How is computer networks used in marketing and sales, Computer Networking

Assignment Help:

How is computer networks used in marketing and sales, financial services, teleconferencing?

Computer network have led to a new age of all of these services. They have helped in the following way to individual sector:

 Marketing and sales:  Computer networks are used extensively in both marketing and sales organizations. Marketing professionals use them to collect, exchange, and examine data related to customer requires and product development cycles. Sales application includes teleshopping, which uses order-entry computers or telephones linked to order processing network, and online-reservation services for hotels, airlines and so on.

 Financial services:  Today's financial services are totally depended on computer networks. Application contains credit history searches, foreign exchange and investment services, and electronic fund transfer, which permit user to transfer money without going into a bank (an automated teller machine is an instance of electronic fund transfer, automatic pay-check is another).

Teleconferencing: Teleconferencing permits conference to occur without the participants being in the similar place. Applications include simple text conferencing (where participants communicate by their normal keyboards and monitor) and video conferencing where participants can even see as well as talk to other fellow participants. Dissimilar types of equipments are used for video conferencing depending on what quality of the motion you need to capture (whether you require just to see the face of other fellow participants or do you require to see the exact facial expression).

 


Related Discussions:- How is computer networks used in marketing and sales

Application layer - fundamentals of networks, Application Layer The ap...

Application Layer The application layer provides  an  interface between  application  entities and the  users computer. This layer offers services to a variety of aspects of d

Explain how a cdma system works, (a) Explain how a CDMA system works? (b...

(a) Explain how a CDMA system works? (b) Explain howWelsh-Hadamard codes are generated. Explain why orthogonality between different spreading codes is important. (c) Consider

Password authentication protocols (pap), Password Authentication Protocols ...

Password Authentication Protocols (PAP) PAP  implements the  traditional username and password  authentication methods. At the  request from  an authenticator the client respon

Explain ring interconnection networks, Ring: It is a simple linear array w...

Ring: It is a simple linear array where end nodes are associated.  It is equal to a mesh with wrap around connections.  The data transfer in a ring is generally one direction. So,

Explain about data link layer sub layers, Data Link Layer Sub layers ·  L...

Data Link Layer Sub layers ·  Logical Link Control (LLC) - upper layer · Handles control information, logical addressing and data · MAC (Medium Access Control) - lower layer ·

State the methods to keep the attackers at bay, State the methods to keep t...

State the methods to keep the attackers at bay Another best methods to keep the attackers at bay is known as network address translator or NAT. The philosophy behind the design

What are the two types of transmission technologies, What are the two types...

What are the two types of Transmission technologies, basis on which computer networks can be categorized? Broadly there are two types of transmission technology: 1. Broadc

What are challenges of electronic commerce, Question 1: (a) In the con...

Question 1: (a) In the context of an information system, distinguish and relate among the terms: data, information and decision-making. (b) Describe at least two chall

Bridges, BRIDGES:  A bridge is a hardware device also needed to connec...

BRIDGES:  A bridge is a hardware device also needed to connect two LAN code segments to extend a LAN. A bridge uses two NICs to connect two code segments. It listens to all tr

Explain what are the external threats, Explain what are the External Threat...

Explain what are the External Threats External security threats are the most problematic ones. Till date the greatest threat was the virus menace. Now, with the sophisticated

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd