)

PTS: 1 REF: 66

16. A(n) ____________________ server is a computer that stores files written in Hypertext Markup Language (HTML).

ANS: hypertext

PTS: 1 REF: 67

17. A(n) ____________________ is a language that can be used to define other languages.

ANS: metalanguage

PTS: 1 REF: 71

18. HTML, XML, and XHTML have descended from the original ____________________ specification.

ANS:

SGML

Standard Generalized Markup Language

SGML (Standard Generalized Markup Language)

Standard Generalized Markup Language (SGML)

PTS: 1 REF: 71

19. In HTML, the text elements that are related to each another are called ____________________ elements.

ANS: hypertext

PTS: 1 REF: 72

20. A(n) ____________________ hyperlink structure resembles conventional paper documents in that the reader begins on the first page and clicks a Next button to move to the next page in a serial fashion.

ANS: linear

PTS: 1 REF: 76

21. ____________________ let designers define formatting styles that can be applied to multiple Web pages.

ANS:

Cascading Style Sheets

CSS

CSS (Cascading Style Sheets)

Cascading Style Sheets (CSS)

PTS: 1 REF: 78

22. An XML document is embedded within the ____________________ document.

ANS:

HTML

Hypertext Markup Language

HTML (Hypertext Markup Language)

Hypertext Markup Language (HTML)

PTS: 1 REF: 78

23. ____________________ tags do not specify how text appears on a Web page; the tags convey the meaning (the semantics) of the information included within them.

ANS:

Extensible Markup Language

XML

XML (Extensible Markup Language)

Extensible Markup Language (XML)

PTS: 1 REF: 81

24. ____________________ is the amount of data that can travel through a communication medium per unit of time.

ANS: Bandwidth

PTS: 1 REF: 84

25. Upstream bandwidth is also called ____________________ bandwidth.

ANS: upload

PTS: 1 REF: 84

ESSAY

1. As an individual packet travels from one network to another, the computers through which the packet travels determine the best route for getting the packet to its destination. Describe this process.

ANS:

The computers that decide how to best forward each packet are called routing computers, router computers, routers, gateway computers (because they act as the gateway from a LAN or WAN to the Internet) or border routers (because they are located at the border between the organization and the Internet.) The programs on the routers that determine the best path contain rules called routing algorithms. The programs apply these algorithms to information they have stored in routing tables or configuration tables. This information includes lists of connections that lead to particular groups of other routers, rules that specify which connection to use first, and rules for handling instances of heavy packet traffic and network congestion.

PTS: 1 REF: 59

2. What is the difference between a public network and a private network?

ANS:

A public network is any computer network or telecommunications network that is available to the public. The Internet is one example of a public network. A private network is a private, leased-line connection between two companies that physically connects their intranets to one another.

PTS: 1 REF: 60

3. Identify the four key rules for message handling.

ANS:

The open architecture philosophy developed for the evolving ARPANET, which later became the core of the Internet, included the use of a common protocol for all computers connected to the Internet and four key rules for message handling: 1) Independent networks should not require any internal changes to be connected to the network, 2) Packets that do not arrive at their destinations must be retransmitted from their source network, 3) Router computers act as receive-and-forward devices; they do not retain information about the packets that they handle, and 4) No global control exists over the network.

PTS: 1 REF: 62

4. What is the difference between TCP and IP?

ANS:

The TCP controls the disassembly of a message or a file into packets before it is transmitted over the Internet, and it controls the reassembly of those packets into their original formats when they reach their destinations. The IP specifies the addressing details for each packet, labeling each with the packet’s origination and destination addresses.

PTS: 1 REF: 62-63

5. What are the advantages of Bluetooth technology?

ANS:

One major advantage of Bluetooth technology is that it consumes very little power, which is an important consideration for many devices. Another advantage is that Bluetooth devices can discover each other and exchange information automatically. For example, a person using a laptop computer in a temporary office can print to a local Bluetooth-enabled printer without logging in to the network or installing software in either device. The printer and laptop computer electronically recognize each other as Bluetooth devices and immediately can begin exchanging information.

PTS: 1 REF: 88

 

Electronic Commerce, 10th Edition
9781133526827

Chapter 2 Solutions

Review Questions

  1. In one or two paragraphs, describe how the Internet changed from a government research project into a technology for business users.

