Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
How is computer networks used in marketing and sales, financial services, teleconferencing?
Computer network have led to a new age of all of these services. They have helped in the following way to individual sector:
Marketing and sales: Computer networks are used extensively in both marketing and sales organizations. Marketing professionals use them to collect, exchange, and examine data related to customer requires and product development cycles. Sales application includes teleshopping, which uses order-entry computers or telephones linked to order processing network, and online-reservation services for hotels, airlines and so on.
Financial services: Today's financial services are totally depended on computer networks. Application contains credit history searches, foreign exchange and investment services, and electronic fund transfer, which permit user to transfer money without going into a bank (an automated teller machine is an instance of electronic fund transfer, automatic pay-check is another).
Teleconferencing: Teleconferencing permits conference to occur without the participants being in the similar place. Applications include simple text conferencing (where participants communicate by their normal keyboards and monitor) and video conferencing where participants can even see as well as talk to other fellow participants. Dissimilar types of equipments are used for video conferencing depending on what quality of the motion you need to capture (whether you require just to see the face of other fellow participants or do you require to see the exact facial expression).
Application Layer The application layer provides an interface between application entities and the users computer. This layer offers services to a variety of aspects of d
(a) Explain how a CDMA system works? (b) Explain howWelsh-Hadamard codes are generated. Explain why orthogonality between different spreading codes is important. (c) Consider
Password Authentication Protocols (PAP) PAP implements the traditional username and password authentication methods. At the request from an authenticator the client respon
Ring: It is a simple linear array where end nodes are associated. It is equal to a mesh with wrap around connections. The data transfer in a ring is generally one direction. So,
Data Link Layer Sub layers · Logical Link Control (LLC) - upper layer · Handles control information, logical addressing and data · MAC (Medium Access Control) - lower layer ·
State the methods to keep the attackers at bay Another best methods to keep the attackers at bay is known as network address translator or NAT. The philosophy behind the design
What are the two types of Transmission technologies, basis on which computer networks can be categorized? Broadly there are two types of transmission technology: 1. Broadc
Question 1: (a) In the context of an information system, distinguish and relate among the terms: data, information and decision-making. (b) Describe at least two chall
BRIDGES: A bridge is a hardware device also needed to connect two LAN code segments to extend a LAN. A bridge uses two NICs to connect two code segments. It listens to all tr
Explain what are the External Threats External security threats are the most problematic ones. Till date the greatest threat was the virus menace. Now, with the sophisticated
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd