Lesson 2 - Questions Flashcards
Note 1
Note 1: Definitions
The Internet is the open network available to all users. The content is public and not secured or controlled. This is the world-wide network of computers accessible to anyone who has an Internet connection and a computer.
An intranet is also a network but it is a private one, with limited access only to the members who are within the organization (e.g., employees, shareholders). Intranets are secure and protected behind firewalls.
Extranets work like intranets but extend to include partners and stakeholders authorized to access the private network from outside the organization.
Note 2
Note 2: Internet of Things (IoT)
The Internet of Things (IoT) has evolved over the years, and the number of connected devices is predicted to exceed 21 billion in 2020 (Gartner Inc., 2016). IoT is gaining momentum is almost all industries including retailing, manufacturing, healthcare, insurance, home appliances, heavy equipment, airlines, and logistics. The Internet of Things technology has the potential to transform the world of e-commerce into the “Internet of Everything” through optimized inventory management, location-based or real time personalized recommendations, convenient shopping, and enhanced after-sale relationships.
IoT Applications
According to Lueth (2015) the top 10 Internet of Things applications include:
smart homes (smart thermostats, smart lighting, smart fridge, smart door lock)
wearable devices (smart watch, activity tracker, smart glasses)
smart cities (smart parking, smart waste management)
smart Grid (smart monitoring)
Industrial Internet (remote asset control)
connected cars (remote car controls)
connected health
smart retail
smart supply chain and smart farming.
IoT applications are becoming a standard part of households these days.
Vongsingthong and Smanchat (2014) provide a detailed and more comprehensive list of IoT applications.
IoT Supporting Technologies
There are five main technologies supporting IoT applications such as those listed above.
Radio Frequency Identification (RFID) allows identification and data capture using radio waves, a tag, and a reader to identify and track an object. RFID technology is discussed in your textbook reading for this lesson.
Wireless sensor networks (WSN) consist of spatially distributed, autonomous sensor-equipped devices to monitor physical or environmental conditions, and cooperate with RFID systems to better track the status of things such as temperature, movement, and location. For example, WSN applications would be used to control the temperature of cold chain logistics.
Middleware is a set of software services, a layer that ties applications to communications networks. Middleware gained popularity by simplifying the integration of legacy systems with new technologies in the 1980s.
Cloud computing is a model for on-demand access to a shared pool of configurable resources and applications. It helps reduce costs and enable companies to be more efficient, especially with applications that require massive data storage and huge processing speed for real-time decision-making.
IoT application software. The Internet of Things combines all the previous technologies to enable reliable and robust device-to-device connections as well as human-to-device and human-to-human interactions.
IoT Benefits, Opportunities, and Challenges
The disruptive, innovative technologies associated with IoT offer many benefits and advantages to business. The most important are the potential to
reduce business costs
enhance customer value
automate marketing
provide access to business data on time
ensure and support monitoring and control
facilitate information sharing and collaboration.
For example, Amazon Dash Button and Dash Replenishment Service offer consumers convenience and simplicity as they reorder items. Another example is Alibaba’s smart living unit that bundles Internet capabilities into home products, enabling consumers to control home appliances remotely via mobile devices.
However, IoT presents a set of challenges that business leaders need to address such as interoperability, security, consumer privacy, data protection and confidentiality, complex communication, and data and storage management.
Note 3
Note 3: Green Computing
Green computing refers to the global practice and procedures of using computing resources (including servers, printers, monitors, storage devices, and networking and communications systems) efficiently and effectively in an environmentally-friendly way, while maintaining overall computing performance. The challenge of green computing is to use computing equipment efficiently while protecting the environment from harmful heat, waste, and excessive electricity use. For example, operating servers and other systems requires significant amounts of electrical power, and could produce too much heat. As well, disposing of and replenishing equipment can be expensive and requires resources. Green computing helps companies
reduce energy costs related to servers, including cooling and lighting
extend useful life of hardware
reduce IT maintenance activities
save money related to waste disposal of non-toxic hardware
improve corporate image through environmentally-friendly solutions
protect the environment from harmful emissions.
Question 1: Describe and compare the role and importance of the Internet, intranets, and extranets.
The Internet allows unlimited public access to a network without any restrictions. This worldwide network is easily accessible and makes communication possible by using a standard set of rules called protocols.
An intranet makes use of Internet technologies and is secured behind a company’s firewall. Intranets allow only authorized persons from within a company to access restricted corporate information. This makes it attractive for the cost-efficient (and effective) transfer of information inside the organization, as well as for conducting intra-company business.
An extranet links intranets and authorized individuals from collaborating companies, and allows both access for sharing and exchanging information. By linking the company network to suppliers and customers through an extranet, the company can save money and time, collaborate efficiently with its partners, and gain a competitive advantage.
Question 2: What are the major technologies that enable the World Wide Web (WWW) to work?
The following major technologies are necessary for the WWW to function.
TCP/IP is the underlying protocol that supports most Internet applications such as the World Wide Web. It is concerned with delivery and addressing of the actual data packets that carry Internet traffic. (In the case of the World Wide Web, this could be text, pictures, audio, or video.)
URL (Uniform Resource Locator) contains two parts. First, it specifies what type of protocol is used for the document. In the case of a Web page, this would be HTTP. Second, it specifies the address of the document and the file path to the document.
HTTP (Hypertext Transfer Protocol) specifies what type of document is requested from the server. The HTTP indicates that the requested file is a Web page. An extension of HTTP is HTTPS, which facilities the secure transmission of documents. HTTPS is often used for the transmission of payment information over the Internet.
Domain Name Server (DNS) is a database that translates the domain name (such as cnn.com) into a numeric address that can be understood by the computer. Domain name servers are convenient for users, since one need only remember the name of a website rather than its numeric Internet address.
Question 3: Explain why and when cloud computing is important.
With the cloud computing model, firms and individuals obtain computing power and software applications over the Internet, rather than purchasing hardware and software and then installing it on their own computers. Since cloud computing enables e-commerce companies to leverage the power of Internet and e-commerce technologies to manage their operations efficiently with low cost and minimal operational commitments, firms can focus on their core competencies. Cloud computing would be a beneficial solution for small- and medium-sized e-commerce ventures with limited resources.
Question 4: What are the major Web and Internet applications that support e-commerce?
The major Web and Internet applications that support e-commerce include email, instant messaging, search engines, intelligent agents, online forums, streaming media, blogs, online social networks, Internet telephony, podcasting, wikis, and video conferencing.
Question 5: What are the most important markup languages?
The most important markup languages are HTML, SGML, and XML.
Hypertext Markup Language (HTML) is an easy language that consists of a set of tags that tell Web browser how to display a Web page. HTML defines the structure and style of a document, including headings, where and how graphics are positioned on the page, construction of tables, and text formatting.
Standard Generalized markup Language (SGML) was developed early on in the history of the Web to help very large organizations format and categorize large collections of documents. SGML is complicated and hard to learn; it was not widely adopted.
Rather than format the style and layout for a Web page, eXtensible Markup Language (XML) sets out to describe the data on the page. Tags such as and <address> are used to describe and display data according to the user’s definitions. XML is extensible because new tags can be continually defined to transform data into new formats, in contrast to HTML that has only a set number of predefined tags.</address>
Question 6: Give examples of servers and specify their functions.
There are many types of servers.
A Web server is a set of software that enables a computer to deliver Web pages written in HTML to client computers on a network. Client computers request the service by sending an http inquiry.
A database server is designed to store, manipulate, and manage databases. These servers enable users to access specific information within a database.
A mail server is designed to manage and manipulate email and other digital communication.
A video server is designed to store and serve up video clips.
An ad server is designed to deliver targeted banner ads.
Question 7: What is the Internet of Things? Give examples of applications that support business processes.
The Internet of Things (IoT, sometimes called the Internet of Everything) refers to the most current and important areas of future Internet technology. IoT is defined as using the Internet to connect a wide variety of devices, machines, sensors, and applications. It includes everything from cellphones, clothing, smart TV, coffee makers, washing machines, headphones, lamps, wearable devices, cars, machines, bridges, buildings—almost anything that can be equipped with sensors, collect data, and connect to the Internet.
Note 4
Note 4: Management Challenges and Decisions
There are a number of challenges faced by those who manage infrastructure in order to compete in the digital world.
Technology Solutions
Providers of e-commerce solutions have developed different models and tools in order to win market share. The result is a wide range of networking approaches, hardware and software, databases, applications, and security standards and protocols. The challenge for managers is to identify and select the e-commerce platform and infrastructure that will support their business strategies and help them achieve their goals.
Legacy Systems
Managers need to consider how an e-commerce system will integrate with existing business processes and their legacy systems (e.g., existing software, hardware, architecture, applications) without limiting business options.
Organizational Change
The convergence of new telecommunications and e-commerce technologies has an impact on a number of organizational processes, including
new product development resource acquisition ordering customer service. Managers should anticipate organizational changes in order to take advantage of new technologies and plan to maintain some control over the process. They need to examine and perhaps redesign entire business processes rather than apply new technology to existing practices. Managers need to define a technology strategy to support and enhance new business processes, products, strategies, and goals. Cost Structure and Competition
To succeed in today’s economy, managers need to focus on low costs while offering the best goods and services in the market. Managers need to consider many hidden costs as they evaluate the profitability of their decisions. These costs include training, solving technical problems, and maintaining and enhancing systems.
Network Availability and Reliability
Network availability and reliability are critical for e-commerce success. Managers need to know how well their e-commerce system fulfills the needs and requests of management, as well as those of their partners. Will the network have enough connections both available and accessible to support the number of users that need to access the system at one time? Reliability means that network speed and performance will provide sufficient bandwidth as well as quick response and download time.