Answer: In the early 1960s, the U.S. Department of Defense began examining ways to connect computers to each other and to weapons installations distributed all over the world. Employing many of the best communications technology researchers, the Defense Department funded research at leading universities and institutes. The goal of this research was to design a worldwide network that could remain operational, even if parts of the network were destroyed by enemy military action or sabotage. In 1969, Defense Department researchers in the Advanced Research Projects Agency (ARPA) used this direct connection network model to connect four computers—one each at the University of California at Los Angeles, SRI International, the University of California at Santa Barbara, and the University of Utah—into a network called the ARPANET. The ARPANET was the earliest of the networks that eventually combined to become what we now call the Internet.

E-mail was born in 1972 when Ray Tomlinson, a researcher who used the network, wrote a program that could send and receive messages over the network. This new method of communicating became widely used very quickly. As personal computers became more powerful, affordable, and available during the 1980s, companies increasingly used them to construct their own internal networks. Although these networks included e-mail software that employees could use to send messages to each other, businesses wanted their employees to be able to communicate with people outside their corporate networks.

  1. In two paragraphs, outline how the ideas of Vannevar Bush and Ted Nelson became key elements of the World Wide Web.

Answer: In 1945, Vannevar Bush, who was director of the U.S. Office of Scientific Research and Development, wrote an article in The Atlantic Monthly about ways that scientists could apply the skills they learned during World War II to peacetime activities. Bush speculated that engineers would eventually build a machine that he called the Memex, a memory extension device that would store all of a person’s books, records, letters, and research results on microfilm. Bush’s Memex would include mechanical aids, such as microfilm readers and indexes, that would help users quickly and flexibly consult their collected knowledge.

In the 1960s, Ted Nelson described a similar system in which text on one page links to text on other pages. Nelson called his page-linking system hypertext. Douglas Engelbart, who also invented the computer mouse, created the first experimental hypertext system on one of the large computers of the 1960s. In 1987, Nelson published Literary Machines, a book in which he outlined project Xanadu, a global system for online hypertext publishing and commerce.

In 1989, Tim Berners-Lee was trying to improve the laboratory research document handling procedures for his employer, CERN: European Laboratory for Particle Physics. Berners-Lee proposed a hypertext development project intended to provide this data-sharing functionality. Over the next two years, Berners-Lee developed the code for a hypertext server program and made it available on the Internet.

  1. In about 100 words, describe the function of the Internet Corporation for Assigned Names and Numbers. Include a discussion of the differences between gTLDs and sTLDs in your answer.

Answer: Since 1998, the Internet Corporation for Assigned Names and Numbers (ICANN) has had the responsibility of managing domain names and coordinating them with the IP address registrars. ICANN is also responsible for setting standards for the router computers that make up the Internet. Since taking over these responsibilities, ICANN has added a number of new TLDs. Some of these are generic top-level domains (gTLDs), which are available to specified categories of users. Note that ICANN is itself responsible for the maintenance of gTLDs. Other new domains are sponsored top-level domains (sTLDs), which are TLDs for which an organization other than ICANN is responsible.

  1. The Web uses a client/server architecture. In about 100 words, describe the client and server elements of this architecture, including specific examples of software and hardware that are used to form the Web.

Answer: The Web is software that runs on computers that are connected to each other through the Internet. Web client computers run software called Web client software or Web browser software. Examples of popular Web browser software include Google Chrome, Microsoft Internet Explorer, and Mozilla Firefox.

Web browser software sends requests for Web page files to other computers, which are called Web servers and a Web server computer runs software called Web server software. The Web server software receives requests from many different Web clients and responds by sending files back to those Web client computers. Each Web client computer’s Web client software then renders those files into a Web page. Thus, the purpose of a Web server is to respond to requests for Web pages from Web clients. This combination of client computers running Web client software and server computers running Web server software is an example of a client/server architecture.

  1. In about 100 words, explain the difference between an extranet and an intranet. In your answer, describe when you might use a VPN in either.

