Tuesday, October 26, 2010

5.3 B2E Electronic Commerce


5.2 Electronic Commerce

 We would use an extranet to do business with another business by the client buying the ingredients the server that we need. Enables 2 or more firms to use the internet to do business through use of VPN and firewall technologies. While theVPN ensure secured transmission of proprietary information.  Then the firewall will secure Proprietary Information within confines of a LAN.

5.1 Critique Your Competitor's E- Commerce Website

The website for Papa john's is in the stage of E-information because it has all the information you need you order a pizza.

Rule 1 : The Website Should Offer Something Unique: 3
Rule 2 : The Website Should be aesthetically pleasing:4
Rule 3 : The Website Must be easy to use and fast:5


Rule 4 : The Website must motivate people to visit: 3
Rule 5 : You must advertise your presence on the web:4
Rule 6 : You should learn from your website:5
I rated the website of how i would look at in if a was a customer. There were things that really got my attention. There were also things on there that could have been better.

4.4 Entity Relationship Diagram

4.3 Packet Switching Technologies

First, the TCP breaks information into small chunks called data packets and manages the transfer of those packets form computer to computer. The IP defines how a data packet must be formed and to where a router must forward each packet. Then the packets travel independently to their destination, sometimes following different paths and arriving out of order.  

4.2 A Basic Network

The Server is the computer that makes access to files, printing, communications, and other services available to the users of the network. Clients only request services, is usually only one user. Many different users share the user share the server. Wireless media transmit  and receives eletromagnetic signals using methods such as infrared line of sight, high frequency radio, microwaves systems. TCP, breaks the information into small packets must be formed and to where a router must forward each packet.

4.1- IFS H/ W Infrastructure

The computer sceen is the output technology. The CPU is the system that is using the ASCII. Which it will convert "HELLO" into ASCII. ASCII is a the 8 binary code that represents a byte which represents the letters. The CPU  has 3 parts inside and the ALU does the math. The control unit schedules activities which will be executed, the internal memory is the registered.