Security and Privacy
Successful e-commerce depends on providing security and privacy. Managers face complex challenges related to secure and private data transfer, data management, and online transactions (e.g., payment systems, customer information, private data).
Question 2: Define the systems development life cycle and discuss the various steps involved in creating an e-commerce site.
The systems development life cycle (SDLC) is an approach that enables a company to understand the business goals and objectives of the system they plan to develop, in order that an appropriate solution can be designed. The five major steps in the SDLC for an e-commerce site are: (a) systems analysis, (b) systems design, (c) building the system, (d) testing the system, and (e) system implementation.
Question 4: Why is system testing important? Name the types of testing and their relation to each other.
System testing is important because it enables the company to ensure that the system is performing the planned functions and duties, and to discover any potential errors or deficiencies that need to be addressed. There are three types of testing that should be performed when developing a new e-commerce site. The first, unit testing, involves checking each program module. The second test is related to testing the system as a whole in order to check the functionality of the site from user’s perspective. The third test is acceptance testing, which requires that the firm’s key employees and managers use the system and verify that the business objectives as planned are being fulfilled.
Question 6: Why is a website so costly to maintain? Discuss the main factors that impact cost.
Websites are costly to maintain because information needs to be accurate and updated as necessary. For example, it is vital that all information about products, prices, and other important elements is accurate. In addition, the company needs to ensure that all hyperlinks are continuously tested and repaired. All data files, reports, and links to backend databases and pages need to be working properly and updated. The company needs to ensure that their website is available, easy to use, and provides a good customer experience. To achieve this, the company needs to have a Web team responsible for ensuring timely responses to customer inquiries, as well as feedback and monitoring to ensure the website functions properly.
Question 8: Name the basic functionalities a Web server should provide.
A Web server should provide the following basic functionalities.
Processing HTTP requests (requests for HTML pages).
Providing security services to verify the username and password or process the certificates and private/public key information required for credit card processing (Secure Sockets Layer or SSL).
Processing FTP requests (transfers of very large files from server to server).
Providing search engine services.
Capturing data such as logs of visits, time, duration, and referral sources.
Providing email services including the ability to send, receive, and store email.
Providing site management tools to calculate and display key site statistics such as unique visitors, page requests, and the origin of requests, as well as to check the links on the site.
Question 9: What are the main factors to consider when choosing the best hardware platform for your website?
The three main factors are the
anticipated number of simultaneous users
customer user profiles with their expected requests and behaviour while surfing the site
nature of the content of the site (rich media, multimedia files, dynamic pages) versus capacity.
Question 13: What are Java and JavaScript? What role do they play in website design?
Java is a programming language that allows programmers create interactivity and dynamic content on the client machine over the Web, executed entirely on the client’s computer and not the server. Java reduces considerably the load on the server. Java can be used to display interesting graphics and create interactive environments such as mortgage calculators, program calendars, and other dynamic tools. However, in order to protect the security of their website, many corporations put restrictions in place to deny download of these applets through their security firewalls.
JavaScript controls objects on an HTML page and handles interactions with the browser. It is usually used as a safeguard to verify and validate user input such as confirming personal information on a registration form (e.g., email, phone/fax number, postal code). Compared to Java, JavaScript is more stable and restricted to the operations of requested HTML pages, so it is more readily accepted and used by corporations.
Question 15: What are some of the policies e-commerce businesses must develop before launching a site, and why must they be developed?
Before launching their site, e-commerce businesses must develop privacy policies and accessibility rules. Privacy policy is a set of public statements about collecting personal information from a website and the use of that personal information. Accessibility rules are a set of design objectives that ensure all users can effectively access the site.
Question 17: What is the difference between a mobile Web app and a native app?
A mobile Web app is an application designed to run on the mobile Web browser built into a smartphone or tablet computer. Mobile Web apps are specifically designed for the mobile platform in terms of screen size, finger navigation, and graphical simplicity. Mobile Web apps can support complex interactions used in games and rich media, perform real-time, on-the-fly calculations, and can be geo-sensitive using the smartphone’s built-in global positioning system (GPS) function. Mobile Web apps typically operate faster than mobile websites but not as fast as native apps. In the case of Apple, the native browser is Safari. Generally it is built to mimic the qualities of a native app using HTML5 and Java.
A native app is an application designed specifically to operate using the mobile device’s hardware and operating system. These stand-alone programs can connect to the Internet to download and upload data, and can operate on this data even when not connected to the Internet. For example, download a book to an app reader, disconnect from the Internet, and read your book. Because various types of smartphones have different hardware and operating systems, apps are not “one size fits all” and therefore need to be developed for different mobile platforms. An Apple app that runs on an iPhone cannot operate on Android phones. Native apps are built using different programming languages depending on the device for which they are intended, which is then compiled into binary code, and which executes extremely fast on mobile devices, much faster than HTML or Java-based mobile Web apps. For this reason, native apps are ideal for games, complex interactions, on-the-fly calculations, graphic manipulations, and rich media advertising.