Answer: The term intranet describes an Internet that does not extend beyond the organization that created it. In the past, most intranets were constructed by interconnecting a number of private networks; however, organizations today can create secure intranets using VPN technologies. If security is not an issue, they can even build intranets using public networks. Similarly, an extranet was originally defined as an intranet that had been extended to include specific entities outside the boundaries of the organization, such as business partners, customers, or suppliers. Extranets were used to save money and increase efficiency by replacing traditional communication tools such as fax, telephone, and overnight express document carriers.

  1. In about 100 words, explain how markup tags work in HTML, and describe the function of the HTML anchor tag. Explain the importance of the anchor tag in the evolution of electronic commerce activity on the Web.

Answer: A text markup language specifies a set of tags that are inserted into the text. These markup tags, or tags, provide formatting instructions that Web client software can understand. The Web client software uses those instructions as it renders the text and page elements contained in other files into the Web page that appears on the screen of the client computer.

The most important tag in HTML is the Anchor Hypertext Reference tag, which is the tag that provides a link to another Web page (or another location in the same Web page). In HTML, hyperlinks are created using the HTML anchor tag.

  1. In about 200 words, define “markup languages.” Include overviews of HTML and XML in your definition. As part of your answer, provide examples of at least two situations in which an organization would use XML and two situations in which an organization would use HTML.

Answer: The page structure and text of a Web page are stored in a text file that is formatted, or marked up, using a text markup language. A text markup language specifies a set of tags that are inserted into the text. These markup tags, or tags, provide formatting instructions that Web client software can understand.

Hypertext Markup Language (HTML) was derived from the more generic meta language SGML. HTML defines the structure and content of Web pages using markup symbols called tags. Over time, HTML has evolved to include a large number of tags that accommodate graphics, Cascading Style Sheets, and other Web page elements.

Although Extensible Markup Language (XML) is also derived from SGML, it differs from HTML in two important respects. First, XML is not a markup language with defined tags. It is a framework within which individuals, companies, and other organizations can create their own sets of tags. Second, XML tags do not specify how text appears on a Web page; the tags convey the meaning (the semantics) of the information included within them.

  1. In about 100 words, describe the differences between symmetric and asymmetric connections. Include a discussion of why one might be preferable to the other in a specific situation.

Answer: Symmetric connections provide the same bandwidth in both directions. Asymmetric connections provide different bandwidths for each direction.

  1. In about 100 words, describe how ontologies and resource description frameworks could help software agents provide useful services on the Semantic Web.

Answer: For software agents to perform their functions, Web standards must include XML, a resource description framework, and an ontology. While XML tags can describe the semantics of data elements, a resource description framework (RDF) is a set of standards for XML syntax. It would function as a dictionary for all XML tags used on the Web.

An ontology is a set of standards that defines, in detail, the relationships among RDF standards and specific XML tags within a particular knowledge domain. Ontologies and the RDF would provide the intelligence about the knowledge domain so that software agents could make decisions as humans would.

Exercises

  1. In 2003, ICANN and the major domain name registries began offering a five-day grace period for new domain registrations. The idea was to give registrants time to correct typographical errors and misspellings in the names they registered. If a registrant found an error in that five-day period, they could cancel their registration and, presumably, re-register a corrected domain name. This policy led to a problem called “domain tasting” that required considerable effort and cooperation to resolve nearly six years after the policy was implemented. Using your library or your favorite search engine, learn more about domain tasting. Prepare a report of about 300 words that defines domain tasting, outlines its negative effects on Web users, and describes how the problem of domain tasting was resolved.

Answer: The Internet Corporation for Assigned Names and Numbers is responsible for managing and doling out Internet domain names. It is not an easy job. And making it harder was a scheme used by some registrars known as domain tasting. Someone would buy up lots of domain names, try them out, and then get rid of the unprofitable ones, all without losing any money. As long as the registrar dumped the domains within the five-day grace period, known as the Add Grace Period (AGP), a full refund was given.

Designed by ICANN to help registrars who made errors in their domain names, the grace period refund was quickly abused by Web sites that populated their domains with lots of ad links that redirected visitors to other sites. It also led to the unavailability of popular names that were scooped up by domain tasters.

In June 2008, ICANN decided to act. The organization stopped refunding the 20-cent annual fee for each registered deleted domain name beyond a certain limit.

But since 20 cents per domain wasn't much of a penalty, ICANN got tougher. The organization began charging registrars $6.75 (the cost of a current .org domain) or higher for each deleted domain beyond a certain limit during the grace period. ICANN has reported that the new policy resulted in a 99.7 percent decrease in domain deletions from June 2008 to April 2009.

Source: http://news.cnet.com/8301-13578_3-10309051-38.html

  1. Bridgewater Engineering Company (BECO), a privately held machine shop, makes heavy-duty machinery for factory assembly lines. It sells its presses, grinders, and milling equipment using a few inside salespeople and telephones. It buys its raw materials and supplies from a variety of steel mills and small-parts fabricators located around the world. BECO’s president, Tom Dalton, has hired you as a consultant and would like your advice regarding how best to share information with the company’s suppliers. Tom would like to connect his network of computers into their ordering systems so he can order supplies quickly when he needs them. He is interested in learning more about how he can use the Internet to set up such connections. Use the Web and the book’s accompanying Web Links to locate information about extranets and VPNs. Write a report that briefly describes how companies use extranets to link their systems with those of their suppliers, and then write an evaluation of at least two companies (using information you have gathered in your Web searches) that could help develop an extranet that would work for Tom. Close the report with an overview of how BECO could use VPN technologies in this type of extranet. The three parts of your report should total about 500 words.

Answer: Responses will vary significantly in this exercise. Any recommendation for systems development should include the infrastructure required to support a supply-chain management extranet, as well as the costs and the anticipated benefits. The infrastructure for a private network requires a TCP/IP network, Web authoring software, and a firewall server. The benefits include lower communication costs, and more timely and accessible information, as well as convenient use.

  1. Tanya Trago is the IT manager for Greenway Enterprises, a large landscaping company with hundreds of home and commercial customers. She is interested in finding ways to reduce the costs of maintaining the company’s tree trimming and lawn maintenance equipment. Greenway runs its own repair and maintenance facility because it operates a large number of mowers, cranes, backhoes, and similar machinery. The facility purchases replacement parts and repair supplies for all of this equipment. Tanya is interested in creating a database to track these parts and supplies. She would also like to integrate that database with information provided by the vendors that sell those parts and supplies to Greenway. Several of these vendors use XML tags to describe their inventory, but no common standard tag system has been adopted in the industry. Use the Web Links, the Web, and your library to conduct research on the use of XML in the landscaping equipment and machinery industry, summarize your findings, and prepare a report of about 300 words in which you give Tanya advice on the advantages and disadvantages of using XML tags as descriptors in this situation.

Answer: Responses will vary. Some advantages worth considering include:

§ XML includes data-management capabilities that HTML cannot provide

§ Information coded in XML is easy to read and understand

§ New tags can be created as needed

§ Multiple data types can be included

  1. As you learned in this chapter, XML allows users to define their own markup tags. You also learned that this flexibility can lead to problems when IT professionals who have developed tag sets for their own organizations share information with other organizations that are using other tag sets. One way organizations can avoid this problem is to agree to follow common standards. A common standard for financial information is XBRL. Accountants and financial analysts around the world have agreed to use XBRL to format financial statements and other reports. In about 300 words, outline the advantages that companies and financial analysts can obtain by using the XBRL standard. You can research this subject in your school library or online using your favorite search engine and the links provided for this exercise in the Web Links.

Answer: Answers will vary, but some advantages that companies and financial analysts can obtain by using the XBRL standard include: the ability to share information easily with other organizations; costs saved by not having to develop a new standard; and community support of organizations using the same standard.

  1. Frieda Bannister is the IT manager for the state of Iowa’s Department of Transportation (DOT). She is interested in finding ways to reduce the costs of operating the DOT’s vehicle repair facilities. These facilities purchase replacement parts and repair supplies for all of the state’s cars, trucks, construction machinery, and road maintenance equipment. Frieda has read about XML and thinks that it might help the DOT send orders to its many suppliers throughout the country more efficiently. Use the Online Companion links, the Web, and your library to conduct research on the use of XML in state, local, and federal government operations. Provide Frieda with a report of about 500 words that includes sections that discuss what XML is and explain why XML shows promise for the ordering application Frieda envisions. Your report should also identify other DOT business processes or activities that might benefit from using XML. The report should also include a summary of the main disadvantages of using XML today for integrating business transactions. End the report with a brief statement regarding how the W3C Semantic Web project results might help the DOT operate more efficiently in the future.

Answer: Responses should include the following points:

§ XML uses markup tags to describe the meaning or semantics of the text.

§ XML records are embedded in HTML documents.

§ With XML, tags can be created that identify all the record details for the ordering application that Frieda envisions.

§ The extensibility of XML is also its weakness. Sharing data across organizations means that the organizations must use the same tag names. For example, Frieda’s organization might create a tag called "PurchaseOrderNumber," and one of her suppliers might call the same item "OrderNum".

§ The W3C Semantic Web will allow XML tags to be read by software agents, which will result in better, less-timely searching on the Web for information. This would allow the DOT to research pricing, availability, etc. of parts from suppliers.

  1. You are the assistant to Yin Chan, the service manager of Quick Fix Repair Systems. Quick Fix offers repair and maintenance services to homeowners throughout the tri-state area. Quick Fix service technicians can each do minor plumbing, electrical, and carpentry work. Yin wants to equip each service technician with the technology they need to report their time and materials usage on each job. Today, the service technicians carry a notebook computer for recording this information at job sites.

Many of them also carry a smart phone to stay in touch with the office, order parts that they do not have with them, and keep track of their schedule. Yin would like to ensure that service technicians have access to the Quick Fix main computers while they are on the job site so they can check supplies inventory and access Quick Fix service guides that help them make repairs in the most effective ways possible. Yin asks you to investigate various options for giving her service technicians wireless remote access to the Quick Fix main computers. She wants you to consider options that use the technicians’ notebook computers or that use their smart phones. Prepare a report for Yin in which you discuss the advantages and disadvantages of having the technicians use notebook computers and smart phones for access to the Quick Fix main computers. The smart phones are connected through a corporate wireless phone plan that provides unlimited data transfers each month; you are to briefly review at least three options for connecting the notebook computers, writing no more than two paragraphs for each option. Then choose the best option and write a one-page evaluation of your choice’s strengths and weaknesses. Use the Web Links and your favorite Web search engines to do your research.

Answer: Responses might include the following advantages and disadvantages:

Advantages

§ Mobility/portability

§ Flexible anywhere/anytime access to home office server

§ Increase in productivity

Disadvantages

§ Risk of eavesdropping and unauthorized use

§ Wireless networking results in higher per unit costs

§ Potential for radio interference due to weather, other wireless devices, or obstructions like walls

Cases

Case 1: C1. Internet Access in Hyderabad

1. Responses will vary. The most obvious implication of low Internet access is the creation of a digital divide. That is, the citizens of Hyderabad will not have access to information, goods, and services that are accessible through this technology and will therefore not be able to compete effectively in the world economy.

2. Trends in the growth of Internet-capable phones are as follows:

§ Indian smartphone users spend more time on the Internet than traditional voice calls and DMS’s

§ On average. Indian smartphone users spend 2 hours and 30 minutes with smartphones and 72% of that time goes into gaming, entertainment, and Internet. Traditional voice calls and text messaging take a mere 28% of the time.

§ The younger Indians prefer to spend most of their time browsing the Internet on their smartphones with little time spent for SMS. Casual browsing of the phone like searching for contacts and setting alarms take 30 mins of the time for 15-24 year olds.

§ 31+ year old Indians with smartphone have slightly different preferences. They spend less time browsing and texting when compared to 15-24 year olds, 31+ year olds spend more time on contact search and alarms.

Source: http://trak.in/tags/business/2011/09/06/smartphone-usage-india-overview-numbers/

3. Responses will vary. The government of Hyderabad could consider developing:

§ POTS

§ Wireless 3G network

§ Cable

§ Satellite

§ Fixed point wireless

§ Wireless 4G network

Case 2: Portable Fun Instruments

1. Features of each delivery system are in constant development. Students should use resources such as those listed below to investigate each content delivery system:
DoCoMo: www.nttdocomo.com
BREW: brew.qualcomm.com

Apple: www.apple.com

2. Answers will vary based on system features found at the above sites at the time of research. Student may point out that BREW is used internationally, and so may be a good fit for PFI's global game development strategy. NTTDoCoMo however, only offers widespread service in certain countries in Asia and Europe.

No comments:

Post a Comment

Linkwithin

Related Posts Plugin for WordPress, Blogger...